Beruflich Dokumente
Kultur Dokumente
LANGUAGE TRANSLATORS
Functions of Operating System A type of system software that translates the source
Following are the functions that an operating system typically code (program) of a computer programming language
performs. into machine language code (i.e. 0 and 1 form).
CUSTOM SOFTWARE
A Company some times may use a programmer to develop
software, because it does not find the packaged software FLOW CHARTS
that meets its unique requirements. This type of software
is called custom software.
There is no license to use custom software.
Flowcharts
SHAREWARE A flowchart is a pictorial / graphical representation of
Shareware is Copyrighted software that is distributed the logic or sequence of steps that solve a problem.
free for a trial period. Flowcharting helps the programmer and system designer,
To use a shareware program beyond that period, you send design an effective system. The graphical representation
a payment to the person or company who developed the of statement/sentences instead of writing them is more
program. effective and easy to understand.
Two common types of flow charts are the program
flowchart and the system flowchart.
FREEWARE
Those software, which are provided at no cost to users by
an individual or a company. PROGRAM FLOWCHART
Freeware are copyrighted. Thus programmers cannot A program flowchart is a chart consisting of some
incorporate freeware into their own applications they graphical symbols that presents the detailed series of
intend to sell. steps (algorithm) needed to solve a programming
problem.
The program flowchart uses standard symbols called
PUBLIC-DOMAIN SOFTWARE ANSII symbols, after the American National Standard
Institute, which developed them.
Free software but it has been donated for public use and Symbols of program flowchart and their uses are given
has no copyrighted restrictions. below.
Any one can copy or distribute public domain software
to others.
Symbol Name Use
Start
Oval shaped symbol indicates the
Terminal beginning (start) and end of the
program Input Property
Rectangular shaped symbol Value
Example 2
Process represents a process e.g. calculation
or assigning a value to a variable
Parallelogram shaped symbol
represents any statement that causes False Value > True
Input / data to be input to a program or 100,000?
Output output from the program, such as
printing on the display screen or
printers
Diamond shaped symbol indicates
program decisions. Adecision Calculate Tax = Calculate Tax
indicates a question (condition) that Value x .12 = Value x .15
Decision can be answered (checked) yes or no
(true or false). A decision symbol can
be used for more than alternative
decisions.
This symbol indicates a group of
Predefined statements that together accomplish
Process one task. Used extensively when
programs are broken into modules. Print Property
Small circular shaped symbol Tax
eliminates the use of lengthy flow
Connector
lines. It represents the one symbol is
connected to another.
Stop
This symbol represents entry from or
Connector exit to another part of the flowchart
on a different page.
These lines and arrows are used to
connect symbols and indicate the SYSTEM FLOWCHART
sequence/flow of operations. The The graphical representation of the sequence of physical
Flow Lines
flow is assumed to go from left to devices used to solve a problem.
&
right and from top to bottom. The following symbols are commonly used to design a
Arrowheads
Arrowheads are only required when system flowchart.
the flow violates the standard
direction.
This symbol represents additional
Comment / Symbol Name Use/Purpose
descriptive information about the
Annotation
program.
Punched Represents the reading or punching
Card of a punch card deck.
Represents innput and output of the
The following examples illustrate the concept of Punched
punched paper tape. Contains the
flowcharts. Paper Tape
name of the file in use.
Start Magnetic
Tape Represents input and output of the
Example 1 MAIN (Sequential magnetic tape. Exact use is specified
Access inside in the symbol.
Storage)
Input Name
Represents input and output of data
Magnetic
through a magnetic disk. Exact use is
Disk
specified inside the symbol.
Represents input and output of data
Name = True Any Direct
through a direct access storage
”NOOR”? Access
medium. Exact use is specified
Storage
inside.
HARDWARE THEFT
PUBLISHING
The act of stealing computer equipment. Notebook
The process of making work available to the public, e.g. computers and other small sized but precious computers
are easy to stole. Many organizations now secure their
Books computer equipment with steel cables locking the
Magazines computer or other peripherals to the desk or other thing.
Newspapers Hardware vandalism is the act of defecting or destroying
computer equipment.
Special software assists publishers in designing pages
that include text, graphics, and photographs.
Journalists carry notebook computers, mobile devices SOFTWARE THEFT
and digital cameras to capture and record news as it The act of stealing computer programs from remote
occurs. computers in a network, just right into their computers
In addition to printing material, many publishers make the without getting the permission to use them (copyrighted
content of magazines and newspapers available online. software).
Some Web-sites allows you copy an entire book to your
desktop computer, handheld computer or PDA.
INFORMATION THEFT
Information theft is the act of stealing personal or
COMPUTERS IN HOME confidential information of others. Both business and
Children play games, draw pictures, play music, view home users can fall victim to information theft.
movies and do some sort of reading and writing. A corrupt individual may steal credit-card numbers to
E-mail/ Internet make fraudulent purchases.
Calculations Safeguard against information theft is the encryption
Robots are used in homes to assist human beings. of data and information. Encryption is the process of
converting readable characters, into unreadable character
to prevent unauthorized access. To read the data the
recipient must decrypt it into readable form.
MISUSES OF COMPUTER (COMPUTER CRIMES)
TIME AND SERVICES THEFT
SOFTWARE PIRACY People using their employer’s computer time
The biggest illegal issue affecting the computer industry
to play games
is software piracy.
do online shopping
Software piracy is the illegal copying of computer
dip into web pornography
programs and operating systems. Illegal copying means
playing movies and music
duplications of copyrighted software.
chatting
to see/browse non-ethical web-sites
MALICIOUS PROGRAMS Logic bomb – Logic bombs, differ from other virus types
in that they are set to start infection at a certain date,
Programs that act without a user’s knowledge and
time or event (for example, a change to a file).
deliberately alter the computer’s operations.
Stealth Viruses – These viruses hide their damage
from the user and the operating system.
Joke Programs – They are not real viruses. People use
Worms, Viruses and Trojan horses Joke programs only to frighten their victims into thinking
that a virus has infected and damaged their system.
WORMS
A program that copies itself repeatedly into a computer’s TROJAN HORSE
memory or onto a disk drive may be in a network.
Trojan horse is a malicious program that appears to be
Some times it will copy itself so often that could cause a
friendly. For example, some Trojan Horses appear to be
computer to crash. It can spread to multiple computers in
games.
a network.
A certain condition or action usually triggers the Trojan
Worms are spread over the Internet via e-mail message
horse.
attachments and Internet Relay Chat (IRC).
Unlike a virus or worm, a Trojan horse does not copy
Examples
itself to other computers. FormatC is one example of
Trojan horse.
Code Red – primarily affected Windows NT and 2000
system
Sir Cam – primarily passed through infected Outlook Note
e-mail attachments Malicious programs are one of three types (virus,
Nimda – Windows NT or 2000 machines fill victim of worm, Trojan horse), but some programs have
this worm characteristics of two or all three types. For instance,
Melissa is having the characteristics of all the three
VIRUSES malicious programs.
Correctly more than 62,000 known viruses, worms
A potentially damaging computer program that infects
and Trojan horse programs exist with an estimated 6
a computer and negatively affects the way the computer
new programs discovered each day.
works without the user’s knowledge or permission.
A virus stores on computer hard drive and can cause Virushoax (also called Virus alerts) is an e-
destroying or corrupting data. mail message that warns users of a non-existent
Once the virus infects the computer, it can spread virus, worm, or Trojan horse. Often these virus
throughout and may damage files and system software, hoaxes are in the form of chain letter that requests
including the operating system. the user to send a copy of the email, to as many
people as possible.
Virus Types
Boot Sector Viruses – Boot sector is the part of the Symptoms of virus-infection
system software containing most of the instructions for Screen displays unusual or annoying message or
booting or powering up the system. The Boot Sector image
virus replaces these boot instructions with some of its Music or unusual sound plays randomly
own. Once the system is turned on, the virus is loaded into Available memory is less than expected
main memory before the operating system. From there it Existing programs and files disappear
is in a position to infect other files. Any diskette used in Files become corrupted
the drive of the computer then becomes infected. When Programs or files do not work properly
that diskette is moved to another computer, the contagion Unknown programs or files mysteriously appear
continues. Examples are AntCMOS and AntiEXE. System properties change
Cluster Viruses – Makes changes to a disk’s file system.
Cluster viruses creates the illusion that the virus has How malicious programs are passed?
infected every program in the disk. By diskette
File Viruses – Attach themselves to executable files By network
(.EXE, and .COM). Executable files (also called program
files) are those that actually begin a program. Thus File
Viruses infects program files.
Multipart Viruses – A hybrid of the file and boot-
sector types. These viruses infect both files and boot
AntiVirus Software
sectors, which makes it better at spreading and more Software used to detect and destroy malicious
difficult to detect. Examples are Junkie and Parity Boot. programs is called AntiVirus software.
Macro Viruses – Miniature programs called macros, are Antivirus software protects a computer against viruses,
embedded inside common data files, such as those worms, and Trojan horses by identifying and removing any
created by e-mail or spreadsheets, which are sent over of them found in memory, on storage media, or on
computer networks. Examples are incoming files.
Examples of AntiVirus software are given below.
Concept – attaches to Word documents and E-mail AVG AntiVirus
attachments. Command AntiVirus
Laronx – attaches to Excel spreadsheet files. F-Secure AntiVirus
McAfee Virus Scan
Fortunately the latest versions of Word and Excel Norton AntiVirus
come with built-in macro virus protection. RAV AntiVirus
Trend Micro PC-cillin
Binary Number System
TOPIC 8
Binary means two. Thus in this system only two digits or
symbols are used (0 and 1). 0 for computer means power
off and 1 means power on.
NUMBER SYSTEMS
Base
Maximum value of a single digit
-
-
2
1
The two basic digits represent first two numbers (0 and 1)
Placing the basic digits in certain pattern/positions
represents other numbers. (E.g. 110 mean six and 111
Every computer stores numbers, letters and other special
mean seven).
characters in a coded form. Before going into the detail of
Each basic symbol/digit in the number represents a power
these codes, it is essential to have a basic understanding
of the Base – 2. For example, 111 or 7 (in decimal
of the number system.
system) can actually be expressed as:
A number system is a term used for a set of different
symbols or digits, which represent values.
Basically there are two types of number systems. 1 1 1
1 x 22 1 x 21 1 x 20
4 2 1 4+2+1=7
NON-POSITIONAL
This method/system uses an additive approach or non-
positional number system. In this system, we have Octal Number System
symbols such as I for 1, II for 2, III for 3, IIII for 4, IIIII Octal means eight. Thus eight basic digits or symbols are
for 5, and so on. Each value represents the same value used. (0 to 7)
regardless of it position in the number and the symbols Base - 8
are simply added to find out the value of a particular Maximum value of a single digit - 7
number. The eight basic digits represent first eight numbers (i.e.
Used in the early days from 0 to 7)
Difficult to perform arithmetic operations Placing or positioning the basic eight digits in a proper
order represents other numbers. (E.g. 15 mean thirteen
POSITIONAL
and 51 mean forty-one).
Each basic digit or symbol in the number represents a
In a positional number system, there are only a few power of the Base – 8. For example, 51 or 41 (in decimal)
symbols called digits, and these symbols represent can actually be expressed as:
different values depending on the position they occupy in
the number. 5 1
The following two characteristics of positional number 5 x 81 1 x 80
system, you must keep in mind. 40 1 40 + 1 = 41
From Binary
Example #1 110012 = ?10
1 1 0 0 1
1 x 24 1 x 23 0 x 22 0 x 21 1 x 20
16 8 0 0 1
110012 = 16 + 8 + 0 + 0 + 1 = 2510
1 1 1 0 1
1 x 21 1 x 20 1 x 2-1 0 x 2-2 1 x 2-3
1x2 1x1 1 x 0.5 0 x 0.25 1 x 0.125
11.1012 = 2 + 1 + 0.5 + 0 + 0.125 = 3.62510
From Octal
Example #1 47068 = ?10
4 7 0 6
4 x 83 7 x 82 0 x 81 6 x 80
2048 448 0 6
47068 = 2048 + 448 + 0 + 6 = 250210
Example #2 1.528 = ? 10
1 5 2
1 x 80 5 x 8-1 2 x 8-2
1x1 5 x 0.125 2 x 0.015625
1 0.625 0.03125
1.528 = 1 + 0.625 + 0.03125= 1.6562510
From Hexadecimal
Example #1 1AC16 = ?10
1 A C
1 x 162 A x 161 C x 160
1 x 162 10 x 161 12 x 160
16 160 12
1AC16 =16 + 160+ 12 = 42810
5 1 A
1 x 160 1 x 16-1 A x 16-2
1 x 160 10 x 0.0625 10 x 0.00390625
5 0.0625 0.0390625
5.1A16 = 5 + 0.0625 + 0.0390625 = 5.101562510