You are on page 1of 32

BY SUVRAT SAHNI CLASS XI B

INTRODUCTION
A computer system consists of hardware and software

for its proper functioning. Hardware represents the physical and tangible components of the computer i.e. the components that can be seen touched. Input devices, CPU, floppy disk, hard disk etc. are examples of computer hardware. Software represents the set of programs that can govern the operation of a computer system and make the hardware run.

TYPES OF SOFTWARE
Software can be classified broadly in to two categories.
System software Application software

System software
A computer is mere a machine that knows nothing of itself.

Rather it requires instructions for each and everything it performs. These instructions are provided to it by a software. The software that controls internal computer operations(viz. reading data from input devices, transmitting processed information to the output device, checking system components, converting data/instructions to the computer understandable form etc.) is known as system software.it is classified into main categories Operating system Language processor

Operating system
An operating system is a program which acts as an

interface between a user and the hardware i.e. all computer resources. The primary goal of an operating system is just to make the computer system convenient to use and secondary goal is to use computer hardware in an efficient manner.

An operating system is an important component of a computer

system which controls all other components of computer system. Major components of computer system are: 1. The Hardware 2. The operating system 3. The Application program routines (compiler, database management systems, utility programs) 4. The Human ware (users) Where hardware provides the basic computing resources, the application program define the ways in which these resources are used to solve the computing problems of the users and the operating system controls and coordinates the use of the hardware among the various application for the various users.

Types of operating system


Single program OS:-Only one user program can be

supported and executed by it at any point of time.eg. DOS Multiprogram OS:-This is a multiuser OS. It supports multiprogramming i.e., more than one user can be supported by it, therefore, more than one user programs are loaded and active in the main store at the same time.eg. WINDOWS Time sharing OS:-This OS uses the time sharing technique. Each active user program is given a fair share of CPU time, if time elapses or an I/O operation is requested, CPU shifts over to next job waiting and the previous program is put to wait or handed over to I/O manager.e.g UNIX

CONTD
Real time OS:-In real time OS, the jobs have fixed

deadlines and the jobs have to be completed within their deadlines. The system performance is measured by its ability to complete its job within the specified deadlines.eg. WINDOWS CE(compact embedded) Multiprocessing OS:-the multiprocessing OS is capable of handling more than one processors as the jobs have to be executed on more than one processor.EG, UNIX,LINUX,WINDOWS

Language processors
As programmer prefer to write their programs in one

of the high level languages. However,the computer does not understand any language other than its own machine language (binary language) therefore it becomes necessary to process a HLL program so as to make it understandable to the computer. The system programs which perform this very job are language processors.

Language processors
Assembler. This language processor converts the

program written in assembly language in to machine language. Interpreter. This language processor converts a HLL program in to machine language by converting and executing it line by line. If there is any error in any line, it reports it at the same time and program execution cannot resume until the error is rectified.EG. Basic language(Beginner's All Purpose Symbolic Instruction Code)

CONTD
Compiler. It also converts the HLL program into

machine language but the conversion manner is different. It converts the entire HLL program in one go, and reports all the errors of the program along with the line numbers.EG. C, C++ and Java

Application software
This type of software pertains to one specific

application. For instance, software that can perform railway reservation functions cannot prepare result for a school. These are the program written by the programmers to enable computer to perform a specific task such as inventory control, result preparation, railway reservation, billing etc.

Types of application software


PACKAGES:-these are general purpose softwares that may

be used by individual users in the manner it suits their needs and requirements. EGS. Word processing software:-processes textual matter and creates organized and flawless documents eg. Microsoft word Electronic spreadsheets:-accepts data in tabular form(rows and column) and allows user to manipulate data eg. Microsoft excel DO YOU KNOW THIS VISUAL AID IS ALSO MADE BY USING A PRESENTATION GRAPHICS SOFTWARE CALLED POWERPOINT

UTILITIES
UTILITIES ASSIST THE COMPUTER BY PERFORMING

HOUSEKEEPING FUNCTIONS LIKE BACKING UP DISK OR SCANNONG/CLEANING VIRUSES OR RECOVER DATA WHICH HAS BEEN ACCIDENTALLY ERASED OR REMOVE OUTDATED FILES. SOME IMPORTANT UTILITIES ARE: TEXT EDITOR:-USED FOR CREATING,EDITING TEXT FILES EG. VIM BACKUP UTILITY:-USED FOR BACKING UP OF DISK.BACK UP MEANS DUPLICATING THE DISK INFORMATION SO THAT IN CASE OF DAMAGE OR DATA LOSS THIS BACKUP DATA CAN BE USED

BUSINESS SOFTWARE
MADE ACCORDING TO BUSINESS NEEDS.THESE

ARE CUSTOMIZED SOFTWARES. EG LIKE HOTEL MANAGEMENT

DEVELOPER TOOLS
WHEN A PROGRAMMER DEVELOPS A SOFTWARE FOR

ANY APPLICATION THEY NEED TOOLS TO HELP THEM.SOME TOOLS ARE COMPILERS:-CONVERTS SOURCE CODE INTO MACHINE CODE IN ONE GO INTERPRETERS:-CONVERTS SOURCE CODE INTO MACHINE CODE LINE BY LINE INTEGRATED DEVELOPMENT ENVIRONMENT(I.D.E):IS AN APPLICATIPN PROGRAM CONSISTING OF DIFFERENT TOOLS NEEDED FOR DEVELOPING AN APPLICATION EG. JAVA IDE

SECURITY OF THE SYSTEM


COMPUTER SECURITY IS THE ABILITY TO

PROTECT INFORMATION AND SYSTEM RESOURCES WITH RESPECT TO CONFIDENTIALITY AND INTEGRITY

Basic components of computer security


confidentiality

integrity

authentication

CONFIDENTIALITY:-ENSURING INFORMATON IS

NOT ACCESSED BY UNAUTHORISED PERSONS INTEGRITY:-INFORMATION IS NOT ALTERED BY UNAUTHORIZED PERSONS IN A WAY NOT DETECTABLE BY AUTHORIZED USERS AUTHENTICATION:-ENSURING USERS ARE THE PERSONS THEY CLAIM TO BE

THREAT TO COMPUTER SECURITY


A THREAT IS A POTENTIAL VIOLATION OF

SECURITY.WHEN THE THREAT IS ACTUALLY EXECUTED IT BECOMES ATTACK.SOME COMMON THREATS ARE VIRUSES SPYWARE ADWARE SPAMMING PC INTRUSION PHISHING

VIRUSES
THEY ARE MALICIOUS CODES/PROGRAMS THAT

CAUSE DAMAGE TO DATA AND FILES ON A SYSTEM. EG. OVERWRITE VIRUSES VIRUS OF THIS KIND IS CHARACTERIZED BY THE FACT THAT IT DELETES THE INFORMATION CONTAINED IN THE FILES THAT IT INFECTS, RENDERING THEM PARTIALLY OR TOTALLY USELESS ONCE THEY HAVE BEEN INFECTED. THE ONLY WAY TO CLEAN A FILE INFECTED BY AN OVERWRITE VIRUS IS TO DELETE THE FILE COMPLETELY, THUS LOSING THE ORIGINAL CONTENT.
EXAMPLES: WAY, TRJ.REBOOT, TRIVIAL.88.D.

CONTD
TWO OTHER SIMILAR PROGRAMS THAT ALSO CAUSE

VIRUS LIKE EFFECT ARE WORMS:-IT IS A SELF REPLICATING PROGRAM WHICH EATS UP THE ENTIRE DISK SPACE OR MEMORY.A WORM KEEPS ON CREATING ITS COPIES UNTIL ALL DISK SPACE OR MEMORY IS FILLED TROJAN HORSES:-A TROJAN HORSE IS A PROGRAM THAT APPEARS HARMLESS(SUCH AS A TEXT EDITOR OR A UTILITY PROGRAM)BUT ACTUALLY PERFORMS MALICIOUS FUNCTIONS SUCH AS DELETING OR DAMAGING FILES

SPYWARE
IT IS A SOFTWARE WHICH IS INSTALLED ON THE

COMPUTER TO SPY ON YOUR ACTIVITIES AND REPORT THIS DATA TO PEOPLE WILLING TO PAY FOR IT TRACKS THE USERS BEHAVIOUR AND REPORTS INFORMATION BACK TO CENTRAL SOURCE.

ADWARE
THESE ARE THE PROGRAMS WHICH DELIVER

UNWANTED ADS TO YOUR COMPUTER.THEY CONSUME YOUR NETWORK BANDWIDTH.ADWARE IS SIMILAR TO SOFTWARE BUT MAY BE INSTALLED WITH YOUR CONSENT.SO IT IS ADVISED THAT YOU THOROUGHLY READ INSTALLATION AGREEMENT BEFORE YOU INSTALL A SOFTWARE

SPAMMING
IT REFERS TO SENDING OF BULK MAIL BY AN

IDENTIFIED OR UNIDENTIFIED SOURCE EG. EMAIL BOMBARDING WHERE BULK ADVERTISEMENTS ARE SENT TO THE EMAIL HOLDER

PC INTRUSION
COMPUTERS ARE UNDER CONSTANT ATTACK FROM

HACKERS.THUS PC INTRUSION CAN TAKE MANY FORMS LIKE SWEEPER ATTACKS:-SWEEPS ALL DATA FROM THE SYSTEM PASSWORD GUESSING:-HACKERS CRACK OR GUESS PASSWORDS OF SYSTEM ACCOUNTS AND GAIN ENTRY INTO REMOTE COMPUTER SYSTEMS NOTE-A Firewall is required to defend your PC against intrusion attacks. It manages the ports on your PC to block nonauthorized attempts to gain access to your PC. The Firewall is designed to prevent unauthorized access to/from a private network and needs to be configured so that it knows which applications can access the Internet.

PHISHING
IN THIS THE IMPOSTER USES AN AUTHENTIC

LOOKING EMAIL OR WEB SITE TO TRICK USERS TO GIVE SENSITIVE INFORMATION LIKE CREDIT CARD INFORMATION,PASSWORDS ETC.

SOLUTIONS TO COMPUTER SECURITY THREATS


ACTIVE PROTECTION:-USE AN ANTIVIRUS

SOFTWARE LIKE NITRO,KASPERSKY

PREVENTIVE MEASURE:-PREVENT THESE ISSUES

FROM ARISING BY BEING CAREFUL.LIKE BE CAREFUL WITH EMAIL,WATCH FOR PHISHING,KEEP YOUR EMAIL ADDRESS PRIVATE

You might also like