|Scooped by newinfo|
Is your computer infected with FBI viriants?
Computer systems used by electronic circuit and a physical device, is visible, tangible entity, such as the central processing unit (CPU), memory, peripheral devices (input/output devices, the I/O devices), bus and so on. Personal computer (PC: personalcomputer) the main structure of the host: motherboard, CPU (central processing unit), main memory (ram), expansion card, display card, sound card, network card and so on some motherboard can integrate these), power supply, optical drive, secondary storage (disk) peripherals: display, keyboard, mouse, speakers, cameras, external modems MODEM, etc.).
The graphics card
To enable the computer hardware system program set the floorboard of the smooth and effective work. Program is always want to pass some kind of physical media for storing and presentation, disk, tape, application paper, punch card, etc., but the software does not mean that these physical media, but to those who can't see, touch not the program itself. Reliable computer hardware as one of the strong physique, effective software as one of the intelligent thinking. Computer software system can be divided into system software and application software two parts. System software is responsible for the management of the entire computer system resources, scheduling, monitoring, and service. Application software is to point to different areas of the needs of users for their development of a variety of applications. Computer software system including:
(1) operating system: the core of the system software, it is responsible for all kinds of soft and hard resources in a computer system management, control and monitoring.
(2) database management system, responsible for all the documents and data in a computer system and data management and sharing.
(3) build system: responsible for the users to compile the source program written in a high-level language into machine by machine language can understand and execute.
: (4) network system is responsible for organizing and managing computer system of network resources, making it more able to mutual independent computer resource sharing and communication.
5. Standard library: a collection of programs written in standard format, these standard procedures include solving the elementary function, system of linear equations, ordinary differential equations, numerical integral calculating program, etc.
6. Service program: also known as utility. In order to enhance the service function of the computer system and provide all kinds of programs, including the device of the user program, connections, edit, debug, error correction, diagnosis, and other functions. In order to make the computers can calculate quickly and accurately, remember more and, for decades, to improve the single machine processing speed and accuracy of the central processing unit (CPU), to improve the access speed and capacity of the memory made many improvements, such as: increase the basic arithmetic unit of word length and improve the precision of the arithmetic unit; Add new data types, or to a custom data, the data identifier, to the difference between instruction and several, and that data type; Within the CPU adding general-purpose registers, USES the index register, increase of indirect addressing function and high-speed buffer memory and the stack technology; Use interleaved memory technology and virtual storage technology; Use instruction pipelining and the operation assembly line; By using multiple features and additional coprocessor, etc.
Fully tap the potential of a single processor, people turned to the development of parallel processing technology. At the beginning of the (1952) are designed in parallel arithmetic logic unit, then adopted the multifunctional components, namely, set up in the central processing unit (CPU) are independent of each other, and can work at the same time feature. After 30 years of development, with a single processor of a computer system, the performance has reached a quite high level, a vector supercomputer is the crystallization of technology from this period.
Read the detailed info to remove FBI virus variants, http://guides.yoosecurity.com/how-remove-fbi-moneypak-virus-malware-that-blocked-pc-asks-for-payment-100-dollars/#fbi-virus-variants