SlideShare a Scribd company logo
1 of 27
1
Dhaka International University
Department of Political Science
Course Name: Basics of Computer
Course No: 0611.1.1.01
Submitted To
Suman Ahmed Saikan
Lecturer
Department of CSE
Dhaka International University-DIU
Batch: 19th& 20th Semester: 2nd
CPU,Malware,Virus,Email,DNS
February 1, 2024
CPU
Central Processing Unit (CPU) consists of the
following features −
 CPU is considered as the brain of the computer.
 CPU performs all types of data processing operations.
 It stores data, intermediate results, and instructions (program).
 It controls the operation of all parts of the computer.
2
CPU
CPU itself has following three components.
 Memory or Storage Unit
 Control Unit
 ALU(Arithmetic Logic Unit)
3
MEMORY OR STORAGE UNIT
 It stores all the data and the instructions required for
processing.
 It stores intermediate results of processing.
 It stores the final results of processing before these results
are released to an output device.
 All inputs and outputs are transmitted through the main
memory.
4
CONTROL UNIT
 It is responsible for controlling the transfer of data and
instructions among other units of a computer.
 It manages and coordinates all the units of the computer.
 It obtains the instructions from the memory, interprets
them, and directs the operation of the computer.
 It communicates with Input/Output devices for transfer of
data or results from storage.
 It does not process or store data.
5
ALU (ARITHMETIC LOGIC UNIT)
Arithmetic Section
Function of arithmetic section is to perform arithmetic operations
like addition, subtraction, multiplication, and division. All
complex operations are done by making repetitive use of the
above operations.
Logic Section
Function of logic section is to perform logic operations such as
comparing, selecting, matching, and merging of data.
6
DIFFERENCE BETWEEN INTERNET, INTRANET AND
EXTRANET
1. Internet :
The network formed by the co-operative interconnection of millions of
computers, linked together is called Internet. Internet comprises of :
 People : People use and develop the network.
 Resources : A collection of resources that can be reached from those
networks.
 A setup for collaboration : It includes the member of the research and
educational committees worldwide.
2. Intranet :
It is an internal private network built within an organization using
Internet and World Wide Web standards and products that allows
employees of an organization to gain access to corporate information.
3. Extranet :
It is the type of network that allows users from outside to access the
Intranet of an organization.
7
DIFFERENCE BETWEEN INTERNET, INTRANET AND
EXTRANET
8
MALICIOUS SOFTWARE(MALWARE)
1. Ransomware
Ransomware is software that uses encryption to disable a target’s
access to its data until a ransom is paid.
Example: RobbinHood
2. Fileless Malware
Fileless malware doesn’t install anything initially, instead, it
makes changes to files that are native to the operating system,
such as PowerShell or WMI.
Example: Astaroth
3. Spyware
Spyware collects information about users’ activities without their
knowledge or consent.
Example: Dark Hotel 9
MALICIOUS SOFTWARE(MALWARE)
4. Adware
Serves unwanted advertisements.
Example: Fire Ball
5. Trojan Horse
A Trojan disguises itself as desirable code or software. Once
downloaded by unsuspecting users, the Trojan can take control
of victims’ systems for malicious purposes.
Example: Emotet
6. Worms
Spreads through a network by replicating itself.
Example: Stuxnet
10
MALICIOUS SOFTWARE(MALWARE)
7. Rootkits
Gives hackers remote control of a victim's device.
Example: Zacinlo
8. Key Loggers
A keylogger is a type of spyware that monitors user activity.
Example: Olympic Vision
11
VIRUS
Computer virus refers to a program which damages computer
systems and/or destroys or erases data files. A computer
virus is a malicious program that self-replicates by copying
itself to another program.
Symptoms:
 Letter looks like they are falling to the bottom of the screen.
 The computer system becomes slow.
 The size of available free memory reduces.
 The hard disk runs out of space.
 The computer does not boot.
12
8 TYPES OF VIRUS
13
SPREADSHEET SOFTWARE
A spreadsheet is a computer program that can capture, display
and manipulate data arranged in rows and columns.
Example:
1. Microsoft Excel
2. Google Sheets
3. Apple Numbers
4. Zoho Sheet
5. Libre Office
6. Quip
14
THE EXCEL DOMAIN AND THE ALTERNATIVE
SPREADSHEETS
15
PRESENTATION SOFTWARE
Presentation software, also known as graphics presentation
applications or presentation graphics programs, is a category of
software used to create content where information is often
represented in a graphical or visual way.
Example:
1. Microsoft PowerPoint
2. Google Slides
3. Prezi
4. Canva
5. Powtoon
6. Keynote
7. Adobe Express 16
PRESENTATION SOFTWARE
17
WORD PROCESSOR SOFTWARE
A word processor is a device or software program capable
of creating, storing, and printing text documents. It allows
users to write and modify text, display it on a screen,
save it electronically, and print it out.
Example:
1. Microsoft Word
2. Google Docs
3. Zoho Docs
4. Libre Office
5. Word Perfect
6. Ragtime
7. Scrivener 18
WORD PROCESSOR SOFTWARE
19
EMAIL
Definition: Electronic mail, commonly shortened to “email,” is a
communication method that uses electronic devices to deliver
messages across computer networks.
An Email consists of four things:-
Username - The first part of an email address is the username. This is the
unique name that you or your ISP select. This can be your real name or
a nickname. Businesses may use themed usernames or their company’s
legal name.
@ Symbol - An “at,” or “@,” symbol is the second part of an email
address. This fits in between the username and the domain of your
email address.
Domain - The mail server is the server hosting the email account. The
top-level domain is the extension, such as .com, .net or .info.
Considerations - When you sign up for an email account, whether its free
or paid, you’re prompted first to select a username. Consider your
username carefully, especially if you plan on using your email account
to send professional emails.
20
EMAIL
Parts of Email Address:
21
Saikan1011@gmail.com
Username Symbol Domain
Mail Server
EMAIL
Spam Folder: The main purpose of a spam folder is to send all
your unwanted emails (internet junk mail) to a designated area.
The spam folder keeps the junk mail out of sight so it doesn’t
clutter your busy inbox.
Trash Folder: If you delete an email from your inbox, it will
initially be put into the Trash folder. The email will only be
permanently deleted if you delete it in the Trash folder or
empty the trash, or if the email's storage time has expired.
Permanently deleted email cannot be recovered.
22
INTERNET
Advantages of the Internet:
1. Information, knowledge, and learning
2. Connectivity, communication, and sharing
3. Anonymity and making people equal
4. Address, mapping, and contact information
5. Banking, bills, and shopping
6. Selling and making money
7. Collaboration, work from home, and access to a global
workforce
8. Donations and funding
9. Internet of Things
10. Cloud computing and cloud storage 23
INTERNET
Disadvantages of the Internet:
1. Addiction, time-waster, and causes distractions
2. Bullying, trolls, stalkers, and crime
3. Spam and advertising
4. Pornographic and violent image
5. Never being able to disconnect from work
6. Identity theft, hacking, viruses, and cheating
7. Affects focus and patience
8. Depression, loneliness, and social isolation
9. Buying things that you don't need
10. Not a safe place for children
24
WWW(WORLD WIDE WEB)
World Wide Web, which is also known as a Web, is a
collection of websites or web pages stored in web
servers and connected to local computers through the
internet.
URL (Uniform Resource Locator)
A Uniform Resource Locator (URL), otherwise known as a
Universal Resource Locator, is the address of a resource
on the Internet and the protocol used to access it.
It indicates the location of a web resource like a street
address indicates where a person lives physically —
because of this, an URL is often referred to as: “web
address”.
25
DOMAIN NAME AND IPADDRESS
26
A domain name is nothing but a textual version of
the IP address, this is the number which points to a
specific website.
27

More Related Content

Similar to Basics of Computer(Malware,CPU,Virus,Software,DNS)

Basic computer fundamentals
Basic computer fundamentalsBasic computer fundamentals
Basic computer fundamentalsJames Macalalad
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitionersDanny Doobay
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.angelaag98
 
A day that will be remembered
A day that will be rememberedA day that will be remembered
A day that will be rememberedwolverine0614
 
IT infrastructure and network technologies by Mark John Lado
IT infrastructure and network technologies by Mark John Lado IT infrastructure and network technologies by Mark John Lado
IT infrastructure and network technologies by Mark John Lado Mark John Lado, MIT
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionHannah323676
 
SECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxSECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxCabdullhiY
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxAmardeepKumar621436
 

Similar to Basics of Computer(Malware,CPU,Virus,Software,DNS) (20)

Basic computer fundamentals
Basic computer fundamentalsBasic computer fundamentals
Basic computer fundamentals
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitioners
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
It advance 2016
It advance 2016It advance 2016
It advance 2016
 
A day that will be remembered
A day that will be rememberedA day that will be remembered
A day that will be remembered
 
Linux
LinuxLinux
Linux
 
Bab1
Bab1Bab1
Bab1
 
Computer networking
Computer networking Computer networking
Computer networking
 
IT infrastructure and network technologies by Mark John Lado
IT infrastructure and network technologies by Mark John Lado IT infrastructure and network technologies by Mark John Lado
IT infrastructure and network technologies by Mark John Lado
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
anh.docx
anh.docxanh.docx
anh.docx
 
I.T Security Threats
I.T Security ThreatsI.T Security Threats
I.T Security Threats
 
SECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxSECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptx
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptx
 

More from Suman Mia

Computer Network Topology By Team_Initiator (Dept . of Sociology)
Computer Network Topology By Team_Initiator (Dept . of Sociology)Computer Network Topology By Team_Initiator (Dept . of Sociology)
Computer Network Topology By Team_Initiator (Dept . of Sociology)Suman Mia
 
Computer Network Topology By Team_Diversity Detectives (Dept . of Sociology)
Computer Network Topology By Team_Diversity Detectives (Dept . of Sociology)Computer Network Topology By Team_Diversity Detectives (Dept . of Sociology)
Computer Network Topology By Team_Diversity Detectives (Dept . of Sociology)Suman Mia
 
Computer Network Topology By Team_Societal Explorers (Dept . of Sociology)
Computer Network Topology By Team_Societal Explorers (Dept . of Sociology)Computer Network Topology By Team_Societal Explorers (Dept . of Sociology)
Computer Network Topology By Team_Societal Explorers (Dept . of Sociology)Suman Mia
 
Computer Network Topology By Team_Social Dynamic Squad (Dept . of Sociology)
Computer Network Topology By Team_Social Dynamic Squad (Dept . of Sociology)Computer Network Topology By Team_Social Dynamic Squad (Dept . of Sociology)
Computer Network Topology By Team_Social Dynamic Squad (Dept . of Sociology)Suman Mia
 
Computer Network Topology By Team_Inclusion Inquiry Initiative (Dept . of Soc...
Computer Network Topology By Team_Inclusion Inquiry Initiative (Dept . of Soc...Computer Network Topology By Team_Inclusion Inquiry Initiative (Dept . of Soc...
Computer Network Topology By Team_Inclusion Inquiry Initiative (Dept . of Soc...Suman Mia
 
Computer Network Topology By Team_Culture Crusade (Dept . of Sociology)
Computer Network Topology By Team_Culture Crusade (Dept . of Sociology)Computer Network Topology By Team_Culture Crusade (Dept . of Sociology)
Computer Network Topology By Team_Culture Crusade (Dept . of Sociology)Suman Mia
 
Computer Network Topology By Team_Community Connectors (Dept . of Sociology)
Computer Network Topology By Team_Community Connectors (Dept . of Sociology)Computer Network Topology By Team_Community Connectors (Dept . of Sociology)
Computer Network Topology By Team_Community Connectors (Dept . of Sociology)Suman Mia
 
Computer Network Topology By Team_Empowerment Ensemble (Dept . of Sociology)
Computer Network Topology By Team_Empowerment Ensemble (Dept . of Sociology)Computer Network Topology By Team_Empowerment Ensemble (Dept . of Sociology)
Computer Network Topology By Team_Empowerment Ensemble (Dept . of Sociology)Suman Mia
 
Computer Network Topology By Team_Venus(Dept. English)
Computer Network Topology By Team_Venus(Dept. English)Computer Network Topology By Team_Venus(Dept. English)
Computer Network Topology By Team_Venus(Dept. English)Suman Mia
 
Computer Network Topology By Team_Triangle(Dept. English)
Computer Network Topology By Team_Triangle(Dept. English)Computer Network Topology By Team_Triangle(Dept. English)
Computer Network Topology By Team_Triangle(Dept. English)Suman Mia
 
Computer Network Topology By Team_Royal (Dept. English)
Computer Network Topology By Team_Royal (Dept. English)Computer Network Topology By Team_Royal (Dept. English)
Computer Network Topology By Team_Royal (Dept. English)Suman Mia
 
Computer Network Topology By Team_Sanam (Dept. English)
Computer Network Topology By Team_Sanam (Dept. English)Computer Network Topology By Team_Sanam (Dept. English)
Computer Network Topology By Team_Sanam (Dept. English)Suman Mia
 
Computer Network Topology By Team_Purple (Dept. English)
Computer Network Topology By Team_Purple (Dept. English)Computer Network Topology By Team_Purple (Dept. English)
Computer Network Topology By Team_Purple (Dept. English)Suman Mia
 
Computer Network Topology By Team_ Paramount (Dept. English)
Computer Network Topology By Team_ Paramount (Dept. English)Computer Network Topology By Team_ Paramount (Dept. English)
Computer Network Topology By Team_ Paramount (Dept. English)Suman Mia
 
Computer Network Topology By Team_Metrolife(Dept. English)
Computer Network Topology By Team_Metrolife(Dept. English)Computer Network Topology By Team_Metrolife(Dept. English)
Computer Network Topology By Team_Metrolife(Dept. English)Suman Mia
 
Computer Network Topology By Team_Meghna (Dept. English)
Computer Network Topology By Team_Meghna (Dept. English)Computer Network Topology By Team_Meghna (Dept. English)
Computer Network Topology By Team_Meghna (Dept. English)Suman Mia
 
Computer Network Topology By Team_Jamuna (Dept. English)
Computer Network Topology By Team_Jamuna (Dept. English)Computer Network Topology By Team_Jamuna (Dept. English)
Computer Network Topology By Team_Jamuna (Dept. English)Suman Mia
 
Computer Network Topology By Team_CSK (Dept. English)
Computer Network Topology By Team_CSK (Dept. English)Computer Network Topology By Team_CSK (Dept. English)
Computer Network Topology By Team_CSK (Dept. English)Suman Mia
 
COmputer Network Topology By Team Gemini
COmputer Network Topology By Team GeminiCOmputer Network Topology By Team Gemini
COmputer Network Topology By Team GeminiSuman Mia
 
Software Development Life Cycle(SDLC) By Team Hunter (Dept. of Pharmacy)
Software Development Life Cycle(SDLC) By Team Hunter (Dept. of Pharmacy)Software Development Life Cycle(SDLC) By Team Hunter (Dept. of Pharmacy)
Software Development Life Cycle(SDLC) By Team Hunter (Dept. of Pharmacy)Suman Mia
 

More from Suman Mia (20)

Computer Network Topology By Team_Initiator (Dept . of Sociology)
Computer Network Topology By Team_Initiator (Dept . of Sociology)Computer Network Topology By Team_Initiator (Dept . of Sociology)
Computer Network Topology By Team_Initiator (Dept . of Sociology)
 
Computer Network Topology By Team_Diversity Detectives (Dept . of Sociology)
Computer Network Topology By Team_Diversity Detectives (Dept . of Sociology)Computer Network Topology By Team_Diversity Detectives (Dept . of Sociology)
Computer Network Topology By Team_Diversity Detectives (Dept . of Sociology)
 
Computer Network Topology By Team_Societal Explorers (Dept . of Sociology)
Computer Network Topology By Team_Societal Explorers (Dept . of Sociology)Computer Network Topology By Team_Societal Explorers (Dept . of Sociology)
Computer Network Topology By Team_Societal Explorers (Dept . of Sociology)
 
Computer Network Topology By Team_Social Dynamic Squad (Dept . of Sociology)
Computer Network Topology By Team_Social Dynamic Squad (Dept . of Sociology)Computer Network Topology By Team_Social Dynamic Squad (Dept . of Sociology)
Computer Network Topology By Team_Social Dynamic Squad (Dept . of Sociology)
 
Computer Network Topology By Team_Inclusion Inquiry Initiative (Dept . of Soc...
Computer Network Topology By Team_Inclusion Inquiry Initiative (Dept . of Soc...Computer Network Topology By Team_Inclusion Inquiry Initiative (Dept . of Soc...
Computer Network Topology By Team_Inclusion Inquiry Initiative (Dept . of Soc...
 
Computer Network Topology By Team_Culture Crusade (Dept . of Sociology)
Computer Network Topology By Team_Culture Crusade (Dept . of Sociology)Computer Network Topology By Team_Culture Crusade (Dept . of Sociology)
Computer Network Topology By Team_Culture Crusade (Dept . of Sociology)
 
Computer Network Topology By Team_Community Connectors (Dept . of Sociology)
Computer Network Topology By Team_Community Connectors (Dept . of Sociology)Computer Network Topology By Team_Community Connectors (Dept . of Sociology)
Computer Network Topology By Team_Community Connectors (Dept . of Sociology)
 
Computer Network Topology By Team_Empowerment Ensemble (Dept . of Sociology)
Computer Network Topology By Team_Empowerment Ensemble (Dept . of Sociology)Computer Network Topology By Team_Empowerment Ensemble (Dept . of Sociology)
Computer Network Topology By Team_Empowerment Ensemble (Dept . of Sociology)
 
Computer Network Topology By Team_Venus(Dept. English)
Computer Network Topology By Team_Venus(Dept. English)Computer Network Topology By Team_Venus(Dept. English)
Computer Network Topology By Team_Venus(Dept. English)
 
Computer Network Topology By Team_Triangle(Dept. English)
Computer Network Topology By Team_Triangle(Dept. English)Computer Network Topology By Team_Triangle(Dept. English)
Computer Network Topology By Team_Triangle(Dept. English)
 
Computer Network Topology By Team_Royal (Dept. English)
Computer Network Topology By Team_Royal (Dept. English)Computer Network Topology By Team_Royal (Dept. English)
Computer Network Topology By Team_Royal (Dept. English)
 
Computer Network Topology By Team_Sanam (Dept. English)
Computer Network Topology By Team_Sanam (Dept. English)Computer Network Topology By Team_Sanam (Dept. English)
Computer Network Topology By Team_Sanam (Dept. English)
 
Computer Network Topology By Team_Purple (Dept. English)
Computer Network Topology By Team_Purple (Dept. English)Computer Network Topology By Team_Purple (Dept. English)
Computer Network Topology By Team_Purple (Dept. English)
 
Computer Network Topology By Team_ Paramount (Dept. English)
Computer Network Topology By Team_ Paramount (Dept. English)Computer Network Topology By Team_ Paramount (Dept. English)
Computer Network Topology By Team_ Paramount (Dept. English)
 
Computer Network Topology By Team_Metrolife(Dept. English)
Computer Network Topology By Team_Metrolife(Dept. English)Computer Network Topology By Team_Metrolife(Dept. English)
Computer Network Topology By Team_Metrolife(Dept. English)
 
Computer Network Topology By Team_Meghna (Dept. English)
Computer Network Topology By Team_Meghna (Dept. English)Computer Network Topology By Team_Meghna (Dept. English)
Computer Network Topology By Team_Meghna (Dept. English)
 
Computer Network Topology By Team_Jamuna (Dept. English)
Computer Network Topology By Team_Jamuna (Dept. English)Computer Network Topology By Team_Jamuna (Dept. English)
Computer Network Topology By Team_Jamuna (Dept. English)
 
Computer Network Topology By Team_CSK (Dept. English)
Computer Network Topology By Team_CSK (Dept. English)Computer Network Topology By Team_CSK (Dept. English)
Computer Network Topology By Team_CSK (Dept. English)
 
COmputer Network Topology By Team Gemini
COmputer Network Topology By Team GeminiCOmputer Network Topology By Team Gemini
COmputer Network Topology By Team Gemini
 
Software Development Life Cycle(SDLC) By Team Hunter (Dept. of Pharmacy)
Software Development Life Cycle(SDLC) By Team Hunter (Dept. of Pharmacy)Software Development Life Cycle(SDLC) By Team Hunter (Dept. of Pharmacy)
Software Development Life Cycle(SDLC) By Team Hunter (Dept. of Pharmacy)
 

Recently uploaded

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 

Recently uploaded (20)

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 

Basics of Computer(Malware,CPU,Virus,Software,DNS)

  • 1. 1 Dhaka International University Department of Political Science Course Name: Basics of Computer Course No: 0611.1.1.01 Submitted To Suman Ahmed Saikan Lecturer Department of CSE Dhaka International University-DIU Batch: 19th& 20th Semester: 2nd CPU,Malware,Virus,Email,DNS February 1, 2024
  • 2. CPU Central Processing Unit (CPU) consists of the following features −  CPU is considered as the brain of the computer.  CPU performs all types of data processing operations.  It stores data, intermediate results, and instructions (program).  It controls the operation of all parts of the computer. 2
  • 3. CPU CPU itself has following three components.  Memory or Storage Unit  Control Unit  ALU(Arithmetic Logic Unit) 3
  • 4. MEMORY OR STORAGE UNIT  It stores all the data and the instructions required for processing.  It stores intermediate results of processing.  It stores the final results of processing before these results are released to an output device.  All inputs and outputs are transmitted through the main memory. 4
  • 5. CONTROL UNIT  It is responsible for controlling the transfer of data and instructions among other units of a computer.  It manages and coordinates all the units of the computer.  It obtains the instructions from the memory, interprets them, and directs the operation of the computer.  It communicates with Input/Output devices for transfer of data or results from storage.  It does not process or store data. 5
  • 6. ALU (ARITHMETIC LOGIC UNIT) Arithmetic Section Function of arithmetic section is to perform arithmetic operations like addition, subtraction, multiplication, and division. All complex operations are done by making repetitive use of the above operations. Logic Section Function of logic section is to perform logic operations such as comparing, selecting, matching, and merging of data. 6
  • 7. DIFFERENCE BETWEEN INTERNET, INTRANET AND EXTRANET 1. Internet : The network formed by the co-operative interconnection of millions of computers, linked together is called Internet. Internet comprises of :  People : People use and develop the network.  Resources : A collection of resources that can be reached from those networks.  A setup for collaboration : It includes the member of the research and educational committees worldwide. 2. Intranet : It is an internal private network built within an organization using Internet and World Wide Web standards and products that allows employees of an organization to gain access to corporate information. 3. Extranet : It is the type of network that allows users from outside to access the Intranet of an organization. 7
  • 8. DIFFERENCE BETWEEN INTERNET, INTRANET AND EXTRANET 8
  • 9. MALICIOUS SOFTWARE(MALWARE) 1. Ransomware Ransomware is software that uses encryption to disable a target’s access to its data until a ransom is paid. Example: RobbinHood 2. Fileless Malware Fileless malware doesn’t install anything initially, instead, it makes changes to files that are native to the operating system, such as PowerShell or WMI. Example: Astaroth 3. Spyware Spyware collects information about users’ activities without their knowledge or consent. Example: Dark Hotel 9
  • 10. MALICIOUS SOFTWARE(MALWARE) 4. Adware Serves unwanted advertisements. Example: Fire Ball 5. Trojan Horse A Trojan disguises itself as desirable code or software. Once downloaded by unsuspecting users, the Trojan can take control of victims’ systems for malicious purposes. Example: Emotet 6. Worms Spreads through a network by replicating itself. Example: Stuxnet 10
  • 11. MALICIOUS SOFTWARE(MALWARE) 7. Rootkits Gives hackers remote control of a victim's device. Example: Zacinlo 8. Key Loggers A keylogger is a type of spyware that monitors user activity. Example: Olympic Vision 11
  • 12. VIRUS Computer virus refers to a program which damages computer systems and/or destroys or erases data files. A computer virus is a malicious program that self-replicates by copying itself to another program. Symptoms:  Letter looks like they are falling to the bottom of the screen.  The computer system becomes slow.  The size of available free memory reduces.  The hard disk runs out of space.  The computer does not boot. 12
  • 13. 8 TYPES OF VIRUS 13
  • 14. SPREADSHEET SOFTWARE A spreadsheet is a computer program that can capture, display and manipulate data arranged in rows and columns. Example: 1. Microsoft Excel 2. Google Sheets 3. Apple Numbers 4. Zoho Sheet 5. Libre Office 6. Quip 14
  • 15. THE EXCEL DOMAIN AND THE ALTERNATIVE SPREADSHEETS 15
  • 16. PRESENTATION SOFTWARE Presentation software, also known as graphics presentation applications or presentation graphics programs, is a category of software used to create content where information is often represented in a graphical or visual way. Example: 1. Microsoft PowerPoint 2. Google Slides 3. Prezi 4. Canva 5. Powtoon 6. Keynote 7. Adobe Express 16
  • 18. WORD PROCESSOR SOFTWARE A word processor is a device or software program capable of creating, storing, and printing text documents. It allows users to write and modify text, display it on a screen, save it electronically, and print it out. Example: 1. Microsoft Word 2. Google Docs 3. Zoho Docs 4. Libre Office 5. Word Perfect 6. Ragtime 7. Scrivener 18
  • 20. EMAIL Definition: Electronic mail, commonly shortened to “email,” is a communication method that uses electronic devices to deliver messages across computer networks. An Email consists of four things:- Username - The first part of an email address is the username. This is the unique name that you or your ISP select. This can be your real name or a nickname. Businesses may use themed usernames or their company’s legal name. @ Symbol - An “at,” or “@,” symbol is the second part of an email address. This fits in between the username and the domain of your email address. Domain - The mail server is the server hosting the email account. The top-level domain is the extension, such as .com, .net or .info. Considerations - When you sign up for an email account, whether its free or paid, you’re prompted first to select a username. Consider your username carefully, especially if you plan on using your email account to send professional emails. 20
  • 21. EMAIL Parts of Email Address: 21 Saikan1011@gmail.com Username Symbol Domain Mail Server
  • 22. EMAIL Spam Folder: The main purpose of a spam folder is to send all your unwanted emails (internet junk mail) to a designated area. The spam folder keeps the junk mail out of sight so it doesn’t clutter your busy inbox. Trash Folder: If you delete an email from your inbox, it will initially be put into the Trash folder. The email will only be permanently deleted if you delete it in the Trash folder or empty the trash, or if the email's storage time has expired. Permanently deleted email cannot be recovered. 22
  • 23. INTERNET Advantages of the Internet: 1. Information, knowledge, and learning 2. Connectivity, communication, and sharing 3. Anonymity and making people equal 4. Address, mapping, and contact information 5. Banking, bills, and shopping 6. Selling and making money 7. Collaboration, work from home, and access to a global workforce 8. Donations and funding 9. Internet of Things 10. Cloud computing and cloud storage 23
  • 24. INTERNET Disadvantages of the Internet: 1. Addiction, time-waster, and causes distractions 2. Bullying, trolls, stalkers, and crime 3. Spam and advertising 4. Pornographic and violent image 5. Never being able to disconnect from work 6. Identity theft, hacking, viruses, and cheating 7. Affects focus and patience 8. Depression, loneliness, and social isolation 9. Buying things that you don't need 10. Not a safe place for children 24
  • 25. WWW(WORLD WIDE WEB) World Wide Web, which is also known as a Web, is a collection of websites or web pages stored in web servers and connected to local computers through the internet. URL (Uniform Resource Locator) A Uniform Resource Locator (URL), otherwise known as a Universal Resource Locator, is the address of a resource on the Internet and the protocol used to access it. It indicates the location of a web resource like a street address indicates where a person lives physically — because of this, an URL is often referred to as: “web address”. 25
  • 26. DOMAIN NAME AND IPADDRESS 26 A domain name is nothing but a textual version of the IP address, this is the number which points to a specific website.
  • 27. 27