StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

General computer knowledge - Coursework Example

Cite this document
Summary
1. Explain the following terms: formatting (a hard drive or USB stick), dragging, defragment, podcast, vodcast, scam (give examples), phishing, urban legend (give examples), Facebook, cloud computing. Please write around 3-5 lines for each definition.  Formatting (A Hard Drive or USB Stick) Formatting refers to the operation of processing a storage mechanism on hard drive or USB Stick or floppy drive or other data storage equipment for initial application of disk…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96% of users find it useful
General computer knowledge
Read Text Preview

Extract of sample "General computer knowledge"

Download file to see previous pages

Dragging Dragging is an activity of moving icons or images across the display screen mostly by using a mouse button. In tablets, it can be done using touch. It can also be used for moving block of text across the display screen while keeping the mouse button pressed. Defragment Defragmentation is the process of minimizing fragmentation by organizing files into smallest contiguous regions. Defragmentation increases region of free space area by compaction. It tries to compact smaller files together that can be accessed sequentially.

Defragmentation also improves accessing files in faster times as read/write operations is faster in defragmented files in comparison to system of fragmented files. Podcast Podcast refers to digital media that includes series of multimedia, PDF, ePub files that can be streamlined to mobile or electronic devices through subscription. Podcast’s etymology is rooted in the traditional word “broadcast” and “pod” of the apple product “iPod”. The process of Podcast applies the software “podcatcher” to web feed the series of multimedia, PDF, or ePub files from distributor’s servers for downloading any files. . Digital entertainment industry applies Vodcast mostly for short video clips of 2-9 minutes.

Vodcast is also used for marketing, blogs, and in combination with traditional medium. Scam (give examples) Scam in cyber world applies manipulation for gaining access of private information to stealthily deprive money of potential target. Phone scam is one of the recent tricks in which attackers represent themselves as technical support person of branded organization such as Microsoft or other large companies. They apply technical jargons to confuse the person and maliciously install a program bypassing Antivirus of computer to take advantage of personal information or forcing the client to purchase product of particular company.

Phishing is another scam that sends mail from branded organization to target unsuspected victim. Phishing Phishing act tries to gain accounting or credit card information masquerading themselves as reliable representative of branded company. Social media, mail, or other websites tries to lure public into their trap and takes the person to website with malware. E-mail spoofing is also one of the ways to trap victim by deceiving them using similar looking logos or website of branded organization.

Phishing applies social engineering methodologies to exploit technological naive. Urban legend (give examples) Urban legends refer to modern myth that has been created through repetition of false story mostly using the medium of Internet that provides the platform faster broadcast of the story. They increase the believability factor by personalizing the story that it has been happened to one of the friends. "The Infamous Modem Tax", "Craig

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“General computer knowledge Coursework Example | Topics and Well Written Essays - 750 words”, n.d.)
General computer knowledge Coursework Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1464797-general-computer-knowledge
(General Computer Knowledge Coursework Example | Topics and Well Written Essays - 750 Words)
General Computer Knowledge Coursework Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1464797-general-computer-knowledge.
“General Computer Knowledge Coursework Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1464797-general-computer-knowledge.
  • Cited: 0 times

CHECK THESE SAMPLES OF General computer knowledge

Linkage among Environmental Opportunity, Competency and Organizational Success

1 The technological environmental represent the application to marketing of knowledge based on discoveries in science, inventions and also innovations new technology will results in new goods and services for consumers.... computer aided designs super workstations, and computer aided manufacture tends to speed up the process of bringing new products to the market.... computer maps will also help markets in targeting markets, planning advertising analyzing competitors and distributing their products....
8 Pages (2000 words) Essay

Computer Forensics Challenges

Documents maintained on a computer are covered by different rules, depending on the nature of the documents.... An example would be if a warrant is issued for child porn on an individual's computer, but finds records of embezzlement, the embezzlement records could not be used in a court of law.... The exception is if the police could justify obtaining a warrant to search the computer for records of embezzlement.... It was ratified as a response to the abuse of the writ of assistance which was a type of general search warrant in the American Revolution....
26 Pages (6500 words) Essay

Charles Babbage and His Lifetime

ar ahead of his time, Babbage invented the concept of “knowledge management” a century and a half before the term was first used.... abbage's work was directed towards helping society to advance and prosper, as found in his writings where he expressed his views on knowledge as the key to both personal and national prosperity.... This essay "Charles Babbage and His Lifetime " proposes to discuss Charles Babbage's contribution to the development of computer technology through his work on The Difference Engines and The Analytical Engines....
7 Pages (1750 words) Essay

Keeping Computer Systems Clean: Antivirus Software Industry

The paper describes the precautions that would either prevent or fix a lot of troubles yet ordinary computer users do not do these simple things on a regular basis.... Just as diet and exercise take some effort and concentration, keeping computer systems clean takes the latest scanning software.... Spyware is installed with many legitimate types of applications to monitor the user's activities, such as with browsers to detect the IP address of the computer to send local ads to the user or to encourage registration of software....
8 Pages (2000 words) Research Paper

Principals of Technical Communication and Design

The present paper has identified that when constructing technical documents one of the most important things to consider is the knowledge level of the audience (Hargis 2004).... In regards to Emily Vander's Flash 8: The Missing Manual (2006) the reader is assumed to have no prior knowledge regarding the application.... Indeed, the book forward aptly begins with a historical overview of Flash, describing how it has evolved since its early usage in professional animation and how now everyone with access to a personal computer has the opportunity to learn web animation....
12 Pages (3000 words) Literature review

Are We Too Dependent on Computers

computer addiction is a manifestation of computer dependency that too will be discussed in this article as both are unique but are interrelated.... But computer dependency has also manifested in the condition that is known as computer addiction which itself is a serious concern for those who are using computers.... ochlin in his book states that computer's over usage in society has resulted in making us forget simple things like using spell check by search engines and typing software rather than relying on dictionaries which completely reflects our dependency on computers....
5 Pages (1250 words) Article

Qatar Hospital System for Vendor Solicitation

In the paper “Qatar Hospital System for Vendor Solicitation,” the author provides Qatar Hospital System project, which has been divided into different sub-projects.... The different projects include patient management, Finance management, clinical management, staff management, stock control system....
4 Pages (1000 words) Essay

Computer Architecture in the 1970s

This coursework "computer Architecture in the 1970s" describes computer architecture and its perspective.... This paper outlines changes in RAM technology and persistent storage, how architecture was affected by the cost of the hardware, differences in computer architecture of 1970s and now.... hellip; computer architecture is a comprehensive subject that comprises everything from the affiliation between manifold computers to precise constituents inside a computer....
9 Pages (2250 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us