Vous êtes sur la page 1sur 4

RIPHAH INTERNATIONAL UNIVERSITY

ASSIGNMENT
SUBMITTED BY ; AF-18-JL-0059 SUBMITTED TO ; ASIM MANSHA

1. Categories of Computer
Computer can be classified into 4
different classes. Which are,
Supercomputers
A supercomputer is pretty much exactly what it sounds like. It’s a term used to
describe computers that have the most capable processing power of its time. Early
supercomputers in the 60s and 70s used just a couple processors, while the 90s saw
supercomputers with thousands of processors at a time. Today, modern
supercomputers run hundreds of thousands of processors, capable of computing
quadrillions of calculations in just a few nanoseconds. You probably won’t be needing
that kind of power to access Facebook… Actually, supercomputers are used in
computational science to calculate and carry out a plethora of complex tasks.

Mainframe Computers
Like supercomputers, mainframe computers are huge, towering machines with lots of
processing power. Mainframe computers are mostly used by corporations,
government agencies, and banks – organizations that need a way to store large
quantities of information

Minicomputers
A minicomputer is a multiprocessing machine that can support up to about 200 users
at the same time. It’s like a less powerful mainframe computer, and is about the size
of a refrigerator. A server can be an example of a minicomputer, but not all servers
are minicomputers.

Microcomputers
Microcomputers are the ones people are most familiar with on a daily, non-
professional basis, but of course that doesn’t mean they’re exclusive to the home.
Microcomputers are smaller computers that run on microprocessors in their central
processing units. They are much, much cheaper than supercomputers, mainframe
computers and even minicomputers, because they’re meant for everyday uses that
are more practical than professional
2. Computers in Society

Computers are, perhaps, the best invention by man so far. To understand their impact
on society, we will first have to understand their meaning. A computer does not necessarily mean
a monitor, keyboard, mouse, and a CPU. It is any machine or device that can compute and
execute instructions given to it in the form of programs. So technically, even a cell phone is a
computer. And so are desktops, laptops, tablet PCs, and PDAs. It includes anything that can
perform a series of operations on its own. This gives us an idea as to how wide and deep its role
is in our lives. We need this device for virtually everything

One of the most important advantages of this machine is in the field


of science for research and development. It has played a major role in most of what we know
about ourselves and the universe. The satellites, the telescopes, and almost all the research tools
use it in some or the other way. The huge calculations required for space science, safe
communication between scientists, storage of all the gathered information, etc., are some of its
uses in science and technology.

Where there are advantages there are also disadvantage


and misuse of computers. This is only the tip of the iceberg, as we can't even
imagine the ubiquity of computers in today's life. However, this technology has also given rise to
many vices, like identity theft, hacking, etc. One needs to use it only for a good purpose, and not
misuse it. But the truth remains the same - the advantages supersede their disadvantages with
pride.
3. Protect privacy in cyber space

Cyber or Internet privacy involves the right or mandate of personal


privacy concerning the storing, repurposing, provision to third parties, and
displaying information pertaining to oneself via of the Internet.
data privacy. Privacy concerns have been articulated from the beginnings of large-
scale computer sharing.

Privacy can entail either Personally Identifying Information (PII) or non-PII


information such as a site visitor's behavior on a website. PII refers to any
information that can be used to identify an individual. For example, age and
physical address alone could identify who an individual is without explicitly
disclosing their name, as these two factors are unique enough to identify a specific
person typically.

4. Countering cyber crime


Cyber crime or Computer crime, refers to any crime that involves a
computer and a network. Netcrime refers, more precisely, to criminal exploitation
of the Internet. hacking, copyright infringement, identity theft, child pornography,
and child grooming. There are also problems of privacy when
confidentialinformation is lost or intercepted, lawfully or otherwise.

On the global level, both governments and non-state actors continue to


grow in importance, with the ability to engage in such activities as espionage, and
other cross-border attacks sometimes referred to as cyber warfare. The
international legal system is attempting to hold actors accountable for their
actions, with the International Criminal Court among the few addressing this
threat.[3]
A cyber countermeasure is defined as an action, process, technology, device, or
system that serves to prevent or mitigate the effects of a cyber attack against a
victim, computer, server, network or associated device.
A number of countermeasures exist that can be effectively implemented in order
to combat cyber-crime and increase security

Government
 Federal Trade Commission (FTC)
 Federal Bureau of Investigation (FBI)
 Bureau of Alcohol Tobacco and Firearms (ATF)
 Federal Communications Commission (FCC)
Private organizations

 Antivirus/Security Firms
 Internet Service Providers (ISPs)
 Messaging Anti-Abuse Working Group (MAAWG)
 IT Consultants
 Computer Security Incident Response Team (CSIRT)

Public–private partnerships
 Computer emergency response team (CERT), Carnegie Mellon University
 United States Computer Emergency Readiness Team (US-CERT)

Vous aimerez peut-être aussi