Presentation is loading. Please wait.

Presentation is loading. Please wait.

Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.

Similar presentations


Presentation on theme: "Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems."— Presentation transcript:

1 Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

2 Introduction  Computer software determines the tasks a computer can help you get  Software helps you Create documents Block viruses Make your computer’s performance better

3 Software Categories  Computer program: instructions that tell a comp how to carry out at task  These programs software  Software prepares a comp to do a specific task (e.g. photo editing, virus protection, file management, or Web browsing)  Programs are written in a computer language that the computer can understand.  Typical languages might be called C, C++, Java

4 Software Categories Software System Software Operating Systems DOS, Windows, Mac OS, Linux, UNIX Device Drivers, Utilities, Programming Languages Application Software Document production, Spreadsheet Software, Accounting & Finance, Mathematical Modeling, Statistical, Entertainment Data Management, Graphics, Music, Video, Educational, reference

5 Application Software  Also known as an application or app  Examples: Productivity software Groupware: designed to help several people collaborate on a single project using local networks or Internet connections

6 Utility Software  Help monitor and configure settings for comp system equipment, the OS, or the application software  E.g. setup wizards, security software, diagnostic tools  Desktop widgets: desktop widgets include clock, calendars, sticky notes, etc.

7 Device Drivers  Software that helps a peripheral device start communication with a computer  For printers, screens, modems, storage devices, scanners, sound cards etc.

8 Document production software  Word processing software: MO Word  Desktop publishing software  Spreadsheet software: MO Excel  Statistical software  Database Software: MO Access

9 Database Software  Database: collection of data that is stored on one or more computers  Database software helps you enter, find, organize, update and report information in a database.  Record holds data for a single entity  Field holds one item of data relevant to a record

10 Other application software  Graphics Software: Microsoft Paint, Adobe Photoshop  Music Software  Video Editing and DVD authoring  Educational and Reference  Entertainment  Business

11 Buying software  Essential applications OS, browser, word processing, security suite, graphics viewer, drivers, entertainment. Should ONLY have one security software Check system requirements Copyright: form of legal protection that grants the author of an original work an exclusive right to copy, distribute, sell, and modify that work,

12 Software license  Software license: agreement Single-user license limits use to one person at a time Site license allows software to be used on all computers at a specific location Multi-user license: allows allocated number of people to use the software at any time Concurrent-use license allows a specific number of copies to be used at the same time

13 Different software licenses  Public domain software  Proprietary software  Commercial software  Demoware  Shareware  Freeware  Open source software

14 Installing Software and Upgrades  Inside a software package there is an executable file with an.exe file extension, support programs with a.dll file extension, data files and sometimes share some common files with other software. This can be supplied by the OS.

15 .exe.txt.bmp.hlp Processor.dll.ocx Installing Software and Upgrades

16 Software Installation  Software installation: process that places a program into a computer so it can be used (run or executed)  Installation procedures depend on the computer’s operating system and whether the software is a local, Web, or portable application.

17 Local Application  Local Application: software that is designed to stay on a computer’s hard disk.  Most local applications contain a setup program to show you how to install

18 Windows Registry  This is database that keeps track of your computer’s peripheral devices, software, preferences, and settings.  When you install software on the hard disk, information about the software is recorded in Registry.

19 This is a means of protecting software from illegal copying It requires users to enter a product key or activation code Can be activated over the phone or Internet Product activation

20 Portable Software  It is made to run from removable storage such as a CD or USB flash drive  Program files do not exist on the hard disk  E.g. – Thunderbird (e-mail)

21 Web Application (Web app)  Software that is accessed with a Web browser  E.g. – Gmail, Yahoo!, Google Earth

22 Software Updates  Software publishers regularly update their software to add new features, fix bugs, and update its security  Types of software updates include new versions, patches, service packs.

23 Software updates  Software patches: small section of program code that replaces part of the software you currently have installed  Service pack is a set of patches that correct problems and address security vulnerabilities.  They are usually free

24 Uninstalling software  DOS – remove by deleting its files  Windows and Mac OS – uninstall routine which deletes the software’s files from various folders on your computer’s hard disk

25 Security software basics  Security software – protect comps from various forms of destructive software and unauthorized intrusions  Different types – antivirus, anti- spyware, anti-spam, and firewalls

26 Malware software  Any computer program designed to surreptitiously enter a computer, gain unauthorized access to data, or disrupt normal processing operations.  Viruses, worms, Trojans, bots, and spyware

27 Malware software  Created by hackers, crackers, black hats, or cybercriminals  Annoy, disrupt operations, identity theft, or organized crimes

28 Computer virus  Set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files  Viruses DO NOT spread themselves from one computer to another  Signs – displaying annoying messages to corrupting data on the hard disk

29 Computer worm  Self-replicating program designed to carry out some unauthorized activity on a victim’s computer  Can spread themselves from one computer to another without any assistance from victims  Mass-mailing worm spreads by sending itself to every address in the address book of an infected comp

30 Trojan horse (Trojan)  Computer program that seems to perform one function while actually doing something else.  Unlike a worm a Trojan is NOT designed to spread itself to other computers  Not designed to replicate

31 Trojan horse  Keylogger – steal password  Remote Access Trojan – allow remote hackers. Using a victim’s computer as a relay station for breaking into other computers

32 Bot / intelligent agent  Software that can automate a task or autonomously execute a task when commanded to do so  Behaves like a robot so it is often called bot  Good bots – helpful  Bad bots (zombies) – destructive  Botnet – network of bot-infested comps

33 Spyware  Type of program that secretly gathers personal information without the victim’s knowledge, usually for advertising and other commercial purposes

34 What does malware do?  Carry out a variety of unauthorized activities  How do you know if your comp is infected? Irritating messages or sounds Frequent pop-ups Slower response Missing files etc.

35 Rootkit and virus hoax  Rootkit - Software tools used to hide malware and backdoors that have been installed on a victim’s computer.  Virus hoax – warnings about a supposedly new virus on the loose

36 Security Suites  Combines several security modules to protect against the most common types of malware, unauthorized access, and spam.  E.g. – Norton 360

37 Antivirus modules  Type of utility software that looks for and eradicates viruses, Trojan horses, worms, and bots.  How does it work? Software scans for virus signatures in programs, data files, incoming/outgoing emails and attachments, and inbound instant message attachments.

38 Antivirus modules  Antivirus software periodically need to be updated Might need a patch or update to fix bugs or improve features List of virus signatures has to be updated to keep up with the latest malware developments Virus definition – files that store virus signature and other information used to erase malware

39 Antivirus modules  Use Antivirus to scan your computer frequently  Make sure that the virus signature is up to date

40 Summary  Software  Application software  Installing software  The Window Registry  Copyrights  Malware  Antivirus


Download ppt "Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems."

Similar presentations


Ads by Google