You are on page 1of 5

SOFTWARE

The software provides the commands that tell the hardware what tasks to perform, what to read and write, how to send the end result (the output) to a monitor and/or printer. Software is the programs and data that a computer uses. Software is kept on some hardware device such as a hard disk or floppy disk, but it itself is intangible. Software consists of both programs and data. Programs are lists of instructions for the processor. Data can be any information that a program needs: character data, numerical data, image data, audio data, and countless other types. KINDS OF SOFTWARE

Application software (usually called just "applications") are programs that people use to get their work done. It may include data entry; update query and report programs, productivity software for spreadsheets, word processing, databases and custom accounting programs for payroll, billing and inventory. It is designed to help people with specific task such as making a spreadsheet of creating a graphic image. Example of Application Software: Word Processor Spreadsheet Software Presentation Software Database Software Web Browser Microsoft Word Microsoft Excel Microsoft PowerPoint Microsoft Access Internet Explorer Lotus Word Pro Word Perfect Lotus 123 Quicken Lotus Freelance Graphics Lotus Approach Netscape Navigator

PIM (Personal Information Manager) - software designed to organize names, addresses, and random notes for easy and efficient retrieval. It is just like an electronic equivalent of a conventional book-type personal organizer. PIM usually features an automatic dialing telephone list, a programmable calendar and an automatic reminder scheduler. It is ideal for people with hectic schedules who spend a lot of time working with their computers. Example: Lotus Organizer

Operating Systems are software which controls the computer and runs applications, it keep all the hardware and software running together smoothly. What the Operating System does is communicate information from the application software to a computer's program. Example of Operating Systems: CP/M (Control Program for Microcomputer) an Early Operating System MS-DOS PC-DOS Microsoft Windows Mac OS OS 2 Linux UNIX

OPERATING SYSTEM'S COMPONENTS The User Interface

The operating system's user interface is what users see onscreen and interact with when giving a computer instructions and commands. A user communicates to the computer either by typing commands at a command prompt or by issuing commands through a graphical user interface (GUI). The Kernel The operating system's core is its kernel. The kernel's job is to regulate disk files, memory management, program objectives and tasks, and program execution and processes. The kernel is considered the operating system's core because it controls a computer's hardware, and is responsible for either directly activating computer hardware or for interfacing with software that drives the hardware. The File Management System The file management system is the operating system's organizer, arranging files in hierarchical tree-like structure the root directory. Files are data collections with single, logical names. Filename extensions declare a files type: .txt identifies text data .jpg, .bmp, and .gif extensions identify graphic files.

Programming Languages are used to create all other software whether it is Operating system or Application software. Machine-Language first generation languages Assembly-Language second-generation languages An assembly language, however, can be used only with one type of CPU chip or microprocessor. High-Level Languages - third generation, languages High-level languages often use words that are more like the English Language (List, Print, and Open) as commands that might stand for a sequence of tens or hundreds of machine-language instructions. The commands are entered from the keyboard, from a program in memory, or from a storage device, and are translated by a program that interprets them into machinelanguage instructions, Example of High Level-Languages FORTRAN (Formula Translation) was the first comprehensive high level programming language ALGOL (ALGOrithmic Language) COBOL (Common Business Oriented Language) a commercial and business programming language, concentrated on data organization and file handling and was widely used at one time in business. BASIC (Beginners All-purpose Symbolic Instruction Code Pascal (named for Blaise Pascal) LOGO was developed to introduced children to computer C Languages (C and C++) LISP PROLOG (PROgramming for LOGic) used in research on Artificial Intelligence (AI) ADA descendant of Pascal, was designed for military applications such as Strategic Defense Initiatives (Star Wars) missile program Forth and Fifth Generation languages are even closer to natural languages or rely on graphical user interfaces (GUI) featuring symbolic icons and drag-and-drop technique and English-like statements. Example of Forth and Fifth Generation languages Delphi Visual Basic Visual C++ Visual Fox Pro

INTEGRATED SOFTWARE PACKAGES - is a single software program that includes multiple applications. It generally includes a word processing program, an electronic spreadsheet program, database software, a personal management grogram and limited graphics capabilities. The applications have a common interface -they "look alike"- and users can cut and-paste data from one application to another. One of its advantages is their economy; they are cheaper compared to the combined cost of separate standalone software. It also requires less storage space on the computer hard drive. Examples of Integrated Software Packages 1. Microsoft Works 2. LotusWorks APPLICATION SUITES - is a bundle of application that were created, packaged and designed to work together. Like the integrated package, it includes a word processing program, an electronic spreadsheet program, database software, a personal management grogram and graphics applications. It is both powerful and versatile and offer more options for users to manipulate and organize data. A drawback however, is they require more computer memory than integrated packages. Examples of Application Suites 1. 2. Microsoft Office Lotus Smart Suite WHAT IS A COMPUTER VIRUS? A (computer) virus is a program (a block of executable code) which attaches itself to, overwrites or otherwise replaces another program in order to reproduce itself without the knowledge of the PC user. WHY DO PEOPLE CREATE COMPUTER VIRUS? People create viruses for several reasons.

Some people think it's funny to create mischief, by creating viruses. Some people are angry (at dictatorships, at the military, at big impersonal corporations, at clients who don't pay bills, at lovers who rejected them, and at homosexuals). Some people are intellectuals who want the challenge of trying to create a program that replicates itself. Too often, the program replicates itself too well and too fast and accidentally does more harm that the programmer intended. Some people want to become famous (or infamous or influential) by inventing viruses. People who create viruses tend to be immature.

Virus can be transmitted by: Booting a PC from infected medium Executing an infected program Opening an infected file

Common routed for virus infiltration include Floppy disks or other media that user can exchange Email attachments Pirated software Shareware

What are some virus symptoms? Slower Operation Decreased memory A disk drive LED lighting up for no apparent reason

7 KINDS OF VIRUSES 1. File virus A file virus (also called a parasitic virus) secretly attaches itself to an innocent program so the innocent program becomes infected. Whenever you run the infected innocent program, you're running the virus too! Examples: Yankee Doodle (From Bulgaria in September 1989) Die Hard 2 (From South Africa in July 1994) Chernobyl (From Taiwan in June 1998) 2. BOOT-SECTOR VIRUSES On a floppy disk or hard disk, the first sector is called the disk's boot sector or, master boot record (MBR). A virus that-hide in the boot sector is called a boot-sector virus. Whenever the computer tries to boot from a drive containing an infected disk, the virus copies itself into RAM memory chips. Before hiding in the boot sector, the typical boot-sector virus makes room for itself by moving data from the boot sector to a "second place" on the disk. Unfortunately, whatever data had been in the "second place" gets overwritten and cannot be recovered. The typical boot-sector virus makes the computer eventually hang (stop reacting to your keystrokes and mouse strokes). Examples: Stoned (From New Zealand in December 1987) Michelangelo (From Sweden in April 1991) Monkey (From the USA in October 1992) 3. MULTIPARTITE VIRUSES A multipartite virus hides .in two places: the boot sector and also the file system. If you remove the virus from just the boot sector (or from just files), you still haven't completely removed the virus, which can regenerate itself from the place you missed. If a virus is very smart, it's called a stealth polymorphic armored multipartite virus (SPAM virus): A stealth virus makes special efforts to hide itself from anti-virus software. For example, it tricks anti-virus software into inspecting a clean copy of a file instead of letting it read the actual (infected) file. A polymorphic virus changes its own appearance each time it infects a file, so no two copies of the virus look alike to anti-virus programs. An armored virus protects itself against anti-virus disassembly. Example: One Half (From Austria in October 1994)

4. Macro virus A macro virus hides in macros, which are little programs embedded in Microsoft Word documents and Excel spreadsheets. The virus spreads to another computer when you give somebody an infected document. During the past few years, e-mail has become prevalent, and so have macro viruses: they're more prevalent than all other viruses combined. Examples: Melissa (From the USA in March 1999) Class (From the USA in October 1998) Thus (From the USA in August 1999) 5. E-mail worm An e-mail worm is a malicious program that comes as an e-mail attachment and pretends to be innocent fun. Examples:

Pretty Park (From France in May 1999) Free Link (From the USA in July 1999) Love Bug (From Philippines in May 2000) 6. Denial-of-service attack Your computer can attack an Internet Web-site server computer (called the target) by sending so many strange requests to the target computer that the target computer can't figure out how to respond to them all. The target computer gets confused and becomes so preoccupied worrying about your requests that it ignores all other work it's supposed to be doing, so nobody else can access it. Everybody who tries to access it is denied service because it's too busy. That's called a denial-of-service attack (DoS attack) The first DDoS attack viruses were TrinOO and Tribe Flood Network (TFN), shortly afterwards came versions that were more sophisticated: Tribe Flood Network 2000 (TFN 2K) and Stacheldraht (which is the German word for "barbed wire"). Those viruses are flexible: you can teach them to attack any 7. HOAXES A hoax is just an e-mail message that contains a scary incorrect rumor and warns you to "pass the message to all your friends". The hoax is not a program; it's just a document. Though it theoretically does "no harm", actually it's as harmful as traditional viruses, since it wastes your time, waste your friends' time, embarrasses you (when you later discover the rumor is a lie and should be retracted), and creates a worldwide clogging of e-mail systems forced to transmit the rumor and retractions to millions of people. Examples: Good Times (From the USA m May 1994) Bad Times (From the USA in December 1997) E-mail Tax (From Canada in April 1999) Anti-virus software Anti-virus software are programs that are installed onto your computer and can scan and remove known viruses which you may have contracted. The software can also be set to automatically scan diskettes when inserted into the disk drive, scan files when downloaded from the Internet, or scan e-mail when received.

POPULAR ANTI-VIRUS PROGRAMS


MS-DOS & 6.2 come with an anti-virus program called msav (which stands for Microsoft AntiVirus). But msav is rather useless, since most viruses were invented after it and outsmart it. The most popular and widely used anti-virus software: Norton Anti-Virus Mc Afee Anti-Virus Sophos Anti-Virus AVG Anti-Virus

You might also like