SlideShare a Scribd company logo
Software
Lecture #4
What is Software
Def#1
• Software is a set of instruction that use to
operates various kind of program.
Def#2
• Software is a generic term for organized
collections of computer data and instructions.
Types of software
It is divided in to two major categories:
• System software that provides the basic non-
task-specific functions of the computer.
• Application software which is used by users to
accomplish specific tasks.
System software
• Stem software is responsible for controlling,
integrating, and managing the individual
hardware components of a computer system.
• Generally, system software consists of an
operating system and some fundamental
utilities such as disk formatters, file managers,
display managers, user authentication (login)
and management tools, and networking and
device control software.
Operating System
• A program that acts as an intermediary
between a user of a computer and the
computer hardware.
Operating system goals:
– Execute user programs and make solving user
problems easier.
– Make the computer system convenient to use.
Operating system Examples:
Linux, Unix, XP ,Windows 7 ,Windows 8.
Device drivers
• Device Driver or Software Driver is a computer
program allowing an external extended mother board
components to interact with computer system.
Because of the diversity of modern update hardware
and operating systems, drivers operate in many
different environments. Drivers may interface with;
• Printer
• Scanner
• Sound card
• VGA card
• Network card. Etc….
Application software
• Application Software run under System Software , and are made to
do a specific task i.e ( Word Processing etc) , which have indirect
access to the hardware (i.e Behind System Software) .
Examples :
Web browser, word processing software, spreadsheet software,
database software, presentation graphics software.
• Opera (Web Browser)
• Microsoft Word (Word Processing)
• Microsoft Excel (Spreadsheet software)
• MySQL (Database Software)
• Microsoft Powerpoint (Presentation Software)
• iTunes (Music / Sound Software)
• VLC Media Player (Audio / Video Software )
• World of Warcraft (Game Software)
• Adobe Photoshop (Graphics Software)
Utilities
• Utility software is a kind of system software designed to help
analyze, configure, optimize and maintain the computer. A single
piece of utility software is usually called a utility or tool. Utility
software should be contrasted with application software, which
allows users to do things like creating text documents, playing
games.
Utility software :
• Antivirus(MC cafee)
• Data compression software (win RAR)
• Disk partitioning
• Backup
• Memory testers
• Network utilities .Etc…
Software can be purchased or acquired as:
• Shareware:
– Usually intended for sale after a trial period.
• Freeware:
– Free software but with copyright restrictions .
• Licenses:
A software is a legal instrument (usually by way of contract
law) governing the usage or redistribution of software. All
software is copyright protected, except material in the public
domain
• Key Generator
A license or product key generator (keygen) is a computer
program that generates a product licensing key, serial number,
or some other registration information necessary to activate for
use a software application
Virus
• A computer virus is a computer program that can replicate
itself and spread from one computer to another. The term
"virus" is also commonly but misused to refer to other
types of malware, including but not limited to adware and
spyware programs that do not have the reproductive
ability. A true virus can spread from one computer to
another (in some form of executable code) when its host is
taken to the target computer; for instance because a user
sent it over a network or the Internet, or carried it on a
removable medium such as a floppy disk, CD, DVD, or USB
drive.
Types of Virus
• Not all computer viruses behave, replicate, or infect
the same way. There are several different categories
of viruses and malware. Below I list and discuss some
of the most common types of computer viruses.
Trojan Horse
• Trojan Horse:
A Trojan horse program has the appearance of having a useful and desired
function. While it may advertise its activity after launching, this
information is not apparent to the user beforehand. Secretly the program
performs other, undesired functions. A Trojan Horse neither replicates nor
copies itself, but causes damage or compromises the security of the
computer. A Trojan Horse must be sent by someone or carried by another
program and may arrive in the form of a joke program or software of some
sort. The malicious functionality of a Trojan Horse may be anything
undesirable for a computer user, including data destruction or
compromising a system by providing a means for another computer to
gain access, thus bypassing normal access controls.
Worms
• Worms:
A worm is a program that makes and facilitates the
distribution of copies of itself; for example, from one
disk drive to another, or by copying itself using email
or another transport mechanism. The worm may do
damage and compromise the security of the
computer. It may arrive via exploitation of a system
vulnerability or by clicking on an infected e-mail.
Types of virus continued ……
• Bootsector Virus:
A virus which attaches itself to the first part of the hard disk that is
read by the computer upon bootup. These are normally spread by
floppy disks.
Macro Virus:
Macro viruses are viruses that use another application's macro
programming language to distribute themselves. They infect
documents such as MS Word or MS Excel and are typically spread to
other similar documents.
Memory Resident Viruses:
Memory Resident Viruses reside in a computers volitale memory
(RAM). They are initiated from a virus which runs on the computer and
they stay in memory after it's initiating program closes.
Types of virus continued ……
• Rootkit Virus:
A rootkit virus is an undetectable virus which attempts to allow someone
to gain control of a computer system. The term rootkit comes from the
linux administrator root user. These viruses are usually installed by trojans
and are normally disguised as operating system files.
Polymorphic Viruses:
A polymorphic virus not only replicates itself by creating multiple files of
itself, but it also changes it's digital signature every time it replicates. This
makes it difficult for less sophisticated antivirus software to detect.
Logic Bombs/Time Bombs:
These are viruses which are programmed to initiate at a specific date or
when a specific event occurs. Some examples are a virus which deletes
your photos on Halloween, or a virus which deletes a database table if a
certain employee gets fired.

More Related Content

PPTX
Softwares
PPT
System software os system and utility ggood
PPTX
Virusppt
PPTX
Presentation windows operating system
PPSX
Computer viruses
PPT
N5 ISDD Software Requirements
PPT
Technical Implementation: Software
PPT
Network software n othr types of software
Softwares
System software os system and utility ggood
Virusppt
Presentation windows operating system
Computer viruses
N5 ISDD Software Requirements
Technical Implementation: Software
Network software n othr types of software

What's hot (20)

PPTX
Kinds of Computer software
PPTX
Utility software
PPTX
Virus and Antivirus
PPT
Anti virus and current trends
PPTX
A presentation on system software
PPT
Isys20261 lecture 05
PPT
Computer software (Introduction to OS)
PPT
Presentation on computer software
PPTX
Computer Software & its Types
PPSX
Types of software
PPTX
Utility programs
PPTX
How to Protect your PC from Malware
PPT
Copy of antiviruse
PPTX
Antivirus software
PPSX
System software and operating system
PPTX
Types of software
PPTX
Computer software
PPTX
Ch. 3 computer virus
PPTX
Application software and system software
PPT
04 software system and application software
Kinds of Computer software
Utility software
Virus and Antivirus
Anti virus and current trends
A presentation on system software
Isys20261 lecture 05
Computer software (Introduction to OS)
Presentation on computer software
Computer Software & its Types
Types of software
Utility programs
How to Protect your PC from Malware
Copy of antiviruse
Antivirus software
System software and operating system
Types of software
Computer software
Ch. 3 computer virus
Application software and system software
04 software system and application software
Ad

Similar to Introduction to computer lec (4) (20)

ODP
Viruses andthreats@dharmesh
PPSX
Computer viruses
PDF
ICT Skills.pdf
PPTX
Compter virus and its solution
PPTX
Computer-software (1).pptx
PPT
Computer virus
PPTX
B) Computer Basics
PPTX
Virus and Anti Virus - Types of Virus and Anti Virus
PDF
Virussss.pdf
PPTX
system Security
PPTX
Computer power point presentation
PPT
Presentation2
PPT
6unit1 virus and their types
PPTX
Introduction to computer software
PPT
Computer Virus
PPTX
Operating System and Virus (Introduction).pptx
ODP
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
PPT
Malicious
PPTX
Kinds of Viruses
PDF
Malicious software
Viruses andthreats@dharmesh
Computer viruses
ICT Skills.pdf
Compter virus and its solution
Computer-software (1).pptx
Computer virus
B) Computer Basics
Virus and Anti Virus - Types of Virus and Anti Virus
Virussss.pdf
system Security
Computer power point presentation
Presentation2
6unit1 virus and their types
Introduction to computer software
Computer Virus
Operating System and Virus (Introduction).pptx
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Malicious
Kinds of Viruses
Malicious software
Ad

Recently uploaded (20)

PDF
System and Network Administraation Chapter 3
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PPTX
Computer Software and OS of computer science of grade 11.pptx
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
Nekopoi APK 2025 free lastest update
PPTX
assetexplorer- product-overview - presentation
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
Softaken Excel to vCard Converter Software.pdf
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PPT
Introduction Database Management System for Course Database
PPTX
Introduction to Artificial Intelligence
PPTX
Reimagine Home Health with the Power of Agentic AI​
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
top salesforce developer skills in 2025.pdf
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
System and Network Administraation Chapter 3
Odoo Companies in India – Driving Business Transformation.pdf
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Computer Software and OS of computer science of grade 11.pptx
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Nekopoi APK 2025 free lastest update
assetexplorer- product-overview - presentation
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Softaken Excel to vCard Converter Software.pdf
Operating system designcfffgfgggggggvggggggggg
PTS Company Brochure 2025 (1).pdf.......
Which alternative to Crystal Reports is best for small or large businesses.pdf
Introduction Database Management System for Course Database
Introduction to Artificial Intelligence
Reimagine Home Health with the Power of Agentic AI​
VVF-Customer-Presentation2025-Ver1.9.pptx
CHAPTER 2 - PM Management and IT Context
top salesforce developer skills in 2025.pdf
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Navsoft: AI-Powered Business Solutions & Custom Software Development

Introduction to computer lec (4)

  • 2. What is Software Def#1 • Software is a set of instruction that use to operates various kind of program. Def#2 • Software is a generic term for organized collections of computer data and instructions.
  • 3. Types of software It is divided in to two major categories: • System software that provides the basic non- task-specific functions of the computer. • Application software which is used by users to accomplish specific tasks.
  • 4. System software • Stem software is responsible for controlling, integrating, and managing the individual hardware components of a computer system. • Generally, system software consists of an operating system and some fundamental utilities such as disk formatters, file managers, display managers, user authentication (login) and management tools, and networking and device control software.
  • 5. Operating System • A program that acts as an intermediary between a user of a computer and the computer hardware. Operating system goals: – Execute user programs and make solving user problems easier. – Make the computer system convenient to use. Operating system Examples: Linux, Unix, XP ,Windows 7 ,Windows 8.
  • 6. Device drivers • Device Driver or Software Driver is a computer program allowing an external extended mother board components to interact with computer system. Because of the diversity of modern update hardware and operating systems, drivers operate in many different environments. Drivers may interface with; • Printer • Scanner • Sound card • VGA card • Network card. Etc….
  • 7. Application software • Application Software run under System Software , and are made to do a specific task i.e ( Word Processing etc) , which have indirect access to the hardware (i.e Behind System Software) . Examples : Web browser, word processing software, spreadsheet software, database software, presentation graphics software. • Opera (Web Browser) • Microsoft Word (Word Processing) • Microsoft Excel (Spreadsheet software) • MySQL (Database Software) • Microsoft Powerpoint (Presentation Software) • iTunes (Music / Sound Software) • VLC Media Player (Audio / Video Software ) • World of Warcraft (Game Software) • Adobe Photoshop (Graphics Software)
  • 8. Utilities • Utility software is a kind of system software designed to help analyze, configure, optimize and maintain the computer. A single piece of utility software is usually called a utility or tool. Utility software should be contrasted with application software, which allows users to do things like creating text documents, playing games. Utility software : • Antivirus(MC cafee) • Data compression software (win RAR) • Disk partitioning • Backup • Memory testers • Network utilities .Etc…
  • 9. Software can be purchased or acquired as: • Shareware: – Usually intended for sale after a trial period. • Freeware: – Free software but with copyright restrictions . • Licenses: A software is a legal instrument (usually by way of contract law) governing the usage or redistribution of software. All software is copyright protected, except material in the public domain • Key Generator A license or product key generator (keygen) is a computer program that generates a product licensing key, serial number, or some other registration information necessary to activate for use a software application
  • 10. Virus • A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly but misused to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.
  • 11. Types of Virus • Not all computer viruses behave, replicate, or infect the same way. There are several different categories of viruses and malware. Below I list and discuss some of the most common types of computer viruses.
  • 12. Trojan Horse • Trojan Horse: A Trojan horse program has the appearance of having a useful and desired function. While it may advertise its activity after launching, this information is not apparent to the user beforehand. Secretly the program performs other, undesired functions. A Trojan Horse neither replicates nor copies itself, but causes damage or compromises the security of the computer. A Trojan Horse must be sent by someone or carried by another program and may arrive in the form of a joke program or software of some sort. The malicious functionality of a Trojan Horse may be anything undesirable for a computer user, including data destruction or compromising a system by providing a means for another computer to gain access, thus bypassing normal access controls.
  • 13. Worms • Worms: A worm is a program that makes and facilitates the distribution of copies of itself; for example, from one disk drive to another, or by copying itself using email or another transport mechanism. The worm may do damage and compromise the security of the computer. It may arrive via exploitation of a system vulnerability or by clicking on an infected e-mail.
  • 14. Types of virus continued …… • Bootsector Virus: A virus which attaches itself to the first part of the hard disk that is read by the computer upon bootup. These are normally spread by floppy disks. Macro Virus: Macro viruses are viruses that use another application's macro programming language to distribute themselves. They infect documents such as MS Word or MS Excel and are typically spread to other similar documents. Memory Resident Viruses: Memory Resident Viruses reside in a computers volitale memory (RAM). They are initiated from a virus which runs on the computer and they stay in memory after it's initiating program closes.
  • 15. Types of virus continued …… • Rootkit Virus: A rootkit virus is an undetectable virus which attempts to allow someone to gain control of a computer system. The term rootkit comes from the linux administrator root user. These viruses are usually installed by trojans and are normally disguised as operating system files. Polymorphic Viruses: A polymorphic virus not only replicates itself by creating multiple files of itself, but it also changes it's digital signature every time it replicates. This makes it difficult for less sophisticated antivirus software to detect. Logic Bombs/Time Bombs: These are viruses which are programmed to initiate at a specific date or when a specific event occurs. Some examples are a virus which deletes your photos on Halloween, or a virus which deletes a database table if a certain employee gets fired.