Ch-2 Software Concept QueAns

download Ch-2 Software Concept QueAns

of 17

Transcript of Ch-2 Software Concept QueAns

  • 8/6/2019 Ch-2 Software Concept QueAns

    1/17

    Chapter -2 Software Concepts

    Type A:Very Short Answer QuestionsQ1. Differentiate between hardware and software.

    Ans: Hardware represents the physical and tangible

    components of the computer i.e, the components that can

    be seen and touched. Input device, Output devices. CPU,

    Floppy disk, Hard disk, etc. are examples of computer

    hardware.

    Software represents the set of programs that govern

    the operation of a computer system and make the hardware

    run.

    Q2. How can computer software be classified?

    Ans: The system software can be classified into twocategories:

    (1) Operating System (2) Language Processor.

    Q3. What are two categories of system software?

    Ans: The system software can be classified into two

    categories:

    (1) Operating System (2) Language Processor.

    Q4. What is an operating system? What is its role?

  • 8/6/2019 Ch-2 Software Concept QueAns

    2/17

    Ans: An operating system is a program which acts as an

    interface between a user and the hardware (computer

    resources).

    Q5. Name various types of operating systems.

    Ans: The operating systems are of mainly following types:

    (a) Single Program OS

    (b) Multiprogram OS

    (c) Time Sharing OS

    (d) Real Time OS

    (e) Multiprocessing OS

    Q6. Name various language processors.

    Ans: The various language processors are given below:

    (a) Assembler

    (b) Interpreter

    (c) Compiler

    Q7. What is application software? What are the three categoriesof application software?

    Ans: An Application Software is the set of programs

    necessary to carry out operations for a specified application.

  • 8/6/2019 Ch-2 Software Concept QueAns

    3/17

  • 8/6/2019 Ch-2 Software Concept QueAns

    4/17

    (e) Antivirus Software

    Q9. Differentiate between a compiler and interpreter.

    Ans: An Interpreter converts an HLL program into machine

    language line by line and simultaneously executrs the

    converted line. Also, an interpreter must always be present

    in the memory along with the program for its execution. If an

    error occurs in a line, the line is displayed and interpreter

    does not proceed unless the error is rectified.

    An Compiler converts an HLL program in machine language

    in one go. If there are errors in the program, it given the

    error list along with the line numbers. Once the error are

    removed, error-free object code is made available and after

    this compiler is no more needed in the memory.

    Q10. What are developer tools? Name a few.

    Ans: Tools used by programmers to develop a software for

    any type of application, they need an array of developer

    tools that help them accomplish their task.

    Some most commonly used developer tools are:

    (a) Compiler

    (b) Interpreter

    (c) Integrated Development Environment (IDE)

  • 8/6/2019 Ch-2 Software Concept QueAns

    5/17

    Q11. What is an IDE?

    IDE (Integrated Development Environment) is an application

    program consisting of different development tools for

    developing an application.

    Q12. What is a virus? What is anti-virus software?

    Ans: Computer virus are malicious code / programs that

    cuase damage to data and files on a system.

    Anti-Virus software not only remove virus and other infected

    threats from our computer system but at the same time also

    protect our systems from data loss, destruction and attack of

    any external threats like virus, worm and Trojan.

    Type B: Short Answer Questions

    Q1. What is a system software? What role does it play in the

    functioning of the computer?

    Ans: The functions of all the physical components of a

    computer system are guided by some instructions or

    program collectively known as System Software. System

    Software controls all internal activities inside a computer

    system and between all attached components of a computer

    system.

  • 8/6/2019 Ch-2 Software Concept QueAns

    6/17

    It controls all possible activities inside the computer system

    which can be summarized as follows:

    Reads data and instructions through the input devices;

    Translates all data and instruction into computer

    understandable form and vice versa;

    Controls all devices attached to the computer system;

    Processes and generates the result on the output

    devices;

    Q2. How are following operating systems different from one

    another?

    a. Multiprogramming OS and Multiprocessing OS

    Ans:

    Multiprogramming OS Multiprocessing OSIt Supports Multiprogrammingi.e., more than one user canbe supported by it.

    It supports more than oneprocessor (computer) as the

    job have to be executed onmore than one processor.

    More than one user programs

    are loaded and active in themain store at the same time.

    It should be capable of

    loadsharing in case ofidentical processors so thatthe systems efficiencyimproves.

    Active programs areexecuted using sometechniques one by one.

    It should be able to controlthe main processor and inturn control the working of

  • 8/6/2019 Ch-2 Software Concept QueAns

    7/17

    slave processor.

    b. Time sharing OS and Real time OS

    Time Sharing OS Real Time OS This OS uses time sharingtechniques.

    Responds to input instantly.

    Each Active user program isgiven a fair share of CPUtime, if the elapses or an I/Ooperation is requested.

    Real-time operating systemsare commonly found andused in robotics, complexmultimedia and animation,communications and hasvarious military and

    government uses.LYNX and Windows CE areexamples of real timeoperating systems.

    Q3. Write short notes on the following:

    a. Word Processor

    Ans: Ref: pg 59

    b. Electronic Spreadsheet

    Ans: Ref Pg 60

    c. Dbms

    Ans: Ref Pg 61

    d. Graphic, multimedia and presentation software

  • 8/6/2019 Ch-2 Software Concept QueAns

    8/17

    Ans: Ref Pg 62

    e. DTP software

    Ans: Ref Pg. 61

    Q4. Discuss the roles of utility software in the context of

    computer performance.

    Ans: After all the basic and necessary software like

    Operating System and Device Drivers have been installed,

    we also require some additional software to keep ourcomputer system efficient and trouble free. Generally these

    software come bundled with the Operating System Software

    but we can also use utility software provided by other

    vendors. Few examples of utility software are as follows:

    Compression Utility software

    Backup Utility Software

    Antivirus Protection and Detection Software

    Disk De-fragmentation Utility Software

    Text Editor

  • 8/6/2019 Ch-2 Software Concept QueAns

    9/17

    Q5. Why is disk fragmentor useful?

    Ans: It speeds up disk access by rearranging the files and

    free space on your computer, so that files are stored incontiguous units and free space is consolidated in one

    contiguous block.

    Q6. How is backup utility useful? Is it necessary to take backup

    of data?

    Ans: In Information Technology, a backup or the process

    of backing up refers to making copies ofdata so that these

    additional copies may be used to restore the original after

    a data loss event.

    Backups have two distinct purposes. (1) The primarypurpose is to recover data as a reaction to data loss, be it by

    data deletion or corrupted data. Data loss is a very common

    experience of computer users. 67% of internet users have

    suffered serious data loss. (2) The secondary purpose of

    backups is to recover data from a historical period of time

    http://en.wikipedia.org/wiki/Information_Technologyhttp://en.wikipedia.org/wiki/Datahttp://en.wikipedia.org/wiki/Data_losshttp://en.wikipedia.org/wiki/Data_corruptionhttp://en.wikipedia.org/wiki/Backup#cite_note-1http://en.wikipedia.org/wiki/Datahttp://en.wikipedia.org/wiki/Data_losshttp://en.wikipedia.org/wiki/Data_corruptionhttp://en.wikipedia.org/wiki/Backup#cite_note-1http://en.wikipedia.org/wiki/Information_Technology
  • 8/6/2019 Ch-2 Software Concept QueAns

    10/17

    within the constraints of a user-defined data retention policy,

    typically configured within a backup application for how long

    copies of data are required.

    Q7. What is a computer virus? How can it affect your computer?

    Ans: A computer virus is a computer program that can copy

    itself and infect a computer. The term "virus" is also

    commonly but erroneously used to refer to other types

    ofmalware, including but not limited

    to adware and spyware programs that do not have thereproductive ability. A true virus can spread from one

    computer to another (in some form of executable code)

    when its host is taken to the target computer; for instance

    because a user sent it over a network or the Internet, or

    carried it on a removable medium such as a floppy

    disk, CD, DVD, or USB drive.

    Viruses can increase their chances of spreading to other

    computers by infecting files on a network file system or a file

    system that is accessed by another computer.

    Q8. Why are antivirus software considered important?

    Ans: Antivirus or anti-virus software is used to prevent,

    detect, and remove malware, including but not limited

    to computer viruses, computer worm,Trojan

    horses, spyware and adware.

    http://en.wikipedia.org/wiki/Data_retentionhttp://en.wikipedia.org/wiki/Computer_programhttp://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Adwarehttp://en.wikipedia.org/wiki/Spywarehttp://en.wikipedia.org/wiki/Codehttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Floppy_diskhttp://en.wikipedia.org/wiki/Floppy_diskhttp://en.wikipedia.org/wiki/Compact_Dischttp://en.wikipedia.org/wiki/DVDhttp://en.wikipedia.org/wiki/USB_flash_drivehttp://en.wikipedia.org/wiki/Network_file_systemhttp://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Computer_virushttp://en.wikipedia.org/wiki/Computer_wormhttp://en.wikipedia.org/wiki/Trojan_horse_(computing)http://en.wikipedia.org/wiki/Trojan_horse_(computing)http://en.wikipedia.org/wiki/Spywarehttp://en.wikipedia.org/wiki/Adwarehttp://en.wikipedia.org/wiki/Data_retentionhttp://en.wikipedia.org/wiki/Computer_programhttp://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Adwarehttp://en.wikipedia.org/wiki/Spywarehttp://en.wikipedia.org/wiki/Codehttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Floppy_diskhttp://en.wikipedia.org/wiki/Floppy_diskhttp://en.wikipedia.org/wiki/Compact_Dischttp://en.wikipedia.org/wiki/DVDhttp://en.wikipedia.org/wiki/USB_flash_drivehttp://en.wikipedia.org/wiki/Network_file_systemhttp://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Computer_virushttp://en.wikipedia.org/wiki/Computer_wormhttp://en.wikipedia.org/wiki/Trojan_horse_(computing)http://en.wikipedia.org/wiki/Trojan_horse_(computing)http://en.wikipedia.org/wiki/Spywarehttp://en.wikipedia.org/wiki/Adware
  • 8/6/2019 Ch-2 Software Concept QueAns

    11/17

    A variety of strategies are typically employed. Signature-

    based detection involves searching for known patterns of

    data within executable code. However, it is possible for a

    computer to be infected with new malware for which no

    signature is yet known. To counter such so- called zero- daythreats, heuristics can be used.

    Q9. Why do you think IDEs are useful in application

    development?

    Ans: IDEs are designed to maximize programmer

    productivity by providing tightly-knit components with

    similar user interfaces. This should mean that the

    programmer has to do less mode switching versus using

    discrete development programs. However, because an IDE is

    a complicated piece of software by its very nature, this

    higher productivity only occurs after a lengthy learning

    process.

    Typically an IDE is dedicated to a specificprogramming

    language, allowing a feature set that most closely matches

    the programming paradigms of the language. However,

    there are some multiple-language IDEs, such

    as Eclipse, ActiveState Komodo, IntelliJ IDEA, recent versions

    ofNetBeans, Microsoft Visual Studio, WinDev, and Xcode.

    Q10. What are different types of threats to computer security?

    Ans: In Computer security a threat is a possible danger that

    might exploit a vulnerability to breach security and thus

    cause possible harm.

    http://en.wikipedia.org/wiki/Executable_codehttp://en.wikipedia.org/wiki/Countermeasure_(computer)http://en.wikipedia.org/wiki/Zero-day_virushttp://en.wikipedia.org/wiki/Zero-day_virushttp://en.wikipedia.org/wiki/Heuristics#Computer_sciencehttp://en.wikipedia.org/wiki/User_interfacehttp://en.wikipedia.org/w/index.php?title=Mode_switching&action=edit&redlink=1http://en.wikipedia.org/wiki/Programming_languagehttp://en.wikipedia.org/wiki/Programming_languagehttp://en.wikipedia.org/wiki/Programming_paradigmhttp://en.wikipedia.org/wiki/Eclipse_(software)http://en.wikipedia.org/wiki/ActiveState_Komodohttp://en.wikipedia.org/wiki/IntelliJ_IDEAhttp://en.wikipedia.org/wiki/NetBeanshttp://en.wikipedia.org/wiki/Microsoft_Visual_Studiohttp://en.wikipedia.org/wiki/WinDevhttp://en.wikipedia.org/wiki/Xcodehttp://en.wikipedia.org/wiki/Computer_securityhttp://en.wikipedia.org/wiki/Dangerhttp://en.wikipedia.org/wiki/Vulnerability_(computing)http://en.wikipedia.org/wiki/Executable_codehttp://en.wikipedia.org/wiki/Countermeasure_(computer)http://en.wikipedia.org/wiki/Zero-day_virushttp://en.wikipedia.org/wiki/Zero-day_virushttp://en.wikipedia.org/wiki/Heuristics#Computer_sciencehttp://en.wikipedia.org/wiki/User_interfacehttp://en.wikipedia.org/w/index.php?title=Mode_switching&action=edit&redlink=1http://en.wikipedia.org/wiki/Programming_languagehttp://en.wikipedia.org/wiki/Programming_languagehttp://en.wikipedia.org/wiki/Programming_paradigmhttp://en.wikipedia.org/wiki/Eclipse_(software)http://en.wikipedia.org/wiki/ActiveState_Komodohttp://en.wikipedia.org/wiki/IntelliJ_IDEAhttp://en.wikipedia.org/wiki/NetBeanshttp://en.wikipedia.org/wiki/Microsoft_Visual_Studiohttp://en.wikipedia.org/wiki/WinDevhttp://en.wikipedia.org/wiki/Xcodehttp://en.wikipedia.org/wiki/Computer_securityhttp://en.wikipedia.org/wiki/Dangerhttp://en.wikipedia.org/wiki/Vulnerability_(computing)
  • 8/6/2019 Ch-2 Software Concept QueAns

    12/17

    Threats can be classified according to their type and origin: [2]

    Type

    Physical damage

    fire

    water

    pollution

    natural events

    climatic

    seismic

    volcanic

    loss of essential services

    electrical power

    air conditioning

    telecommunication

    compromise of information

    eavesdropping,

    theft of media

    retrieval of discarded materials

    technical failures

    equipment

    software

    capacity saturation

    compromise of functions

    error in use

    abuse of rights

    denial of actions

    Origin

    Deliberate: aiming at information asset

    spying

    illegal processing of data

    accidental

    equipment failure

    software failure

  • 8/6/2019 Ch-2 Software Concept QueAns

    13/17

    environmental

    natural event

    loss of power supply

    Q11. What type of damages can be caused by virus to your

    computer?

    Ans: Computer Virus are designed to disrupt or deny

    operation, gather information that leads to loss of privacy or

    exploitation, gain unauthorized access to system resources,

    and other abusive behavior.

    Q12.What are Malware? What type of damage can they cause to

    your computer?

    Ans: Malware, short for malicious software, consists of

    programming (code, scripts, active content, and other

    software) designed to disrupt or deny operation, gather

    information that leads to loss of privacy or exploitation, gain

    unauthorized access to system resources, and other abusive

    behavior

    Q13. What is a spam? Why has it become a big Internet issue?

    Ans: Spam is the use ofelectronic messaging systems

    (including most broadcast media, digital delivery systems) tosend unsolicited bulk messages indiscriminately. While the

    most widely recognized form of spam is e-mail spam, the

    term is applied to similar abuses in other media:

    http://en.wikipedia.org/wiki/Electronic_messaginghttp://en.wikipedia.org/wiki/Broadcast_mediahttp://en.wikipedia.org/wiki/E-mail_spamhttp://en.wikipedia.org/wiki/Electronic_messaginghttp://en.wikipedia.org/wiki/Broadcast_mediahttp://en.wikipedia.org/wiki/E-mail_spam
  • 8/6/2019 Ch-2 Software Concept QueAns

    14/17

    Q14.What do you understand by PC intrusion?

    Ans: Every PC connected to the internet is a potential target

    for hackers. Computers are under constant attack from

    cyber vandals. PC intrusion can occur in any of the followingform.

    a. Sweeper Attack

    b. Denial of Service

    c. Password Guessing

    Q15.What measure would you take to avoid:

    a. Virus attack

    b. Spyware

    c. Adware

    d. Spam

    e. PC Intrusion

    Ans:

    a. Use Anti-Virus and Anti-Spyware software

    b. Download Updates Regularly

    c. Run Frequent Full-System scans

    d. Use caution when downloading files on the internet

    e. Be careful with email.

    f. Disable cookies, if possible.

    g. Keep your system up-to-date.

  • 8/6/2019 Ch-2 Software Concept QueAns

    15/17

    Q16.What are denial-of-service and sweeper attacks?

    Ans:

    Denial of Services: this type of attack eats up all the

    resources of a system and the system or application come to

    a halt.

    Sweeper Attacks: This is another malicious program used by

    hackers. It sweeps i.e., deletes all the data from the system.

    Q17.What is phishing?

    Ans: It is criminally fraudulent process of attempting to

    acquire sensitive information such as usernames, passwords,

    credit card information, account data, etc.

    Type C: Long Answer Questions

    Q18. Discuss different types of utility software.

    Ans: Few examples of utility software are as follows:

    Compression utility software: Using this software, you

    can reduce (compress) the storage size of any computer

    program/file while not in use transfer either through internetor using storage devices like Pen Drive, CD or DVD.

    Backup utility software: This utility software facilitates

    you to take regular back-up of important files and folders

  • 8/6/2019 Ch-2 Software Concept QueAns

    16/17

    stored in a drive into another storage device like a Pen drive

    or CD or a DVD or another computer. This backup data can

    be restored in case of any unforeseen situation.

    Disk De-fragmentation Utility software: This simply

    means that different parts of the file are scattered across the

    hard drive in noncontiguous locations. This type of

    fragmented file requires some extra time to access and

    slows down the system. Disk de-fragmentation utility

    software speeds up the system by rearranging such

    fragmented files stored on a disk in contiguous locations in

    order to optimize the system performance.

    Antivirus detection and protection software: This utility

    software provides the user with a virus free work

    environment by restricting the entry of any unwanted

    program into the system.

    Text Editor: This utility software helps one to create, store

    or edit a basic text file. A text file generally stores English

    type text and can also store numeric and special characters

    with little formatting.

    Q19. What do you understand by computer security, various

    threats to computer security and possible solution tocomputer security?

    Ans: Computer Security commonly refers to as CIA (short

    form of Confidentiality, Integrity and Authentication),

  • 8/6/2019 Ch-2 Software Concept QueAns

    17/17

    protects our computer from any unauthorized access and

    maintains the system resources. Precisely,

    1) Confidentiality ensures protection of the computersystem from any unauthorized access

    2) Integrity ensures that information stored in the

    computer is protected

    3) Authentication ensures the authenticity of the

    authorized user

    In Computer security a threat is a possible danger that

    might exploit a vulnerability to breach security and thus

    cause possible harm.

    Possible solutionto Computer Security:

    a. Use Anti-Virus and Anti-Spyware software

    b. Download Updates Regularly

    c. Run Frequent Full-System scans

    d. Use caution when downloading files on the internet

    e. Be careful with email.

    f. Disable cookies, if possible.

    g. Keep your system up-to-date.

    http://en.wikipedia.org/wiki/Computer_securityhttp://en.wikipedia.org/wiki/Dangerhttp://en.wikipedia.org/wiki/Vulnerability_(computing)http://en.wikipedia.org/wiki/Computer_securityhttp://en.wikipedia.org/wiki/Dangerhttp://en.wikipedia.org/wiki/Vulnerability_(computing)