SlideShare ist ein Scribd-Unternehmen logo
1 von 53
Chapter-3Chapter-3
Software Concepts
COMPUTER’S KEY INGREDIENTSCOMPUTER’S KEY INGREDIENTS
BASIC COMPUTER PARTSBASIC COMPUTER PARTS
COMPUTER’S KEY INGREDIENTSCOMPUTER’S KEY INGREDIENTS
SOFTWARE- Set of programs. Can be
stored in storage devices eg. Photoshop
etc.
HARDWARE- physical components
eg. monitor, mouse, motherboard etc.
FIRMWARE-software that are
permanently stored in an electronic
device eg. ROM
LIVEWARE- people who use the
computer eg. users, programmers, coders
SOFTWARE-A BRIEF HISTORYSOFTWARE-A BRIEF HISTORY
SOFTWARE-A BRIEF HISTORYSOFTWARE-A BRIEF HISTORY
LOW LEVEL LANGUAGES (LLL’s)
Machine language
◦ Made up of 0s and 1s (binary code)
◦ Difficult to understand
◦ Difficult to code
◦ Deals with absolute memory addresses
Assembly language (early 1950’s)
◦ Uses mnemonic/symbolic codes
◦ Uses assembler for conversion to binary code
◦ Machine dependent(1:1 correspondence b/w
assembly & machine instructions)
◦ Deals with symbolic memory addresses
HIGH LEVEL LANGUAGES(HLL’s)
o Similar to english
o Easy to code
o Machine independent
o Translator program-compiler used for
conversion to binary code
o Eg. COBOL, FORTRAN, PASCAL
SOFTWARE-A BRIEF HISTORYSOFTWARE-A BRIEF HISTORY
COMPUTER ARCHITECTURECOMPUTER ARCHITECTURE
TYPES OF SOFTWARETYPES OF SOFTWARE
SYSTEM SOFTWARESYSTEM SOFTWARE
APPLICATION SOFTWAREAPPLICATION SOFTWARE
UTILITY SOFTWAREUTILITY SOFTWARE
OTHER SYSTEM SOFTWAREOTHER SYSTEM SOFTWARE
ASSEMBLER
◦ Assembler converts assembly language into
binary language
ASSEMBLY LANGUAGEASSEMBLY LANGUAGE
◦ An assembly language program contains a
symbolic operation code and a symbolic
address:
OP-CODE OPERAND
LOAD A (load A into the accumulator)
SUB L (subtract L from the accumulator)
STORE B (store the contents of accumulator to B)
◦ It uses symbolic memory addresses
◦ It is machine dependent-does not run on
different machines.
OTHER SYSTEM SOFTWAREOTHER SYSTEM SOFTWARE
COMPILER
◦ Compiler converts high level language into
binary language
◦ Converts source code(written in HLL) to
object code(computer’s language)
◦ Checks the whole code at once, not line wise
◦ Eg. Turbo C++ compiler
TRANSLATION PROCESSTRANSLATION PROCESS
POINTS TO REMEMBERPOINTS TO REMEMBER
Linker links the object code to create
machine executable program
Source program and executable program
are same
Source program doesn’t run in a
computer but the translated executable
program runs
OTHER SYSTEM SOFTWAREOTHER SYSTEM SOFTWARE
INTERPRETER
◦ Provides program execution
environment
◦ Interpreter interprets the
source code and executes it.
◦ Interprets the code line wise
◦ Examined code is decoded
◦ Executed through equivalent
sequence of machine code
◦ Eg. GW Basic interpreter
COMPILER VS INTERPRETERCOMPILER VS INTERPRETER
COMPILER OPERATION INTERPRETER OPERATION
OTHER SYSTEM SOFTWAREOTHER SYSTEM SOFTWARE
LOADERS & LINKERS
◦ System software that combines different program
modules or functions into machine language program
is LINKER
◦ System software that moves the executable code
from magnetic storage to the main memory is
LOADER
Loader
LINKER OPERATION
UTILITY SOFTWAREUTILITY SOFTWARE
ANTI VIRUS
◦ Identifies and removes the virus
HOW VIRUS WORKS??? LET’SHOW VIRUS WORKS??? LET’S
TAKE A LOOK…TAKE A LOOK…
BOOT SECTOR VIRUSBOOT SECTOR VIRUS
BOOT SECTOR VIRUSBOOT SECTOR VIRUS
◦ Displaces boot record and copies itself on the
boot sector
◦ Cannot be overwritten by any other program
◦ During booting the copy of virus is loaded in
the main memory
◦ Virus passes control to the boot record, thus
infecting the OS
◦ Any new disk inserted also gets infected in
the same way and it goes on…
WORKING OF ANTI VIRUSWORKING OF ANTI VIRUS
◦ Reads boot sector and refers to its virus
directory
◦ Virus is detected if during search, any
definition matches its directory
◦ Overwrites the correct boot record over the
infected one
◦ Marks bad sector as clean
◦ Keeps an eye on all activities
◦ Scans any peripheral attached
FILE VIRUSFILE VIRUS
◦ Attacks executable files
◦ Every executable file has a data part and an
instruction part
X X X X
◦ The first instruction makes the control jump
on the specified address ie address of the
start of instruction part of the program
◦ Data part of the exe file is not entered into
FILE VIRUSFILE VIRUS
◦ File virus attaches itself at the end of the exe file eg at
address YYYY
◦ Modifies jump instruction from XXXX to YYYY
◦ YYYY is the address of virus, where control will jump
◦ Now virus will be activated in main memory
◦ The last statement of virus JUMP XXXX will be
inserted and program starts executing
X X X X
Y Y Y Y
WORKING OF ANTI VIRUSWORKING OF ANTI VIRUS
◦ Reads the first instruction ie jump YYYY and
refers to its virus directory
◦ If virus is detected then it does one of the
following:-
 Repairs the file-removes virus code after address
YYYY
 Isolates the file –no one can access it
 Deletes the file
WORKING OF ANTI VIRUSWORKING OF ANTI VIRUS
o Finally it takes the actual address XXXX of the
start of the executable program
o First statement jumps to address XXXX
X X X X
Y Y Y Y
1
3
2
Infected file Virus code removed and first statement modified
OTHER IMPORTANT VIRUSES…OTHER IMPORTANT VIRUSES…
OTHER IMPORTANT VIRUSES…OTHER IMPORTANT VIRUSES…
MACRO VIRUS
◦ MS-Office and Open Office deals with macros
◦ Macros help automating tasks
◦ Macro virus infects the normal.dot file of MS-
Word. This file stores the default settings
such as font, font size, file content etc.
◦ Damages the formatting
◦ Doesn’t allow editing of the document
◦ Sometimes doesn’t allow saving the file
OTHER IMPORTANT VIRUSES…OTHER IMPORTANT VIRUSES…
E-MAIL VIRUS
◦ Infects the e-mail system by attaching itself as
a message
◦ Picks up addresses and sends fabricated
messages
◦ This way it keeps replicating
OTHER IMPORTANT VIRUSES…OTHER IMPORTANT VIRUSES…
TROJAN HORSE
◦ Got its name from the famous story of
Greeks attacking the city of Troy
◦ Generally comes along with games
◦ When the games is run, it becomes activated
OTHER IMPORTANT VIRUSES…OTHER IMPORTANT VIRUSES…
WORM
◦ Keeps on replicating itself on the network
◦ Looks for security holes on the machines
attached to the network
WORKING OF ANTI VIRUSWORKING OF ANTI VIRUS
◦ Acts like a security guard and checks for any
suspicious activity
◦ Flags the suspicious program
◦ Scans the computer
◦ Identifies and repairs the infected files
DISK MANAGEMENT TOOLSDISK MANAGEMENT TOOLS
DISK MANAGEMENT TOOLSDISK MANAGEMENT TOOLS
DISK DEFRAGMENTER
◦ Due to lack of continuous memory space on
the disk, files are stored in fragments
◦ Some fragments get spilled over to other
cylinders
◦ File access becomes slow-as movement of
cylinder head from one cylinder to another is
a slow task
◦ Disk defragmenter brings all the fragments
together
DISK DEFRAGMENTATION…..DISK DEFRAGMENTATION…..
DISK MANAGEMENT TOOLSDISK MANAGEMENT TOOLS
DISK CLEANER
◦ Checks for the inactive files on the disk
◦ Prompts the user if these files have occupied
large space
◦ User may delete or take back up of these files
DISK CLEANER…..DISK CLEANER…..
DISK MANAGEMENT TOOLSDISK MANAGEMENT TOOLS
BACKUP
◦ Copies the important data from hard disk /
CD / any storage device
◦ Stores it on another disk- called backup disk
◦ In case of system disk failure/accidental loss,
backup file can be restored using backup
facility
BACKUP PROCESS…..BACKUP PROCESS…..
BACKUP SOFTWARE FOR OUTLOOK
FILE MANAGEMENT TOOLSFILE MANAGEMENT TOOLS
o SOME TOOLS AT GLANCE…..
◦ Windows explorer
◦ Google desktop
◦ VCOM power disk pro
◦ Free commander
FILE MANAGEMENT TOOLSFILE MANAGEMENT TOOLS
o FUNCTIONS PERFORMED BY THESE
TOOLS…..
◦ Storage
◦ Indexing
◦ Searching
◦ Sorting
APPLICATION SOFTWAREAPPLICATION SOFTWARE
WORD PROCESSOR
◦ Documentation software to create
presentable documents
◦ WYSIWYG type- What you see is what you
get
◦ Features like auto error correction, spell
check, grammar check etc.
WORD PROCESSOR VENDOR
WINDOWS BASED
• MS-WORD XP
• MS WORD 2007
• WORD PERFECT
• AMI PRO
• OPEN OFFICE-WRITER
MICROSOFT
MICROSOFT
WORD PERFECT CORP.
LOTUS DEVELOPMENT
SUN MICROSYSTEMS
LINUX / UNIX BASED
• Vi EDITOR PART OF THE OPERATING
SYSTEM
APPLE MACINTOSH BASED
• MAC WRITE
• WORD
• WRITE NOW
• WORD PERFECT
• OPEN OFFICE- WRITER
CLARIS SOFTWARE
MICROSOFT
T/MAKER
WORD PERFECT CORP
SUN MICROSYSTEMS
SCREEN SHOT- WORD 2007SCREEN SHOT- WORD 2007
SCREEN SHOT- OPENOFFICESCREEN SHOT- OPENOFFICE
WRITERWRITER
APPLICATION SOFTWAREAPPLICATION SOFTWARE
SPREADSHEET PACKAGE
◦ Also known as ESS (Electronic Spreadsheet
Software) program
◦ Matrix sheet made up of rows and columns
◦ Intersection of a row and column is a cell
◦ Each cell is identified by its cell address
◦ Visi Calc was the first spreadsheet package
followed by Lotus 1-2-3, MS Excel
SPREADSHEET MANUFACTURER COMPATIBLE
PLATFORM
1-2-3 LOTUS DEVELOPMENT • Apple Macintosh
• IBM microcomputers
EXCEL MICROSOFT • Apple Macintosh
• IBM microcomputers
IMPROV LOTUS DEVELOPMENT • IBM-compatible
QUATTRO PRO BORLAND • IBM-compatible
SCREEN SHOT- EXCEL 2007SCREEN SHOT- EXCEL 2007
SCREEN SHOT- OPENOFFICESCREEN SHOT- OPENOFFICE
CALCCALC
APPLICATION SOFTWAREAPPLICATION SOFTWARE
BUSINESS SOFTWARE
◦ Used in commercial organizations
◦ Some popular business software are:
 Inventory management system
 Payroll system
 Financial accounting

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Configuring Devices in Windows
Configuring Devices in WindowsConfiguring Devices in Windows
Configuring Devices in Windows
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
 
Ch02
Ch02Ch02
Ch02
 
Operating system mod
Operating system modOperating system mod
Operating system mod
 
Linux forensics
Linux forensicsLinux forensics
Linux forensics
 
Linux vs windows
Linux vs windowsLinux vs windows
Linux vs windows
 
Operating System
Operating SystemOperating System
Operating System
 
Computer Operating System
Computer Operating SystemComputer Operating System
Computer Operating System
 
Os
OsOs
Os
 
Chapter 8 Operating Systems And Utility Programs
Chapter 8 Operating Systems And Utility ProgramsChapter 8 Operating Systems And Utility Programs
Chapter 8 Operating Systems And Utility Programs
 
Presentation windows operating system
Presentation  windows operating systemPresentation  windows operating system
Presentation windows operating system
 
Computer software
Computer softwareComputer software
Computer software
 
KeyLoggers - beating the shit out of keyboard since quite a long time
KeyLoggers - beating the shit out of keyboard since quite a long timeKeyLoggers - beating the shit out of keyboard since quite a long time
KeyLoggers - beating the shit out of keyboard since quite a long time
 
operating system
operating systemoperating system
operating system
 
Operating system windows XP
Operating system windows XPOperating system windows XP
Operating system windows XP
 
What is Google Chrome?
What is Google Chrome?What is Google Chrome?
What is Google Chrome?
 
Future operating system
Future operating systemFuture operating system
Future operating system
 
Topic 6
Topic 6Topic 6
Topic 6
 
System software
System softwareSystem software
System software
 
Embedded Systems: Lecture 5: A Tour in RTOS Land
Embedded Systems: Lecture 5: A Tour in RTOS LandEmbedded Systems: Lecture 5: A Tour in RTOS Land
Embedded Systems: Lecture 5: A Tour in RTOS Land
 

Andere mochten auch

computer software concepts
computer software conceptscomputer software concepts
computer software conceptsclarice03
 
Software Concepts
Software ConceptsSoftware Concepts
Software Conceptsrejina128
 
computer software
computer softwarecomputer software
computer softwareRiya Gupta
 
Software engineering 101 - The basics you should hear about at least once
Software engineering 101 - The basics you should hear about at least onceSoftware engineering 101 - The basics you should hear about at least once
Software engineering 101 - The basics you should hear about at least onceAlexey (Mr_Mig) Migutsky
 

Andere mochten auch (6)

computer software concepts
computer software conceptscomputer software concepts
computer software concepts
 
Software
SoftwareSoftware
Software
 
Software
SoftwareSoftware
Software
 
Software Concepts
Software ConceptsSoftware Concepts
Software Concepts
 
computer software
computer softwarecomputer software
computer software
 
Software engineering 101 - The basics you should hear about at least once
Software engineering 101 - The basics you should hear about at least onceSoftware engineering 101 - The basics you should hear about at least once
Software engineering 101 - The basics you should hear about at least once
 

Ähnlich wie Chapter 3

Computer system software
Computer system softwareComputer system software
Computer system softwareMozaSaid
 
A presentation on system software
A presentation on system software A presentation on system software
A presentation on system software Ankit Sangwan
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Sehrish Rafiq
 
Computer software and operating system
Computer software and operating systemComputer software and operating system
Computer software and operating systemsonykhan3
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Virusesjenniel143
 
Bn0202 operatingsystemsfeaturesandfunctions
Bn0202 operatingsystemsfeaturesandfunctionsBn0202 operatingsystemsfeaturesandfunctions
Bn0202 operatingsystemsfeaturesandfunctionsPanzer944
 
Computer assignment on virus and memory and printer
Computer assignment on virus and memory and printerComputer assignment on virus and memory and printer
Computer assignment on virus and memory and printerShamzayAli
 
Introduction to Computer Softwares
Introduction to Computer SoftwaresIntroduction to Computer Softwares
Introduction to Computer SoftwaresNaresh Dubey
 
Vskills c developer sample material
Vskills c developer sample materialVskills c developer sample material
Vskills c developer sample materialVskills
 
Neethu Narayanan- Operating System
 Neethu Narayanan- Operating System Neethu Narayanan- Operating System
Neethu Narayanan- Operating System19940213
 
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)SURBHI SAROHA
 
categories of computer software
categories of computer softwarecategories of computer software
categories of computer softwareManidhar Chowdary
 

Ähnlich wie Chapter 3 (20)

Computer system software
Computer system softwareComputer system software
Computer system software
 
ICT Skills.pdf
ICT Skills.pdfICT Skills.pdf
ICT Skills.pdf
 
A presentation on system software
A presentation on system software A presentation on system software
A presentation on system software
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11
 
System Software
System SoftwareSystem Software
System Software
 
Computer software and operating system
Computer software and operating systemComputer software and operating system
Computer software and operating system
 
Software introduction
Software introductionSoftware introduction
Software introduction
 
what is Operating system
what is Operating systemwhat is Operating system
what is Operating system
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
 
Software.pptx
Software.pptxSoftware.pptx
Software.pptx
 
Bn0202 operatingsystemsfeaturesandfunctions
Bn0202 operatingsystemsfeaturesandfunctionsBn0202 operatingsystemsfeaturesandfunctions
Bn0202 operatingsystemsfeaturesandfunctions
 
Computer Software
Computer SoftwareComputer Software
Computer Software
 
Computer assignment on virus and memory and printer
Computer assignment on virus and memory and printerComputer assignment on virus and memory and printer
Computer assignment on virus and memory and printer
 
Introduction to Computer Softwares
Introduction to Computer SoftwaresIntroduction to Computer Softwares
Introduction to Computer Softwares
 
Operating system
Operating systemOperating system
Operating system
 
Vskills c developer sample material
Vskills c developer sample materialVskills c developer sample material
Vskills c developer sample material
 
Neethu Narayanan- Operating System
 Neethu Narayanan- Operating System Neethu Narayanan- Operating System
Neethu Narayanan- Operating System
 
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)
 
categories of computer software
categories of computer softwarecategories of computer software
categories of computer software
 
Introduction to software
Introduction to softwareIntroduction to software
Introduction to software
 

Kürzlich hochgeladen

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 

Kürzlich hochgeladen (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Chapter 3

  • 3. BASIC COMPUTER PARTSBASIC COMPUTER PARTS
  • 4. COMPUTER’S KEY INGREDIENTSCOMPUTER’S KEY INGREDIENTS SOFTWARE- Set of programs. Can be stored in storage devices eg. Photoshop etc. HARDWARE- physical components eg. monitor, mouse, motherboard etc. FIRMWARE-software that are permanently stored in an electronic device eg. ROM LIVEWARE- people who use the computer eg. users, programmers, coders
  • 6. SOFTWARE-A BRIEF HISTORYSOFTWARE-A BRIEF HISTORY LOW LEVEL LANGUAGES (LLL’s) Machine language ◦ Made up of 0s and 1s (binary code) ◦ Difficult to understand ◦ Difficult to code ◦ Deals with absolute memory addresses Assembly language (early 1950’s) ◦ Uses mnemonic/symbolic codes ◦ Uses assembler for conversion to binary code ◦ Machine dependent(1:1 correspondence b/w assembly & machine instructions) ◦ Deals with symbolic memory addresses
  • 7. HIGH LEVEL LANGUAGES(HLL’s) o Similar to english o Easy to code o Machine independent o Translator program-compiler used for conversion to binary code o Eg. COBOL, FORTRAN, PASCAL SOFTWARE-A BRIEF HISTORYSOFTWARE-A BRIEF HISTORY
  • 13. OTHER SYSTEM SOFTWAREOTHER SYSTEM SOFTWARE ASSEMBLER ◦ Assembler converts assembly language into binary language
  • 14. ASSEMBLY LANGUAGEASSEMBLY LANGUAGE ◦ An assembly language program contains a symbolic operation code and a symbolic address: OP-CODE OPERAND LOAD A (load A into the accumulator) SUB L (subtract L from the accumulator) STORE B (store the contents of accumulator to B) ◦ It uses symbolic memory addresses ◦ It is machine dependent-does not run on different machines.
  • 15. OTHER SYSTEM SOFTWAREOTHER SYSTEM SOFTWARE COMPILER ◦ Compiler converts high level language into binary language ◦ Converts source code(written in HLL) to object code(computer’s language) ◦ Checks the whole code at once, not line wise ◦ Eg. Turbo C++ compiler
  • 17. POINTS TO REMEMBERPOINTS TO REMEMBER Linker links the object code to create machine executable program Source program and executable program are same Source program doesn’t run in a computer but the translated executable program runs
  • 18. OTHER SYSTEM SOFTWAREOTHER SYSTEM SOFTWARE INTERPRETER ◦ Provides program execution environment ◦ Interpreter interprets the source code and executes it. ◦ Interprets the code line wise ◦ Examined code is decoded ◦ Executed through equivalent sequence of machine code ◦ Eg. GW Basic interpreter
  • 19. COMPILER VS INTERPRETERCOMPILER VS INTERPRETER COMPILER OPERATION INTERPRETER OPERATION
  • 20. OTHER SYSTEM SOFTWAREOTHER SYSTEM SOFTWARE LOADERS & LINKERS ◦ System software that combines different program modules or functions into machine language program is LINKER ◦ System software that moves the executable code from magnetic storage to the main memory is LOADER Loader LINKER OPERATION
  • 21. UTILITY SOFTWAREUTILITY SOFTWARE ANTI VIRUS ◦ Identifies and removes the virus
  • 22. HOW VIRUS WORKS??? LET’SHOW VIRUS WORKS??? LET’S TAKE A LOOK…TAKE A LOOK…
  • 23. BOOT SECTOR VIRUSBOOT SECTOR VIRUS
  • 24. BOOT SECTOR VIRUSBOOT SECTOR VIRUS ◦ Displaces boot record and copies itself on the boot sector ◦ Cannot be overwritten by any other program ◦ During booting the copy of virus is loaded in the main memory ◦ Virus passes control to the boot record, thus infecting the OS ◦ Any new disk inserted also gets infected in the same way and it goes on…
  • 25. WORKING OF ANTI VIRUSWORKING OF ANTI VIRUS ◦ Reads boot sector and refers to its virus directory ◦ Virus is detected if during search, any definition matches its directory ◦ Overwrites the correct boot record over the infected one ◦ Marks bad sector as clean ◦ Keeps an eye on all activities ◦ Scans any peripheral attached
  • 26. FILE VIRUSFILE VIRUS ◦ Attacks executable files ◦ Every executable file has a data part and an instruction part X X X X ◦ The first instruction makes the control jump on the specified address ie address of the start of instruction part of the program ◦ Data part of the exe file is not entered into
  • 27. FILE VIRUSFILE VIRUS ◦ File virus attaches itself at the end of the exe file eg at address YYYY ◦ Modifies jump instruction from XXXX to YYYY ◦ YYYY is the address of virus, where control will jump ◦ Now virus will be activated in main memory ◦ The last statement of virus JUMP XXXX will be inserted and program starts executing X X X X Y Y Y Y
  • 28. WORKING OF ANTI VIRUSWORKING OF ANTI VIRUS ◦ Reads the first instruction ie jump YYYY and refers to its virus directory ◦ If virus is detected then it does one of the following:-  Repairs the file-removes virus code after address YYYY  Isolates the file –no one can access it  Deletes the file
  • 29. WORKING OF ANTI VIRUSWORKING OF ANTI VIRUS o Finally it takes the actual address XXXX of the start of the executable program o First statement jumps to address XXXX X X X X Y Y Y Y 1 3 2 Infected file Virus code removed and first statement modified
  • 30. OTHER IMPORTANT VIRUSES…OTHER IMPORTANT VIRUSES…
  • 31. OTHER IMPORTANT VIRUSES…OTHER IMPORTANT VIRUSES… MACRO VIRUS ◦ MS-Office and Open Office deals with macros ◦ Macros help automating tasks ◦ Macro virus infects the normal.dot file of MS- Word. This file stores the default settings such as font, font size, file content etc. ◦ Damages the formatting ◦ Doesn’t allow editing of the document ◦ Sometimes doesn’t allow saving the file
  • 32. OTHER IMPORTANT VIRUSES…OTHER IMPORTANT VIRUSES… E-MAIL VIRUS ◦ Infects the e-mail system by attaching itself as a message ◦ Picks up addresses and sends fabricated messages ◦ This way it keeps replicating
  • 33. OTHER IMPORTANT VIRUSES…OTHER IMPORTANT VIRUSES… TROJAN HORSE ◦ Got its name from the famous story of Greeks attacking the city of Troy ◦ Generally comes along with games ◦ When the games is run, it becomes activated
  • 34. OTHER IMPORTANT VIRUSES…OTHER IMPORTANT VIRUSES… WORM ◦ Keeps on replicating itself on the network ◦ Looks for security holes on the machines attached to the network
  • 35. WORKING OF ANTI VIRUSWORKING OF ANTI VIRUS ◦ Acts like a security guard and checks for any suspicious activity ◦ Flags the suspicious program ◦ Scans the computer ◦ Identifies and repairs the infected files
  • 36. DISK MANAGEMENT TOOLSDISK MANAGEMENT TOOLS
  • 37. DISK MANAGEMENT TOOLSDISK MANAGEMENT TOOLS DISK DEFRAGMENTER ◦ Due to lack of continuous memory space on the disk, files are stored in fragments ◦ Some fragments get spilled over to other cylinders ◦ File access becomes slow-as movement of cylinder head from one cylinder to another is a slow task ◦ Disk defragmenter brings all the fragments together
  • 39. DISK MANAGEMENT TOOLSDISK MANAGEMENT TOOLS DISK CLEANER ◦ Checks for the inactive files on the disk ◦ Prompts the user if these files have occupied large space ◦ User may delete or take back up of these files
  • 41. DISK MANAGEMENT TOOLSDISK MANAGEMENT TOOLS BACKUP ◦ Copies the important data from hard disk / CD / any storage device ◦ Stores it on another disk- called backup disk ◦ In case of system disk failure/accidental loss, backup file can be restored using backup facility
  • 43. FILE MANAGEMENT TOOLSFILE MANAGEMENT TOOLS o SOME TOOLS AT GLANCE….. ◦ Windows explorer ◦ Google desktop ◦ VCOM power disk pro ◦ Free commander
  • 44. FILE MANAGEMENT TOOLSFILE MANAGEMENT TOOLS o FUNCTIONS PERFORMED BY THESE TOOLS….. ◦ Storage ◦ Indexing ◦ Searching ◦ Sorting
  • 45. APPLICATION SOFTWAREAPPLICATION SOFTWARE WORD PROCESSOR ◦ Documentation software to create presentable documents ◦ WYSIWYG type- What you see is what you get ◦ Features like auto error correction, spell check, grammar check etc.
  • 46. WORD PROCESSOR VENDOR WINDOWS BASED • MS-WORD XP • MS WORD 2007 • WORD PERFECT • AMI PRO • OPEN OFFICE-WRITER MICROSOFT MICROSOFT WORD PERFECT CORP. LOTUS DEVELOPMENT SUN MICROSYSTEMS LINUX / UNIX BASED • Vi EDITOR PART OF THE OPERATING SYSTEM APPLE MACINTOSH BASED • MAC WRITE • WORD • WRITE NOW • WORD PERFECT • OPEN OFFICE- WRITER CLARIS SOFTWARE MICROSOFT T/MAKER WORD PERFECT CORP SUN MICROSYSTEMS
  • 47. SCREEN SHOT- WORD 2007SCREEN SHOT- WORD 2007
  • 48. SCREEN SHOT- OPENOFFICESCREEN SHOT- OPENOFFICE WRITERWRITER
  • 49. APPLICATION SOFTWAREAPPLICATION SOFTWARE SPREADSHEET PACKAGE ◦ Also known as ESS (Electronic Spreadsheet Software) program ◦ Matrix sheet made up of rows and columns ◦ Intersection of a row and column is a cell ◦ Each cell is identified by its cell address ◦ Visi Calc was the first spreadsheet package followed by Lotus 1-2-3, MS Excel
  • 50. SPREADSHEET MANUFACTURER COMPATIBLE PLATFORM 1-2-3 LOTUS DEVELOPMENT • Apple Macintosh • IBM microcomputers EXCEL MICROSOFT • Apple Macintosh • IBM microcomputers IMPROV LOTUS DEVELOPMENT • IBM-compatible QUATTRO PRO BORLAND • IBM-compatible
  • 51. SCREEN SHOT- EXCEL 2007SCREEN SHOT- EXCEL 2007
  • 52. SCREEN SHOT- OPENOFFICESCREEN SHOT- OPENOFFICE CALCCALC
  • 53. APPLICATION SOFTWAREAPPLICATION SOFTWARE BUSINESS SOFTWARE ◦ Used in commercial organizations ◦ Some popular business software are:  Inventory management system  Payroll system  Financial accounting

Hinweis der Redaktion

  1. peripheral
  2. peripheral
  3. peripheral
  4. peripheral