Please enable JavaScript.
Coggle requires JavaScript to display documents.
4.3 computer systems, 4.3 computer system - Coggle Diagram
4.3 computer systems
security utilities
A virus is a malicious computer program written to cause damage to files or inconvenience to the user
- prevents system files being deleted or changed
- detects and removes viruses that do manage to install themselves
- prevents viruses being installed
Spyware are programs that secretly record what you are doing on your computer or collect personal information and transmit it to another user e.g. key logger software
-
- bank accounts/credits card details
Spyware protection software detects spyware programs and prevents them from installing themselves on your computer
-
- back-up and recovery programmes
access rights
- If a computer is used by more than one person, each user should be able to see only their own files
-
-
managing security
-
the operating system provides a method for users to gain access to the system, known as logging on. this will usually involve a username that uniquely identifies the user and a password that confirms the user is who they say they are. Other methods can include a fingerprint, swipe card, facial recognition or a personal identification number (PIN). The use of a password or to prove the identity of a person is known as authentication. Some logon methods such as fingerprints and facial recognition not only identify the person but also prove the identity.
1.Files can be allocated permissions so that only certain users can have access to those files. Permissions for users can include no access, read-only or writeable.
-
-
user interface
Users interact with the OS through a user interface provided by the operating system. The user interface is a system which converts what the user inputs to a form that the computer can understand and vice versa.
svaing files on disks
when you save a large file, it is divided up into equal-sized blocks or clusters of typical 4K bytes
- a file 1 - 4096 bytes occupies 4096 bytes
- a file of 4097 bytes occupies 8192 bytes
-
-
4.3 computer system
back up utilities
-
Windows has a Backup and Restore utility which will create a backup of your files on a regular schedule
-
Organisations from the smallest companies to the largest banks, cannot afford to lose any data
Commercial backup utilities make sure that even in the event of fire or flood, all data can be recovered
compression utilities
-
-
Often, there is a limit to the size of a file that you can attach to an email
A smaller, compressed file will transmit and download much faster
simulation models
Simulation models are used to clarify what would happen in a given situation, they are ‘what if’ tools.
Simulation models are used to model important aspects of the real world and show what could happen in certain scenarios.
Flight simulators are one example of a simulation model. They help to expose pilots and designers to routine and unexpected flight circumstances.
-
-
automatic updates
Companies issue updates to software regularly
For software that is installed on the computer, the automatic update will:
-
-
-
-