Software
Software
Define the software. List and explain the types of software. Define system software and
application software with example.
Software refers to a collection of computer programs, data, and instructions that tell a computer
how to perform specific tasks. Software can be categorized into two main types: system
software and application software.
Software
System software: This type of software is responsible for managing and controlling the
computer's hardware and providing a platform for running other software programs. Examples of
system software include operating systems, device drivers, utilities, and firmware such as
Windows, UNIX, Linux OS/2, and DOS.
Application software: This type of software is designed to perform specific tasks for users, such
as word processing, graphic design, accounting, or gaming such as Microsoft Word, CoreIDraw,
AutoCAD, and Netscape Navigator.
MADE BY TUHIN |
2
User
Operating System:
Application software
An operating system is a system
software. It is an intermediary System software
program in between computer user
and computer hardware. It Hardware
provides an environment in which
a user can use the computer
system effectively, efficiently, and
conveniently.
Example: Windows 7, Vista,
Linux etc.
What is an operating system (OS)? Mention the types and functions of operating systems.
An operating system (OS) is a type of software that acts as an interface between computer
hardware and the user, controlling the allocation of resources and providing a platform for other
software programs to run. Some common functions of operating systems include managing
memory, controlling input and output devices, and providing a user interface for interacting with
the computer.
Batch operating system: This type of operating system executes jobs in batches, without any
user interaction. It is commonly used in mainframe computers and is best suited for processing
large volumes of data.
Multi-user operating system: This type of operating system allows multiple users to access a
computer system simultaneously, each with their own set of resources and applications.
Mobile operating system: A mobile operating system is designed for use on mobile devices like
smartphones and tablets, providing a touch-based user interface and support for mobile-specific
features like GPS and wireless communication.
MADE BY TUHIN |
3
Desktop operating system: A desktop operating system is designed for use on personal
computers, providing a graphical user interface and support for a wide range of applications.
Overall, the functions of an operating system can vary depending on the type and intended use of
the system, but they generally serve as a fundamental component of modern computing,
providing a platform for other software to run and enabling users to interact with computer
hardware in a meaningful way.
Provides the instructions to display the on-screen elements with which you interact.
Collectively, these elements are known as the user interface.
Loads programs into the computer’s memory so that you can use them.
Coordinates how programs work with the CPU, RAM, Keyboard, mouse, printer, and
other hardware as well as with other software.
Manages the way information is stored on and retrieved from disks.
The characteristics of an operating system (OS) can vary depending on the specific type of
system, but some common characteristics include:
Resource management: The operating system is responsible for allocating and managing
computer resources such as CPU time, memory, and input/output (I/O) devices.
Security: Operating systems provide a variety of security features to protect the system and user
data from unauthorized access, including password protection, encryption, and firewalls.
User interface: The operating system provides a user interface that allows users to interact with
the computer and run applications.
Memory management: The operating system is responsible for managing computer memory,
allocating and deallocating memory as needed by running programs.
MADE BY TUHIN |
4
File management: Operating systems provide a file system that allows users to store, organize,
and access files on the computer.
Device management: The operating system manages hardware devices attached to the
computer, such as printers, scanners, and external storage devices.
Error handling: Operating systems are designed to handle errors and crashes that may occur in
the system, providing mechanisms for recovering from errors and minimizing data loss.
DOS (Disk Operating System) is an early operating system used on IBM-compatible personal
computers. The internal structure of DOS is relatively simple compared to modern operating
systems, but it still includes several key components.
Boot sector: The boot sector is the first sector of the disk, which contains the code necessary to
boot the operating system. When the computer is turned on, the BIOS (Basic Input/Output
System) reads the boot sector and loads the operating system into memory.
File system: DOS uses a file system to manage files and directories on the disk. The file system
used by DOS is typically the FAT (File Allocation Table) file system, which maintains a table of
allocated and free clusters on the disk.
Command interpreter: DOS provides a command-line interface for interacting with the
operating system, allowing users to enter commands to perform tasks like copying files,
formatting disks, and running programs. The command interpreter is responsible for parsing and
executing these commands.
Device drivers: DOS includes device drivers for managing hardware devices such as the
keyboard, display, and disk drives. These device drivers provide an interface between the
operating system and the hardware, allowing the operating system to communicate with the
devices.
System calls: DOS provides a set of system calls that allow applications to interact with the
operating system. These system calls include functions for reading and writing files, creating and
deleting directories, and allocating memory.
Here is a list of some of the important characteristics of DOS (Disk Operating System) −
DOS is a single user system.
DOS is a command line interface operating system.
DOS is machine independence.
MADE BY TUHIN |
5
The following table highlights the major differences between DOS and Windows −
DOS stands for Disk Operating System. Windows stands for Windows, no
Definition specific form.
MADE BY TUHIN |
6
DOS command execution is faster than Windows. Windows operations are slower as
Speed compared to DOS.
Linux is a popular open-source operating system based on the Unix operating system. It is
known for its stability, flexibility, and security, and is widely used in a variety of applications,
from desktops and laptops to servers and supercomputers.
Linux system is composed of several key components that work together to provide a complete
operating system. Here are the main components of a typical Linux system:
1. Kernel: The kernel is the core component of the Linux operating system. It manages
system resources such as memory, CPU, and I/O devices, and provides a low-level
interface between software and hardware.
2. System libraries: System libraries are collections of code that provide common
functionality to programs running on the system. They include functions for managing
files, accessing network resources, and interacting with the kernel.
3. System Utility: System Utility programs are responsible to do specialized, individual
level tasks.
1. Portable: Portability means software can works on different types of hardware in same
way. Linux kernel and application programs supports their installation on any kind of
hardware platform.
2. Open Source: Linux source code is freely available and it is community based
development project. Multiple teams work in collaboration to enhance the capability of
Linux operating system and it is continuously evolving.
3. Multi-User: Linux is a multiuser system means multiple users can access system
resources like memory/ ram/ application programs at same time.
4. Multiprogramming: Linux is a multiprogramming system means multiple applications
can run at same time.
5. Hierarchical File System: Linux provides a standard file structure in which system files/
user files are arranged.
MADE BY TUHIN |
7
6. Shell: Linux provides a special interpreter program which can be used to execute
commands of the operating system. It can be used to do various types of operations, call
application programs. etc.
7. Security: Linux provides user security using authentication features like password
protection/ controlled access to specific files/ encryption of data.
What is utility program? List some utility programs with their functions.
A utility program is a type of software that provides tools and functions to assist users in
performing various tasks on their computer system. Utility programs are designed to improve
system performance, manage files, optimize resources, and provide additional functionality not
found in the operating system. Here are some common utility programs and their functions:
Disk Cleanup: This utility program is used to free up disk space by removing unnecessary files
and data from the computer. It can be used to remove temporary files, system files, and other
items that are no longer needed.
Disk Defragmenter: This program is used to optimize the storage of files on the hard drive. It
rearranges files and data on the disk to reduce fragmentation, which can improve system
performance and speed up file access times.
Antivirus Software: Antivirus software is used to detect and remove viruses and other
malicious software from the computer. It provides real-time protection against threats and can be
used to scan files, email, and other data for potential threats.
Backup and Recovery: Backup and recovery software is used to create backups of important
files and data on the computer. It can be used to recover lost or deleted files and data in the event
of a system failure or data loss.
File Compression: File compression software is used to compress files and reduce their size. It
can be used to save disk space, speed up file transfers, and create archives of files.
File Encryption: File encryption software is used to encrypt files and data to protect them from
unauthorized access. It can be used to secure sensitive data and prevent it from being accessed by
others.
MADE BY TUHIN |
8
Question: What is a user-written program? Mention some name of programming languages that
can be used to develop a user-written program.
User-written Program: A user-written program is written by computer user to solve their daily
life problems. Here, the user must have some programming knowledge and he or she must use
some high level programming language to develop that program.
Question: Define package program. Mention the major programs available in MS office
package.
Package Program: A package program is commercially developed for common computer users.
These programs are developed to use as very much user-friendly.
The major programs which are available in MS office package are below:
Program Task
MS Word Documentary
MS Excel Spread Sheet Analysis
MADE BY TUHIN |
9
The Mac operating system, also known as macOS, is an operating system developed by Apple
Inc. It is designed to run on Apple's Macintosh line of computers and is based on the Unix
operating system.
User Interface: macOS features a graphical user interface that is designed to be intuitive and
user-friendly. It includes features such as the Dock, which provides easy access to frequently
used applications and files, and Mission Control, which provides a bird's eye view of open
windows and applications.
Security: macOS includes advanced security features such as Gatekeeper, which prevents users
from installing malicious software, and FileVault, which provides encryption for data stored on
the computer.
Integration with Other Apple Products: macOS is designed to integrate seamlessly with other
Apple products, such as iPhones and iPads. Features such as AirDrop and Handoff allow users to
easily transfer files and work across multiple devices.
Built-in Applications: macOS includes a range of built-in applications, such as Safari (a web
browser), Pages (a word processor), and GarageBand (a music creation tool).
Android is a popular mobile operating system developed by Google. It is based on the Linux
kernel and is designed to run on smartphones, tablets, and other mobile devices.
MADE BY TUHIN |
10
User Interface: Android features a graphical user interface that is designed to be intuitive and
easy to use. It includes features such as the Home screen, which provides easy access to
frequently used apps, and the App Drawer, which provides a list of all installed apps.
App Ecosystem: Android has a robust ecosystem of third-party apps available on the Google
Play Store. There are millions of apps available for Android users, including games, productivity
apps, and social media apps.
Customization: Android is highly customizable, allowing users to personalize their devices with
custom launchers, widgets, and themes. This means that users can tailor their Android devices to
suit their individual preferences and needs.
Google Integration: Android is tightly integrated with Google's suite of apps and services, such
as Gmail, Google Drive, and Google Maps. This allows users to easily access and use these
services on their Android devices.
Multi-Tasking: Android supports multi-tasking, allowing users to run multiple apps at the same
time. This is useful for tasks such as streaming music while browsing the web or checking email
while using a navigation app.
Security: Android includes advanced security features such as Google Play Protect, which scans
apps for malware and other security threats.
iOS is the operating system developed by Apple Inc. for their mobile devices such as iPhones,
iPads, and iPod Touches. Here are some key features of iOS:
User Interface: iOS features a graphical user interface that is designed to be user-friendly and
intuitive. It includes features such as the Home screen, which provides easy access to frequently
used apps, and the App Store, which allows users to download and install apps.
App Ecosystem: iOS has a robust ecosystem of third-party apps available on the App Store.
There are millions of apps available for iOS users, including games, productivity apps, and social
media apps.
Integration with Apple Products: iOS is designed to integrate seamlessly with other Apple
products, such as Mac computers and Apple Watches. Features such as AirDrop and Handoff
allow users to easily transfer files and work across multiple devices.
MADE BY TUHIN |
11
Security: iOS includes advanced security features such as Touch ID and Face ID, which allow
users to unlock their devices securely, and Find My iPhone, which allows users to locate lost or
stolen devices. Additionally, all apps on the App Store undergo strict security checks before they
are made available for download.
Accessibility: iOS includes a range of accessibility features, such as VoiceOver, which provides
audio descriptions of onscreen elements, and AssistiveTouch, which allows users to control their
devices using gestures.
Performance: iOS is designed to provide a fast and responsive user experience. It includes
features such as Background App Refresh, which ensures that apps are always up-to-date and
ready to use.
What are computer Virus? Write possible symptoms of a virus affected computer.
A computer virus is a type of malicious software (malware) that infects computer systems by
replicating itself and spreading to other files and programs on the same computer or to other
computers on a network.
Once a computer virus infects a system, it can cause a range of harmful effects, such as deleting
or corrupting data, disrupting system performance, stealing sensitive information, or enabling
unauthorized access to the system.
• Boot Sector
• Multipartite
• Macro
• Companion
• Polymorphic
Boot Sector Virus: These viruses are once common back when computers are booted from
floppy disks. Today, these viruses are found distributed in forms of physical media such as
MADE BY TUHIN |
12
external hard drives or USB. If the computer is infected with a boot sector virus, it automatically
loads into the memory enabling control of your computer.
TSR: A terminate and stay resident (TSR) virus is a virus that stays active in memory after the
application (or bootstrapping, or disk mounting) has terminated.
Companion Virus: A companion virus is an old type of virus that poses as a legitimate file by
copying its file name but uses a different extension. It doesn't modify files.
Multipartite Virus: A type of virus that is very infectious and can easily spread on your
computer system. It can infect multiple parts of a system including memory, files, and boot
sector which makes it difficult to contain.
Macro Virus: This type of virus is commonly found in programs such as Microsoft Word or
Excel. These viruses are usually stored as part of a document and can spread when the files are
transmitted to other computers, often through email attachments.
Polymorphic Viruses: Polymorphic viruses change their form in order to avoid detection and
disinfection by anti-virus applications. After the work, these types of viruses try to hide from the
anti-virus application by encrypting parts of the virus itself. This is known as mutation.
Viruses can infect and spread in a computer system in several ways, including:
Email Attachments: A common way that viruses spread is through email attachments. A user
may receive an email with an attachment that contains a virus, and when they download and
open the attachment, the virus infects their system.
Infected Websites: Visiting an infected website can also result in a virus infecting a user's
computer. This can happen if the user clicks on a link or downloads a file from an infected
website.
File Sharing: Viruses can spread through file-sharing networks, such as peer-to-peer networks.
Users who download files from these networks may inadvertently download a virus along with
the desired file.
MADE BY TUHIN |
13
Infected Software: Sometimes viruses can be bundled with legitimate software programs, or
they can be disguised as software updates. When a user installs the software or update, the virus
infects their system.
External Devices: Viruses can also spread through external devices such as USB drives or
external hard drives. If an infected device is connected to a computer, the virus can spread to the
system.
Once a virus infects a computer system, it can spread to other files and programs on the same
computer or to other computers on a network. The virus can replicate itself and modify existing
files or programs to include its own code, making it more difficult to detect and remove.
Write down the steps to protect your computer form virus attack.
Here are some steps to help protect your computer from virus attacks:
Install Antivirus Software: Install a reputable antivirus software program and keep it updated.
This will help detect and remove viruses from your system.
Keep Software Up-to-Date: Keep your operating system and all software programs up-to-date
with the latest security patches and updates. This can help close security vulnerabilities that
viruses can exploit.
• Use Firewall: Use a firewall to block unauthorized access to your computer and network.
This can help prevent viruses from entering your system. A firewall is software or
hardware that creates a protective barrier between your computer and potentially
damaging content on the Internet or network.
• The firewall helps to guard your computer against malicious users, and also against
malicious software such as computer viruses and worms.
Be Careful with Email: Be cautious when opening email attachments and do not open
attachments from unknown or suspicious senders. If you receive an unexpected attachment,
verify with the sender before opening it.
Use Strong Passwords: Use strong, complex passwords for all your online accounts, and do not
share them with others. This can help prevent unauthorized access to your computer and
network.
MADE BY TUHIN |
14
Avoid Suspicious Websites: Be cautious when visiting websites and avoid downloading files or
clicking on links from unknown or suspicious websites.
Use External Devices Safely: Scan all external devices, such as USB drives or external hard
drives, for viruses before using them on your computer.
Back Up Your Data: Regularly back up your data to an external hard drive or cloud storage.
This can help prevent data loss in case of a virus attack.
By following these steps, you can help protect your computer from virus attacks and ensure that
your data and personal information remain safe and secure.
How does computer virus works? And what are the characteristics of it?
A computer virus performs two basic functions: it copies itself from machine to machine (self-
reproducing), and it executes the instructions the perpetrator has planned.
Once a virus gains access to a computer, its effects can vary. Possible attacks include:
• Replicating itself
• Flashing BIOS
MADE BY TUHIN |
15
There have been many notable computer viruses over the years, and here are some examples:
ILOVEYOU: The ILOVEYOU virus is one of the most infamous viruses in history, which
caused billions of dollars in damages worldwide in 2000. It was spread through email
attachments and appeared to be a love letter.
Melissa: The Melissa virus, first discovered in 1999, was spread through email attachments that
contained a Word document macro. It infected thousands of computers in a matter of days and
caused millions of dollars in damages.
Code Red: Code Red was a worm that infected thousands of servers running Microsoft's Internet
Information Server (IIS) in 2001. It caused servers to crash and defaced websites with the
message "Hacked By Chinese!".
Stuxnet: Stuxnet was a highly sophisticated virus that targeted industrial control systems,
specifically those used in nuclear facilities. It was discovered in 2010 and is believed to have
been developed by a nation-state for cyber espionage or sabotage purposes.
These are just a few examples of the many notable computer viruses that have caused significant
damage over the years. It's important to stay vigilant and take steps to protect your computer and
data from potential virus attacks.
• Worms
• Trojan Horse
• Bombs
Worms: A program or algorithm that replicates itself over a computer network or through e-
mail and sometimes performs malicious actions such as using up the computer and network
resources and possibly destroying data is called as Worms. For Examples: Klez, Nimda, and
Code Red.
MADE BY TUHIN |
16
Depending on their purpose, a Trojan can be destructive or a resource hog and is almost always
considered a root compromise. For ex: Back Orifice, NetBus, SubSeven.
Yes! Many applications are installed by hackers and worms that would be considered legitimate
tools. If they were not installed by you and are being used for malicious purposes, they are
considered Trojans … even though your antivirus software will not detect them as such.
Logic Bomb:
A logic bomb is a malicious program that is triggered when a logical condition is met, such as
after a number of transactions have been processed, or on a specific date (also called a time
bomb). Malware such as worms often contain logic bombs, behaving in one manner, then
changing tactics on a specific date and time.
The following table highlights the major differences between Virus, Worm, and Trojan Horse −
A Virus is a computer program or software loaded, A Worm is a computer program similar to a virus that Trojan Horse is a hidden piece of
either deliberately or unknowingly by the user. It does not communicate with other system programs but malware that steals sensitive
connects to another software/program to execute multiplies and runs itself to slow down and damage the information/data from a user's system
unanticipated tasks when the system's actual performance of the system. and sends it to another location across
program is running. the network.
Viruses cannot be operated remotely since they are Worms can be controlled by the remote because they can Trojan Horse can also be operated
installed on the target machine or by the user open a back door to the host. remotely, much like worms via the
inadvertently. network.
Viruses, like worms, cannot replicate themselves. Worms replicate themselves in the system and propagate In comparison to viruses and worms, a
Viruses also propagate at a moderate rate. quicker than viruses and Trojan horses. Trojan Horse spreads slowly.
MADE BY TUHIN |
17
The primary goal of a virus is to alter or erase Worms aim to degrade system performance and slow it The Trojan horse virus, much like in
system data. down by eating system resources. the story, disguises itself as normal
software and steals crucial
information
Viruses use executable files to spread. Worms take use of system flaws to carry out their attacks. Trojan horse is a type of malware that
runs through a program and is
interpreted as utility software.
What is malware?
Malware is any software intentionally designed to cause disruption to a computer, server, client,
or computer network, leak private information, gain unauthorized access to information or
systems, deprive access to information, or which unknowingly interferes with the user's
computer security and privacy.
Malware can be difficult to detect and remove, as it is often designed to evade detection by
antivirus and other security software. To protect against malware, it is important to use antivirus
software, keep software up-to-date, and avoid downloading or opening suspicious files or emails.
Resident and Non -resident viruses Malware includes computer viruses, worms, Trojan horses,
3. Types are two types of Virus. ransomware, spyware and other malicious programs.
MADE BY TUHIN |
18
A Virus is a malicious executable code attached to another Spyware is a form of malware designed to collect your
1. executable file which can be harmless or can modify or delete data. personal information.
It can control data and resources, cause error, destroy system and It provides profit to the third party by collecting data of user
4. slow down the performance. without his awareness.
Spyware and adware collect information about you without appropriate notice and consent.
A computer virus spreads software, usually malicious in nature, from computer to computer.
Spyware can get installed on your computer in a number of ways. One way is via a
virus. Another way is for it to be secretly downloaded and installed with other software you’ve
chosen to install. You and I both know how easy it is to skip reading all the documentation on a
free program and just click “OK.” That’s often how they get you.
In short, spyware is a specific type of unwanted software that covertly collects your information.
A virus is a specific way software can be covertly distributed, often by e-mail. Both spyware
and viruses can cause damage to your computer or cause you to lose important data.
Antivirus software is a type of software designed to detect, prevent, and remove malicious
software, such as viruses, worms, trojans, and other types of malware.
MADE BY TUHIN |
19
Antivirus software typically works by scanning files, emails, and other data on a computer or
network for known patterns of malicious code. If a virus or other malware is detected, the
antivirus software can take action to remove or quarantine the malicious files, preventing them
from causing harm to the computer or network.
Most antivirus software includes real-time protection features, which continuously monitor a
computer or network for potential threats and take action to prevent them. Some antivirus
software also includes additional security features, such as firewalls, spam filters, and anti-
phishing protection.
Antivirus software is an essential tool for computer security, as it can help protect against the
growing number of threats on the internet. It's important to keep antivirus software up-to-date, as
new threats can emerge quickly and the software needs to be able to detect and respond to them.
Cleaning Virus: Cleaning viruses depends entirely on your local antivirus solution. The virus
must be identified before it can be removed, so it makes sense to try your antivirus scanner first.
If your software identifies, but can’t remove the virus, check the manufacturer’s website for
manual removal instructions.
SL No Malware Spyware
3. Malware is more harmful than spyware. Spyware is less harmful than Malware
MADE BY TUHIN |
20
SL No Malware Spyware
Language Translators
2+3
10 00 11 Machine or Binary language
MADE BY TUHIN |
21
Ex. 2+3 10 00 11
Ex. 2+3 10 00 11
Compiler Interpreter
A compiler translates the entire source code in a single run. An interpreter translates the entire source code line by line.
It consumes less time i.e., it is faster than an interpreter. It consumes much more time than the compiler i.e., it is slower than the
compiler.
Both syntactic and semantic errors can be checked Only syntactic errors are checked.
simultaneously.
MADE BY TUHIN |
22
Compiler Interpreter
The localization of errors is difficult. The localization of error is easier than the compiler.
A presence of an error can cause the whole program to be A presence of an error causes only a part of the program to be re-
re-organized. organized.
The compiler is used by the language such as C, C++. An interpreter is used by languages such as Java.
MADE BY TUHIN |