What are two ways in which data is corrupted and explain how each can aviod?
1. Erratic operation of a computer program (errors in software code, etc.)
2. User action (turning off the computer when the application are processing or writing/saving data, improper handling of information storing media, etc).
Touch sensitive pad an input or output?
Input as your using touch to control it and to INPUT data.
Output too- Outputs data.
Where can one download funny cartoons about computers?
Funny cartoons about computers or most other subjects can be found by going to sites such as cartoonjokes or cartoonsilly. There are many other jokes available that are on facebook and linked to by people.
What is the resolution in a book?
The resolution of a story is the part of a book where everything gets solved.
It is the end of the conflict, and how it turns out.
How can networking in computer be useful in comparison to stand along computer?
With stand-alone computing, it's just you and your computer. You can access documents on your own computer and install programs from CDs. With networking, multiple computers on the network can access the same printer, share files with each other wirelessly, and play multiplayer games with each other over the network. The internet itself is also a network, so without computer networking you wouldn't even be able to be viewing this answer right now.
What allows the users to create slides for use in a presentation?
There is this site called SlideRocket (http://www.sliderocket.com) that allows you to create, manage and share slides all online. However, if you are looking for a desktop software, PowerPoint for Microsoft may be right for you.
Will magnetic fields damage hard drives?
Computer disks (hard drives or older floppy drives) store their information by creating a magnetic charge on a tiny spot of the disk for each little bit of information, which can be read again later. Passing a strong magnetic field over the disk changes the saved charge and it can't be read again as organized information.
CDs and DVDs don't store this way, so are safe from magnetic fields.
Do all computers come with dvd burners built into them?
No, not all computers come with DVD burners built into them. Although they are more common in computers today, they are sometimes an upgrade that must be purchased with a computer.
What education does a computer technologist need?
No offense, but DUH!! Wouldn't you need alot of knowledge for fixing a computer, unless your have some kind of miracle gift or what not. I think there is alot of education required for this type of career.
No offense but there is almost no level of education required to be a computer technician. In fact, I have a friend that went to school at Oxford. She has a Doctorate in English Grammar and Composition. She was an editor of computer manuals for both IBM and MICROSOFT. She said the the manuals were notoriously boorish not written well, and grammatically incorrect. She once told me that most of the computer "greats," have no formal education at all. Some of them attended private schools in England and Wales. Some of them went on to college, but not all. There is no national accreditation in the USA or in Europe. As a techie no one knows what you are doing and you can claim anything. My Doctor (LIT) friend moved to the USA and it was no different. Many techies claim college, but when you begin asking them if they took Calculus or Differential Equations, they start getting all Smokey and begin stuttering and stammering. Of course some of the ones that have college degrees in Computer Engineering of went to college. Then the question is how many times were they
allowed to take each of their courses like linear algebra, circuit engineering , and systems analysis, and so forth? Did they attend prep school or private school where they were spoon fed the answers? Did they have tutors and what college did they go to Georgia Tech, MIT or Princeton?
How do you get your parent to get a new computer?
Take notes of how long she use the computer let her know she uses more - unfair.
If the reason you need to use the computer is for school, you can't lose - simply ask.
Remind her of a more important things to do.
What protocol makes a connection checks whether the data is received and resends it if it is not?
Remember that all communication on a network happens by way of packets delivered from one location on the network to another. In TCP/IP, the protocol that guarantees packet delivery is TCP (Transmission Control Protocol). TCP makes a connection, checks whether the data is received, and resends it if is not.
What port connects up to 127 devices?
USB Will allow up to 127 devices per host controller. Usually, a host controller has more than one USB port. The host controller will only allow 127 devices in total (including hubs), so you can not have 127 per port.
Computers can be used almost anywhere. They have been used in space, on Mount Everest, and in submarines.
Examples on how computers changed the world?
Made communication MUCH faster than before!
Now everyone can do stuff like publish and receive various types of information via the internet.
Hope this helps (:
What are the typical threats that a computer user can encounter when using the internets?
We are living in a digital world, were computers are not just an ordinary thing anymore but a "necessity" to our everyday lives. Most of us only knew a little about computer security threats, the most common were "virus" and "worm".
But did you know that there are 34 different types of Computer Security Threats?
Spam
Spam, or unsolicited commercial e-mail, may seem like the least of Internet security threats, but it really robs people of their time in having to constantly clean out the junk in their in-boxes. The other serious problem with spam is that it brings in viruses through attachments and tricks people into going to malicious websites. Spam can be a gateway to more severe threats.
Viruses
Viruses can come from email, websites, discs and other computers. Viruses come in many types and strengths. A virus can be a program that simply causes your computer to slow down, or it can totally wreak havoc on your computer system, forcing you to reformat your computer. The best way to avoid viruses is to avoid downloading software that you are unsure about. Viruses can work to immediately disable or control your computer, or they may wait for a certain date to activate. Most antivirus software can prevent viruses quite easily.
Adware/Malware
Malware means malicious software. It is code that installs itself on your computer without your ever knowing how you got it or where it came from. Malware may simply slow your computer down by reporting to other websites what you are doing, such as which websites you are visiting, or it can cause unending pop-up ads. Malware can be used to steal personal information, or it can completely take over your computer. Many programs are aimed at stopping and removing malware, similar to the way antivirus software works.
DOS Attacks
Denial-of-service attacks are among the most serious Internet threats. Remote computers will take control of many computers on the Internet through viruses or malware and direct all of those computers' resources toward using all the resources of a website or database or an organization's infrastructure. The draw all at once on a system makes it come to a stop.
Information Theft
The silent security threat of the Internet is information theft. Many people already know that identity theft is a serious problem, but identity theft is done easily online. Criminals hack in to large databases of consumer information to steal your identity, but individual information can also be stolen from your computer when you get infected with a virus or malware. Your bank account number and passwords can be stolen from you as they are transmitted online.
Boot Sector Viruses
Boot sector viruses spread by modifying the program that enables your
computer to start up.
When you switch on a computer, the hardware looks for the boot sector program -
which is usually on the hard disk, but can be on a floppy disk or CD - and runs it. This
program then loads the rest of the operating system into memory.
A boot sector virus replaces the original boot sector with its own, modified version (and
usually hides the original somewhere else on the hard disk). When you next start up,
the infected boot sector is used and the virus becomes active.
You can only become infected if you boot up your computer from an infected disk, e.g.
a floppy disk that has an infected boot sector.
Boot sector viruses were the first type of virus to appear, and they are mostly quite old.
They are rarely encountered today.
Bluesnarfing
Bluesnarfing is the theft of data from a Bluetooth phone.
Like Bluejacking, Bluesnarfing depends on the ability of Bluetooth-enabled devices to
detect and contact others nearby.
In theory, a Bluetooth user running the right software on their laptop can discover a
nearby phone, connect to it without your confirmation, and download your phonebook,
pictures of contacts and calendar.
Your mobile phone's serial number can also be downloaded and used to clone the
phone.You should turn off Bluetooth or set it to "undiscoverable". The undiscoverable setting
allows you to continue using Bluetooth products like headsets, but means that your
phone is not visible to others.
backdoor Trojan
A backdoor Trojan allows someone to take control of another user's
computer via the internet without their permission.
A backdoor Trojan may pose as legitimate software, just as other Trojan horse programs
do, so that users run it. Alternatively - as is now increasingly common - users may
allow Trojans onto their computer by following a link in spam mail.
Once the Trojan is run, it adds itself to the computer's startup routine. It can then
monitor the computer until the user is connected to the internet. When the computer
goes online, the person who sent the Trojan can perform many actions - for example,
run programs on the infected computer, access personal files, modify and upload files,
track the user's keystrokes, or send out spam mail.
What is the main components of a kernel?
What is a limitation of a cd-r drive that isnt an issue with a cd-rw drive?
CD-R isn't rewritable at all. A CD-RW can be rewritten on.
How can you get a picture of a computer?
I'm not exactly sure what you are asking, but here are some possible answers:
Does a dishwasher have an embedded computer?
This mostly depends on the kind of dish washing machine you own and what you consider a 'computer'.
If its an older machine, its quite possible that the machine 'logical' or controlling device is mechanical working off of timers, springs etc. It could be argued this does 'compute' (the first computer ever made by Babbage was mechanical) however in the modern sense (or in my opinion), a computer is a device that contains some sort of centralized processing unit (CPU) that does the complicated math/'thinking' for other functional devices that actually perform tasks. When a device can be programmed to perform/control multiple tasks, you're in the realm of computer.
Today, many appliances from your fridge to your dishwasher do have a computer of some sort in them. Lots of appliances actually run stripped down versions of Linux, a popular open source operating system like Windows on your own computer. So if your dishwasher is relatively new, theres a very good chance it has, or essentially is a computer with an aquatic device attached to it that it controls.
Sorry if this means you lost a bet.
How do you upload photos to your computer from your phone?
its easy realy
just plug in your phone's usb wire in to the computers usb box.
on your phone it should say somthing like usb connected or something like that
then wait a few mins and open my computer and there should be something like
removable drive or software. click on that and you should be able to copy and paste your pictures onto you documents and then upload them onto the site you want
hope i have been some help
Rosie
Software is a product. Its development and maintenance cost considerable amounts to keep that application bug free and fit for purpose. The developing companies invest huge sums marketing etc and to ensure that their product is not copied and passed on lock it with a code (key). The people that freely pass around software with access codes and keep the original are in breach of copyright and are also stealing the software as its not purchased. Many companies have a basic rule of thumb that some software can be placed on to another machine BUT only if the first machine is not using the software at the same time. Case of this is a package used in the office with copy at home. Therefore one or other in use but not together. If there is a need for both to be active then a separate licence is required. The police would not let you use you car tax on your car and loan that to a friend when they want to go shopping....
Some companies allow freeware in to the public domain - This may have a registration but it can be re-registed if passed to another person by that new owner. Software is like any other commodity - its there to make profit.