Please enable JavaScript.
Coggle requires JavaScript to display documents.
(🎯 Malware: Malicious software designed to cause harm or steal data., 📊…
- 🎯 Malware: Malicious software designed to cause harm or steal data.
- Viruses: Attach to other files to cause harm.
- Worms: Spread independently, often via networks.
- Adware: Displays advertisements.
- Spyware: Records computer activities for espionage.
- Ransomware: Encrypts data and demands ransom.
- 📊 Character Formatting Options:
- Alignment (Left, Right, Center, Justify).
-
-
- System Software (Operating Systems, Language Translators, Utility Software, Firmware, Device Drivers).
-
- 📊 RAM (Random Access Memory): Volatile, Read/Write memory.
- S-RAM: Does not require periodic refresh, faster, expensive, used in cache memory.
- D-RAM: Requires periodic refresh, used as main memory.
- 💡 CPU (Central Processing Unit): The "brain" of the computer, responsible for processing data.
- Components: Control Unit (CU), Arithmetic Logic Unit (ALU), Registers.
-
- 🔍 Definition of Software: An organized collection of programs.
- 💡 Example: Ubuntu is a Linux-based Operating System (System Software), not an application program.
-
- 🎯 Key Point: Size of Letter is not considered a character formatting type.
-
- 🔍 Purpose: Used for records and related calculations.
- 📌 Proprietary Software: MS Excel is a proprietary or closed-source software developed by Microsoft.
- 💡 Alternative Term: Also known as copyright software.
-
- 📊 Digital Signature Purpose: To validate and authenticate electronic documents.
- 🎯 Authentication Authority: Certifying Authority is responsible for digital signature authentication.
- 🔄 Importance: Crucial for legal validity of electronic records.
-
- 🔍 Types of Data: Quantitative (discrete, countable) and Qualitative (describes quality).
- 📌 Data Processing Sequence: Input -> Process -> Output -> Storage.
- 💡 Data Capture: The initial step in data processing.
-
- 🎯 ROM (Read Only Memory): Non-volatile, Read-only memory.
- 🔄 Types of ROM: PROM (Programmable ROM), EPROM (Erasable PROM), EEPROM (Electrically Erasable PROM).
-
- 🔍 Optical Mark Reader (OMR): Input device used to read marks on paper, commonly for multiple-choice answer sheets.
- 📌 Barcode Reader (BCR): Input device for capturing data from barcodes.
- 💡 Scanner: Input device used to convert hard copies (images, text) into soft copies.
-
- 📊 Cookies: Files stored by web browsers containing user-related information.
- 🔄 Antivirus Software: Utility programs (e.g., Avira, Norton, Quick Heal) designed to protect computers from unwanted programs, often using signature-based detection.
-
- 🔍 Definition: Digital provision of government services.
- 📌 Key Components: Structures, processes, policies. Marketing is not a core component.
- 💡 Strategic Alignment: Ensures standardized technology and data-driven decisions in healthcare IT.
-
- 📊 Specific Purpose Programs: Often referred to as functions or applications designed for particular tasks.
- 🎯 Utility Software: Designed to assist, manage, and tune computer hardware, operating systems, and application software (e.g., antivirus).
- 🔄 Open Source Software: Software with publicly available source code (e.g., LibreOffice, Mozilla Firefox, Python). Adobe Reader is not open source.
-
- 🔍 Smallest Unit of Data: Bit (binary digit, 0 or 1).
- 📌 Word Processing: Ability to create and manipulate documents using word processor software (e.g., MS Word).
-
- 📊 Plotter: Output device for printing large images, designs, maps, and diagrams (e.g., Flatbed, Drum, Inkjet, Cutting Plotters).
- 🎯 HHDD (Hybrid Hard Disk Drive): A blend of HDD and SSD technologies.
- 🔄 USB (Universal Serial Bus): A standard connection for various devices, commonly used in mobile phones.
-
- 🔍 Active Digital Footprint: Online activities that directly contribute to one's digital presence (e.g., browsing the internet, posting on social media, writing emails, filling online forms).
- 📌 Cybercrime: Illegal activities conducted via computers or networks (e.g., spreading viruses, cyberbullying).
- 💡 Secure Connections: Checking for a lock button in the address bar indicates a secure HTTPS connection.
-
- 📊 Cell Reference (Excel): Ways to refer to cells in a spreadsheet (Absolute, Relative, Mixed).
- 🎯 E-commerce: Electronic transactions (B2B, B2C, C2C).
- 🔄 DigiLocker: A cloud-based service for storing and accessing digital documents.
-
- 🔍 Braille Display Monitor: Preferred by visually impaired individuals to understand text output from computers.
- 📌 Computer-Aided Design (CAD): Software used for designing products like cars, often used with plotters for large-scale prints.
- 💡 3D Printer: Prints three-dimensional objects layer by layer.
-
- 📊 Clock Speed (CPU): Measured in Hertz (Hz), indicating cycles per second (e.g., 3 GHz = 3 billion pulses per second).
- 🎯 Punch Card: An early input device using holes for data representation, invented by Herman Hollerith.