Sie sind auf Seite 1von 38

TOPIC #2

COMPONENTS OF THE
COMPUTER SYSTEM
ICA | Institute of Computer Applications
Topic Objectives

• Discuss the difference and functions of the types of software.


• Identify and understand the behavior of computer malwares.

ICA | Institute of Computer Applications IT74| IT App Tools in Business


SOFTWARE
• System Software
• Application Software
• Malwares

ICA | Institute of Computer Applications IT74| IT App Tools in Business


Operating System (OS)

User OS Hardware

ICA | Institute of Computer Applications IT74| IT App Tools in Business


Booting
• Booting is the process that occurs when you press the
power button to turn your computer on.
• It runs tests to make sure everything is working correctly.
• It checks for new hardware.
• It then starts up the operating system.

• Once the operating system has started up, it manages


all of the software and hardware on the computer.

ICA | Institute of Computer Applications IT74| IT App Tools in Business


Operating System

Manages user files Manages installed programs

Provides interface Configure equipment


ICA | Institute of Computer Applications IT74| IT App Tools in Business
Operating Systems - Desktop
Microsoft Windows Operating
System is the most used
operating system in the world.

Most Popular OS versions:


Windows 10 (latest), 8 and 8.1,
7 and XP

ICA | Institute of Computer Applications IT 23/21 | IT / Computer Fundamentals


Operating System Windows 10

ICA | Institute of Computer Applications IT 23/21 | IT / Computer Fundamentals


Operating System - Desktop
Mac OS is a line of operating
systems created by Apple Inc.
which comes pre-installed to
Macintosh products.

Popular versions:
Snow Leopard, Leopard, Lion,
Yosemite and El Capitan (latest)

ICA | Institute of Computer Applications IT 23/21 | IT / Computer Fundamentals


Operating System

Mac OS X
Sierra

ICA | Institute of Computer Applications IT 23/21 | IT / Computer Fundamentals


Operating System - Desktop
Linux is a free and open source
operating system. Unlike the
other OS’es, it can be distributed
and modified by anyone in the
world.

Popular distributions:
Ubuntu, Mint, and Fedora

ICA | Institute of Computer Applications IT 23/21 | IT / Computer Fundamentals


Operating System

Ubuntu OS
ICA | Institute of Computer Applications IT 23/21 | IT / Computer Fundamentals
Desktop OS user distribution
Desktop Operating System Market Share (NetMarketShare)

ICA | Institute of Computer Applications IT74| IT App Tools in Business


Operating System - Mobile

Android Nougat iOS 9 Windows 10 Mobile


(Google) (Apple) (Microsoft)
ICA | Institute of Computer Applications IT74| IT App Tools in Business
Operating System - Server

Solaris Mac OS X Server Windows Server


(Suns Microsystems) (Apple) (Microsoft)
ICA | Institute of Computer Applications IT74| IT App Tools in Business
Software Installation
Software installation is a process to
incorporate/add additional features to your
computer.

ICA | Institute of Computer Applications IT74| IT App Tools in Business


Software Installation - License
• Public Domain Software
• Commercial Software
• Freeware
• Shareware
• Open Source Software

ICA | Institute of Computer Applications IT74| IT App Tools in Business


INSTALLATION PROCESS INSTALLER

A compressed file used to


add the software files to a
computer. This will be
extracted and save to the
computer system during
the installation process.

ICA | Institute of Computer Applications IT 23/21 | IT / Computer Fundamentals


INSTALLATION PROCESS EULA
(End User License
Agreement)

The specification of the


terms and conditions in
using the software (this is
required to be agreed upon
installation of a software)

ICA | Institute of Computer Applications IT 23/21 | IT / Computer Fundamentals


INSTALLATION PROCESS
Activation Key /
Product Key
(keygen)
A sequence of numbers
and/or letters used by
software developers to
verify the purchase of the
software (this is required
for commercial software)

ICA | Institute of Computer Applications IT 23/21 | IT / Computer Fundamentals


INSTALLATION PROCESS Activation Key /
Product Key
A sequence of numbers
and/or letters used by
software developers to
verify the purchase of the
software (this is required
for commercial software)

ICA | Institute of Computer Applications IT 23/21 | IT / Computer Fundamentals


INSTALLATION PROCESS
Installation Location

ICA | Institute of Computer Applications IT 23/21 | IT / Computer Fundamentals


Software Installation - Terms
CRACK
Alpha version
Beta version
Release to Manufacturing (RTM)

ICA | Institute of Computer Applications IT74| IT App Tools in Business


MALWARE
• short for Malicious Software
• this is created to disrupt computer
operation or gain access to private computer
systems

ICA | Institute of Computer Applications IT74| IT App Tools in Business


Types of Malware
VIRUS
> A program or piece of code that is loaded
onto your computer without your knowledge
and runs against your wishes.
> Viruses can replicate and all manmade

ICA | Institute of Computer Applications IT74| IT App Tools in Business


Types of Malware
TROJAN HORSE
> A Trojan Horse program has the
appearance of having a useful and desired
function.
> A Trojan Horse neither replicates nor copies
itself, but causes damage or compromises the
security of the computer.

ICA | Institute of Computer Applications IT74| IT App Tools in Business


Types of Malware
WORM
> A computer worm is a self-replicating
computer program.
> It uses a network to send copies of itself to
other nodes (computers on the network) and it
may do so without any user intervention.
> It does not need to attach itself to an existing
program.

ICA | Institute of Computer Applications IT74| IT App Tools in Business


Types of Malware
SPYWARE
> Spyware is a type of malware installed on
computers that collects information about
users without their knowledge.

ICA | Institute of Computer Applications IT74| IT App Tools in Business


Types of Malware
ZOMBIE
>Zombie programs take control of your
computer and use it and its Internet
connection to attack other computers or
networks or to perform other criminal
activities.

ICA | Institute of Computer Applications IT74| IT App Tools in Business


Types of Malware
PHISHING
> Phishing is a message that tries to trick you
into providing information like your social
security number or bank account information
or logon and password for a web site.

ICA | Institute of Computer Applications IT74| IT App Tools in Business


Types of Malware
SPAM
>Spam is a common way to spread viruses,
trojans, and the like.

ICA | Institute of Computer Applications IT74| IT App Tools in Business


Types of Malware
ADWARE
>Adware (short for advertising-supported
software) is a type of malware that
automatically delivers advertisements.

ICA | Institute of Computer Applications IT74| IT App Tools in Business


Types of Malware
RANSOMWARE
> Ransomware is a form of malware that
essentially holds a computer system captive
while demanding a ransom.

ICA | Institute of Computer Applications IT74| IT App Tools in Business


How Malware infects Computers?
➢ Social Network
➢ Pirated Software
➢ Portable storage devices
➢ Email
➢ Websites

ICA | Institute of Computer Applications IT74| IT App Tools in Business


Damage of Malware

➢ Data Loss
➢ Account Theft
➢ Financial Losses

ICA | Institute of Computer Applications IT74| IT App Tools in Business


Symptoms of Malware
➢ Slow computer or web browser speeds
➢ Freezing or crashing
➢ Modified or deleted files
➢ Appearance of strange files, programs,
or desktop icons

ICA | Institute of Computer Applications IT74| IT App Tools in Business


Anti – Malware Software
➢ Anti virus program
➢ Anti-spyware program
➢ Anti-spam program
➢ Firewall

ICA | Institute of Computer Applications IT74| IT App Tools in Business


REFERENCES
• A First Course Toward Digital Literacy, Microsoft Digital Literacy (E-Learning), Microsoft Inc.
• Computer System Components: Computer Parts & Functions, Information Systems: Help
and Review, Study.com, Accessed on August 1, 2016, Information Systems: Help and Review
• Computer Basics, Understanding Operating Systems, GCF Learn Free, Accessed on August 1,
2016, GCFLearnFree.org
• Malware, CSCA0101 Computing Basics, Accessed on August 1, 2016,
https://www.google.com.ph/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0ahUKEwi
70rjY5bjOAhUFEpQKHW_NDyAQFggcMAA&url=http%3A%2F%2Fwww.ftms.edu.my%2Fimages
%2FDocument%2FCSCA0101%2520-
%2520Computing%2520Basics%2Fcsca0101_ch07.pdf&usg=AFQjCNGGRresBLKO08Dt3vSWM
O8Dg7kHpA&bvm=bv.129422649,d.dGo
• 32-bit and 64-bit Windows: Frequently asked questions, Microsoft FAQ, Accessed on
August 1, 2016, https://support.microsoft.com/en-us/help/15056/windows-7-32-64-bit-faq

ICA | Institute of Computer Applications IT74| IT App Tools in Business

Das könnte Ihnen auch gefallen