Vous êtes sur la page 1sur 8

System software consists of the programs that control or maintain the operations

of the computer and its devices


SYSTEM SOFTWARE AND APPLICATION SOFTWARE
An operating system
(OS) is a set of programs containing instructions that work together to
coordinate all the activities among computer hardware resources
The process of starting or restarting a computer is called booting.
Cold boot
Turning on a computer that has been powered off completely
Warm boot
Using the operating system to restart a computer

You can boot from a boot disk


A recovery disk contains a few system files that will start the computer
A user interface controls how you enter data and instructions and how
information is displayed on the screen
With a graphical user interface (GUI), you interact with menus and visual
images
Memory management optimizes the use of RAM
Virtual memory is a portion of a storage medium functioning as additional
RAM
A performance monitor is a program that assesses and reports information about
various computer resources and devices
Automatic update automatically provides updates to the program
A server operating system organizes and coordinates how multiple users access
and share resources on a network
A stand-alone operating system is a complete operating system that works on a
desktop computer, notebook computer, or mobile computing device
An embedded operating system resides on a ROM chip on a mobile device or
consumer electronic device
A utility program is a type of system software that allows a user to perform
maintenance-type tasks
A file manager is a utility that performs functions related to file
management
A search utility is a program that attempts to locate a file on your computer
based on criteria you specify
A disk defragmenter reorganizes the files and unused space on a
computers hard disk so that the operating system accesses data more quickly and
programs run faster
A backup utility allows users to copy files to another storage medium
A restore utility reverses the process and returns backed up files to their
original form
A screen saver causes a display devices screen to show a moving image or
blank screen if no activity occurs for a specified time
A personal firewall detects and protects a personal computer from
unauthorized intrusions
A virus describes a potentially damaging computer program that affects a
computer negatively
A worm copies itself repeatedly in memory or over a network
A Trojan horse hides within or looks like a legitimate program
An antivirus program protects a computer against viruses
A file compression utility shrinks the size of a file(s)
Compressed files sometimes are called zipped files

Application Software
Primary function is to apply the power of the computer to give individuals,
workgroups, and the entire enterprise the ability to solve problems and perform
specific tasks
Application programs interact with systems software; systems software then
directs computer hardware to perform the necessary tasks
Available in a variety of forms :
Packaged software , Custom software , Web application , Open source
software , Shareware , Freeware , Public-domain software
Types of Application Software
Proprietary software: one-of-a-kind program for a specific application,
usually developed and owned by a single company
Off-the-shelf software: existing software program that is purchased
Business software is application software that assists people while performing
business activities
Business Software
Word processing software allows users to create and manipulate
documents
Clip art is a collection of electronic drawings, photos, and other images
A database is a collection of data organized in a manner that allows access,
retrieval, and use of that data
Software bug: defect in a computer program that keeps it from performing as it is
designed to perform

Operating System ( OS )
is system software which acts as the master controller for all activities that
take place in a computer system
Takes orders from application software and carries them out like the chain of
command in an army
How an OS Functions?
Resources , Memory Management ,Storage Resources ,Peripheral Devices
Resources
Any component that is required to perform work
Common resources: Processor RAM Storage space (hard disk space)
Peripherals (such as printers)
Memory Management
Each program needs a specific area of RAM
If instructions or data leak into other programs RAM areas, the program
crashes and an error message appears, such as General Protection Fault
Storage Resources
The OS remembers the names and locations of all files, and keeps track of
empty places where new files can be stored.
Peripheral Devices
Types of Operating Systems
Single-User, Single-Task
Single-User, Multi-Task
Multi-User
Real-Time Operating Systems
Embedded Operating Systems
Network Operating Systems
User Interface
Command line interface
Menu driven interface
Graphical User interface

Classification of Computer viruses:


Boot sector virus
Master Boot Record (MBR) virus
File infector virus
Multipartite virus
Macro virus
Boot sector virus
Boot sector viruses generally hide in the boot sector, either in the bootable
disk or the hard drive
It attaches itself to the first part of the hard disk that is read by the
computer upon boot up.
These viruses are spread rapidly by floppy disks and not on CD-ROMs.
Once copied to the memory, any floppy disks that are not write protected
will become infected when the floppy disk is accessed.
Error message Invalid system disk
Master Boot Record (MBR) virus
MBR viruses are memory-resident viruses that infect disks in the same
manner as boot sector viruses.
However it, infects the MBR of the system, gets activated when the BIOS
activates the Master boot code.
MBR infectors normally save a legitimate copy of the master boot record in
an different location.
File infector virus
File infector viruses infect program files.
Normally infect executable code, such as .COM, .SYS, .BAT and .EXE files.
They can infect other files when an infected program is run from floppy,
hard drive, or from the network. Many of these viruses are memory resident.
After memory becomes infected, any uninfected executable file that runs
becomes infected.
Multipartite virus
Multipartite (also known as polypartite) viruses infect both boot records and
program files.
These are particularly difficult to repair. If the boot area is cleaned, but the
files are not, the boot area will be reinfected.
The same holds true for cleaning infected files. If the virus is not removed
from the boot area, any files that you have cleaned will be reinfected.
Macro virus
Macro are mini-programs which make it possible to automate series of
operations so that they are performed as a single action, thereby saving the user
from having to carry them out one by one.
Macro viruses infect files that are created using certain applications or
programs that contain macros.
They are platform-independent since the virus itself are written in language
of the application and not the operating system.
They infect documents created from Microsoft Office Word, Excel,
PowerPoint and Access files.
Melissa
The Melissa Virus is a macroinstruction (Macro) virus created by David
Smith which infected Windows 98 computers.
Caused software giants such as Microsoft to temporarily shut down their
email servers because Microsoft was unwittingly helping the propagation of the
virus.
two more types of malicious software. These are : Worms and Trojans
Worms
Due to the copying nature of a worm and its capability to travel across
networks the end result in most cases is that it consumes too much system memory
(or network BW).
Worms spread from computer to computer, but unlike a virus, it has the
capability to travel without any help from a person.
LOVE-LETTER-FOR-YOU.TXT.VBS,
deletion of files from victim's hard disk
password theft
Trojan horses
are impostors files that claim to be something desirable but, in fact, are
malicious..
WIN-BUGSFIX.EXE was a Trojan Horse program that collected usernames
and passwords from the victim's hard drive and emailed them to an address in the
Philippines, mailme@super.net.ph.
"waterfalls.scr"

Examples of risky file types


.EXE .PIF .BAT .VBS .COM
2012's Worst Viruses
Flame , Belgian Computer Crime Virus , Shamoon
Hidden processes running on your system
1. monit.exe- runs under explorer.exe, keylogger app, creates problems with
Counter Strike
2. scvhost.exe or 713xRMTmon.exe - not to be confused with svchost.exe, an
important windows process.
3. wscript.exe - a harmless process which can be made to execute harmful
VBScripts like mswin32.dll.vbs
4. amvo.exe or amva.exe
5. autorun.inf - Its actually a harmless file. But can be used to invoke a virus when
you click a folder/drive which has this file.

Computer network A collection of computing devices that are connected in


various ways in order to communicate and share resources
A network refers to two or more connected computers that can share resources
such as data, a printer, an Internet connection, applications, or a combination of
these resources.
LAN - Local area Network
WAN Wide area network
MAN Metropolitan area netork
The generic term node or host refers to any device on a network
Data transfer rate The speed with which data is moved from one place on a
network to another
Data transfer rate is a key issue in computer networks
Computer networks have opened up an entire frontier in the world of computing
called the client/server model
File server A computer that stores and manages files for multiple users on a
network
Web server A computer dedicated to responding to requests (from the browser
client) for web pages
Applications of Networks
Resource Sharing
Information Sharing
Communication
Remote computing
Distributed processing (GRID Computing)
Network Topology
Bus Topology - Commonly referred to as a linear bus, all the devices on a
bus topology are connected by one single cable.
Star Topology - The star topology is the most commonly used architecture
in Ethernet LANs. When installed, the star topology resembles spokes in a bicycle
wheel.
Extended Star Topology - Larger networks use the extended star topology
also called tree topology. When used with network devices that filter frames or
packets, like bridges, switches, and routers, this topology significantly reduces the
traffic on the wires by sending packets only to the wires of the destination host.
Ring Topology - A frame travels around the ring, stopping at each node. If a
node wants to transmit data, it adds the data as well as the destination address to
the frame.
The mesh topology connects all devices (nodes) to each other for
redundancy and fault tolerance.
Types of Networks
Local-area network (LAN) A network that connects a relatively small
number of machines in a relatively close geographical area
Types of Networks
Various configurations, called topologies, have been used to administer LANs
Ring topology A configuration that connects all nodes in a closed loop on
which messages travel in one direction
-Star topology A configuration that centers around one node to which all
others are connected and through which all messages are sent
Bus topology All nodes are connected to a single communication line that
carries messages in both directions
A bus technology called Ethernet has become the industry standard for
local-area networks
Wide-area network (WAN) A network that connects two or more local-area
networks over a potentially large geographic distance
Metropolitan-area network (MAN) The communication infrastructures that have
been developed in and around large cities
Internet backbone A set of high-speed networks that carry Internet traffic
Internet service provider (ISP) A company that provides other companies or
individuals with access to the Internet
-A phone modem converts computer data into an analog audio signal for
transfer over a telephone line, and then a modem at the destination converts it
back again into data
A digital subscriber line (DSL) uses regular copper phone lines to
transfer digital data to and from the phone companys central office
A cable modem uses the same line that your cable TV signals come in on to
transfer the data back and forth
Open Systems
Proprietary system A system that uses technologies kept private by a
particular commercial vendor One system couldnt communicate with another,
leading to the need for
Interoperability The ability of software and hardware on multiple machines
and from multiple commercial vendors to communicate Leading to
Open systems Systems based on a common model of network architecture
and a suite of protocols used in its implementation
The International Organization for Standardization (ISO) established the
Open Systems Interconnection (OSI) Reference Model

TCP stands for Transmission Control Protocol TCP software breaks messages
into packets, hands them off to the IP software for delivery, and then orders and
reassembles the packets at their destination
IP stands for Internet Protocol IP software deals with the routing of packets
through the maze of interconnected networks to their final destination
UDP stands for User Datagram Protocol
It is an alternative to TCP
The main difference is that TCP is highly reliable, at the cost of decreased
performance, while UDP is less reliable, but generally faster
High-Level Protocols
Other protocols build on the foundation established by the TCP/IP protocol suite
Simple Mail Transfer Protocol (SMTP)
File Transfer Protocol (FTP)
Telnet
Hyper Text Transfer Protocol (http)
Firewall A machine and its software that serve as a special gateway to a network,
protecting it from inappropriate access
Filters the network traffic that comes in, checking the validity of the messages as
much as possible and perhaps denying some messages altogether Enforces an
organizations access control policy
The domain name system (DNS) is chiefly used to translate hostnames into
numeric IP addresses
The OSI Model Why a Layered Network Model?
Application Application Layers (Upper Layers):
Network Processes to Applications
Data Representation
InterHost Communication
Presentation
Session
Transport - Handles transportation issues between hosts
Network - Provides connectivity and path selection between two host
systems
Data Link - Defines how data is formatted for transmission and how access
to the network is controlled
Physical - Binary Transmission: Defines the electrical, mechanical,
procedural, and functional specifications for activating, maintaining, and
deactivating the physical link

A hub (concentrator) is a device that repeats the signals it receives on one port to
all other ports. It is a central connection point for several network devices.
Switch When a switch receives data the switch examines the data link header for
the MAC address of the destination station and forwards it to the correct port. This
opens a path between ports that can use the full bandwidth of the topology.
Routers facilitate communication within this internet work. It decides how to send
packets within the network so that they arrive at their destination.

operating system (OS)


personal information manager (PIM)
Enterprise resource planning (ERP)
Distance learning (DL)
Real-Time Operating Systems (RTOS)
Master Boot Record (MBR)
Data transfer rate (DTR)
(Local Area Network) LAN
(Metropolitan Area Network) MAN
(Wide Area Network) WAN
Internet service provider (ISP)
digital subscriber line (DSL)
International Organization for Standardization (ISO)
Open Systems Interconnection (OSI)
Transmission Control Protocol (TCP)
Internet Protocol (IP)
User Datagram Protocol (UDP)
Simple Mail Transfer Protocol (SMTP)
File Transfer Protocol (FTP)
Hyper Text Transfer Protocol (http)
Multipurpose Internet Mail Extension (MIME)
domain name system (DNS)
802.11

Vous aimerez peut-être aussi