SlideShare une entreprise Scribd logo
1  sur  53
Chapter-3Chapter-3
Software Concepts
COMPUTER’S KEY INGREDIENTSCOMPUTER’S KEY INGREDIENTS
BASIC COMPUTER PARTSBASIC COMPUTER PARTS
COMPUTER’S KEY INGREDIENTSCOMPUTER’S KEY INGREDIENTS
SOFTWARE- Set of programs. Can be
stored in storage devices eg. Photoshop
etc.
HARDWARE- physical components
eg. monitor, mouse, motherboard etc.
FIRMWARE-software that are
permanently stored in an electronic
device eg. ROM
LIVEWARE- people who use the
computer eg. users, programmers, coders
SOFTWARE-A BRIEF HISTORYSOFTWARE-A BRIEF HISTORY
SOFTWARE-A BRIEF HISTORYSOFTWARE-A BRIEF HISTORY
LOW LEVEL LANGUAGES (LLL’s)
Machine language
◦ Made up of 0s and 1s (binary code)
◦ Difficult to understand
◦ Difficult to code
◦ Deals with absolute memory addresses
Assembly language (early 1950’s)
◦ Uses mnemonic/symbolic codes
◦ Uses assembler for conversion to binary code
◦ Machine dependent(1:1 correspondence b/w
assembly & machine instructions)
◦ Deals with symbolic memory addresses
HIGH LEVEL LANGUAGES(HLL’s)
o Similar to english
o Easy to code
o Machine independent
o Translator program-compiler used for
conversion to binary code
o Eg. COBOL, FORTRAN, PASCAL
SOFTWARE-A BRIEF HISTORYSOFTWARE-A BRIEF HISTORY
COMPUTER ARCHITECTURECOMPUTER ARCHITECTURE
TYPES OF SOFTWARETYPES OF SOFTWARE
SYSTEM SOFTWARESYSTEM SOFTWARE
APPLICATION SOFTWAREAPPLICATION SOFTWARE
UTILITY SOFTWAREUTILITY SOFTWARE
OTHER SYSTEM SOFTWAREOTHER SYSTEM SOFTWARE
ASSEMBLER
◦ Assembler converts assembly language into
binary language
ASSEMBLY LANGUAGEASSEMBLY LANGUAGE
◦ An assembly language program contains a
symbolic operation code and a symbolic
address:
OP-CODE OPERAND
LOAD A (load A into the accumulator)
SUB L (subtract L from the accumulator)
STORE B (store the contents of accumulator to B)
◦ It uses symbolic memory addresses
◦ It is machine dependent-does not run on
different machines.
OTHER SYSTEM SOFTWAREOTHER SYSTEM SOFTWARE
COMPILER
◦ Compiler converts high level language into
binary language
◦ Converts source code(written in HLL) to
object code(computer’s language)
◦ Checks the whole code at once, not line wise
◦ Eg. Turbo C++ compiler
TRANSLATION PROCESSTRANSLATION PROCESS
POINTS TO REMEMBERPOINTS TO REMEMBER
Linker links the object code to create
machine executable program
Source program and executable program
are same
Source program doesn’t run in a
computer but the translated executable
program runs
OTHER SYSTEM SOFTWAREOTHER SYSTEM SOFTWARE
INTERPRETER
◦ Provides program execution
environment
◦ Interpreter interprets the
source code and executes it.
◦ Interprets the code line wise
◦ Examined code is decoded
◦ Executed through equivalent
sequence of machine code
◦ Eg. GW Basic interpreter
COMPILER VS INTERPRETERCOMPILER VS INTERPRETER
COMPILER OPERATION INTERPRETER OPERATION
OTHER SYSTEM SOFTWAREOTHER SYSTEM SOFTWARE
LOADERS & LINKERS
◦ System software that combines different program
modules or functions into machine language program
is LINKER
◦ System software that moves the executable code
from magnetic storage to the main memory is
LOADER
Loader
LINKER OPERATION
UTILITY SOFTWAREUTILITY SOFTWARE
ANTI VIRUS
◦ Identifies and removes the virus
HOW VIRUS WORKS??? LET’SHOW VIRUS WORKS??? LET’S
TAKE A LOOK…TAKE A LOOK…
BOOT SECTOR VIRUSBOOT SECTOR VIRUS
BOOT SECTOR VIRUSBOOT SECTOR VIRUS
◦ Displaces boot record and copies itself on the
boot sector
◦ Cannot be overwritten by any other program
◦ During booting the copy of virus is loaded in
the main memory
◦ Virus passes control to the boot record, thus
infecting the OS
◦ Any new disk inserted also gets infected in
the same way and it goes on…
WORKING OF ANTI VIRUSWORKING OF ANTI VIRUS
◦ Reads boot sector and refers to its virus
directory
◦ Virus is detected if during search, any
definition matches its directory
◦ Overwrites the correct boot record over the
infected one
◦ Marks bad sector as clean
◦ Keeps an eye on all activities
◦ Scans any peripheral attached
FILE VIRUSFILE VIRUS
◦ Attacks executable files
◦ Every executable file has a data part and an
instruction part
X X X X
◦ The first instruction makes the control jump
on the specified address ie address of the
start of instruction part of the program
◦ Data part of the exe file is not entered into
FILE VIRUSFILE VIRUS
◦ File virus attaches itself at the end of the exe file eg at
address YYYY
◦ Modifies jump instruction from XXXX to YYYY
◦ YYYY is the address of virus, where control will jump
◦ Now virus will be activated in main memory
◦ The last statement of virus JUMP XXXX will be
inserted and program starts executing
X X X X
Y Y Y Y
WORKING OF ANTI VIRUSWORKING OF ANTI VIRUS
◦ Reads the first instruction ie jump YYYY and
refers to its virus directory
◦ If virus is detected then it does one of the
following:-
 Repairs the file-removes virus code after address
YYYY
 Isolates the file –no one can access it
 Deletes the file
WORKING OF ANTI VIRUSWORKING OF ANTI VIRUS
o Finally it takes the actual address XXXX of the
start of the executable program
o First statement jumps to address XXXX
X X X X
Y Y Y Y
1
3
2
Infected file Virus code removed and first statement modified
OTHER IMPORTANT VIRUSES…OTHER IMPORTANT VIRUSES…
OTHER IMPORTANT VIRUSES…OTHER IMPORTANT VIRUSES…
MACRO VIRUS
◦ MS-Office and Open Office deals with macros
◦ Macros help automating tasks
◦ Macro virus infects the normal.dot file of MS-
Word. This file stores the default settings
such as font, font size, file content etc.
◦ Damages the formatting
◦ Doesn’t allow editing of the document
◦ Sometimes doesn’t allow saving the file
OTHER IMPORTANT VIRUSES…OTHER IMPORTANT VIRUSES…
E-MAIL VIRUS
◦ Infects the e-mail system by attaching itself as
a message
◦ Picks up addresses and sends fabricated
messages
◦ This way it keeps replicating
OTHER IMPORTANT VIRUSES…OTHER IMPORTANT VIRUSES…
TROJAN HORSE
◦ Got its name from the famous story of
Greeks attacking the city of Troy
◦ Generally comes along with games
◦ When the games is run, it becomes activated
OTHER IMPORTANT VIRUSES…OTHER IMPORTANT VIRUSES…
WORM
◦ Keeps on replicating itself on the network
◦ Looks for security holes on the machines
attached to the network
WORKING OF ANTI VIRUSWORKING OF ANTI VIRUS
◦ Acts like a security guard and checks for any
suspicious activity
◦ Flags the suspicious program
◦ Scans the computer
◦ Identifies and repairs the infected files
DISK MANAGEMENT TOOLSDISK MANAGEMENT TOOLS
DISK MANAGEMENT TOOLSDISK MANAGEMENT TOOLS
DISK DEFRAGMENTER
◦ Due to lack of continuous memory space on
the disk, files are stored in fragments
◦ Some fragments get spilled over to other
cylinders
◦ File access becomes slow-as movement of
cylinder head from one cylinder to another is
a slow task
◦ Disk defragmenter brings all the fragments
together
DISK DEFRAGMENTATION…..DISK DEFRAGMENTATION…..
DISK MANAGEMENT TOOLSDISK MANAGEMENT TOOLS
DISK CLEANER
◦ Checks for the inactive files on the disk
◦ Prompts the user if these files have occupied
large space
◦ User may delete or take back up of these files
DISK CLEANER…..DISK CLEANER…..
DISK MANAGEMENT TOOLSDISK MANAGEMENT TOOLS
BACKUP
◦ Copies the important data from hard disk /
CD / any storage device
◦ Stores it on another disk- called backup disk
◦ In case of system disk failure/accidental loss,
backup file can be restored using backup
facility
BACKUP PROCESS…..BACKUP PROCESS…..
BACKUP SOFTWARE FOR OUTLOOK
FILE MANAGEMENT TOOLSFILE MANAGEMENT TOOLS
o SOME TOOLS AT GLANCE…..
◦ Windows explorer
◦ Google desktop
◦ VCOM power disk pro
◦ Free commander
FILE MANAGEMENT TOOLSFILE MANAGEMENT TOOLS
o FUNCTIONS PERFORMED BY THESE
TOOLS…..
◦ Storage
◦ Indexing
◦ Searching
◦ Sorting
APPLICATION SOFTWAREAPPLICATION SOFTWARE
WORD PROCESSOR
◦ Documentation software to create
presentable documents
◦ WYSIWYG type- What you see is what you
get
◦ Features like auto error correction, spell
check, grammar check etc.
WORD PROCESSOR VENDOR
WINDOWS BASED
• MS-WORD XP
• MS WORD 2007
• WORD PERFECT
• AMI PRO
• OPEN OFFICE-WRITER
MICROSOFT
MICROSOFT
WORD PERFECT CORP.
LOTUS DEVELOPMENT
SUN MICROSYSTEMS
LINUX / UNIX BASED
• Vi EDITOR PART OF THE OPERATING
SYSTEM
APPLE MACINTOSH BASED
• MAC WRITE
• WORD
• WRITE NOW
• WORD PERFECT
• OPEN OFFICE- WRITER
CLARIS SOFTWARE
MICROSOFT
T/MAKER
WORD PERFECT CORP
SUN MICROSYSTEMS
SCREEN SHOT- WORD 2007SCREEN SHOT- WORD 2007
SCREEN SHOT- OPENOFFICESCREEN SHOT- OPENOFFICE
WRITERWRITER
APPLICATION SOFTWAREAPPLICATION SOFTWARE
SPREADSHEET PACKAGE
◦ Also known as ESS (Electronic Spreadsheet
Software) program
◦ Matrix sheet made up of rows and columns
◦ Intersection of a row and column is a cell
◦ Each cell is identified by its cell address
◦ Visi Calc was the first spreadsheet package
followed by Lotus 1-2-3, MS Excel
SPREADSHEET MANUFACTURER COMPATIBLE
PLATFORM
1-2-3 LOTUS DEVELOPMENT • Apple Macintosh
• IBM microcomputers
EXCEL MICROSOFT • Apple Macintosh
• IBM microcomputers
IMPROV LOTUS DEVELOPMENT • IBM-compatible
QUATTRO PRO BORLAND • IBM-compatible
SCREEN SHOT- EXCEL 2007SCREEN SHOT- EXCEL 2007
SCREEN SHOT- OPENOFFICESCREEN SHOT- OPENOFFICE
CALCCALC
APPLICATION SOFTWAREAPPLICATION SOFTWARE
BUSINESS SOFTWARE
◦ Used in commercial organizations
◦ Some popular business software are:
 Inventory management system
 Payroll system
 Financial accounting

Contenu connexe

Tendances (20)

Configuring Devices in Windows
Configuring Devices in WindowsConfiguring Devices in Windows
Configuring Devices in Windows
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
 
Ch02
Ch02Ch02
Ch02
 
Operating system mod
Operating system modOperating system mod
Operating system mod
 
Linux forensics
Linux forensicsLinux forensics
Linux forensics
 
Linux vs windows
Linux vs windowsLinux vs windows
Linux vs windows
 
Operating System
Operating SystemOperating System
Operating System
 
Computer Operating System
Computer Operating SystemComputer Operating System
Computer Operating System
 
Os
OsOs
Os
 
Chapter 8 Operating Systems And Utility Programs
Chapter 8 Operating Systems And Utility ProgramsChapter 8 Operating Systems And Utility Programs
Chapter 8 Operating Systems And Utility Programs
 
Presentation windows operating system
Presentation  windows operating systemPresentation  windows operating system
Presentation windows operating system
 
Computer software
Computer softwareComputer software
Computer software
 
KeyLoggers - beating the shit out of keyboard since quite a long time
KeyLoggers - beating the shit out of keyboard since quite a long timeKeyLoggers - beating the shit out of keyboard since quite a long time
KeyLoggers - beating the shit out of keyboard since quite a long time
 
operating system
operating systemoperating system
operating system
 
Operating system windows XP
Operating system windows XPOperating system windows XP
Operating system windows XP
 
What is Google Chrome?
What is Google Chrome?What is Google Chrome?
What is Google Chrome?
 
Future operating system
Future operating systemFuture operating system
Future operating system
 
Topic 6
Topic 6Topic 6
Topic 6
 
System software
System softwareSystem software
System software
 
Embedded Systems: Lecture 5: A Tour in RTOS Land
Embedded Systems: Lecture 5: A Tour in RTOS LandEmbedded Systems: Lecture 5: A Tour in RTOS Land
Embedded Systems: Lecture 5: A Tour in RTOS Land
 

En vedette

computer software concepts
computer software conceptscomputer software concepts
computer software conceptsclarice03
 
Software Concepts
Software ConceptsSoftware Concepts
Software Conceptsrejina128
 
computer software
computer softwarecomputer software
computer softwareRiya Gupta
 
Software engineering 101 - The basics you should hear about at least once
Software engineering 101 - The basics you should hear about at least onceSoftware engineering 101 - The basics you should hear about at least once
Software engineering 101 - The basics you should hear about at least onceAlexey (Mr_Mig) Migutsky
 

En vedette (6)

computer software concepts
computer software conceptscomputer software concepts
computer software concepts
 
Software
SoftwareSoftware
Software
 
Software
SoftwareSoftware
Software
 
Software Concepts
Software ConceptsSoftware Concepts
Software Concepts
 
computer software
computer softwarecomputer software
computer software
 
Software engineering 101 - The basics you should hear about at least once
Software engineering 101 - The basics you should hear about at least onceSoftware engineering 101 - The basics you should hear about at least once
Software engineering 101 - The basics you should hear about at least once
 

Similaire à Chapter 3

Computer system software
Computer system softwareComputer system software
Computer system softwareMozaSaid
 
A presentation on system software
A presentation on system software A presentation on system software
A presentation on system software Ankit Sangwan
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Sehrish Rafiq
 
Computer software and operating system
Computer software and operating systemComputer software and operating system
Computer software and operating systemsonykhan3
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Virusesjenniel143
 
Bn0202 operatingsystemsfeaturesandfunctions
Bn0202 operatingsystemsfeaturesandfunctionsBn0202 operatingsystemsfeaturesandfunctions
Bn0202 operatingsystemsfeaturesandfunctionsPanzer944
 
Computer assignment on virus and memory and printer
Computer assignment on virus and memory and printerComputer assignment on virus and memory and printer
Computer assignment on virus and memory and printerShamzayAli
 
Introduction to Computer Softwares
Introduction to Computer SoftwaresIntroduction to Computer Softwares
Introduction to Computer SoftwaresNaresh Dubey
 
Vskills c developer sample material
Vskills c developer sample materialVskills c developer sample material
Vskills c developer sample materialVskills
 
Neethu Narayanan- Operating System
 Neethu Narayanan- Operating System Neethu Narayanan- Operating System
Neethu Narayanan- Operating System19940213
 
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)SURBHI SAROHA
 
categories of computer software
categories of computer softwarecategories of computer software
categories of computer softwareManidhar Chowdary
 

Similaire à Chapter 3 (20)

Computer system software
Computer system softwareComputer system software
Computer system software
 
ICT Skills.pdf
ICT Skills.pdfICT Skills.pdf
ICT Skills.pdf
 
A presentation on system software
A presentation on system software A presentation on system software
A presentation on system software
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11
 
System Software
System SoftwareSystem Software
System Software
 
Computer software and operating system
Computer software and operating systemComputer software and operating system
Computer software and operating system
 
Software introduction
Software introductionSoftware introduction
Software introduction
 
what is Operating system
what is Operating systemwhat is Operating system
what is Operating system
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
 
Software.pptx
Software.pptxSoftware.pptx
Software.pptx
 
Bn0202 operatingsystemsfeaturesandfunctions
Bn0202 operatingsystemsfeaturesandfunctionsBn0202 operatingsystemsfeaturesandfunctions
Bn0202 operatingsystemsfeaturesandfunctions
 
Computer Software
Computer SoftwareComputer Software
Computer Software
 
Computer assignment on virus and memory and printer
Computer assignment on virus and memory and printerComputer assignment on virus and memory and printer
Computer assignment on virus and memory and printer
 
Introduction to Computer Softwares
Introduction to Computer SoftwaresIntroduction to Computer Softwares
Introduction to Computer Softwares
 
Operating system
Operating systemOperating system
Operating system
 
Vskills c developer sample material
Vskills c developer sample materialVskills c developer sample material
Vskills c developer sample material
 
Neethu Narayanan- Operating System
 Neethu Narayanan- Operating System Neethu Narayanan- Operating System
Neethu Narayanan- Operating System
 
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)
 
categories of computer software
categories of computer softwarecategories of computer software
categories of computer software
 
Introduction to software
Introduction to softwareIntroduction to software
Introduction to software
 

Dernier

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Dernier (20)

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

Chapter 3

  • 3. BASIC COMPUTER PARTSBASIC COMPUTER PARTS
  • 4. COMPUTER’S KEY INGREDIENTSCOMPUTER’S KEY INGREDIENTS SOFTWARE- Set of programs. Can be stored in storage devices eg. Photoshop etc. HARDWARE- physical components eg. monitor, mouse, motherboard etc. FIRMWARE-software that are permanently stored in an electronic device eg. ROM LIVEWARE- people who use the computer eg. users, programmers, coders
  • 6. SOFTWARE-A BRIEF HISTORYSOFTWARE-A BRIEF HISTORY LOW LEVEL LANGUAGES (LLL’s) Machine language ◦ Made up of 0s and 1s (binary code) ◦ Difficult to understand ◦ Difficult to code ◦ Deals with absolute memory addresses Assembly language (early 1950’s) ◦ Uses mnemonic/symbolic codes ◦ Uses assembler for conversion to binary code ◦ Machine dependent(1:1 correspondence b/w assembly & machine instructions) ◦ Deals with symbolic memory addresses
  • 7. HIGH LEVEL LANGUAGES(HLL’s) o Similar to english o Easy to code o Machine independent o Translator program-compiler used for conversion to binary code o Eg. COBOL, FORTRAN, PASCAL SOFTWARE-A BRIEF HISTORYSOFTWARE-A BRIEF HISTORY
  • 13. OTHER SYSTEM SOFTWAREOTHER SYSTEM SOFTWARE ASSEMBLER ◦ Assembler converts assembly language into binary language
  • 14. ASSEMBLY LANGUAGEASSEMBLY LANGUAGE ◦ An assembly language program contains a symbolic operation code and a symbolic address: OP-CODE OPERAND LOAD A (load A into the accumulator) SUB L (subtract L from the accumulator) STORE B (store the contents of accumulator to B) ◦ It uses symbolic memory addresses ◦ It is machine dependent-does not run on different machines.
  • 15. OTHER SYSTEM SOFTWAREOTHER SYSTEM SOFTWARE COMPILER ◦ Compiler converts high level language into binary language ◦ Converts source code(written in HLL) to object code(computer’s language) ◦ Checks the whole code at once, not line wise ◦ Eg. Turbo C++ compiler
  • 17. POINTS TO REMEMBERPOINTS TO REMEMBER Linker links the object code to create machine executable program Source program and executable program are same Source program doesn’t run in a computer but the translated executable program runs
  • 18. OTHER SYSTEM SOFTWAREOTHER SYSTEM SOFTWARE INTERPRETER ◦ Provides program execution environment ◦ Interpreter interprets the source code and executes it. ◦ Interprets the code line wise ◦ Examined code is decoded ◦ Executed through equivalent sequence of machine code ◦ Eg. GW Basic interpreter
  • 19. COMPILER VS INTERPRETERCOMPILER VS INTERPRETER COMPILER OPERATION INTERPRETER OPERATION
  • 20. OTHER SYSTEM SOFTWAREOTHER SYSTEM SOFTWARE LOADERS & LINKERS ◦ System software that combines different program modules or functions into machine language program is LINKER ◦ System software that moves the executable code from magnetic storage to the main memory is LOADER Loader LINKER OPERATION
  • 21. UTILITY SOFTWAREUTILITY SOFTWARE ANTI VIRUS ◦ Identifies and removes the virus
  • 22. HOW VIRUS WORKS??? LET’SHOW VIRUS WORKS??? LET’S TAKE A LOOK…TAKE A LOOK…
  • 23. BOOT SECTOR VIRUSBOOT SECTOR VIRUS
  • 24. BOOT SECTOR VIRUSBOOT SECTOR VIRUS ◦ Displaces boot record and copies itself on the boot sector ◦ Cannot be overwritten by any other program ◦ During booting the copy of virus is loaded in the main memory ◦ Virus passes control to the boot record, thus infecting the OS ◦ Any new disk inserted also gets infected in the same way and it goes on…
  • 25. WORKING OF ANTI VIRUSWORKING OF ANTI VIRUS ◦ Reads boot sector and refers to its virus directory ◦ Virus is detected if during search, any definition matches its directory ◦ Overwrites the correct boot record over the infected one ◦ Marks bad sector as clean ◦ Keeps an eye on all activities ◦ Scans any peripheral attached
  • 26. FILE VIRUSFILE VIRUS ◦ Attacks executable files ◦ Every executable file has a data part and an instruction part X X X X ◦ The first instruction makes the control jump on the specified address ie address of the start of instruction part of the program ◦ Data part of the exe file is not entered into
  • 27. FILE VIRUSFILE VIRUS ◦ File virus attaches itself at the end of the exe file eg at address YYYY ◦ Modifies jump instruction from XXXX to YYYY ◦ YYYY is the address of virus, where control will jump ◦ Now virus will be activated in main memory ◦ The last statement of virus JUMP XXXX will be inserted and program starts executing X X X X Y Y Y Y
  • 28. WORKING OF ANTI VIRUSWORKING OF ANTI VIRUS ◦ Reads the first instruction ie jump YYYY and refers to its virus directory ◦ If virus is detected then it does one of the following:-  Repairs the file-removes virus code after address YYYY  Isolates the file –no one can access it  Deletes the file
  • 29. WORKING OF ANTI VIRUSWORKING OF ANTI VIRUS o Finally it takes the actual address XXXX of the start of the executable program o First statement jumps to address XXXX X X X X Y Y Y Y 1 3 2 Infected file Virus code removed and first statement modified
  • 30. OTHER IMPORTANT VIRUSES…OTHER IMPORTANT VIRUSES…
  • 31. OTHER IMPORTANT VIRUSES…OTHER IMPORTANT VIRUSES… MACRO VIRUS ◦ MS-Office and Open Office deals with macros ◦ Macros help automating tasks ◦ Macro virus infects the normal.dot file of MS- Word. This file stores the default settings such as font, font size, file content etc. ◦ Damages the formatting ◦ Doesn’t allow editing of the document ◦ Sometimes doesn’t allow saving the file
  • 32. OTHER IMPORTANT VIRUSES…OTHER IMPORTANT VIRUSES… E-MAIL VIRUS ◦ Infects the e-mail system by attaching itself as a message ◦ Picks up addresses and sends fabricated messages ◦ This way it keeps replicating
  • 33. OTHER IMPORTANT VIRUSES…OTHER IMPORTANT VIRUSES… TROJAN HORSE ◦ Got its name from the famous story of Greeks attacking the city of Troy ◦ Generally comes along with games ◦ When the games is run, it becomes activated
  • 34. OTHER IMPORTANT VIRUSES…OTHER IMPORTANT VIRUSES… WORM ◦ Keeps on replicating itself on the network ◦ Looks for security holes on the machines attached to the network
  • 35. WORKING OF ANTI VIRUSWORKING OF ANTI VIRUS ◦ Acts like a security guard and checks for any suspicious activity ◦ Flags the suspicious program ◦ Scans the computer ◦ Identifies and repairs the infected files
  • 36. DISK MANAGEMENT TOOLSDISK MANAGEMENT TOOLS
  • 37. DISK MANAGEMENT TOOLSDISK MANAGEMENT TOOLS DISK DEFRAGMENTER ◦ Due to lack of continuous memory space on the disk, files are stored in fragments ◦ Some fragments get spilled over to other cylinders ◦ File access becomes slow-as movement of cylinder head from one cylinder to another is a slow task ◦ Disk defragmenter brings all the fragments together
  • 39. DISK MANAGEMENT TOOLSDISK MANAGEMENT TOOLS DISK CLEANER ◦ Checks for the inactive files on the disk ◦ Prompts the user if these files have occupied large space ◦ User may delete or take back up of these files
  • 41. DISK MANAGEMENT TOOLSDISK MANAGEMENT TOOLS BACKUP ◦ Copies the important data from hard disk / CD / any storage device ◦ Stores it on another disk- called backup disk ◦ In case of system disk failure/accidental loss, backup file can be restored using backup facility
  • 43. FILE MANAGEMENT TOOLSFILE MANAGEMENT TOOLS o SOME TOOLS AT GLANCE….. ◦ Windows explorer ◦ Google desktop ◦ VCOM power disk pro ◦ Free commander
  • 44. FILE MANAGEMENT TOOLSFILE MANAGEMENT TOOLS o FUNCTIONS PERFORMED BY THESE TOOLS….. ◦ Storage ◦ Indexing ◦ Searching ◦ Sorting
  • 45. APPLICATION SOFTWAREAPPLICATION SOFTWARE WORD PROCESSOR ◦ Documentation software to create presentable documents ◦ WYSIWYG type- What you see is what you get ◦ Features like auto error correction, spell check, grammar check etc.
  • 46. WORD PROCESSOR VENDOR WINDOWS BASED • MS-WORD XP • MS WORD 2007 • WORD PERFECT • AMI PRO • OPEN OFFICE-WRITER MICROSOFT MICROSOFT WORD PERFECT CORP. LOTUS DEVELOPMENT SUN MICROSYSTEMS LINUX / UNIX BASED • Vi EDITOR PART OF THE OPERATING SYSTEM APPLE MACINTOSH BASED • MAC WRITE • WORD • WRITE NOW • WORD PERFECT • OPEN OFFICE- WRITER CLARIS SOFTWARE MICROSOFT T/MAKER WORD PERFECT CORP SUN MICROSYSTEMS
  • 47. SCREEN SHOT- WORD 2007SCREEN SHOT- WORD 2007
  • 48. SCREEN SHOT- OPENOFFICESCREEN SHOT- OPENOFFICE WRITERWRITER
  • 49. APPLICATION SOFTWAREAPPLICATION SOFTWARE SPREADSHEET PACKAGE ◦ Also known as ESS (Electronic Spreadsheet Software) program ◦ Matrix sheet made up of rows and columns ◦ Intersection of a row and column is a cell ◦ Each cell is identified by its cell address ◦ Visi Calc was the first spreadsheet package followed by Lotus 1-2-3, MS Excel
  • 50. SPREADSHEET MANUFACTURER COMPATIBLE PLATFORM 1-2-3 LOTUS DEVELOPMENT • Apple Macintosh • IBM microcomputers EXCEL MICROSOFT • Apple Macintosh • IBM microcomputers IMPROV LOTUS DEVELOPMENT • IBM-compatible QUATTRO PRO BORLAND • IBM-compatible
  • 51. SCREEN SHOT- EXCEL 2007SCREEN SHOT- EXCEL 2007
  • 52. SCREEN SHOT- OPENOFFICESCREEN SHOT- OPENOFFICE CALCCALC
  • 53. APPLICATION SOFTWAREAPPLICATION SOFTWARE BUSINESS SOFTWARE ◦ Used in commercial organizations ◦ Some popular business software are:  Inventory management system  Payroll system  Financial accounting

Notes de l'éditeur

  1. peripheral
  2. peripheral
  3. peripheral
  4. peripheral