Introduction to Information and Communication Technologies

Slides:



Advertisements
Similar presentations
Computer Basics 2.
Advertisements

SOFTWARE Chapter 5.
1 Copyright © 2005, Oracle. All rights reserved. Introducing the Java and Oracle Platforms.
COMPUTERS: TOOLS FOR AN INFORMATION AGE Chapter 3 Operating Systems.
How Much Do I Remember? Are you ready to play.....
So far Binary numbers Logic gates Digital circuits process data using gates – Half and full adder Data storage – Electronic memory – Magnetic memory –
Computers Are Your Future Twelfth Edition Chapter 4: System Software Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Chapter 11: The X Window System Guide To UNIX Using Linux Third Edition.
Systems Software System Software Enables the applications software to interact with the computer and Helps the computer manage its internal and external.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Introduction to Computer Administration Introduction.
Lesson 4 0x Operating Systems.
 Prof. Dr. M. H. Assal Introduction to Computer AS 26/10/2014.
 Computer hardware components are the physical pieces of the computer.  The major hardware components of a computer are: – The central processing.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
1 DOS with Windows 3.1 and 3.11 Operating Environments n Designed to allow applications to have a graphical interface DOS runs in the background as the.
Computer Skills Preparatory Year Presented by: L.Obead Alhadreti.
Course: Introduction to Computers
Computer Software.
Types of software. Sonam Dema..
COMPUTER SOFTWARE Chapter 3. Software & Hardware? Computer Instructions or data, anything that can be stored electronically is Software. Hardware is one.
SOFTWARE.
Learning Outcomes At the end of this lesson, students should be able to: State the types of system software – Operating system – Utility system Describe.
Week 6 Operating Systems.
Lesson 4 Computer Software
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.
Operating Systems What do you have left on your computer after you strip away all of the games and application programs you bought and installed? Name.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Computing Fundamentals Module A Unit 2: Using Windows Vista LessonTopic 8Looking at Operating Systems 9Looking at the Windows Desktop 10Starting Application.
SOFTWARE.
Types of Software When a computer is first turned on (or "booted up"), it responds to its BIOS (Basic Input / Output System), located on a ROM (Read Only.
COMPUTER SOFTWARE Section 2 “System Software: Computer System Management ” CHAPTER 4 Lecture-6/ T. Nouf Almujally 1.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Computer basics Lesson 4 – Programs & S.O..
CSE 101 Spring 2000 Operating Systems. The Tasks of the Operating System Single Task Multitasking.
Introduction to Interactive Media Interactive Media Tools: Software.
Software.
Software Writer:-Rashedul Hasan Editor:- Jasim Uddin.
Lecture 2 Title: Computer Software By: Mr Hashem Alaidaros MIS 101.
Software Software consists of the instructions issued to the computer to perform specific tasks. –The software on a computer system refers to the programs.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Your Interactive Guide to the Digital World Discovering Computers 2012.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Topic 5: Basic Security.
Two Types of Software.
Malicious Software.
VIRUS.
Computer Software Operating Systems – Programs. Computer Language - Review We learnt that computers are made up of millions of tiny switches that can.
Software Rashedul Hasan. Software Instructions and associated data, stored in electronic format, that direct the computer to accomplish a task. Instructions.
Chapter 2 – Part 1 Introduction To Windows Operating Systems CMPF 112 : COMPUTING SKILLS.
Chapter 4 Software. Introduction Program: is a set of sequence instructions that tell the computer what to do. Software: is a collection of programs,
Computer software: There are at least six step developmental procedures the programmer: Define problem Make or buy decision Design program Code program.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
Nature & Types of Software
Discovering Computers 2012: Chapter 8
Contents Todays Topic: Introduction to Computer Software We will learn
Chapter 4 The Power behind the Power
5 SYSTEM SOFTWARE CHAPTER
Chap 10 Malicious Software.
5 SYSTEM SOFTWARE CHAPTER
5 SYSTEM SOFTWARE CHAPTER
Chapter 4 The Power behind the Power
Chap 10 Malicious Software.
Chapter-1 Computer is an advanced electronic device that takes raw data as an input from the user and processes it under the control of a set of instructions.
Presentation transcript:

Introduction to Information and Communication Technologies Lesson 4. What are the software components of computers? To the trainer: Use the software to demonstrate how it works. Refer them to the CD-ROM on ”ICT for Librarians and Other Information Professionals.” UNESCO ICTLIP Module 1. Lesson 4.

UNESCO ICTLIP Module 1. Lesson 4. Rationale A computer system is generally composed of hardware and software. Hardware make up the physical components. Software make up the set of instructions for the computer. Without software, the computer will not be able to perform the tasks that you would like it to do. UNESCO ICTLIP Module 1. Lesson 4.

UNESCO ICTLIP Module 1. Lesson 4. Scope What is software? What are the two kinds of software? What is programming? What are viruses and how do you deal with them? How do computers respond to different character sets? What are some general trends in software development? UNESCO ICTLIP Module 1. Lesson 4.

UNESCO ICTLIP Module 1. Lesson 4. Learning outcomes By the end of this lesson, you should be able to: Define the function of software in a computer system Distinguish between an operating system and an application system List different types of operating systems and application software Define what are programming languages Identify and avoid computer viruses Compare different character sets Be aware of general trends in software development UNESCO ICTLIP Module 1. Lesson 4.

What are the types of software? There are two sets of instructions that a computer must follow: General instructions: Systems software or operating system such as DOS, Windows Unix, and Mac OS Specific instructions: Application software such as those used for word processing, spreadsheets, or library management To the trainer: Open Windows and show the icons. Demonstrate how they are used. Show how to go to DOS. Demonstrate how DOS is used to emphasize the difference between the two. Demonstrate the word processing software. UNESCO ICTLIP Module 1. Lesson 4. 9

UNESCO ICTLIP Module 1. Lesson 4. Operating system An organized collection of system programs which serve as the interface between the user or application and the computer. It manages the hardware resources: CPU management to facilitate sharing execution time of processes Memory management to allocate memory resources dynamically I/O management to handle reading and writing devices UNESCO ICTLIP Module 1. Lesson 4.

Disk Operating Systems (DOS) Disk Operating System (DOS) is a generic term describing any operating system that is loaded from disk devices when the system is started or rebooted. It is not a user friendly OS since users need to memorize commands and issue it by typing line by line. This known as command line interface. Very few end users use DOS nowadays. UNESCO ICTLIP Module 1. Lesson 4. 10

UNESCO ICTLIP Module 1. Lesson 4. Microsoft Windows A graphical user interface (GUI) originally running on DOS (Windows 3.x) that allows multitasking or the ability to run several programs at the same time. Windows 95 / Windows NT that no longer runs on DOS About 75% of the world’s PCs use the Windows operating system. The present versions in use are Windows 98, Windows Me and Windows 2000. UNESCO ICTLIP Module 1. Lesson 4.

Other operating systems IBM OS/2 Macintosh OS SCO Unix Linux Other Proprietary OS UNESCO ICTLIP Module 1. Lesson 4.

Applications software A set of instructions designed to perform a specific task such as word processing, accounting, cataloguing, library management, animation, etc. UNESCO ICTLIP Module 1. Lesson 4.

Types of applications software The nature of the software depends on the application General purpose office software Business management software Special discipline software Other applications To the trainer: Mention the different types of application software again for emphasis. UNESCO ICTLIP Module 1. Lesson 4.

General purpose office software Word processing: Example, MS Word Spreadsheets: Example, Excel Database management systems: Example, MS Access, Oracle Presentation/Graphics: Example, Power Point, Corel UNESCO ICTLIP Module 1. Lesson 4. 11

What is a software suite? A set of software with word processing, spreadsheet, database management and presentation software like MS Office is called a software suite. To the trainer: Show the MS Office suite UNESCO ICTLIP Module 1. Lesson 4.

What are special purpose software? Desktop publishing software: Example, Microsoft Publisher Imaging and drawing: Example, Corel Draw, Photo Shop File management: Example: CDS/ISIS, INMAGIC Library management software: Example: Athena, GLAS, Innopac, Library Solutions To the trainer: Point to sites on the Internet which have descriptions of the software. UNESCO ICTLIP Module 1. Lesson 4.

UNESCO ICTLIP Module 1. Lesson 4. Library Software Single function: Performs only one library operation such as cataloging and OPAC Integrated:Can perform all or many operations using data from a single database To the trainer: This is important. Make sure that they see the difference between an integrated library software and one that is not integrated. Give examples UNESCO ICTLIP Module 1. Lesson 4. 12

What is a computer virus? Generally a computer virus is defined as a program or a code that gains access without the users’ knowledge and/or perform actions not intended by the user, often damaging data and sometimes the whole system in the process. Viruses are activated once unknowing users run, open, view or copy the file containing it. The action that will trigger the virus to deliver its “payload” depends on the type of virus that infected the file. Some security experts define viruses separately from worms, and Trojan horses. UNESCO ICTLIP Module 1. Lesson 4.

Characteristics of a virus* Virus’ common characteristics: A virus is a self-replicating program whose main purpose is to propagate itself to as many places as possible. A virus propagates itself by modifying another program to include itself. A virus can only propagate itself by an act of a user of the system in which it exists. (opening/viewing files unknowing that it is infected and/or copying/transferring files from one system to another through diskettes, file transfer, e-mail, Internet and other means…) UNESCO ICTLIP Module 1. Lesson 4.

UNESCO ICTLIP Module 1. Lesson 4. What is a worm? Worm is defined as a program propagating itself in a network of computers exploiting bugs and vulnerabilities of operating systems and application software or through guessing / breaking / stealing passwords to gain access to other machines in the network. Worms slow or shut down computer systems and networks due to its continuous and uncontrolled replication that consumes system resources which are needed to run “legitimate” tasks and operations. The worm’s capability to replicate itself without any action from the users differentiates it from a virus that needs users action in order to replicate. To the trainer: Mention the different virus scanners and cleaners and the virus shields available. UNESCO ICTLIP Module 1. Lesson 4.

UNESCO ICTLIP Module 1. Lesson 4. What is a Trojan horse? A Trojan horse masquerades as a useful or entertaining program but contains hidden functions that while running may destroy files or create a “back door” that will allow an intruder to access the system. The intruder can exploit the privileges of the user e.g. view, copy, or delete files, steal passwords, reconfigure the system or use it to attack another system. Trojan horses unlike viruses do not spread by itself but can be as destructive. To the trainer: Mention the different virus scanners and cleaners and the virus shields available. UNESCO ICTLIP Module 1. Lesson 4.

How do you protect yourself from viruses, worms and Trojan horses? Do not run any program or open any file from untrusted sources Always scan floppy diskettes and even CD-ROMs before using. Install a virus shield to automatically check diskettes and CDs Always get an updated version of a virus scan and cleaner. Always check you hard drive for possible infection, if you are connected to the Internet Use diskettes only after they have been cleaned To the trainer: Mention the different virus scanners and cleaners and the virus shields available. UNESCO ICTLIP Module 1. Lesson 4.

What are other ways of ensuring security of the system and data? Regularly back-up your system and your data You may use CD-R, CD-RW, diskettes, tapes, or another hard disk for backing up your data and your system. Use firewalls, encryption and other security measures to protect data, computer systems and networks from intrusion and attacks done through the Internet To the trainer: Mention available back-up systems. UNESCO ICTLIP Module 1. Lesson 4.

How are programs written? Programming languages are used to write programs. Some of these are: Low level languages--Assembler High level languages Cobol Fortran C++ Programming languages for the Internet Perl Java UNESCO ICTLIP Module 1. Lesson 4.

What are the other requirements for writing a program? Systems analysis and design Systems development--Program logic Software development Compiling Testing and debugging Implementing To the trainer: Mention the importance of writing programs that suit the requirements of the user. UNESCO ICTLIP Module 1. Lesson 4.

What are some problems in writing/using software? Programming languages are usually in English. Applications usually use the English language and the Roman alphabet. Problems arise when the user is non-English and/or is using non-Roman script. Computers use character sets stored in binary codes Different scripts use different character sets. Computers must know which writing system/character set they are dealing with. To the trainer: Mention the 16 bit and 32 bit requirements of the English and Korean languages respectively. UNESCO ICTLIP Module 1. Lesson 4.

What are some problems caused by different characters sets? inputting data outputting data finding data displaying information UNESCO ICTLIP Module 1. Lesson 4.

What is a possible solution in dealing with different character sets? Use of Unicode--a huge character set to include all the world’s writing systems Development of different character sets for different languages such as the ones developed by the Japanese and the Chinese. To the trainer: Show some examples of the unicode system. UNESCO ICTLIP Module 1. Lesson 4.

What are some future trends in software development? More user friendly Bigger in size because of more sophistication More customized More Web enabled More open More sophisticated programming languages UNESCO ICTLIP Module 1. Lesson 4. 33