Disadvantages Of Existing Pen Drives Computer Science Essay

Published: Last Edited:

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

This product protects the pen drive data from the virus attack. It contains inbuilt antivirus software which runs on pen drive and checks for the virus when there is data transfer from the system to the pen drive. This pen drive contains features like built in battery, Bluetooth, solar panels.

Pen drives are usually used for the data transfer and unknowingly it also contains virus which is a big problem in present day's .Even in multinational national companies (MNC) management people are not allowing pen drives for office use due to this virus problem.

This paper deals with the product used to check the virus when there is data transfer between system to the pen drive. It contains inbuilt antivirus software which checks for virus whenever there is data transfer. And it also contains features like Bluetooth and built in battery, Bluetooth is used for the software updation in the pen drive; solar panels are used for the power generation and built in battery for the power storage.

Disadvantages of existing pen drives:

Generally any pen drive used for the data transfer will not check for virus in the data.

Data can be easily attacked by malwares

The existing pen drives cannot transmit data unless it is connected to a computer.

photon and reliance internet devices which are using presently cannot store the data (they can only receive signals from servers)

Present day pen drives are not equipped with built in power storage capacity and Bluetooth options.


This product can detect the virus when data is being copied from system to the pen drive and deletes the virus permanently.

This device can act as a master (i.e.) by simply switching on the power button or Bluetooth button it acts accordingly.

This product is provided with a solar panel strip and can store the required power for updating the software present in the pen drive as well as for blue tooth communications.

Via Bluetooth and data card it can communicate with Bluetooth devices and other mobile devices to update / store information.

We can send small sized data to pen drive without any physical connection.

Self dependent, because other equipments are not required to drive Bluetooth and virus and it also contains solar panels for power generation.

Wireless data transfer without virus.

2. (a) Software used in this product:

Antivirus segment- JAVA , Any programming language.

To update / store information through Wireless communication- synchronization with the other devices (Mobile software) via Bluetooth technology


For the identification of virus segments we will maintain 3 constraints like we all know that we have three different virus they are warm, trapdoor, Trojan horse .If we maintain these three types of constraints we can easily identify the virus and we can use proper antivirus software's and delete it permanently. One of the chief purposes of many viruses is to steal your computer resources. Keep a log of when you get errors, what you were doing when it happened and how bad the error was. When you aren't doing anything, then it's likely being controlled by a virus or someone who set up the virus.


Virus is nothing but an empty space , so if you are able to find the empty spaces in the data it is easy to delete the virus.

This is one simple program to find out the empty spaces and deletes the empty spaces with the user authentication.

Sample coding:



void main()


char ch1[500],ch2[500],ch;

int flag=0,i=-1,count=0;


printf(" To terminate The string press CTRL+B ");

printf("\nEnter the string:");


{ i++;


if(!(ch1[i]^' '))


if(!(flag^0)& !(ch1[i]^' '))




printf("TOTAL NO OF BLANK SPACES IS : %d\n",count);



printf(" Do you want to delete Empty/Blank spaces (y/n) :");








if(ch1[i]^' ')







printf(" you have pressed no so the empty spaces cannot be deleted");



printf("no spaces occured for authentatcation");



2. (b) Hardware used in this product:

Solar panel strip for the power generation.

Battery for storing the electric charge, flash memory for digital storage of data.

Fig1.Schematic representation of the product

3. Enhancements:


Solar panels

Internet technologies

3 (a).Bluetooth:

Bluetooth is an open wireless protocol for exchanging data over short distances from fixed and mobile devices, creating personal area networks (PANs). It was originally conceived as a wireless alternative to RS232 data cables. It can connect several devices, overcoming problems of synchronization. Bluetooth uses a radio technology called frequency-hopping spread spectrum, which chops up the data being sent and transmits chunks of it on up to 79 frequencies. In its basic mode, the modulation is Gaussian frequency-shift keying (GFSK). It can achieve a gross data rate of 1 Mb/s.

In this application Bluetooth is used for the data transfer from mobiles to pen drives .In this class 1 range devices are used for data transfer(It can transmit data up to 100 meters)

Bluetooth communication between mobile phone and pen drive.

Fig2.Schematic representation of Bluetooth

Through internet the required update for antivirus software is downloaded in mobile and via Bluetooth the data is sent to pen drive and antivirus software is updated.

The power required for Bluetooth is provided by the battery present in the pen drive.

Present day pen drives are not equipped with this technology.

Through Bluetooth we can send the small size data to pen drive from any device, but in present day pen drives if you want to copy the data you need to insert the USB modem to the system.

Fig3.interface with the mobile from pen drive

3 (b).Solar panels:

A photovoltaic module or photovoltaic panel is a packaged interconnected assembly of photovoltaic cells, also known as solar cells. Because a single photovoltaic module can only produce a certain amount of wattage, installations intended to produce larger electrical power capacity require an installation of several modules or panels and this is known as a photovoltaic array.

We use solar panels to generate the power.

The battery of 5v is attached to it to store the power

Solar power is used for wireless data transfer from mobiles/ computers to pen drive.

The present day pen drives don't have this option.

This pen drive can act as a master by activating the power button; it will perform the operations like data transfer / antivirus updation.

Solar cells produce DC which must be converted to AC (using a grid tie inverter) when used in current existing distribution grids.

3 (c).Internet technologies:

TATA PHOTON and RELIANCE RCARD are used only as a wireless modem and it lacks in data storage

Antivirus software in pen drive is updated through these devices in absence of blue tooth equipped mobiles.

Issues to be solved:

The data transfer rate from system to pen drive is low because the pen drive checks for virus during copying.

Cost is high as this pen drive is equipped with battery, Bluetooth, solar panels.

Future Enhancements:

The data transfer rate can be increased.

Software updation can be done without Bluetooth by direct access through data base server.

4. Conclusion:

The ultimate aim of this product is to avoid data corruption prevailing during data transfer from computer to pen drive. With this product we can achieve virus free data transfer with an updating of antivirus software via wireless internet and Bluetooth. This product can act as a wireless data transfer /storage device with the help of the inbuilt battery.