0 ratings0% found this document useful (0 votes) 48 views11 pagesComputernotes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
vilen Soffeoare. a = ‘ —
7 ilo co —_
O| Sytem softoay @ catlinn Sofhoarre
@ erating TT General [|
system”, . [pape soffube |
; : : ee
Lagan |
al px ester ‘
|G taniaed |
OM itilities Sof fuera
& Types of Soltoase
@ Sy lem _softoare “is sxasponsible fx managing
ling haxdwave ces so that oth
4 Fs of systoon Ptoae
@ Operating Systoro
: = 1s most ‘nga fh basic scl of
cftionre x quived for “computer fo Lundin.
= Tt. hard inaxe
muovides same common servicer Jou the users.
! = Receiving: inpi
tp tt ine gp
Ed Keeping track ef Liloe Lb dinedtonia
nthe hod dik (other dosage adeutees
8 poou!
b, sniot- pp on
See ee ee ees ———___
riglite
= fay / Dos, Uni Windeos , Line bud :
O (Language Proesica
=A comprilor program ig created!
LL such C4 Java, Dy ther
~The Indices in there programs,
cana he seccale i by the compute they need.
convex a HLL mograna “info the machi
xara tae, an *b% yun ona caapuer.
@) tits nel
xeadt each en of the: scurce protan,
cee ib ee atte anguoge. and tan oxenite jt
can interpreter.
convert all’ insbrustims 7 HLE magia,
n ot one. gn: 4
Ge ¢ Crt
Uh, Progam
= High level language
te OF
are ctivare oman that ave used)
Ge day Ti day mnidmice and efit sunning ab
atonghle gdm cuca Lada iy ae
stim
Fat Nostin Antivir, Pg enktion
Disk clean ip
plois asél of one O41 move. prog
used ta_penfcuma a spel ask. ex. mai 2
apelcatiod_» =e Steet pe
ages (Ms Petal), Stock Cabral Product defails Sold,
belting - sf tivare pms: in ovganpat'
abet a came i ization, at
Comptnioa
5
Type el Application Sofhnace
U
OSpaihic_purpare oy Cuilomized solhoavre
u especte » solve ar
al css an_indivi
organization.
_
AGenval purpose Softioare ~
to selve commen promo
such 4 formatting Jat, Creating table / chash’, graphy
MS Offs suite tneluds Ms Word
Mc feel & Ms Poroerpoint -
GQ.
D What is pcan)
i) Lh afte ?
“i) What tre Types af solfioare 7
w) Wail « pele on System Software .
v) While eo note _en “Language Processor.
vi) Write _noli_one Nbhy Ary Lijit Paoprares
vw) Write notion Anpbattion re
{>——fompul ns—are_conneed log relher with Lhe. objedin
——Llike_prinles: ing ‘swith__each_al
— le he elioorbed. Such, compiler selisp is “c allel =
——__ Computer Neda se
| 7 or_mow
—cormunieciting | —_anel Linh eal
er _then they axe_said
«A complex thet is _ok cannecled fo any oll
cll Glink He splec. ig—
+ Tues of — Compuilor_Nefwork
— Loci Area Netioork (LAN)
isthe anus ne aad in
which the computor are located ~ pithin a chovt
distance Like “a room building ox campus * 4
tx. ben is_of 2 nelal
Tn Office a
Tn_LAN _comn ubers are social pl. using «
+ LANs ate. generally oda chy alae (penn ox
uaa Lines” of Uoiees
fata is ‘transferred at:
cxxgan| ation)
@ Metropolitan Prea_Netiverh (MAN)
ree
connec cal OF 6.
nelives fo i the lane “of a cify.
ff cover _an ‘ oka. city /faton
- A ae bx_an rganizalion reually one this
nthuoox!
eTt_prevides a high =speed —_cennedisily avd date tiansfer
vole
+b capes fiat te its olf
id at_drecls of cibiy ave pelworked or
When aa ers of an caganisalione that pas ite
aoe in soul ipl cities _axe™ connected then they will
wm MAN.—@ Wide oo Heionh Cian) I
= lage qecgpphicl
aren such ac” “Zo corti nent. *
= Grnected using Telephone tones or seilellite
= rranstenved sou speed than LN.
& Advurlages of Mpa
1 ci red
in Ly hit Span “gi tim .
fre" fast oommounicabions
2) Th is moans
2c, ial Coat inslantly
Db sales scot of Co! ub. hardeoare, rrequuived
in co ee
ox. ingle rainkere cain be Ceca amaeng all
bs itd 5
i n | eseeverhie
cupplice
x Disadvantages of Nilo
@ Sault (eget comple ccun ing the coli
neltoonh eople + may nat “se ahle to wor.
@ People on delete dd ro misuse if no secuitity
@ Thveate form Gompuiler Vireser -
@ Costly. :—Dala Tremsmission
TD oclinah ie aueabed (gu —the- unpre ch
——_Avansmittine lh a on _inlondlion fvore_one. “chrnpullne
fo anathir. =
To_ovdex ford Ai ‘transmission fo _orcure, =
dlablished helineon __—
mmuntection chen
_the ture machines «
=hhi channel an be oslablished hy sing
Lol re le lant de, nt
ith . x
upon Lind a dela required ab hh peeomttted the
y Wired neti ring fecha
et 2iied —sshere the dal
is Lean wit Paro the place. te another ibaugh
a (poual peda a tale whve hen ence culled wired»
Goa ae
Wiveless fuel
—dheL at rommunieattion
is
hat uses Cebechrarnagnstl < maven (like ‘Infraved,
microwave; and ‘radio waves). ti —tran it a
h n ni bles fence
the name tnixel
7 tik
a thleréd Chat didaace a Siiete tod)
ov connects
ae 0. spoabe: ‘le phones at Timited
wie {i Tie todead fect Laplops smart phoney
omait TV... reduces cot Hoxil 2Q ee
@(
Thue Fake) Se
DA comput nélwork xeducee the cost of computer
hardware. "tn a nelwork —
§1) Lh onnnuil ih
~ firm Wide ren Nebdork
@ The clive! pana La gecpraphical
area, connecting rountries: and continents
@ MAN stands 7 for
© ful form of LAN 5
&® ih “Lyp f netiven firmed whent Conpitere
A Nnecce. !
© lhich tyne of: network twill be foomed when 1 snplfors
of Delhiv” Mumbai lp Pune Waris ave connected )
at
Se LS) [ a N.
| @ Live Lino - exaraple Lan
@ What me didnnce Limit in Law and loaw
(@ Whet is Lan? -& or MAN ov WAN.
@ ba high geod netioork «
@ The Internct is" the —‘huorld's largest :
2) is_miethod where th! data is transnitiad)
Kom one. place te avether throu a thy ica medi unr
0 Mesilion Tio types of Data transmiscion with examples:
lat is Compe Niwa ) Uthat exe lift “lypes of canal
network,= 7 ya Salt . —
——_ Today, ove: im seems iets using lhe Internet 4
- Sox one pi adapta ‘oa the other (like com wil nous
chamele “shonping wehsiter advertise their pwducts _ -
some use email’ andl a
Whi cg all “Tees thing: we _selden seals
‘Whol is Cyber Threat }
D_Goker Threat js any act ox incident
woladed tothe tyher werd ox Tita thal can cau
ontpuler z ; a: :
| for ex, (ompuler ming unctable, computer Le
|__aating leleed, cxtial_pexs nal? informuition = being: chon abe.
|
Some common Cyhen Threat =
OMalware (Malicious software \
isa wliware thal is used to disrupt omoiitr
operation goiter sensitive. inhumadlion or gain aces fy
| vale Ampuiter systems
! @ Virus’ -
A compulor virus isa sebhivaxe Srogram
it taal an sepia tell and _cpread from -one computor
d viti et:
mally fle
| i) Worn =
| ~ is @ software param thal” activel
| frapsmits itself’ owr a neluoork “to inlec! a compilers
bil tunlibe « virus if has the capability travel.
without “any human _atlion
(@Tivian Horse -
~ eg version of virus programmed
to deceive the utex by appearing t6 be a aonuin
Nee image. ac vider. Whtn wed if devbum maliious adivil,— era /
Teh, nabs Pal Tr ae +
Like mabing copies ol iksol!’ toa ing information oe ly ening
L J
heir he cute J
A Spyware
includes softioase thal aw installed on
iz oars hil aw
lormattio joure Compule
Y
——0n_omotder to
waitfoat yous bnaalidge
~pan
While using email, wa sqra_unworilad 2mails
came te vou mw muling some. produél which moy 23.
genuine % ees. These unweuiled email ave “cotfoo
at Spam
Heching
agains individuals or oreuntyations
wv Criminal Hacking _'s [Soko4]
The_mmress of breabing inla rompuler networks
nd sollecind the personal delaile of othoxs iit is dane
tux ethical * yoason's ie called hacking
However, if i is ‘done with mal = inteat it is called
cracking -
* Criminal, Hackers or (Crackers vise hachino
Upon as & crime
x Phishing
Sis atjeot Gime, where Fraudulent websin
ase wed to trick” vou into giving away conftsentral personal
intormalion such as ‘credit cand fumbers, accund werrame,
and passwords ---
A phishing attempt usually huts with an ome!
asbing you by click on a web link to check somefuing
apd} "your hank account :ASably Prowasing the Web
Some lafely lips
OQ Avoid guegherable Cavhsile:
a - mind ful of the att yo. tink lich
aN Th fall Dal Vu lo are Run virus Seen perielr
ally Dse Broweille .
Download ” coftivare fam truded sites only.
A be taudhiour while giving oul _pexsonal _cléteile
a_lhat ts a Secuye Website ?
A = website je cre thet uses: an evtra_/;
F (tunity (1 bnown as the S§LiSeure Sochel layer) to
hosp youre Sen tive action wake J
ex, https :'6'stends fr becure?
# How to Prilect your Taeritih,’?
Mabe cure you sect privacy celina: xa fhe
te _cuck ur clo ie Sem
your iabrmiation
Pastword
“Pry _impovlant step te protecting Your ingamakiry
online and on your cena Uhre Password
Make sunt that your Musword ts set shrora_ mixedl
with caps) Hlowercas Its, numbers Oh symbols
+o oot ie come passmord fey cliflowent accourth
+ Don't shave Your! password +
+ Je sure no ono watthos you when you enter your
Pass Loon :ips a criminal procter, col
Tatenet te syle meitica lly “har
e x Cyber sfidbing is_one of several dybercrimes that
have been nabbed by the Tndonnot. Tt overlaps with
cy her bullying wher luring in thet in any one of
them almost” the tame techniques ave _useo! for
A vidtin of y hex Stalking should fates Kllowing
topos
OTE you cxe_minor, inform your parasite about
Hy tharaccmen’ ox Soma. elie adult you truck
@ ble a wmplint with the ryher cfatber's a
& (olled widene, document of
it to laol baw pnrkgrcement p Teche ae leged
wos to slap Ee SMtelkor
@
In Case of the Gher Crime
the vicina should “preserve and ~ alewohes Aewatslacel
all the digita) eviolences a Tipe.
creen shafts, videos, Enreilt
“The vidtem Shoulel contact 9 lodge & hrmal
imine! emplaint with the local police,
The laced police will gutele or hand ‘over the car
te the bir rath, por fuatier. psrocess and legal odion.
inst fhe primi
a nad