BASIC COMPUTER FUNDAMENTALS

Number System
We have already know that inside a computer system, data is stored in a format that cannot be easily read by human beings.

Number system are basically of to types:

  1. Non-positional number system
  2. Positional number system

Non-positional number system

In early days, human beings counted on fingers or with the help of stones,pebbles, or sticks.This method of counting known as non-positional number system. In this system we have symbols such as I to 1,II for 2 etc.

Positional number system

The number system that we use in our day to day life is called decimal number system or positional number system.in this system the base is 10 because there are ten digits or symbols(0,1,2,3,4,5,6,7,8,9).

Binary number system

The binary number system is exactly like the decimal number system . In this system the base is 2 instead of 10.We have only two digits 0 and 1 because of its base. 

Octal number system

In octal number system the base is 8. So in this system there are 8 digits (0,1,2,3,4,5,6,7) in this system the largest  single digit is 7.

Hexadecimal number system

The hexadecimal number system is one with a base of 16. The base 16 gives a  choice of 16 single digits or symbols.The first 10 digits are the digits of decimal number system 0,1,2,3,4,5,6,7,8,9. The remaining six digits are denoted by A,B,C,D,E,F representing the  decimal values 10,11,12,13,14,15 respectively.

Computer memory is measured in terms of how many bits it can store. Here is a chart for memory capacity conversion.

  • 1 byte (B) = 8 bits
  • 1 Kilobytes (KB) = 1024 bytes
  • 1 Megabyte (MB) = 1024 KB
  • 1 Gigabyte (GB) = 1024 MB
  • 1 Terabyte (TB) = 1024 GB
  • 1 Exabyte (EB) = 1024 PB
  • 1 Zettabyte = 1024 EB
  • 1 Yottabyte (YB) = 1024 ZB

Number System Relationship

The following table depicts the relationship between decimal, binary, octal and hexadecimal number systems.

HEXADECIMALDECIMALOCTALBINARY
0000000
1110001
2220010
3330011
4440100
5550101
6660110
7770111
88101000
99111001
A10121010
B11131011
C12141100
D13151101
E14161110
F15171111

Decimal to Binary

Decimal numbers can be converted to binary by repeated division of the number by 2 while recording the remainder. Let’s take an example to see how this happens.

Decimal To Binary

The remainders are to be read from bottom to top to obtain the binary equivalent.

4310 = 1010112

Decimal to Octal

Decimal numbers can be converted to octal by repeated division of the number by 8 while recording the remainder. Let’s take an example to see how this happens.

Decimal To Octal

Reading the remainders from bottom to top,

47310 = 7318

Decimal to Hexadecimal

Decimal numbers can be converted to octal by repeated division of the number by 16 while recording the remainder. Let’s take an example to see how this happens.

Decimal To Hexadecimal

Reading the remainders from bottom to top we get,

42310 = 1A716

Binary to Octal and Vice Versa

To convert a binary number to octal number, these steps are followed −

  • Starting from the least significant bit, make groups of three bits.
  • If there are one or two bits less in making the groups, 0s can be added after the most significant bit
  • Convert each group into its equivalent octal number

Let’s take an example to understand this.

Binary To Octal

101100101012 = 26258

To convert an octal number to binary, each octal digit is converted to its 3-bit binary equivalent according to this table.

Octal Digit01234567
Binary Equivalent000001010011100101110111

546738 = 1011001101110112

Binary to Hexadecimal

To convert a binary number to hexadecimal number, these steps are followed −

  • Starting from the least significant bit, make groups of four bits.
  • If there are one or two bits less in making the groups, 0s can be added after the most significant bit.
  • Convert each group into its equivalent octal number.

Let’s take an example to understand this.

Binary To Hexadecimal

101101101012 = DB516

To convert an octal number to binary, each octal digit is converted to its 3-bit binary equivalent.

Binary to Decimal

The decimal number is equal to the sum of binary digits (dn) times their power of 2 (2n):

decimal = d0×20 + d1×21 + d2×22 + …

Example #1

Find the decimal value of 1110012:

binary number:111001
power of 2:252423222120

1110012 = 1⋅25+1⋅24+1⋅23+0⋅22+0⋅21+1⋅20 = 5710

Octal to Decimal

Octal to Decimal conversion is just like the Binary to Decimal

Therefore, (140)8 = (96)10.

Octal to Decimal Conversion

Another Example:

(246.28)8 = (166.375)10.

Octal to Decimal With Decimal Point

Hexa to Decimal

hexa to decimal is similar to other conversions the base is 16 use at the place of 8 or 2 in hexa decimal numbers.

  1. Example 1: Convert (5BC)16 into the decimal system.
  2. Solution:To find: (5BC)16 in the decimal systemIn Hexadecimal system,5 = 5 B = 11 C = 12 Using hexadecimal to decimal formula,(5BC)16 
  3. = ( 5 × 162 + 11 × 161 + 12 × 160 )
  4. 5 × 256 + 11 × 16 + 12× 1
  5. (1468)10
  6.  Therefore, (5BC)16 =(1468)10

Arithmetic Operations of Binary Numbers

Binary is a base-2 number system that uses two states 0 and 1 to represent a number. 

Binary additions and subtractions are performed as same in decimal additions and subtractions. When we perform binary additions, there will be two outputs: Sum (S) and Carry (C). 

1. There are four rules for binary addition: 

2. There are four rules for binary subtraction: 

3. There are four rules for binary multiplication: 

Multiplication is always 0, whenever at least one input is 0. 

4. There are four parts in any division: Dividend, Divisor, quotient, and remainder.  

What Is Computer Virus ?

A program virus is nothing but a small program written by someone to corrupt or damage the information stored in the computer system , and to replicate itself from one computer to another.

These viruses spread when someone copies a virus infected programs from one computer and runs it on some other computer.

A virus cannot spread by using any data file such as text file , image file , sound file , etc.

A virus needs some kind of executable program such as, .EXE , .COM , .SYS ,Windows, etc. 

A virus can even delete everything on the hard disk. 

Computer viruses can be attached by funny images , Greeting Card , Audios & Videos

A virus can be divided into different types:

  1. WORM
  2. TORJAN
  3. BOMB
  4. MBR (PARTITION TABLE) INFECTOR
  5. DBR (BOOT DECTOR) INFECTOR
  6. PROGRAM / FILE INFECTOR (PARASITIC VIRUS)
  7. MULTIPARTILE VIRUSES
  8. STEALTH VIRUSES
  9. POLYMORPHIC VIRUSES
  10. MACRO VIRUS
  11. WEB APPLET VIRUS

Explanation:-

WORM 

Worms were one of the first computer viruses . A program written as worm virus normally do not do any destructive work, a worm’s main work is to replicate itself . The original worm programs were made as experimental programs in computer labs to test if a program can be made to replicate itself. Most of the current viruses contain a worm program in them to manage the replication part of the virus. 

TROJAN 

 Trojan is a name given to those programs that appear as some useful utility, but they contain hidden destructive parts . A virus that has infected a useful .Com or .EXE programs makes that executable program a Trojan , the virus will become active and starts doing its job. A pure Trojan virus does not replicate itself , but currently most of the virus contain a Trojan , as well as worm , so a useful looking program can destroy the data as well as replicate itself.

BOMB 

Another type of virus program is known as bombs. These are the programs that waits for some specific event event to occur and when that particular event occurs the bomb become active destroying or corrupting the information inside the computer. A virus may contain bomb ,whom and the Trojan horse all the three parts, to effectively replicate and destroy data.

MBR (PARTITION TABLE) INFECTOR

A virus can also be classified based on the area infected by a virus . A MBR or Partition table infector viruses infects the Master Boot Recorder(MBR) of the hard disk drive . These viruses become active every time the machine is booted from the hard disk drive , because during booting , first thing the BIOS does it to execute the program located in the MBR. Removing a MBR virus is very , easy as one needs to just overwrite the infected MBR code with a good MBR code

DBR (BOOT SECTOR) INFECTOR

Another virus type based on the area infected by them is DBR or DOS Boot Record infector viruses . These viruses very commonly spread through infected floppy disks. These viruses also infect the hard disk drive’s DOS partition’s boot sector and every time the machine is switched on and booted from the hard disk drive the virus becomes active in the memory.

PROGRAM/FILE INFECTOR (PARASITIC VIRUS)

Another type of virus do not infect the MBR or the DBR , instead they attach themselves to some executable program such as .EXE, .COM, .SYS, .OVL, .BIN, etc . These viruses turn the useful program which they infect into Trojan programs , anytime these infected programs are executed , the virus becomes active in memory and starts its work of replication and destruction.

MULTIPARTILE VIRUSES

A virus can contain all the above three infectors , MBR, DBR and the program infector parts in its program . This type of virus program is called multipatile virus.

STEALTH VIRUSES

Stealth viruses are special type of viruses , once they become active in memory they conceal themselves from detection . These viruses hide themselves from detection by a virus scanner, by constantly changing their code. This method used by these viruses is they copy the original part of the infected portion of the disk or program , into some other part and when the virus is active in memory , every time a scanning program checks, the uninfected part is shown to the scanner program.

POLYMORPHIC VIRUSES

Viruses that change their appearance by using the encryption method to avoid detection are known as polymorphic viruses. These viruses change their codes with each run by using some encryption viruses code and also they change their encryption method with each run making it very difficult to detect this type of viruses by using the simple virus scanning method.  Continually change its appearance , This makes detection of virus using scanning method a very difficult job.

MACRO VIRUS

Macro viruses appeared after the introduction of macros in the various applications such as spreadsheet , word processor etc. Most of the macro viruses are written to infect Microsoft Word and MS EXEL. To protect from macro virus one should never open a document with attachment , without scanning it first with latest virus scanner.

WEB APPLET VIRUS

A new type of virus can be made in the web scripting language such as Active X, JavaScript , Java,etc. When a web page containing infected Active X, Javascript or Java code is opened , the virus will infect your system. Once the virus becomes active it can do all the works done by a virus such as destroying data , spreading itself etc.  

Where do viruses live ?

A virus can never spread if you copy the data file from one infected floppy or hard disk drive and use it on some other clean system .on this type of situation only chance of infection comes if the date file contain some macro and is infected with a macro virus.

Keeping virus away?

To prevent a virus infection one can take some precautions such as 

  1. Don’t use pirated software 
  2. Get shareware for some reputed company /BBS
  3. Run virus scanner /checker program regularly 
  4. Use a memory resident anti virus program 
  5. Always keep current version of anti virus software
  6. Backup the date regularly 
  7. Watch out when you get a service engineer’s visit 
  8. Don’t open e-mail attachments from unknown address
  9. Take care when downloading files from internet 

VIRUS INFECTION SYMPTOMS?

Some of the very common symptoms shown by a system infected by a virus are given next.

  1. Unexplained slowdown of the system 
  2. Decrease in the amount of available memory
  3. Increases in bad sector /lost cluster etc.
  4. Can’t  execute   executable file
  5. Screen shows some unusual outputs
  6. Drive’s light turns on
  7. New”.com”  files appear for the “.exe” files

ANTI-VIRUS SOFTWARE 

There are basically four type of antivirus software, they  are

  • Checksum (crc) type 
  • TSR (activity monitor) type 
  • Scanner type 
  • Program screeners

WHAT TO DO AFTER INFECTION ?

Once the system becomes infected with virus, your first aim should be to recover as much as important data as possible. Next ,you should try to remove the infection from the system

If the virus cannot be removed them you can delete the infected file, format the drive unconditionally ,so that no undelete information is saved or you can low-level format the drive to remove any trace of the virus.

If the virus has infected MBR,DBR or some executable programs then you can recover from this 

AFTER RECOVERY

Once the virus is removed from the system, you need to do some data recovery. The  virus might have destroyed some data ,deleted some files , or corrupted the FAT(File Allocation Table) etc. Run the SCANDISK or CHKDSK program to find out if any lost clusters or some other logical error exists on the drive. Convert any lost cluster into file and check these files for any useful data.

SOME COMMON VIRUS MYTHS

  1. Virus can destroy all data on disk
  2. If a file is damaged it must be some virus infection
  3. Virus can hide in data file 
  4. Data Backup after virus infection is useless
  5. Read/Only files are safe from virus
  6. Write protected floppies can be infected by virus
  7. Anti-virus software or hardware can protect from all viruses       

Anti-virus

Anti-virus is a security program you install on your computer or mobile device to protect it from getting infected by malware.