Sunteți pe pagina 1din 8

 Different Computer Types

There are Four Different Computer Types


We have four different computer types classified according to their performance, power, and
size. A computer is an electronic device that accepts data, processes it, stores, and then produces
an output.
There are different computer types available depending on the number of users they can support
at any one time, their size, and power. In this hub, we are going to have a look at the difference
between supercomputers, mainframe, mini, and microcomputers.
1. Supercomputers – Supercomputers are very expensive, very fast, and the most powerful
computers we have in the world.
Supercomputers are optimized to execute a few numbers of programs. This makes it possible for
them to execute these few programs at a very high speed. Due to their inhibiting cost, they are
used in high-end places like in scientific research centers. The supercomputer consists of
thousands of processors making it clock very high speeds measured by petaflops.
These computer types are also very large in size due to the numerous parts and components
involved in their design.
A good example of a Supercomputer is Tianhe-2: TH-IVB-FEP Cluster; National Super
Computer Center in Guangzhou, China; 3.12 million cores (33.86 petaflops)

2. Mainframe computers — These are large and expensive computer types capable of supporting
hundreds, or even thousands, of users simultaneously. Thus, they are mostly used by governments
and large organizations for bulk data processing, critical applications, transaction processing,
census, industry and consumer statistics among others. They are ranked below supercomputers.
3. Minicomputers — Minicomputers are mid-sized computers. In terms of size and power,
minicomputers are ranked below mainframes. A minicomputer is a multiprocessing system capable
of supporting from 4 to about 200 users simultaneously.
The use of the term Minicomputer has diminished and they have merged with servers.
4. Microcomputers or Personal computers – A personal computer is a computer designed to be
used by one user at a time. The term microcomputer relates to the microprocessor which is used
with a personal computer for the purpose of processing data and instruction codes. These are the
most common computer types since they are not very expensive.

 COMPUTER NETWORK?
A computer network is a group of computer systems and other computing hardware
devices that are linked together through communication channels to facilitate
communication and resource-sharing among a wide range of users.
Networks are commonly categorized based on their characteristics.
Networks are used to:

 Facilitate communication via email, video conferencing, instant messaging, etc.


 Enable multiple users to share a single hardware device like a printer or scanner.
 Enable file sharing across the network.
 Allow for the sharing of software or operating programs on remote systems.
 Make information easier to access and maintain among network users.

There are many types of networks, including:

 Local Area Networks (LAN).


 Global Area Networks (GAN).
 Personal Area Networks (PAN).
 Home Area Networks (HAN).
 Wide Area Networks (WAN).
 Campus Networks.
 Metropolitan Area Networks (MAN).
 Enterprise Private Networks.
 Internetworks.
 Backbone Networks (BBN).
 Global Area Networks (GAN).
 The internet.

 VIRTUAL COMMUNITY

 Virtual community, a group of people, who may or may not meet one
another face to face, who exchange words and ideas through the
mediation of digital networks.
 The first use of the term virtual community appeared in a article by
Gene Youngblood written in 1984 but published in 1986
about Electronic Cafe (1984), an art project by artists Kit Galloway and
Sherrie Rabinowitz that connected five restaurants around Los Angeles
and an art museum through a live video link. The term gained popularity
after a 1987 article written by Howard Rheingold for The Whole Earth
Review. In The Virtual Community (1993), Rheingold expanded on his
article to offer the following definition:
 Virtual communities are social aggregations that emerge from the Net when
enough people carry on those public discussions long enough, with sufficient
human feeling, to form webs of personal relationships in cyberspace.

ONLINE COMMUNITY

An online community is a group of people who have a common interest and


communicate through the Internet. They get together online through websites,
discussion boards, instant messaging, email, etc., and pursue their interests over time.
An online community is a network of individuals who communicate with one another
online.

We also call it an Internet community. It is a virtual community, i.e., a social network


of individuals who interact online.

‘Online,’ in this article, means ‘with an Internet connection.’

According to the Cambridge Dictionary, an online community is:

“A group of people who use a particular internet service or belong to a particular group
on the internet.”

How to protect yourself against cybercrime


Anyone using the internet should exercise some basic precautions. Here are 11 tips you
can use to help protect yourself against the range of cybercrimes out there.
1. Use a full-service internet security suite
For instance, Norton Security provides real-time protection against existing and
emerging malware including ransomware and viruses, and helps protect your private
and financial information when you go online.
2. Use strong passwords
Don’t repeat your passwords on different sites, and change your passwords regularly.
Make them complex. That means using a combination of at least 10 letters, numbers,
and symbols. A password management application can help you to keep your
passwords locked down.
3. Keep your software updated
This is especially important with your operating systems and internet security software.
Cybercriminals frequently use known exploits, or flaws, in your software to gain access
to your system. Patching those exploits and flaws can make it less likely that you’ll
become a cybercrime target.
4. Manage your social media settings
Keep your personal and private information locked down. Social
engineering cybercriminals can often get your personal information with just a few data
points, so the less you share publicly, the better. For instance, if you post your pet’s
name or reveal your mother’s maiden name, you might expose the answers to two
common security questions.
5. Strengthen your home network
It’s a good idea to start with a strong encryption password as well as a virtual private
network. A VPN will encrypt all traffic leaving your devices until it arrives at its
destination. If cybercriminals do manage to hack your communication line, they won’t
intercept anything but encrypted data. It’s a good idea to use a VPN whenever you a
public Wi-Fi network, whether it’s in a library, café, hotel, or airport.
6. Talk to your children about the internet
You can teach your kids about acceptable use of the internet without shutting down
communication channels. Make sure they know that they can come to you if they’re
experiencing any kind of online harassment, stalking, or bullying.
7. Keep up to date on major security breaches
If you do business with a merchant or have an account on a website that’s been
impacted by a security breach, find out what information the hackers accessed and
change your password immediately.
8. Take measures to help protect yourself against identity theft
Identity theft occurs when someone wrongfully obtains your personal data in a way that
involves fraud or deception, typically for economic gain. How? You might be tricked into
giving personal information over the internet, for instance, or a thief might steal your
mail to access account information. That’s why it’s important to guard your personal
data. A VPN — short for virtual private network — can also help to protect the data you
send and receive online, especially when accessing the internet on public Wi-Fi.
9. Know that identity theft can happen anywhere
It’s smart to know how to protect your identity even when traveling. There are a lot of
things you can do to help keep criminals from getting your private information on the
road. These include keeping your travel plans off social media and being using a VPN
when accessing the internet over your hotel’s Wi-Fi network.
10. Keep an eye on the kids
Just like you’ll want to talk to your kids about the internet, you’ll also want to help protect
them against identity theft. Identity thieves often target children because their Social
Security number and credit histories frequently represent a clean slate. You can help
guard against identity theft by being careful when sharing your child’s personal
information. It’s also smart to know what to look for that might suggest your child’s
identity has been compromised.
11. Know what to do if you become a victim
If you believe that you’ve become a victim of a cybercrime, you need to alert the local
police and, in some cases, the FBI and the Federal Trade Commission. This is
important even if the crime seems minor. Your report may assist authorities in their
investigations or may help to thwart criminals from taking advantage of other people in
the future. If you think cybercriminals have stolen your identity. These are among
the steps you should consider.

 Contact the companies and banks where you know fraud occurred.
 Place fraud alerts and get your credit reports.
 Report identity theft to the FTC.

Advantages of Telecommuting
 Save Time - When you work from home, you won't have to spend time
traveling back and forth to work every day. If your position doesn't require
you to meet face to face with coworkers or clients, you can also save the time
that it takes to get dressed for the office every day. Many telecommuting
workers get their jobs done in t-shirts and jeans, or even their pajamas,
rather than having to dress in traditional business attire.
 Save Money - When you don't have to commute to an office on a regular
basis, you can save a significant amount of money in fuel expenses. Many
people who begin working from home also find that they save money on
clothing purchases, dry cleaning bills, morning coffee, restaurant and fast
food lunches, and more.
 Schedule Flexibility - Many telecommuting jobs provide workers with the
opportunity to work flexible hours, planning job-related activities around
family and other responsibilities. Often, telecommuting workers are able to
work any time of the day or night, from home or other locations. Even those
positions that require set schedules still allow workers to choose the work
times that work best for them.
 Earning Potential - Many telecommuting positions offer performance
based compensation rather than traditional hourly pay system. Workers who
have jobs that pay in this manner often receive piece rates or productivity
based pay. This means that skilled workers who are efficient can often earn
better wages than in positions where they are paid by the hour.
 Tax Advantages - Telecommuting workers can enjoy the tax write-off
advantages that go along with having a home-based office, assuming that
they do not have an employer provided workspace.

Telecommuting Disadvantages
 Time Management Challenges - When you work from home, it can
sometimes become difficult to separate work time from home
responsibilities. There's often a temptation to divide attention between
household duties and work activities, resulting in insufficient attention being
paid to both. Working from home requires a great deal of self control and
discipline. Telecommuters have to learn to set limits for themselves as well as
for the other members of their household in order to prevent the problems
that might arise when work and the activities of daily living overlap too
much.
 Perception of Friends and Family - It can sometimes be difficult for
friends and relatives to understand that the fact that you are working at
home does not mean that you are available to chat, run errands, go shopping,
etc. When you begin telecommuting, don't fall into the trap of letting people
pull you away from what you need to accomplish during the time you have
set aside to work. You will likely have to spend some time explaining your
new role to the people in your life, making it clear that when you are working
from home, you must focus on accomplishing work related tasks.
 Lack of Social Interaction - When you are accustomed to working in an
office environment, you have an opportunity to interact with co-workers on a
regular basis. Even though dealing with your coworkers may be challenging
at sometimes, interacting with others helps meet the important social needs
that everyone has. Those who telecommute often find the lack of contact with
coworkers to be a surprising drawback.
 Information and Communications Technology (ICT) has an important
role in the world since we are now in the information age era. With ICT,
the company can make the business easier to happen with the client,
supplier and the distributor. It is also very important in our daily lives.
The lack of appropriate information at the right time will result in low
productivity, low quality research works, and waste of time to pursue
information and even to do research which actually others had done or
in other countries. Nowadays ICT cannot be separated with our daily
needs.
 ICT has a great impact in our daily lives. For example, we can read our
local newspaper using the online newspaper. Another example is we
still can get connected with our family, relatives, or colleagues even if
we are abroad by using the electronic mail, yahoo messenger, call
conference, or video conference.
 Digital computer and networking has changed our economy concept to
the economy with no boundary in time and space because of ICT. It
brings a lot of advantages for economic development enabling millions
of transactions to happen in an easy and fast way.
 ICT is one of the economic development pillars to gain national
competitive advantage. It can improve the quality of human life because
it can be used as a learning and education media, the mass
communication media in promoting and campaigning practical and
important issues, such as the health and social area. It provides wider
knowledge and can help in gaining and accessing information.
 ICT has become an integral part of everyday life for many people. It
increases its importance in people’s lives and it is expected that this
trend will continue, to the extent that ICT literacy will become a
functional requirement for people’s work, social, and personal lives.
 The use of ICT in education add value in teaching and learning, by
enhancing the effectiveness of learning, or by adding a dimension to
learning that was not previously available. ICT may also be a significant
motivational factor in students’ learning, and can support students’
engagement with collaborative learning.
 Information and Communications Technology (ICT) is basically our
society’s efforts to teach its current and emerging citizens valuable
knowledge and skills around computing and communications devices,
software that operates them, applications that run on them and systems
that are built with them.
 As a matter of fact, we are living in a constantly evolving digital world.
ICT has an impact on nearly every aspect of our lives – from working to
socializing, learning to playing. The digital age has transformed the way
young people communicate, network, seek help, access information and
learn. We must recognize that young people are now an online
population and access is through a variety of means such as
computers, TV and mobile phones.
 It is in this premise that educational technology and e-learning is taught
in or out of the classroom since educational technology is used by
 learners and educators in homes, schools, businesses, and other
settings.
 Sourcing for second hand laptop singapore, come
to www.laptopfactoryoutlet.com.sg, a Singapore SME that focus on
refurbished mackbook,best budget laptop & macbook
refurbished,cheapest laptop. A digital marketing project for iphone trade
in,refurbished mac,best budget laptop & second hand laptop Singapore.

S-ar putea să vă placă și