SlideShare a Scribd company logo
1 of 33
CHAPTER - 3
BASIC SOFTWARE
1
CSC-103
OUTCOMES OF THIS CHAPTER
 Understand the basics Software,
 Analyze various Software,
 Able to protect computer from Virus,
 Functions and types of Operating System
 Operating systems for mobile device
 Introduction with different kind of Web
Browsers 2
CSC-103
WHAT IS SOFTWARE?
 The term Software is used to refer to the
computer programs, which is a set of
instructions that tells the computer what to do.
 Computer software is non-tangible, contrasted
with computer hardware.
 Computer software includes computer
programs, libraries and their associated
documentation.
 The word software is also sometimes used in a
more narrow sense, meaning application only.
 Example: OS, Antivirus, computer games etc. 3
CSC-103
TYPES OF SOFTWARE:
There are two main types of software:
1. Systems Software.
2. Application Software.
1. System Software:
⚫ Is computer software designed to operate and control
the computer hardware and to provide a platform for
running application software.
System Software can be separated into two different
categories:
 Operating System Software
 Utility Software.
4
CSC-103
TYPES OF SOFTWARE:
 Operating System Software:
⚫ An Operating System Software is the most
important system software that runs on a computer.
⚫ It manages the computer's memory, processes, and all of
its software and hardware.
⚫ It also allows you to communicate with the computer
without knowing how to speak the computer's language.
⚫ Without an operating system, a computer is useless.
⚫ Modern operating systems use a graphical user
interface or GUI.
⚫ Example: Microsoft Windows, Apple Mac OS X, and
Linux.
5
CSC-103
TYPES OF SOFTWARE:
 Utility software :
⚫ Utility Software helps to analyze, configure, optimize and
maintain the computer, such as virus protection.
⚫ Example: Antivirus Software.
2. Applications Software:
⚫ Application Software is a program or group of programs
designed for end user to perform a group of coordinated
functions, tasks, or activities.
⚫ Application software cannot run on itself but is dependent
on system software to execute.
⚫ Examples of an application include a word processor, a
spreadsheet design and management system, an
aeronautical flight simulator, a console game, a drawing,
painting, and illustrating system, or a library management
system.
6
CSC-103
MAIN PARTS OF THE OPERATING SYSTEM
The main parts of the operating system can be
divided into 4 parts:
 The Kernel
 Device Drivers
 User Interface
 System Utilities
7
CSC-103
Types of operating systems
• Single- and multi-tasking:
• A single-tasking system can only run one
program at a time. Ex- Palm OS.
• while a multi-tasking operating system allows
more than one program to be running in
concurrency. This is achieved by time-sharing,
dividing the available processor time between
multiple processes. Ex- Linux, Solaris, Mac OS,
windows etc.
• Single- and multi-user:
• Single-user operating systems have no facilities
to distinguish users, but may allow multiple
programs to run in same time. Ex- Palm OS,
MS DOS etc.
• Processes and resources, such as disk space,
belonging to multiple users, and the system
permits multiple users to interact with the
system at the same time. Ex- Unix server OS.
8
CSC-103
Types of operating systems (Contd.)
CSC-103 9
• Distributed:
• A distributed operating
system manages a group of distinct
computers and makes them appear to
be a single computer. The
development of networked computers
that could be linked and communicate
with each other. Ex- LOCUS (Distributed
OS based on UNIX).
• Templated:
• In an OS, distributed and cloud
computing context, templating refers
to creating a single virtual machine
image as a guest operating system,
then saving it as a tool for multiple
running virtual machines. The
technique is used both in
virtualization and cloud computing
management, and is common in large
server warehouses.
9
Types of operating systems (Contd.)
• Embedded:
• Embedded operating systems are
designed to be used in embedded
computer systems. They are
designed to operate on small
machines like PDAs with less
autonomy. They are able to
operate with a limited number of
resources.
• Windows CE and Minix 3 are
some examples of embedded
operating systems.
10
CSC-103
10
Types of operating systems (Contd.)
• Real-time:
• A real-time operating system is an operating system that guarantees to
process events or data within a certain short amount of time. A real-time
operating system may be single- or multi-tasking, but when multitasking, it
uses specialized scheduling algorithms so that a deterministic nature of
behavior is achieved.
• Often used as a control device in a dedicated application such as controlling
scientific experiments, medical imaging systems, industrial control systems,
and some display systems.
• Real-Time systems may be either hard or soft real-time.
• Hard real- time means you must absolutely hit every deadline. Very
few systems have this requirement. Some examples are nuclear
systems, some medical applications such as pacemakers, a large
number of defense applications .
• Soft real-time Firm real time systems can miss some deadlines, but
eventually performance will degrade if too many are missed. A good
example is the sound system in your computer. If you miss a few bits,
no big deal, but miss too many and you're going to eventually degrade
the system.
11
CSC-103
11
THE FUNCTIONS OF OPERATING SYSTEM:
12
? Booting the computer.
? Performs basic computer tasks eg managing the
various peripheral devices eg mouse, keyboard
? Provides a user interface, e.g. command line,
graphical user interface (GUI)
? Handles system resources such as computer's
memory and sharing of the central processing unit
(CPU) time by various applications or peripheral
devices.
? Provides file management which refers to the way
that the operating system manipulates, stores,
retrieves and saves data.
CSC-103
OPERATING SYSTEMS FOR MOBILE DEVICES
? Android OS (Google Inc.):
The Android mobile
operating system is
Google's open and free
software stack that includes
an operating system,
middleware and also key
applications for use on mobile
devices, including smart
phones.
? Bada (Samsung
Electronics): Bada is
a proprietary Samsung mobil
e OS that was first launched
in 2010. The Samsung Wave
was the first Smartphone to
use this mobile OS. 13
CSC-103
OPERATING SYSTEMS FOR MOBILE DEVICES
? iPhone OS / iOS (Apple):
Apple's iPhone OS was
originally developed for use on
its iPhone devices. Now, the
mobile operating system is
referred to as iOS and is
supported on a number of Apple
devices including the iPhone,
iPad, iPad 2 and iPod Touch.
? BlackBerry OS (Research In
Motion): The BlackBerry OS is
a proprietary mobile operating
system developed by Research
In Motion for use on the
company’s
popular BlackBerry handheld
devices.
14
CSC-103
OPERATING SYSTEMS FOR MOBILE DEVICES
? Symbian OS (Nokia): Symbian
is a mobile operating system
(OS) targeted at mobile phones
that offers a high-level of
integration with communication
and personal information
management (PIM) functionality.
? Windows Mobile (Windows
Phone 7): Windows Mobile is
Microsoft's mobile operating
system used in smart phones and
mobile devices – with or without
touch screens. The Mobile OS is
based on the Windows CE 5.2
kernel. In 2010 Microsoft
announced a new smart phone
platform called Windows Phone
7.
15
CSC-103
TYPES OF APPLICATION SOFTWARE
? An Application Suite:
• Consists of multiple applications
bundled together.
• They usually have related functions,
features and user interfaces, and may
be able to interact with each other.
• Microsoft
Office, LibreOffice and iWork.
? Enterprise Software:
⚫ Addresses the needs of an entire
organization's processes.
⚫ Examples include enterprise resource
planning systems, customer
relationship management (CRM)
systems and supply chain management
software.
16
CSC-103
TYPES OF APPLICATION SOFTWARE
? Enterprise Infrastructure
Software:
⚫ Provides common capabilities
needed to support
enterprise software systems.
⚫ Examples include databases, email
servers, and systems for managing
networks and security.
? Information Worker Software:
⚫ Lets users create and manage
information, often for individual
projects within a department, in
contrast to enterprise management.
⚫ Examples include time
management, resource management.
17
CSC-103
TYPES OF APPLICATION SOFTWARE
? Content Access Software:
⚫ Is used primarily to access content
without editing, but may include software
that allows for content editing.
⚫ Examples include media players, web
browsers, and help browsers.
? Educational Software:
⚫ Is related to content access software, but
has the content and/or features adapted
for use in by educators or students.
⚫ For example, it may deliver evaluations
(tests).
18
CSC-103
TYPES OF APPLICATION SOFTWARE
? Simulation Software:
⚫ Simulates physical or abstract
systems for research, training
or entertainment purposes.
? Media Development
Software:
⚫ Generates print and electronic
media for others to consume,
most often in a commercial or
educational setting.
⚫ This includes graphic-art
software, desktop publishing
software, multimedia
development software and
many others.
19
CSC-103
TYPES OF APPLICATION SOFTWARE
? Product Engineering Software:
⚫ Is used in developing hardware and
software products.
⚫ This includes computer-aided
design (CAD), computer-aided
engineering (CAE), computer language
editing and compiling tools, integrated
development environments, and
application programmer interfaces.
? Entertainment Software:
⚫ Can refer to video games, screen savers,
programs to display motion pictures or
play recorded music, and other forms of
entertainment which can be
experienced through use of a computing
device.
20
CSC-103
HOW DO I IMPROVE THE SECURITY OF
MY HOME COMPUTER?
? Connect to a Secure Network
? Enable and Configure a Firewall
? Install and Use Antivirus and Antispyware Software
? Remove Unnecessary Software
? Modify Unnecessary Default Features
? Operate Under the Principle of Least Privilege
? Secure Your Web Browser
? Apply Software Updates and Enable Future
Automatic Updates
? Use Good Security Practices
⚫ Use caution with email attachments and untrusted links
⚫ Use caution when providing sensitive information.
⚫ Create strong passwords.
21
CSC-103
WEB APPLICATION & BROWSERS
? Web Application:
⚫ A web application or web app is any software that
runs in a web browser.
⚫ It is created in a browser-supported programming
language (such as the combination of JavaScript,
HTML and CSS) and relies on a web browser to
render the application.
? Web Browsers:
⚫ These programs allow users to navigate the Internet.
⚫ Some of the more common ones include Microsoft
Internet Explorer, Netscape Navigator, Mozilla
Firefox and Apple Safari 22
CSC-103
WHAT IS VIRUSES?
? Viruses:
⚫ A computer virus is a program
designed to harm or cause
harm on an infected computer.
⚫ Its spreads through e-mail
attachments, portable devices,
websites containing malicious
scripts and file downloads.
⚫ A computer virus attaches
itself to the host files and
always activate whenever you
open the infected files.
23
CSC-103
A VIRUS CAN RUN AS AN APPLICATION,
THEREFORE IT CAN -
? Remotely access a computer, giving anyone
complete control of the machine.
? Run as a background process, using internet
connection to send private data anywhere,
anytime.
? Delete files, run programs, edit registry and steal
information.
? Corrupt Windows files to make a machine
become unusable, causing it to crash and turn off
at any time.
? Key log information such as passwords,
usernames and credit card details.
24
CSC-103
DIFFERENT TYPES OF VIRUSES
? Memory Resident Viruses: They
usually fix themselves inside the
computer memory. They get activated
every time the OS runs and end up
infecting other opened files. They hide
in RAM. For example CMJ, Jerusalem
Virus, Onehalf virus, Magistr, Junkie,
Satanbug etc.
? Overwrite Viruses: These types of
viruses delete any information in a
file they infect, leaving them partially
or completely useless once they are
infected. For example: Trj.Reboot
25
CSC-103
DIFFERENT TYPES OF VIRUSES
? Web Scripting Virus: A web
scripting virus is a type computer
security vulnerability through websites
that breaches your web browser
security. This allowed the attackers to
inject client-side scripting into the web
page. It can bypass access controls, steal
your information from your web
browser. For example: JS.Fortnight
? Worm: This program is very similar to a
virus and has the ability to self-replicate
leading to negative effects on your
computer. For example: lovgate.F
26
CSC-103
DIFFERENT TYPES OF VIRUSES
? Trojans: Trojans can illegally
trace important login details of
users online. For example E-
Banking is very common among
users, therefore, vulnerability of
tracing your login details
whenever your PC is working
without any strong powerful
antivirus installed.
? Email Virus: This is a virus
spread via an email. Such a virus
will hide in an email and when
the recipient opens the mail. 27
CSC-103
DIFFERENT TYPES OF VIRUSES
? Browser Hijacker: This virus
can spread in many different
ways including a voluntary
download. If infects certain
browser functions especially in
form of re-directing the user
automatically to certain sites. A
good example is the cool web
search.
? Boot Infectors: They include the
boot sector plus master boot
record types. All the viral codes
can be separate location; however
they infect the hard disks or the
floppy. For example: the brain
virus.
28
CSC-103
SOURCES OF VIRUSES
? Common source of infection is by visiting a
website. For example, many password trading
websites and WAREZ sites contain viruses. By
simply visiting the site with a vulnerable
browser, you may be infected by a virus.
? Another source of infection is by inserting flash
drives, or other portable media into an infected
machine, and then into an uninfected machine.
Viruses are often designed to transfer themselves
to portable media in an effort to physically
transport themselves to new environments. 29
CSC-103
SAFEGUARDING AGAINST VIRUSES
? Antivirus software is used to prevent,
detect, and remove malware, including
computer viruses, worms, and Trojan
horses. A variety of strategies are typically
employed by Antivirus software. Signature-
based detection involves searching for
known patterns of data within executable
code.
? Some examples of Popular Antivirus:
⚫ Norton Antivirus (Symantec)
⚫ McAfee Antivirus
⚫ Bit defender
⚫ Trend Micro
⚫ AVG
30
CSC-103
LIST THE SYMPTOM OF AN INFECTED
COMPUTER.
? The computer fails to start.
? Programs will not launch or they fail when
simple commands are performed.
? Filenames change or become unreadable.
? File contents change or are no longer accessible.
? Unusual words or graphics appear on the screen.
? Hard drives or disks are formatted.
? Variations occur in computer performance, such
as slowdowns in loading or operation.
31
CSC-103
LIST THE STEPS FOR REMOVING A VIRUS
? Determine the type of virus
? Isolate all infected systems and disks
? Make sure you have a clean disk formatted as a
system disk
? Use the clean system disk to boot all systems
with suspected infection
? Scan every physical and logical hard disk, as well
as every disk
? Back up the necessary data and executable files
to trusted, clean media
? Clean the infected standalone workstations
? Clean the infected server
? Clean the disk 32
CSC-103
EXERCISE – 3.1
1. What is Software? Explain with Example.
2. Define System Software with its classification and
example of them.
3. What is application software? What are the different types
of application software? Define them with example.
4. What are the main parts of operating system?
5. What is operating system? Define different types of
operating systems with example.
6. What are the functions of an OS?
7. Give some example of mobile base OS with their
proprietary.
8. How do you improve the Security of your Home
Computer?
9. What is Web Application & Web Browsers? Give two
examples of them.
10. What is virus? What type of harm it can do?
11. Write a short note on Antivirus.
12. Explain different types of viruses with example.
13. List the symptom of an infected computer.
14. List the steps for removing a virus.
33
CSC-103

More Related Content

Similar to Basics of Software, OS, and Security

Chp 03 pti - (shared) up
Chp 03   pti - (shared) upChp 03   pti - (shared) up
Chp 03 pti - (shared) upYUSRA FERNANDO
 
Chp 03 - Software PTI - (Shared).pdf
Chp 03 - Software PTI - (Shared).pdfChp 03 - Software PTI - (Shared).pdf
Chp 03 - Software PTI - (Shared).pdfYUSRA FERNANDO
 
operating systems
operating systemsoperating systems
operating systemschukey
 
operating system college
operating system collegeoperating system college
operating system collegeJitendra Rawat
 
operating systems 6
operating systems 6operating systems 6
operating systems 6chukey
 
operating systems
operating systemsoperating systems
operating systemschukey
 
platform-technologies_compress.pdf
platform-technologies_compress.pdfplatform-technologies_compress.pdf
platform-technologies_compress.pdfAbCc3
 
NE223_chapter 1_Overview of operating systems.ppt
NE223_chapter 1_Overview of operating systems.pptNE223_chapter 1_Overview of operating systems.ppt
NE223_chapter 1_Overview of operating systems.pptMemMem25
 
A Survey On Operating System Challenges And Security Issues Associate To It
A Survey On Operating System Challenges And Security Issues Associate To ItA Survey On Operating System Challenges And Security Issues Associate To It
A Survey On Operating System Challenges And Security Issues Associate To ItMichele Thomas
 
Computer software and operating system.pptx
Computer software and operating system.pptxComputer software and operating system.pptx
Computer software and operating system.pptxAayushAryal2
 
MYSQL DATABASE Operating System Part2 (1).pptx
MYSQL DATABASE Operating System Part2 (1).pptxMYSQL DATABASE Operating System Part2 (1).pptx
MYSQL DATABASE Operating System Part2 (1).pptxArjayBalberan1
 
Ch1kiit [compatibility mode]
Ch1kiit [compatibility mode]Ch1kiit [compatibility mode]
Ch1kiit [compatibility mode]Amit Gupta
 

Similar to Basics of Software, OS, and Security (20)

Chp 03 pti - (shared) up
Chp 03   pti - (shared) upChp 03   pti - (shared) up
Chp 03 pti - (shared) up
 
Chp 03 - Software PTI - (Shared).pdf
Chp 03 - Software PTI - (Shared).pdfChp 03 - Software PTI - (Shared).pdf
Chp 03 - Software PTI - (Shared).pdf
 
Unit 4 software
Unit 4  softwareUnit 4  software
Unit 4 software
 
Introduction to OS 1.ppt
Introduction to OS 1.pptIntroduction to OS 1.ppt
Introduction to OS 1.ppt
 
Unit 1 q&a
Unit  1 q&aUnit  1 q&a
Unit 1 q&a
 
Operating systems
Operating systemsOperating systems
Operating systems
 
operating systems
operating systemsoperating systems
operating systems
 
Operating system
Operating systemOperating system
Operating system
 
Computer Fundamental
Computer Fundamental Computer Fundamental
Computer Fundamental
 
OS.pptx
OS.pptxOS.pptx
OS.pptx
 
operating system college
operating system collegeoperating system college
operating system college
 
operating systems 6
operating systems 6operating systems 6
operating systems 6
 
operating systems
operating systemsoperating systems
operating systems
 
platform-technologies_compress.pdf
platform-technologies_compress.pdfplatform-technologies_compress.pdf
platform-technologies_compress.pdf
 
NE223_chapter 1_Overview of operating systems.ppt
NE223_chapter 1_Overview of operating systems.pptNE223_chapter 1_Overview of operating systems.ppt
NE223_chapter 1_Overview of operating systems.ppt
 
A Survey On Operating System Challenges And Security Issues Associate To It
A Survey On Operating System Challenges And Security Issues Associate To ItA Survey On Operating System Challenges And Security Issues Associate To It
A Survey On Operating System Challenges And Security Issues Associate To It
 
Computer software and operating system.pptx
Computer software and operating system.pptxComputer software and operating system.pptx
Computer software and operating system.pptx
 
Itc chapter # 9
Itc   chapter # 9Itc   chapter # 9
Itc chapter # 9
 
MYSQL DATABASE Operating System Part2 (1).pptx
MYSQL DATABASE Operating System Part2 (1).pptxMYSQL DATABASE Operating System Part2 (1).pptx
MYSQL DATABASE Operating System Part2 (1).pptx
 
Ch1kiit [compatibility mode]
Ch1kiit [compatibility mode]Ch1kiit [compatibility mode]
Ch1kiit [compatibility mode]
 

More from NiloyHasan12

Chapter 5 Basic Gates and Boolean Logic.pptx
Chapter 5 Basic Gates and Boolean Logic.pptxChapter 5 Basic Gates and Boolean Logic.pptx
Chapter 5 Basic Gates and Boolean Logic.pptxNiloyHasan12
 
Chapter 8 Basic concept of e-commerce.pptx
Chapter 8 Basic concept of e-commerce.pptxChapter 8 Basic concept of e-commerce.pptx
Chapter 8 Basic concept of e-commerce.pptxNiloyHasan12
 
Chapter 10 Basic Networking.pdf
Chapter 10 Basic Networking.pdfChapter 10 Basic Networking.pdf
Chapter 10 Basic Networking.pdfNiloyHasan12
 
Chapter 7 Basic Data Storage.pptx
Chapter 7 Basic Data Storage.pptxChapter 7 Basic Data Storage.pptx
Chapter 7 Basic Data Storage.pptxNiloyHasan12
 
Chapter 2 Basic Hardware.pptx
Chapter 2 Basic Hardware.pptxChapter 2 Basic Hardware.pptx
Chapter 2 Basic Hardware.pptxNiloyHasan12
 
Chapter 1 Computer Concepts.pptx
Chapter 1 Computer Concepts.pptxChapter 1 Computer Concepts.pptx
Chapter 1 Computer Concepts.pptxNiloyHasan12
 

More from NiloyHasan12 (6)

Chapter 5 Basic Gates and Boolean Logic.pptx
Chapter 5 Basic Gates and Boolean Logic.pptxChapter 5 Basic Gates and Boolean Logic.pptx
Chapter 5 Basic Gates and Boolean Logic.pptx
 
Chapter 8 Basic concept of e-commerce.pptx
Chapter 8 Basic concept of e-commerce.pptxChapter 8 Basic concept of e-commerce.pptx
Chapter 8 Basic concept of e-commerce.pptx
 
Chapter 10 Basic Networking.pdf
Chapter 10 Basic Networking.pdfChapter 10 Basic Networking.pdf
Chapter 10 Basic Networking.pdf
 
Chapter 7 Basic Data Storage.pptx
Chapter 7 Basic Data Storage.pptxChapter 7 Basic Data Storage.pptx
Chapter 7 Basic Data Storage.pptx
 
Chapter 2 Basic Hardware.pptx
Chapter 2 Basic Hardware.pptxChapter 2 Basic Hardware.pptx
Chapter 2 Basic Hardware.pptx
 
Chapter 1 Computer Concepts.pptx
Chapter 1 Computer Concepts.pptxChapter 1 Computer Concepts.pptx
Chapter 1 Computer Concepts.pptx
 

Recently uploaded

How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 

Recently uploaded (20)

How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 

Basics of Software, OS, and Security

  • 1. CHAPTER - 3 BASIC SOFTWARE 1 CSC-103
  • 2. OUTCOMES OF THIS CHAPTER  Understand the basics Software,  Analyze various Software,  Able to protect computer from Virus,  Functions and types of Operating System  Operating systems for mobile device  Introduction with different kind of Web Browsers 2 CSC-103
  • 3. WHAT IS SOFTWARE?  The term Software is used to refer to the computer programs, which is a set of instructions that tells the computer what to do.  Computer software is non-tangible, contrasted with computer hardware.  Computer software includes computer programs, libraries and their associated documentation.  The word software is also sometimes used in a more narrow sense, meaning application only.  Example: OS, Antivirus, computer games etc. 3 CSC-103
  • 4. TYPES OF SOFTWARE: There are two main types of software: 1. Systems Software. 2. Application Software. 1. System Software: ⚫ Is computer software designed to operate and control the computer hardware and to provide a platform for running application software. System Software can be separated into two different categories:  Operating System Software  Utility Software. 4 CSC-103
  • 5. TYPES OF SOFTWARE:  Operating System Software: ⚫ An Operating System Software is the most important system software that runs on a computer. ⚫ It manages the computer's memory, processes, and all of its software and hardware. ⚫ It also allows you to communicate with the computer without knowing how to speak the computer's language. ⚫ Without an operating system, a computer is useless. ⚫ Modern operating systems use a graphical user interface or GUI. ⚫ Example: Microsoft Windows, Apple Mac OS X, and Linux. 5 CSC-103
  • 6. TYPES OF SOFTWARE:  Utility software : ⚫ Utility Software helps to analyze, configure, optimize and maintain the computer, such as virus protection. ⚫ Example: Antivirus Software. 2. Applications Software: ⚫ Application Software is a program or group of programs designed for end user to perform a group of coordinated functions, tasks, or activities. ⚫ Application software cannot run on itself but is dependent on system software to execute. ⚫ Examples of an application include a word processor, a spreadsheet design and management system, an aeronautical flight simulator, a console game, a drawing, painting, and illustrating system, or a library management system. 6 CSC-103
  • 7. MAIN PARTS OF THE OPERATING SYSTEM The main parts of the operating system can be divided into 4 parts:  The Kernel  Device Drivers  User Interface  System Utilities 7 CSC-103
  • 8. Types of operating systems • Single- and multi-tasking: • A single-tasking system can only run one program at a time. Ex- Palm OS. • while a multi-tasking operating system allows more than one program to be running in concurrency. This is achieved by time-sharing, dividing the available processor time between multiple processes. Ex- Linux, Solaris, Mac OS, windows etc. • Single- and multi-user: • Single-user operating systems have no facilities to distinguish users, but may allow multiple programs to run in same time. Ex- Palm OS, MS DOS etc. • Processes and resources, such as disk space, belonging to multiple users, and the system permits multiple users to interact with the system at the same time. Ex- Unix server OS. 8 CSC-103
  • 9. Types of operating systems (Contd.) CSC-103 9 • Distributed: • A distributed operating system manages a group of distinct computers and makes them appear to be a single computer. The development of networked computers that could be linked and communicate with each other. Ex- LOCUS (Distributed OS based on UNIX). • Templated: • In an OS, distributed and cloud computing context, templating refers to creating a single virtual machine image as a guest operating system, then saving it as a tool for multiple running virtual machines. The technique is used both in virtualization and cloud computing management, and is common in large server warehouses. 9
  • 10. Types of operating systems (Contd.) • Embedded: • Embedded operating systems are designed to be used in embedded computer systems. They are designed to operate on small machines like PDAs with less autonomy. They are able to operate with a limited number of resources. • Windows CE and Minix 3 are some examples of embedded operating systems. 10 CSC-103 10
  • 11. Types of operating systems (Contd.) • Real-time: • A real-time operating system is an operating system that guarantees to process events or data within a certain short amount of time. A real-time operating system may be single- or multi-tasking, but when multitasking, it uses specialized scheduling algorithms so that a deterministic nature of behavior is achieved. • Often used as a control device in a dedicated application such as controlling scientific experiments, medical imaging systems, industrial control systems, and some display systems. • Real-Time systems may be either hard or soft real-time. • Hard real- time means you must absolutely hit every deadline. Very few systems have this requirement. Some examples are nuclear systems, some medical applications such as pacemakers, a large number of defense applications . • Soft real-time Firm real time systems can miss some deadlines, but eventually performance will degrade if too many are missed. A good example is the sound system in your computer. If you miss a few bits, no big deal, but miss too many and you're going to eventually degrade the system. 11 CSC-103 11
  • 12. THE FUNCTIONS OF OPERATING SYSTEM: 12 ? Booting the computer. ? Performs basic computer tasks eg managing the various peripheral devices eg mouse, keyboard ? Provides a user interface, e.g. command line, graphical user interface (GUI) ? Handles system resources such as computer's memory and sharing of the central processing unit (CPU) time by various applications or peripheral devices. ? Provides file management which refers to the way that the operating system manipulates, stores, retrieves and saves data. CSC-103
  • 13. OPERATING SYSTEMS FOR MOBILE DEVICES ? Android OS (Google Inc.): The Android mobile operating system is Google's open and free software stack that includes an operating system, middleware and also key applications for use on mobile devices, including smart phones. ? Bada (Samsung Electronics): Bada is a proprietary Samsung mobil e OS that was first launched in 2010. The Samsung Wave was the first Smartphone to use this mobile OS. 13 CSC-103
  • 14. OPERATING SYSTEMS FOR MOBILE DEVICES ? iPhone OS / iOS (Apple): Apple's iPhone OS was originally developed for use on its iPhone devices. Now, the mobile operating system is referred to as iOS and is supported on a number of Apple devices including the iPhone, iPad, iPad 2 and iPod Touch. ? BlackBerry OS (Research In Motion): The BlackBerry OS is a proprietary mobile operating system developed by Research In Motion for use on the company’s popular BlackBerry handheld devices. 14 CSC-103
  • 15. OPERATING SYSTEMS FOR MOBILE DEVICES ? Symbian OS (Nokia): Symbian is a mobile operating system (OS) targeted at mobile phones that offers a high-level of integration with communication and personal information management (PIM) functionality. ? Windows Mobile (Windows Phone 7): Windows Mobile is Microsoft's mobile operating system used in smart phones and mobile devices – with or without touch screens. The Mobile OS is based on the Windows CE 5.2 kernel. In 2010 Microsoft announced a new smart phone platform called Windows Phone 7. 15 CSC-103
  • 16. TYPES OF APPLICATION SOFTWARE ? An Application Suite: • Consists of multiple applications bundled together. • They usually have related functions, features and user interfaces, and may be able to interact with each other. • Microsoft Office, LibreOffice and iWork. ? Enterprise Software: ⚫ Addresses the needs of an entire organization's processes. ⚫ Examples include enterprise resource planning systems, customer relationship management (CRM) systems and supply chain management software. 16 CSC-103
  • 17. TYPES OF APPLICATION SOFTWARE ? Enterprise Infrastructure Software: ⚫ Provides common capabilities needed to support enterprise software systems. ⚫ Examples include databases, email servers, and systems for managing networks and security. ? Information Worker Software: ⚫ Lets users create and manage information, often for individual projects within a department, in contrast to enterprise management. ⚫ Examples include time management, resource management. 17 CSC-103
  • 18. TYPES OF APPLICATION SOFTWARE ? Content Access Software: ⚫ Is used primarily to access content without editing, but may include software that allows for content editing. ⚫ Examples include media players, web browsers, and help browsers. ? Educational Software: ⚫ Is related to content access software, but has the content and/or features adapted for use in by educators or students. ⚫ For example, it may deliver evaluations (tests). 18 CSC-103
  • 19. TYPES OF APPLICATION SOFTWARE ? Simulation Software: ⚫ Simulates physical or abstract systems for research, training or entertainment purposes. ? Media Development Software: ⚫ Generates print and electronic media for others to consume, most often in a commercial or educational setting. ⚫ This includes graphic-art software, desktop publishing software, multimedia development software and many others. 19 CSC-103
  • 20. TYPES OF APPLICATION SOFTWARE ? Product Engineering Software: ⚫ Is used in developing hardware and software products. ⚫ This includes computer-aided design (CAD), computer-aided engineering (CAE), computer language editing and compiling tools, integrated development environments, and application programmer interfaces. ? Entertainment Software: ⚫ Can refer to video games, screen savers, programs to display motion pictures or play recorded music, and other forms of entertainment which can be experienced through use of a computing device. 20 CSC-103
  • 21. HOW DO I IMPROVE THE SECURITY OF MY HOME COMPUTER? ? Connect to a Secure Network ? Enable and Configure a Firewall ? Install and Use Antivirus and Antispyware Software ? Remove Unnecessary Software ? Modify Unnecessary Default Features ? Operate Under the Principle of Least Privilege ? Secure Your Web Browser ? Apply Software Updates and Enable Future Automatic Updates ? Use Good Security Practices ⚫ Use caution with email attachments and untrusted links ⚫ Use caution when providing sensitive information. ⚫ Create strong passwords. 21 CSC-103
  • 22. WEB APPLICATION & BROWSERS ? Web Application: ⚫ A web application or web app is any software that runs in a web browser. ⚫ It is created in a browser-supported programming language (such as the combination of JavaScript, HTML and CSS) and relies on a web browser to render the application. ? Web Browsers: ⚫ These programs allow users to navigate the Internet. ⚫ Some of the more common ones include Microsoft Internet Explorer, Netscape Navigator, Mozilla Firefox and Apple Safari 22 CSC-103
  • 23. WHAT IS VIRUSES? ? Viruses: ⚫ A computer virus is a program designed to harm or cause harm on an infected computer. ⚫ Its spreads through e-mail attachments, portable devices, websites containing malicious scripts and file downloads. ⚫ A computer virus attaches itself to the host files and always activate whenever you open the infected files. 23 CSC-103
  • 24. A VIRUS CAN RUN AS AN APPLICATION, THEREFORE IT CAN - ? Remotely access a computer, giving anyone complete control of the machine. ? Run as a background process, using internet connection to send private data anywhere, anytime. ? Delete files, run programs, edit registry and steal information. ? Corrupt Windows files to make a machine become unusable, causing it to crash and turn off at any time. ? Key log information such as passwords, usernames and credit card details. 24 CSC-103
  • 25. DIFFERENT TYPES OF VIRUSES ? Memory Resident Viruses: They usually fix themselves inside the computer memory. They get activated every time the OS runs and end up infecting other opened files. They hide in RAM. For example CMJ, Jerusalem Virus, Onehalf virus, Magistr, Junkie, Satanbug etc. ? Overwrite Viruses: These types of viruses delete any information in a file they infect, leaving them partially or completely useless once they are infected. For example: Trj.Reboot 25 CSC-103
  • 26. DIFFERENT TYPES OF VIRUSES ? Web Scripting Virus: A web scripting virus is a type computer security vulnerability through websites that breaches your web browser security. This allowed the attackers to inject client-side scripting into the web page. It can bypass access controls, steal your information from your web browser. For example: JS.Fortnight ? Worm: This program is very similar to a virus and has the ability to self-replicate leading to negative effects on your computer. For example: lovgate.F 26 CSC-103
  • 27. DIFFERENT TYPES OF VIRUSES ? Trojans: Trojans can illegally trace important login details of users online. For example E- Banking is very common among users, therefore, vulnerability of tracing your login details whenever your PC is working without any strong powerful antivirus installed. ? Email Virus: This is a virus spread via an email. Such a virus will hide in an email and when the recipient opens the mail. 27 CSC-103
  • 28. DIFFERENT TYPES OF VIRUSES ? Browser Hijacker: This virus can spread in many different ways including a voluntary download. If infects certain browser functions especially in form of re-directing the user automatically to certain sites. A good example is the cool web search. ? Boot Infectors: They include the boot sector plus master boot record types. All the viral codes can be separate location; however they infect the hard disks or the floppy. For example: the brain virus. 28 CSC-103
  • 29. SOURCES OF VIRUSES ? Common source of infection is by visiting a website. For example, many password trading websites and WAREZ sites contain viruses. By simply visiting the site with a vulnerable browser, you may be infected by a virus. ? Another source of infection is by inserting flash drives, or other portable media into an infected machine, and then into an uninfected machine. Viruses are often designed to transfer themselves to portable media in an effort to physically transport themselves to new environments. 29 CSC-103
  • 30. SAFEGUARDING AGAINST VIRUSES ? Antivirus software is used to prevent, detect, and remove malware, including computer viruses, worms, and Trojan horses. A variety of strategies are typically employed by Antivirus software. Signature- based detection involves searching for known patterns of data within executable code. ? Some examples of Popular Antivirus: ⚫ Norton Antivirus (Symantec) ⚫ McAfee Antivirus ⚫ Bit defender ⚫ Trend Micro ⚫ AVG 30 CSC-103
  • 31. LIST THE SYMPTOM OF AN INFECTED COMPUTER. ? The computer fails to start. ? Programs will not launch or they fail when simple commands are performed. ? Filenames change or become unreadable. ? File contents change or are no longer accessible. ? Unusual words or graphics appear on the screen. ? Hard drives or disks are formatted. ? Variations occur in computer performance, such as slowdowns in loading or operation. 31 CSC-103
  • 32. LIST THE STEPS FOR REMOVING A VIRUS ? Determine the type of virus ? Isolate all infected systems and disks ? Make sure you have a clean disk formatted as a system disk ? Use the clean system disk to boot all systems with suspected infection ? Scan every physical and logical hard disk, as well as every disk ? Back up the necessary data and executable files to trusted, clean media ? Clean the infected standalone workstations ? Clean the infected server ? Clean the disk 32 CSC-103
  • 33. EXERCISE – 3.1 1. What is Software? Explain with Example. 2. Define System Software with its classification and example of them. 3. What is application software? What are the different types of application software? Define them with example. 4. What are the main parts of operating system? 5. What is operating system? Define different types of operating systems with example. 6. What are the functions of an OS? 7. Give some example of mobile base OS with their proprietary. 8. How do you improve the Security of your Home Computer? 9. What is Web Application & Web Browsers? Give two examples of them. 10. What is virus? What type of harm it can do? 11. Write a short note on Antivirus. 12. Explain different types of viruses with example. 13. List the symptom of an infected computer. 14. List the steps for removing a virus. 33 CSC-103