SlideShare a Scribd company logo
1 of 66
System Administration
Muhammad Umar
Muhammad Adnan
Abdul Muteeb
Muhammad Mudasser
Bilal Ahmad 3029
Hanzala Ashraf
CoderCompany.com
Principles and Learning Objectives
 Definition of system administrator.
 Software and Their Types.
 We Discuss operating System, function and their importance.
 What is utility programmers.
 How we Make USB Boot.
 How We install Window in Computer.
 Window Features.
 Difference between Virus and Anti virus.
CoderCompany.com
What is system Administrator?
A SYSTEM ADMINISTRATOR, OR SYS
ADMIN, IS A PERSON WHO IS
RESPONSIBLE FOR THE UPKEEP,
CONFIGURATION, AND RELIABLE
OPERATION OF COMPUTER SYSTEMS;
ESPECIALLY MULTI-USER COMPUTERS,
SUCH AS SERVERS
CoderCompany.com
Software and their Types:
 What is Software
 The term Software refers to a set of Computer programs,
procedures and associated documents describing the
programs , and how they are to be used .
 Software Classified in Two Types.
1. System Software .
2. Application Software.
CoderCompany.com
Difference Between System and
Application Software
System Software:
Systems software includes
the programs that are dedicated to
managing the computer itself, such as
the operating system, file management
utilities, and disk operating system (or
DOS).
Application Software:
Application software is a program or
group of programs designed for end
users.
CoderCompany.com
Check this image.
What is Operating System?
 An operating system (OS)
is system software that manages
computer hardware and software
resources and provides common services
for computer programs. All computer
programs, excluding firmware, require
an operating system to function.
Most popular Operating System
 The most popular operating system
today is Microsoft's Windows operating
system. Macintosh computers have their
own operating system, the most recent
of which is called Mac OS X. There are
also open source operating systems such
as Linux.
History of Macintosh
Computer.
 The Macintosh (/ MAK-in-tosh), or Mac, is a series of
personal computers (PCs) designed, developed, and
marketed by Apple Inc. Steve Jobs introduced the
original Macintosh computer on January 24, 1984. This
was the first mass-market personal computer featuring an
integral graphical user interface and mouse.
CoderCompany.com
Windows and Mac are GUI’s
 Microsoft Windows and Apple Macintosh operating systems are
“graphical user interfaces” or GUI’s.
 GUI is defined as: A picture used in place of a word or words to issue
commands
CoderCompany.com
GUI – Standards
 GUI interfaces have standards that are usually the same or similar in
all systems and applications.
 Standards apply to:
• Pointers and pointing devices
• Icons, desktops, windows and me
What does Operating System
do?
 Operating System is the set of programs that
controls a computer.
 It provide a pleasant and effective interface
between the user and the hardware.
 Makes the computer more convenient to use
Types of Operating System?
 Real-time operating system(RTOS) –Real-time operating systems are used to control
machinery, scientific instruments and industrial systems.
 Single-user, single task : As the name implies, this operating system is designed to
manage the computer so that one user can effectively do one thing at a time.
 Single-user, multi-tasking : This is the type of operating system most people use on
their desktop and laptop computers today.
 Multi-user : A multi-user operating system allows many different users to take
advantage of the computer's resources simultaneously.
 Distributed: A distributed operating system manages a group of independent
computers and makes them appear to be a single computer.
 Embedded: Embedded operating systems are designed to be used in embedded
computer systems. They are designed to operate on small machines like PDAs with less
autonomy.
Features of Good Operating System
 efficient
time spent to execute its programs
should be short
 small in size
memory occupied should be as small as possible
 reliable
CoderCompany.com
Functions of Operating System
 Process Management.
 Resource Management.
 File Management.
 Communication Management.
 Security Management.
 Memory Management.
CoderCompany.com
Process Management
 All process from start to shut down.
 Booting
 Open
 Save
 Install
 Copy
 Print
 Send, etc. CoderCompany.com
Resource Management
 Installing drivers required for input, output, memory, power,
communication devices.
 Coordinating among peripherals
File Management
 Name.
 Folders.
 Location.
 Attributes – size, type, modified, protection, password etc.
CoderCompany.com
Communication Management.
 User – Application S/W – Hardware.
 One computer to other computer in LAN/WAN.
 Command interpretation.
 Downloading-Uploading.
Memory Management
 The different types of memory in the system must be used properly so
that each process can run most effectively.
Cache Memory
 •Cache - A section of a computer's memory which temporarily retains
recently accessed data in order to speed up repeated access to the same
data.
 It provides rapid access without having to wait for systems to load.
RAM Memory
 Random access memory (RAM) is the best known form of computer
memory.
 • RAM is considered "random access" because you can access any
memory cell directly if you know the row and column that intersect at
that cell.
 A ROM chip is non-volatile storage and does not require a constant
source of power to retain information stored on it. When power is lost
or turned off, a ROM chip will keep the information stored on it. In
contrast, a RAM chip is volatile and requires a constant source of
power to retain information.
CoderCompany.com
Security Management
 Virus management.
 Alert messages.
 Dialogue boxes.
 Firewall.
 Passwords./ Access protection.
Functionalities
 Protects file and documents of the users.
 Protect the computer system from
unauthorized user.
 Provision of operate computer system by
only authorized users.
 Extended the security level of users account
i.e. either it is administration or guest
account.
 Disallow the unauthorized users to use the
resources and data of the computer and also
to share that resources.
Function of Operating System:
Boot Device:
A boot device is any piece of hardware that can read or contains the files required for a
computer to start.
Boot Disk:
A boot disk is a removable digital data storage medium from which a computer can load
and run (boot) an operating system or utility program.
 Recovery Disk:
A recovery disk contains a few system files that will start the computer
Utility programmers
 A utility program, also called a utility, is a
type of system software that allows a user to
perform maintenance-type tasks, usually
related to managing a computer, its devices,
or its programs.
 Utility programs are built-in to many
operating systems or can be purchased
separately.
Utility programmers
 Functions provided include: managing files,
searching for files, viewing images, uninstalling
programs, cleaning up disks, defragmenting
disks, backing up files and disks, setting up
screen savers, securing a computer, etc.
Types of Utility Programs
 There are many types of utility programs
1. File Manager
2. Image Viewer
3. Search Utility
4. Personal Firewall
5. Antivirus
6. Disk Defragmenter
7. Screen Saver
8. Backup and restore utilities
CoderCompany.com
File Manager
CoderCompany.com
What is File Manager?
 A file manager or file browser is a computer program that provides a user
interface to manage files and folders.
 Examples:
 Window Explorer
 Web browser are also has the feature of file managing. e.g. Internet
Explore.
 File Commander.
 Some file managers provide network connectivity via protocols, such as
FTP, NFS……etc.
CoderCompany.com
Uses/Purposes
 The most common operations performed on files or groups of files
include:
 Creating
 Opening (e.g. viewing, playing, editing or printing)
 Renaming
 Moving or copying
 Deleting and searching for files
 Modifying file attributes
 Properties and file permissions ……….etc
CoderCompany.com
Image Viewer
CoderCompany.com
What is Image viewer?
 An image viewer or image browser is a computer program that can display stored
graphical images; it can often handle various graphics file formats.
Example:
 such as Photoshop or the GIMP or the StylePix
 Windows Photo viewer.
 Windows Picture and Fax Viewer in Windows XP
 ACDSee, FastPictureViewer, FastStone Image Viewer, Imagine, IrfanView, Media Pro 1,
pViewer, XnView
Features:
Typical features of image viewers are:
 basic viewing operations such as zooming and rotation
 full screen display
 slideshow
 thumbnail display
 printing
 screen capture
CoderCompany.com
Advanced features are:
 decode next image in advance and keep previous decoded image in
memory for fast image changes
 display (and edit) metadata such as XMP, IPTC Information
Interchange Model and Exif
 batch conversion (image format, image dimensions, etc.) and
renaming
 create contact sheets
 create HTML thumbnail pages
 different transition effects for slideshows
CoderCompany.com
Search Utility
 Introduction:
A couple of years back there were
no contenders for this title. Today we have a
wealth of choices. Wasting time looking for a
file is a huge aggravation. Here are several
tools to keep you from falling into that trap.
Definition
 Any utility that is used locally to help find specific data on either the
desktop or on an on-premise server. In other words, Internet search
utilities are not included, but everything else is fair game.
Search Utility
 A search utility is a program that attempts to locate a file on your
computer based on criteria you specify.
 The criteria may include a word or words contained in a file, date of
creation or modification, size of the file, location, file name, author, and
other properties.
 Search utilities typically use an index, which stores a variety of
information about the file, including its name, date created and
modified, and author to quickly locate the file.
CoderCompany.com
Search Utility
 In Windows, Explorer and the Start Menu contain a search box where you enter the
search criteria.
Disk Burning
Disc burning software is used to write text, graphics,
audio and video files on a recordable or rewriteable
CD(Compact Disc) and DVD(Digital Versatile Disc).It
allows the user to backup data on optical disc.
Ways to burn a CD/DVD
 Windows Default disc burning
 By using desired software
CoderCompany.com
Default burning
 By using default utility
By using “DVD Flick”
 http://www.dvdflick.net/download.php(For Download)
Steps for Disk burning using “DVD
Flick”
1. Insert CD/DVD
2. Add title(add file you want to burn)
3. Menu Settings(to Insert a menu view)
4. Project setting(to give a title)
5. Burning(check the boxes ISO image, Burn project, disc label(write title name), Eject
when done).
File compression
 File Compression is used to shrink the file size. It is easier and faster to
send files over the internet.
Ways of File Compression
 Default (Built-in).
 Using desired software(Winrar).
Default Compression
1. Right click on folder that you want to compress then click on
properties.
2. Click on Send TO.
3. Check or click “Compression contents to save the disk space”.
4. Check the folder’s properties that you have compressed.
WinRAR
 This is popular file compression software
 We can upload folds and more than one files using WinRAR
 It is also used to secure the files from viruses.
 It can highly compress the files .
 Download link for WinRAR
http://www.win-
rar.com/predownload.html?&f=wrar511.exe&spV=true&subD=true&L=0
Make Bootable USB
This process By using UltraISO
Steps For Installing and Making Win Boot
1. First You have to download Widows ISO file from any platform you like.
2. Downlaod Forms for windows ISO.
* https://www.microsoft.com/
* http://webforpc.com/
*http://windows-8.en.malavida.com/
3. Download PowerISO/UltraISO/Rufus software to Make bootable Windows.
4. After downloading Install any of the Software You downloaded.
5. Now open your installed software.
Installation Process
7. Now Open Program You installed on your Pc
8. Now go to Tools And select Create Bootable
USB drive Mentioned in Picture Below
9. Now select ISO file You
downloaded in your PC
11. Now Hit Start button As mentioned in
Screenshot Below
Windows 7 Installation
CPU’s requirements for installation of win 7
Minimum hardware that you need to have on your computer and should
be checked in advance of installing.
 1 GHz CPU with 32 bits or 64 bits.
 1 GB Ram for 32 bits or 2 GB Ram for 64 bits.
 16 GB empty space hard disk for 32 bits or 20 GB for 64 bits.
 DVD drive (if installing from a DVD).
 Steps for windows 7 Installation
1. Turn your computer on then press Del or F2 (depend on your computer’s
mainboard) to enter the system BIOS.
2. choose Boot From CD/DVD.
3. Insert Windows 7 DVD into your DVD drive then start
up your computer, Windows 7 will be loading files.
4. Select these parts: Language to Install, Time and
currency format, Keyboard or input method. Then
click Next.
5. Choose Install Now if you want to install Windows 7.
6. Click 'I accept the license terms' in 'Please read the
license' then click Next.
7. Custom (advance)' if you want to install a new
version of Windows.
8. Choose Partition for installation.
9. Wait for Installing Windows to progress.
Computer Virus
Definition:
 “A virus is a program that copy itself without the permission and knowledge of the user”.
 “Virus + computer=Death”.
Characteristics
Ability to replicated itself
Ability to attached itself to another computer file
Slow down the response time
Extensive pop-up-ads.
Damage the computer hard drive
Differentiate virus and Worm
Some people distinguish between
general viruses and worms. A worm is a
special type of virus that can replicate
itself and use memory, but cannot attach
itself to other programs.
Worm is too dangerous than virus
Types of Computer Viruses
 Boot Sector Virus
 Browser Hijacker
 File Infector Virus
 Macro Virus
 Multipartite Virus
 Polymorphic Virus
 Resident Virus
 Web Scripting Virus
CoderCompany.com
Viruses
Corrupt
data
Show
massages
Disable
Hardware
Corrupt
window
Slowdown
computer
Delete
Data files
Working Of
Virus
CoderCompany.com
History of virus
 1949, scientist of Mathematics JOHAN VON NEUMANN proposed the idea of self
replicated program which he describe the acting motion of virus in a real world.
 1960,A group of programmer developed a game called core ware which produced a
copy itself as well as the games Is run.
 1980, Microsoft developed MS-DOS ,A fast OS on the planet . After this virus become
more thick and fast.
 1986 major mile stone world protrusion called pc-writ.it is also called Trojan Hoarse.
 1988,a virus called MORRIS work for MS-DOS
 1999, A famous MELISSA virus W97M/Melissa executed a macro with an attachment file
from an email. This is turn forward into the 50people.Now they used internet
 2000,I love you virus developed .its function like Melissa but it is too power full than
Melissa .it would delete the media files like MP3 Images Videos etc.
 2001 core red 1&2 Virus developed. Sven hundred thousand machine infected from this
and 2 billion dollar of the damage.
 2003, SQL Slammer virus developed .from this internet become very slow all over the
world.6 moths later MICROSOFT released a Fix For the BUG called slammer.
 2007, A virus developed called STORM WORM.it connect computer to the BOT-NET.
 2016, Different virus MALWARE, ADWAER, SPYWARE which steel information today from
the computer alover the world
ANTIVIRUS
Definition:
 Antivirus is a software which is used to preventing a computer system from
virus by detecting and removing it.
 Antivirus are special program that detect and remove virus from computer
system.
Virus Scanning Process
 .
Antivirus
Scene system
Virus not found
Virus found/ detected
Show message
Remove virus
CoderCompany.com
List of Antivirus
CoderCompany.com
Codercompany.com
Best Web Design Company in Pakistan
Contact Us for any web Related Services
Thank You for Your Attention

More Related Content

What's hot

Testing, assessing, and teaching
Testing, assessing, and teachingTesting, assessing, and teaching
Testing, assessing, and teachingSutrisno Evenddy
 
Teaching Writing to Young Learners
Teaching Writing to Young LearnersTeaching Writing to Young Learners
Teaching Writing to Young LearnersMyno Uddin
 
Teaching writing fv
Teaching writing fvTeaching writing fv
Teaching writing fv45647178
 
Testing speaking
Testing speakingTesting speaking
Testing speakingM B
 
Lesson plan for Speaking Skill
Lesson plan for Speaking SkillLesson plan for Speaking Skill
Lesson plan for Speaking SkillDesi Wijayanti
 
SELECTING RELEVANT MATERIALS FOR LISTENING STRATEGIES
SELECTING RELEVANT MATERIALS  FOR LISTENING STRATEGIES SELECTING RELEVANT MATERIALS  FOR LISTENING STRATEGIES
SELECTING RELEVANT MATERIALS FOR LISTENING STRATEGIES Hanisha Sherif
 
Material adaptation
Material adaptationMaterial adaptation
Material adaptationmaxyfelix
 
10 Principles of English Teaching (SLA Research)
10 Principles of English Teaching (SLA Research)10 Principles of English Teaching (SLA Research)
10 Principles of English Teaching (SLA Research)Phung Huy
 
the principles of teaching speaking
the principles of teaching speakingthe principles of teaching speaking
the principles of teaching speakingRead Wan
 
Guidelines for Designing Effective Language Teaching Materials
Guidelines for Designing Effective Language Teaching MaterialsGuidelines for Designing Effective Language Teaching Materials
Guidelines for Designing Effective Language Teaching MaterialsRonald Suplido Jr
 
Ppg module tsl3105 topic 2 developing listening & speaking
Ppg module tsl3105 topic 2 developing listening & speakingPpg module tsl3105 topic 2 developing listening & speaking
Ppg module tsl3105 topic 2 developing listening & speakingJojo PaPat
 
Affective and linguistic principles of language learning
Affective and linguistic principles of language learningAffective and linguistic principles of language learning
Affective and linguistic principles of language learningZingara Gatica
 
Modes of integrating all four skills
Modes of integrating all four skillsModes of integrating all four skills
Modes of integrating all four skillsMakhmud Mukumov
 
Receptive skills reading and listening
Receptive skills reading and listeningReceptive skills reading and listening
Receptive skills reading and listeningAisa Jadulco
 
how to teach speaking
 how to teach speaking how to teach speaking
how to teach speakingSolihin Utjok
 

What's hot (20)

teaching writing
 teaching writing teaching writing
teaching writing
 
Testing, assessing, and teaching
Testing, assessing, and teachingTesting, assessing, and teaching
Testing, assessing, and teaching
 
Teaching Writing to Young Learners
Teaching Writing to Young LearnersTeaching Writing to Young Learners
Teaching Writing to Young Learners
 
Teaching writing fv
Teaching writing fvTeaching writing fv
Teaching writing fv
 
Teaching language functions
Teaching language functionsTeaching language functions
Teaching language functions
 
Testing speaking
Testing speakingTesting speaking
Testing speaking
 
Lesson plan for Speaking Skill
Lesson plan for Speaking SkillLesson plan for Speaking Skill
Lesson plan for Speaking Skill
 
Teaching writing
Teaching writingTeaching writing
Teaching writing
 
SELECTING RELEVANT MATERIALS FOR LISTENING STRATEGIES
SELECTING RELEVANT MATERIALS  FOR LISTENING STRATEGIES SELECTING RELEVANT MATERIALS  FOR LISTENING STRATEGIES
SELECTING RELEVANT MATERIALS FOR LISTENING STRATEGIES
 
Material adaptation
Material adaptationMaterial adaptation
Material adaptation
 
10 Principles of English Teaching (SLA Research)
10 Principles of English Teaching (SLA Research)10 Principles of English Teaching (SLA Research)
10 Principles of English Teaching (SLA Research)
 
Reading assessment
Reading assessmentReading assessment
Reading assessment
 
the principles of teaching speaking
the principles of teaching speakingthe principles of teaching speaking
the principles of teaching speaking
 
Guidelines for Designing Effective Language Teaching Materials
Guidelines for Designing Effective Language Teaching MaterialsGuidelines for Designing Effective Language Teaching Materials
Guidelines for Designing Effective Language Teaching Materials
 
Ppg module tsl3105 topic 2 developing listening & speaking
Ppg module tsl3105 topic 2 developing listening & speakingPpg module tsl3105 topic 2 developing listening & speaking
Ppg module tsl3105 topic 2 developing listening & speaking
 
Teaching & learning listening skill
Teaching & learning listening skillTeaching & learning listening skill
Teaching & learning listening skill
 
Affective and linguistic principles of language learning
Affective and linguistic principles of language learningAffective and linguistic principles of language learning
Affective and linguistic principles of language learning
 
Modes of integrating all four skills
Modes of integrating all four skillsModes of integrating all four skills
Modes of integrating all four skills
 
Receptive skills reading and listening
Receptive skills reading and listeningReceptive skills reading and listening
Receptive skills reading and listening
 
how to teach speaking
 how to teach speaking how to teach speaking
how to teach speaking
 

Viewers also liked

Presentation by Ralf Lindner, JERRI project
Presentation by Ralf Lindner, JERRI projectPresentation by Ralf Lindner, JERRI project
Presentation by Ralf Lindner, JERRI projectRRI Tools
 
TDS IM_Brief_Template SMB Final 30 03 16 for Linkedin
TDS IM_Brief_Template SMB Final 30 03 16 for LinkedinTDS IM_Brief_Template SMB Final 30 03 16 for Linkedin
TDS IM_Brief_Template SMB Final 30 03 16 for LinkedinSteve Baines
 
2016 Annual Report - First Place for Youth
2016 Annual Report - First Place for Youth2016 Annual Report - First Place for Youth
2016 Annual Report - First Place for YouthClaudia Miller
 
Problemas de-mc3a1ximos-y-mc3adnimos
Problemas de-mc3a1ximos-y-mc3adnimosProblemas de-mc3a1ximos-y-mc3adnimos
Problemas de-mc3a1ximos-y-mc3adnimoslee lib
 
Data Driven Hiring
Data Driven HiringData Driven Hiring
Data Driven HiringQSXL
 
Greatest sports venues
Greatest sports venuesGreatest sports venues
Greatest sports venuesMike Moss
 
Intro to linux
Intro to linuxIntro to linux
Intro to linuxgabrail
 

Viewers also liked (11)

Utility programs
Utility programsUtility programs
Utility programs
 
Presentation by Ralf Lindner, JERRI project
Presentation by Ralf Lindner, JERRI projectPresentation by Ralf Lindner, JERRI project
Presentation by Ralf Lindner, JERRI project
 
TDS IM_Brief_Template SMB Final 30 03 16 for Linkedin
TDS IM_Brief_Template SMB Final 30 03 16 for LinkedinTDS IM_Brief_Template SMB Final 30 03 16 for Linkedin
TDS IM_Brief_Template SMB Final 30 03 16 for Linkedin
 
2016 Annual Report - First Place for Youth
2016 Annual Report - First Place for Youth2016 Annual Report - First Place for Youth
2016 Annual Report - First Place for Youth
 
Problemas de-mc3a1ximos-y-mc3adnimos
Problemas de-mc3a1ximos-y-mc3adnimosProblemas de-mc3a1ximos-y-mc3adnimos
Problemas de-mc3a1ximos-y-mc3adnimos
 
Manual
ManualManual
Manual
 
Data Driven Hiring
Data Driven HiringData Driven Hiring
Data Driven Hiring
 
Greatest sports venues
Greatest sports venuesGreatest sports venues
Greatest sports venues
 
bsd
bsdbsd
bsd
 
Bsd presentation
Bsd presentationBsd presentation
Bsd presentation
 
Intro to linux
Intro to linuxIntro to linux
Intro to linux
 

Similar to What is Operating System, Utility program,virus and anti_virus

Features Of A Operating System
Features Of A Operating SystemFeatures Of A Operating System
Features Of A Operating SystemAlexis Naranjo
 
Computer system software
Computer system softwareComputer system software
Computer system softwareMozaSaid
 
Computer software form 4
Computer software form 4Computer software form 4
Computer software form 4norhaslinamj
 
Functions of OS.ppt
 Functions of OS.ppt Functions of OS.ppt
Functions of OS.pptJunaidAkbar37
 
Management Information System
Management Information SystemManagement Information System
Management Information SystemCh Irfan
 
ComputerSoftware.pdf
ComputerSoftware.pdfComputerSoftware.pdf
ComputerSoftware.pdfAFANJIPHILL
 
Final intrict without vid
Final intrict without vidFinal intrict without vid
Final intrict without vidpringles77
 
computer software in Computer Fundamentals
computer software in Computer Fundamentalscomputer software in Computer Fundamentals
computer software in Computer FundamentalsARDEN16
 
lecture 1 (Introduction to Operating System.)
lecture 1 (Introduction to Operating System.)lecture 1 (Introduction to Operating System.)
lecture 1 (Introduction to Operating System.)WajeehaBaig
 
week-1-200310134908.pptx
week-1-200310134908.pptxweek-1-200310134908.pptx
week-1-200310134908.pptxssuser5c874e
 
Vskills c++ developer sample material
Vskills c++ developer sample materialVskills c++ developer sample material
Vskills c++ developer sample materialVskills
 
What Is Software and Exploring Its Types A Comprehensive Guide
What Is Software and Exploring Its Types A Comprehensive GuideWhat Is Software and Exploring Its Types A Comprehensive Guide
What Is Software and Exploring Its Types A Comprehensive GuidePolyxer Systems
 
Vskills c developer sample material
Vskills c developer sample materialVskills c developer sample material
Vskills c developer sample materialVskills
 
Operating system education. technology.
Operating system education.  technology.Operating system education.  technology.
Operating system education. technology.DevarajuBn
 

Similar to What is Operating System, Utility program,virus and anti_virus (20)

Features Of A Operating System
Features Of A Operating SystemFeatures Of A Operating System
Features Of A Operating System
 
Computer system software
Computer system softwareComputer system software
Computer system software
 
Computer software form 4
Computer software form 4Computer software form 4
Computer software form 4
 
System Software
System SoftwareSystem Software
System Software
 
Unit 4 software
Unit 4  softwareUnit 4  software
Unit 4 software
 
Functions of OS.ppt
 Functions of OS.ppt Functions of OS.ppt
Functions of OS.ppt
 
Management Information System
Management Information SystemManagement Information System
Management Information System
 
Computer Fundamental
Computer Fundamental Computer Fundamental
Computer Fundamental
 
Software 3
Software 3Software 3
Software 3
 
System software vt
System software vtSystem software vt
System software vt
 
ComputerSoftware.pdf
ComputerSoftware.pdfComputerSoftware.pdf
ComputerSoftware.pdf
 
Final intrict without vid
Final intrict without vidFinal intrict without vid
Final intrict without vid
 
computer software in Computer Fundamentals
computer software in Computer Fundamentalscomputer software in Computer Fundamentals
computer software in Computer Fundamentals
 
lecture 1 (Introduction to Operating System.)
lecture 1 (Introduction to Operating System.)lecture 1 (Introduction to Operating System.)
lecture 1 (Introduction to Operating System.)
 
week-1-200310134908.pptx
week-1-200310134908.pptxweek-1-200310134908.pptx
week-1-200310134908.pptx
 
Vskills c++ developer sample material
Vskills c++ developer sample materialVskills c++ developer sample material
Vskills c++ developer sample material
 
What Is Software and Exploring Its Types A Comprehensive Guide
What Is Software and Exploring Its Types A Comprehensive GuideWhat Is Software and Exploring Its Types A Comprehensive Guide
What Is Software and Exploring Its Types A Comprehensive Guide
 
Vskills c developer sample material
Vskills c developer sample materialVskills c developer sample material
Vskills c developer sample material
 
Computer software
Computer softwareComputer software
Computer software
 
Operating system education. technology.
Operating system education.  technology.Operating system education.  technology.
Operating system education. technology.
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 

What is Operating System, Utility program,virus and anti_virus

  • 1. System Administration Muhammad Umar Muhammad Adnan Abdul Muteeb Muhammad Mudasser Bilal Ahmad 3029 Hanzala Ashraf CoderCompany.com
  • 2. Principles and Learning Objectives  Definition of system administrator.  Software and Their Types.  We Discuss operating System, function and their importance.  What is utility programmers.  How we Make USB Boot.  How We install Window in Computer.  Window Features.  Difference between Virus and Anti virus. CoderCompany.com
  • 3. What is system Administrator? A SYSTEM ADMINISTRATOR, OR SYS ADMIN, IS A PERSON WHO IS RESPONSIBLE FOR THE UPKEEP, CONFIGURATION, AND RELIABLE OPERATION OF COMPUTER SYSTEMS; ESPECIALLY MULTI-USER COMPUTERS, SUCH AS SERVERS CoderCompany.com
  • 4. Software and their Types:  What is Software  The term Software refers to a set of Computer programs, procedures and associated documents describing the programs , and how they are to be used .  Software Classified in Two Types. 1. System Software . 2. Application Software. CoderCompany.com
  • 5. Difference Between System and Application Software System Software: Systems software includes the programs that are dedicated to managing the computer itself, such as the operating system, file management utilities, and disk operating system (or DOS). Application Software: Application software is a program or group of programs designed for end users. CoderCompany.com
  • 7. What is Operating System?  An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs. All computer programs, excluding firmware, require an operating system to function.
  • 8. Most popular Operating System  The most popular operating system today is Microsoft's Windows operating system. Macintosh computers have their own operating system, the most recent of which is called Mac OS X. There are also open source operating systems such as Linux.
  • 9. History of Macintosh Computer.  The Macintosh (/ MAK-in-tosh), or Mac, is a series of personal computers (PCs) designed, developed, and marketed by Apple Inc. Steve Jobs introduced the original Macintosh computer on January 24, 1984. This was the first mass-market personal computer featuring an integral graphical user interface and mouse. CoderCompany.com
  • 10. Windows and Mac are GUI’s  Microsoft Windows and Apple Macintosh operating systems are “graphical user interfaces” or GUI’s.  GUI is defined as: A picture used in place of a word or words to issue commands CoderCompany.com
  • 11. GUI – Standards  GUI interfaces have standards that are usually the same or similar in all systems and applications.  Standards apply to: • Pointers and pointing devices • Icons, desktops, windows and me
  • 12. What does Operating System do?  Operating System is the set of programs that controls a computer.  It provide a pleasant and effective interface between the user and the hardware.  Makes the computer more convenient to use
  • 13.
  • 14. Types of Operating System?  Real-time operating system(RTOS) –Real-time operating systems are used to control machinery, scientific instruments and industrial systems.  Single-user, single task : As the name implies, this operating system is designed to manage the computer so that one user can effectively do one thing at a time.  Single-user, multi-tasking : This is the type of operating system most people use on their desktop and laptop computers today.  Multi-user : A multi-user operating system allows many different users to take advantage of the computer's resources simultaneously.  Distributed: A distributed operating system manages a group of independent computers and makes them appear to be a single computer.  Embedded: Embedded operating systems are designed to be used in embedded computer systems. They are designed to operate on small machines like PDAs with less autonomy.
  • 15. Features of Good Operating System  efficient time spent to execute its programs should be short  small in size memory occupied should be as small as possible  reliable CoderCompany.com
  • 16. Functions of Operating System  Process Management.  Resource Management.  File Management.  Communication Management.  Security Management.  Memory Management. CoderCompany.com
  • 17. Process Management  All process from start to shut down.  Booting  Open  Save  Install  Copy  Print  Send, etc. CoderCompany.com
  • 18. Resource Management  Installing drivers required for input, output, memory, power, communication devices.  Coordinating among peripherals File Management  Name.  Folders.  Location.  Attributes – size, type, modified, protection, password etc. CoderCompany.com
  • 19. Communication Management.  User – Application S/W – Hardware.  One computer to other computer in LAN/WAN.  Command interpretation.  Downloading-Uploading.
  • 20. Memory Management  The different types of memory in the system must be used properly so that each process can run most effectively.
  • 21. Cache Memory  •Cache - A section of a computer's memory which temporarily retains recently accessed data in order to speed up repeated access to the same data.  It provides rapid access without having to wait for systems to load.
  • 22. RAM Memory  Random access memory (RAM) is the best known form of computer memory.  • RAM is considered "random access" because you can access any memory cell directly if you know the row and column that intersect at that cell.  A ROM chip is non-volatile storage and does not require a constant source of power to retain information stored on it. When power is lost or turned off, a ROM chip will keep the information stored on it. In contrast, a RAM chip is volatile and requires a constant source of power to retain information. CoderCompany.com
  • 23. Security Management  Virus management.  Alert messages.  Dialogue boxes.  Firewall.  Passwords./ Access protection.
  • 24. Functionalities  Protects file and documents of the users.  Protect the computer system from unauthorized user.  Provision of operate computer system by only authorized users.  Extended the security level of users account i.e. either it is administration or guest account.  Disallow the unauthorized users to use the resources and data of the computer and also to share that resources.
  • 25. Function of Operating System: Boot Device: A boot device is any piece of hardware that can read or contains the files required for a computer to start. Boot Disk: A boot disk is a removable digital data storage medium from which a computer can load and run (boot) an operating system or utility program.  Recovery Disk: A recovery disk contains a few system files that will start the computer
  • 26. Utility programmers  A utility program, also called a utility, is a type of system software that allows a user to perform maintenance-type tasks, usually related to managing a computer, its devices, or its programs.  Utility programs are built-in to many operating systems or can be purchased separately.
  • 27. Utility programmers  Functions provided include: managing files, searching for files, viewing images, uninstalling programs, cleaning up disks, defragmenting disks, backing up files and disks, setting up screen savers, securing a computer, etc.
  • 28. Types of Utility Programs  There are many types of utility programs 1. File Manager 2. Image Viewer 3. Search Utility 4. Personal Firewall 5. Antivirus 6. Disk Defragmenter 7. Screen Saver 8. Backup and restore utilities CoderCompany.com
  • 30. What is File Manager?  A file manager or file browser is a computer program that provides a user interface to manage files and folders.  Examples:  Window Explorer  Web browser are also has the feature of file managing. e.g. Internet Explore.  File Commander.  Some file managers provide network connectivity via protocols, such as FTP, NFS……etc. CoderCompany.com
  • 31. Uses/Purposes  The most common operations performed on files or groups of files include:  Creating  Opening (e.g. viewing, playing, editing or printing)  Renaming  Moving or copying  Deleting and searching for files  Modifying file attributes  Properties and file permissions ……….etc CoderCompany.com
  • 33. What is Image viewer?  An image viewer or image browser is a computer program that can display stored graphical images; it can often handle various graphics file formats. Example:  such as Photoshop or the GIMP or the StylePix  Windows Photo viewer.  Windows Picture and Fax Viewer in Windows XP  ACDSee, FastPictureViewer, FastStone Image Viewer, Imagine, IrfanView, Media Pro 1, pViewer, XnView
  • 34. Features: Typical features of image viewers are:  basic viewing operations such as zooming and rotation  full screen display  slideshow  thumbnail display  printing  screen capture CoderCompany.com
  • 35. Advanced features are:  decode next image in advance and keep previous decoded image in memory for fast image changes  display (and edit) metadata such as XMP, IPTC Information Interchange Model and Exif  batch conversion (image format, image dimensions, etc.) and renaming  create contact sheets  create HTML thumbnail pages  different transition effects for slideshows CoderCompany.com
  • 36. Search Utility  Introduction: A couple of years back there were no contenders for this title. Today we have a wealth of choices. Wasting time looking for a file is a huge aggravation. Here are several tools to keep you from falling into that trap.
  • 37. Definition  Any utility that is used locally to help find specific data on either the desktop or on an on-premise server. In other words, Internet search utilities are not included, but everything else is fair game.
  • 38. Search Utility  A search utility is a program that attempts to locate a file on your computer based on criteria you specify.  The criteria may include a word or words contained in a file, date of creation or modification, size of the file, location, file name, author, and other properties.  Search utilities typically use an index, which stores a variety of information about the file, including its name, date created and modified, and author to quickly locate the file. CoderCompany.com
  • 39. Search Utility  In Windows, Explorer and the Start Menu contain a search box where you enter the search criteria.
  • 40. Disk Burning Disc burning software is used to write text, graphics, audio and video files on a recordable or rewriteable CD(Compact Disc) and DVD(Digital Versatile Disc).It allows the user to backup data on optical disc. Ways to burn a CD/DVD  Windows Default disc burning  By using desired software CoderCompany.com
  • 41. Default burning  By using default utility
  • 42.
  • 43. By using “DVD Flick”  http://www.dvdflick.net/download.php(For Download)
  • 44. Steps for Disk burning using “DVD Flick” 1. Insert CD/DVD 2. Add title(add file you want to burn) 3. Menu Settings(to Insert a menu view) 4. Project setting(to give a title) 5. Burning(check the boxes ISO image, Burn project, disc label(write title name), Eject when done).
  • 45. File compression  File Compression is used to shrink the file size. It is easier and faster to send files over the internet. Ways of File Compression  Default (Built-in).  Using desired software(Winrar).
  • 46. Default Compression 1. Right click on folder that you want to compress then click on properties. 2. Click on Send TO. 3. Check or click “Compression contents to save the disk space”. 4. Check the folder’s properties that you have compressed.
  • 47. WinRAR  This is popular file compression software  We can upload folds and more than one files using WinRAR  It is also used to secure the files from viruses.  It can highly compress the files .  Download link for WinRAR http://www.win- rar.com/predownload.html?&f=wrar511.exe&spV=true&subD=true&L=0
  • 48. Make Bootable USB This process By using UltraISO Steps For Installing and Making Win Boot 1. First You have to download Widows ISO file from any platform you like. 2. Downlaod Forms for windows ISO. * https://www.microsoft.com/ * http://webforpc.com/ *http://windows-8.en.malavida.com/ 3. Download PowerISO/UltraISO/Rufus software to Make bootable Windows. 4. After downloading Install any of the Software You downloaded. 5. Now open your installed software.
  • 50. 7. Now Open Program You installed on your Pc
  • 51. 8. Now go to Tools And select Create Bootable USB drive Mentioned in Picture Below
  • 52. 9. Now select ISO file You downloaded in your PC
  • 53. 11. Now Hit Start button As mentioned in Screenshot Below
  • 54. Windows 7 Installation CPU’s requirements for installation of win 7 Minimum hardware that you need to have on your computer and should be checked in advance of installing.  1 GHz CPU with 32 bits or 64 bits.  1 GB Ram for 32 bits or 2 GB Ram for 64 bits.  16 GB empty space hard disk for 32 bits or 20 GB for 64 bits.  DVD drive (if installing from a DVD).  Steps for windows 7 Installation 1. Turn your computer on then press Del or F2 (depend on your computer’s mainboard) to enter the system BIOS. 2. choose Boot From CD/DVD.
  • 55. 3. Insert Windows 7 DVD into your DVD drive then start up your computer, Windows 7 will be loading files. 4. Select these parts: Language to Install, Time and currency format, Keyboard or input method. Then click Next. 5. Choose Install Now if you want to install Windows 7. 6. Click 'I accept the license terms' in 'Please read the license' then click Next. 7. Custom (advance)' if you want to install a new version of Windows. 8. Choose Partition for installation. 9. Wait for Installing Windows to progress.
  • 56. Computer Virus Definition:  “A virus is a program that copy itself without the permission and knowledge of the user”.  “Virus + computer=Death”.
  • 57. Characteristics Ability to replicated itself Ability to attached itself to another computer file Slow down the response time Extensive pop-up-ads. Damage the computer hard drive
  • 58. Differentiate virus and Worm Some people distinguish between general viruses and worms. A worm is a special type of virus that can replicate itself and use memory, but cannot attach itself to other programs. Worm is too dangerous than virus
  • 59. Types of Computer Viruses  Boot Sector Virus  Browser Hijacker  File Infector Virus  Macro Virus  Multipartite Virus  Polymorphic Virus  Resident Virus  Web Scripting Virus CoderCompany.com
  • 61. History of virus  1949, scientist of Mathematics JOHAN VON NEUMANN proposed the idea of self replicated program which he describe the acting motion of virus in a real world.  1960,A group of programmer developed a game called core ware which produced a copy itself as well as the games Is run.  1980, Microsoft developed MS-DOS ,A fast OS on the planet . After this virus become more thick and fast.  1986 major mile stone world protrusion called pc-writ.it is also called Trojan Hoarse.  1988,a virus called MORRIS work for MS-DOS
  • 62.  1999, A famous MELISSA virus W97M/Melissa executed a macro with an attachment file from an email. This is turn forward into the 50people.Now they used internet  2000,I love you virus developed .its function like Melissa but it is too power full than Melissa .it would delete the media files like MP3 Images Videos etc.  2001 core red 1&2 Virus developed. Sven hundred thousand machine infected from this and 2 billion dollar of the damage.  2003, SQL Slammer virus developed .from this internet become very slow all over the world.6 moths later MICROSOFT released a Fix For the BUG called slammer.  2007, A virus developed called STORM WORM.it connect computer to the BOT-NET.  2016, Different virus MALWARE, ADWAER, SPYWARE which steel information today from the computer alover the world
  • 63. ANTIVIRUS Definition:  Antivirus is a software which is used to preventing a computer system from virus by detecting and removing it.  Antivirus are special program that detect and remove virus from computer system.
  • 64. Virus Scanning Process  . Antivirus Scene system Virus not found Virus found/ detected Show message Remove virus CoderCompany.com
  • 66. Codercompany.com Best Web Design Company in Pakistan Contact Us for any web Related Services Thank You for Your Attention