Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.
-
Upload
jeffry-wilkinson -
Category
Documents
-
view
215 -
download
0
Transcript of Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.
![Page 1: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/1.jpg)
Lecture 4:Software
Tonga Institute of Higher EducationIT 141: Information Systems
![Page 2: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/2.jpg)
Introduction
Computer software determines the tasks a computer can help you get
Software helps you Create documents Block viruses Make your computer’s performance better
![Page 3: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/3.jpg)
Software Categories Computer program: instructions that tell a
comp how to carry out at task These programs software Software prepares a comp to do a specific
task (e.g. photo editing, virus protection, file management, or Web browsing)
Programs are written in a computer language that the computer can understand.
Typical languages might be called C, C++, Java
![Page 4: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/4.jpg)
Software Categories
![Page 5: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/5.jpg)
Application Software
Also known as an application or app Examples:
Productivity software Groupware: designed to help several people
collaborate on a single project using local networks or Internet connections
![Page 6: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/6.jpg)
Utility Software
Help monitor and configure settings for comp system equipment, the OS, or the application software
E.g. setup wizards, security software, diagnostic tools
Desktop widgets: desktop widgets include clock, calendars, sticky notes, etc.
![Page 7: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/7.jpg)
Device Drivers
Software that helps a peripheral device start communication with a computer
For printers, screens, modems, storage devices, scanners, sound cards etc.
![Page 8: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/8.jpg)
Document production software
Word processing software: MO Word Desktop publishing software Spreadsheet software: MO Excel Statistical software Database Software: MO Access
![Page 9: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/9.jpg)
Database Software
Database: collection of data that is stored on one or more computers
Database software helps you enter, find, organize, update and report information in a database.
Record holds data for a single entity Field holds one item of data relevant to
a record
![Page 10: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/10.jpg)
Other application software Graphics Software: Microsoft Paint,
Adobe Photoshop Music Software Video Editing and DVD authoring Educational and Reference Entertainment Business
![Page 11: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/11.jpg)
Buying software Essential applications
OS, browser, word processing, security suite, graphics viewer, drivers, entertainment.
Should ONLY have one security software Check system requirements Copyright: form of legal protection that
grants the author of an original work an exclusive right to copy, distribute, sell, and modify that work,
![Page 12: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/12.jpg)
Software license
Software license: agreement Single-user license limits use to one person at
a time Site license allows software to be used on all
computers at a specific location Multi-user license: allows allocated number of
people to use the software at any time Concurrent-use license allows a specific
number of copies to be used at the same time
![Page 13: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/13.jpg)
Different software licenses
Public domain software Proprietary software Commercial software Demoware Shareware Freeware Open source software
![Page 14: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/14.jpg)
Installing Software and Upgrades
Inside a software package there is an executable file with an .exe file extension, support programs with a .dll file extension, data files and sometimes share some common files with other software. This can be supplied by the OS.
![Page 15: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/15.jpg)
.exe
.txt.bmp.hlp
Processor
.dll.ocx
Installing Software and Upgrades
![Page 16: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/16.jpg)
Software Installation
Software installation: process that places a program into a computer so it can be used (run or executed)
Installation procedures depend on the computer’s operating system and whether the software is a local, Web, or portable application.
![Page 17: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/17.jpg)
Local Application
Local Application: software that is designed to stay on a computer’s hard disk.
Most local applications contain a setup program to show you how to install
![Page 18: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/18.jpg)
Windows Registry
This is database that keeps track of your computer’s peripheral devices, software, preferences, and settings.
When you install software on the hard disk, information about the software is recorded in Registry.
![Page 19: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/19.jpg)
This is a means of protecting software from illegal copying It requires users to enter a product key or activation code Can be activated over the phone or Internet
Product activation
![Page 20: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/20.jpg)
Portable Software
It is made to run from removable storage such as a CD or USB flash drive
Program files do not exist on the hard disk
E.g. – Thunderbird (e-mail)
![Page 21: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/21.jpg)
Web Application (Web app)
Software that is accessed with a Web browser
E.g. – Gmail, Yahoo!, Google Earth
![Page 22: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/22.jpg)
Software Updates
Software publishers regularly update their software to add new features, fix bugs, and update its security
Types of software updates include new versions, patches, service packs.
![Page 23: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/23.jpg)
Software updates
Software patches: small section of program code that replaces part of the software you currently have installed
Service pack is a set of patches that correct problems and address security vulnerabilities.
They are usually free
![Page 24: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/24.jpg)
Uninstalling software
DOS – remove by deleting its files Windows and Mac OS – uninstall routine
which deletes the software’s files from various folders on your computer’s hard disk
![Page 25: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/25.jpg)
Security software basics
Security software – protect comps from various forms of destructive software and unauthorized intrusions
Different types – antivirus, anti-spyware, anti-spam, and firewalls
![Page 26: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/26.jpg)
Malware software
Any computer program designed to surreptitiously enter a computer, gain unauthorized access to data, or disrupt normal processing operations.
Viruses, worms, Trojans, bots, and spyware
![Page 27: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/27.jpg)
Malware software
Created by hackers, crackers, black hats, or cybercriminals
Annoy, disrupt operations, identity theft, or organized crimes
![Page 28: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/28.jpg)
Computer virus
Set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files
Viruses DO NOT spread themselves from one computer to another
Signs – displaying annoying messages to corrupting data on the hard disk
![Page 29: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/29.jpg)
Computer worm
Self-replicating program designed to carry out some unauthorized activity on a victim’s computer
Can spread themselves from one computer to another without any assistance from victims
Mass-mailing worm spreads by sending itself to every address in the address book of an infected comp
![Page 30: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/30.jpg)
Trojan horse (Trojan)
Computer program that seems to perform one function while actually doing something else.
Unlike a worm a Trojan is NOT designed to spread itself to other computers
Not designed to replicate
![Page 31: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/31.jpg)
Trojan horse
Keylogger – steal password Remote Access Trojan – allow remote
hackers. Using a victim’s computer as a relay station for breaking into other computers
![Page 32: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/32.jpg)
Bot / intelligent agent
Software that can automate a task or autonomously execute a task when commanded to do so
Behaves like a robot so it is often called bot Good bots – helpful Bad bots (zombies) – destructive Botnet – network of bot-infested comps
![Page 33: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/33.jpg)
Spyware
Type of program that secretly gathers personal information without the victim’s knowledge, usually for advertising and other commercial purposes
![Page 34: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/34.jpg)
What does malware do?
Carry out a variety of unauthorized activities
How do you know if your comp is infected? Irritating messages or sounds Frequent pop-ups Slower response Missing files etc.
![Page 35: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/35.jpg)
Rootkit and virus hoax
Rootkit - Software tools used to hide malware and backdoors that have been installed on a victim’s computer.
Virus hoax – warnings about a supposedly new virus on the loose
![Page 36: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/36.jpg)
Security Suites
Combines several security modules to protect against the most common types of malware, unauthorized access, and spam.
E.g. – Norton 360
![Page 37: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/37.jpg)
Antivirus modules
Type of utility software that looks for and eradicates viruses, Trojan horses, worms, and bots.
How does it work? Software scans for virus signatures in
programs, data files, incoming/outgoing emails and attachments, and inbound instant message attachments.
![Page 38: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/38.jpg)
Antivirus modules
Antivirus software periodically need to be updated Might need a patch or update to fix bugs or
improve features List of virus signatures has to be updated to
keep up with the latest malware developments Virus definition – files that store virus signature
and other information used to erase malware
![Page 39: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/39.jpg)
Antivirus modules
Use Antivirus to scan your computer frequently
Make sure that the virus signature is up to date
![Page 40: Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.](https://reader035.fdocuments.us/reader035/viewer/2022062516/56649de55503460f94add924/html5/thumbnails/40.jpg)
Summary
Software Application software Installing software The Window Registry Copyrights Malware Antivirus