Verification work on discipline "Computer science"

Affiliates: 0,02 $how to earn
Pay with:
i agree with "Terms for Customers"
Sold: 19 last one 14.11.2019
Refunds: 0

Uploaded: 05.06.2008
Content: 80605111510903.rar 58,01 kB
Loyalty discount! If the total amount of your purchases from the seller Pibachii more than:
20 $the discount is10%
If you want to know your discount rate, please provide your email:

Product description

Question 1. Definition and classification of the PC,
Answer PC - personal computer, mainframe designed for individual use. Usually, personal computers are designed based on the principle of open architecture and are based on microprocessors.

Modern personal computer can be implemented in a desktop, laptop or handheld version. Since 1999 operates the following classification of the PC:

Question 2: Hardware and software for the PC.
Answer: PC - universal technical system. Its configuration can be flexible to change as needed There are many hardware and software. Consider a basic set of hardware, the so-called basic configuration. Its structure includes: system unit, monitor, keyboard lately here include the mouse.

Question 3. Basic hardware configuration PC and characteristics.
Answer: The base hardware configuration of the PC include:

Monitor - the main output device. Modern monitors are divided into CRT and LCD. Currently monitors CRT recede into the past and give way to the LCD monitor. The advantage of liquid crystal displays is the absence of harmful electromagnetic radiation for humans, less impact on vision more compact and consume less energy. The main parameters of the monitor are:

The size, magnitude between opposite corners of the kinescope truppki

Question 4: Classification of computer networks.
Answer: Computer networks classify as follows:

Local area network. A small office network is called LAN. In it together computers that are within the same office or building. WLAN can create a house of special components. Such a network is called a home network.

Home network. It often uses the same components as in the LAN, but mostly it is used for sharing Internet. In contrast, local, data communication in the home network often

Question 5. The main areas of application for the Internet user.
Answer: The user uses the Internet in the following main areas:

Search and retrieval of information. Virtually any information there on the Internet can only find it with the help of special sites, search engines.

Study and work. More and more people are learning and working through a network of networks.

Mail. Email has the same type of connection as the phone.

Buying and selling. Increasingly, we buy through the Internet music and movies, tickets, books, etc.


Question 6. Basic e-mail features.
Answer: The basic e-mail features are:

The speed of delivery of messages. If the letter by regular mail to the recipient can go days and weeks, the letter sent by e-mail, reduce the transmission of up to several tens of seconds or, in the worst case, up to a few hours.

The e-mail could

Question 7: Computer security basic concepts.
Answer: The concept of computer security is very broad. It implies the reliability of the computer, and the security of valuable data and information security from making changes in it to unauthorized persons, and the secrecy of correspondence in electronic communication. This area is governed by a special law in our country is

Item 8. Methods of protection against computer viruses.
A: To protect against viruses, you can use

- The general data protection, which are also useful as insurance against physical damage to the disk, software is not working properly, or erroneous actions of users;

Many users start command Programs- Auditor batch file AUTOEXEC. BAT, to check the status of programs and disks held every time you boot the operating system. This allows you to detect the infection by computer virus, he has not had time to do more harm. Bo

Additional information

doc in rar


No feedback yet.
In order to counter copyright infringement and property rights, we ask you to immediately inform us at the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)