A threat, in general, is a person or a thing likely to cause damage or danger. In computer security, a computer threat is a possible danger that might exploit vulnerability to breach security and therefore cause possible harm. A computer threat is any activity that can cause damage to private or any data of an user or organization or any system in ways like removing, stealing, manipulating etc. This can be more summarized to unauthorized access to data of a system and causing damage to that.
Malicious Software or Malware is any piece of software that disrupts computer operation, steal information, gain access to private systems or display unwanted advertising. Malware causes intentional harm, direct or indirect, to the computer by damaging files etc. or to the user by stealing sensitive information of the user from the computer etc. A software with bug causing unintentional harm is not a Malware. Malware are developed with targets which can be as simple as displaying ads to as serious as deleting or damaging files to stealing bank account or credit card information of the user.
CPU or central processing unit is an electronic circuitry that carries out the instruction given by a computer program. CPU execute instruction by performing basic arithmetic, logical, control and I/O operations as required per instruction. CPU is considered to be the brain of the computer. The speed and efficiency of a computer mostly depends that of it's CPU.
A motherboard is a printed circuit board (PCB) that holds other modular devices, both required and additional, and facilitate communication among the devices to actually have the computer be functional.
Motherboard is like a backbone to a computer system. Components like CPU, RAM, Harddisks along with additional devices like TV Cards, graphics etc. all initially connects to the motherboard. The motherboard enables the devices by ensuring power supply to the device, transferring instruction from and to the device etc.
An instruction set is the interface between a computer's software and its hardware, and thereby enables the independent development of these two computing realms. ISA is the set of basic instructions that a processor understands.
ISA includes functional definition of operations, modes, and storage locations supported by hardware and precise description of how to invoke, and access them.
The implementation stage of software development is the process of converting a system specification into an executable system. A software design is a description of the structure of the software to be implemented, the data which is part of the system, the interfaces between system components and, sometimes, the algorithms used. Designers design step by step to meet the finished design to be implemented in programming to crease an executable system out of the specification.
Thus, output of each stage of the design process is the input of the next stage. Stages continue until a finished design is met which includes all the specification and work involved in the development of the software.
INI files are simple text files with a basic structure consisting of sections, property and value. INI files can be used across different platform which is a great advantage as a single INI file can be used in various versions of the same application for various platforms. INI files are used to store configurations for applications in a manner of property = value. Values can be single or one dimensional array. Also sections can be used to group same type of configurations. The last thing is comments, we can write comments in INI files. Comments in INI files starts with ; (semicolon)
When we create management system or a CMS like application, we need to store a lot of configuration per user, per module etc. Multidimensional array is the best ever thing to work with in such situation. Configuration can be of two different types; searchable and not searchable. Searchable configurations are those which are used to filter a search result. For example various flags, tags, categories that we store with contents. We might need to filter contents with this flags, tags etc. No searchable configurations are like widget settings. We do not search for settings of an widget, rather we need those settings while rendering the widget.