You are on page 1of 29

COMPUTER SOFTWARE

(Laboratory - Course Task 4)

Submitted By:

(Group 1)

Geronimo, Thia

Idago, Janella Eunice

Juachon, April

Jucal, Charity

Lumabi, Mikaella Ellaine

Mulle, Donabel

Salas, Jan Rafael

Submitted To:

Professor: Mrs. Mary Ann E. Lopez

MAN, RN, LPT


1. List down 5 examples of common software for communication
purposes in each category.

SYSTEM SOFTWARE

• Programs that manage the resources of the computer system and simplify
applications programming
• Include devices drivers that run basic computer hardware and peripherals
such as operating system, database management systems, networking
software, translators, and software utilities
• Control the running of all the hardware of the computer as well as giving
functionality for other programs to use, tools to speed up the system and
programs to stay away from attacks

❖ EXAMPLES OF SYSTEM SOFTWARE:

a) Windows

− one of the most well-known system software


− can install many application systems like M.S. word, Firefox, Google
Chrome, and other applications.
b) Chrome OS

− not very well known or widely used, but it is a web-based system software
and operating system that powers Chromebooks
− can run application software – mainly Google Chrome but also various
Android apps, like the Microsoft Word Android app

c) Android

− most popular mobile system operator, and it powers 70% of phones


− can install many other applications like chrome, WhatsApp, Facebook,
Instagram, etc.

d) IOS

− second most popular mobile system software. It allows you to run other
types of applications, not all of which are available on Android devices
− in addition to phones, many tablets – iPads – use the iOS system software
e) Device driver

− A device driver also called a hardware driver, is also generally considered


a system software that normally enables the system to work
− can communicate with computer systems to allow it to function normally
− enable hardware devices to communicate with the operating system of
your computer

BASIC INPUT AND OUTPUT SYSTEM

• A program that a microprocessor uses to start the computer after it starts


• Serves as a bridge that controls data flow between the computer's
operating system (OS) and peripherals, including the hard disk visual
adapter, keyboard, mouse, and printer
2 Types of BIOS

UEFI (Unified Extensible Firmware Interface) BIOS

− Any modern PC
− can handle drives that are 2.2TB or larger thanks to it ditching the Master
Boot Record (MBR) method in favor of the more modern GUID Partition
Table (GPT) technique.

Legacy BIOS (Basic Input/Output System)

− Older motherboards have legacy BIOS firmware for turning on the PC


− have some limitations.
4 functions of BIOS

Power-on self-test (POST) - tests the hardware of the computer before loading
the OS.

Bootstrap loader - locates the OS.

Software/drivers - locates the software and drivers that interface with the OS
once running.
Complementary metal-oxide semiconductor (CMOS) setup - configuration
program that enable users to alter hardware and system settings. CMOS is the
name of BIOS' non-volatile memory.

❖ EXAMPLES OF BIOS:

a) AMI - international hardware and software company, specializing in PC


hardware and firmware

b) Asus - worldwide top-three consumer notebook vendor and maker of the


world's best-selling, most award-winning, motherboards
c) Foxconn

− Taiwanese multinational electronics contract manufacturing company


headquartered in Tucheng, New Taipei, Taiwan
− world's largest electronics contract manufacturer,and the fourth-largest
information technology company by revenue.

d) Hewlett Packard (HP) - American manufacturer of software and computer


services.

e) Ricoh - Japanese multinational imaging and electronics company.


OPERATING SYSTEM

• A system software that manages computer hardware, software resources,


and provides common services for computer programs

❖ EXAMPLES OF OS:

a) Tizen OS - resides within the Linux Foundation and is governed by a


Technical Steering Group (TSG) composed of Intel and Samsung
- for devices including smart phones, tablets, and smart TVs
- an open source system that aims to offer a consistent user experience across
devices

b) Apple iOS - mobile operating system used exclusively for iPhones


- regular updates, new expansions to software, and continually are offering new
features for users even for older devices
- unique user interface with touch gestures, and the ease of use that iOS offers
- allows other Apple devices to connect, giving users easy connections to other
devices or people
c) TinyOS
− free open source operating system designed for wireless sensor networks
− embedded operating system written in nesC language
− features a component based architecture

d) Linux
− modelled on UNIX, one of the most prominent examples of free software
and open source development
− underlying source code can be freely modified, used, and redistributed by
anyone
− used as an operating system for a wide variety of computer hardware

e) Fedora
− popular open source Linux-based operating system
− developed under the Fedora project, and sponsored by Red Hat
− designed as a secure, general purpose operating system, free to use,
modify, and distribute
DISK OPERATING SYSTEM

• An operating system that runs from a hard disk drive


• Used to describe several very similar command line disk operating systems
• Early operating systems did not multitask, as they were only able to run
one program at a time
• Command line interface, in which a user has to type in commands,
required the user to remember commands to run programs or do other
operating system tasks, making it difficult for novices to use
• For new versions, can still be run under Windows using the Command
Prompt program
❖ EXAMPLES OF DOS:

a) PC-DOS (Personal Computer Disk Operating System)

− first widely-installed disk operating system used in personal computers


running on Intel 8086 16-bit processors
− developed for IBM by Microsoft Corporation, which also produced its own
almost identical version called MS-DOS

b) MS-DOS (Microsoft Disk Operating System)

− dominant operating system for the personal computer (PC) throughout


the 1980s
− acquisition and marketing of MS-DOS were pivotal in the Microsoft
Corporation’s transition to software industry giant
c) Apple DOS

− first operating system for the Apple computer that was primarily
developed by Paul Laughton, Randy Wigginton, and Steve Wozniak for the
Apple II series of computers
− no longer used or available
− On modern versions of macOS, the Apple computers have a command
line known as the Terminal, which resembles the Linux command line

d) Atari DOS

− used with the Atari 8-bit family of computers


− required an Operating system extensions loaded into memory in order to
manage files stored on a disk drive
− these extensions to the operating system added the disk handler and other
file management features
e) FreeDOS

− free and open-source operating system that is designed to provide a DOS-


compatible environment
− initially developed for IBM PCs and supports running legacy software,
games and build embedded systems
− can run all the applications and commands that are supported by MS-
DOS
− has the ability to provide multiboot on Windows NT and 9X OSs and
supports FAT32 and large disk support with long file names and more,
comes as full-kernel software, applications, networking, development and
other features
GRAPHICAL USER INTERFACE

• A computer program that enables a person to communicate with a


computer through the use of symbols, visual metaphors, and pointing
devices
• has replaced the arcane and difficult textual interfaces of earlier
computing with a relatively intuitive system that has made computer
operation not only easier to learn but more pleasant and natural
• now the standard computer interface, and its components have
themselves become unmistakable cultural artifacts
❖ EXAMPLES OF GUI:

a) Sketchpad
− first interactive computer-graphics program
− allowed users to visualize and control program
functions and became a foundation for computer
graphics, computer operating system interfaces,
and software applications that are used in many facets of
modern technology

b) Automated Teller Machine (ATM)


− specialized computer that makes it convenient for
bank account holders to manage their money.
− early 21st century ATMs use a graphical user
interface (GUI) with sophisticated color display and
dialogue.
c) GNOME (GNU Network Object Model Environment)
− set of computer desktop applications for users of
the Linux operating system intended to make a
Linux operating system easy to use for non-
programmers and generally corresponds to the
Windows desktop interface and its most common set
of applications

d) Palm OS
− designed for ease of use with a touchscreen-
based graphical user interface.
− provided with a suite of basic applications
for personal information management

e) Blackberry OS
− programming language C++ was used
− interacts with the applications and software that
is installed on the phone
− capable of carrying out multiple tasks at the same time, and supports
Java mobile information device profile (MIDP) 1.0 and WAP technology
UTILITY SOFTWARE

• Designed to help analyze, configure, optimize or maintain a computer and


enhance the computer’s performance

❖ EXAMPLES OF UTILITY SOFTWARE:


a) Antivirus software
− kind of software used to prevent, scan, detect and delete viruses from a
computer
− used to verify the integrity of a file received through the internet to avoid
malicious programs mimicking legit files or programs

b) File Management Tool


− manages files of the computer system. This utility software help to browse,
search, arrange, find information, and quickly preview the files of the
system
− on the startup of the computer, Windows 7 and up, windows explorer is
open and what we see as the desktop is the utility software itself
c) File Compression
− a data compression method in which the logical size of a file is reduced to
save disk space for easier and faster transmission over a network or the
Internet
− used to make the folders with files into one file and minimizing it size
making it easier to upload on the internet

d) Disk Management Tool


− used to manage the drives installed in a computer—like hard disk drives
(internal and external), optical disk drives, and flash drives
− can be used to partition and format drives, assign drive letters, and much
more
− usually used to open files that has been shared by another user
− used to rename the drives to a more easily remembered name according
to usage or renaming the drive to your name
− could be named “imgs” and that could mean a drive for images for others
to know what is it for
e) Firewall

− software utility or hardware device that acts as a filter for data entering
or leaving a network or computer.
− used in communications because it acts as filter for unwanted
observance of others.
2. Create a poster or one-page guide on “Safety and Security at Social
Networking Sites (Visual Aide).

As we all know, Social networking sites have a tremendous impact not only
on a specific person but all the people who use social media or technology. To
define Social networking sites, according to Wikipedia, it is an online platform
that people use to build social networks or social relationships with other
people who share similar personal or career interests, activities, backgrounds,
or real-life connections.

Also, Social networking sites are everywhere now they are great for society,
promoting increased communication and connection between hundreds of
millions of people throughout the world. Although many people believe that
social networking sites are harmful, they can also be very beneficial. In other
words, they have taken over almost every sphere of life. They come with both,
advantages as well as disadvantages. So, Safety and Security at Social
Networking Sites must be applied everywhere to protect ourselves and our
loved ones. To make the best use of social networking while avoiding the risks,
users will need to understand and follow a set of basic safety tips that are easy
to remember and highly effective.
1. Be judicious about what you share and consider any posting
permanent

Whether it is a personal or professional social media network you are using,


practicing caution while sharing information is the key. These websites give
you the option to share your details with the connections but you need to be
judicious about what to reveal. For example, sharing your date of birth, home
address or phone number is not a great idea as it can pose a physical or online
security risk.

Further, you need to be extremely cautious about your financial information


such as credit card numbers, banking information or passwords. If these
pieces of information fall in wrong hands, you may end up losing money or
even compromising your bank accounts. Even small personal and financial
details can make you a victim to crimes such as identity theft and stalking.

Also note that anything you share, while ‘deletable’ may show up elsewhere. On
the internet, few things are ever truly gone no matter how careful you are. If
you don’t want your family seeing it, don’t share it on social media even using
an anonymous account.

2. Use strong password

Update your passwords for accounts you have, and make sure to use the
strong passwords on any new account you create

Ex: Keylogger (apps hacker) Keystroke logging, often referred to as keylogging


or keyboard capturing, is the action of recording the keys struck on a
keyboard, typically covertly, so that a person using the keyboard is unaware
that their actions are being monitored. Data can then be retrieved by the
person operating the logging program.
3. Heighten your privacy settings

Each social media site has an option for “settings” to allow you to increase the
security so only your friends or specific lists can use your posts and
information.

4. Choose wisely what you Post/Repost

Nothing on the internet is completely safe. Never post anything about yourself
or your family for your family that you don’t want to be made public
information

5. Don’t share personal information

This includes Social Insurance Numbers, Address, Phone number, Bank


information.

6. Know your social media friends

Be sure you know who is adding you. Send a private message before accepting
a friend request and ask the person something you know.

7. Turn off location settings

Turn off location settings and never share information of where you will be
(including going out of town)

Ex: Cyberstalking is a crime in which the attacker harasses a victim using


electronic communication, such as e-mail or instant messaging (IM), or
messages posted to a Web site or a discussion group. A cyberstalker relies
upon the anonymity afforded by the Internet to allow them to stalk their victim
without being detected.
8. Think before you click

Hackers can break into your account or viruses can spread if you click on links
you are unsure of.

The Cybercrime Prevention Act of 2012, officially recorded as Republic Act No.
10175, is a law in the Philippines that was approved on September 12, 2012. It
aims to address legal issues concerning online interactions and the Internet in
the Philippines.

Cybercrimes can involve criminal activities that are traditional in nature, such
as theft, fraud, forgery, defamation and cyberextortion.

Phishing is a type of social engineering where an attacker sends a fraudulent


message designed to trick a human victim into revealing sensitive information
to the attacker or to deploy malicious software on the victim's infrastructure
like ransomware.

9. Your image and reputation matters

If someone posts something you don’t like about you, let them know it makes
you uncomfortable and ask that they take it down.

Cyberbullying or cyberharassment is a form of bullying or harassment using


electronic means. Also known as online bullying.

Under House Bill 5718, or the proposed “Anti Cyber-Bullying Act of 2015,”
cyber-bullies shall face a penalty of fines ranging from P50,000 to P100,000, or
imprisonment between six months and six years, or both, at the discretion of
the court.
10. Take action when needed

If you are being harassed, make sure to save the communication or offensive
post. Report them to the authority, and to any person that may be involved in
your situation.

References:

What is BIOS (Basic Input/Output System)? (techtarget.com)

What Is Motherboard Firmware? A Basic Definition | Tom's Hardware


(tomshardware.com)

https://www.google.com.ph/search?q=asus+bios+chips&tbm=isch&ved=2ahUK
EwimtbOtpeXxAhVH-pQKHR4pBF4Q2-
cCegQIABAA&oq=asus+bios+chips&gs_lcp=CgNpbWcQAzIECAAQGDIECAAQGDI
ECAAQGDoECAAQQzoCCAA6BggAEAcQHjoGCAAQCBAeUKXnAVjPjgJgz5kCaA
BwAHgAgAGUAYgBmgqSAQQwLjExmAEAoAEBqgELZ3dzLXdpei1pbWfAAQE&s
client=img&ei=40bwYOa3Hsf00wSe0pDwBQ&bih=651&biw=1349&hl=en#imgrc
=LmljsMOEtV86AM

https://www.google.com.ph/search?q=foxconn+bios+chips&tbm=isch&ved=2ah
UKEwj-r_uRpeXxAhUGkJQKHe3ID2wQ2-
cCegQIABAA&oq=foxconn+bios+chips&gs_lcp=CgNpbWcQAzoECAAQQzoCCAA6
BggAEAcQHjoGCAAQCBAeOgQIABAYUIeaA1izrQNgnrEDaABwAHgAgAGVAYgB
sgiSAQMwLjmYAQCgAQGqAQtnd3Mtd2l6LWltZ8ABAQ&sclient=img&ei=qUbwYL
63Ooag0gTtkb_gBg&bih=651&biw=1349&hl=en

https://www.google.com.ph/search?q=hp+bios+chips&tbm=isch&ved=2ahUKE
wiz4uX4pOXxAhUNy4sBHSohAu8Q2-
cCegQIABAA&oq=hp+bios+chips&gs_lcp=CgNpbWcQAzoECAAQQzoCCAA6BggA
EAcQHjoGCAAQCBAeOgQIABAYUPj0AlidhgNg7o8DaABwAHgAgAG3AogB1guSA
QcwLjUuMi4xmAEAoAEBqgELZ3dzLXdpei1pbWfAAQE&sclient=img&ei=dUbwYP
PTCo2Wr7wPqsKI-A4&bih=651&biw=1349&hl=en#imgrc=r5IJyYwhTe9mlM

https://www.google.com.ph/search?q=ricoh++bios+chips&tbm=isch&ved=2ahU
KEwiHi8PypOXxAhVK95QKHffnCaQQ2-
cCegQIABAA&oq=ricoh++bios+chips&gs_lcp=CgNpbWcQA1DdR1j4UGCxWGgAcA
B4AIABkQGIAe8JkgEEMC4xMZgBAKABAaoBC2d3cy13aXotaW1nwAEB&sclient
=img&ei=aEbwYIe3Acru0wT3z6egCg&bih=651&biw=1349&hl=en#imgrc=ywJP9
NH7EVFFXM

https://www.britannica.com/topic/Hewlett-Packard-Company

https://www.asus.com/ph/

https://www.crunchbase.com/organization/foxconn-technology-group

https://www.google.com.ph/search?q=Bootstrap+loader&tbm=isch&ved=2ahUK
EwjjgLXAn-XxAhXzKKYKHVNSCykQ2-
cCegQIABAA&oq=Bootstrap+loader&gs_lcp=CgNpbWcQAzICCAAyAggAMgIIADIC
CAAyAggAMgYIABAHEB4yBAgAEB4yBAgAEBgyBAgAEBgyBAgAEBg6BAgAEEN
Q2ugEWNnLBWDr0QVoAHAAeAOAAaUBiAH6DpIBBDAuMTaYAQCgAQGqAQtnd
3Mtd2l6LWltZ7ABAMABAQ&sclient=img&ei=wEDwYOOgLvPRmAXTpK3IAg&bih
=651&biw=1366&hl=en

https://www.google.com.ph/search?q=Power-on+self-
test+&tbm=isch&ved=2ahUKEwis-qWZn-XxAhVCUJQKHdmxAqYQ2-
cCegQIABAA&oq=Power-on+self-
test+&gs_lcp=CgNpbWcQAzIGCAAQBxAeMgYIABAHEB4yBggAEAcQHjIECAAQH
jIECAAQHjIECAAQHjIECAAQHjIECAAQHjIECAAQHjIECAAQHlCWvgRYzOkEYIT
uBGgAcAB4A4ABmwGIAb0QkgEEMC4xOJgBAKABAaoBC2d3cy13aXotaW1nsA
EAwAEB&sclient=img&ei=bkDwYKyLLMKg0QTZ44qwCg&bih=651&biw=1366&
hl=en#imgrc=yw3lnjutjOaY2M
https://www.google.com.ph/search?q=Accessing+BIOS&source=hp&ei=_zvwYO
zMBrzFmAWJl6agBg&iflsig=AINFCbYAAAAAYPBKDy550oMgAVO-
j3jrulmiyKCDyuWt&oq=Accessing+BIOS&gs_lcp=Cgdnd3Mtd2l6EAMyAggAMgIIA
DICCAAyAggAMgIIADICCAAyAggAMgIIADICCAAyAggAUPLDAljywwJgp9sCaAB
wAHgAgAF0iAF0kgEDMC4xmAEAoAECoAEBqgEHZ3dzLXdpeg&sclient=gws-
wiz&ved=0ahUKEwisyOX7muXxAhW8IqYKHYmLCWQQ4dUDCAc&uact=5

https://www.google.com.ph/search?q=bios+security&tbm=isch&ved=2ahUKEwi
UoZCVm-XxAhWVAaYKHQ_kA6cQ2-
cCegQIABAA&oq=bios+sec&gs_lcp=CgNpbWcQARgAMgIIADICCAAyAggAMgIIADI
CCAAyBggAEAUQHjIGCAAQBRAeMgYIABAFEB4yBggAEAUQHjIGCAAQBRAeOg
QIABAYOgYIABAIEB46BQgAELEDOgQIABBDOggIABCxAxCDAVCP7BFY57sSYN
LKEmgBcAB4AIAB1wKIAbYZkgEIMC4yMC4xLjGYAQCgAQGqAQtnd3Mtd2l6LWlt
Z7ABAMABAQ&sclient=img&ei=NDzwYJS3DpWDmAWPyI-
4Cg&bih=651&biw=1366

https://www.google.com.ph/search?q=ami+bios&tbm=isch&ved=2ahUKEwjL6bj
FnOXxAhX5zYsBHU2fALkQ2-
cCegQIABAA&oq=AMI&gs_lcp=CgNpbWcQARgAMgQIABBDMgUIABCxAzIFCAAQ
sQMyAggAMgUIABCxAzIFCAAQsQMyBQgAELEDMgIIADICCAAyBQgAELEDOgYI
ABAFEB46BAgAEBg6CAgAELEDEIMBUILzCljWmQtgx6ULaAFwAHgDgAHQAYg
B6A-
SAQYwLjE1LjGYAQCgAQGqAQtnd3Mtd2l6LWltZ7ABAMABAQ&sclient=img&ei=
pT3wYIuDPfmbr7wPzb6CyAs&bih=651&biw=1366

https://www.google.com.ph/search?q=legacy+bios+example&tbm=isch&ved=2a
hUKEwjxvaKoqeXxAhUPDZQKHX_5DKIQ2-
cCegQIABAA&oq=legacy+bios+example&gs_lcp=CgNpbWcQAzoCCAA6BAgAEB4
6BggAEAUQHjoGCAAQCBAeUIg6WK1XYJxjaABwAHgAgAGUAYgB9QeSAQMwLj
iYAQCgAQGqAQtnd3Mtd2l6LWltZ8ABAQ&sclient=img&ei=CkvwYPGQHY-
a0AT_8rOQCg&bih=651&biw=1366#imgrc=fHBJeW7JDYFXQM
https://www.google.com.ph/search?q=uefi+(unified+extensible+firmware+interf
ace)+bios&source=lnms&tbm=isch&sa=X&ved=2ahUKEwjL-Z-
TqeXxAhXFJaYKHYqzCScQ_AUoAXoECAEQAw&biw=1366&bih=651#imgrc=VN
XS9R78EH2JoM

https://www.tizen.org/about

https://searchdatacenter.techtarget.com/definition/Fedora

TinyOS

https://www.wgu.edu/blog/5-most-popular-operating-systems1910.html#close

https://searchsecurity.techtarget.com/definition/DOS

https://www.britannica.com/technology/MS-DOS

https://www.techopedia.com/definition/31210/freedos

https://www.britannica.com/technology/Sketchpad

https://corporatefinanceinstitute.com/resources/knowledge/other/automated-
teller-machine-atm/

https://searchdatacenter.techtarget.com/definition/GNOME-GNU-Network-
Object-Model-Environment

https://en.wikipedia.org/wiki/Palm_OS

https://itstillworks.com/difference-between-smartphone-blackberry-12113.html

https://www.computerhope.com/jargon/f/firewall.htm

https://www.techjockey.com/blog/top-10-utility-software-tools

https://www.remosoftware.com/glossary/utility-
software?fbclid=IwAR2pKhXv2iHf5zaMGOV52AiRC4UZhUDFr8gAtO0cuKkZ3Aqk
Shees08I9HM

You might also like