40
Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Embed Size (px)

Citation preview

Page 1: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Lecture 4:Software

Tonga Institute of Higher EducationIT 141: Information Systems

Page 2: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Introduction

Computer software determines the tasks a computer can help you get

Software helps you Create documents Block viruses Make your computer’s performance better

Page 3: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Software Categories Computer program: instructions that tell a

comp how to carry out at task These programs software Software prepares a comp to do a specific

task (e.g. photo editing, virus protection, file management, or Web browsing)

Programs are written in a computer language that the computer can understand.

Typical languages might be called C, C++, Java

Page 4: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Software Categories

Page 5: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Application Software

Also known as an application or app Examples:

Productivity software Groupware: designed to help several people

collaborate on a single project using local networks or Internet connections

Page 6: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Utility Software

Help monitor and configure settings for comp system equipment, the OS, or the application software

E.g. setup wizards, security software, diagnostic tools

Desktop widgets: desktop widgets include clock, calendars, sticky notes, etc.

Page 7: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Device Drivers

Software that helps a peripheral device start communication with a computer

For printers, screens, modems, storage devices, scanners, sound cards etc.

Page 8: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Document production software

Word processing software: MO Word Desktop publishing software Spreadsheet software: MO Excel Statistical software Database Software: MO Access

Page 9: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Database Software

Database: collection of data that is stored on one or more computers

Database software helps you enter, find, organize, update and report information in a database.

Record holds data for a single entity Field holds one item of data relevant to

a record

Page 10: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Other application software Graphics Software: Microsoft Paint,

Adobe Photoshop Music Software Video Editing and DVD authoring Educational and Reference Entertainment Business

Page 11: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Buying software Essential applications

OS, browser, word processing, security suite, graphics viewer, drivers, entertainment.

Should ONLY have one security software Check system requirements Copyright: form of legal protection that

grants the author of an original work an exclusive right to copy, distribute, sell, and modify that work,

Page 12: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Software license

Software license: agreement Single-user license limits use to one person at

a time Site license allows software to be used on all

computers at a specific location Multi-user license: allows allocated number of

people to use the software at any time Concurrent-use license allows a specific

number of copies to be used at the same time

Page 13: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Different software licenses

Public domain software Proprietary software Commercial software Demoware Shareware Freeware Open source software

Page 14: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Installing Software and Upgrades

Inside a software package there is an executable file with an .exe file extension, support programs with a .dll file extension, data files and sometimes share some common files with other software. This can be supplied by the OS.

Page 15: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

.exe

.txt.bmp.hlp

Processor

.dll.ocx

Installing Software and Upgrades

Page 16: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Software Installation

Software installation: process that places a program into a computer so it can be used (run or executed)

Installation procedures depend on the computer’s operating system and whether the software is a local, Web, or portable application.

Page 17: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Local Application

Local Application: software that is designed to stay on a computer’s hard disk.

Most local applications contain a setup program to show you how to install

Page 18: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Windows Registry

This is database that keeps track of your computer’s peripheral devices, software, preferences, and settings.

When you install software on the hard disk, information about the software is recorded in Registry.

Page 19: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

This is a means of protecting software from illegal copying It requires users to enter a product key or activation code Can be activated over the phone or Internet

Product activation

Page 20: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Portable Software

It is made to run from removable storage such as a CD or USB flash drive

Program files do not exist on the hard disk

E.g. – Thunderbird (e-mail)

Page 21: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Web Application (Web app)

Software that is accessed with a Web browser

E.g. – Gmail, Yahoo!, Google Earth

Page 22: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Software Updates

Software publishers regularly update their software to add new features, fix bugs, and update its security

Types of software updates include new versions, patches, service packs.

Page 23: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Software updates

Software patches: small section of program code that replaces part of the software you currently have installed

Service pack is a set of patches that correct problems and address security vulnerabilities.

They are usually free

Page 24: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Uninstalling software

DOS – remove by deleting its files Windows and Mac OS – uninstall routine

which deletes the software’s files from various folders on your computer’s hard disk

Page 25: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Security software basics

Security software – protect comps from various forms of destructive software and unauthorized intrusions

Different types – antivirus, anti-spyware, anti-spam, and firewalls

Page 26: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Malware software

Any computer program designed to surreptitiously enter a computer, gain unauthorized access to data, or disrupt normal processing operations.

Viruses, worms, Trojans, bots, and spyware

Page 27: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Malware software

Created by hackers, crackers, black hats, or cybercriminals

Annoy, disrupt operations, identity theft, or organized crimes

Page 28: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Computer virus

Set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files

Viruses DO NOT spread themselves from one computer to another

Signs – displaying annoying messages to corrupting data on the hard disk

Page 29: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Computer worm

Self-replicating program designed to carry out some unauthorized activity on a victim’s computer

Can spread themselves from one computer to another without any assistance from victims

Mass-mailing worm spreads by sending itself to every address in the address book of an infected comp

Page 30: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Trojan horse (Trojan)

Computer program that seems to perform one function while actually doing something else.

Unlike a worm a Trojan is NOT designed to spread itself to other computers

Not designed to replicate

Page 31: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Trojan horse

Keylogger – steal password Remote Access Trojan – allow remote

hackers. Using a victim’s computer as a relay station for breaking into other computers

Page 32: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Bot / intelligent agent

Software that can automate a task or autonomously execute a task when commanded to do so

Behaves like a robot so it is often called bot Good bots – helpful Bad bots (zombies) – destructive Botnet – network of bot-infested comps

Page 33: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Spyware

Type of program that secretly gathers personal information without the victim’s knowledge, usually for advertising and other commercial purposes

Page 34: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

What does malware do?

Carry out a variety of unauthorized activities

How do you know if your comp is infected? Irritating messages or sounds Frequent pop-ups Slower response Missing files etc.

Page 35: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Rootkit and virus hoax

Rootkit - Software tools used to hide malware and backdoors that have been installed on a victim’s computer.

Virus hoax – warnings about a supposedly new virus on the loose

Page 36: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Security Suites

Combines several security modules to protect against the most common types of malware, unauthorized access, and spam.

E.g. – Norton 360

Page 37: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Antivirus modules

Type of utility software that looks for and eradicates viruses, Trojan horses, worms, and bots.

How does it work? Software scans for virus signatures in

programs, data files, incoming/outgoing emails and attachments, and inbound instant message attachments.

Page 38: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Antivirus modules

Antivirus software periodically need to be updated Might need a patch or update to fix bugs or

improve features List of virus signatures has to be updated to

keep up with the latest malware developments Virus definition – files that store virus signature

and other information used to erase malware

Page 39: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Antivirus modules

Use Antivirus to scan your computer frequently

Make sure that the virus signature is up to date

Page 40: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems

Summary

Software Application software Installing software The Window Registry Copyrights Malware Antivirus