0% found this document useful (0 votes)
5 views

Software

Software is a collection of programs and instructions that enable computers to perform tasks, categorized into system software and application software. System software manages hardware and provides a platform for applications, while application software performs specific user tasks. Operating systems, such as Windows and Linux, are key examples of system software, facilitating user interaction with hardware and managing resources.

Uploaded by

humayunantor0
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Software

Software is a collection of programs and instructions that enable computers to perform tasks, categorized into system software and application software. System software manages hardware and provides a platform for applications, while application software performs specific user tasks. Operating systems, such as Windows and Linux, are key examples of system software, facilitating user interaction with hardware and managing resources.

Uploaded by

humayunantor0
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

1

Define the software. List and explain the types of software. Define system software and
application software with example.

Software refers to a collection of computer programs, data, and instructions that tell a computer
how to perform specific tasks. Software can be categorized into two main types: system
software and application software.

Software

System software Application software

Operating Language Utility Driver User-written Package


system Translator programs software program Program

Assembler Compiler Interpreter

System software: This type of software is responsible for managing and controlling the
computer's hardware and providing a platform for running other software programs. Examples of
system software include operating systems, device drivers, utilities, and firmware such as
Windows, UNIX, Linux OS/2, and DOS.

Application software: This type of software is designed to perform specific tasks for users, such
as word processing, graphic design, accounting, or gaming such as Microsoft Word, CoreIDraw,
AutoCAD, and Netscape Navigator.

Role of System Software in Computer System

MADE BY TUHIN |
2
User
Operating System:
Application software
An operating system is a system
software. It is an intermediary System software
program in between computer user
and computer hardware. It Hardware
provides an environment in which
a user can use the computer
system effectively, efficiently, and
conveniently.
Example: Windows 7, Vista,
Linux etc.

Fig. Role of system software in computer system

What is an operating system (OS)? Mention the types and functions of operating systems.

An operating system (OS) is a type of software that acts as an interface between computer
hardware and the user, controlling the allocation of resources and providing a platform for other
software programs to run. Some common functions of operating systems include managing
memory, controlling input and output devices, and providing a user interface for interacting with
the computer.

There are several types of operating systems, including:

Batch operating system: This type of operating system executes jobs in batches, without any
user interaction. It is commonly used in mainframe computers and is best suited for processing
large volumes of data.

Real-time operating system: A real-time operating system is designed to provide immediate


response to external events, making it useful for time-critical applications like medical
equipment and process control systems.

Multi-user operating system: This type of operating system allows multiple users to access a
computer system simultaneously, each with their own set of resources and applications.

Network operating system: A network operating system is designed to manage network


resources and provide services to other computers on a network.

Mobile operating system: A mobile operating system is designed for use on mobile devices like
smartphones and tablets, providing a touch-based user interface and support for mobile-specific
features like GPS and wireless communication.

MADE BY TUHIN |
3

Desktop operating system: A desktop operating system is designed for use on personal
computers, providing a graphical user interface and support for a wide range of applications.

Overall, the functions of an operating system can vary depending on the type and intended use of
the system, but they generally serve as a fundamental component of modern computing,
providing a platform for other software to run and enabling users to interact with computer
hardware in a meaningful way.

The operating system performs the following functions:

 Provides the instructions to display the on-screen elements with which you interact.
Collectively, these elements are known as the user interface.
 Loads programs into the computer’s memory so that you can use them.
 Coordinates how programs work with the CPU, RAM, Keyboard, mouse, printer, and
other hardware as well as with other software.
 Manages the way information is stored on and retrieved from disks.

The functioning of the OS can be extended by adding utility software.

What are the characteristics of the operating system?

The characteristics of an operating system (OS) can vary depending on the specific type of
system, but some common characteristics include:

Resource management: The operating system is responsible for allocating and managing
computer resources such as CPU time, memory, and input/output (I/O) devices.

Multitasking: Most modern operating systems allow multiple applications to run


simultaneously, switching between them in a way that gives the illusion of concurrency.

Security: Operating systems provide a variety of security features to protect the system and user
data from unauthorized access, including password protection, encryption, and firewalls.

User interface: The operating system provides a user interface that allows users to interact with
the computer and run applications.

Memory management: The operating system is responsible for managing computer memory,
allocating and deallocating memory as needed by running programs.

MADE BY TUHIN |
4

File management: Operating systems provide a file system that allows users to store, organize,
and access files on the computer.

Device management: The operating system manages hardware devices attached to the
computer, such as printers, scanners, and external storage devices.

Error handling: Operating systems are designed to handle errors and crashes that may occur in
the system, providing mechanisms for recovering from errors and minimizing data loss.

Explain the DOS internal structure.

DOS (Disk Operating System) is an early operating system used on IBM-compatible personal
computers. The internal structure of DOS is relatively simple compared to modern operating
systems, but it still includes several key components.

Boot sector: The boot sector is the first sector of the disk, which contains the code necessary to
boot the operating system. When the computer is turned on, the BIOS (Basic Input/Output
System) reads the boot sector and loads the operating system into memory.

File system: DOS uses a file system to manage files and directories on the disk. The file system
used by DOS is typically the FAT (File Allocation Table) file system, which maintains a table of
allocated and free clusters on the disk.

Command interpreter: DOS provides a command-line interface for interacting with the
operating system, allowing users to enter commands to perform tasks like copying files,
formatting disks, and running programs. The command interpreter is responsible for parsing and
executing these commands.

Device drivers: DOS includes device drivers for managing hardware devices such as the
keyboard, display, and disk drives. These device drivers provide an interface between the
operating system and the hardware, allowing the operating system to communicate with the
devices.

System calls: DOS provides a set of system calls that allow applications to interact with the
operating system. These system calls include functions for reading and writing files, creating and
deleting directories, and allocating memory.

Here is a list of some of the important characteristics of DOS (Disk Operating System) −
 DOS is a single user system.
 DOS is a command line interface operating system.
 DOS is machine independence.

MADE BY TUHIN |
5

 DOS provides command processing facilities.


 DOS operates with Assembler.

Here are some important characteristics of the Windows operating system −


 Windows is a Graphical User Interface based computer operating system.
 It uses icons (pictures, documents, application, program icons, etc.) for user interaction.
 Windows operating system has a taskbar.
 It has a start button as a main menu button.
 It supports pointing devices like mouse, joystick, touchpad, etc.

Difference between DOS and Windows

The following table highlights the major differences between DOS and Windows −

Key DOS Windows

DOS stands for Disk Operating System. Windows stands for Windows, no
Definition specific form.

Tasking Nature DOS is single-tasking OS. Windows is multi-tasking OS.

DOS consumes quite low power. Windows consumes high power.


Power Consumption

DOS memory requirements are quite low. Windows memory requirements


Memory consumption are quite high as compared to
DOS.

DOS has no support for networking. Windows supports networking.


Networking support

DOS is complex in usage. You need to remember Windows usages is user-friendly


Usage commands to use DOS properly. and is quite simple to use.

User interface DOS is a CLI-based OS. Windows is a GUI-based OS.

Multimedia is not supported in DOS. Windows supports multimedia


Multimedia likes games, videos, audios etc.

MADE BY TUHIN |
6

DOS command execution is faster than Windows. Windows operations are slower as
Speed compared to DOS.

DOS supports single window at a time. Windows supports multiple


Multi window window at a time.

Explain the LINUX operating System.

Linux is a popular open-source operating system based on the Unix operating system. It is
known for its stability, flexibility, and security, and is widely used in a variety of applications,
from desktops and laptops to servers and supercomputers.

Linux system is composed of several key components that work together to provide a complete
operating system. Here are the main components of a typical Linux system:

1. Kernel: The kernel is the core component of the Linux operating system. It manages
system resources such as memory, CPU, and I/O devices, and provides a low-level
interface between software and hardware.
2. System libraries: System libraries are collections of code that provide common
functionality to programs running on the system. They include functions for managing
files, accessing network resources, and interacting with the kernel.
3. System Utility: System Utility programs are responsible to do specialized, individual
level tasks.

Following are some of the important features of Linux Operating System:

1. Portable: Portability means software can works on different types of hardware in same
way. Linux kernel and application programs supports their installation on any kind of
hardware platform.
2. Open Source: Linux source code is freely available and it is community based
development project. Multiple teams work in collaboration to enhance the capability of
Linux operating system and it is continuously evolving.
3. Multi-User: Linux is a multiuser system means multiple users can access system
resources like memory/ ram/ application programs at same time.
4. Multiprogramming: Linux is a multiprogramming system means multiple applications
can run at same time.
5. Hierarchical File System: Linux provides a standard file structure in which system files/
user files are arranged.

MADE BY TUHIN |
7

6. Shell: Linux provides a special interpreter program which can be used to execute
commands of the operating system. It can be used to do various types of operations, call
application programs. etc.
7. Security: Linux provides user security using authentication features like password
protection/ controlled access to specific files/ encryption of data.

What is utility program? List some utility programs with their functions.

A utility program is a type of software that provides tools and functions to assist users in
performing various tasks on their computer system. Utility programs are designed to improve
system performance, manage files, optimize resources, and provide additional functionality not
found in the operating system. Here are some common utility programs and their functions:

Disk Cleanup: This utility program is used to free up disk space by removing unnecessary files
and data from the computer. It can be used to remove temporary files, system files, and other
items that are no longer needed.

Disk Defragmenter: This program is used to optimize the storage of files on the hard drive. It
rearranges files and data on the disk to reduce fragmentation, which can improve system
performance and speed up file access times.

Antivirus Software: Antivirus software is used to detect and remove viruses and other
malicious software from the computer. It provides real-time protection against threats and can be
used to scan files, email, and other data for potential threats.

Backup and Recovery: Backup and recovery software is used to create backups of important
files and data on the computer. It can be used to recover lost or deleted files and data in the event
of a system failure or data loss.

System Monitoring: System monitoring software is used to monitor system performance,


resource usage, and other metrics. It can be used to identify potential issues and optimize system
performance.

File Compression: File compression software is used to compress files and reduce their size. It
can be used to save disk space, speed up file transfers, and create archives of files.

File Encryption: File encryption software is used to encrypt files and data to protect them from
unauthorized access. It can be used to secure sensitive data and prevent it from being accessed by
others.

MADE BY TUHIN |
8

Question: What is a user-written program? Mention some name of programming languages that
can be used to develop a user-written program.

User-written Program: A user-written program is written by computer user to solve their daily
life problems. Here, the user must have some programming knowledge and he or she must use
some high level programming language to develop that program.

Programming Language Full meaning

BASIC Beginners All purposes Symbolic Instruction Codes


COBOL Common Business Oriented Language
Fortran Formula Translators
Matlab Matrix Labratory
Prolog Programming in Logic
Lisp List Processing

 Some programming languages which have no full meaning are:

C, C++, C#, Java etc.

Question: Define package program. Mention the major programs available in MS office
package.

Package Program: A package program is commercially developed for common computer users.
These programs are developed to use as very much user-friendly.

The major programs which are available in MS office package are below:

Program Task

MS Word Documentary
MS Excel Spread Sheet Analysis

MADE BY TUHIN |
9

MS Access DBMS (Database Management System)


MS PowerPoint Presentation

Explain MAC operating system.

The Mac operating system, also known as macOS, is an operating system developed by Apple
Inc. It is designed to run on Apple's Macintosh line of computers and is based on the Unix
operating system.

Here are some key features of macOS:

User Interface: macOS features a graphical user interface that is designed to be intuitive and
user-friendly. It includes features such as the Dock, which provides easy access to frequently
used applications and files, and Mission Control, which provides a bird's eye view of open
windows and applications.

Compatibility: macOS is designed to be compatible with a wide range of hardware and


software. It includes built-in support for popular file formats and protocols, and can run many
Windows applications using virtualization or emulation software.

Security: macOS includes advanced security features such as Gatekeeper, which prevents users
from installing malicious software, and FileVault, which provides encryption for data stored on
the computer.

Integration with Other Apple Products: macOS is designed to integrate seamlessly with other
Apple products, such as iPhones and iPads. Features such as AirDrop and Handoff allow users to
easily transfer files and work across multiple devices.

Accessibility: macOS includes a range of accessibility features, such as VoiceOver, which


provides audio descriptions of onscreen elements, and Siri, which allows users to control the
computer using voice commands.

Built-in Applications: macOS includes a range of built-in applications, such as Safari (a web
browser), Pages (a word processor), and GarageBand (a music creation tool).

Explain the Android operating system.

Android is a popular mobile operating system developed by Google. It is based on the Linux
kernel and is designed to run on smartphones, tablets, and other mobile devices.

MADE BY TUHIN |
10

Here are some key features of the Android operating system:

User Interface: Android features a graphical user interface that is designed to be intuitive and
easy to use. It includes features such as the Home screen, which provides easy access to
frequently used apps, and the App Drawer, which provides a list of all installed apps.

App Ecosystem: Android has a robust ecosystem of third-party apps available on the Google
Play Store. There are millions of apps available for Android users, including games, productivity
apps, and social media apps.

Customization: Android is highly customizable, allowing users to personalize their devices with
custom launchers, widgets, and themes. This means that users can tailor their Android devices to
suit their individual preferences and needs.

Google Integration: Android is tightly integrated with Google's suite of apps and services, such
as Gmail, Google Drive, and Google Maps. This allows users to easily access and use these
services on their Android devices.

Multi-Tasking: Android supports multi-tasking, allowing users to run multiple apps at the same
time. This is useful for tasks such as streaming music while browsing the web or checking email
while using a navigation app.

Security: Android includes advanced security features such as Google Play Protect, which scans
apps for malware and other security threats.

Explain the iOs operating system.

iOS is the operating system developed by Apple Inc. for their mobile devices such as iPhones,
iPads, and iPod Touches. Here are some key features of iOS:

User Interface: iOS features a graphical user interface that is designed to be user-friendly and
intuitive. It includes features such as the Home screen, which provides easy access to frequently
used apps, and the App Store, which allows users to download and install apps.

App Ecosystem: iOS has a robust ecosystem of third-party apps available on the App Store.
There are millions of apps available for iOS users, including games, productivity apps, and social
media apps.

Integration with Apple Products: iOS is designed to integrate seamlessly with other Apple
products, such as Mac computers and Apple Watches. Features such as AirDrop and Handoff
allow users to easily transfer files and work across multiple devices.

MADE BY TUHIN |
11

Security: iOS includes advanced security features such as Touch ID and Face ID, which allow
users to unlock their devices securely, and Find My iPhone, which allows users to locate lost or
stolen devices. Additionally, all apps on the App Store undergo strict security checks before they
are made available for download.

Accessibility: iOS includes a range of accessibility features, such as VoiceOver, which provides
audio descriptions of onscreen elements, and AssistiveTouch, which allows users to control their
devices using gestures.

Performance: iOS is designed to provide a fast and responsive user experience. It includes
features such as Background App Refresh, which ensures that apps are always up-to-date and
ready to use.

What are computer Virus? Write possible symptoms of a virus affected computer.

A computer virus is a type of malicious software (malware) that infects computer systems by
replicating itself and spreading to other files and programs on the same computer or to other
computers on a network.

Once a computer virus infects a system, it can cause a range of harmful effects, such as deleting
or corrupting data, disrupting system performance, stealing sensitive information, or enabling
unauthorized access to the system.

Classify the computer virus categories:

• Boot Sector

• TSR (Terminate and stay resident)

• Multipartite

• Macro

• Companion

• Polymorphic

Boot Sector Virus: These viruses are once common back when computers are booted from
floppy disks. Today, these viruses are found distributed in forms of physical media such as

MADE BY TUHIN |
12

external hard drives or USB. If the computer is infected with a boot sector virus, it automatically
loads into the memory enabling control of your computer.

TSR: A terminate and stay resident (TSR) virus is a virus that stays active in memory after the
application (or bootstrapping, or disk mounting) has terminated.

• TSR viruses can be boot sector infectors or executable infectors.

• The Brain virus is a TSR virus.

Companion Virus: A companion virus is an old type of virus that poses as a legitimate file by
copying its file name but uses a different extension. It doesn't modify files.

Multipartite Virus: A type of virus that is very infectious and can easily spread on your
computer system. It can infect multiple parts of a system including memory, files, and boot
sector which makes it difficult to contain.

Macro Virus: This type of virus is commonly found in programs such as Microsoft Word or
Excel. These viruses are usually stored as part of a document and can spread when the files are
transmitted to other computers, often through email attachments.

Polymorphic Viruses: Polymorphic viruses change their form in order to avoid detection and
disinfection by anti-virus applications. After the work, these types of viruses try to hide from the
anti-virus application by encrypting parts of the virus itself. This is known as mutation.

How do viruses infect and spread in a computer system?

Viruses can infect and spread in a computer system in several ways, including:

Email Attachments: A common way that viruses spread is through email attachments. A user
may receive an email with an attachment that contains a virus, and when they download and
open the attachment, the virus infects their system.

Infected Websites: Visiting an infected website can also result in a virus infecting a user's
computer. This can happen if the user clicks on a link or downloads a file from an infected
website.

File Sharing: Viruses can spread through file-sharing networks, such as peer-to-peer networks.
Users who download files from these networks may inadvertently download a virus along with
the desired file.

MADE BY TUHIN |
13

Infected Software: Sometimes viruses can be bundled with legitimate software programs, or
they can be disguised as software updates. When a user installs the software or update, the virus
infects their system.

External Devices: Viruses can also spread through external devices such as USB drives or
external hard drives. If an infected device is connected to a computer, the virus can spread to the
system.

Once a virus infects a computer system, it can spread to other files and programs on the same
computer or to other computers on a network. The virus can replicate itself and modify existing
files or programs to include its own code, making it more difficult to detect and remove.

Write down the steps to protect your computer form virus attack.

Here are some steps to help protect your computer from virus attacks:

Install Antivirus Software: Install a reputable antivirus software program and keep it updated.
This will help detect and remove viruses from your system.

Keep Software Up-to-Date: Keep your operating system and all software programs up-to-date
with the latest security patches and updates. This can help close security vulnerabilities that
viruses can exploit.

• Use Firewall: Use a firewall to block unauthorized access to your computer and network.
This can help prevent viruses from entering your system. A firewall is software or
hardware that creates a protective barrier between your computer and potentially
damaging content on the Internet or network.

• The firewall helps to guard your computer against malicious users, and also against
malicious software such as computer viruses and worms.

Be Careful with Email: Be cautious when opening email attachments and do not open
attachments from unknown or suspicious senders. If you receive an unexpected attachment,
verify with the sender before opening it.

Use Strong Passwords: Use strong, complex passwords for all your online accounts, and do not
share them with others. This can help prevent unauthorized access to your computer and
network.

MADE BY TUHIN |
14

Avoid Suspicious Websites: Be cautious when visiting websites and avoid downloading files or
clicking on links from unknown or suspicious websites.

Use External Devices Safely: Scan all external devices, such as USB drives or external hard
drives, for viruses before using them on your computer.

Back Up Your Data: Regularly back up your data to an external hard drive or cloud storage.
This can help prevent data loss in case of a virus attack.

By following these steps, you can help protect your computer from virus attacks and ensure that
your data and personal information remain safe and secure.

How does computer virus works? And what are the characteristics of it?

A computer virus performs two basic functions: it copies itself from machine to machine (self-
reproducing), and it executes the instructions the perpetrator has planned.

A computer virus exhibits three characteristics: a replication mechanism, an activation


mechanism, and an objective. The replication mechanism searches for other programs to infect,
if it finds any, it inserts the hidden instructions in the program then it modifies the execution
sequence of the program's instructions such that the hidden code will be executed whenever the
program is invoked. The activation mechanism checks for the occurrence of some event. When
the event occurs, the computer virus executes its objective.

Once a virus gains access to a computer, its effects can vary. Possible attacks include:

• Replicating itself

• Interrupting system/network use

• Modifying configuration settings

• Flashing BIOS

• Format hard drive/destroy data

• Using computer/network resources

• Distribution of confidential info

• Denial of Service attacks

Some notable computer virus:

MADE BY TUHIN |
15

There have been many notable computer viruses over the years, and here are some examples:

ILOVEYOU: The ILOVEYOU virus is one of the most infamous viruses in history, which
caused billions of dollars in damages worldwide in 2000. It was spread through email
attachments and appeared to be a love letter.

Melissa: The Melissa virus, first discovered in 1999, was spread through email attachments that
contained a Word document macro. It infected thousands of computers in a matter of days and
caused millions of dollars in damages.

Code Red: Code Red was a worm that infected thousands of servers running Microsoft's Internet
Information Server (IIS) in 2001. It caused servers to crash and defaced websites with the
message "Hacked By Chinese!".

WannaCry: WannaCry is a ransomware virus that caused a global cyberattack in 2017,


affecting hundreds of thousands of computers worldwide. It exploited a vulnerability in
Microsoft Windows and demanded payment in exchange for restoring access to encrypted files.

Stuxnet: Stuxnet was a highly sophisticated virus that targeted industrial control systems,
specifically those used in nuclear facilities. It was discovered in 2010 and is believed to have
been developed by a nation-state for cyber espionage or sabotage purposes.

These are just a few examples of the many notable computer viruses that have caused significant
damage over the years. It's important to stay vigilant and take steps to protect your computer and
data from potential virus attacks.

There are almost three types of virus:

• Worms

• Trojan Horse

• Bombs

Worms: A program or algorithm that replicates itself over a computer network or through e-
mail and sometimes performs malicious actions such as using up the computer and network
resources and possibly destroying data is called as Worms. For Examples: Klez, Nimda, and
Code Red.

• In addition to replication, a worm may be designed to:

– delete files on a host system

MADE BY TUHIN |
16

– send documents via email

– carry other executables as a payload

Trojan: A malicious program disguised as legitimate software Cannot replicate itself, in


contrast to some other types of “malware” like worms and viruses but they can be contained
within a worm.

Depending on their purpose, a Trojan can be destructive or a resource hog and is almost always
considered a root compromise. For ex: Back Orifice, NetBus, SubSeven.

Can legitimate networking tools be considered Trojans?

Yes! Many applications are installed by hackers and worms that would be considered legitimate
tools. If they were not installed by you and are being used for malicious purposes, they are
considered Trojans … even though your antivirus software will not detect them as such.

Logic Bomb:

A logic bomb is a malicious program that is triggered when a logical condition is met, such as
after a number of transactions have been processed, or on a specific date (also called a time
bomb). Malware such as worms often contain logic bombs, behaving in one manner, then
changing tactics on a specific date and time.

Difference between Virus, Worm and Trojan Horse

The following table highlights the major differences between Virus, Worm, and Trojan Horse −

Virus Worm Trojan Horse

A Virus is a computer program or software loaded, A Worm is a computer program similar to a virus that Trojan Horse is a hidden piece of
either deliberately or unknowingly by the user. It does not communicate with other system programs but malware that steals sensitive
connects to another software/program to execute multiplies and runs itself to slow down and damage the information/data from a user's system
unanticipated tasks when the system's actual performance of the system. and sends it to another location across
program is running. the network.

Viruses cannot be operated remotely since they are Worms can be controlled by the remote because they can Trojan Horse can also be operated
installed on the target machine or by the user open a back door to the host. remotely, much like worms via the
inadvertently. network.

Viruses, like worms, cannot replicate themselves. Worms replicate themselves in the system and propagate In comparison to viruses and worms, a
Viruses also propagate at a moderate rate. quicker than viruses and Trojan horses. Trojan Horse spreads slowly.

MADE BY TUHIN |
17

The primary goal of a virus is to alter or erase Worms aim to degrade system performance and slow it The Trojan horse virus, much like in
system data. down by eating system resources. the story, disguises itself as normal
software and steals crucial
information

Viruses use executable files to spread. Worms take use of system flaws to carry out their attacks. Trojan horse is a type of malware that
runs through a program and is
interpreted as utility software.

What is malware?

Malware is any software intentionally designed to cause disruption to a computer, server, client,
or computer network, leak private information, gain unauthorized access to information or
systems, deprive access to information, or which unknowingly interferes with the user's
computer security and privacy.

Malware can be difficult to detect and remove, as it is often designed to evade detection by
antivirus and other security software. To protect against malware, it is important to use antivirus
software, keep software up-to-date, and avoid downloading or opening suspicious files or emails.

Differentiate between Virus and Malware.

S. No. Category Virus Malware

Vital Information Resources Under


1. Full form Seize Malicious Software

A Virus is a malicious executable


code attached to another executable Malware is a program designed to gain access to computer systems,
file which can be harmless or can normally for the benefit of some third party, without the user’s
2. Description modify or delete data. permission.

Resident and Non -resident viruses Malware includes computer viruses, worms, Trojan horses,
3. Types are two types of Virus. ransomware, spyware and other malicious programs.

Antivirus software are used for


4. Protection protection against viruses. Antimalware software are used for protection against malware.

Malware contains several


5. Relationship Virus is a type of Malware. programs; virus is one of them.

MADE BY TUHIN |
18

Differentiate between Virus and Spyware:

S.No. VIRUS SPYWARE

A Virus is a malicious executable code attached to another Spyware is a form of malware designed to collect your
1. executable file which can be harmless or can modify or delete data. personal information.

The main objective of the spyware is to monitor the activity


2. The main objective of virus is to modify the information. of the system.

Spyware can be detected and removed by the anti-spyware


3. Antivirus software are used for protection against viruses. program.

It can control data and resources, cause error, destroy system and It provides profit to the third party by collecting data of user
4. slow down the performance. without his awareness.

5. It is more harmful. It is less harmful as compared.

6. Virus replicates itself. Spyware does not replicate itself.

Bonzibuddy, Cydore and Downloadware are some examples


7. Resident and Non-resident viruses are two types of Virus. of spyware.

What’s the difference between Virus and Spam?

Spyware and adware collect information about you without appropriate notice and consent.
A computer virus spreads software, usually malicious in nature, from computer to computer.
Spyware can get installed on your computer in a number of ways. One way is via a
virus. Another way is for it to be secretly downloaded and installed with other software you’ve
chosen to install. You and I both know how easy it is to skip reading all the documentation on a
free program and just click “OK.” That’s often how they get you.
In short, spyware is a specific type of unwanted software that covertly collects your information.
A virus is a specific way software can be covertly distributed, often by e-mail. Both spyware
and viruses can cause damage to your computer or cause you to lose important data.

What is anti-virus software?

Antivirus software is a type of software designed to detect, prevent, and remove malicious
software, such as viruses, worms, trojans, and other types of malware.

MADE BY TUHIN |
19

Antivirus software typically works by scanning files, emails, and other data on a computer or
network for known patterns of malicious code. If a virus or other malware is detected, the
antivirus software can take action to remove or quarantine the malicious files, preventing them
from causing harm to the computer or network.

Most antivirus software includes real-time protection features, which continuously monitor a
computer or network for potential threats and take action to prevent them. Some antivirus
software also includes additional security features, such as firewalls, spam filters, and anti-
phishing protection.

Antivirus software is an essential tool for computer security, as it can help protect against the
growing number of threats on the internet. It's important to keep antivirus software up-to-date, as
new threats can emerge quickly and the software needs to be able to detect and respond to them.

Cleaning Virus: Cleaning viruses depends entirely on your local antivirus solution. The virus
must be identified before it can be removed, so it makes sense to try your antivirus scanner first.

If your software identifies, but can’t remove the virus, check the manufacturer’s website for
manual removal instructions.

Difference between Malware and Spyware :

SL No Malware Spyware

Malware is a file or a code, designed to


cause damage to a user’s personal
1. computer and network. Spyware is a form of malware designed to collect your personal information.

Malware covers a lot of different


2. malicious software Spyware is one of the type of malware.

3. Malware is more harmful than spyware. Spyware is less harmful than Malware

Malware can replicate itself and makes


4. duplicate copy of it. While, spyware can not self-replicate

MADE BY TUHIN |
20

SL No Malware Spyware

Malware can be detected and removed


5. by the antivirus program. Spyware can be detected and removed by the antispyware program.

It can destroy data and resources, cause


6. error and slow down the performance. It provides profit to the third party by collecting data of user without his awareness.

Language Translators

Historical Evolution of Programming Languages:

2+3
10 00 11  Machine or Binary language

ADD 2,3  Mnemonics based Symbolic language or Assembly language.


SUB 7,2
MUL 5,4
DIV 6,3

2+3  High-Level Language (HLL) or English Like Language (ELL)

First Generation Language (1GL)  Machine Language


Second Generation Language (2GL)  Assembly Language
Third Generation Language (3GL)  High-Level Language

Language Translator: A language translator is a computer program used to translate another


computer program into machine or binary language. Here, source program can be written in any
language other than machine language but after translating the destination program must be in
machine language instructions. That is,

A program written other


than machine language Machine language instruction
(source program) (destination program)

MADE BY TUHIN |
21

Assembler: An assembler is a language translator used to translate an assembly language


program into machine language instructions. That is,

An assembly language program Machine language instructions

Ex. ADD 2,3 10 00 11

Compiler: A compiler is a language translator used to translate a high-level language program


into machine language instructions. That is,

A high-level language program Machine language instructions

Ex. 2+3 10 00 11

Interpreter: An interpreter is a language translator used to translate a high-level language


instruction into machine language instruction and then executes it. That is,

A high-level language instruction Machine language instruction

Ex. 2+3 10 00 11

Differences between Compiler and Interpreter:

Compiler Interpreter

A compiler translates the entire source code in a single run. An interpreter translates the entire source code line by line.

It consumes less time i.e., it is faster than an interpreter. It consumes much more time than the compiler i.e., it is slower than the
compiler.

It is more efficient. It is less efficient.

CPU utilization is more. CPU utilization is less as compared to the compiler.

Both syntactic and semantic errors can be checked Only syntactic errors are checked.
simultaneously.

The compiler is larger. Interpreters are often smaller than compilers.

It is not flexible. It is flexible.

MADE BY TUHIN |
22

Compiler Interpreter

The localization of errors is difficult. The localization of error is easier than the compiler.

A presence of an error can cause the whole program to be A presence of an error causes only a part of the program to be re-
re-organized. organized.

The compiler is used by the language such as C, C++. An interpreter is used by languages such as Java.

MADE BY TUHIN |

You might also like