Uploaded by queen heart

Presentation Topics

advertisement
BS CS Presentation Topics
Group A
(1) Printer
➢ Impact Printer
➢ Non-Impact Printer
Imran Amjad
M.Abdullah Shafique
Hamza Sajjad
Group B
M.Abdullah
Shahzaib Arshad
Adeel Shehzad
(1) Von Neumann Architecture and also differentiate between RISC and CISC Architecture
(2) Registers and Busses
Group C
Muneeb Ali
Shawaiz Khan
(1) Types of Expansion Cards
(2) Virus and Anti-Virus
Group D
Ahmed Zakriya
Shahab
Abdul Basit
(1) Machine Cycle & Types of processor
(2) ROM
➢ Types of ROM
Group E
Saifullah Ejaz
Usman Nazakat
Musa Ashraf
(1)
(2)
(3)
(4)
Binary Addition
Binary Subtraction
1’s complement
2’s Complement
Group F
Ali Hamza
Azhar
Aleem Abbas
(1) Computer Codes
➢ BCD
➢ ASCII
➢ EBCDIC
Group G
Waleed Aslam
(1) Mouse
➢ Types of Mouse
Group H
Fatima Shuaib
Zahika
Fatima Batool
(1) Keyboard
➢ Types of Keyboard
Group I
M Sami
Usman Mehmood
Shahzaib Sajid
(1) Monitor
➢
➢
➢
➢
➢
➢
➢
➢
CRT (cathode ray tube) monitor
LCD (liquid crystal display) monitors
TFT Monitor
LED (light-emitting diodes) Monitors
DLP Monitor
Touchscreens Monitor.
Plasma Screen Monitor.
OLED Monitors.
Group J
Ashir Azeem
Ahmad Saeed
Syed Wahab
(1) Storage Devices
➢ Magnetic Storage
➢ Floppy Drive
➢ Hard Disk
➢ Tape Drive
(2) Disk Formatting
Group K
Rohma Imran
Tanzeela kausar
Alina Fatima
(1) Operating System →
➢ Batch Processing Operating System
➢ Real-time Operating System
➢ Single-User Operating System
➢ Multi-Tasking Operating System
➢ Multi-User Operating System
➢ Distributed Operating System
Group L
Amna Shaukat
Amna Javed
Sidra
(1) What is E-commerce?, Advantages and disadvantages of e-commerce, e-commerce
business models
(2) Types of E-commerce websites, implementing web-based e-commerce, examples of ecommerce websites
Group M
Ayesha Ahmad
Tayyaba Sardar
Ayesha Naseer
(1) Why Be Concerned About Network and Internet Security?, Unauthorized Access and
Unauthorized Use, Hacking, War Driving and Wi-Fi Piggybacking, Interception of
Communications, Protecting Against Unauthorized Access and Unauthorized Use,
Access Control Systems, Firewalls, Encryption, and Virtual Private Networks (VPNs),
Additional Public Hotspot Precautions, Sensible Employee Precautions
Note: Every Group prepared topic all aspects complete
Muhammad Bilal
Superior University Faisalabad Campus
Download