Wednesday, 5 April 2017

Computer-7

Let’s start our discussion with the knowledge of “Trojan-horse”.
Trojan-horse is basically a malicious program in computer.
It shows itself as a useful program. But simultaneously it performs destructive task. Hence, first persuades user to download it and later on creates problem for computer.

Many times ... we observe that computer demands for security updates.
Why it’s required?
It’s done so that computer would not install malicious softwares.
This process of downloading malicious softwares into computer is called “Drive by download”.

Do you know?
What’s Virtual Memory?
It’s basically memory of hard-disk which is pretended to be RAM.

When we go to purchase a laptop or PC then it’s asked from us in desi language whether we want to buy empty computer or full?
We are confused by the wording.
Basically it is difference of availability of Operating-System.

Operating Systems like Windows-10, Android etc. are basically interface between computers and users.

See there are basically two types of memories. One is main memory and other is secondary memory. When data is retrieved from secondary storage to be used by main memory then “Paging” concept is used. Actually, while retrieving data it is converted into pages.

Have you heard the name “Deadlock”?
Deadlock is basically a situation where a group of processes are blocked. Just like Jam of vehicles in market.

Hence, in this lecture we have been through various important concepts:
Trojan horse (destructive software pretended itself to be useful.)
Drive by download (automatic downloading of malicious softwares)   
Virtual Memory (memory of hard-disk pretended to be used like RAM)
Operating-System (Interface between user and computer)
Paging (A concept to retrieve data from secondary memory)
Deadlock (A jam of various processes)

Let’s explore further lectures for getting bath in river of more concepts.

No comments:

Post a Comment