Friday, March 7, 2025

Thursday Computer System 06.03.2025

 Storage Devices:

Storage devices are used to save data in a computer. There are three types: Primary storage, like RAM, which holds data only while the computer is on, and ROM, which stores important system instructions. Secondary storage includes hard drives, CDs, USB drives, and memory cards, which keep data permanently. Cloud storage, like Google Drive and Dropbox, saves files online so they can be accessed from anywhere. These devices help store and retrieve information when needed.

Internal Storage Devices:

Internal storage devices are parts inside a computer where data is stored. They help keep your files, programs, and operating system safe even when the computer is turned off. Examples include hard drives and solid-state drives (SSDs).

External Storage Devices:

External storage devices are things you can connect to your computer from the outside. They help you store extra data, like files and pictures, and you can use them with different computers. Examples are USB flash drives and external hard drives.

Magnetic Storage Devices:

Magnetic storage devices are tools that store data using magnetic fields. They include things like hard drives, where data is written and read by magnetic heads. This type of storage is common in computers for keeping files and programs.

Optical Storage Devices:

Optical storage devices are tools that store data using light, like lasers. Examples include CDs, DVDs, and Blu-ray discs. You can use them to read or write data by shining a laser on the disc.

Solid State Storage Devices:

Solid-state storage devices are tools that store data using flash memory. They don't have moving parts, which makes them faster and more durable. Examples include USB flash drives and SSDs (solid-state drives).

Friday, February 28, 2025

Thursday Computer System 26. 02.2025

Input Devices in dangerous places:

People use special input devices in dangerous places to stay safe. These devices help them see, measure, and control things from far awaySensors check heat, gas, and radiation. Cameras help people see without going near danger. Robots do risky jobs like removing bombs or handling chemicals. Drones fly to take pictures and find people in emergencies. Touchscreens and keypads help control machines safely. These devices protect people while letting them work in unsafe places. πŸš€

How do sensors save humans from danger?

Sensors help people by finding danger early and giving warnings. This helps them stay safe. Gas sensors find harmful gases in mines and factories to stop poisoning.

  • Temperature sensors check heat in fires and machines to prevent burning.
  • Radiation sensors warn workers in nuclear plants about radiation.
  • Motion sensors help security systems by spotting danger.
  • Water sensors detect leaks to stop floods.

Sensors protect humans by stopping accidents before they happen. 🚨

Input Devices at Home:

A smart device is an electronic device that can connect to the internet and work on its own or with voice commands. It helps people do things easily and quickly.

Examples:

  • Smartphone – Makes calls, takes photos, and runs apps.
  • Smart TV – Connects to the internet to watch videos.
  • Smartwatch – Tracks time, health, and messages.
  • Smart speaker – Listens to voice commands to play music or give information.
  • Smart lights – Can be turned on/off using a phone or voice.

Smart devices make life simple and fun! 😊

Sensors and safety:

Sensors are devices that detect and respond to changes in the environment, converting physical phenomena into electrical signals for monitoring and control purposes. In the context of safety, sensors play a crucial role by identifying potential hazards and triggering appropriate responses to prevent accidents or damage.

Temperature sensors are a specific type of sensor designed to measure heat energy, allowing systems to monitor and regulate temperature-dependent processes.😎

Using input devices to control output:

AssalamualaikumπŸ‘©

Input devices (like buttons, sensors, or keyboards) send signals to a computer. Output devices (like lights, speakers, or screens) react to those signals.

Examples:

  1. Press a button (input) → Light turns on (output).
  2. Clap near a microphone (input) → Music plays from a speaker (output).
  3. A temperature sensor detects heat (input) → A fan starts spinning (output).

This is how computers and machines follow commands to make life easier! 😊

Input devices send signals, and output devices react to them.

Examples in Shopping:

  1. Barcode scanner (input) → Price appears on the screen (output).
  2. Touchscreen at self-checkout (input) → Receipt prints (output).

Examples in a Plane:

  1. Pilot moves the joystick (input) → Plane changes direction (output).
  2. Passenger presses a button (input) → Light turns on above the seat (output).

This is how machines follow commands to make things work! 😊✈️

Monday, February 17, 2025

Final Term Computer Systems Page 214 - 217 17.2.2025


What is Input Device and the names of the devices?

An Input Device is a hardware device used to send data or instructions to a computer. It allows users to interact with the computer by providing input, such as text, commands, or control signals.

Examples of Input Devices:

  1. Keyboard – Used for typing text and commands.
  2. Mouse – Used to control the cursor and click on items.
  3. Touchscreen – Allows direct interaction by touching the screen.
What is a Cursor?

A small symbol on the computer screen that shows where something will happen next. It helps users type, click, or move things on the screen. The cursor can change shape depending on what you are doing. For example, when typing, it looks like a blinking line (|), and when using a mouse, it looks like an arrow .

What is a Sensor?

"A device that can detect changes in the environment, such as light, temperature, sound, or movement. Sensors collect this information and send it to a computer or other electronic devices to help them respond. For example, a temperature sensor can check how hot or cold a room is, and a motion sensor can detect if someone is moving nearby. Sensors are used in many everyday things, like automatic doors, streetlights, and smartphones."

What are Remote Input Device? 

A device that allows users to enter information into a computer or control it from a distance, without using direct wires or cables. These devices send signals wirelessly using technologies like Bluetooth, infrared, or Wi-Fi. Examples of remote input devices include a wireless keyboard, a remote control for a TV or projector, a game controller, and a wireless mouse. These devices make it easier to control computers and other electronic systems from a distance.

What are input devices for measuring data over time?

These input devices collect information continuously and send it to a computer for analysis. They help measure things like temperature, light, sound, and movement over a period of time. Some common examples include temperature sensors, which track how hot or cold something is, motion sensors, which detect movement, and sound sensors, which measure noise levels. These sensors are used in weather stations, security systems, and even in smart homes to automate tasks.

What is the input devices far away?

These devices allow users to send information to a computer or control it from a distance without using wires. They use wireless technology like Bluetooth, infrared, or Wi-Fi to send signals. Some common examples include a remote control, which is used to operate TVs and projectors, a wireless mouse and keyboard, which help control a computer without being directly connected, and a game controller, which allows players to control video games from a distance. These devices make it easier to use technology without staying close to the computer or machine.

THANK YOU FOR READING !

Assalamualaikum πŸ˜ŠπŸ˜„

Saturday, January 11, 2025

What is Internet Cloud storage


 WHAT IS INTERNET CLOUD

Internet clou  d storage is a service that allows you to store, manage, and access data (such as files, documents, photos, videos, etc.) on remote servers over the internet, rather than on local devices like your computer or phone. The term "cloud" refers to the virtual nature of these servers, which are typically located in large data centers across various regions.

With cloud storage, you can:

  • Store files online and access them from any device with internet connectivity.
  • Sync files across multiple devices, ensuring you always have access to the most up-to-date version.
  • Share files easily with others.
  • Backup data to prevent loss in case of hardware failure.

Popular cloud storage providers include services like Google Drive, Dropbox, Microsoft OneDrive, and Apple iCloud. Cloud storage typically requires a subscription for larger amounts of storage, but many providers offer free storage options as well.

Monday, January 6, 2025

Network failures

 WHY DO CONNECTIONS BREAK?

In Information and Communication Technology (ICT), connections can break for several reasons, primarily related to hardware, software, and network issues. Physical damage to cables, routers, or other hardware can interrupt connectivity, while technical malfunctions such as server failures or router misconfigurations may also cause disruptions. Software bugs, updates, or incompatibility issues can lead to connection breakdowns between devices or applications. Additionally, network congestion, interference from other devices, or weak signals can cause wireless connections to drop. Security breaches, such as cyberattacks or unauthorized access, can also sever connections in ICT systems, impacting communication and data transfer. Proper maintenance, regular updates, and troubleshooting are essential to ensure stable and reliable connections in ICT environments.

WHAT ARE THE EFFECTS OF NETWORK FAILURES?

Network failure can have significant consequences across various sectors. It can disrupt communication by preventing access to email, messaging services, and collaboration tools, hindering both personal and professional interactions. In business environments, network failure can lead to operational downtime, causing delays in tasks, loss of productivity, and even revenue losses, particularly for companies reliant on online transactions or cloud-based systems. The financial impact extends to increased costs for troubleshooting and system repairs. Additionally, network failures can expose security vulnerabilities, leaving systems prone to cyberattacks or data breaches. Critical data may become inaccessible or corrupted, affecting decision-making and business continuity. In customer-facing industries, service disruptions can lead to customer frustration and damage a company’s reputation. For sectors like healthcare and emergency services, network failure can jeopardize patient care or delay critical responses, amplifying the risks to public safety. Therefore, ensuring network reliability and implementing proper contingency plans are vital to mitigating these adverse effects.

THANK YOU😎

Monday, December 2, 2024

NETWORK FAILURES

 MANOR NETWORK FAILURE

A "Manor Network Failure" typically refers to a breakdown or disruption within a network system, but the specific meaning depends on the context in which it is used. If you’re referring to the Manor Racing F1 Team, it could involve a failure in the communication systems between the team's cars and the pit crew, or issues with telemetry data transmission. Formula 1 teams rely heavily on real-time data from the car to manage strategy, diagnose problems, and adjust settings during the race. A failure in this network would disrupt these processes, affecting the team's performance on the track.

Alternatively, if "Manor" refers to a private estate or manor house, a network failure could refer to problems with the internet or local area network (LAN) that controls various systems within the estate. This might include automation systems like smart home devices, security cameras, and communication networks used by the staff or residents. In such a case, the failure would disrupt services like security monitoring or automated systems, possibly compromising the safety or convenience of the property.

Finally, in a more general IT context, "Manor Network" could refer to a private network used by a business or organization, where a failure would involve loss of connectivity or issues with the infrastructure. This could impact the organization’s day-to-day operations, causing delays, loss of data, or operational inefficiencies, depending on what the network supports. Regardless of the specific context, the term indicates a failure in a critical communication or operational network.


LARGE INTERNET FAILURE

A large internet failure refers to a widespread disruption of internet connectivity that impacts a significant number of users, regions, or even entire countries. These failures can be caused by various factors such as hardware malfunctions, software glitches, cyberattacks, power outages, or damage to critical infrastructure like undersea cables, data centers, or network routing systems

. During a large-scale internet failure, users may experience slow or no access to websites, online services, and communication platforms, severely affecting businesses, education, healthcare, and personal communication. The disruption can lead to financial losses, delays in essential services, and difficulty accessing important resources. The duration of these failures can range from a few hours to several days, depending on the severity of the issue and how quickly it is resolved. Large internet failures highlight the reliance on the global network for everyday activities and the need for robust systems to prevent such widespread issues.  

. These failures can be caused by various factors such as hardware malfunctions, software glitches, cyberattacks, power outages, or damage to critical infrastructure like undersea ca MAJOR bles, data centers, or network routing systems. During a large-scale internet failure, users may experience slow or no access to websites, online services, and communication platforms, severely affecting businesses, education, healthcare, and personal communication. The disruption can lead to financial losses, delays in essential services, and difficulty accessing important resources. The duration of these failures can range from a few hours to several days, depending on the severity of the issue and how quickly it is resolved. Large internet failures highlight the reliance on the global network for everyday activities and the need for robust systems to prevent such widespread issues.

A large internet failure refers to a widespread disruption of internet connectivity that impacts a significant number of users, regions, or even entire countries




MAJOR


Friday, November 29, 2024

NETWORK FAILURE DATE: 25.11.2024

 THE INTERNET AND CLOUD STORAGE

The term “cloud computing” means performing computer tasks using services provided over the Internet. In cloud computing a company's data and applications are stored at an offsite data center that is then accessed via the Internet (the cloud).

Pros Of Cloud Storage

  • Advantage #1: Disaster Recovery (DR) ...
  • Advantage #2: Access your data anywhere. ...
  • Advantage #3: Low cost. ...
  • Advantage #4: Scalability. ...
  • Advantage #5: Security. ..

  • Disadvantage #1: Lack of total control. ...
  • Disadvantage #2: Difficult to migrate. ...
  • Disadvantage #3: Requires Internet.

The name comes from the fact that the data gets stored on servers - in the cloud. So, I guess it's safe to assume that the cloud is a slang term used by tech industry people to describe the servers and networking infrastructures that allow users to store and access data through the internet.



REFLECTION WRITING ON IP ADDRESS DATE: 18.11.2024

 

WHAT IS INTERNET PROTOCOL (IP) ADDRESS ?


IP address stands for “Internet Protocol address.” The Internet Protocol is a set of rules for communication over the internet, such as sending mail, streaming video, or connecting to a website. An IP address identifies a network or device on the internet. IP rights are important because they encourage creativity and innovation. By giving inventors and creators exclusive rights to their work, intellectual property laws allow them to profit from their investments and recoup their research and development costs.


WHAT IS TRANSMITTING DATA ?

Data transmission is sending and receiving digital or analog data between devices. This can be achieved through different mediums, such as cables, optical fibers, or wireless signalsData transmission, digital transmission or digital communications is the transfer of data over a point-to-point or point-to-multipoint communication channel. Examples of such channels include copper wires, optical fibers, wireless communication channels, storage media and computer buses.


 ADVANTAGES AND DISADVANTAGES OF PAKETS ?

ADVANTAGES

 Reduces lost data packets because packet switching allows for resending of packets. More cost-effective since there is no need for a dedicated channel for voice or data traffic.

DISADVANTAGES

Delay: Because packets can take different paths, they might arrive out of order, causing a slight delay as the data reassembled. For most things, this isn't a big deal, but for real-time services like video calls, it can be noticeable.


WHAT HAPPENS  IF PAKETS ARE LOST ?

Packet loss will generally reduce the speed of throughputthe actual amount of data that flows through the network—of a given connection. The term latency is a general term referring to many types of delays typically found in the processing of network data. Packet loss is one type of latency.























Thursday, November 21, 2024

ACCESSING WEBSITE AND MYSELF INTRODUCTION DATE: 21.11.2024



                           INTRODUCTION ON MYSELF


 HELLO ! My name is Samarah Zubaer. I read in STD 5. My father's  name is Ahmed Zubaer Mahbub.

He works in Bangladesh Bank and his position is the Joint Director. My mother's name is Sufia Akter.

She is a homemaker of our house. I also have little sister her name is Nusaybah Zubaer. She reads in STD 

1. My hobby is to spend time on my Youtube channel . I love to karate in my outside hobby. In my school 

Annual Sports I did anchoring many times and also got a crest and in physical sports i also got medals.

In math Olympiad and English weeks  and in other competitions i got certificatesπŸ‘



WHAT IS ACCESSING WEBSITES?

Open access is a publishing model for scholarly communication that makes research information

 available to readers at no cost, as opposed to the traditional subscription model in which

 readers have access to scholarly information by paying a subscription





Monday, November 18, 2024

REFLECTION WRITING HOW DATA TRAVELS THROUGH NETWORK DATE: 14.11.2024


                           

           REFLECTION OF WRITING ON ICT ON BLOGSPOT

HOW DOES DATA TRAVELS THROUGH NETWORKS?

The internet has become an integral part of our daily lives, and the way we communicate, work, and access information has changed drastically over the past few decades. But have you ever wondered how data travels through the internet? In this article, we will take a deep dive into the complex system that makes it possible for us to send and receive data across the globe. The journey of data through the internet begins at the source, where it is created or transmitted. This could be a computer, smartphone, or any other device that can send data over the internet. When you type an email, upload a file, or send a message, the data is generated at this end. Once the data is generated, it reaches the network interface of the sending device. This could be an Ethernet port, Wi-Fi antenna, or any other device that enables communication over the internet. The network interface converts the digital data into analog signals, which can travel through the physical medium (cable) to reach the next device. The data now travels through a network of routers and switches, which direct it towards its destination. 

USING CELLULAR NETWORK

cellular network or mobile network is a telecommunications network where the link to and from end nodes is wireless and the network is distributed over land areas called cells, each served by at least one fixed-location transceiver (such as a base station). These base stations provide the cell with the network coverage which can be used for transmission of voice, data, and other types of content. A cell typically uses a different set of frequencies from neighboring cells, to avoid interference and provide guaranteed service quality within each cell.

When joined together, these cells provide radio coverage over a wide geographic area. This enables numerous portable transceivers (e.g., mobile phonestablets and laptops equipped with mobile broadband modemspagers, etc.) to communicate with each other and with fixed transceivers and telephones anywhere in the network, via base stations, even if some of the transceivers are moving through more than one cell during transmission.



,

Monday, November 11, 2024

NETWORK AND HARDWARE DATE: 7.11.2024



                   

      INFORMATION COMMUNICATION TECHNOLOGY

                                            

 .WHAT IS ICT?  

 ICT, or information and communications technology (or technologies), is the components that enable modern computing. Among the goals of ICT technologies, tools and systems is to improve the way humans create, process and share data or information with each other. Another is to help them improve their abilities in numerous areas, including business; education; medicine; real-world problem-solving; and even leisure activities related to sports, music, and movies.

What is the importance of ICT

In today’s digital age, it is essential to have knowledge about Information and Communication Technology (ICT). ICT refers to the use of digital technologies to create, store, process, and exchange information, and it has transformed the way we communicate, learn, work, and do business. Here are some reasons why it is important to have knowledge about ICT:

Communication: ICT enables people to communicate and share information across different locations and time zones using digital platforms such as email, video conferencing, social media, and instant messaging. This has made it easier for people to stay connected with friends, family, and colleagues, and has also facilitated global collaboration and networking.


ADVANTAGES OF ICT

  • It improves concentration and comprehension. The activities carried out through digital and interactive tools increase student concentration and, therefore, they assimilate concepts more quickly, enhancing learning. This type of tool involves students in more practical learning, with the aim of reinforcing what they have learnt.    
  • It promotes student flexibility and autonomy. New technologies promote autonomous learning for students. With the incorporation of digital alternatives such as online courses, each student can learn at their own pace and resources thanks to the flexibility provided digital and connectivity.   
  • It encourages critical thinking. The diverse sources of information that technologies provide bring new points of view to students. In this way, information and communication technologies encourage debate and the acceptance of other people’s opinions. In addition, the exchange of thoughts allows students to learn about different cultures.   
  • It facilitates communication between teachers and students. The whole educational community has quick access to the same resources. In this way, digital tools allow direct and immediate interaction, without the need to be physically present. This was especially important during the confinement experienced during the 2020 health crisis.
  •                                    DISADVANTAGES OF ICT
  • Distractions and lack of attention. Digital means opening up unlimited access to multiple resources and sources of information, such as web pages, social networks or chats, and therefore, they take attention away from the subject matter.   
  • Excessive impact. Excessive and inappropriate use can lead students to a compulsive relationship with technology, which can lead to an inability to control consumption and, consequently, have adverse effects on the student’s health, social, family and academic life.   
  • It reduces the development of other skills. Practices such as writing, public speaking and reasoning may be nullified by the widespread adoption of digital in academic institutions. This has been demonstrated in a recent study conducted by the University of California. The report details that the social skills of the new generations are based on the digital environment, therefore, direct personal communication can be affected.   




  • THANK YOU EVERYONE FOR YOUR PATIENCE AND READING!