Pt1420 Unit 1 Essay

Brilliant Essays
Task 1
Using Word, draw a time-line and identify the ten most significant events related to the “History of computing”. Provide a brief explanation – to justify each of your ten choices.
Suggest some reliable sources from which anyone could find further information about each of your selected events.

A short History of Computer Viruses:

1983 – This is the year when the term “Virus” was introduced by Frederick Cohen for the computer programs that are infectious as it has the tendency to replicate. The beginning of the virus history is much older.

The very first implication for program acting like a “VIRUS” is “Self-Reproduction Automata” established in 1949 to produce a large amount of viruses. In 1966, an article wrote by the
…show more content…
A GUI provides windows, buttons, pull-down menus, scrollbars, iconic , wizards etc. and the mouse to enable users to interact with the operating system or application.
Command Line Interface
A command line interface (CLI) enables users to type commands in a terminal or console to interact with an operating system. Users respond by typing a command on a specified line, and receive a response back from the system. Users type a command or series of commands for each task they want to perform. (Gatto, 2013)

Reference

A Short History of Computer Viruses. 2015. A Short History of Computer Viruses. [ONLINE] Available at:https://antivirus.comodo.com/blog/computer-safety/short-history-computer-viruses/. [Accessed 08 October 2015].

Into The New World: CASE STUDY NO. 5. 2015. Into The New World: CASE STUDY NO. 5. [ONLINE] Available at:http://febzmagz.blogspot.co.uk/2011/04/case-study-no-5.html. [Accessed 08 October 2015].

CLI vs. GUI. 2015. CLI vs. GUI. [ONLINE] Available at: http://www.markus-gattol.name/ws/cli_vs_gui.html. [Accessed 08 October

Related Documents

  • Improved Essays

    Nt1310 Unit 6 Essay

    • 565 Words
    • 3 Pages

    This specifies the general interface between the network layer (IP etc.) and the Data Link layer (Ethernet, Token Ring etc.) It’s the standard for the upper Data Link layer sublayer, also known as the Logical Link Control layer. It’s responsible for flow and error control. The Data Link layer wants to send some data over the network, 802.2 LLC helps make this possible. b. 802.3 – Ethernet 802.3 is the standard which Ethernet operates by.…

    • 565 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 5 Essay

    • 1093 Words
    • 5 Pages

    #include /*input and output */ #include /* printf, NULL */ #include /* srand, rand */ #include /* time */ #include /* file operations */ #include /* symbolic constants */ using namespace std; int Gen(int length) { cout << " ******************Attempting to write key to file*******************\n"<< endl; int randomData = open("/dev/random", O_RDONLY); // open file to get random values char myRandomData[length]; //determine the length of the key size_t randomDataLen = 0;// initialize counter while (randomDataLen < sizeof myRandomData) //read from file while key length is not larger than size of plain text { ssize_t result = read(randomData, myRandomData + randomDataLen, (sizeof…

    • 1093 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3 Essay

    • 492 Words
    • 2 Pages

    Unit 3 Essay In a perfect world climate change, wouldn’t be a problem, people wouldn’t go hungry, you don’t have to choose to get skittles or sour patch your mom would buy you both and many other things. And say in this perfect world we found a solution. The solution was to make humans autotrophic reducing our carbon foot print then maybe even reversing global warming. But even if this were to happen other problems would arise such as people having to change their lifestyles, tons more of water will be drank.…

    • 492 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Please research one virus and one worm, and write a maximum 2-page single-spaced paper explaining what each of them is, what they do, what their impact was, what the mechanics of how they work are (the technical aspect), and how were they stopped. Computer virus: It is a piece of code which is loaded onto the computer without the user knowledge and runs itself. When this code is executed, it makes a copy of itself and inserts this copy into another computer programs, data files of the hard drive. Such small virus also steals hard disk space and CPU time , corrupts data.…

    • 1405 Words
    • 6 Pages
    Superior Essays
  • Decent Essays

    Nt1310 Unit 2 Essay

    • 368 Words
    • 2 Pages

    1. Rack and wall mountable connector housings shall accept an interchangeable connector panel. An adapter panel is defined as a modular removable plate containing optical fiber connector adapters. 2.…

    • 368 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 2 Essay

    • 807 Words
    • 4 Pages

    1. Compare and contrast Radiological dispersal devices (RDD), Radiological exposure device (RED), and Radiological incendiary device (RID). Out of the three devices, Radiological Dispersal Devices are the most common. For one thing, these devices “…require limited technical knowledge…” that is why terrorists are more likely to make these bombs (Radiological Dispersion Device, n.d.).…

    • 807 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    2. Explain how the submission engine plan will handle submissions in other languages, including Portuguese and Mandarin. When the data is submit through the submission engine using the web form, email, Twitter, Facebook, Internet crawler and other data input, Google translate API will start the translation from the other languages using it data-driven approach of millions of multilingual documents into English, then to the target language of the user. When the source text is short, the submission will use rule-based machine translations, for better accurately on the translation. If the language does not have direct translation, Google will translate to a closely related language that maybe more spoken in that area.…

    • 577 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Nt1310 Unit 1 Essay

    • 1363 Words
    • 6 Pages

    Semester B Unit 1 Lesson 6 Introduction and Objective The author’s purpose may be to inform, to persuade, to express feelings, or to entertain. The author may write for more than one purpose. It is important to determine the author’s purpose in order.…

    • 1363 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    Who is David Silverstein? 10. What virus was found in Dr. Musoke’s blood? Describe the virus and it’s origin. 11. What is a filovirus?…

    • 1002 Words
    • 5 Pages
    Decent Essays
  • Improved Essays

    Assignment 3 Gemma is a young software developer, she just graduated college and has just landed her dream job at a hospital. In her spare time Gemma is also a blogger, the blog that she posts on is mostly geared towards other IT people. Gemma created this blog as a senior project with a couple other students and it just took off from there. What started off as project for points quickly turned into an everyday routine. Gemma has met many new friends and acquaintances which ended up leading her to her current job at the hospital.…

    • 513 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Nt1310 Unit 1 Lab 2 Essay

    • 2411 Words
    • 10 Pages

    Objective As future computer professionals, students of CIT 17600 need a basic understanding of the location and abilities of a variety of tools on Microsoft environments. The Windows Lab 2 was designed to provide a glimpse into these tools. The Microsoft environment that was researched was Windows 7.…

    • 2411 Words
    • 10 Pages
    Superior Essays
  • Great Essays

    Unlike many of those who enter into Computer Science programs in college I have only recently, in the last couple of years, started programming. During my senior year of high school a friend of mine and myself started playing around with C++ for fun during a vocational networking class accomplishing very little and not getting any desired results. At that time I had no clue that a couple short years later I would have a deeper understanding of proper programming methodologies and an understanding of a variety of languages to meet specific needs. It is often that you will see, or at least I have seen, when speaking to others programmers, that programmers believe that their language of choice is the language that will solve every problem that…

    • 1828 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Technology is a really interesting sector. The way how each technology works; how they differ, how they common with each other is really interesting. I find it quirky and astonishing. It is so complex that not everyone can use it easily thus it is challenging. This could be one of the reasons why I would like to study cyber security.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Computer science is an excellent career choice because it deals with one of the fastest growing fields, computers (Smith). This career is constantly evolving, which makes the workplace stimulating and challenging. Computer science is changing the world we inhabit by making many advancements in computing. In the 1960s, computer science became an independent discipline; however, the study of the electronic computer was around prior to it (History).…

    • 1799 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Mac Vs. PC

    • 971 Words
    • 4 Pages

    PC owners and supporters are aware and display the fact that their computers are more flexible and are able to complete various tasks. PC computers are portrayed to be nearly as impenetrable as Mac computers when it comes to viruses and malware. Moreover, they are on the cheaper side of the computer spectrum and that is a humongous lure for customers looking to purchase a computer. However, these claims are not always factual as they are perceived. Although Macs are becoming vulnerable to malware occurrences as well, they are still such a minute portion of the computer world that the numbers are incomparable.…

    • 971 Words
    • 4 Pages
    Improved Essays