0% found this document useful (0 votes)
9 views10 pages

Unit 2 Computer Software

The document provides an overview of computer software, categorizing it into system software, application software, and utility software. It also discusses malicious software, including worms, viruses, and Trojan horses, as well as the role of antivirus programs in preventing and detecting malware. Key techniques used by antivirus software include the Virus Dictionary Approach and the Suspicious Behavior Approach.

Uploaded by

hicolecollege
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views10 pages

Unit 2 Computer Software

The document provides an overview of computer software, categorizing it into system software, application software, and utility software. It also discusses malicious software, including worms, viruses, and Trojan horses, as well as the role of antivirus programs in preventing and detecting malware. Key techniques used by antivirus software include the Virus Dictionary Approach and the Suspicious Behavior Approach.

Uploaded by

hicolecollege
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Unit 2

Computer Software
2.1 Introduction to Software
 Software is a set of programs which is designed to perform
some specific set of operations. It consists of bundle of
programs and data file. Software acts as an interface
between the user and rest of the computer system. E.g. MS
Windows, Ubuntu, Linux, MS Word, MS Excel, MS Power
point etc.

2.2 Types of Software


 Software can be categorized into a three categories. They
are: System Software, Utility Software and Application
Software.
a. System Software: System software is a category of software
that coordinates the complete system hardware and provides an
environment for all the other types of software to work. It is the
most basic type of software in any computer system which is
essential for other programs, applications and whole computer
system to function. E.g. Operating system, device driver,
compilers, database management system etc.
b. Application software: Software that is used to solve specific
user problem is called application software or end-user
programs. They are non-essential software which are installed
and run depending upon requirements in the environment
provided the system software. E.g. MS Word, MS Excel, Adobe
Photoshop, Online Ticket Reservation System etc.
c. Utility Software: Software that supports operations and
management of a computer system is called utility software.
These are computer programs designed to assist user in the
maintenance and care of their computer. E.g. Disk
defragmenters, disk cleaner, antivirus software etc.
2.3 Software Vs Program
Program Software
1. A program is a set of instruction A software is a set of programs
which performs only a specific type which is designed to perform some
of tasks. specific set of operations.
2. A program consists of set of It consists of a bundle of programs
instructions which are coded in a and data files.
programming language like C, C++,
PHP, Java etc.
3. E.g. program to add two E.g. MS Windows, MS Excel,
numbers, program to find odd or Google Chrome, Calculator etc.
even number, program to find given
number palindrome or not.
2.4 Malicious Software
Malicious software are any software that brings harm to a
computer system. These software are used to disrupt computer
operation, gather sensitive information or gain access to private
computer system. Malware can be in the form of Worms,
Viruses, Spyware, Rootkits, Trojan, Ransomware etc. which
can steal protected data, delete documents or add software not
approved by users.
a. Worms: Worm is a malware that consumes system memory
and requires network resources for spreading. It creeps from
computer to computer using network, mail and other
information channels . It has the capability to replicate itself on
the system, so it could send out hundreds or thousands of
copies itself on the network resulting consumption of system
memory or network bandwidth causing web servers, network
servers and individual computers to stop responding. E.g.
Father Christmas
b. Virus: A computer virus is a program that inserts itself into
one or more files and then performs some actions. Virus works
in two phases. In first phase virus inserts itself into a file called
as insertion phase and in second phase it performs some actions
called execution phase. Almost all the viruses are attached to an
executable which means the virus may exist on our computer
but it actually cannot infect computer unless the program is
opened. E.g. The Brain virus.
c. Trojan Horse: Trojan horses are the files that claims to be
something desirable but in fact are malicious code or logic.
Receiver of a Trojan horse are usually tricked into opening
them because they appear to be a legitimate software or files
from a legitimate source. Trojan are known to create a backdoor
giving malicious users access to the system. They do not
reproduce by infecting other files nor do they self- replicate.
When run, it uploads hidden program, commands, scripts or
any number of commands without the users knowledge or
consent.
2.5 Antivirus
Antivirus is a type of software program designed to prevent, detect
and remediate malware infections on individual computing devices
and IT system. They can be installed on individual computing
device, gateway servers or dedicated network appliances. E.g. Avast
Anti-virus, Avira Anti-virus, AVG Anti-virus, Kaspersky Anti-Virus
etc. They use two different technique to combat malware infection,
they are: Virus Dictionary Approach and Suspicious Behavior
Approach.
a.Virus Dictionary Approach: In this approach when the anti-virus
software examines a file, it refers to a dictionary of known virus
that have been identified by the author of the anti-virus software. If
a piece of code in the file matches any virus identified in the
dictionary, then anti-virus software can either
delete, quarantine or repair the file.
b. Suspicious Behavior Approach: In this approach, the anti-
virus program monitors the behavior of all programs and if any
of the program tries to write data on an executable program
then it is flagged as suspicious behavior. This approach
provides protection against brand-new viruses that do not exists
in any virus dictionaries and could generate large number of
false positive warnings.

You might also like