are the most common storage devices for computers..
Hard disks store data in a relatively permanent form , they will retain information that has been written to the disk when there is a power failure
Data is stored magnetically as a series of 0's and 1's on hard circular metal platters
Data storage device with a USB connector.
USB flash drives are removable and rewritable , and most weight less than 30g.
storage capacities typically range from 2 GB TO 256
an Online file storage service is an internet hosting service specifically designed to host static content , typically large files that are not web pages
online storage is a cost-effective and practical option
A network is formed where 2 of more computers are connected to each other so that they can share resources such as printers and scanners , exchange files or allow electronic communication securely.
The internet is a global network of linked computer networks that allows people worldwide to share information and to communicate electronically .
The internet is a network of networks, rather than a single vast network of individual computers all connected in the same was
1. Searching
2.E-Commerce
3.Downloading
4.Send and receive instant messaging
5.Study
6.Communication
A VPN is a private network that uses a public telecommunication infrastructure , such as the internet to provide remote offices or individual users with secure access to their organization network
The Main Purpose is to provide a secure and reliable private connection between computer networks over an existing public network such as internet
Malware is short for Malicious software and is a general term for any software which cause damage , gather sensitive information or gain access to a single computer , server or computer network without the user knowing it
Malware is sometimes used against government or corporate websites to gather guarded information or to disturb their operation in general.
Malware is often used against individuals to gain personal information such as bank or credit card number. malware includes viruses, worms , Trojan horse and spy-ware
E-trash or E-waste is discarded electronic parts or components , whether they are broken or merely out-dated.
it is sometimes cheaper to buy a new electronic device such as a cell phone or computer than repair
as result an enormous number of computer and electronic devices are trashed.
These devices contain toxic materials such as lead , cadmium and mercury which can contaminate the environment
there are various types of applications that helps users to copy with the difficulties of operating a computer or just make it easier to use a computer
Voice or speech recognition is the ability of an application to receive and interpret spoken word, or carry out spoken commands
A screen reader is software application that attempts to read text from the screen and converts it to spoken word/voice , sound icons or Braille
Screen readers are a form of assertive technology , potentially useful to people who are blind, visually impaired or learning disabled
A screen magnifier is software that enlarges screen content. it is Assistive technology suitable for visually impaired people who still have some functional vision
The on-screen keyboard is a software application which provides a visual keyboard on the screen that can be used in place of an actual keyboard
the on screen keyboard can be manipulated by the mouse or other pointing device
High Contrast improves readability of the display by applying a special system color scheme. high contrast heightens the color contrast of some text and images on your computer screen , making those items more distinct and easier to identify