Ujjwal Kumar , IT Department, Gaya College, Gaya
HARDWARE
OPERATINGSYSTEM
APPLICATION
USER
Ujjwal Kumar , IT Department, Gaya College, Gaya
System Software OS▪ CLI▪ GUI
Translator Utility Library
Application software Application suite Enterprise software Educational Simulation Entertainment Content access
Ujjwal Kumar , IT Department, Gaya College, Gaya
It is a collection of instructions that enable the user to interact with a computer, its hardware, or perform tasks.
Ujjwal Kumar , IT Department, Gaya College, Gaya
System software is a generic term referring to the computer programs used to start and run computer systems including diverse application software and networks.
Application software is the general designation of computer programs for performing tasks. Application software may be general purpose (word processing, web browsers) or have a specific purpose (accounting, truck scheduling)
Ujjwal Kumar , IT Department, Gaya College, Gaya
System software is a type of computer program that is designed to run a computer's hardware and application programs.
The system software is the interface between the hardware and user applications.
Ujjwal Kumar , IT Department, Gaya College, Gaya
Operating system Translator software Utility programs Library programs
Ujjwal Kumar , IT Department, Gaya College, Gaya
An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.
Ujjwal Kumar , IT Department, Gaya College, Gaya
Process management Interrupts Memory management File system Device drivers Networking Security I / O
Ujjwal Kumar , IT Department, Gaya College, Gaya
Command Line Interface (CLI): User gives instructions to the computer by typing the commands.
Graphical User Interface (GUI): User gives commands to the system by selecting icon or menu item displayed on the screen with the use of a point and draw device.
Ujjwal Kumar , IT Department, Gaya College, Gaya
MS-DOS (Disk Operating System) OpenVMS (Open Virtual Memory System) Unix RDOS (Real-time Disk Operating System) Linux Kernel BSD (Berkeley Software Distribution)
Ujjwal Kumar , IT Department, Gaya College, Gaya
Ujjwal Kumar , IT Department, Gaya College, Gaya
BIOS
First Sector
IO Interfaces
Kernel
System config
Shell
Batch files
prompt
COMMAND.COM
CONFIG.SYS
MBR
POST
IO.SYS
MSDOS.SYS
AUTOEXEC.BAT
Command Prompt
Kernel Loading
Ujjwal Kumar , IT Department, Gaya College, Gaya
Unix (trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the originalAT&T Unix, developed in the 1970s at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others using High Level Language.
Ujjwal Kumar , IT Department, Gaya College, Gaya
The Linux kernel is a Unix-like computer operating system kernel.
The Android operating system for tablet computers, smartphones and smartwatches are also based on the Linux kernel.
Ujjwal Kumar , IT Department, Gaya College, Gaya
Ujjwal Kumar , IT Department, Gaya College, Gaya
OpenVMS is a multi-user, multiprocessing virtual memory-based operating system (OS) designed for use in time sharing, batch processing, and transaction processing.
Ujjwal Kumar , IT Department, Gaya College, Gaya
It is a Unix operating system derivative developed and distributed by the Computer Systems Research Group (CSRG) of the University of California, Berkeley, from 1977 to 1995.
Ujjwal Kumar , IT Department, Gaya College, Gaya
Windows 1.0x Windows 95 Windows 98 Windows XP Windows Vista Windows 7 Windows 8 Windows 10 VisiCorp (IBM Based)
Mac OS System 1.0Mac OS XLinux BasedUbuntuFedoraRedhatCentOSKaliBOSS (Bharat Operating
System Solutions)
Ujjwal Kumar , IT Department, Gaya College, Gaya
Ujjwal Kumar , IT Department, Gaya College, Gaya
Ujjwal Kumar , IT Department, Gaya College, Gaya
Windows Boot Manager phase. Windows Boot Loader phase (Load Ntoskrnl.exe, Hardware Abstraction
Layer (HAL) Hal.dll) Kernel loading phase. Logon phase. Ujjwal Kumar , IT Department, Gaya College, Gaya
Criteria NTFS FAT32 FAT16
Operating SystemWindows NT, Windows
2000Windows XP
Windows 98,Windows ME
Windows 2000,Windows XP
DOS, All versions ofMicrosoft Windows
Max Volume Size 2TB 2TB 2GB
Max File SizeLimit Only byVolume Size
4GB 2GB
Max File Name Length
Up to 255 Up to 255Standard - 8.3
Extended - up to 255Compression Yes No No
Built-In Security Yes No NoRecoverability Yes No No
PerformanceLow on small volumes
High on Large
High on small volumes
Low on large
Highest on small volumes
Low on largeFault Tolerance Max Minimal Average
Ujjwal Kumar , IT Department, Gaya College, Gaya
FAT32 NTFS
Acronym File Allocation Table 32 New Technology File System.
Introduced It was introduced in 1977. It was introduced in 1993.
They areFAT32 is a standard system as it supports
more versions of Windows.
NTFS is supported in the newer versions of Windows
such as Windows XP, Windows 2000 and higher.
File size Maximum file size 4 GB.File size limited by size of
volume.
Supporting and requirement of the
OS
It does not support Windows 2000 or Windows 2003 Active Directory.
It requires the use of Windows 2000 or Windows 2003 Active
Directory or shared cluster drives.
Ujjwal Kumar , IT Department, Gaya College, Gaya
FAT32 NTFS
Recovery capability
It does not have the capability to recover from some disk-related errors
automatically.
It has the capability to recover from some disk-
related errors automatically.
File processing speedIt is slow in the file
transferring process.It is faster in the file
transferring process.
File compression methodFAT32 does not support
file compression.NTFS supports file
compression.
ConversionsFAT32 can be converted
to NTFS.It is difficult to convert NTFS back to FAT32.
Ujjwal Kumar , IT Department, Gaya College, Gaya
Assembler - converts assembly code into machine code
Interpreter - converts High Level languages such as java script into machine code one line at a time
Compiler - converts High Level languages such as C++ into machine code all at once
Ujjwal Kumar , IT Department, Gaya College, Gaya
Software that translates as assembly language program into an equivalent machine language program of a computer
Some people call these instructions assembler language and others use the term assembly language.
Ujjwal Kumar , IT Department, Gaya College, Gaya
Ujjwal Kumar , IT Department, Gaya College, Gaya
It is a computer program that directly executes, i.e. performs, instructions written in a programming or scripting language one line at a time, without previously compiling them into a machine language program. An interpreter generally uses one of the following strategies for program execution: parse the source code and perform its behavior directly. translate source code into some efficient intermediate
representation and immediately execute this. explicitly execute stored precompiled code made by
a compiler which is part of the interpreter system.Ujjwal Kumar , IT Department, Gaya College, Gaya
Ujjwal Kumar , IT Department, Gaya College, Gaya
A compiler is a computer program (or a set of programs) that transforms source code written in a programming language (the source language) into another computer language (the target language), with the latter often having a binary form known as object code. The most common reason for converting source code is to create an executable program.
Ujjwal Kumar , IT Department, Gaya College, Gaya
Ujjwal Kumar , IT Department, Gaya College, Gaya
Ujjwal Kumar , IT Department, Gaya College, Gaya
Utility software is a type of system software which has a very specific task to perform related to the working of the computer, for example anti virus software, disk defragment etc.
Utility software should not be confused with application software, which allows users to do things like creating text documents, playing games, listening to music or surfing the web.
Ujjwal Kumar , IT Department, Gaya College, Gaya
Virus scanner - to protect your system from Trojans and viruses
Disk defragmenter - to speed up your hard disk
System monitor - to look at your current system resources
File managers - to add, delete, rename and move files and folders
Ujjwal Kumar , IT Department, Gaya College, Gaya
Library programs are collections of compiled routines which are shared by multiple programs, such as the printing function.
Library programs contain code and data that provide services to other programs such as interface (look and feel), printing, network code and even the graphic engines of computer games.
Ujjwal Kumar , IT Department, Gaya College, Gaya
An application program (app or application for short) is a computer program designed to perform a group of coordinated functions, tasks, or activities for the benefit of the user.
Ujjwal Kumar , IT Department, Gaya College, Gaya
Application suite: consists of multiple applications bundled together. EgMS Office
Enterprise software: addresses the needs of an entire organization's processes and data flows, across several departments, often in a large distributed organizations
Educational software: is related to content access software, but has the content and/or features adapted for use in by educators or students.
Simulation software :simulates physical or abstract systems for either research, training or entertainment purposes.
Entertainment Software :can refer to video games, screen savers, programs to display motion pictures and other forms of entertainment which can be experienced through use of a computing device.
Content access software: is used primarily to access content without editing, but may include software that allows for content editing. (Examples include web browsers, and help browsers.)
Ujjwal Kumar , IT Department, Gaya College, Gaya
Computer software application that performs the task of composing, editing, formatting, and printing of documents.
Ujjwal Kumar , IT Department, Gaya College, Gaya
Creating, editing, saving and printing documents copying, pasting, moving and deleting text within a document
Formatting text Creating and editing tables Inserting elements from other software Correcting spelling and grammar
Ujjwal Kumar , IT Department, Gaya College, Gaya
Use in home While many homes have word processors on their computers,
word processing in the home tends to be educational, planning or business related, dealing with school assignments or work being completed at home. Occasionally word processors are used for recreational purposes, e.g. writing short stories, poems or personal correspondence.
Some use word processors to create resumes and greeting cards, but many of these home publishing processes have been taken over by web apps or desktop publishing programs specifically oriented toward home uses.
The rise of email and social networks has also reduced the home role of the word processor as uses that formerly required printed output can now be done entirely online.
Ujjwal Kumar , IT Department, Gaya College, Gaya
Use in business Within the business world, word processors are
extremely useful tools. Some typical uses include: creating legal documents,
company reports, publications for clients, letters, and internal memos.
Businesses tend to have their own format and style for any of these, and additions such as company letterhead.
Thus, modern word processors with layout editing and similar capabilities find widespread use in most business.
Ujjwal Kumar , IT Department, Gaya College, Gaya
A spreadsheet is an interactive computer application for organization, analysis and storage of data in tabular form
Ujjwal Kumar , IT Department, Gaya College, Gaya
Modeling and Planning Household Finance Planning Business Accounts and Budgeting Invoices Wages Predictions / Simulations Calculations e.g. Adding, Subtracting, etc. Break even analysis Statistical analysis Creating Graphs e.g. bar chart, pie chart. Collect data from different sources e.g. phone number,
prices. Explore and interpret data in order to draw conclusions for
business
Ujjwal Kumar , IT Department, Gaya College, Gaya
Statistical analysis : Spreadsheets provide the user with a variety of statistical functions that will enable him to perform both simple and complex statistical operations such as computing the mean, standard deviation, average, mode etc. for complex statistical operations, the user need some understanding of statistics.
Accounting Spread : sheets are known to be a useful tool to the accountants for recording and analyzing financial transaction such as computing totals, consolidating financial records as well as predicting future business trends.
Mathematical and scientific: These involves the use of spreadsheets to solve mathematical and scientific problems such as arithmetic and trigonometric.
Ujjwal Kumar , IT Department, Gaya College, Gaya
A presentation program is a software package used to display information in the form of a slide show. It has three major functions: an editor that allows text to be inserted and formatted, a method for inserting and manipulating graphic images, and a slide-show system to display the content
Ujjwal Kumar , IT Department, Gaya College, Gaya
MS Office Lotus Libre Koffice Openoffice Google doc , Google sheet and Google slides
Ujjwal Kumar , IT Department, Gaya College, Gaya
Most often, these electronic slides are used as a visual aid for some type of presentation to an audience.
Presentation Graphics programs have many applications: Sales presentations Board presentations Advertisements Reports Lectures Demonstrations
Ujjwal Kumar , IT Department, Gaya College, Gaya
A database-management system (DBMS) is a computer-software application that interacts with end-users, other applications, and the database itself to capture and analyze data.
Ujjwal Kumar , IT Department, Gaya College, Gaya
data storage data backup and recovery data presentation multi-user access control data security management database communication
Ujjwal Kumar , IT Department, Gaya College, Gaya
Some of the most well-known database software programs include:
ADABAS(Adaptable DAtaBAse system) IBM DB2 Microsoft SQL Server MySQL Oracle RDBMS SAP Sybase ASE (Adaptive Server Enterprise) Teradata
Ujjwal Kumar , IT Department, Gaya College, Gaya
Self-describing nature of a database system Support for multiple views of data Sharing of data and multiuser system Control of data redundancy Data sharing Enforcement of integrity constraints Restriction of unauthorized access Data independence Transaction processing Provision for multiple views of data Backup and recovery facilities
Ujjwal Kumar , IT Department, Gaya College, Gaya
Railway Reservation System Library Management System Banking Universities and colleges Credit card transactions Social Media Site Finance Online Shopping Human Resource Management Manufacturing Airline Reservation system
Ujjwal Kumar , IT Department, Gaya College, Gaya
A programming language is a formal constructed language designed to communicate instructions to a machine, particularly a computer. Machine Level Language Assembly Level Language High Level Language
Ujjwal Kumar , IT Department, Gaya College, Gaya
Ujjwal Kumar , IT Department, Gaya College, Gaya
Machine language is the lowest-levelprogramming language
Machine languages are the only languagesunderstood by computers.
Normally written as strings of binary 1s and 0s Written using decimal digits if the circuitry
of the computer being used permits this
Ujjwal Kumar , IT Department, Gaya College, Gaya
Advantage Can be executed very fast
Limitations Machine Dependent Difficult to program Error prone Difficult to modify
Ujjwal Kumar , IT Department, Gaya College, Gaya
An assembly (or assembler) language, often abbreviated asm, is a low level programming language for a computer, or other programmable device, in which there is a very strong (generally one-to-one) correspondence between the language and the architecture's machine code instructions.
These are translated by an assembler into machine language instructions that can be loaded into memory and executed.
Ujjwal Kumar , IT Department, Gaya College, Gaya
Mnemonic Opcode Meaning
HLT 00 Halt, used at the end of program to stop
CLA 10 Clear and add into A register
ADD 14 Add to the contents of A register
SUB 15 Subtract from the contents of A register
STA 30 Store A register
Ujjwal Kumar , IT Department, Gaya College, Gaya
Easier to understand and use Easier to locate and correct errors Easier to modify No worry about addresses Easily re-locatable Efficiency of machine language
Ujjwal Kumar , IT Department, Gaya College, Gaya
Machine dependent Knowledge of hardware required Machine level coding
Ujjwal Kumar , IT Department, Gaya College, Gaya
Ujjwal Kumar , IT Department, Gaya College, Gaya
Machine independent Do not require programmers to know
anything about the internal structure of computer on which high-level language programs will be executed
Deal with high-level coding, enabling the programmers to write instructions using English words and familiar mathematical symbols and expressions
Ujjwal Kumar , IT Department, Gaya College, Gaya
OOP (Object Oriented Programming): Programming languages are used for simulating real- world problems on computers
FORTRAN (FORmula TRANslation): Designed for solving scientific & engineering problems
COBOL(COmmon Business Oriented Language) : Designed for programming business data processing applications
Ujjwal Kumar , IT Department, Gaya College, Gaya
BASIC(Beginners All-purpose Symbolic Instruction Code) :Designed to be an interactive language and to use an interpreter instead of a compiler
Pascal : Encourages programmers to write well-structured, modular programs, instills good program practices
C: High-level programming languages (mainly machine independence) with the efficiency of an assembly language
C++ : Expanded to include numerous object-oriented programming features
Ujjwal Kumar , IT Department, Gaya College, Gaya
JAVA : Used in embedded systems such as hand-held devices, telephones and VCRs
C# (C Sharp): Syntactically and semantically very close to C++ and adopts various object-oriented features from both C++ and Java Compilers target the Common Language Infrastructure (CLI) implemented by Common Language Runtime (CLR) of .NET Framework
SNOBOL (StriNg Oriented symBOlicLanguage) :Used for non-numeric applications
Ujjwal Kumar , IT Department, Gaya College, Gaya
Simplicity Naturalness Abstraction Efficiency Structured Programming Support Compactness Locality Extensibility Suitability to its environment
Ujjwal Kumar , IT Department, Gaya College, Gaya
Machine independent Easier to learn and use Fewer errors during program development Lower program preparation cost Better documentation Easier to maintain
Ujjwal Kumar , IT Department, Gaya College, Gaya
Lower execution efficiency Less flexibility to control the computer’s CPU,
memory and registers
Ujjwal Kumar , IT Department, Gaya College, Gaya
It is non-procedural language. That is, the programmer specifies what has to be done instead of how the task is to be performed.
4GL Like ORACLE offers a number of tools like SQL * CLC, SQL * FORMS, SQL* REPORT, SQL * PLUS, etc .
A 4GL normally contains a utility software (tool) that interacts with the database management system (DBMS) software to store, manipulate and retrieve data needed to satisfy user requirements for information .
Ujjwal Kumar , IT Department, Gaya College, Gaya
Table-driven (codeless) programming, usually running with a runtime framework and libraries. Eg: PowerBuilder by SAP
Report-generator programming languages take a description of the data format and the report to generate and from that they either generate the required report directly or they generate a program to generate the report.Eg: Crystal Reports,Open Office Base,OracleReports
Ujjwal Kumar , IT Department, Gaya College, Gaya
Data management 4GLs provides sophisticated coding commands for data manipulation, file reshaping, case selection and data documentation in the preparation of data for statistical analysis and reporting.Eg: SAS (Statistical Analysis System),
SPSS(Statistical Package for the Social Sciences )
Ujjwal Kumar , IT Department, Gaya College, Gaya
Programming productivity is increased. One line of 4GL code is equivalent to several lines of 3GL code.
System development is faster. Program maintenance is easier. End user can often develop their own
applications. Programs developed in 4GLs are more portable
than those developed in other generation of languages.
Documentation is improved because many 4GLs are self documenting.
Ujjwal Kumar , IT Department, Gaya College, Gaya
The programs developed in the 4GLs are executed at a slower speed by the CPU.
The programs developed in these programming languages need more space in the memory of the computer system.
Ujjwal Kumar , IT Department, Gaya College, Gaya
Malware (also called as malicious software) is any software intentionally designed to cause damage to a computer, server, client, or computer network.
A wide variety of types of malware exist, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, and scareware.
Ujjwal Kumar , IT Department, Gaya College, Gaya
This program is very similar to a virus and has the ability to self-replicate leading to negative effects on your computer.
A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.
They are often designed to exploit the file transmission capabilities found on many computers.
Ujjwal Kumar , IT Department, Gaya College, Gaya
Trojans can illegally trace important login details of users online. For example E-Banking is very common among users, therefore, vulnerability of tracing your login details whenever your PC is working without any strong powerful antivirus installed.
Ujjwal Kumar , IT Department, Gaya College, Gaya
This virus can spread in many different ways including a voluntary download. If infects certain browser functions especially in form of re-directing the user automatically to certain sites.
Ujjwal Kumar , IT Department, Gaya College, Gaya
A computer virus is a program designed to harm or cause harm on an infected computer. Its spreads through e-mail attachments, portable devices, websites containing malicious scripts and file downloads.
A computer virus attaches itself to the host files and always activate whenever you open the infected files.
The virus can replicate itself and then infect the other files on your computer causing more damage.
Ujjwal Kumar , IT Department, Gaya College, Gaya
A memory-resident virus (or simply "resident virus") installs itself as part of the operating system when executed, after which it remains in RAM from the time the computer is booted up to when it is shut down.
A non-memory-resident virus (or "non-resident virus"), when executed, scans the disk for targets, infects them, and then exits (i.e. it does not remain in memory after it is done executing)
Ujjwal Kumar , IT Department, Gaya College, Gaya
Email Virus Macro Denial of Service Boot Sector Web Scripting Multipartite
Ujjwal Kumar , IT Department, Gaya College, Gaya
This is a virus spread via an email. Such a virus will hide in an email and when the recipient opens the mail.
Ujjwal Kumar , IT Department, Gaya College, Gaya
These viruses infect the files created using some applications or programs that contain macros such as doc, pps, xls and mdb. They automatically infect the files with macros and also templates and documents that are contained in the file. They hide in documents shared through e-mail and networks
Ujjwal Kumar , IT Department, Gaya College, Gaya
A denial-of-service attack is an attack that causes a loss of service to users, typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational resources of the victim system.
Ujjwal Kumar , IT Department, Gaya College, Gaya
Traditional Virus infect the boot sector on floppy disks and
hard disks By putting its code in the boot sector, a virus
can guarantee it gets executed load itself into memory immediately, and it is
able to run whenever the computer is on
Ujjwal Kumar , IT Department, Gaya College, Gaya
Most web pages include some complex codes in order to create an interactive and interesting content. Such a code is often exploited to cause certain undesirable actions. They mostly originate from the infected web pages or browsers.
Ujjwal Kumar , IT Department, Gaya College, Gaya
These type of viruses spread in many different ways. Their actions vary depending on the OS installed and presence of certain files. They tend to hide in the computer’s memory but do not infect the hard disk.
Ujjwal Kumar , IT Department, Gaya College, Gaya
Display a message Erase files Scramble data on a hard disk Cause erratic screen behavior Halt the PC Many viruses do nothing obvious at all
except spread! Consuming storage space Increasing CPU usage to 100% or 95%
Ujjwal Kumar , IT Department, Gaya College, Gaya
The many types of computer viruses and their effects are very harmful and can completely damage your system.
Make sure you perform certain tasks like: Updates Anti-Viruses More secure operating systems
Unix/Linux Based OS
Ujjwal Kumar , IT Department, Gaya College, Gaya
Ujjwal Kumar , IT Department, Gaya College, Gaya