Information Technology Software. SYSTEM SOFTWARE.

Slides:



Advertisements
Similar presentations
Chapter 8: Operating Systems and Utility Programs
Advertisements

Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Systems Software System Software Enables the applications software to interact with the computer and Helps the computer manage its internal and external.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer Virus - this is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
What You Will Learn Components of a computer’s system software The importance of an operating system Functions of an operating system Types of user interfaces.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Chapter 8 Operating Systems and Utility Programs.
Unit 6- Operating Systems.  Identify the purpose of an OS  Identify different operating systems  Describe computer user interaction with multiple operating.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
OPERATING SYSTEMS AND SYSTEMS SOFTWARE. SYSTEMS SOFTWARE Systems software consists of the programs that control the operations of the computer and its.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Lesson 4 Computer Software
Video Following is a video of what can happen if you don’t update your security settings! security.
1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.
Chapter Three OPERATING SYSTEMS.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 9 Optimizing and Protecting Hard Drives.
Protecting Your Computer & Your Information
BUSINESS COMPUTER APPLICATION University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Computers Are Your Future Eleventh Edition Chapter 4: System Software Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Chapter 2 – Software Part A. Definition Computer is made up of two components Hardware Physical components Software Instructions for the computer Two.
What is system software and what are its parts? Programs that control operation of computer Two parts are operating systems utility programs.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
SOFTWARE: the power behind the machine By Mrs. Gonzales.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
Trojan Horse ITGD 2202 Assistant Professor Dr. Sana’a Wafa Al-Sayegh Dr. Sana’a Wafa Al-Sayegh supervision Mohammed F. Abu Lamdy.
1 Higher Computing Topic 8: Supporting Software Updated
CSCE 522 Lecture 12 Program Security Malicious Code.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Viruses. A virus is a computer program that operates by piggybacking on other programs. Any time the other program is run, the virus is activated and.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
INFORMATION TECHNOLOGY Grade 9 - Oral Quiz. Question Options
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Technology Competency Computer Infestations Mr. Locke.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
CONTENTS What is Virus ? Types of computer viruses.
Malicious Software.
VIRUS.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Digital Communication Systems Comp Functions of the Operating System.
Understand Malware LESSON Security Fundamentals.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
1 3 Computing System Fundamentals 3.7 Utility Software.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Nat 4/5 Computing Science Software
Managing Windows Security
Discovering Computers 2012: Chapter 8
Introduction to Operating Systems
5 SYSTEM SOFTWARE CHAPTER
Intermediate 2 Computing Unit 1 – Computer Systems
Computer Technology Notes 5
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Computer Viruses.
5 SYSTEM SOFTWARE CHAPTER
What are Computers? C Use this tutorial alongside the numbers coded in your workbook and answer the related questions in each section.
Presentation transcript:

Information Technology Software

SYSTEM SOFTWARE

System Software The system software manages and supports the resources (hardware and application software) and operations of the computer system.

Types of System Software Operating System Operating System Utility Program Utility Program

Operating System The operating system is a set of programs that controls all the hardware and application programs that make up the computer system. Without the operating system the computer cannot function.

Operating System Cont’d At the starting of the computer the operating system is loading from the hard disk to RAM and it remains there until the computer is turned off.

Examples of the Operating System MS-DOS MS-DOS Windows (95, 98, ME, 2000, XP) Windows (95, 98, ME, 2000, XP) Apple Operating System (OS9, OSX) Apple Operating System (OS9, OSX) Linux/Unix Linux/Unix

Functions of the Operating System Resource management Resource management File management File management Task management Task management User Interface User Interface (Home Work – Write a paragraph on each of the functions)

Booting Booting refers to the process of starting (or restarting) the computer, which includes checking that the computer is working properly and loading the operating system from the hard disk to RAM.

Types of Booting Cold Boot Cold Boot - this is starting up the computer after it has been previously powered off (turned off). Warm Boot Warm Boot - this is restarting a computer that is already powered on (turned on).

Utility Programs Utility program is a type of system software that allows the user to perform maintenance type tasks, which will keep your computer running at peak performance. These tasks include: Disk Defragmenter Disk Defragmenter Scan disk software Scan disk software Virus scanning utility Virus scanning utility (Homework – Write a paragraph on each)

Malicious Software

The word Malicious means to destroy. The word Malicious means to destroy. Malicious software are software that are created with the intention to destroy computers. Malicious software are software that are created with the intention to destroy computers.

Categories of Malicious Software Malicious software can be classified into three main categories: Viruses Viruses Worms Worms Trojan horse Trojan horse

Viruses Virus is a self-replicating program containing code that explicitly copies itself and can “infect” other programs by modifying them or their environment. It can spread to multiple computers through storage devices or across network.

Worms A computer Worm is a self-replicating computer program, similar to a computer virus. A virus attaches itself to and become part of another executable program; however, a worm is self-contained and does not need to be part of another program to propagate itself.

Trojan Horse Trojan horse is a computer program which is either hidden inside another program or that masquerades as something it is not in order to trick potential users into running it. For example a program that appears to be a game or image files but in reality performs some other functions.

Trojan Horse cont’d A Trojan horse is similar to a virus, except that it does not replicate itself. It stays in the computer doing its damage or allowing somebody from remote site to take control of the computer.

END OF LESSON 3