Skip to main content

Basic About Computer

Size:
         8 bits = 1 byte

1024 bytes = 1 kb (kilo byte)
    1024 kb = 1 mb (mega byte)
   1024 mb = 1 gb (giga byte)

RAM:
         RAM (Random Access Memory) is used to store the  data temporarily.

ROM:
         ROM(Read Only Memory) stores some predefined instruction which executes every time when the machine starts for the first time.

Speed:
          Speed is a feature through which the data can be processed very quickly. Microprocessor or Chip or CPU ( Central Processing Unit) is device which is responsible to maintain the speed various types of  processors are dual core,core to duo, Pentium 4 & higher version.

Motherboard:
           It is a circuit board which holds the other devices of the machine.

NIC:
            Nic stands for(network interface card) helps to make the connectivity with the other machine

Port:
            It is   a device which holds the input and output devices. There are different types of ports are available. They are :-
                                   1  serial port
                                   2  parallal port
                                   3  usb (universal serial bus ) port (latest )

SMPS:
            SMPS(Switched Mode Power Supply) is a device which controls the power supply of the machine.

Software:
             It is the logical part of the machine. It is used to interact between the user and hardware.

Types of software:
           1  system software
System Software:
           It is the basic software required to run  a machine. Operating system is the example of system software. Examples of operating  system:- DOS,UNIX ,LINUX,WINDOWS.

           2 application software 
Application Software:
            It is used for  a specific application. Example:- notepad,calculator,ms word ,ms excel etc

           3 compiler software
Compiler Software:
            It is used to develop the ready made software. Example:- c compiler,c++ compiler ,java compiler ,c# compiler,vb compiler etc

Networking:
           Networking helps to connect more than one machines with each other. Types of network:-
1  LAN(LOCAL AREA NETWORK)
2  WAN(WIDE AREA NETWORK)
3   MAN(METROPOLITAN AREA NETWORK)

REQUIREMENTS FOR NETWORKING:
            1  Media
            2  Networking Device

PROTOCOL:
            Protocol is a set of rules to send and receive data. Example:- TCP/IP

Comments

Popular posts from this blog

SQL Dorks

-------------------------------------------------------------------------------- Admin 22-05-2014, 08:20 PM cat.asp?-cat= productlist.asp?catalogid= Category.asp?category_id= Category.cfm?category_id= category.asp?cid= category.cfm?cid= category.asp?cat= category.cfm?cat= category.asp?id= index.cfm?pageid= category.asp?catid= Category.asp?c= Category.cfm?c= productlist.cfm?catalogid= productlist.asp?catalogid= viewitem.asp?catalogid= viewitem.cfm?catalogid= catalog.cfm?catalogId= catalog.asp?catalogId= department.cfm?dept= department.asp?dept= itemdetails.cfm?catalogId= itemdetails.asp?catalogId= product_detail.asp?catalogid= product_detail.cfm?catalogid= product_list.asp?catalogid= product_list.cfm?catalogid= ShowProduct.cfm?CatID= ShowProduct.asp?CatID= search_results.cfm?txtsearchParamCat= search_results.asp?txtsearchParamCat= itemdetails.cfm?catalogId= itemdetails.asp?catalogId= store-page.cfm?go= store-page.asp?go= Detail.cfm?CatalogID= Detail.asp?CatalogID= browse.cfm?category_i...

10 BEST LINUX DISTRIBUTION FOR HACKING &PEN TESTING 2020

🔴Use wisely🔴 ⭕️Info:     These Linux distributions offer lots of useful tools for penetration testing, wireless security, forensic, etc.  ✍1. BackTrack 5r3 ✅useful : wireless cracking, exploiting, web application assessment, learning. ✍2. BackBox Linux  ✅Useful: penetration tests and security assessments. It provides all suspects for Forensic Analysis, Documentation & Reporting, Reverse Engineering with John, Nmap, Social Engineering Tool, etc. ✍3. Blackbuntu ✅Useful:   Tools for Information Gathering, Network Mapping, Vulnerability Identification, Penetration, Maintaining Access, radio Network Analysis, Reverse Engineering, etc.  ✍4.Samurai Web Testing Framework ✅Useful: It offers lots of open source and free tools that would help you focus on testing and attacking websites. ✍5. Knoppix STD ✅useful:  live CD and can be installed on a hard disk. The STD stands for Security Tools Distribution. Knoppix provides you a full scenario for cry...

🔰How To Remove Shortcut Virus From Your Pc🔰

✅ Method 1.  - Clean up and remove Shortcut Virus by CMD - 1. Click on  Start  and select  Run; 2. Type: CMD  and Hit Enter to open  Command Prompt; 3. Type the  drive letter  of your hard drive partition in PC or USB flash drive and hit Enter; (G for example.) 4. Type:  attrib g:*.* /d /s -h -r -s  and hit Enter. You’ll be able to see your files and data on Windows PC or USB flash drive now. ✅Method 2.  -Cleanup Shortcut Virus with Shortcut Virus Remover or Anti-virus Software- *If you need a double guarantee, you can download and install anti-virus software to clean up all shortcut virus from Windows 10/8/7 computer and USB etc external storage devices. Here below you’ll see a list of anti-virus software and tools and you can selectively choose one to try* ➡️Trojan Removal Tool; ➡️Shortcut virus fixfolder; ➡️Malwarebytes Anti-Malware, etc. ✅Method 3.  - Delete/Wipe Shortcut Virus from Registry - 1. Press Win+R and type: reged...