Posts

Showing posts from February, 2025

Comuter Viruses and Wrap Up Blog

  From 1971 to 1980, the first computer viruses like Creeper and Elk Cloner appeared, and the term computer virus was coined in 1983. Early viruses were simple and caused little harm. Antivirus development began in 1987 with signature-based detection, but advanced methods like heuristics and sandboxing emerged later. A firewall protects systems by blocking harmful traffic, and cryptography secures data by encoding it into unreadable formats. Computer viruses harm systems by replicating, while antivirus software uses methods like signature detection, sandboxing, and data mining. Despite these efforts, new malware like ransomware remains a challenge for detection. This blogging assignment was new to me in this course. From the beginning of the course, I searched for a few samples for what blog is and how to write in YouTube and google and found there is a way to express. So, eventually, I liked the format and concept of this course. This blogging assignment has been a valuable expe...

Print Set up and Management

    I have gathered some information from this week’s reading and videos. All of them are related to print set up and management. An inkjet printer works by spraying tiny drops of ink onto paper to form images and text, which is what the name suggests. In contrast, a laser printer uses a laser beam, which is a focused light, to print. While it may seem puzzling how light can create text and images, the process behind it is simpler than it appears. Laser printers are common, but many people don't think about how they work. There are components, like the drum, the fuser, and even static electricity, that all play a role in transforming the digital data from your computer into text and pictures printed on paper. In short, laser printers use basic scientific principles in a creative way to print documents. The article explains how the laser printing process works, from the information on your screen to the printed page. Windows 7 introduced several enhancements in print manageme...

OS and configuring email on Mobile Devices

  OS and configuring email on Mobile Devices This week, I got the opportunity to overview both operating systems iOS & Android that are used on mobile devices, enroll devices for on-premises MDM in Configuration Manager system, and analysis of configuring Email on Mobile Devices. iOS is the operating system made by Apple for iPhones and iPads. It was first released in 2007 and has been updated many times since. Each new version brings improvements like better speed, more features, and security updates. iOS has made Apple devices very popular because it is easy to use and works well with other Apple products. It also has a big app store where users can download many different apps. iOS helps Apple stay competitive in the smartphone market by offering a smooth, secure, and reliable experience. Android OS, developed by Google in 2005. It is an open-source operating system primarily used in smartphones and tablets. It has grown to dominate the global smartphone market, with o...

Tablet vs Laptop

                                                                                                 Tablet vs Laptop This week I would like to provide a very simple comparison of "Tablet vs laptop". It refers to a comparison between two different types of portable computing devices, each with its own strengths and weaknesses. The choice between a tablet and a laptop depends on what people need the device to do. It will also depend on preferences for mobility, performance, and functionality. Tablets are designed primarily for touch-based input and can be used in a more flexible way. Laptops are larger and heavier, typically designed with a keyboard and track-pad/mouse for more traditional computing. Table...

Network and Fiber Optics

  Network and Fiber Optics An IP address is a unique identifier for a device on a network. It is divided into two parts i.e. Network part and host part.   Subnetting allows a larger network to be divided into smaller, more manageable parts. The subnet mask helps determine which part of the address is for the network and which part is for the host. There are many different classes of IP addresses that are used depending on the size of the network. Subnetting allows you to create multiple smaller sub-networks within a larger one, saving IP address space. Variable Length Subnet Masks allow even more efficient use of address space by giving different subnets different sizes. Classless Interdomain Routing is another method that improves address usage by removing the traditional classes. Fiber optics is a technology used to transmit data, voice, and images through thin strands of glass. This is known as optical fibers, which are about the size of a human hair. These fibers carry...