Professional Documents
Culture Documents
Submitted By:
(Group 1)
Geronimo, Thia
Juachon, April
Jucal, Charity
Mulle, Donabel
Submitted To:
SYSTEM SOFTWARE
• Programs that manage the resources of the computer system and simplify
applications programming
• Include devices drivers that run basic computer hardware and peripherals
such as operating system, database management systems, networking
software, translators, and software utilities
• Control the running of all the hardware of the computer as well as giving
functionality for other programs to use, tools to speed up the system and
programs to stay away from attacks
a) Windows
− not very well known or widely used, but it is a web-based system software
and operating system that powers Chromebooks
− can run application software – mainly Google Chrome but also various
Android apps, like the Microsoft Word Android app
c) Android
d) IOS
− second most popular mobile system software. It allows you to run other
types of applications, not all of which are available on Android devices
− in addition to phones, many tablets – iPads – use the iOS system software
e) Device driver
− Any modern PC
− can handle drives that are 2.2TB or larger thanks to it ditching the Master
Boot Record (MBR) method in favor of the more modern GUID Partition
Table (GPT) technique.
Power-on self-test (POST) - tests the hardware of the computer before loading
the OS.
Software/drivers - locates the software and drivers that interface with the OS
once running.
Complementary metal-oxide semiconductor (CMOS) setup - configuration
program that enable users to alter hardware and system settings. CMOS is the
name of BIOS' non-volatile memory.
❖ EXAMPLES OF BIOS:
❖ EXAMPLES OF OS:
d) Linux
− modelled on UNIX, one of the most prominent examples of free software
and open source development
− underlying source code can be freely modified, used, and redistributed by
anyone
− used as an operating system for a wide variety of computer hardware
e) Fedora
− popular open source Linux-based operating system
− developed under the Fedora project, and sponsored by Red Hat
− designed as a secure, general purpose operating system, free to use,
modify, and distribute
DISK OPERATING SYSTEM
− first operating system for the Apple computer that was primarily
developed by Paul Laughton, Randy Wigginton, and Steve Wozniak for the
Apple II series of computers
− no longer used or available
− On modern versions of macOS, the Apple computers have a command
line known as the Terminal, which resembles the Linux command line
d) Atari DOS
a) Sketchpad
− first interactive computer-graphics program
− allowed users to visualize and control program
functions and became a foundation for computer
graphics, computer operating system interfaces,
and software applications that are used in many facets of
modern technology
d) Palm OS
− designed for ease of use with a touchscreen-
based graphical user interface.
− provided with a suite of basic applications
for personal information management
e) Blackberry OS
− programming language C++ was used
− interacts with the applications and software that
is installed on the phone
− capable of carrying out multiple tasks at the same time, and supports
Java mobile information device profile (MIDP) 1.0 and WAP technology
UTILITY SOFTWARE
− software utility or hardware device that acts as a filter for data entering
or leaving a network or computer.
− used in communications because it acts as filter for unwanted
observance of others.
2. Create a poster or one-page guide on “Safety and Security at Social
Networking Sites (Visual Aide).
As we all know, Social networking sites have a tremendous impact not only
on a specific person but all the people who use social media or technology. To
define Social networking sites, according to Wikipedia, it is an online platform
that people use to build social networks or social relationships with other
people who share similar personal or career interests, activities, backgrounds,
or real-life connections.
Also, Social networking sites are everywhere now they are great for society,
promoting increased communication and connection between hundreds of
millions of people throughout the world. Although many people believe that
social networking sites are harmful, they can also be very beneficial. In other
words, they have taken over almost every sphere of life. They come with both,
advantages as well as disadvantages. So, Safety and Security at Social
Networking Sites must be applied everywhere to protect ourselves and our
loved ones. To make the best use of social networking while avoiding the risks,
users will need to understand and follow a set of basic safety tips that are easy
to remember and highly effective.
1. Be judicious about what you share and consider any posting
permanent
Also note that anything you share, while ‘deletable’ may show up elsewhere. On
the internet, few things are ever truly gone no matter how careful you are. If
you don’t want your family seeing it, don’t share it on social media even using
an anonymous account.
Update your passwords for accounts you have, and make sure to use the
strong passwords on any new account you create
Each social media site has an option for “settings” to allow you to increase the
security so only your friends or specific lists can use your posts and
information.
Nothing on the internet is completely safe. Never post anything about yourself
or your family for your family that you don’t want to be made public
information
Be sure you know who is adding you. Send a private message before accepting
a friend request and ask the person something you know.
Turn off location settings and never share information of where you will be
(including going out of town)
Hackers can break into your account or viruses can spread if you click on links
you are unsure of.
The Cybercrime Prevention Act of 2012, officially recorded as Republic Act No.
10175, is a law in the Philippines that was approved on September 12, 2012. It
aims to address legal issues concerning online interactions and the Internet in
the Philippines.
Cybercrimes can involve criminal activities that are traditional in nature, such
as theft, fraud, forgery, defamation and cyberextortion.
If someone posts something you don’t like about you, let them know it makes
you uncomfortable and ask that they take it down.
Under House Bill 5718, or the proposed “Anti Cyber-Bullying Act of 2015,”
cyber-bullies shall face a penalty of fines ranging from P50,000 to P100,000, or
imprisonment between six months and six years, or both, at the discretion of
the court.
10. Take action when needed
If you are being harassed, make sure to save the communication or offensive
post. Report them to the authority, and to any person that may be involved in
your situation.
References:
https://www.google.com.ph/search?q=asus+bios+chips&tbm=isch&ved=2ahUK
EwimtbOtpeXxAhVH-pQKHR4pBF4Q2-
cCegQIABAA&oq=asus+bios+chips&gs_lcp=CgNpbWcQAzIECAAQGDIECAAQGDI
ECAAQGDoECAAQQzoCCAA6BggAEAcQHjoGCAAQCBAeUKXnAVjPjgJgz5kCaA
BwAHgAgAGUAYgBmgqSAQQwLjExmAEAoAEBqgELZ3dzLXdpei1pbWfAAQE&s
client=img&ei=40bwYOa3Hsf00wSe0pDwBQ&bih=651&biw=1349&hl=en#imgrc
=LmljsMOEtV86AM
https://www.google.com.ph/search?q=foxconn+bios+chips&tbm=isch&ved=2ah
UKEwj-r_uRpeXxAhUGkJQKHe3ID2wQ2-
cCegQIABAA&oq=foxconn+bios+chips&gs_lcp=CgNpbWcQAzoECAAQQzoCCAA6
BggAEAcQHjoGCAAQCBAeOgQIABAYUIeaA1izrQNgnrEDaABwAHgAgAGVAYgB
sgiSAQMwLjmYAQCgAQGqAQtnd3Mtd2l6LWltZ8ABAQ&sclient=img&ei=qUbwYL
63Ooag0gTtkb_gBg&bih=651&biw=1349&hl=en
https://www.google.com.ph/search?q=hp+bios+chips&tbm=isch&ved=2ahUKE
wiz4uX4pOXxAhUNy4sBHSohAu8Q2-
cCegQIABAA&oq=hp+bios+chips&gs_lcp=CgNpbWcQAzoECAAQQzoCCAA6BggA
EAcQHjoGCAAQCBAeOgQIABAYUPj0AlidhgNg7o8DaABwAHgAgAG3AogB1guSA
QcwLjUuMi4xmAEAoAEBqgELZ3dzLXdpei1pbWfAAQE&sclient=img&ei=dUbwYP
PTCo2Wr7wPqsKI-A4&bih=651&biw=1349&hl=en#imgrc=r5IJyYwhTe9mlM
https://www.google.com.ph/search?q=ricoh++bios+chips&tbm=isch&ved=2ahU
KEwiHi8PypOXxAhVK95QKHffnCaQQ2-
cCegQIABAA&oq=ricoh++bios+chips&gs_lcp=CgNpbWcQA1DdR1j4UGCxWGgAcA
B4AIABkQGIAe8JkgEEMC4xMZgBAKABAaoBC2d3cy13aXotaW1nwAEB&sclient
=img&ei=aEbwYIe3Acru0wT3z6egCg&bih=651&biw=1349&hl=en#imgrc=ywJP9
NH7EVFFXM
https://www.britannica.com/topic/Hewlett-Packard-Company
https://www.asus.com/ph/
https://www.crunchbase.com/organization/foxconn-technology-group
https://www.google.com.ph/search?q=Bootstrap+loader&tbm=isch&ved=2ahUK
EwjjgLXAn-XxAhXzKKYKHVNSCykQ2-
cCegQIABAA&oq=Bootstrap+loader&gs_lcp=CgNpbWcQAzICCAAyAggAMgIIADIC
CAAyAggAMgYIABAHEB4yBAgAEB4yBAgAEBgyBAgAEBgyBAgAEBg6BAgAEEN
Q2ugEWNnLBWDr0QVoAHAAeAOAAaUBiAH6DpIBBDAuMTaYAQCgAQGqAQtnd
3Mtd2l6LWltZ7ABAMABAQ&sclient=img&ei=wEDwYOOgLvPRmAXTpK3IAg&bih
=651&biw=1366&hl=en
https://www.google.com.ph/search?q=Power-on+self-
test+&tbm=isch&ved=2ahUKEwis-qWZn-XxAhVCUJQKHdmxAqYQ2-
cCegQIABAA&oq=Power-on+self-
test+&gs_lcp=CgNpbWcQAzIGCAAQBxAeMgYIABAHEB4yBggAEAcQHjIECAAQH
jIECAAQHjIECAAQHjIECAAQHjIECAAQHjIECAAQHjIECAAQHlCWvgRYzOkEYIT
uBGgAcAB4A4ABmwGIAb0QkgEEMC4xOJgBAKABAaoBC2d3cy13aXotaW1nsA
EAwAEB&sclient=img&ei=bkDwYKyLLMKg0QTZ44qwCg&bih=651&biw=1366&
hl=en#imgrc=yw3lnjutjOaY2M
https://www.google.com.ph/search?q=Accessing+BIOS&source=hp&ei=_zvwYO
zMBrzFmAWJl6agBg&iflsig=AINFCbYAAAAAYPBKDy550oMgAVO-
j3jrulmiyKCDyuWt&oq=Accessing+BIOS&gs_lcp=Cgdnd3Mtd2l6EAMyAggAMgIIA
DICCAAyAggAMgIIADICCAAyAggAMgIIADICCAAyAggAUPLDAljywwJgp9sCaAB
wAHgAgAF0iAF0kgEDMC4xmAEAoAECoAEBqgEHZ3dzLXdpeg&sclient=gws-
wiz&ved=0ahUKEwisyOX7muXxAhW8IqYKHYmLCWQQ4dUDCAc&uact=5
https://www.google.com.ph/search?q=bios+security&tbm=isch&ved=2ahUKEwi
UoZCVm-XxAhWVAaYKHQ_kA6cQ2-
cCegQIABAA&oq=bios+sec&gs_lcp=CgNpbWcQARgAMgIIADICCAAyAggAMgIIADI
CCAAyBggAEAUQHjIGCAAQBRAeMgYIABAFEB4yBggAEAUQHjIGCAAQBRAeOg
QIABAYOgYIABAIEB46BQgAELEDOgQIABBDOggIABCxAxCDAVCP7BFY57sSYN
LKEmgBcAB4AIAB1wKIAbYZkgEIMC4yMC4xLjGYAQCgAQGqAQtnd3Mtd2l6LWlt
Z7ABAMABAQ&sclient=img&ei=NDzwYJS3DpWDmAWPyI-
4Cg&bih=651&biw=1366
https://www.google.com.ph/search?q=ami+bios&tbm=isch&ved=2ahUKEwjL6bj
FnOXxAhX5zYsBHU2fALkQ2-
cCegQIABAA&oq=AMI&gs_lcp=CgNpbWcQARgAMgQIABBDMgUIABCxAzIFCAAQ
sQMyAggAMgUIABCxAzIFCAAQsQMyBQgAELEDMgIIADICCAAyBQgAELEDOgYI
ABAFEB46BAgAEBg6CAgAELEDEIMBUILzCljWmQtgx6ULaAFwAHgDgAHQAYg
B6A-
SAQYwLjE1LjGYAQCgAQGqAQtnd3Mtd2l6LWltZ7ABAMABAQ&sclient=img&ei=
pT3wYIuDPfmbr7wPzb6CyAs&bih=651&biw=1366
https://www.google.com.ph/search?q=legacy+bios+example&tbm=isch&ved=2a
hUKEwjxvaKoqeXxAhUPDZQKHX_5DKIQ2-
cCegQIABAA&oq=legacy+bios+example&gs_lcp=CgNpbWcQAzoCCAA6BAgAEB4
6BggAEAUQHjoGCAAQCBAeUIg6WK1XYJxjaABwAHgAgAGUAYgB9QeSAQMwLj
iYAQCgAQGqAQtnd3Mtd2l6LWltZ8ABAQ&sclient=img&ei=CkvwYPGQHY-
a0AT_8rOQCg&bih=651&biw=1366#imgrc=fHBJeW7JDYFXQM
https://www.google.com.ph/search?q=uefi+(unified+extensible+firmware+interf
ace)+bios&source=lnms&tbm=isch&sa=X&ved=2ahUKEwjL-Z-
TqeXxAhXFJaYKHYqzCScQ_AUoAXoECAEQAw&biw=1366&bih=651#imgrc=VN
XS9R78EH2JoM
https://www.tizen.org/about
https://searchdatacenter.techtarget.com/definition/Fedora
TinyOS
https://www.wgu.edu/blog/5-most-popular-operating-systems1910.html#close
https://searchsecurity.techtarget.com/definition/DOS
https://www.britannica.com/technology/MS-DOS
https://www.techopedia.com/definition/31210/freedos
https://www.britannica.com/technology/Sketchpad
https://corporatefinanceinstitute.com/resources/knowledge/other/automated-
teller-machine-atm/
https://searchdatacenter.techtarget.com/definition/GNOME-GNU-Network-
Object-Model-Environment
https://en.wikipedia.org/wiki/Palm_OS
https://itstillworks.com/difference-between-smartphone-blackberry-12113.html
https://www.computerhope.com/jargon/f/firewall.htm
https://www.techjockey.com/blog/top-10-utility-software-tools
https://www.remosoftware.com/glossary/utility-
software?fbclid=IwAR2pKhXv2iHf5zaMGOV52AiRC4UZhUDFr8gAtO0cuKkZ3Aqk
Shees08I9HM