Archive

How does the Trojan Horse attack a processor or a computer in general?How does it enter the computer or any other device? Does it spread or no?

Read more

What do you mean by a computer virus, a worm, and a Trojan horse? What is the difference between each one of them?

Read more

What do you mean by the term malware and what does adware mean? What is the difference between these two?

Read more

Why is it not safe to download free software from the Internet? What is the effect of downloading one? What care must be taken to avoid the danger?

Read more

What do you mean by the term cyber security? What is the primary motive of cyber security? What are the pros of it and its disadvantages?

Read more

What do you mean by the term cyber-attack? What is its purpose? What are the types of cyber-attacks? 

Read more

There are processors of various sizes available. What is the use of a processor with a bigger size? Does it have any advantages? (Compare a 32-bit and 64-bit processor)

Read more

Processors are fixed/placed into various devices like phones, laptops, computers, etc. What are such processors called? What are the characteristics considered to design them?

Read more

Which processor do all the Apple products use and what are its advantages?

Read more

In a processor what is an Architectural Register and what is its purpose? Why is it necessary to make it available to the compiler or programmer?

Read more