Computer Based Training.



Computer Based Training  CBT :

                Computer based training may be abbreviated as computer based training and it means training through computer system. This may be a business pc or a terminal linked with mini or mainframe computer system. It may be used to train people in several hundreds different skills from using a word processing package to learning how to fly a jumbo jet.

            CBT are different programs that are supplied on CD-ROM. These programs include Text, graphics and sound, audio lectures are recorded on the CD’s. CBT is a low cost solution for educating people.



Benefit of Computer and CBT :

                CBT having a lot of benefit, few of which are given below :


  • A major benefit of computer based training for an employer is cost. The employer doesn’t have to pay for accommodations, traveling or salaries for the trainers while the staff attends a course. The investment in the suitable training, package may quickly pay for itself especially in case when suitable hardware is already available.
  • An advantages from the staff members point of view is that staff can train when they want, often at their own desks on the computer which they will eventually be using, without computer based training, when  the new members of staff join a company, they have to wait until there are sufficient members to justify a course for them, with CBT, they can start on their training immediately.
  • Another advantages for students is that they can study at their own pace and can repeat sections of materials that they find difficult. Some CBT products have built-in checks so that they can monitor the individual performance of each student.
  • Real life situations can be simulated and the student or trainee can learn without the danger of performing live experiments such as aircraft simulator particularly dangerous but rare situation such as the effects of ice forming on the wings in the sub-zero temperature can be modeled to give pilots experience without being in life threatening situations.



Benefit of CBT (computer based training) :

            CBT are different programs that have many important benefit as follows:


1). Students are learn new skills at their own place.
2). They can easily acquire knowledge in any available time of their own choice.
3). Teaching time can be reduced.
4). CBT contains interactive, attractive and easy material. It encourages the students to learn the topic.
5). Planning and timing problems are reduced or eliminated.
6). The skill can be taught at any time and at any place.
7). It is very cost effective way to train a large number of students locally or at distant places.

Software copyright.



Software Copyright :

                   “Software copyright is a law this law was devised in 1988. According to this law without the owner’s permission no one can make a copy of the software.”

               “Copyright software is that type of software in which belongs to a person and without the owner’s permission no one can make copy of the software.”



Conditions For Software Copyright :

                Provisions of the act make it illegal for copyright protected software to :

  • Copy Software.
  • Ron pirated software.
  • Transmit software over a telecommunication line there by creating a copy.



Advantages of Software Copyright :

1). According to this act, all rights of the copyright protected materials are reversed with the person or organization.

2). Without the permission of owners, no one can make a copy that material and if some one does so, he/she is a criminal according to this law.

3). The software copyright strictly prevents people other then its owner to make copies of the copyright protected software or use sell or buy it.

                         There have many cases in which the criminal is punished by the court in such a way that all the earning from illegal copyright is paid to its legal owner of the software.



Pirated Software :

                    “Pirated software is that type of software in which the software use illegally, sell, use or buy with the permission of the owner’s of that software is called or known as pirated software.” 

Hacking, Protection.



Hacking :
                         “To access someone’s personal data illegally (without owner’s permission) is called or known as hacking.”


 
Protection of Data From Hacking :

            A protection from hacking is must be provided to sensitive data most companies and government agencies or organizations use security techniques to protect their computer systems one common method is user identification codes and passwords to employers. If the user’s ID and password does not matches the records in the computer system security software’s the user is locked out of system.



Encryption :

            Encryption is the process of making the data in an unreadable form this is known as encryption.


Decryption :

            Decryption is the process of the converting data from an unreadable form to a readable form.


Similarly :

Powerful network operating system can also be used to provide strong protection against hacking such as LINUX and UNIX.

Hacking is Harmful :

            Hacking is harmful because:


  • ·        Personal Emails become open to hacker.
  • ·        Country top secretes, Bank accounts and top secretes of the companies cannot be remind confidential.
  • ·        Hacking is strictly against the data protection Act. In short all type of data cannot be remind protected and data privacy is lost.

Virus, Types of Viruses.



Virus :


            “A virus is a “deviant” program, stored on a compute hard drive that can cause unexpected and often undesirable effects as destroying or corrupting data or corrupting window.”  
 
            Viruses can also replicate themselves, and are dangerous because it will quickly use all available memory and bring the system to a halt. Viruses is a very harmful for our computers, laptops, mobiles, Mp3, etc. Virus is that thing which destroys or corrupts the important files to the computers, laptops, etc. An even more dangerous types of viruses is one capable of transmitting itself across networks and by passing security systems.



            
Types of Viruses :

There are many types of viruses some viruses are as follows :
  •  Logic Bomb.
  •  Time Bomb.
  •  (Tape) Worm.
  • Trojan Horse.
  • Boot-sector-infecting Virus.
  •  Multipartite Virus.   



  •  Logic Bomb :
            A Trojan horse, which is left with in a computing with the intent of it executing when some condition, occurs. The logic bomb could be triggered by a chance in a file, by a particular input sequence to the program, or at a particular input sequence to the program, or at a particular time or date logic bomb get their name from malicious action that they can take when triggered. 

  • Time Bomb :
            A logic bomb is that type of virus which is activated at a certain time or data.

  • (Tape) Worm :
A worm is a program that spreads (usually) over network connections. Unlike a virus, it does not attach itself to a host program. In practice, worms are normally not associated with personal computer system. The example of (tape) worm is blaster worm.

  • Trojan Horse :
            A Trojan horse is a program intended to perform some convert and, usually, unwanted act which the victim did not expect or want. It differ from a destructive virus in that it doesn’t reproduce through this distinction is by no means universally accepted e.g. Format C.

  • Boot-Sector-Inflecting Virus :
            Boot-Sector-Inflecting Virus infect the boot records of hard disk and diskettes and are executed when the system is booted from the hard disk or diskette and installs its own code in the system’s memory so that it can infect other hard disks or diskette later. e.g. Disk killer, Stone virus.