Virus
β οΈ Is the most common type of malware,
and it's defined as a malicious program that can execute itself and spreads by infecting other programs or files.
β οΈ A virus is a piece of software that can "infect" other programs by modifying them.
β οΈ Similar to biological virus: Replicates and Spreads Some exists to simply replicate
themselves.
β οΈ Others can do serious damage such as erasing fileβ¦
@Computer_science_course
β οΈ Is the most common type of malware,
and it's defined as a malicious program that can execute itself and spreads by infecting other programs or files.
β οΈ A virus is a piece of software that can "infect" other programs by modifying them.
β οΈ Similar to biological virus: Replicates and Spreads Some exists to simply replicate
themselves.
β οΈ Others can do serious damage such as erasing fileβ¦
@Computer_science_course
Worm
β οΈIs a type of malware that can self-replicate without a host program.
β οΈ Worms typically spread without any human interaction or directives from the malware authors.
β οΈ A Trojan horse is a malicious program that is designed to appear as a legitimate program.
β οΈ once activated following installation, Trojans can execute their malicious functions.
@Computer_science_course
β οΈIs a type of malware that can self-replicate without a host program.
β οΈ Worms typically spread without any human interaction or directives from the malware authors.
β οΈ A Trojan horse is a malicious program that is designed to appear as a legitimate program.
β οΈ once activated following installation, Trojans can execute their malicious functions.
@Computer_science_course
Spyware
β οΈ Is a kind of malware that is designed to collect information and data on users and observe their activity without users' knowledge.
Other types of malware include functions or features designed for a specific purpose.
Ransomware
β οΈ for example, is designed to infect a user's system and encrypt the data.
β οΈ Cybercriminals then demand a ransom payment from the victim in exchange for decrypting the system's data.
@Computer_science_course
β οΈ Is a kind of malware that is designed to collect information and data on users and observe their activity without users' knowledge.
Other types of malware include functions or features designed for a specific purpose.
Ransomware
β οΈ for example, is designed to infect a user's system and encrypt the data.
β οΈ Cybercriminals then demand a ransom payment from the victim in exchange for decrypting the system's data.
@Computer_science_course
Computer Number System
1. Bit:
π Is the smallest unit of data representation.
π Is a space that can hold a single state.
2. Byte:
π Is the smallest unit of data measurement.
π Is a single group of 8 bits. [1 Byte = 8 Bits.]
3. Word:
π Is a group of 8 Bytes. [1 word = 8 Bytes.]
@Computer_science_course
1. Bit:
π Is the smallest unit of data representation.
π Is a space that can hold a single state.
2. Byte:
π Is the smallest unit of data measurement.
π Is a single group of 8 bits. [1 Byte = 8 Bits.]
3. Word:
π Is a group of 8 Bytes. [1 word = 8 Bytes.]
@Computer_science_course
Decimal Number System
Z = {0,1,2,3,4,5,6,7,8,9};
Base = 10
π Each position to the left of a digit increases by a power of 10.
π Each position to the right of a digit decreases by a power of 10.
@Computer_science_course
Z = {0,1,2,3,4,5,6,7,8,9};
Base = 10
π Each position to the left of a digit increases by a power of 10.
π Each position to the right of a digit decreases by a power of 10.
@Computer_science_course
Binary Number System
π Has two states 1(ON state)
and 0(OFF state).
Z = {0,1};
Base = 2
Unsigned number representation
With n bits we can represent 2^n unsigned integer numbers.
β οΈRemember: This ^ Indicates The Power Of
βοΈ Range: from 0 to 2^n -1
So with 8 bits we can represent 2^8 = (256) numbers from 0 to 2^8 -1 = (255).
π Each position to the left of a digit increases by a power of 2.
π Each position to the right of a digit decreases by a power of 2.
Example:
(11001)2 = 1*2^0 + 0*2^1 + 0*2^2 + 1*2^3 + 1*2^4
= (25)10
@Computer_science_course
π Has two states 1(ON state)
and 0(OFF state).
Z = {0,1};
Base = 2
Unsigned number representation
With n bits we can represent 2^n unsigned integer numbers.
β οΈRemember: This ^ Indicates The Power Of
βοΈ Range: from 0 to 2^n -1
So with 8 bits we can represent 2^8 = (256) numbers from 0 to 2^8 -1 = (255).
π Each position to the left of a digit increases by a power of 2.
π Each position to the right of a digit decreases by a power of 2.
Example:
(11001)2 = 1*2^0 + 0*2^1 + 0*2^2 + 1*2^3 + 1*2^4
= (25)10
@Computer_science_course
Signed number representation
βΆοΈ Here we would need to consider sign, meaning we represent both positive and negative numbers.
π Sign and magnitude
With this method we reserve the most significant bit of the left most bit for sign.
This bit is called sign bit.
range becomes from -2^n-1 -1 to 2^n-1 -1
@Computer_science_course
βΆοΈ Here we would need to consider sign, meaning we represent both positive and negative numbers.
π Sign and magnitude
With this method we reserve the most significant bit of the left most bit for sign.
This bit is called sign bit.
range becomes from -2^n-1 -1 to 2^n-1 -1
@Computer_science_course
Octal Number System
Z = {0,1,2,3,4,5,6,7};
Base = 8
π Each position to the left of a digit increases by a power of 8.
π Each position to the right of a digit decreases by a power of 8.
@Computer_science_course
Z = {0,1,2,3,4,5,6,7};
Base = 8
π Each position to the left of a digit increases by a power of 8.
π Each position to the right of a digit decreases by a power of 8.
@Computer_science_course
Hexadecimal Number System
Z = (0,1,2,3,4,5,6,7,8,9, A, B, C, D, E, F};
Base = 16
π Each position to the left of a digit increases by a power of 16.
π Each position to the right of a digit decreases by a power of 16.
@Computer_science_course
Z = (0,1,2,3,4,5,6,7,8,9, A, B, C, D, E, F};
Base = 16
π Each position to the left of a digit increases by a power of 16.
π Each position to the right of a digit decreases by a power of 16.
@Computer_science_course