You are on page 1of 7

System software consists of the programs that control or maintain the operations of the computer and

its devices
SYSTEM SOFTWARE AND APPLICATION SOFTWARE
An operating system
(OS) is a set of programs containing instructions that work together to coordinate all the
activities among computer hardware resources
The process of starting or restarting a computer is called booting.
Cold boot
Turning on a computer that has been powered off completely
Warm boot
Using the operating system to restart a computer

You can boot from a boot disk


A recovery disk contains a few system files that will start the computer
A user interface controls how you enter data and instructions and how information is displayed
on the screen
With a graphical user interface (GUI), you interact with menus and visual images
Memory management optimizes the use of RAM
Virtual memory is a portion of a storage medium functioning as additional RAM
A performance monitor is a program that assesses and reports information about various computer
resources and devices
Automatic update automatically provides updates to the program
A server operating system organizes and coordinates how multiple users access and share resources on
a network
A stand-alone operating system is a complete operating system that works on a desktop computer,
notebook computer, or mobile computing device
An embedded operating system resides on a ROM chip on a mobile device or consumer electronic
device
A utility program is a type of system software that allows a user to perform maintenance-type
tasks
A file manager is a utility that performs functions related to file management
A search utility is a program that attempts to locate a file on your computer based on criteria
you specify
A disk defragmenter reorganizes the files and unused space on a computers hard disk so that
the operating system accesses data more quickly and programs run faster
A backup utility allows users to copy files to another storage medium
A restore utility reverses the process and returns backed up files to their original form
A screen saver causes a display devices screen to show a moving image or blank screen if no
activity occurs for a specified time
A personal firewall detects and protects a personal computer from unauthorized intrusions
A virus describes a potentially damaging computer program that affects a computer negatively
A worm copies itself repeatedly in memory or over a network
A Trojan horse hides within or looks like a legitimate program
An antivirus program protects a computer against viruses
A file compression utility shrinks the size of a file(s)
Compressed files sometimes are called zipped files
Application Software
Primary function is to apply the power of the computer to give individuals, workgroups, and the
entire enterprise the ability to solve problems and perform specific tasks
Application programs interact with systems software; systems software then directs computer
hardware to perform the necessary tasks
Available in a variety of forms :
Packaged software , Custom software , Web application , Open source software , Shareware ,
Freeware , Public-domain software
Types of Application Software
Proprietary software: one-of-a-kind program for a specific application, usually developed and
owned by a single company
Off-the-shelf software: existing software program that is purchased
Business software is application software that assists people while performing business activities
Business Software
Word processing software allows users to create and manipulate documents
Clip art is a collection of electronic drawings, photos, and other images
A database is a collection of data organized in a manner that allows access, retrieval, and use of that
data
Software bug: defect in a computer program that keeps it from performing as it is designed to perform

Operating System ( OS )
is system software which acts as the master controller for all activities that take place in a
computer system
Takes orders from application software and carries them out like the chain of command in an
army
How an OS Functions?
Resources , Memory Management ,Storage Resources ,Peripheral Devices
Resources
Any component that is required to perform work
Common resources: Processor RAM Storage space (hard disk space) Peripherals (such as
printers)
Memory Management
Each program needs a specific area of RAM
If instructions or data leak into other programs RAM areas, the program crashes and an
error message appears, such as General Protection Fault
Storage Resources
The OS remembers the names and locations of all files, and keeps track of empty places where
new files can be stored.
Peripheral Devices
Types of Operating Systems
Single-User, Single-Task
Single-User, Multi-Task
Multi-User
Real-Time Operating Systems
Embedded Operating Systems
Network Operating Systems
User Interface
Command line interface
Menu driven interface
Graphical User interface

Classification of Computer viruses:


Boot sector virus
Master Boot Record (MBR) virus
File infector virus
Multipartite virus
Macro virus
Boot sector virus
Boot sector viruses generally hide in the boot sector, either in the bootable disk or the hard
drive
It attaches itself to the first part of the hard disk that is read by the computer upon boot up.
These viruses are spread rapidly by floppy disks and not on CD-ROMs.
Once copied to the memory, any floppy disks that are not write protected will become
infected when the floppy disk is accessed.
Error message Invalid system disk
Master Boot Record (MBR) virus
MBR viruses are memory-resident viruses that infect disks in the same manner as boot sector
viruses.
However it, infects the MBR of the system, gets activated when the BIOS activates the Master
boot code.
MBR infectors normally save a legitimate copy of the master boot record in an different
location.
File infector virus
File infector viruses infect program files.
Normally infect executable code, such as .COM, .SYS, .BAT and .EXE files.
They can infect other files when an infected program is run from floppy, hard drive, or from
the network. Many of these viruses are memory resident.
After memory becomes infected, any uninfected executable file that runs becomes infected.
Multipartite virus
Multipartite (also known as polypartite) viruses infect both boot records and program files.
These are particularly difficult to repair. If the boot area is cleaned, but the files are not, the
boot area will be reinfected.
The same holds true for cleaning infected files. If the virus is not removed from the boot area,
any files that you have cleaned will be reinfected.
Macro virus
Macro are mini-programs which make it possible to automate series of operations so that they
are performed as a single action, thereby saving the user from having to carry them out one by one.
Macro viruses infect files that are created using certain applications or programs that contain
macros.
They are platform-independent since the virus itself are written in language of the application
and not the operating system.
They infect documents created from Microsoft Office Word, Excel, PowerPoint and Access
files.
Melissa
The Melissa Virus is a macroinstruction (Macro) virus created by David Smith which infected
Windows 98 computers.
Caused software giants such as Microsoft to temporarily shut down their email servers
because Microsoft was unwittingly helping the propagation of the virus.
two more types of malicious software. These are : Worms and Trojans
Worms
Due to the copying nature of a worm and its capability to travel across networks the end
result in most cases is that it consumes too much system memory (or network BW).
Worms spread from computer to computer, but unlike a virus, it has the capability to travel
without any help from a person.
LOVE-LETTER-FOR-YOU.TXT.VBS,
deletion of files from victim's hard disk
password theft
Trojan horses
are impostors files that claim to be something desirable but, in fact, are malicious..
WIN-BUGSFIX.EXE was a Trojan Horse program that collected usernames and passwords from
the victim's hard drive and emailed them to an address in the Philippines, mailme@super.net.ph.
"waterfalls.scr"

Examples of risky file types


.EXE .PIF .BAT .VBS .COM
2012's Worst Viruses
Flame , Belgian Computer Crime Virus , Shamoon
Hidden processes running on your system
1. monit.exe- runs under explorer.exe, keylogger app, creates problems with Counter Strike
2. scvhost.exe or 713xRMTmon.exe - not to be confused with svchost.exe, an important windows
process.
3. wscript.exe - a harmless process which can be made to execute harmful VBScripts like
mswin32.dll.vbs
4. amvo.exe or amva.exe
5. autorun.inf - Its actually a harmless file. But can be used to invoke a virus when you click a
folder/drive which has this file.

Computer network A collection of computing devices that are connected in various ways in order to
communicate and share resources
A network refers to two or more connected computers that can share resources such as data, a printer,
an Internet connection, applications, or a combination of these resources.
LAN - Local area Network
WAN Wide area network
MAN Metropolitan area netork
The generic term node or host refers to any device on a network
Data transfer rate The speed with which data is moved from one place on a network to another
Data transfer rate is a key issue in computer networks
Computer networks have opened up an entire frontier in the world of computing called the
client/server model
File server A computer that stores and manages files for multiple users on a network
Web server A computer dedicated to responding to requests (from the browser client) for web pages
Applications of Networks
Resource Sharing
Information Sharing
Communication
Remote computing
Distributed processing (GRID Computing)
Network Topology
Bus Topology - Commonly referred to as a linear bus, all the devices on a bus topology are
connected by one single cable.
Star Topology - The star topology is the most commonly used architecture in Ethernet LANs.
When installed, the star topology resembles spokes in a bicycle wheel.
Extended Star Topology - Larger networks use the extended star topology also called tree
topology. When used with network devices that filter frames or packets, like bridges, switches, and
routers, this topology significantly reduces the traffic on the wires by sending packets only to the wires
of the destination host.
Ring Topology - A frame travels around the ring, stopping at each node. If a node wants to
transmit data, it adds the data as well as the destination address to the frame.
The mesh topology connects all devices (nodes) to each other for redundancy and fault
tolerance.
Types of Networks
Local-area network (LAN) A network that connects a relatively small number of machines in a
relatively close geographical area
Types of Networks
Various configurations, called topologies, have been used to administer LANs
Ring topology A configuration that connects all nodes in a closed loop on which messages
travel in one direction
-Star topology A configuration that centers around one node to which all others are connected
and through which all messages are sent
Bus topology All nodes are connected to a single communication line that carries messages in
both directions
A bus technology called Ethernet has become the industry standard for local-area networks
Wide-area network (WAN) A network that connects two or more local-area networks over a potentially
large geographic distance
Metropolitan-area network (MAN) The communication infrastructures that have been developed in
and around large cities
Internet backbone A set of high-speed networks that carry Internet traffic
Internet service provider (ISP) A company that provides other companies or individuals with access to
the Internet
-A phone modem converts computer data into an analog audio signal for transfer over a
telephone line, and then a modem at the destination converts it back again into data
A digital subscriber line (DSL) uses regular copper phone lines to transfer digital data to and
from the phone companys central office
A cable modem uses the same line that your cable TV signals come in on to transfer the data back and
forth
Open Systems
Proprietary system A system that uses technologies kept private by a particular commercial
vendor One system couldnt communicate with another, leading to the need for
Interoperability The ability of software and hardware on multiple machines and from multiple
commercial vendors to communicate Leading to
Open systems Systems based on a common model of network architecture and a suite of
protocols used in its implementation
The International Organization for Standardization (ISO) established the Open Systems Interconnection
(OSI) Reference Model

TCP stands for Transmission Control Protocol TCP software breaks messages into packets, hands them
off to the IP software for delivery, and then orders and reassembles the packets at their destination
IP stands for Internet Protocol IP software deals with the routing of packets through the maze of
interconnected networks to their final destination
UDP stands for User Datagram Protocol
It is an alternative to TCP
The main difference is that TCP is highly reliable, at the cost of decreased performance, while
UDP is less reliable, but generally faster
High-Level Protocols
Other protocols build on the foundation established by the TCP/IP protocol suite
Simple Mail Transfer Protocol (SMTP)
File Transfer Protocol (FTP)
Telnet
Hyper Text Transfer Protocol (http)
Firewall A machine and its software that serve as a special gateway to a network, protecting it from
inappropriate access
Filters the network traffic that comes in, checking the validity of the messages as much as possible and
perhaps denying some messages altogether Enforces an organizations access control policy
The domain name system (DNS) is chiefly used to translate hostnames into numeric IP addresses
The OSI Model Why a Layered Network Model?
Application Application Layers (Upper Layers):
Network Processes to Applications
Data Representation
InterHost Communication
Presentation
Session
Transport - Handles transportation issues between hosts
Network - Provides connectivity and path selection between two host systems
Data Link - Defines how data is formatted for transmission and how access to the network is
controlled
Physical - Binary Transmission: Defines the electrical, mechanical, procedural, and functional
specifications for activating, maintaining, and deactivating the physical link

A hub (concentrator) is a device that repeats the signals it receives on one port to all other ports. It is a
central connection point for several network devices.
Switch When a switch receives data the switch examines the data link header for the MAC address of
the destination station and forwards it to the correct port. This opens a path between ports that can use
the full bandwidth of the topology.
Routers facilitate communication within this internet work. It decides how to send packets within the
network so that they arrive at their destination.
operating system (OS)
personal information manager (PIM)
Enterprise resource planning (ERP)
Distance learning (DL)
Real-Time Operating Systems (RTOS)
Master Boot Record (MBR)
Data transfer rate (DTR)
(Local Area Network) LAN
(Metropolitan Area Network) MAN
(Wide Area Network) WAN
Internet service provider (ISP)
digital subscriber line (DSL)
International Organization for Standardization (ISO)
Open Systems Interconnection (OSI)
Transmission Control Protocol (TCP)
Internet Protocol (IP)
User Datagram Protocol (UDP)
Simple Mail Transfer Protocol (SMTP)
File Transfer Protocol (FTP)
Hyper Text Transfer Protocol (http)
Multipurpose Internet Mail Extension (MIME)
domain name system (DNS)

802.11

You might also like