Assignment 3 - Lani Pennica
Assignment 3 - Lani Pennica
Assignment 3 - Lani Pennica
Write your name at the top of this assignment sheet, including Section letter. Upload your
assignment to Brightspace for grading. Please read this entire assignment before you begin. Please
elaborate and include keywords on each question. Write down your paraphrase in a paragraph.
1. How do computers work with input, output, processing, storage, and stored programs (input, output,
storage, stored program, controlling)?
A computer operates through an interconnected system based on the Input-Process-Output-Storage
model. It begins with input, where data is received from external devices like keyboards, mice, or
sensors, converting human-readable information into a machine-readable format. This data is then
sent to the CPU (Central Processing Unit), which handles processing by performing computations
and executing instructions from a stored program. The control unit within the CPU directs data
flow and ensures that the various components work together smoothly. Data is temporarily stored
in RAM (primary storage) for immediate access or saved permanently in secondary storage (like
HDD or SSD) for long-term use. Once processing is complete, the resulting information is delivered
to the user through output devices such as monitors or speakers, converting the processed data into
a form humans can understand. This cycle is what allows computers to execute complex tasks
efficiently, managing data flow and processing instructions to deliver meaningful results.
2. What is the difference between an operating system and application software (operating system,
application software, system software)?
The main difference between an operating system and application software lies in their roles within
a computer system. An operating system (OS) is the core system software that manages the
computer's hardware and provides a platform for running applications. It serves as an interface
between the user and the hardware, handling essential system-level tasks such as resource
management, file handling, and multitasking. Examples of operating systems include Windows,
macOS, Linux, and Android. In contrast, application software is designed to perform specific tasks
for users, enabling activities like document editing, web browsing, or photo manipulation. Popular
examples of application software are Microsoft Word, Adobe Photoshop, and Google Chrome.
While the OS manages the overall system and hardware operations, application software focuses on
user-driven tasks and relies on the OS to function. Together, the operating system and application
software create a cohesive computing environment, with the OS serving as the foundation that
allows applications to run effectively.
3. Are data and information the same thing (data, information, input, meaningful)?
Data and information are related concepts, but they are not the same thing. Data refers to raw
facts, figures, or statistics that have no context or meaning by themselves. It can be anything from
numbers and text to images and sounds. For example, a series of numbers (e.g., 45, 67, 23) or a list
of names (e.g., Alice, Bob, Charlie) constitutes data. Information, on the other hand, is what you get
when data is processed, organized, or structured in a way that adds meaning and context. When the
raw data is analyzed and interpreted, it becomes information that can be understood and used for
decision-making. For instance, if the numbers mentioned earlier represent the ages of individuals,
they provide meaningful information about their ages. In summary, data is the input that lacks
meaning on its own, while information is the output that results from processing data, making it
meaningful and useful for analysis or decision-making.
4. How do hackers steal passwords (hackers, password, keylogger, malware, target industries)?
Hackers utilize various techniques to steal passwords, exploiting vulnerabilities in systems,
software, and human behavior. One common method is the use of keyloggers, which are malicious
software or hardware that record keystrokes made on a keyboard. Once installed on a target
device, keyloggers capture every key pressed, including usernames and passwords, and send this
data back to the hacker. Malware, a broad term for software designed to cause damage or
unauthorized access, can also infiltrate systems and steal sensitive information. Another prevalent
technique is phishing, where hackers deceive individuals into providing their passwords through
fake emails or websites that mimic legitimate ones. Additionally, hackers may employ brute force
attacks, systematically trying every possible password combination until they find the correct one,
often using automated tools to speed up the process, particularly against weak passwords. Social
engineering tactics further exploit human psychology, as hackers impersonate trusted sources, such
as IT support, to trick individuals into revealing their credentials. Industries that handle sensitive
information, such as finance, healthcare, and technology, are frequent targets due to the valuable
data they store, making them particularly vulnerable to password theft.
The End User License Agreement (EULA) is a legal contract between the software publisher and
the end user that outlines the terms and conditions for using the software. It specifies the rights
granted to the user, detailing how the software can be utilized, such as whether it can be installed on
multiple devices or shared. The EULA includes restrictions, prohibiting actions like reverse
engineering or redistributing the software without permission, which users must follow to avoid
legal consequences. Some agreements may specify an expiration date or conditions for termination,
while also limiting the publisher's liability for damages arising from software use. Overall, the
EULA clarifies both the user’s rights and obligations, serving as a crucial framework for legal
software use.
7. How does local software differ from portable software and web apps (local software, portable
software, web app, mobile app.)?
Local software, portable software, web apps, and mobile apps are distinct types of software that
differ in their installation, usage, and accessibility. Local software is installed directly on a
computer's hard drive and runs locally, typically requiring a specific operating system and
managing dependencies, while users must manually install updates. In contrast, portable software
is designed to run directly from removable storage devices, such as USB drives, without needing
installation on the host computer, allowing users to easily carry their software and settings with
them. Web applicationsare accessed through a web browser and run on a remote server, requiring
no installation; they can be updated automatically and are accessible from any device with
internet connectivity. Finally, mobile applications are specifically designed for mobile devices like
smartphones and tablets, downloadable from app stores, and often utilize device-specific features
such as GPS and camera. Each type of software serves different user needs and preferences,
offering various advantages in terms of flexibility and functionality.
8. How does cloud computing software and hardware differ from traditional computing (cloud, traditional
computing, scalability, server, pros, cons)?
Cloud computing and traditional computing differ significantly in infrastructure, deployment,
scalability, and management. Traditional computing involves housing software and hardware on
local servers or individual machines, requiring organizations to manage their own infrastructure,
which entails substantial upfront investments. In contrast, cloud computing relies on remote servers
hosted by third-party providers, allowing users to access resources over the internet and
eliminating the need for extensive local hardware. This model offers high scalability, enabling
organizations to easily adjust resources based on demand and pay only for what they use. While
traditional computing requires ongoing maintenance and upgrades, cloud providers handle these
tasks, allowing businesses to focus on core functions. The advantages of cloud computing include
cost savings, accessibility, and reduced IT management responsibilities, whereas traditional
computing offers greater control over data and predictable performance but comes with higher
upfront costs and limited scalability. Overall, cloud computing provides a flexible and scalable
alternative to traditional computing, enabling organizations to leverage powerful resources without
managing physical infrastructure.
9. Is installing downloaded software different from installing software from a distribution CD
(downloading, installing software, insert disc, Readme file, reboot)?
Yes, installing downloaded software differs from installing software from a distribution CD in
several ways. When you install downloaded software, you start by downloading the installation file
from the internet. After downloading, you double-click the file to launch the setup wizard, which
may include options for customization. Users often find a Readme file that provides important
installation information. Once the installation is complete, some programs may require a reboot to
finalize the setup. In contrast, installing from a distribution CD begins by inserting the disc into the
computer's CD/DVD drive. The installation may start automatically, or you may need to navigate to
the disc and run the setup file manually. This method also typically involves a setup wizard and
may include a Readme file. Like downloaded software, a reboot may be necessary after installation,
depending on the software. In summary, the main difference lies in the source of the software:
downloaded software requires internet access, while CD-based software uses physical media. Both
methods generally follow similar installation processes.
10. What are the differences between proprietary software, commercial software, shareware, open-source
software, freeware, and public domain software (proprietary, commercial software, shareware,
open-source software, freeware, public domain software)?
Proprietary software, commercial software, shareware, open-source software, freeware, and public
domain software differ in licensing, usage rights, and distribution methods. Proprietary software is
owned by a company or individual, requiring users to purchase a license with restrictions on
modification and distribution, as seen with Microsoft Windows. Commercial software is similar but
is specifically designed for sale, like Microsoft Office. Shareware allows users to try software for
free on a trial basis, often with limited features, encouraging them to purchase the full version, as
exemplified by WinRAR. Open-source software has publicly available source code that can be
modified and distributed freely, with examples including Linux. Freeware is available at no cost but
is typically proprietary, meaning users cannot access the source code or redistribute it, such as
Adobe Acrobat Reader. Finally, public domain software has no ownership rights, allowing anyone
to use and distribute it without restrictions. These categories represent a range of software
availability and usage rights, from strictly controlled proprietary software to completely
unrestricted public domain software.
11. What are software patches and service packs (SP, update, service packs, OS)? Security Patch: A single
hot fix or group of hot fixes suitable for deployment to all customers.
Software patches and service packs are essential for maintaining and enhancing the functionality
and security of applications and operating systems (OS). A patch is a small update designed to fix
specific issues, such as bugs, vulnerabilities, or security flaws in a software program. Patches can
include security patches, which address vulnerabilities that could be exploited by attackers, and
may be deployed as single hot fixes or as a group suitable for all customers. The primary aim of
patches is to improve software performance and security without requiring a complete
reinstallation. In contrast, service packs are larger updates that encompass a collection of patches,
updates, and enhancements, often addressing a broader range of issues while potentially
introducing new features or significant improvements. Service packs are typically released less
frequently and may bundle previous patches into a single package for easier installation. Overall,
patches provide quick fixes for specific problems, while service packs offer comprehensive
solutions, ensuring better performance, compatibility, and security for software applications and
operating systems.
12. How does antivirus software work (antivirus, performance, scanning, quarantine, delete, malicious
code)?
Antivirus software is designed to protect computers and networks from malicious code and threats
by detecting, preventing, and removing malware through several key processes. It routinely scans
files and programs on a computer, performing both full system scans and quick scans to identify
potential threats. One common method used is signature-based detection, where the software
compares files against a database of known malware signatures. Additionally, many antivirus
programs employ heuristic analysis to identify new, previously unknown viruses by analyzing code
behaviors and characteristics, allowing for the detection of emerging threats. The software often
includes real-time protection, continuously monitoring the system for suspicious activity to prevent
malware from executing before it can cause damage. When a potential threat is detected, the
antivirus may place the affected file into quarantine, isolating it from the rest of the system while
allowing the user to review the situation. Users can then choose to delete the quarantined file or
restore it if it’s determined to be a false positive. While essential for safeguarding against threats,
antivirus software can impact system performance due to resource consumption during scans and
updates. Overall, antivirus software employs a multi-faceted approach to protect systems against
malware, ensuring the integrity and security of user data.