Podcast
Questions and Answers
Which component directly controls everything else in a PC?
Which component directly controls everything else in a PC?
- Power supply
- Motherboard (correct)
- Processor
- Expansion cards
The CPU's main function involves
The CPU's main function involves
- holding programs and data being used
- expanding computer functionality
- feeding electrical power to every component
- executing sequences of instructions (correct)
What does the chipset on a motherboard primarily determine?
What does the chipset on a motherboard primarily determine?
- The speed of the processor
- The type of case required
- The type of processor the motherboard accepts (correct)
- The available colors for the case
Which type of memory is commonly used as the primary memory in computers?
Which type of memory is commonly used as the primary memory in computers?
What is the purpose of ROM in a computer system?
What is the purpose of ROM in a computer system?
What is the role of the BIOS in a computer?
What is the role of the BIOS in a computer?
What is the function of the 'POST' process during startup?
What is the function of the 'POST' process during startup?
Why is L1 cache the fastest type of cache memory?
Why is L1 cache the fastest type of cache memory?
An expansion card enhances computer capability. What is another term for expansion card?
An expansion card enhances computer capability. What is another term for expansion card?
What does VGA stand for in the context of computer hardware?
What does VGA stand for in the context of computer hardware?
What is the primary purpose of a sound card in a computer system?
What is the primary purpose of a sound card in a computer system?
What is the function of a network interface card (NIC)?
What is the function of a network interface card (NIC)?
What is disk formatting primarily used for?
What is disk formatting primarily used for?
What is the main role of a File System in an operating system?
What is the main role of a File System in an operating system?
Which of the following is a key characteristic of NTFS (New Technology File System)?
Which of the following is a key characteristic of NTFS (New Technology File System)?
What is the primary function of an operating system (OS)?
What is the primary function of an operating system (OS)?
What type of operating system is Linux described as?
What type of operating system is Linux described as?
What does computer security aim to protect?
What does computer security aim to protect?
What is meant by a 'threat' in the context of computer security?
What is meant by a 'threat' in the context of computer security?
How can computer users protect their systems from vulnerabilities?
How can computer users protect their systems from vulnerabilities?
What is 'malware'?
What is 'malware'?
Why do virus writers create viruses?
Why do virus writers create viruses?
What triggers a computer virus to execute its code?
What triggers a computer virus to execute its code?
What can a computer virus do once it infects your computer?
What can a computer virus do once it infects your computer?
Why is it believed that there is so much malicious software available on the web?
Why is it believed that there is so much malicious software available on the web?
What is the primary function of a Trojan horse?
What is the primary function of a Trojan horse?
What distinguishes Trojans from computer viruses and worms?
What distinguishes Trojans from computer viruses and worms?
What is the key skill of a hacker?
What is the key skill of a hacker?
What distinguishes a 'white hat' hacker?
What distinguishes a 'white hat' hacker?
What action can be taken to stay informed on how to protect your computer network?
What action can be taken to stay informed on how to protect your computer network?
Why should organizations enforce password policies?
Why should organizations enforce password policies?
How often should employees be trained on security protocols?
How often should employees be trained on security protocols?
How can the security of web browsers impact one's overall 'cyber-attack surface'?
How can the security of web browsers impact one's overall 'cyber-attack surface'?
Which of the following helps you to Keep Your Browser Secure?
Which of the following helps you to Keep Your Browser Secure?
Computer hardware is best described as:
Computer hardware is best described as:
Which of the following components holds all the programs and data the processor is currently using?
Which of the following components holds all the programs and data the processor is currently using?
Among CPU, slot, PGA, what is LGA?
Among CPU, slot, PGA, what is LGA?
Flashcards
Computer hardware
Computer hardware
Physical components that make up a computer system.
Motherboard
Motherboard
The core of the computer system that connects and controls everything.
Processor
Processor
The engine of the computer, also known as the Central Processing Unit.
Memory (RAM)
Memory (RAM)
Signup and view all the flashcards
Power supply
Power supply
Signup and view all the flashcards
Expansion cards
Expansion cards
Signup and view all the flashcards
CPU (Central Processing Unit)
CPU (Central Processing Unit)
Signup and view all the flashcards
Expansion Slot
Expansion Slot
Signup and view all the flashcards
Chipsets
Chipsets
Signup and view all the flashcards
Ports
Ports
Signup and view all the flashcards
Random Access Memory
Random Access Memory
Signup and view all the flashcards
Read Only Memory (ROM)
Read Only Memory (ROM)
Signup and view all the flashcards
BIOS (Basic Input/Output System)
BIOS (Basic Input/Output System)
Signup and view all the flashcards
POST Function
POST Function
Signup and view all the flashcards
Bootstrap Loader
Bootstrap Loader
Signup and view all the flashcards
CMOS Setup
CMOS Setup
Signup and view all the flashcards
Level 1 (L1) Cache
Level 1 (L1) Cache
Signup and view all the flashcards
Level 2 (L2) Cache
Level 2 (L2) Cache
Signup and view all the flashcards
Level 3 (L3) Cache
Level 3 (L3) Cache
Signup and view all the flashcards
Expansion cards
Expansion cards
Signup and view all the flashcards
VGA Cards
VGA Cards
Signup and view all the flashcards
Sound cards
Sound cards
Signup and view all the flashcards
Network cards
Network cards
Signup and view all the flashcards
Hard Disk Drive (HDD)
Hard Disk Drive (HDD)
Signup and view all the flashcards
Partition
Partition
Signup and view all the flashcards
Format
Format
Signup and view all the flashcards
File System
File System
Signup and view all the flashcards
Operating Systems
Operating Systems
Signup and view all the flashcards
Computer security
Computer security
Signup and view all the flashcards
System Threats
System Threats
Signup and view all the flashcards
Malware
Malware
Signup and view all the flashcards
Virus
Virus
Signup and view all the flashcards
Trojan Horse
Trojan Horse
Signup and view all the flashcards
Hackers
Hackers
Signup and view all the flashcards
Black hat hacker
Black hat hacker
Signup and view all the flashcards
Gray hat hacker
Gray hat hacker
Signup and view all the flashcards
White hat hacker
White hat hacker
Signup and view all the flashcards
Study Notes
Computer Hardware Basics
- Hardware refers to the physical components of a computer system.
- Includes components that can be installed inside or connected to the outside of a computer.
- System box devices include:
Motherboard
- The core of the computer system.
- Connects all other components.
- Controls everything in the system.
Processor (CPU)
- Known as the "engine" of the computer.
- CPU stands for Central Processing Unit.
Memory (RAM)
- Referred to as RAM.
- Primary memory that holds programs and data currently being used by the processor.
Power Supply
- Feeds electrical power to all parts of the computer.
Expansion Cards
- Examples: video card, sound card, MODEM, Network Interface Card, TV/Radio Card.
- Extends computer functionality.
CPU Details
- The most valuable and expensive part of the computer.
- Complex set of electronic circuitry.
- Executes sequences of instructions representing programs stored in the Main Memory.
- Intel and AMD are major brands
CPU Sockets
- PGA
- LGA
- Slot
Motherboards
- Categorized by size, features, layout, arrangements, and internal components.
- Newer offer integrated interface cards.
- Integrated interface cards examples:
- Sound cards
- VGA Cards
- Network Cards
- Controller Cards
Motherboard Components
- Consists of many parts.
- Key components include:
- Ports
- Slots
- Chip Sets
Ports
- Input and output interfaces for communication with peripherals and computer networks.
- In modern computers, they are on the back side of the motherboard, which is called the back panel.
- Special port requirements can be added as a card via the slots.
Slots
- A socket for expansion cards that provide additional features, like video, sound, graphics, Ethernet, or memory.
Chipsets
- Integrated circuit chips that support CPU interfacing with other motherboard devices.
- Determines the type of processor, RAM capacity, and internal/external devices the motherboard supports.
RAM and ROM
- RAM is Random Access Memory.
The most common types in use are dynamic RAM, of various speeds and sizes. The most common RAM today is DDR 4 RAM. Older versions were DDR3, DDR2, DDR1, and SD RAM.
- ROM is Read Only Memory.
- Data is read only and held permanently (nonvolatile).
- Stores information, such as time, date, memory, and settings.
- The BIOS a.k.a Basic Input Output System
- Built-in software that determines what a computer can do before programs from a disk are accessed.
- Contains code to control keyboard, display, disk drives, serial communications, and other functions.
- Typically placed on a ROM chip.
- ROM aKa, Read Only Memory: used to store the code for the BIOS
BIOS Functions
- POST (Power-On Self-Test).
- Tests and makes sure no errors exist before loading the operating system.
- Bootstrap Loader.
- Finds and loads the operating system.
- BIOS or CMOS Setup.
- Configuration program to configure hardware settings.
Cache Memory
- Used to quickly access data.
- Levels of Cache:
- Level 1 (L1) Cache - fastest, built into the processor using SRAM.
- Level 2 (L2) Cache - slower, larger than L1, also inside CPU
- Level 3 (L3) Cache - slower, larger than L2, found on the motherboard.
Expansion Cards
- Provides additional capabilities, such as enhanced video performance.
- Referred to as add-on cards, expansion boards, internal cards, or interface adapters.
VGA (Video Graphics Array) Cards
- Connects the monitor to the motherboard using the VGA interface.
- Older cards used ISA/PCI.
- Newer cards use AGP or PCI-Express.
Sound Cards
- Connects speakers to the computer.
- Often built into new motherboards.
- Must process multiple sounds simultaneously for configurations like surround or stereo sound.
Network Cards (NIC)
- Connects a computer to a network.
- Commonly available in PCI.
- Some are in USB versions.
- NICs allow computers to communicate via cable or wirelessly.
Hard Disk Drive (HDD)
- Non-volatile memory device for permanent data storage and retrieval.
- Consists of platters with data written using a magnetic head inside an air-sealed casing.
- Connects to the motherboard via an ATA, SCSI, or SATA cable.
- Powered by connection to the PSU.
Partition
- Partition
- Logical division of a hard disk to organize content or create separate drives.
- To boot from a hard disk.
- A primary partition is required.
- Empty space after a primary partition.
- Can be turned into an extended partition.
- Extended partitions
- Can create logical partitions.
Format
- Disk formatting.
- Prepares a data storage device like HDD, SSD, floppy disk, or USB flash drive for initial use.
- Formatting may create new file systems
File System
- A system used by an operating system or program to organize and track files.
- A hierarchical file system uses directories in a tree structure.
- Main file systems commonly in use:
- FAT 16
- FAT 32
- NTFS
- FAT.
- File Allocation Table, is used to locate files on a disk. Fat 16
- Used for old versions of Windows 95. FAT NTFS
- Used for new versions of Windows 95, 98, XP, 7. NTFS (New Technology File System)
- Used by Windows NT and XP for storing and retrieving files.
- Better than FAT 32.
- Enables file system security via NTFS permissions.
Operating Systems (OS)
- Manages all software and hardware on the computer.
- Coordinates CPU, memory, and storage access for multiple programs.
- Common desktop operating systems:
- Windows - Microsoft's main operating system. -GUI-based since 1985 with multiple versions.
- Mac OS - Apple's operating system for Macintosh computers.
- Linux - Unix-like operating system designed as a free, low-cost alternative.
- Efficient and performs well.
Computer Security (Cybersecurity)
- Protection of computer systems against theft, damage, or service interruption.
- Requires coordinated efforts and includes:
- Application security
- Information security
- Network security
- Disaster recovery/business continuity planning
- Operational security
- End-user education
- Constant evolution of security risks is a problematic element.
System Threats
- Threat
- A possible danger that exploits a vulnerability to breach security.
- Intention.
- An accidental or circumstance, competency, action, or event.
- ISO 27005
- Defines threat as a potential cause of an incident.
- Vulnerability
- Weakness that allows an attacker to reduce system's information assurance.
- Computer users can protect systems by:
- Keeping up with software security patches.
- Staying informed about vulnerabilities
- Seeking ways to protect against threats.
Malware
- Malware: Software that accesses or damages computer systems without the owner's knowledge.
- Virus creators.
- Started off writing viruses often with intentions limited to pranks.
- Early 1980s creation.
Virus
- A program that alters computer operations without user permission.
- Replicates and executes itself, often damaging the computer.
- Antivirus programs check for known threats to the types of viruses.
- A virus after successful attachment to file, or document.
- Will stay dormant until circumstances happen.
- Can not run the infected program or virus.
- Once a virus infects your computer, it can continue its execution.
- Can attack systems on the same network and is devastating and irritating.
- Stealing passwords or data:
- Spamming your email contacts.
- Logs key strokes.
- Corrupting files.
Spyware
- Malicious computer programs that hack into other systems.
- Enables cyber criminals.
- Spy on the user.
- Steal sensitive data.
- Enable backdoors.
Ransomware
- Computer is slow.
- As are pop-ups spam and frequent crashes.
- Malware scanner
- To fix corrupted file.
Trojan Horse
- Used Greek to enter the Trojan War.
- It means Greek soldiers sneak out.
- Can enable cybe-criminals to spy on you, steal your sensitive data, and.
Actions can include:
- Deleting data
- Blocking data
- Modifying day
- Copping Day
- Disrupting the performance of computers or computer networks
- Unlike computer viruses and worms.
- Trojans, Trojans are not able to self-replicate
Hackers
- Computer Expert.
- Highly Skilles capable of breaking into computers.
- Different meaning.
- Has controversial.
- Moral and ethical connotations.
- In original sense.
- Refers to person in any and hacker subcultures
Types of Hackers
- Divided into three based on illegal status.
- White Hat
- Black hat
- Gray hat
- White hackers break security for system.
- Or work for security companies
- Hackers will violate computers
- Black Hat hackers are malicious for personal gain. Computer systems for personal gain.
- Black Hat hackers is.
Hack into a computer.
- Computer system has a security defect.
Mitigating Techniques
- Increasing awareness of businesses.
- So there is protection.
- No such thing as secure and protective software.
- Training programs that teach.
- Damage being done by opening files and protecting password Automatic update.
- Software is running.
- updates are current.
- Passwords are long, numbers, and up/ lowercase.
- Protect your cyber setting for an attack surface.
- Make sure you know all the privacy and security needs for browser protection.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.