Professional Documents
Culture Documents
Software: 1. Operating System 2. Utility Software
Software: 1. Operating System 2. Utility Software
1. Operating System
2. Utility software
3. Applications software
2. Utility software
3. Applications software
2. Utility software
3. Applications software
2. Utility software
3. Applications software
• Disk editor
• Defragmenter
• Virus checker
• Defragmenter
A disk editor is a utility program that lets • Virus checker
the user read, edit, and write the low-level
raw data on a disk.
It can be used to repair/reconstruct damaged files and
directories.
• Defragmenter
After a time, the disk starts to fill up and files are edited and
deleted. The remaining free blocks are not necessarily next
to each other.
• Defragmenter
When new files are saved the blocks may • Virus checker
be on different parts of the disk. It then
takes longer to access these files.
• Defragmenter
A virus is a program or programming code • Virus checker
that replicates by being copied or initiating
its copying to another program, computer
boot sector or document.
• file virus
A file virus attaches itself to an executable file (program
which you can run). e.g. Word, Photoshop, FIFA09.
• macro virus
What is a macro ?
A macro is a saved sequence of commands or keyboard
strokes that can be stored and then recalled. It makes use
of the programming language which is contained in some
applications. e.g. Visual Basic for Applications (VBA)
• macro virus
• macro virus
A macro virus contains instructions which may damage a
document or other software.
It causes a sequence of actions to be performed automatically
when the application is started or something else triggers it.
Once a macro virus gets onto your machine, it can embed
itself in all future documents you create with the application.
• camouflage
• watching
• delivery
• replication
A virus makes copies of itself into other program files.
• camouflage
Virus program writers can have fake code within the program
to prevent virus checkers from spotting the patterns of
instructions which are commonly used in virus programs.
• camouflage
• watching
• delivery
• watching
Some virus programs remain dormant in a computer until a
particular event triggers them into action. This can be a
certain date, time or the running of a specific application.
• delivery
This is the term used for when the virus executes and carries
out its intended actions.
NO
Worms spread from computer to computer and, unlike a virus,
have the ability to travel without any help from a person
A worm does not alter files but resides in active memory and
replicates. Worms use parts of an operating system that are
automatic and usually invisible to the user.
NO
Due to the copying nature of a worm and its ability to travel
across networks the end result in most cases is that the worm
consumes too much system memory (or network bandwidth).
NO
Trojan horses do not reproduce by infecting other files
nor do they self-replicate.
NO
Some Trojans are designed to be more annoying than
malicious (like changing your desktop, adding silly active
desktop icons) or they can cause serious damage by deleting
files and destroying information on your system.
• Use of checksum
• Searching for Virus signature
• Heuristic detection
• Memory resident monitoring
If the checksums don’t match then it may be that the file now
contains some virus code.
Compression
Graphics files, particularly bit-mapped graphics, can
generate very large file sizes.
Lossless Compression
This technique manages to cut down on the amount of data
which needs to be stored but does not actually lose any of
the data. This means that the quality of the image is not
affected.
Lossy Compression
This technique cuts down on the amount of data which
needs to be stored by discarding some of the data. This
means that the quality of the image is affected.
CS Topic 5 - Computer Software v2 37
• jpeg
• gif
• TIFF
jpeg (Joint Picture Experts Group)
JPEG is designed for compressing either full-colour or grey-
scale images of natural, real-world scenes. It works well on
photographs, naturalistic artwork, and similar material; not so
well on lettering, simple cartoons, or line drawings
Storage Requirements
i.e. how much Hard Disk space is required for the software.
OS compatibility
i.e. which operating system it requires.
CS Topic 5 - Computer Software v2