SlideShare a Scribd company logo
1 of 24
Operating System vs. Virus
Introduction to Computers / Word Processing
Chap 2B: OS vs. Virus 2
Operating System is the most important
program that runs on a computer.
Operating System vs. Virus
It is considered as the “brain” of the
computer system.
It is used to run other programs such as
MS Office and all other programs installed in
the computer system.
Chap 2B: OS vs. Virus 3
Without the OS the computer system is
practically useless.
Operating System vs. Virus
On the other hand, a computer virus is
a computer program that disturbs or interfere
the smooth operation of the computer system.
It can delete or corrupt computer data,
thus nobody wants this program inside the
computer system.
Chap 2B: OS vs. Virus 4
Operating System
The OS is the manager of all the computer
system’s hardware and software.
In layman’s term, the OS is a computer program
that provides an interface for the user to
communicate with the computer.
Operating system is a collection of
programs that controls how the CPU, memory,
and I/O devices work together.
Chap 2B: OS vs. Virus 5
Operating System
 Organizes and manages files and directories.
 Controls how data and instructions are
loaded and executed by the CPU.
 Coordinates the CPU, memory, and
peripheral devices.
Some of the functions of an OS:
 Recognizes input from the keyboard and
sends output to the display screen.
Chap 2B: OS vs. Virus 6
Primary Purpose of an OS:
Operating System
Maximize the productivity of a computer
system by operating in the most efficient
manner and minimizing the amount of human
intervention.
Chap 2B: OS vs. Virus 7
Operating System
Most modern OSes utilizes a user
interface to make interacting with the
computer easy.
The goal of user interface is to be “user-
friendly”, which means that the software can
be used easily by individuals with limited
training.
Chap 2B: OS vs. Virus 8
Operating System
- it utilizes windows, icons, menus, and
pointers.
Graphical User Interface (GUI)
- a user interface that displays graphics in
addition to text when it communicates with
the user.
Chap 2B: OS vs. Virus 9
USERS
Operating System
DISK
CPU
NETWORK
APPLICATION
PROGRAMS
I/O
DEVICES
OS
(NUCLEUS)
Chap 2B: OS vs. Virus 10
A computer virus is a small self-
duplicating computer program that attaches
itself to some other program and spreads from
one computer to another, interfering with
computer operation.
Computer Virus
 It can use an e-mail program to spread the
virus to other computers
 It can delete everything on the hard disk.
Chap 2B: OS vs. Virus 11
How do computer viruses infection occur?
 They most easily spread by attachments in
e-mail messages.
Computer Virus
 It can arrive on a flash drives.
 Computer viruses also spread by using
downloads on the Internet.
Chap 2B: OS vs. Virus 12
 The computer runs slower than usual.
Computer Virus Indicators
Primary indicators of computer virus infection:
 The computer stops responding, or it locks up
frequently.
 The computer restarts on its own every few
minutes and does not run as usual.
 Computer applications do not work correctly.
 Disks or disk drives are inaccessible.
Chap 2B: OS vs. Virus 13
Computer Virus Indicators
 There’s a double extension on attachment
that’s recently opened (e.g. .jpg, .gif, or .exe).
 Antivirus program cannot be restarted or is
disabled for no reason.
 Antivirus program cannot be installed or won’t
run on the computer.
 New icons appear on the desktop that are not
placed there or not even associated with any
recently installed programs.
Chap 2B: OS vs. Virus 14
1949, John von Neumann proposed that it was
theoretically possible for a computer
program to replicate.
1950s, the theory was tested at Bell
Laboratories through the development of
Core Wars, where players created tiny
computer programs that attacked, erased,
and tried to propagate on an opponent's
system.
Origin of Computer Virus
Chap 2B: OS vs. Virus 15
1985, the first Trojan horses appeared, posing
as a graphics-enhancing program called
EGABTR and as a game called NUKE-LA.
Origin of Computer Virus
1986, the Brain virus appeared and spread
worldwide by 1987.
1983, American Electrical Engineer Fred
Cohen, coined the term virus to describe a
self-replicating computer program.
Chap 2B: OS vs. Virus 16
1988, two new viruses appeared: the Stone
virus, and Internet worm.
1989, the Dark Avenger, the first fast infector
virus, followed by the first Polymorphic
virus in 1990.
Origin of Computer Virus
1995, the WinWord Concept virus, was
created.
Chap 2B: OS vs. Virus 17
1999, the Melissa macro virus, which costs
corporations millions of dollars due to
computer downtime and lost productivity.
Origin of Computer Virus
2000, the VBS_LOVELETTER virus, a.k.a. the
Love Bug and the ILOVEYOU virus in
which losses were estimated at $10 billion,
with a 1:5 ratio of infection.
Chap 2B: OS vs. Virus 18
History of Computer Virus
2003, the SoBig worm, considered as the
fastest spreading virus, capable of sending
massive amounts of junk e-mail or spam.
2003, the Blaster worm infected more than 10
million machines worldwide that lacked the
appropriate patch (software bug corrector).
January 2004, the MyDoom virus set a new
record, spreading even faster than SoBig,
causing even more damage.
Chap 2B: OS vs. Virus 19
Applying anti-virus measures is the best
way to protect users against viruses.
Anti-virus Measures
1. Make backups of all software (including OS)
 If a virus attack occurs, safe copies of your
files and software can be retrieved.
2. Have anti-virus software installed and
updated regularly.
 This is to detect, report and (where
appropriate) disinfect viruses.
Chap 2B: OS vs. Virus 20
Anti-virus Measures
3. Inform all users that the risk of infection
grows exponentially.
4. Contact a Computer Professional for
analysis.
 When people exchange flash drives,
download web material or open email
attachments without caution.
 If in doubt of any suspicious item that anti-
virus software does not recognize.
Chap 2B: OS vs. Virus 21
Best practices for detecting and preventing
viruses.
Computer Virus Prevention
1. Do not open any files attached to an email
from an unknown, or untrustworthy source or
even if it appears to come from someone you
know if the subject line is questionable.
 If the need to do so is there, always save
the file to your hard drive before doing so.
Chap 2B: OS vs. Virus 22
Computer Virus Prevention
2. Delete chain emails and junk email.
 Do not forward or reply to any to them.
These types of email are considered
spam, which is unsolicited, intrusive mail
that clogs up the network.
3. Exercise caution when downloading files
from the Internet.
 Ensure that the source is a legitimate and
reputable one.
Chap 2B: OS vs. Virus 23
Computer Virus Prevention
4. When in doubt, always err on the side of
caution.
 Do not open, download, or execute any
files or email attachments.
 Not executing is the most important of
these.
Chap 2B: OS vs. Virus 24
 Click to add subtitle
End

More Related Content

Similar to Intro to Operating System.ppt

Madhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxMadhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptx
DEEP TIWARI
 
vcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptx
vcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptxvcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptx
vcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptx
DEEP TIWARI
 
suraj singh Bed PPT(Computer Virus and its management).pptx
suraj singh Bed PPT(Computer Virus and its management).pptxsuraj singh Bed PPT(Computer Virus and its management).pptx
suraj singh Bed PPT(Computer Virus and its management).pptx
DEEP TIWARI
 

Similar to Intro to Operating System.ppt (20)

Madhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxMadhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptx
 
Madhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxMadhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptx
 
vcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptx
vcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptxvcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptx
vcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptx
 
Spn year8 notes
Spn year8 notesSpn year8 notes
Spn year8 notes
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus
VirusVirus
Virus
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Virus project
Virus projectVirus project
Virus project
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Computer virus
Computer virusComputer virus
Computer virus
 
suraj singh Bed PPT(Computer Virus and its management).pptx
suraj singh Bed PPT(Computer Virus and its management).pptxsuraj singh Bed PPT(Computer Virus and its management).pptx
suraj singh Bed PPT(Computer Virus and its management).pptx
 
Virus
VirusVirus
Virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 

More from DondonGoles (6)

MS EXCEL.ppt
MS EXCEL.pptMS EXCEL.ppt
MS EXCEL.ppt
 
Data Processing.ppt
Data Processing.pptData Processing.ppt
Data Processing.ppt
 
MS EXCEL.ppt
MS EXCEL.pptMS EXCEL.ppt
MS EXCEL.ppt
 
MS Publisher.ppt
MS Publisher.pptMS Publisher.ppt
MS Publisher.ppt
 
Operating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptxOperating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptx
 
Chapter 1 - Introduction to Computer.ppt
Chapter 1 - Introduction to Computer.pptChapter 1 - Introduction to Computer.ppt
Chapter 1 - Introduction to Computer.ppt
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Intro to Operating System.ppt

  • 1. Operating System vs. Virus Introduction to Computers / Word Processing
  • 2. Chap 2B: OS vs. Virus 2 Operating System is the most important program that runs on a computer. Operating System vs. Virus It is considered as the “brain” of the computer system. It is used to run other programs such as MS Office and all other programs installed in the computer system.
  • 3. Chap 2B: OS vs. Virus 3 Without the OS the computer system is practically useless. Operating System vs. Virus On the other hand, a computer virus is a computer program that disturbs or interfere the smooth operation of the computer system. It can delete or corrupt computer data, thus nobody wants this program inside the computer system.
  • 4. Chap 2B: OS vs. Virus 4 Operating System The OS is the manager of all the computer system’s hardware and software. In layman’s term, the OS is a computer program that provides an interface for the user to communicate with the computer. Operating system is a collection of programs that controls how the CPU, memory, and I/O devices work together.
  • 5. Chap 2B: OS vs. Virus 5 Operating System  Organizes and manages files and directories.  Controls how data and instructions are loaded and executed by the CPU.  Coordinates the CPU, memory, and peripheral devices. Some of the functions of an OS:  Recognizes input from the keyboard and sends output to the display screen.
  • 6. Chap 2B: OS vs. Virus 6 Primary Purpose of an OS: Operating System Maximize the productivity of a computer system by operating in the most efficient manner and minimizing the amount of human intervention.
  • 7. Chap 2B: OS vs. Virus 7 Operating System Most modern OSes utilizes a user interface to make interacting with the computer easy. The goal of user interface is to be “user- friendly”, which means that the software can be used easily by individuals with limited training.
  • 8. Chap 2B: OS vs. Virus 8 Operating System - it utilizes windows, icons, menus, and pointers. Graphical User Interface (GUI) - a user interface that displays graphics in addition to text when it communicates with the user.
  • 9. Chap 2B: OS vs. Virus 9 USERS Operating System DISK CPU NETWORK APPLICATION PROGRAMS I/O DEVICES OS (NUCLEUS)
  • 10. Chap 2B: OS vs. Virus 10 A computer virus is a small self- duplicating computer program that attaches itself to some other program and spreads from one computer to another, interfering with computer operation. Computer Virus  It can use an e-mail program to spread the virus to other computers  It can delete everything on the hard disk.
  • 11. Chap 2B: OS vs. Virus 11 How do computer viruses infection occur?  They most easily spread by attachments in e-mail messages. Computer Virus  It can arrive on a flash drives.  Computer viruses also spread by using downloads on the Internet.
  • 12. Chap 2B: OS vs. Virus 12  The computer runs slower than usual. Computer Virus Indicators Primary indicators of computer virus infection:  The computer stops responding, or it locks up frequently.  The computer restarts on its own every few minutes and does not run as usual.  Computer applications do not work correctly.  Disks or disk drives are inaccessible.
  • 13. Chap 2B: OS vs. Virus 13 Computer Virus Indicators  There’s a double extension on attachment that’s recently opened (e.g. .jpg, .gif, or .exe).  Antivirus program cannot be restarted or is disabled for no reason.  Antivirus program cannot be installed or won’t run on the computer.  New icons appear on the desktop that are not placed there or not even associated with any recently installed programs.
  • 14. Chap 2B: OS vs. Virus 14 1949, John von Neumann proposed that it was theoretically possible for a computer program to replicate. 1950s, the theory was tested at Bell Laboratories through the development of Core Wars, where players created tiny computer programs that attacked, erased, and tried to propagate on an opponent's system. Origin of Computer Virus
  • 15. Chap 2B: OS vs. Virus 15 1985, the first Trojan horses appeared, posing as a graphics-enhancing program called EGABTR and as a game called NUKE-LA. Origin of Computer Virus 1986, the Brain virus appeared and spread worldwide by 1987. 1983, American Electrical Engineer Fred Cohen, coined the term virus to describe a self-replicating computer program.
  • 16. Chap 2B: OS vs. Virus 16 1988, two new viruses appeared: the Stone virus, and Internet worm. 1989, the Dark Avenger, the first fast infector virus, followed by the first Polymorphic virus in 1990. Origin of Computer Virus 1995, the WinWord Concept virus, was created.
  • 17. Chap 2B: OS vs. Virus 17 1999, the Melissa macro virus, which costs corporations millions of dollars due to computer downtime and lost productivity. Origin of Computer Virus 2000, the VBS_LOVELETTER virus, a.k.a. the Love Bug and the ILOVEYOU virus in which losses were estimated at $10 billion, with a 1:5 ratio of infection.
  • 18. Chap 2B: OS vs. Virus 18 History of Computer Virus 2003, the SoBig worm, considered as the fastest spreading virus, capable of sending massive amounts of junk e-mail or spam. 2003, the Blaster worm infected more than 10 million machines worldwide that lacked the appropriate patch (software bug corrector). January 2004, the MyDoom virus set a new record, spreading even faster than SoBig, causing even more damage.
  • 19. Chap 2B: OS vs. Virus 19 Applying anti-virus measures is the best way to protect users against viruses. Anti-virus Measures 1. Make backups of all software (including OS)  If a virus attack occurs, safe copies of your files and software can be retrieved. 2. Have anti-virus software installed and updated regularly.  This is to detect, report and (where appropriate) disinfect viruses.
  • 20. Chap 2B: OS vs. Virus 20 Anti-virus Measures 3. Inform all users that the risk of infection grows exponentially. 4. Contact a Computer Professional for analysis.  When people exchange flash drives, download web material or open email attachments without caution.  If in doubt of any suspicious item that anti- virus software does not recognize.
  • 21. Chap 2B: OS vs. Virus 21 Best practices for detecting and preventing viruses. Computer Virus Prevention 1. Do not open any files attached to an email from an unknown, or untrustworthy source or even if it appears to come from someone you know if the subject line is questionable.  If the need to do so is there, always save the file to your hard drive before doing so.
  • 22. Chap 2B: OS vs. Virus 22 Computer Virus Prevention 2. Delete chain emails and junk email.  Do not forward or reply to any to them. These types of email are considered spam, which is unsolicited, intrusive mail that clogs up the network. 3. Exercise caution when downloading files from the Internet.  Ensure that the source is a legitimate and reputable one.
  • 23. Chap 2B: OS vs. Virus 23 Computer Virus Prevention 4. When in doubt, always err on the side of caution.  Do not open, download, or execute any files or email attachments.  Not executing is the most important of these.
  • 24. Chap 2B: OS vs. Virus 24  Click to add subtitle End