Application software programs are designed to help users perform tasks like word processing, accounting, graphics, and more. There have been five generations of computers from the first using vacuum tubes to today's devices using artificial intelligence. Computer viruses can damage systems and spread through infected files or removable media. Antivirus software, backups, encryption, and access controls help enhance computer security.
Application software programs are designed to help users perform tasks like word processing, accounting, graphics, and more. There have been five generations of computers from the first using vacuum tubes to today's devices using artificial intelligence. Computer viruses can damage systems and spread through infected files or removable media. Antivirus software, backups, encryption, and access controls help enhance computer security.
Application software programs are designed to help users perform tasks like word processing, accounting, graphics, and more. There have been five generations of computers from the first using vacuum tubes to today's devices using artificial intelligence. Computer viruses can damage systems and spread through infected files or removable media. Antivirus software, backups, encryption, and access controls help enhance computer security.
Application software programs are designed to help users perform tasks like word processing, accounting, graphics, and more. There have been five generations of computers from the first using vacuum tubes to today's devices using artificial intelligence. Computer viruses can damage systems and spread through infected files or removable media. Antivirus software, backups, encryption, and access controls help enhance computer security.
Download as PPTX, PDF, TXT or read online from Scribd
Download as pptx, pdf, or txt
You are on page 1of 23
DAR ES SALAAM MARITIME INSTITUTE (DMI)
COMPUTER SYSTEM AND APPLICATION
BOGE 1/BMTNS1 APPLICATION SOFTWARE
Application Software is a computer program designed to help people
perform a certain type of task. An application thus differs from an operating system (which runs a computer), a utility (which performs maintenance or general-purpose tasks), or a language translator (with which computer programs are created).
Different computer programs with their areas of application
Word processing- WordPad, Word perfect, WordStar, Microsoft word Budgeting accounting-Lotus 1-2-3, Microsoft excel, Databases-oracle, Microsoft excel, Corel Paradox, dBase, SQL Graphics-CorelDraw, Adobe Photoshop, Jasc Paint Shop Pro, Instant Artist, Print Artist Seminar presentation-PowerPoint Engineering drawing -AutoCAD, ArchiCAD, electronic desktop Statistical analysis - SPSS, SPLUS, statistical Web design -Microsoft FrontPage GENERATIONS OF COMPUTERS
• First Generation - 1940-1956: Vacuum Tubes
The first computers used vacuum tubes for circuitry and magnetic drums for memory, and were often enormous, taking up entire rooms. Input was based on punched cards and paper tape, and output was displayed on printouts and they could only solve one problem at a time. GENERATIONS OF COMPUTERS
• Second Generation - 1956-1963: Transistors
replaced vacuum tubes and ushered in the second generation of computers. The transistor was invented in 1947 but did not see widespread use in computers until the late 50s. The transistor was a vast improvement over the vacuum tube, allowing computers to become smaller, faster, cheaper, more energy- efficient and more reliable than their first-generation predecessors. Second-generation computers still relied on punched cards for input and printouts for output. Using programming language called COBOL and FORTRAN Third Generation - 1964-1971: Integrated Circuits • The development of the integrated circuit was the hallmark of the third generation of computers. Transistors were miniaturized and placed on silicon chips, called semiconductors, which drastically increased the speed and efficiency of computers. • Instead of punched cards and printouts, users interacted with third generation computers through keyboards and monitors and interfaced with an operating system, which allowed the device to run many different applications at one time with a central program that monitored the memory. Computers for the first time became accessible to a mass audience because they were smaller and cheaper than their predecessors. Fourth Generation - 1971-Present: Microprocessors • The microprocessor brought the fourth generation of computers, as thousands of integrated circuits were built onto a single silicon chip. What in the first generation filled an entire room could now fit in the palm of the hand. In 1981 IBM introduced its first computer for the home user, and in 1984 Apple introduced the Macintosh. Microprocessors also moved out of the realm of desktop computers and into many areas of life as more and more everyday products began to use microprocessors. Fifth Generation - Present and Beyond: Artificial Intelligence • Fifth generation computing devices, based on artificial intelligence, are still in development, though there are some applications, such as voice recognition, that are being used today. The use of parallel processing and superconductors is helping to make artificial intelligence a reality. Quantum computation and molecular and nanotechnology will radically change the face of computers in years to come. COMPUTER VIRUSES AND SECURITY
• COMPUTER VIRUSES-Virus is a self-duplicating
computer program that interferes with a computers hardware or operating system. They range from being merely irritating (or disturbing) to the very destructive. COMPUTER VIRUSES AND SECURITY • Thousands of viruses and worms exist and can quickly contaminate millions of computers. People who intentionally create viruses are computer experts called HACKERS; they also violate confidentiality by observing computer monitors and by impersonating authorised users in other to gain access to the userís computer databases to steal the identities of other people by obtaining privately identified information about them. They also engage in software piracy and deface website on the internet. COMPUTER VIRUSES AND SECURITY
• They develop powerful software crime tools such as the
following: • Internet eavesdropping snuffers which intercepts internet messages sent to other computers • Password guessers that tries millions of combinations of characters in an effect to guess a computer’s password. • Vulnerability testers that look for software weaknesses • Computer services saturator • Automatic computer virus generator. Types of Viruses
• A boot sector virus stores itself at the start of
a disk and becomes activated by reading, starting or restarting the computer when that disk is in the boot drive. • A file infector virus attaches itself to program files i.e. files that give instructions to a computer. These files usually have extensions like exe, com, or bat. When the program is run, the virus executes. Types of Viruses
• A macro virus affects data files, especially
Word documents and Excel workbooks. This virus type accounts for the vast majority of infected files. When the infected document is opened and the macro are run, the virus is triggered and can perform system operations such as creating or deleting files or writing into already existing files and thus have the potential to cause a great deal of damage. Types of Viruses
• Worm or an email virus (for the purpose of
this guide) is not really a virus at all (in that it is not self-replicating) but a chain letter phenomenon sent through email. The message will, for some reason or other, tell you to pass this message on to as many people as possible. Types of Viruses
• Trojan horses are programs that have some
hidden, generally malicious functionality that the computer does not expect. They claim to be a thing (e.g. an audio for example), when they are actually another (e.g. code that will overwrite a portion of your hard disk). They do not run their own like a virus does but rely on tricking the user to run them. How Viruses are Spread
• Viruses are spread by running infected programs or
opening infected files. This can occur by using any of the following methods: Passing floppy disks from PC to PC Downloading (copying) infected files from the Internet. pening an email attachment Booting a PC with an infected bootable disk. Computer viruses work in two phases: infection phase and the attack phase. How Viruses are Spread
• Infection phase: in order to infect a computer, a virus has to possess
the chance to get executed before it can infect the computer system and spread to others. Events that can trigger the execution of virus are included above.
• Attack phase: viruses do destructive things such as deleting files,
erasing data on a hard disk, sending random emails or slowing down the processor by sending millions of looped instructions. Since most users will try their best to delete the virus once it launches the attack, most virus delay revealing their presence by launching their attack only after they have had ample opportunity to spread. This means the attack may be delayed for a long time after the infection. Prevention of Computer Virus
Computer users can prepare for a viral infection by
creating backups of legitimate original software and data files regularly so that the computer system can be restored if necessary. obtain a virus checker for your own machine then register the program with the manufacturers. They will regularly send you updated versions of the software while your agreement is current. If you are really cautious, change the set-up option in your computerís BIOS so that it will always boot from the hard disk, not from floppies. Virus Detection
• Several types of antiviral software can be used to detect the
presence of a virus. Scanning software can recognize the characteristics of a virus computer code and look for these characteristics in the computers files. Antivirus software packages provide complete protection against viruses.
• Other types of antiviral software include monitoring
software and integrity-shell software. Monitoring software is different from scanning software. It detects illegal or potentially damaging viral activities such as overwriting computer files or reformatting the computers hard drive. COMPUTER SECURITY • Backup: Storing backup copies of software and data and having backup computer and communication capabilities are important basic safeguards because the data can then be restored if it was altered or destroyed by a computer crime or accident. • Encryption: Another technique to protect confidential information is encryption. Computer users can scramble information to prevent unauthorized users from accessing it. Authorized users can unscramble the information when needed by using a secret code called a key. Without the key the scrambled information would be impossible or very difficult to unscramble. COMPUTER SECURITY
• Approved Users: Another technique to help prevent abuse
and misuse of computer data is to limit the use of computers and data files to approved persons. Security software can verify the identity of computer users and limit their privileges to use, view, and alter files. • Passwords: Passwords are confidential sequences of characters that allow approved persons to make use of specified computers, software, or information. To be effective, passwords must be difficult to guess and should not be found in dictionaries. Effective passwords contain a variety of characters and symbols that are not part of the alphabet. COMPUTER SECURITY
• Firewalls: Computers connected to the communication
networks such as internet are vulnerable to electronic attack because many people have access to them. They can be protected by firewalls computer software placed between the networked computers and the networks. • The firewalls examines filters and reports on all information passing through the network to ensure its appropriateness. These functions help to prevent saturation of input capabilities that might otherwise deny usage to legitimate users. COMPUTER SECURITY
• Intrusion Detection Systems: These are
software that detect unusual and suspicious activities and in some cases, stop a variety of harmful actions END