Skip to main content

Quiz based on Digital Principles and Computer Organization

1) Base of hexadecimal number system? Answer : 16 2) Universal gate in digital logic? Answer : NAND 3) Memory type that is non-volatile? Answer : ROM 4) Basic building block of digital circuits? Answer : Gate 5) Device used for data storage in sequential circuits? Answer : Flip-flop 6) Architecture with shared memory for instructions and data? Answer : von Neumann 7) The smallest unit of data in computing? Answer : Bit 8) Unit that performs arithmetic operations in a CPU? Answer : ALU 9) Memory faster than main memory but smaller in size? Answer : Cache 10) System cycle that includes fetch, decode, and execute? Answer : Instruction 11) Type of circuit where output depends on present input only? Answer : Combinational 12) The binary equivalent of decimal 10? Answer : 1010 13) Memory used for high-speed temporary storage in a CPU? Answer : Register 14) Method of representing negative numbers in binary? Answer : Two's complement 15) Gate that inverts its input signal? Answer : NOT 16)...

Security

Security
The Security Problem
* Protection give out with protecting files and other resources from accidental misuse by cooperating users sharing a system, generally using the computer for normal purposes.
* Security compact with protecting systems from deliberate attacks, either internal or external, from individuals intentionally attempting to steal information, damage information, or otherwise deliberately wreak havoc in some manner.
* Some of the most normal types of violations include:
Breach of Confidentiality - Theft of private or confidential information, such as credit-card numbers, trade secrets, patents, secret formulas, manufacturing 
procedures, medical information, financial information, etc.
Breach of Integrity - illegal modification of data, which may have serious indirect outcomes. For example a popular game or other program's source code could be modified to open up security holes on users systems before beingreleased to the public.
Breach of Availability - Unauthorized destruction of data, frequent just for the "fun" of causing havoc and for bragging rites. Vandalism of web sites is a normal form of this violation.
Theft of Service - Illegal use of resources, such as theft of CPU cycles, 
installation of genius running an unauthorized file server, or tapping into the target's telephone or networking services.
Denial of Service, DOS - Restricting legitimate users from using the system, often by overloading and overwhelming the system with an excess of requests for 
service.
* One normal attack is masquerading, in which the attacker acts to be a trusted third party. A difference of this is the man-in-the-middle, in which the attacker masquerades as both ends of the conversation to two targets.
* A replay attack includes repeating a valid transmission. Sometimes this can be the entire attack, (such as repeating a request for a money transfer), or other times the content of the original message is replaced.
* There are four steps at which a system must be protected:
1. Physical - The simplest way to steal data is to pocket the backup tapes. Also, 
access to the root console will often give the user special advantages, such as 
rebooting the system as root from removable media. Even general access to 
terminals in a computer room offers some chances for an attacker, although 
today's modern high-speed networking environment gives more and more 
opportunities for remote attacks.
2. Human - There is some concern that the humans who are allowed access to a 
system be trustworthy, and that they cannot be pressured into breaching security. However more attacks today are made via social engineering, which basically means fooling trustworthypeople into accidentally breaching security.
* Phishing includes sending an innocent-looking e-mail or web site designed to fool people into revealing confidential information. E.g. spam e-mails acting to be from e-Bay, PayPal, or any of a number of banks or credit-card companies.
* Dumpster Diving includes searching the trash or other locations for passwords that are written down. (Note: Passwords that are too hard to remember, or which must be changed frequently are more likely to be written down somewhere close to the user's station.)
* Password Cracking involves divining user’s passwords, either by watching them type in their passwords, knowing something about them like their pet's names, or simply trying all words in common dictionaries. (Note: "Good" passwords should include a minimum number of characters, include non-alphabetical characters, and not appear in any dictionary (in any language), and should be changed often. Note also 
that it is proper protocol to look away from the keyboard while someone else is entering their password. )
3. Operating System - The OS must protect itself from security breaches, such as runaway processes (denial of service), memory-access violations, stack overflow 
violations, the starting of programs with excessive privileges, and many others.
4. Network - As network communications become ever more important and pervasive in modern computing environments, it becomes ever more important to protect this area of the system. (Both protecting the network itself from attack, and guarding the local system from attacks coming in through the network.) This is a growing area of concern as wireless communications and portable devices become more and more prevalent.



Popular posts from this blog

Human Factors in Designing User-Centric Engineering Solutions

Human factors play a pivotal role in the design and development of user-centric engineering solutions. The integration of human-centered design principles ensures that technology not only meets functional requirements but also aligns seamlessly with users' needs, abilities, and preferences. This approach recognizes the diversity among users and aims to create products and systems that are intuitive, efficient, and enjoyable to use. In this exploration, we will delve into the key aspects of human factors in designing user-centric engineering solutions, examining the importance of user research, usability, accessibility, and the overall user experience. User Research: Unveiling User Needs and Behaviors At the core of human-centered design lies comprehensive user research. Understanding the target audience is fundamental to creating solutions that resonate with users. This involves studying user needs, behaviors, and preferences through various methodologies such as surveys, interview...

Introduction to C Programs

INTRODUCTION The programming language ‘C’ was developed by Dennis Ritchie in the early 1970s at Bell Laboratories. Although C was first developed for writing system software, today it has become such a famous language that a various of software programs are written using this language. The main advantage of using C for programming is that it can be easily used on different types of computers. Many other programming languages such as C++ and Java are also based on C which means that you will be able to learn them easily in the future. Today, C is mostly used with the UNIX operating system. Structure of a C program A C program contains one or more functions, where a function is defined as a group of statements that perform a well-defined task.The program defines the structure of a C program. The statements in a function are written in a logical series to perform a particular task. The most important function is the main() function and is a part of every C program. Rather, the execution o...

Performance

Performance ( Optional ) * The I/O system is a main factor in overall system performance, and can place heavy loads on other main components of the system ( interrupt handling, process switching, bus contention, memory access and CPU load for device drivers just to name a few. ) * Interrupt handling can be relatively costly ( slow ), which causes programmed I/O to be faster than interrupt driven I/O when the time spent busy waiting is not excessive. * Network traffic can also loads a heavy load on the system. Consider for example the sequence of events that occur when a single character is typed in a telnet session, as shown in figure( And the fact that a similar group of events must happen in reverse to echo back the character that was typed. ) Sun uses in-kernel threads for the telnet daemon, improving the supportable number of simultaneous telnet sessions from the hundreds to the thousands.   fig: Intercomputer communications. * Rather systems use front-end processor...