Lecture 2
Lecture 2
University of Sulaimani
College of Pharmacy
First Stage
First Semester
Computer Skills
2023-2024
1
Computer Types (1 of 4)
1- Supercomputer
The most powerful computers in terms of
performance and data processing are the
Supercomputers. These are specialized and task
specific computers used by large organizations.
These computers are used for research and
exploration purposes, like NASA uses
supercomputers for launching space shuttles,
controlling them and for space exploration
purpose.
2
1
11/12/2023
Computer Types (2 of 4)
2- Mainframe computer
Although Mainframes are not as powerful as
supercomputers, but certainly they are quite
expensive nonetheless, and many large firms &
government organizations uses Mainframes to run
their business operations. The Mainframe
computers can be accommodated in large air-
conditioned rooms because of its size. Super-
computers are the fastest computers with large data
storage capacity, Mainframes can also process &
store large amount of data. Banks educational
institutions & insurance companies use mainframe
computers to store data about their customers,
students & insurance policy holders.
3
Computer Types (3 of 4)
3- Minicomputer
2
11/12/2023
Computer Types (4 of 4)
4- Microcomputer
Desktop computers, laptops, personal digital
assistant (PDA), tablets & smartphones are all
types of microcomputers. The micro-computers are
widely used & the fastest growing computers.
These computers are the cheapest among the other
three types of computers. The Micro-computers are Desktop PC
specially designed for general usage like
entertainment, education and work purposes. Well
known manufacturers of Micro-computer are Dell,
Apple, Samsung, Sony & Toshiba.
Laptop PC (Notebook)
5
3
11/12/2023
Computer Network
What is a Computer Network?
A computer network is defined as the interconnection of two or more
computers. It is done to enable the computers to communicate and share
available resources.
Components:
i. Two or more computers
ii. Cables or (external antenna) as links between the computers
iii. A network interfacing card(NIC) on each computer
iv. Switches
v. Software called operating system(OS) 8
4
11/12/2023
UTP Cable
Networking Cables
Switch
Network Benefits
Sharing
Connectivity
Increased speed
Reduced cost
Improved security
Centralized software managements
Electronic mail
Flexible access
Disadvantages:
High cost of installation
Requires time for administration
Failure of server
Cable faults
10
5
11/12/2023
11
Classification by Area (1 of 3)
1- Local Area Network(LAN)
• LAN is a network which is designed to operate over a small physical
area such as an office, factory or a group of buildings.
• LAN’s are easy to design and troubleshoot
• Exchange of information and sharing of resources becomes easy
because of LAN.
• In LAN all machines are connected to a single cable.
• Different types of topologies such as star, tree, bus, ring, etc Can be used
• It is usually a privately owned network.
12
6
11/12/2023
Classification by Area (2 of 3)
2- Wide Area Network(WAN)
• When network spans over a large distance or when the computers to be
connected to each other are at widely separated locations a local area
network cannot be used. A wide area network(WAN) is installed.
• The communication between different users of WAN is established
using leased telephone lines, satellite links and similar channels.
• It is cheaper and more efficient to use the phone network for the link.
• Most WAN networks are used to transfer large blocks of data between
its users.
13
Classification by Area (3 of 3)
14
7
11/12/2023
15
8
11/12/2023
17
18
9
11/12/2023
19
20
10
11/12/2023
Computer Security
In computer security a threat is a possible danger that might exploit
a vulnerability to breach security and therefore cause possible harm.
Type of threats:-
• Malware: MALicious softWARE the most common threat to your system.
• Security Breaches
• DoS: Denial of Service attacks, attempts to deny authorized users access to the
system
• Web Attacks: The attacker attempts to breach a web application.
• Session Hijacking: This is a complex attack that involves actually taking over an
authenticated session.
• DNS Poisoning: This involves altering DNS records on a DNS server to redirect
client traffic to malicious websites, usually for identity theft.
11
11/12/2023
Malware
Software with a malicious purpose.
1- Trojan horse: a malicious program
disguised as something desirable or harmless.
-Named after the famous wooden horse of ancient
history.
-It disguises itself as something benign, something
you need or want, i.e. a game, screen saver,
account logon, etc.
-It captures your information and returns it to the
intruder.
Malware (cont.)
2- Spyware: the fastest-growing category of malware.
• Cookies: initially a good idea to help users surf the Web, now misused to spy on users.
• Key logger: both in software and hardware, captures all the user’s typing and logs it,
capturing passwords, account numbers, credit card numbers, etc.
3- Viruses: are small programs written so that they can jump from one computer
to another (via disk or a network), and which can cause disruption or damage to the
computer system. As well as causing damage to your data, or in some cases even
destroying your data, viruses can cause other effects; such as using your email
system to email all your email contacts and in the process infect other people’s
computers.
12
11/12/2023
Viruses
Some of the common virus activities are as follows:
o The computer may not boot.
o The window may crash.
o Data may automatically delete.
o The size & format of the file may change.
o The computer becomes slow.
o Computer perform wrong data & instructions.
25
Virus Types (1 of 2)
Worm: A Worm is a program that replicates itself over and over in the
computer's memory until the computer can barely function. One of the
signs of invasion by a worm is the slowness of computers.
Time bomb: A time bomb is a virus which lies dormant until a certain
date or time or for a period of time. At this date or time, the virus
suddenly becomes active and carries out whatever task it is programmed
to do. This can include the deletion of everything on the hard drive.
26
13
11/12/2023
Virus Types (2 of 2)
Logic bombs: A logic bomb is similar to a time bomb, except that instead
of becoming active at a certain time, it becomes active when a particular
activity happens. For example, instead of formatting a diskette, the virus
causes the hard drive to be formatted.
Macro-viruses: Macro-viruses make use of a special customization
feature in applications called macros. Macros allow you to create mini-
programs to carry out certain tasks in your application.
Bacteria: also known as rabbits, are programs that do not directly damage
the system. Instead they replicate themselves until they monopolize CPU,
memory or disk space. This constitutes a denial of service attack.
27
28
14
11/12/2023
29
30
15
11/12/2023
31
32
16