🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

ICT finalz.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

For your attention Topic to Present : Softwares Subject : Computer Science and Information Technology DNS-3081 ❖ SUBMITTED TO: PROF. LAIBA ❖ SUBMITTED BY:...

For your attention Topic to Present : Softwares Subject : Computer Science and Information Technology DNS-3081 ❖ SUBMITTED TO: PROF. LAIBA ❖ SUBMITTED BY: PAKEEZA ARFAN (013) FATIMA SHAHZAD (006) KIRAN MUNEER (016) ❖ DEPARTMENT : DNS ❖ SEMESTER : 6TH Contents : SOFTWARES TYPES OF SOFTWARE CONCLUSION SoftWare Software is a set of instructions, data, or programs used to operate a computer and execute specific tasks. It is the opposite of hardware, which describes the physical aspects of a computer. Software is a generic term used to refer to applications, scripts and programs that run on a device. STEPS FOR SOFTWARE DEVELOPMENT BRAINSTORMING BUSINESS ANALYSIS DESIGN PROGRAMMING INTEGRATION QUALITY ASSURANCE RELEASE PHASE 1 PHASE 4 Product and project managers together with Every programmer has his own software developers have to think globally to create a development tasks list for coding for which he is software application demanded in the market responsible. and, generally, offer something different. The software build process is controlled by project This stage is also called planning. managers PHASE 2 PHASE 5 Before investing heavily in the project, the CEO and all team members have to carry out a feasibility analysis. Integrating all sources and environments is a how to make your own software profitable in the long must in figuring out how to create a software run and evaluates all factors including economic and program efficiently as it helps to figure out on technical that affect the project development. time how many issues, conflicts, and bugs are there PHASE 3 PHASE 6 Designers, like any other architects, build the The first software release will be followed by the whole structure of the project and provide the releases of the next versions of the product. It is final prototype that will be used for the next the final stage of development that can be also steps of software development. followed by maintenance and support. ❑ Types Of Software : APPLICATION PROGRAMMING Software Software MAIN TYPES SYSTEM DRIVER Software Software APPLICATION SOFTWARE Application Software Creating spreadsheet ► That performs specific functions. ► Application Software is also Manipulating Developing data websites known as end-user software or productivity ► The functions performed by FUNCTION application software, can be personal, business as well as Managing Writing information reports educational. Keeping records Examples ► The most common examples of application software are the computer programs that we used in our everyday life. This application software includes: ► Microsoft products such as Office, PowerPoint, Word, Excel, Outlook, etc. ► Music Application Softwares like Pandora and Spotify ► Real-time online communication like Skype, Google Meet, and Zoom ► Team collaboration software like Slack ► Internet browsers like Chrome, Safari, and Firefox ► Multimedia Software like MX Player and VLC Media Player Importance Of application software ► Application Software or a Software Application helps users to perform multiple tasks. ► They are assigned to perform well-maintained functions and activities. ► Application software interacts with the real world and helps to solve real-life problems. ► They are also helpful in carrying out the business processes with ease and give it a competitive edge. PROS OF APPLICATION SOFTWARE ► Constant updates: If application software is licensed then you can get constant updates in future. That means you will be protected from viruses and other faults in the software. ► Multitasking: Multitasking helps the software to consume the computer resources in a better way ► Provides security: Application software provides you with extra security. For instance, if your computer gets hacked then the application software will still work correctly because they have an inbuilt security layer that can prevent hackers from damaging their software. CONS OF APPLICATION SOFTWARE ► Extra time to build: ► Building application software takes higher time. This is because of the regular communication between software developers and the customer. ► Costly to build: ► Get errors after launch: ► Consumes extra space: ► May be cracked: ► There is a higher probability that licensed application software may get cracked i.e. its licensed keys get. PROGRAMMING SOFTWARE Programming Software ► Programming software is a software which helps the programmer in developing other software. ► Compilers, assemblers, debuggers, etc. are examples of programming software. What was the first computer programming language? ► The first programming language for a computer was Plankalkül, developed by Konrad Zuse between 1943 and 1945. ► However, it was not implemented until 1998. ► Short Code, which was proposed by John Mauchly in 1949, is considered to be the first high-level programming language. Top 10 Programming Languages : FUNCTIONS: Game development involves creating computer games or other entertainment software. If you're interested in developing a game, consider the following languages: JAVA , dark basis , Game C++,C development C# Internet and web page development are the essence of the Internet. Without developers, the Internet would not exist Perl Internet and PHP web page Python development can increase productivity for you or your company, saving you countless hours. Auto Hotkey Batch file Perl Script Python development Tcl PROS OF PROGRAMMING SOFTWARE ► Computer programmers use programming software to write code. ► Programming software and programming tools enable developers to develop, write, test ► Debug other software programs. Cons of Programming Software ► Time consuming ► Long hours ► Lack of engagement ► Programming softwares require computers with more memory, storage capacity, and faster processor DEVICE DRIVER SOFTWARE A device driver is a specific form of software application that allows one hardware device (such as a personal computer) to interact with another hardware device (such as a printer). All pieces of hardware require a driver, from your internal computer components, such as your graphics card, to your external peripherals, like a printer. Purpose of Device driver software ► Device Drivers are essential for a computer system to work properly because without a device driver the particular hardware fails to work accordingly, which means it fails in doing the function/action it was created to do. ► Most use the term Driver, but some may say Hardware Driver, which also refers to the Device Driver. SYSTEM SOFTWARE ► System software is software designed to provide a platform for other software. ► Examples of system software include operating systems like macOS, Linux, Android and Microsoft Windows, computational science software, game engines, search engines, industrial automation, and software as a service applications. FUNCTIONS ► : (1) manage the computer's resources, such as the central processing unit, memory, disk drives, and printers, ► (2) establish a user interface ► (3) execute and provide services for applications software. Pros of SYSTEM Software ► Providing consistent solutions: It can provide consistent answers for repetitive decisions, processes, and tasks. ► Provides reasonable explanations: It can clarify the reasons why the conclusion was drawn and be why it considers as the most logical choice among other alternatives. ► Overcome human limitations: It can store the knowledge and use it as long as the organization needs it. ► Easy to adapt to new conditions: It also can capture new knowledge from an expert and use it as inference rules to solve new problems. Cons of SYSTEM Software ► Lacks common sense: It lacks common sense needed in some decision making since all the decisions made base on the inference rules set in the system. ► Difficulty in creating inference rules: ► May provide wrong solutions: It is not error-free. There may error occur in the processing due to some logical mistakes made in the knowledge base, which will then provide the wrong solutions. CONCLUSION CONCLUSION ► Software is a set of instructions to perform a desired and useful work, by which the operations of the computer for the computations and processing or controlled. ► The term software refers to a collection of programs ► Some type of software works : Graphically Data Base MANAGEMENT System Word Processor ► Day by day Software are upgrading and becoming more and more user friendly and much more satisfied to use COMPUTER SCIENCE & INFORMATION TECHNOLOGY COURSE CODE : DNS-3081 INSTRUCTOR : MAM LAIBA TOPIC : COMPUTER NETWORK SYSTEMS PRESENTED BY : GROUP- 1 AYESHA ASGHAR MAHNOOR NAWAZ HAFIZA HAJRA ALISHA NOOR - -001 -007 -011 014 WHAT IS NETWORK SYSTEM? ❖ A computer network, also referred to a data network, is a series of interconnected nodes that can transmit, receive and exchange data, voice and video traffic. ❖ Examples Nodes in a computer system involve ▪ server & ▪ modem USES OF NETWORK SYSTEM We need computer networks for following purposes; Remote access File sharing Sharing software Data protection Resource sharing Communication & collaboration TYPES OF NETWORK SYSTEM TYPE 1 TYPE 2 LAN (Local area network) ; MAN ( Metropolitan area network) TYPE 3 TYPE 4 WAN PAN ; ( Wide area network) ; ( personal area network) LOCAL AREA NETWORK ❖ It is used for communicating among computer devices to create a network ❖ It is used usually within an office building or home. ❖ It enables the sharing of resources such as files & hardware devices. ❖ It is fast with speed from 10 Mbps to 10 Gbps. ❖ It is limited in size typically from a few hundred meters to not more than a mile. ❖ It requires little writing , typically a single cable connected to each device. CHARACTERISTICS OF LAN LAN acquires following characteristics; ❖ It can be either wired or wireless typically a twisted pair , coax or optic cable. ❖ It uses a protocol. ❖ It has a lower cost as compared to MANs or WANs. ❖ Nodes in LAN are linked together with a certain topology like bus, ring & star etc. ❖ It requires little wiring. EXAMPLES OF LAN ❖ Networking in home & office. ❖ Networking in school, laboratory & university campus. ❖ Networking between two computers. ❖ Wi-Fi (When we consider wireless LAN). PROS OF LAN ❖ It helps In sharing of resources. ❖ It builds client & server relationship. ❖ It provides the sharing of internet. ❖ It also provides software program sharing. ❖ It helps In securing the data. ❖ With it , communication is easy , fast & time-saving. ❖ It helps In computer identification. CONS OF LAN ❖ It has data security problem. ❖ It has limitation of distance. ❖ Any kind of server crashes may affect all computers. ❖ It is expensive to set-up a LAN. METROPOLITAN AREA NETWORK ❖ It is a large computer network that usually spans a city or a large campus. ❖ It is optimize for a large geographical area than a LAN. ❖ It is might be owned and operated by a single organization. ❖ It is used by many individual and organizations. CHARACTERISTICS OF MAN MAN acquires following characteristics; ❖ It act as a high speed network to allow sharing of regional resources. ❖ It typically covers an area of between 5 and 50 km diameter. ❖ Examples; ▪ High speed DSL to customers and cable TV networks EXAMPLES OF MAN Digital cable Cable broad- Th DSL line WiMAX TV network band ne PROS OF MAN ❖ It is less expensive. ❖ It is affective for sending local E- mails. ❖ It has high speed than WAN. ❖ It provides the sharing of internet. ❖ The conversion from LAN to MAN is easy. ❖ It has high security. CONS OF MAN ❖ It is difficult to manage. ❖ It has internet speed difference with respect to material used. ❖ It is prone to hacker’s attack. ❖ It can only be set-up by technical people. ❖ In it , more wires are required. WIDE AREA NETWORK ❖ It is a communication network that makes use of existing technology to connect local computer networks into a large working network that may cover both national & international networks. ❖ It is the group of MANs r LANs or the mixture of both. ❖ It covers the largest distances such as states , countries or continents. ❖ It can be complex or simple. TYPES OF WAN Switched WAN Point-to-point WAN ❖ It is used t connect multiple end ❖ It is used to connect two systems nodes through a common WAN together over a wide area network. network via two end nodes. ❖ Example ; ❖ Example ; ▪ asynchronous transfer mode ▪ old school broadband networks (ATM) using dial-up technology. CHARACTERISTICS OF WAN WAN acquires following characteristics; ❖ It has a large capacity. ❖ It can connect large number of computers over a large area. ❖ It facilitate the sharing of regional resources. ❖ It provides uplinks for connecting MANS & LANS to the internet. EXAMPLES OF WAN Satellite Bank cash Cable Network Internet systems dispensers companies providers PROS OF WAN ❖ It covers large geo-graphical area. ❖ It has centralized data. ❖ It provides up-dated files & data. ❖ It gives a lot of applications to exchange messages. ❖ It helps In sharing of resources & software. ❖ It provides global business. ❖ It has high band-width. ❖ It distributes work-load & decrease travel charges. CONS OF WAN ❖ It has security problems. ❖ It needs fire-wall & anti-virus software. ❖ It’s set-up cost is high. ❖ It has trouble shooting problems. ❖ It acquires server down & dis- connection issues. PERSONAL AREA NETWORK ❖ It is a network that is used for communicating among computers & computer devices. ❖ It’s reach is typically of a few meters (30 feet). Portable computers ❖ It may use wire or wireless technology. Smart phones ❖ It enables devices to communicate & share data. Digital cameras ❖ The devices may include; Printers digital media player TYPES OF PAN Wireless network Wired network It is small scale network system. It is a most common type of network It requires little or no infrastructure. connection. It operates within a short range. It is a jack In the wall In which computer is plugged to access network. These jacks are labeled & are near the telephone jack. EXAMPLES OF WAN Body Office Small area home netwo netwo office rk rk PROS OF PAN ❖ It requires no extra space. ❖ It don’t need extra cable or wire. ❖ It is used In office , conference & meeting. ❖ Also used In TV & AC remotes. ❖ Data can be synchronized in it. ❖ It can be connected to many devices at a time. ❖ It has affordable cost. ❖ It is portable. ❖ It is easy to use. ❖ It is reliable. ❖ It is secure. CONS OF PAN ❖ It can be operated In less range of areas. ❖ It can only be used for personal area. ❖ It transfers data slowly. ❖ It interferes with radio signals. ❖ Infrared signals travel only In a straight line. SOME WIRELESS TECHNOLOGIES Technology that permits the transfer of information between separated points without physical connection. Wireless technologies include; Bluetoot Infrared ZigBee Wi-fi DSL h INFRARED WIRELESS NETWORKING ❖ Infrared wireless networking uses infrared beams to send data transmissions between devices. ❖ Infrared wireless networking offers higher transmission rates, reaching 10Mbps to 16Mbps. ❖ As expected, infrared light beams cannot penetrate objects. ❖ Therefore, the signal is disrupted when something blocks the light. ❖ Example ; ▪ Remote controls use near-infrared light, transmitted with light-emitting diodes (LEDs), to send focused signals to home-entertainment devices, such as televisions. BLUETOOTH WIRELESS NETWORKING ❖ It is a Wireless Personal Area Network (WPAN) technology. ❖ It is used for exchanging data over smaller distances. ❖ This technology was invented by Ericson in 1994. ❖ Bluetooth ranges up to 10 meters. PROS OF BLUETOOTH NETWORKING ❖ Low cost. ❖ Easy to use. ❖ It can also penetrate through walls. ❖ It creates a connection immediately without any wires. ❖ It is used for voice and data transfer. CONS OF BLUETOOTH NETWORKING ❖ It can be hacked and hence, less secure. ❖ It has a slow data transfer rate of 3 Mbps. ❖ It has a small range of 10 meters. ❖ Bluetooth communication does not support routing. ❖ The issues of handoffs have not been addressed. APPLICATIONS OF BLUETOOTH NETWORKING in laptops & wireless PCs In printers In wireless headsets Connecting digital camera wirelessly Data transfer ZIGBEE WIRELESS NETWORKING ❖ ZigBee is a low power technology. ❖ It has low data rate. ❖ It supports wireless networking standards. ❖ It is basically used for two-way communication between sensors and control system. ❖ It is a short-range communication standard like Bluetooth and Wi-Fi. ❖ It covers range of 10 to 100 meters. PROS OF ZIGBEE NETWORKING ❖ It support for multiple network topologies such as point-to- point network system. ❖ It has low duty cycle. ❖ It has low latency. ❖ Direct Sequence Spread Spectrum (DSSS) ❖ It acquires up to 65,000 nodes per network ❖ It has 128-bit AES encryption for secure data connections. ❖ It has collision avoidance strategies. CONS OF ZIGBEE NETWORKING There are also some disadvantages ❖ Not free; It costs $3,500 USD at the time of writing to license the standard ❖ Low data rates; It is not designed to support higher data rates ❖ Star network is limited; The coordinator device supports up to 65,000 devices WI-FI WIRELESS NETWORKING ❖ Wi-Fi is a popular wireless networking technology. ❖ Wi-Fi stands for “wireless fidelity”. ❖ By using this technology we can exchange information between two or more devices. ❖ Wi-Fi technology allows local area networks to operate without cable and wiring. ❖ A computer’s wireless adaptor transfers the data into a radio signal and transfers the data into an antenna for users PROS OF WI-FI NETWORKING ❖ Increased efficiency. ❖ Improved data communications ❖ Access and availability. ❖ Flexibility. ❖ Cost savings. ❖ New opportunities. ❖ Security. ❖ Installation problems. ❖ Coverage CONS OF WI-FI NETWORKING There are also some disadvantages ❖ Security ❖ Range ❖ Reliability ❖ Speed DSL WIRELESS NETWORKING ❖ DSL stands for " digital subscriber line" networking technology. ❖ It provides broadband (high-speed) Internet connections over conventional telephone lines. ❖ DSL is transmitted over normal telephone lines through a DSL terminal adapter, also known as a DSL modem. ❖ This modem connects a computer or local computer network to the DSL line PROS OF DSL NETWORKING ❖ A fairly simultaneous connection between the internet with voice or fax via telephone cable. ❖ Data security is well maintained. ❖ It has high access speed and is always online. ❖ The use price is cheap, especially for residential areas. CONS OF DSL NETWORKING There are also some disadvantages ❖ Long copper cable from CO to customer. ❖ There are load coils and bridged taps. ❖ The third obstacle is fiber optics Information computer technology Topic : Utility viruses PRESENTED BY: 1. ZAINAB ZAHID -009 2. BARKA MEHMOOD-012 3. SYED FARAN AHMED-018 PRESENTED TO Prof. Laiba Awaan CONTENTS  Utility software  Malware  Virus  Types of virus  Anti-virus programs  PROS of anti-virus  CONS of Anti-virus Utility software DEFINITION “System utility software is a set of tools that helps configure, analyse and optimize computer resources to help users perform multiple tasks efficiently”. FUNCTIONS The best Utility Software provides key functionality such as;  Data compression  Data recovery  Disk defragmentation  Computer resources  Files management Malware  Also known as Malicious software DEFINITION “Malware, short for “malicious software,” refers to any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems” EXAMPLE Programs designed to infiltrate or damage a computer system without the owner's informed consent. it includes: I. Viruses II. Worms III. Trojan horses IV. Adware V. Spyware VI. Spam VIRUS DEFINITION “A virus is a program that reproduces its own code by attaching itself to other executable files”. \  The virus code is executed when the infected file is executed.  Most viruses do their "job" by placing self- replicating code in other programs Are all computer viruses harmfull?  Mostly all the computer viruses are harm-full.  Every computer virus ever written takes up disk space  Many of them are able to remain in the computer's memory taking control.  Some viruses are written to halt the computer.  There are viruses created to deliberately destroy data on the disk What do they do?  Slower processing  Decreased memory  A disk drive LED lighting up for no apparent reason  A screen going blank when you touch a certain letter on your keyboard  Delete data  Copy password How do you get the virus?  Viruses are contracted by downloading files from the Internet.  Close to 75% of all viruses are contracted through friendly mean. for example I. Social network II. E-mails III. Websites IV. Removable media Types of virus 4:Macro viruses - viruses that attach 2: Memory viruses - execute themselves to documents in the form of and stay resident in memory macros. Usually in Microsoft Word and Microsoft Excel documents 1: Boot Sector - Stays 3: FAT Virus - infects the 5: CMOS viruses - viruses that resident by infecting the File Allocation Table of a hard make themselves resident in the boot sector of the computer. drive, these usually cause a CMOS. These viruses can damage loss of files that are on a hard the hardware of the computer drive WORM DEFINITION “A computer worm is a software program that is designed to copy itself from one computer to another, without human interaction”.  Unlike a computer virus, a worm can copy itself automatically.  You might have heard of specific computer worms, including the Sasser worm, the Blaster worm, and the Conficker worm. TORJAN HORSES DEFINITION “Designed to cause damage or do something damaging to a system, but are disguised as something useful”.  Unlike viruses, these don't make copies of themselves.  Trojan horses are designed to allow a hacker remote access to a target computer system. SPYWARE DEFINITION “Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive”.  Software that performs certain behaviors, generally without appropriately obtaining your consent first, such as: I. Advertising II. Collecting personal information III. Changing the configuration of your computer ADWARE DEFINITION “Adware (short for advertising-supported software) is a type of malware that automatically delivers advertisements”.  Common examples of adware include pop-up ads on websites and advertisements that are displayed by software.  Often times software and applications offer “free” versions that come bundled with adware SPAM Spam  Spam is email that you did not request and do not want.  One person's spam is another's useful newsletter or sale ad.  Spam is a common way to spread virusesand trojans. ANTI-VIRUS PROGRAMS Anti- malware program Anti-Malware program is used to prevent, detect, and remove computer viruses, worms, trojan horses and any other type of malware. Anti- Anti spam Firewall Anti-virus spyware program program program Anti-virus program  “Antivirus" is protective software designed to defend your computer against malicious software.  In order to be an effective defense, the antivirus software needs to run in the background at all times, and should be kept updated so it recognizes new versions of malicious software Examples of anti-virus programs 01 02 03 04 05 Norton AVG Kaspersky McAfee Avast antivirus Anti-spyware program Anti-spyware program is a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed. Examples of Anti-spyware program: I. Spyware Doctor II. AVG Anti-spyware III. STOPzilla IV. Spysweeper Firewall  A firewall blocks attempts to access your files over a network or internet connection.  That will block incoming attacks.  Your computer can become infected through shared disks or even from another computer on the network.  So you need to monitor what your computer is putting out over the network or internet also PROS of Anti-Virus  User friendly  Good in detecting malicious websites  Two-way firewall features  3 days free trial  Protect you in real time  Security & privacy CONS of Anti-Virus  Average performance in malware detection  Effect system performance  Slower system scans  Below average phishing detection THANKS!

Use Quizgecko on...
Browser
Browser