8/6/2019 Ch-2 Software Concept QueAns
1/17
Chapter -2 Software Concepts
Type A:Very Short Answer QuestionsQ1. Differentiate between hardware and software.
Ans: Hardware represents the physical and tangible
components of the computer i.e, the components that can
be seen and touched. Input device, Output devices. CPU,
Floppy disk, Hard disk, etc. are examples of computer
hardware.
Software represents the set of programs that govern
the operation of a computer system and make the hardware
run.
Q2. How can computer software be classified?
Ans: The system software can be classified into twocategories:
(1) Operating System (2) Language Processor.
Q3. What are two categories of system software?
Ans: The system software can be classified into two
categories:
(1) Operating System (2) Language Processor.
Q4. What is an operating system? What is its role?
8/6/2019 Ch-2 Software Concept QueAns
2/17
Ans: An operating system is a program which acts as an
interface between a user and the hardware (computer
resources).
Q5. Name various types of operating systems.
Ans: The operating systems are of mainly following types:
(a) Single Program OS
(b) Multiprogram OS
(c) Time Sharing OS
(d) Real Time OS
(e) Multiprocessing OS
Q6. Name various language processors.
Ans: The various language processors are given below:
(a) Assembler
(b) Interpreter
(c) Compiler
Q7. What is application software? What are the three categoriesof application software?
Ans: An Application Software is the set of programs
necessary to carry out operations for a specified application.
8/6/2019 Ch-2 Software Concept QueAns
3/17
8/6/2019 Ch-2 Software Concept QueAns
4/17
(e) Antivirus Software
Q9. Differentiate between a compiler and interpreter.
Ans: An Interpreter converts an HLL program into machine
language line by line and simultaneously executrs the
converted line. Also, an interpreter must always be present
in the memory along with the program for its execution. If an
error occurs in a line, the line is displayed and interpreter
does not proceed unless the error is rectified.
An Compiler converts an HLL program in machine language
in one go. If there are errors in the program, it given the
error list along with the line numbers. Once the error are
removed, error-free object code is made available and after
this compiler is no more needed in the memory.
Q10. What are developer tools? Name a few.
Ans: Tools used by programmers to develop a software for
any type of application, they need an array of developer
tools that help them accomplish their task.
Some most commonly used developer tools are:
(a) Compiler
(b) Interpreter
(c) Integrated Development Environment (IDE)
8/6/2019 Ch-2 Software Concept QueAns
5/17
Q11. What is an IDE?
IDE (Integrated Development Environment) is an application
program consisting of different development tools for
developing an application.
Q12. What is a virus? What is anti-virus software?
Ans: Computer virus are malicious code / programs that
cuase damage to data and files on a system.
Anti-Virus software not only remove virus and other infected
threats from our computer system but at the same time also
protect our systems from data loss, destruction and attack of
any external threats like virus, worm and Trojan.
Type B: Short Answer Questions
Q1. What is a system software? What role does it play in the
functioning of the computer?
Ans: The functions of all the physical components of a
computer system are guided by some instructions or
program collectively known as System Software. System
Software controls all internal activities inside a computer
system and between all attached components of a computer
system.
8/6/2019 Ch-2 Software Concept QueAns
6/17
It controls all possible activities inside the computer system
which can be summarized as follows:
Reads data and instructions through the input devices;
Translates all data and instruction into computer
understandable form and vice versa;
Controls all devices attached to the computer system;
Processes and generates the result on the output
devices;
Q2. How are following operating systems different from one
another?
a. Multiprogramming OS and Multiprocessing OS
Ans:
Multiprogramming OS Multiprocessing OSIt Supports Multiprogrammingi.e., more than one user canbe supported by it.
It supports more than oneprocessor (computer) as the
job have to be executed onmore than one processor.
More than one user programs
are loaded and active in themain store at the same time.
It should be capable of
loadsharing in case ofidentical processors so thatthe systems efficiencyimproves.
Active programs areexecuted using sometechniques one by one.
It should be able to controlthe main processor and inturn control the working of
8/6/2019 Ch-2 Software Concept QueAns
7/17
slave processor.
b. Time sharing OS and Real time OS
Time Sharing OS Real Time OS This OS uses time sharingtechniques.
Responds to input instantly.
Each Active user program isgiven a fair share of CPUtime, if the elapses or an I/Ooperation is requested.
Real-time operating systemsare commonly found andused in robotics, complexmultimedia and animation,communications and hasvarious military and
government uses.LYNX and Windows CE areexamples of real timeoperating systems.
Q3. Write short notes on the following:
a. Word Processor
Ans: Ref: pg 59
b. Electronic Spreadsheet
Ans: Ref Pg 60
c. Dbms
Ans: Ref Pg 61
d. Graphic, multimedia and presentation software
8/6/2019 Ch-2 Software Concept QueAns
8/17
Ans: Ref Pg 62
e. DTP software
Ans: Ref Pg. 61
Q4. Discuss the roles of utility software in the context of
computer performance.
Ans: After all the basic and necessary software like
Operating System and Device Drivers have been installed,
we also require some additional software to keep ourcomputer system efficient and trouble free. Generally these
software come bundled with the Operating System Software
but we can also use utility software provided by other
vendors. Few examples of utility software are as follows:
Compression Utility software
Backup Utility Software
Antivirus Protection and Detection Software
Disk De-fragmentation Utility Software
Text Editor
8/6/2019 Ch-2 Software Concept QueAns
9/17
Q5. Why is disk fragmentor useful?
Ans: It speeds up disk access by rearranging the files and
free space on your computer, so that files are stored incontiguous units and free space is consolidated in one
contiguous block.
Q6. How is backup utility useful? Is it necessary to take backup
of data?
Ans: In Information Technology, a backup or the process
of backing up refers to making copies ofdata so that these
additional copies may be used to restore the original after
a data loss event.
Backups have two distinct purposes. (1) The primarypurpose is to recover data as a reaction to data loss, be it by
data deletion or corrupted data. Data loss is a very common
experience of computer users. 67% of internet users have
suffered serious data loss. (2) The secondary purpose of
backups is to recover data from a historical period of time
http://en.wikipedia.org/wiki/Information_Technologyhttp://en.wikipedia.org/wiki/Datahttp://en.wikipedia.org/wiki/Data_losshttp://en.wikipedia.org/wiki/Data_corruptionhttp://en.wikipedia.org/wiki/Backup#cite_note-1http://en.wikipedia.org/wiki/Datahttp://en.wikipedia.org/wiki/Data_losshttp://en.wikipedia.org/wiki/Data_corruptionhttp://en.wikipedia.org/wiki/Backup#cite_note-1http://en.wikipedia.org/wiki/Information_Technology8/6/2019 Ch-2 Software Concept QueAns
10/17
within the constraints of a user-defined data retention policy,
typically configured within a backup application for how long
copies of data are required.
Q7. What is a computer virus? How can it affect your computer?
Ans: A computer virus is a computer program that can copy
itself and infect a computer. The term "virus" is also
commonly but erroneously used to refer to other types
ofmalware, including but not limited
to adware and spyware programs that do not have thereproductive ability. A true virus can spread from one
computer to another (in some form of executable code)
when its host is taken to the target computer; for instance
because a user sent it over a network or the Internet, or
carried it on a removable medium such as a floppy
disk, CD, DVD, or USB drive.
Viruses can increase their chances of spreading to other
computers by infecting files on a network file system or a file
system that is accessed by another computer.
Q8. Why are antivirus software considered important?
Ans: Antivirus or anti-virus software is used to prevent,
detect, and remove malware, including but not limited
to computer viruses, computer worm,Trojan
horses, spyware and adware.
http://en.wikipedia.org/wiki/Data_retentionhttp://en.wikipedia.org/wiki/Computer_programhttp://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Adwarehttp://en.wikipedia.org/wiki/Spywarehttp://en.wikipedia.org/wiki/Codehttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Floppy_diskhttp://en.wikipedia.org/wiki/Floppy_diskhttp://en.wikipedia.org/wiki/Compact_Dischttp://en.wikipedia.org/wiki/DVDhttp://en.wikipedia.org/wiki/USB_flash_drivehttp://en.wikipedia.org/wiki/Network_file_systemhttp://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Computer_virushttp://en.wikipedia.org/wiki/Computer_wormhttp://en.wikipedia.org/wiki/Trojan_horse_(computing)http://en.wikipedia.org/wiki/Trojan_horse_(computing)http://en.wikipedia.org/wiki/Spywarehttp://en.wikipedia.org/wiki/Adwarehttp://en.wikipedia.org/wiki/Data_retentionhttp://en.wikipedia.org/wiki/Computer_programhttp://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Adwarehttp://en.wikipedia.org/wiki/Spywarehttp://en.wikipedia.org/wiki/Codehttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Floppy_diskhttp://en.wikipedia.org/wiki/Floppy_diskhttp://en.wikipedia.org/wiki/Compact_Dischttp://en.wikipedia.org/wiki/DVDhttp://en.wikipedia.org/wiki/USB_flash_drivehttp://en.wikipedia.org/wiki/Network_file_systemhttp://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Computer_virushttp://en.wikipedia.org/wiki/Computer_wormhttp://en.wikipedia.org/wiki/Trojan_horse_(computing)http://en.wikipedia.org/wiki/Trojan_horse_(computing)http://en.wikipedia.org/wiki/Spywarehttp://en.wikipedia.org/wiki/Adware8/6/2019 Ch-2 Software Concept QueAns
11/17
A variety of strategies are typically employed. Signature-
based detection involves searching for known patterns of
data within executable code. However, it is possible for a
computer to be infected with new malware for which no
signature is yet known. To counter such so- called zero- daythreats, heuristics can be used.
Q9. Why do you think IDEs are useful in application
development?
Ans: IDEs are designed to maximize programmer
productivity by providing tightly-knit components with
similar user interfaces. This should mean that the
programmer has to do less mode switching versus using
discrete development programs. However, because an IDE is
a complicated piece of software by its very nature, this
higher productivity only occurs after a lengthy learning
process.
Typically an IDE is dedicated to a specificprogramming
language, allowing a feature set that most closely matches
the programming paradigms of the language. However,
there are some multiple-language IDEs, such
as Eclipse, ActiveState Komodo, IntelliJ IDEA, recent versions
ofNetBeans, Microsoft Visual Studio, WinDev, and Xcode.
Q10. What are different types of threats to computer security?
Ans: In Computer security a threat is a possible danger that
might exploit a vulnerability to breach security and thus
cause possible harm.
http://en.wikipedia.org/wiki/Executable_codehttp://en.wikipedia.org/wiki/Countermeasure_(computer)http://en.wikipedia.org/wiki/Zero-day_virushttp://en.wikipedia.org/wiki/Zero-day_virushttp://en.wikipedia.org/wiki/Heuristics#Computer_sciencehttp://en.wikipedia.org/wiki/User_interfacehttp://en.wikipedia.org/w/index.php?title=Mode_switching&action=edit&redlink=1http://en.wikipedia.org/wiki/Programming_languagehttp://en.wikipedia.org/wiki/Programming_languagehttp://en.wikipedia.org/wiki/Programming_paradigmhttp://en.wikipedia.org/wiki/Eclipse_(software)http://en.wikipedia.org/wiki/ActiveState_Komodohttp://en.wikipedia.org/wiki/IntelliJ_IDEAhttp://en.wikipedia.org/wiki/NetBeanshttp://en.wikipedia.org/wiki/Microsoft_Visual_Studiohttp://en.wikipedia.org/wiki/WinDevhttp://en.wikipedia.org/wiki/Xcodehttp://en.wikipedia.org/wiki/Computer_securityhttp://en.wikipedia.org/wiki/Dangerhttp://en.wikipedia.org/wiki/Vulnerability_(computing)http://en.wikipedia.org/wiki/Executable_codehttp://en.wikipedia.org/wiki/Countermeasure_(computer)http://en.wikipedia.org/wiki/Zero-day_virushttp://en.wikipedia.org/wiki/Zero-day_virushttp://en.wikipedia.org/wiki/Heuristics#Computer_sciencehttp://en.wikipedia.org/wiki/User_interfacehttp://en.wikipedia.org/w/index.php?title=Mode_switching&action=edit&redlink=1http://en.wikipedia.org/wiki/Programming_languagehttp://en.wikipedia.org/wiki/Programming_languagehttp://en.wikipedia.org/wiki/Programming_paradigmhttp://en.wikipedia.org/wiki/Eclipse_(software)http://en.wikipedia.org/wiki/ActiveState_Komodohttp://en.wikipedia.org/wiki/IntelliJ_IDEAhttp://en.wikipedia.org/wiki/NetBeanshttp://en.wikipedia.org/wiki/Microsoft_Visual_Studiohttp://en.wikipedia.org/wiki/WinDevhttp://en.wikipedia.org/wiki/Xcodehttp://en.wikipedia.org/wiki/Computer_securityhttp://en.wikipedia.org/wiki/Dangerhttp://en.wikipedia.org/wiki/Vulnerability_(computing)8/6/2019 Ch-2 Software Concept QueAns
12/17
Threats can be classified according to their type and origin: [2]
Type
Physical damage
fire
water
pollution
natural events
climatic
seismic
volcanic
loss of essential services
electrical power
air conditioning
telecommunication
compromise of information
eavesdropping,
theft of media
retrieval of discarded materials
technical failures
equipment
software
capacity saturation
compromise of functions
error in use
abuse of rights
denial of actions
Origin
Deliberate: aiming at information asset
spying
illegal processing of data
accidental
equipment failure
software failure
8/6/2019 Ch-2 Software Concept QueAns
13/17
environmental
natural event
loss of power supply
Q11. What type of damages can be caused by virus to your
computer?
Ans: Computer Virus are designed to disrupt or deny
operation, gather information that leads to loss of privacy or
exploitation, gain unauthorized access to system resources,
and other abusive behavior.
Q12.What are Malware? What type of damage can they cause to
your computer?
Ans: Malware, short for malicious software, consists of
programming (code, scripts, active content, and other
software) designed to disrupt or deny operation, gather
information that leads to loss of privacy or exploitation, gain
unauthorized access to system resources, and other abusive
behavior
Q13. What is a spam? Why has it become a big Internet issue?
Ans: Spam is the use ofelectronic messaging systems
(including most broadcast media, digital delivery systems) tosend unsolicited bulk messages indiscriminately. While the
most widely recognized form of spam is e-mail spam, the
term is applied to similar abuses in other media:
http://en.wikipedia.org/wiki/Electronic_messaginghttp://en.wikipedia.org/wiki/Broadcast_mediahttp://en.wikipedia.org/wiki/E-mail_spamhttp://en.wikipedia.org/wiki/Electronic_messaginghttp://en.wikipedia.org/wiki/Broadcast_mediahttp://en.wikipedia.org/wiki/E-mail_spam8/6/2019 Ch-2 Software Concept QueAns
14/17
Q14.What do you understand by PC intrusion?
Ans: Every PC connected to the internet is a potential target
for hackers. Computers are under constant attack from
cyber vandals. PC intrusion can occur in any of the followingform.
a. Sweeper Attack
b. Denial of Service
c. Password Guessing
Q15.What measure would you take to avoid:
a. Virus attack
b. Spyware
c. Adware
d. Spam
e. PC Intrusion
Ans:
a. Use Anti-Virus and Anti-Spyware software
b. Download Updates Regularly
c. Run Frequent Full-System scans
d. Use caution when downloading files on the internet
e. Be careful with email.
f. Disable cookies, if possible.
g. Keep your system up-to-date.
8/6/2019 Ch-2 Software Concept QueAns
15/17
Q16.What are denial-of-service and sweeper attacks?
Ans:
Denial of Services: this type of attack eats up all the
resources of a system and the system or application come to
a halt.
Sweeper Attacks: This is another malicious program used by
hackers. It sweeps i.e., deletes all the data from the system.
Q17.What is phishing?
Ans: It is criminally fraudulent process of attempting to
acquire sensitive information such as usernames, passwords,
credit card information, account data, etc.
Type C: Long Answer Questions
Q18. Discuss different types of utility software.
Ans: Few examples of utility software are as follows:
Compression utility software: Using this software, you
can reduce (compress) the storage size of any computer
program/file while not in use transfer either through internetor using storage devices like Pen Drive, CD or DVD.
Backup utility software: This utility software facilitates
you to take regular back-up of important files and folders
8/6/2019 Ch-2 Software Concept QueAns
16/17
stored in a drive into another storage device like a Pen drive
or CD or a DVD or another computer. This backup data can
be restored in case of any unforeseen situation.
Disk De-fragmentation Utility software: This simply
means that different parts of the file are scattered across the
hard drive in noncontiguous locations. This type of
fragmented file requires some extra time to access and
slows down the system. Disk de-fragmentation utility
software speeds up the system by rearranging such
fragmented files stored on a disk in contiguous locations in
order to optimize the system performance.
Antivirus detection and protection software: This utility
software provides the user with a virus free work
environment by restricting the entry of any unwanted
program into the system.
Text Editor: This utility software helps one to create, store
or edit a basic text file. A text file generally stores English
type text and can also store numeric and special characters
with little formatting.
Q19. What do you understand by computer security, various
threats to computer security and possible solution tocomputer security?
Ans: Computer Security commonly refers to as CIA (short
form of Confidentiality, Integrity and Authentication),
8/6/2019 Ch-2 Software Concept QueAns
17/17
protects our computer from any unauthorized access and
maintains the system resources. Precisely,
1) Confidentiality ensures protection of the computersystem from any unauthorized access
2) Integrity ensures that information stored in the
computer is protected
3) Authentication ensures the authenticity of the
authorized user
In Computer security a threat is a possible danger that
might exploit a vulnerability to breach security and thus
cause possible harm.
Possible solutionto Computer Security:
a. Use Anti-Virus and Anti-Spyware software
b. Download Updates Regularly
c. Run Frequent Full-System scans
d. Use caution when downloading files on the internet
e. Be careful with email.
f. Disable cookies, if possible.
g. Keep your system up-to-date.
http://en.wikipedia.org/wiki/Computer_securityhttp://en.wikipedia.org/wiki/Dangerhttp://en.wikipedia.org/wiki/Vulnerability_(computing)http://en.wikipedia.org/wiki/Computer_securityhttp://en.wikipedia.org/wiki/Dangerhttp://en.wikipedia.org/wiki/Vulnerability_(computing)Top Related