Bba Computer App
Bba Computer App
There are two bases on which we can define the types of computers. We will
discuss the type of computers on the basis of size and data handling
capabilities. We will discuss each type of computer in detail. Let’s see first
what are the types of computers.
● Super Computer
● Mainframe computer
● Mini Computer
● Workstation Computer
● Server Computer
● Analog Computer
● Digital Computer
● Hybrid Computer
Supercomputer
When we talk about speed, then the first name that comes to mind when
designed such that they can process a huge amount of data, like processing
Supercomputers
Characteristics of Supercomputers
● Supercomputers are the computers that are the fastest and they are
Mainframe computer
Mainframe computers are designed in such a way that they can support
organizations like banking, telecom sectors, etc., which process a high volume
of data in general.
Minicomputer
computer, there are two or more processors, and it supports 4 to 200 users at
Characteristics of Minicomputer
● It is fast.
Workstation Computer
A workstation computer is designed for technical or scientific applications. It
output unit. This kind of computer is suitable for personal work such as
making an assignment, watching a movie, or at the office for office work, etc.
● It is easy to use.
Server Computer
Server Computers are computers that are combined data and programs.
Electronic data and applications are stored and shared in the server
computer. The working of a server computer is that it does not solve a bigger
Examples of server computer are like Wikipedia, as when users put a request
for any page, it finds what the user is looking for and sends it to the user.
Analog Computer
Continuous data that changes continuously and cannot have discrete values
are called analog data. So, an analog computer is used where we don’t need
pressure, etc. It can directly accept the data from the measuring device
Digital Computer
Digital computers are designed in such a way that they can easily perform
calculations and logical operations at high speed. It takes raw data as input
and processes it with programs stored in its memory to produce the final
output. It only understands the binary input 0 and 1, so the raw input data is
converted to 0 and 1 by the computer and then it is processed by the
computer to produce the result or final output. All modern computers, like
Hybrid Computer
As the name suggests hybrid, which means made by combining two different
digital computers. Hybrid computers are fast like analog computers and have
memory and accuracy like digital computers. So, it has the ability to process
both continuous and discrete data. For working when it accepts analog
signals as input then it converts them into digital form before processing the
input data. So, it is widely used in specialized applications where both analog
petrol pumps that converts the measurements of fuel flow into quantity and
Business
Payroll calculations
Budgeting
Sales analysis
Financial forecasting
trustee records.
Insurance companies are keeping all records up-to-date with the help of computers.
Insurance companies, finance houses, and stock broking firms are widely using
showing −
Maturity date
Interests due
Survival benefits
Bonus
Education
The computer helps in providing a lot of facilities in the education system.
computer students.
Marketing
graphics, write and revise copy, and print and disseminate ads with the
customers.
Healthcare
They are being used in hospitals to keep the record of patients and medicines. It is
also used in scanning and diagnosing different diseases. ECG, EEG, ultrasounds and
Following are some major fields of health care in which computers are used.
Lab-diagnostic System − All tests can be done and the reports are
prepared by computer.
Engineering Design
One of the major areas is CAD (Computer Aided Design) that provides creation and
Structural Engineering − Requires stress and strain analysis for design of ships,
Military
Computers are largely used in defence. Modern tanks, missiles, weapons, etc.
Military also employs computerized control systems. Some military areas where a
Missile Control
Military Communication
Smart Weapons
Communication
received and understood clearly and correctly by the person for whom it is meant.
Chatting
Usenet
FTP
Telnet
Video-conferencing
Government
Computers play an important role in government services. Some major fields in this
category are −
Budgets
Weather forecasting
Firmware:
What is Firmware? Types
and Examples
Firmware Definition
Firmware is a form of microcode or program embedded into hardware devices to help
them operate effectively. Hardware like cameras, mobile phones, network cards, optical
drives, printers, routers, scanners, and television remotes rely on firmware built into their
memory to function smoothly.
When a device switches on, the firmware instructs the processor to initiate the startup
process. Computers, mobile phones, and tablets operate multiple forms of firmware to
perform actions like loading their operating systems. Firmware operates in a similar way
to device drivers. However, firmware is stored directly on the hardware device, whereas
drivers are installed in the device’s operating system. Firmware can also start up by
itself, while drivers remain reliant on the operating system.
BIOS
The Basic Input/Output System (BIOS) has been a critical component of computers
since the very early days. The BIOS sits on a chip in a computer’s motherboard and
issues a set of instructions that enables the device’s operating system to load. It is also
responsible for looking after a device’s hardware components and ensuring they function
correctly upon startup.
When a computer is turned on, the BIOS launches instructions that check the machine’s
startup process for potential errors. It starts by checking the random access memory
(RAM) and processor for faults, then checks connected devices, such as a keyboard and
mouse, for any problems. It then checks for a boot sequence, such as Boot from
Compact Disc Read-Only Memory (CD-ROM) and Boot from Hard Drive. Finally, the
BIOS connects to the bootloader program, which wakes up the computer’s operating
system and loads it in the RAM.
Aside from the device startup process, the BIOS is responsible for checking the
Complementary Metal Oxide Semiconductor (CMOS), which is a piece of memory that
stores BIOS settings, and other chips on a device. It also checks signals that are sent to
the RAM, such as when a user presses a key, to help the operating system understand
what action to take.
EFI
Extensible Firmware Interface (EFI) is a new generation of firmware that issues the
instructions that a device’s CPU uses to start the hardware and initiate the bootloader.
EFI is a replacement for BIOS and is used in new computers. It offers advantages like
ensuring a device only boots trusted software and other cybersecurity benefits.
The original EFI firmware is used in Macs and can only support Intel processors. Unified
EFI (UEFI) is a piece of firmware designed to replace the BIOS in new Windows
computers and supports AMD and Intel processors. UEFI is used to load and start up
operating systems in devices that run Windows 8 and beyond.
Understanding what firmware a device has is crucial to keeping the machine updated.
The firmware version of a Windows device can be accessed through the command
prompt using an upgrade assistant.
The firmware version of a hardware device can be discovered by opening the Devices
Manager folder, selecting the hardware, and clicking Properties. Within the Details tab,
navigate to the Property menu, open the Hardware IDs option, and the firmware version
will be listed in the Value table.
Furthermore, devices like laptops are packed with firmware that powers hardware like
batteries, sound cards, and webcams. This introduces a security risk, as producers of
these components may not design the firmware with cybersecurity top of mind. As a
result, they could be vulnerable to firmware hacking, which leads to malware attaching
itself to the firmware and remaining hidden without being detected by antivirus and other
security tools.
A lack of firmware security can lead to attackers spying on users’ devices, intercepting
their online activity, stealing their data, and gaining remote control of their machine. The
highly corruptible state of firmware makes it most vulnerable to bricking, which renders
the machine inoperable or unbootable. A recent example was a cyberattack on the
Ukrainian power grid, which began with attackers bricking serial-to-ethernet converters.
Firmware attacks can come through various vectors, from malware and rootkits to
infected hard drives, corrupted drives, and insecure firmware products. Hackers do not
have to physically touch a device to carry out an attack. They can do so through remote
connections like Bluetooth and Wi-Fi. This means that the growing market of connected
devices, such as game consoles, mobile phones, and television, is increasingly
becoming vulnerable to firmware hacking.
Enterprises must prioritize firmware security and be aware of the threats they face to
prevent hackers from accessing and taking control of their machines. Firmware security
is mainly reliant on hardware manufacturers to keep their devices current and safe. As a
result, manufacturers create measures that ensure their firmware withstands attacks, as
well as release regular patches and updates.
However, the onus remains on enterprises to prevent firmware attacks by instilling best
practices, including:
Organizations must implement IoT best practices to help users avoid IoT device
vulnerabilities.