0% found this document useful (0 votes)
81 views7 pages

Software and Viruses: Assignment # 2 Semester Fall-2019

This document discusses software and viruses. It defines software and describes the main types as system software and application software. System software is discussed in more detail, outlining its purpose to interface with hardware and provide a platform for applications. Key types of system software are described such as operating systems, device drivers, firmware, programming language translators, and utilities. The document then discusses computer viruses, providing examples and describing common types like resident, overwrite, and file infector viruses. Methods of virus prevention like antivirus software are presented. Finally, internet and network attacks are discussed, outlining common goals of attackers and types of attacks such as malware, password, port redirection, and man-in-the-middle.

Uploaded by

ayesha iftikhar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
81 views7 pages

Software and Viruses: Assignment # 2 Semester Fall-2019

This document discusses software and viruses. It defines software and describes the main types as system software and application software. System software is discussed in more detail, outlining its purpose to interface with hardware and provide a platform for applications. Key types of system software are described such as operating systems, device drivers, firmware, programming language translators, and utilities. The document then discusses computer viruses, providing examples and describing common types like resident, overwrite, and file infector viruses. Methods of virus prevention like antivirus software are presented. Finally, internet and network attacks are discussed, outlining common goals of attackers and types of attacks such as malware, password, port redirection, and man-in-the-middle.

Uploaded by

ayesha iftikhar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

SOFTWARE AND VIRUSES

ASSIGNMENT # 2…… SEMESTER FALL-2019

Submission date (0CT23,2019)

BY

AYESHA IFTIKHAR

ROLL # 19010920-074

COURSE CODE: IT-101

COURSE TITTLE

INTRODUCTION TO COMPUTER APPLICATIONS

Submitted To

MAM AYESHA YOUSAF

BBA 1st Section B-

DEPARTMENT OF MANAGEMENT SCIENCES


QUESTION
What do you know about software? Elaborate System Software.

SOFTWARE
Set of instructions, information or program in a specified position used to control the
functioning of computer which is an electronic device and perform precise task is called
Software.
Basic points of software are given below:
 All info treated by computer system programs and data is software.
 Computer programs, collections and related non executable information such as
operational documentation or numerical media involved in computer software.
 Computer hardware along with software involves individually further and neither can be
credibly used on its own.
 Executable encryption contains of appliance language commands maintained by a
distinct workstation classically a graphics processing unit or a central processing unit
present at the lowermost programming level.
 An engine language contains of collections of dual values suggesting workstation orders
that alteration the public of the computer from its previous state.
 The popular software is printed in tall programming linguistic. They are calmer and
additional effectual for computer operator because they are nearer to natural languages
than engine languages.

TYPES OF SOFTWARE
There are two types of software which are given below:
1. Application software
2. System software

SYSTEM SOFTWARE
One of the most important type of computer software is the system software which is
considered to function the computer hardware and to deliver a stage for successively
application software.
Basic points of system software are given below:
 Deliver facilities to computer operators and application program is by System software.
 System software is a software on a computer that is planned to controller and effort
with computer hardware.
 Some of the system software that is straightly used by operators and other system
software work in the contextual.
 System software is track by the operating system against end operators.
 The programs that are devoted to managing the computer itself contained in System
software.

TYPES OF SYSTEM SOFTWARE


Some of the types of system software are given below:
1. Operating system
2. Device drivers
3. Firmware
4. Programming language translators
5. Utilities
Their details are given below:
OPERATING SYSTEM:
 This is the kind of system software that is present between computer hardware and
end operator.
 It is connected initial on the computer to agree devices and submissions to be
recognized and therefore functional.
 Some types of operating system are given below:
o Real-time operating system
o Single-user and Single-task operating system
o Single-user and Multi-task operating system
o Multi-user operating system
o Network operating system
o Internet operating system
o Mobile operating system
 Some functions of operating system are:
o Achieves and assigns memory space for applications.
o Safety management of records and applications.
o Detect, connect and troubleshoot devices.
 Examples of operating system are given below:
o Window 10
o Mac OS X
o Ubuntu
DEVICE DRIVERS:
 Device software is a type of system software which carry computer devices and
peripherals to lifespan.
 Driver make it likely for all linked components and external add-ons perform their
intended responsibilities and as absorbed by the operating system.
 Examples of operating system are given below:
o Mouse
o Keyboard
o Printer
o Display card

FIRMWARE:
 Firmware is the working software fixed within a flash, ROM or EPROM memory chip for
the OS to classify it.
 It straightly achieves and controls all actions of any single hardware.
 Firmware is deposited in flash chip, which can be promoted without exchange
semiconductor chips.
PROGRAMMING LANGUAGE TRANSLATORS:
 Programming Language Translator is a type of system software which are middle
programs trusted on by software programmers to translate tall level language basis
code to engine language code.
 General translator languages are compilers, assemblers and translators.
 Translator programs may perform a whole translation of computer operator code or
interpret every other instruction of appropriate period.
UTILITIES:
 Utilities is the type of software which is present between the system software and
application software.
 These are programs planned for analytic and retain task for the computer.
 Examples and features of utilities are given below:
o Antivirus and safety software for the safety of files and applications. E.g.,
Microsoft security essentials and AVG.
o Data holdup for safety reasons. e.g., cobion and comodo.
o Firewall for defense against outside threats. E.g., window firewall.
QUESTION
Which type of viruses you have to suffer in devices? Justify internet and
Network Attacks.

VIRUS
A computer virus is a type of computer database that, when performed, reproduces itself by
changing other computer programmers and introducing its own code. When this repetition
succeeds, the achieved part is then said to be infested with a processer virus.
Examples:
Examples of viruses are given below
 Creeper virus
 Macro viruses
 Boot sector viruses

TYPES OF VIRUSES

There are many kinds of viruses but the major of them are given below:
RESIDENT VIRUS:
These are enduring viruses’ residence in RAM remembrance. In this case they would be in
location to overwhelmed, as well as, interject, all processes that the system effect. Their effect
includes humiliating computer operator and records that are shut, unlocked, retitled or copied.
OVERWRITE VIRUSE:
These viruses erase data that is in the infested records. In this case, the infested records would
be reduced completely or incompletely hopeless. Inappropriately, you would only fresh the
infested folder by erasing it totally, therefore losing unique content.
FILE INFECTORS:
File contamination is a type of virus that poisons executable folder or programs. On running the
programs, the virus would be started, then be able to convey out its harmful result.
BOOT VIRUSES:
This virus contaminates the hard disk or floppy drives boot area. These viruses can however be
evaded by confirming that the floppy disks and hard drive is well endangered. Never start the
computer using a strange disk drive or floppy drive.
FIRST KNOWN COMPUTER VIRUS:
The primary recognized computer virus is seemed in 1971 called the creeper virus. To erase this
virus a program was shaped by Ray Tomlinson called the Reaper which was really additional
virus whose single determination was to remove the creeper virus.
Other type of viruses is Browser Highjacks, Ransomware, E-mail virus, Macro virus etc.

VIRUS PREVENTION:
Virus can be prevented in following ways:
1. Have a lively antivirus customer connected that stop the virus infections and keep the
package efficient.
2. Do not exposed email with attachment from unknown selders. Even if it is known use
connection as their email could have been hacked.

INTERNET AND NETWORK ATTACK


A network attack can b defined as any technique, procedure or mean used to unkindly attempt
to cooperation network safety.
An insufficient dissimilar kind of mean activities that system invaders and hackers perform are
given below:
 Unlawfully using user books and rights
 Thieving hardware
 Thieving software
 Running code to harm systems
 Running code to harm and immoral data
 Adapting stored data
 Thieving data
An insufficient reason for network attackers trying to attack corporate networks are given
below:
 Unhappy staffs might seek to harm the government’s information, dependability, or
monetary standing.
 There are some network attackers that just enjoy the trial of trying to cooperation
extremely secured networks’ security systems. These kinds of attackers simply see their
movements as a means of revealing current security liabilities.
TYPES OF NETWORK ATTACK
The four types of access attacks are password attacks, trust exploitation, port
redirection, man-in-the-middle attacks and malware attack.
Their details are given below:
MALWARE ATTACK
A malware attack is when cybercriminals make mean software that's connected on
someone else's device deprived of their information to increase access to personal
information or to harm the device, usually for monetary gain. Different types
of malware include viruses, spyware, ransomware, and Trojan horses.
PASSWORD ATTACK
The most common type of attack is password guessing. Attackers can
guess passwords locally or remotely using either a manual or automated
approach. Password guessing isn't always as difficult as you'd expect.
PORT REDIRECTION
Port Redirection is a feature that sends a connection demand on router's WAN with
specific port to a host on router's LAN; and while crossing the NAT, the
terminus port can be changed.
TRUST EXPLOITATION
The goal of a trust misuse attacker is to compromise a trusted host, using it to phase
attacks on other crowds in a net.

You might also like