HW336512
HW336512
SOFTWARE
Software, which is abbreviated as SW or S/W, is a set of programs that enables the hardware
to perform a specific task. All the programs that run the computer are software. Software is a
set of programs, which is designed to perform a well-defined function. A program is a sequence
of instructions written to solve a particular problem.
Software is a set of instructions, data or programs used to operate computers and execute
specific tasks. It is the opposite of hardware, which describes the physical aspects of a
computer. Software is a generic term used to refer to applications, scripts and programs that
run on a device. It can be thought of as the variable part of a computer, while hardware is the
invariable part.
TYPES OF SOFTWARES
(1) Operating System: It is the main program of a computer system. When the
computer system ON it is the first software that loads into the computer’s memory.
Basically, it manages all the resources such as computer memory, CPU, printer,
hard disk, etc., and provides an interface to the user, which helps the user to interact
with the computer system. It also provides various services to other computer
software. Examples of operating systems are Linux, Apple macOS, Microsoft
Windows, etc.
(2) Language Processor: As we know that system software converts the human-
readable language into a machine language and vice versa. So, the conversion is
done by the language processor. It converts programs written in high-level
programming languages like Java, C, C++, Python, etc(known as source code), into
sets of instructions that are easily readable by machines(known as object code or
machine code).
(3) Device Driver: A device driver is a program or software that controls a device and
helps that device to perform its functions. Every device like a printer, mouse,
modem, etc. needs a driver to connect with the computer system eternally. So, when
you connect a new device with your computer system, first you need to install the
driver of that device so that your operating system knows how to control or manage
that device.
(4) Middleware : The term middleware describes software that mediates between
application and system software or between two different kinds of application
software. For example, middleware enables Microsoft Windows to talk to Excel
and Word. It is also used to send a remote work request from an application in a
computer that has one kind of OS, to an application in a computer with a different
OS. It also enables newer applications to work with legacy ones.
1. General Purpose Software: This type of application software is used for a variety
of tasks and it is not limited to performing a specific task only. For example, MS-
Word, MS-Excel, PowerPoint, etc.
3. Utility Software: This type of application software is used to support the computer
infrastructure. It is designed to analyze, configure, optimize and maintains the
system, and take care of its requirements as well. For example, antivirus, disk
fragmenter, memory tester, disk repair, disk cleaners, registry cleaners, disk space
analyzer, etc.
PROGRAMMING LANGUAGE
A program is a set of instructions that help computer to perform tasks. This set of instructions
is also called as scripts. Programs are executed by processor whereas scripts are interpreted.
The languages that are used to write a program or set of instructions are called "Programming
languages". A computer language is a group of instructions that are used to create computer
programs. The main goal is to achieve human-computer interaction. A programming language
is a computer language that is used by programmers (developers) to communicate with
computers. It is a set of instructions written in any specific language ( C, C++, Java, Python)
to perform a specific task. A programming language is mainly used to develop desktop
applications, websites, and mobile applications.
A language is the main medium of communicating between the Computer systems and the
most common are the programming languages. As we know a Computer only understands
binary numbers that is 0 and 1 to perform various operations but the languages are developed
for different types of work on a Computer. A language consists of all the instructions to make
a request to the system for processing a task. From the first generation and now fourth
generation of the Computers there were several programming languages used to communicate
with the Computer.
The main advantage of natural language is that it helps users to ask questions in any
subject and directly respond within seconds.
Programming languages have been developed over the year in a phased manner. Each phase
of developed has made the programming language more user-friendly, easier to use and more
powerful. Each phase of improved made in the development of the programming languages
can be referred to as a generation.
The programming language in terms of their performance reliability and robustness can be
grouped into five different generations,
1. First generation languages (1GL)
2. Second generation languages (2GL)
3. Third generation languages (3GL)
4. Fourth generation languages (4GL)
5. Fifth generation languages (5GL)
• The programs written in these languages utilize the memory in an efficient manner
because it is possible to keep track of each bit of data.
• These programming languages allow the efficient use of data by implementing the
various database.
• They require less time, cost and effort to develop different types of software
applications.
• The program developed in these languages are highly portable as compared to the
programs developed in the languages of other generation.
OPERATING SYSTEM
An Operating System (OS) is an interface between a computer user and computer hardware.
An operating system is a software which performs all the basic tasks like file management,
memory management, process management, handling input and output, and controlling
peripheral devices such as disk drives and printers.
The operating system helps in improving the computer software as well as hardware. Without
OS, it became very difficult for any application to be user-friendly. Operating System provides
a user with an interface that makes any application attractive and user-friendly. The operating
System comes with a large number of device drivers that makes OS services reachable to the
hardware environment. Each and every application present in the system requires the Operating
System. The operating system works as a communication channel between system hardware
and system software. The operating system helps interact an application with the hardware part
without knowing about the actual hardware configuration. It is one of the most important parts
of the system and hence it is present in every device, whether large or small device.
1. Resource Management: The operating system manages and allocates memory, CPU
time, and other hardware resources among the various programs and processes running
on the computer.
2. Process Management: The operating system is responsible for starting, stopping, and
managing processes and programs. It also controls the scheduling of processes and
allocates resources to them.
4. Security: The operating system provides a secure environment for the user,
applications, and data by implementing security policies and mechanisms such as
access controls and encryption.
5. Job Accounting: It keeps track of time and resources used by various jobs or users.
6. File Management: The operating system is responsible for organizing and managing
the file system, including the creation, deletion, and manipulation of files and
directories.
9. User Interface: The operating system provides a user interface that enables users to
interact with the computer system. This can be a Graphical User Interface (GUI), a
Command-Line Interface (CLI), or a combination of both.
10. Backup and Recovery: The operating system provides mechanisms for backing up
data and recovering it in case of system failures, errors, or disasters.
11. Virtualization: The operating system provides virtualization capabilities that allow
multiple operating systems or applications to run on a single physical machine. This
can enable efficient use of resources and flexibility in managing workloads.
12. Performance Monitoring: The operating system provides tools for monitoring and
optimizing system performance, including identifying bottlenecks, optimizing resource
usage, and analyzing system logs and metrics.
13. Time-Sharing: The operating system enables multiple users to share a computer
system and its resources simultaneously by providing time-sharing mechanisms that
allocate resources fairly and efficiently.
14. System Calls: The operating system provides a set of system calls that enable
applications to interact with the operating system and access its resources. System calls
provide a standardized interface between applications and the operating system,
enabling portability and compatibility across different hardware and software
platforms.
15. Error-detecting Aids: These contain methods that include the production of dumps,
traces, error messages, and other debugging and error-detecting methods.
Cluster Operating Systems: Cluster Operating Systems are designed to run on a group of
computers, or a cluster, to work together as a single system. They are used for high-
performance computing and for applications that require high availability and reliability.
Examples include Rocks Cluster Distribution and OpenMPI.
The first version of Windows was released on November 20, 1985, as a graphical operating
system shell for MS-DOS in response to the growing interest in graphical user interfaces
(GUIs). Windows is the most popular desktop operating system in the world. As of September
2022, the most recent version of Windows is Windows 11 for consumer PCs and tablets,
Windows 11 Enterprise for corporations, and Windows Server 2022 for servers.
FEATURES OF WINDOWS
Below are mentioned some of the most crucial and notable features of the Windows operating
system:
• Control Panel
• Cortana
• File Explorer
• Internet Browser
• Disk Cleanup
• Speed
• Hardware Requirements
• Search and Organization
• Compatibility
• Taskbar
• Safety
• Interface
(2) Cortana
It is used to display the files and folders which are on the computer. It is also known
as Windows Explorer. It gives the user the ability to browse data on the hard drive,
SSD, and other inserted removable disks. It allows the user to manage the content
according to their preference, such as a user can delete or rename a file and search and
transfer data. Windows 10 introduced a feature named Cortana, which is able to accept
voice commands. It can perform various tasks such as it can answers your questions,
search data on your computer, online purchases, set reminders, and appointments, etc.
Furthermore, it acts like other voice-activated services such as Google Assistant, Alexa,
or Siri, including one more benefit of searching the information on your computer. To
open the Cortana in Windows 10, press Window key + S.
(6)Start Menu
Microsoft Windows contains a start menu to the left side of the taskbar. It displays
programs and utilities that are installed on the computer. It can be simply opened by
clicking on the Start menu button or pressing the start key on the keyboard. As the name
suggests, this is the part where the user starts his actions, after turning on the computer.
The start menu contains a list of all the applications, pinned applications, and recently
used applications. We can search various files and applications using the search bar.
There is also an option of switching the user and turning off/restart/sleep mode options.
So start basically is a place where user can begin their work by choosing the desired
place to start their task.
(7)MS-Paint
This is a feature from the 1st version of Windows itself. As the name suggests, it is used
to paint, i.e., create drawings, paintings, colourings, etc. A blank canvas along with
various inks, pens, and shapes. Now an improvised version of MS Paint that is known as
Paint-3D comes with more and improved features.
Windows allows users to use the command Although the Linux command-
line, but not as a Linux command line. To line offers more features for
Command
open the command line, click on the Run administration and daily tasks,
Line
dialog box and type CMD in the run search it does not offer much to end-
bar and press Enter key. users.
It provides users the online and integrated A wide number of books are
help systems, as well as a large number of available to offer help about
Support
informative books, are available to provide Linux, including online
help for people at all skill levels. support.
ADVANTAGES OF WINDOWS OS
• Backing of majority of equipment- The majority of the clients use windows and that
amounts to almost 95%, the drivers for windows are made by a majority of merchants.
• Clean and lucid GUI- The Graphical User Interface provided by Windows is clean
and can be understood well by a new user too. Windows UI is better than MAC and
Linux.
• Microsoft Office- Windows users are provided with Microsoft Office which contains
a lot of applications like- Powerpoint, excel, word, OneNote, teams etc. This has built-
in support for Windows and works smoothly on windows.
DISADVANTAGE OF WINDOWS OS
• Many of the Windows products are paid- Many of the essential features of windows
os are paid which include applications like photoshop, games and various other
applications.
• Malicious virus- The majority of the virus is made for windows as it has a huge number
of clients. For our security purpose, we have to be cautious and install antivirus
software.
• Costly- With respect to Windows, Linux is open sourced so it can be used by anyone,
but the cost of Windows is high.
• Technical support- Most users do not get good technical support from the Windows
team. If there is an organisation that uses windows, they get technical support from the
windows team.
• Rebooting a system- When the system slows down, the system has to be rebooted.
This happens when many programs run at the same time which slows down the system.
This leads to a slower speed so rebooting has to be done.
• Prone to hacking- Since windows are widely used, hackers tend to hack windows OS
more than other OS. There is no feature in Windows OS that prevents this.
• High system requirements- There are a lot of requirements that need to be fulfilled
before installing Windows. The requirements specify the required specifications of
processor, hard disk space, OS, display and graphic card.
VERSIONS OF WINDOWS
The very first version of the Windows operating system was introduced by Microsoft as 1.0. It
was released for home computing and professional services in 1985. Later, Microsoft launched
different versions of the Windows operating system. The major motive of launching the
Windows Operating System was to provide home computing along with professional uses.
1. Windows 1.0
• It was released on November 20, 1985
• Pure Operating Environment
• Used Graphical User Interface
• Simple Graphics
• Offered limited multi-tasking was expected to have a better future potential
2. Windows 2.0
• It was released on December 9, 1987
• 16-bit Graphic User Interface (GUI) based operating environment
• Introduced Control Panel, and the first version of MS Word and Excel
• Unlike Windows 1.0, it had the capacity to allow applications to overlap each other
• It was also the last Windows OS which did not require a hard disk
• Hardware played an important role
3. Windows 3.0
• It was released in 1990
• It was better at multitasking
• Used 8086 microprocessors
• It has both, conventional and extendable memory
• First version of Windows to gather critical appreciation
• Better memory/ storage
Note* – None of the above mentioned Windows was Operating Systems. They all came under
the category of Windows, working based on a graphical operating environment. It was
Windows 95, which was the first Operating System released by Microsoft.
4. Window 95
• It was the first complete Operating System
• It was released on August 15, 1995
• It merged MS-DOS and Windows products
• It simplified plug and play features
• Taskbar and Start menu was introduced with this Windows OS
• Advanced from 16 bit GUI to 32 bit GUI
• Long file names could be saved
• Initially, computers with Windows 95 did not have Internet Explorer installed but by
the release date of Windows 95, the first version of Internet Explorer was installed in
the software
• On December 31, 2001, Windows declared this version of OS outdated and ended its
support for the same
5. Windows 98
• It was released to manufacturing on May 15, 1998
• It was a 16 bit and 32 bit product based on MS DOS
• It was not an entirely new version but just a tuned-up version to Windows 95
• Internet Explorer 4.01 was released along with this Windows version
• It did not support USB printers or mass storage devices
• An update to this version “Windows SE” was released in 1999
6. Windows 2000
• It was officially released on February 17, 2000. However, its manufacturing had begun
in late 1999
• A core set of features was followed for manufacturing Windows 2000 but 4 different
editions, targeting different sectors of the market were released. These included: Server,
Professional, Advanced Server and Datacenter Server
• It was considered as one of the most secure OS ever
• A local disk manager was introduced with these Windows
• Multilingual User Interface – it supported many different languages
7. Windows XP
• While the manufacturing started on August 24, 2001, the official product was released
on October 25, 2001
• Advanced portable PC support
• Automatic wireless connection support
• Fast start-up
• Better Graphical User Interface (GUI)
• Help and support centre
8. Windows Vista
• It was released on January 30, 2007
• It had an upgraded version of Graphical User Interface
• It was the first operating system to use DVD-ROM for installation
9. Windows 7
• It was released on October 22, 2009
• A large number of new features were introduced
• Redesigned Windows shell with an updated taskbar
• Incremental upgrade to the Windows line
• Libraries were added in the file management system
• A few features from the past Windows were removed
• Extended hardware support
10. Windows 8
• It was released for retail on October 26, 2012
• Optimisations for touch-based
• Installed in new devices like Laptops, Mobile phones, tablets, etc.
• Increased integration with cloud services
• Windows Store service for software distribution
• Task manager had been redesigned
• New security features were introduced
• Online Applications could be directly downloaded
11. Windows 10
• It was released on July 29, 2015
• Addresses shortcomings in the user interface first introduced with Windows 8
• A virtual desktop system
• It had the ability to run windows store apps within windows on the desktop rather than
in the full-screen mode
• Included new icons
• To reduce storage shortcomings, Windows 10 automatically compresses the file size
12. Windows 11
• It was released on October 05, 2021
• It offers a refreshed look with start button in the centre at the bottom.
• Improved performance, Xbox gaming enhancements
• It will run Android apps
• It’s a free upgrade from Windows-10
• Easier transition from monitor to laptop, and better multitasking
MS-DOS stands for Microsoft Disk Operating System and is also known as Microsoft DOS. It
was the Microsoft-marketed version of the first operating system to be widely installed on
personal computers (PCs). It was essentially the same OS that Bill Gates's young company
developed for IBM as Personal Computer - Disk Operating System (PC-DOS).
In 1981, IBM licensed and marketed its PC-DOS rebranding of MS-DOS to run on IBM PCs.
MS-DOS was released for x86 computers, went through eight major versions and was
ultimately retired from all active support in 2006. Most users of either DOS system simply
referred to it as Disk Operating System. Like PC-DOS, MS-DOS was and still is a non-
graphical, line-oriented, command-driven OS. It has a relatively simple but not overly friendly
user interface.
DOS COMMANDS
DOS Commands are instructions to perform tasks on files and directories very useful to
Windows users. DOS commands are case insensitive. And as you already know, file is the area
where we store group of information or data, and collection of group of files is called a
directory.
In MS-DOS the file name follow 8dot3 format and is divided into two parts – primary name
and secondary name. Primary name is up to 8 characters long and secondary name is up to 4
characters with dot. For example, in the file-name Logo.jpg, Logo is the primary name and .jpg
is the secondary name. Secondary names are fixed for particular type of file, meaning for
system files the secondary name is designated as .sys, for text files it is .txt and so on.
To name a file or directory special characters like < > , . / * ? | & Space are not allowed.
Here is the list of some of the important types of files with their default secondary names:
1. Internal Commands : These commands are used for performing basic operations on
files and directories and they do not need any external file support and are defined inside
an important system file called COMMAND.COM.
2. External Commands : These commands are used for performing advanced tasks and
they do need some external file support as they are not stored in COMMAND.COM.
There are also Batch commands or Batch files which are text files that contain a list of internal
and/or external commands which are executed in sequence when the batch file is executed.
AUTOEXEC.BAT gets executed automatically on booting.
In MS-DOS, keyboard shortcuts involving handy ones like Functional keys, arrows, pipe
character (” | “), asterisk (*), ?, [] and ESC are of great help for recalling to searching to clearing
command line etc.
• F2 retypes all characters from the last command entry up to the one identical to your
next keystroke. It asks you to enter char to copy up to and retypes the last command up
to that char.
• F3 retypes all remaining characters from the last command entry.
• F4 stores all characters beginning at the first match with your next keystroke and ending
with the last command entry.
• F5 or F8 keys give all the previously typed commands.
• F6 places a special end-of-file code at the end of the currently open file. Sometimes
referred to as Ctrl+z or ^z.
• F7 key displays command history and ALT+F7/ESC hides it.
• F9 is used to select a command by number. Just enter the command number and it
fetches the command line for you.
• Pipe character (” | “) combines several series of commands or programs inter-
dependent.
• Name enclosed within [] indicate a sub-directory.
• Asterisk (*) is used to represent zero or more any characters.
• ? is used to present zero or single character.
1. DATE
This command is used to display the system current date setting and prompt you to
enter a new date. The syntax is: DATE [/T | date]
If you type DATE without parameters then it displays current date and prompts to enter
new date. We should give new date in mm-dd-yy format. If you want to keep the same
date just Press ENTER. DATE command with /T switch tells the command to just
output the current system date, without prompting for a new date.
2. TIME
This command is used to displays or set the system time.
The syntax is: TIME [/T | time]
Same as DATE command, typing TIME with no parameters displays the current time
and a prompt for a new one. Press ENTER to keep the same time. TIME command used
with /T switch tells the command to just output the current system time, without
prompting for a new time.
3. COPY CON
It is used to create a file in the existing directory. Here CON is a DOS reserved word
which stands for console.
Syntax is: COPY CON <filename> after that press Enter and start typing your text and
after you’re done typing your text, to save and exit hit F6 key.
4. TYPE
This command is used to display the contents of a text file or files.
The syntax is: TYPE [drive:][path]<filename>
Now, lets try to display the contents of the file named filename we’ve created earlier
using COPY CON command.
5. CLS
It is used to clear the screen. Syntax is CLS
6. REN
This command is used to change/modify the name of a file or files.
Syntax is: REN [drive:] [path] filename1 filename2.
Here, filename1 is source file for which you wanted to change the name, and filename2
will obviously becomes your new file name. Also note that you cannot specify a new
drive or path for your destination file.
7. DIR
This command displays a list of files and subdirectories in a directory. Syntax
is: DIR [drive:] [path] [filename]
[/A[[:]attributes]] [/B] [/C] [/D] [/L] [/N] [/O[[:]sortorder]] [/P] [/Q]
[/S] [/T[[:]timefield]] [/W] [/X] [/4]
Here,
[drive:][path][filename] Specifies drive, directory, and/or files to list.
This sorts and displays the list based on time field specified.
T:timefield
C for Creation, A for Last Access, W for Last Written
8. PATH
This command displays the path that how we have come to the present position or sets
a search path for executable files.
Its Syntax is PATH [[drive:]path[;…][;%PATH%]]
Typing PATH without any parameters displays the current path under current directory.
Typing PATH ; clears all search-path settings and direct cmd.exe to search only in the
current directory. And including %PATH% in the new path setting causes the old path
to be appended to the new setting.
9. VER
This command displays the version of the Microsoft Windows running on your
computer.
10. VOL
It displays the disk volume label and serial number, if they exist for the drive specified.
If no drive is specified it displays for the active drive.
Syntax is VOL [drive:]
11. DEL/ERASE
Used to delete one or more files.
Syntax is DEL [/P] [/F] [/S] [/Q] [/A [[:] attributes]] <names>
Here,
Specifies a list of one or more files or directories.
Wildcards * and ? may be used to delete multiple files. *
indicates group of unknown characters whereas using
names
wildcard ? in file-names is for single unknown character.
And using this command if a directory is specified, all
files within the directory will be deleted.
12. COPY
This command is useful in copying one or more files to another file or location. Syntax
is COPY [/D] [/V] [/N] [/Y | /-Y] [/Z] [/A | /B ] source [/A | /B] [+ source
[/A | /B] [+ …]] [destination [/A | /B]]
The different switches that can be used with this command as follow along with their
use.
source It specifies the file or files to be copied.
This specifies the directory and/or filename for the new file
destination or files.
CD (or CHDIR) stands for create or change directory and it allows to display
the name of or change the current directory or rather we can say come out of a
directory. Syntax is CD [/D] [drive:][path]
Typing CD drive: displays the current directory in the specified drive. This CD
(or CHDIR) command does not treat spaces as delimiters due to which it allows
to CD into a subdirectory name that contains a space without surrounding the
name with quotes.
14. PROMPT
This changes the cmd.exe command prompt. By default the prompt is always set to the
name of current drive followed by > sign.
Customize the Prompt
To customize the prompt to display any text of your choice, use the syntax
prompt anytext and this will change the prompt to new command prompt anytext.
Prompt with Options (or Special Codes)
You can use prompt with options. To let the prompt display the current working
directory use prompt $p$g
$p in the above signifies the current drive and path.
$g signifies the greater than sign >
1. EDIT
This command is used to modify or change the data of a file.
Syntax is EDIT [/B] [/H] [/R] [/S] [filename(s)]
Using switch /B you can force the edit in monochrome mode. /H displays the maximum
number of lines possible for your system hardware. Whereas using /R and /S one can
load files in read-only mode and force the use of short filenames respectively.
[filename(s)] is used to specify file(s) to go edit. You can use wildcards (* and ?) to
specify multiple files.
2. XCOPY
This command is used to copy files and directory trees from one disk to another disk.
Syntax is XCOPY source [destination] [/A | /M] [/D[:date]] [/P] [/S
[/E]] [/V] [/W] [/C] [/I] [/Q] [/F] [/L] [/G] [/H] [/R] [/T] [/U] [/K] [/
N] [/O] [/X] [/Y] [/-Y] [/Z] [/EXCLUDE:file1[+file2][+file3]…]
3. LABEL
It is used to create, change, or delete the volume label of a disk.
Syntax is: LABEL [drive:] [label]
Here, [drive:] is for secifying the drive letter of a drive to be labelled and [label]
specifies the label of the volume disk. [/MP] is used to specify that the volume should
be created as a mount point and [volume] is used to specify volume name, usually
mentioned after drive letter followed by colon and then giving volume name required.
4. DISKCOPY
This command copies the contents of one floppy from the source drive to a formatted
or un-formatted floppy disk in the destination drive. This command copies the data from
particular position on the source disk to exactly the same position on the destination
disk. Syntax Diskcopy A: B:
copies contents of A: to B: drive. This command can be used with /V switch which
verifies that the disk is copied correctly.
5. CHKDSK
This command is used to check a disk and display a status report with properties of disk
like serial number, volume label, memory and other properties along with errors on the
disk if any.
Syntax is CHKDSK [volume path] [/F] [/V] [/R] [/X] [/I] [/C] [/L[:size]]
[volume path] is where you specify the drive letter followed by a colon and volume
name to be checked. using /F switch allows you to fix errors on the disk. /V display full
path and/or cleanup message if any. /R is used in tandem with /F and used to locate bad
sectors and recover readable information. If you wanted to perform a less vigorous
check of index entries on the disk then the right option is to use /I or /C rather then /R
as they skip checking of cycles on the volume and helps in reducing the amount of time
required to run chkdsk. Using /X forces the volume to dismount first before checking
is performed. /L:size is all about specifying the log file size in kilobytes.
6. TREE
This command is very useful to view the list of directories and subdirectories present
on the disk in graphical form. If you wanted to include files also with directories and
subdirectories, then you’ll have to give the command line as tree/f which presents the
tree view of all the content on your disk. Here is the syntax for this command with
allowed switches: TREE [drive:path] [/F] [/A]
In case you wanted use ASCII instead of extended characters, then go ahead include /A
in the command line.
7. DELTREE
This command is used to remove a directory along with its contents.
Syntax is deltree [drive:path]
here, [drive:path] specifies the directory name to be deleted. All the subdirectories and
files in this directory will be deleted without prompt and there’s not getting back. So,
keep caution while using this command.
8. DOSKEY
This command is generally used to edits command lines and recalls commands.
Syntax is DOSKEY [/REINSTALL] [/HISTORY] [text]
Here, /REINSTALL installs new copy of doskey, /HISTORY is used to display all
previously given commands stored in memory. And [text] specifies the commands you
want to record.
9. FIND
This command searches for a specific text string in a file or files. Syntax
is FIND [/V] [/C] [/N] [/I] [/OFF] “string” [[drive:][path]filename[ …]]
The basic essential elements in the command line for find are – the string enclosed in ”
” and [[drive:][path]filename(s)]. String specifies the text string to find in the file and
[[drive:][path]filename(s)] specifies the file or files where the text string search is to be
done. If a path is not specified, FIND searches the text typed at the prompt or piped
from another command. When you append /OFF in the command line, it searches and
finds even those files with offline attribute set. Apart from searching the text string, this
command is useful in:
Displaying all lines not containing the specified string @ /V
Displaying only the number count of lines containing the text string @
/C
Displaying line numbers with the displayed lines @ /N
10. SORT
This command is used to arrange the data of a file in alphabetical order (A-Z, 0-9) or
reverse alphabetical order.
Syntax is SORT [/R] [[drive1:][path1]filename1] [/T [drive2:][path2]] [/O
[drive3:][path3]filename3]
/R in command line reverses the sort order; that is, the data of the specified file sorts
sorts Z to A, then 9 to 0. [drive1:][path1]filename1 specifies the file to be sorted.
/T [drive2:][path2] is used in cases of data overflow in main memory and it specifies
the path of the directory to hold the sort’s working storage. And
/O [drive3:][path3]filename3 specifies the file where the sorted input is to be stored.
11. FORMAT
This command creates a new root directory and a File Allocation Table (FAT) for the
disk. In order for MS-DOS to be able to use a new disk you must use this command to
format the disk.
Warning As Format command deletes all existing data, use this command with
extreme caution. Any disk formatted (except with /U switch) may be later
unformatted using the UNFORMAT command.
12. BACKUP
The Backup command backs up one or more files from one disk to another. You can
backup files onto either a hard disk or on a floppy disk. Syntax is
BACKUP Source Destination
Here source specifies the location of files to be backed up and destination drive specifies
the drive on which you want to store the backup files. The backed-up files are stored in
backup.nnn and control.nnn files where nnn represents the backup disk number.
Backup with Switches
The /S switch can be used to backup the contents of all files in the source
including the contents of sub-directories.
The /N switch can be used to backup only those files that have changed
since the last backup.
Backup command with /D:mm-dd-yyyy switch will backup files that
have changed since the data specified.
13. RESTORE
The RESTORE command restores files that were backed up by using BACKUP
command. Syntax: RESTORE drive1 drive2:path
Here drive1 specifies the drive on which backup files are stored.
drive2:path specifies the path to which those backup files will be restored.
► Using backup command with /S switch is used to restore all backup files to their
original directories and sub-directories.
COMPUTER VIRUS
The full form of "virus" in a computer is "Vital Information Resources Under Siege". It refers
to a type of malicious software or malware that can damage a computer's data, files, and
software.
A computer virus is a kind of malicious computer program, which when executed, replicates
itself and inserts its own code. When the replication is done, this code infects the other files
and program present on your system. These computer viruses are present in various types and
each of them can infect a device in a different manner.
A computer virus is a type of malicious software program (“malware“) that, when executed,
replicates itself by modifying other computer programs and inserting its code. When this
replication succeeds, the affected areas are then said to be “infected“. Viruses can spread to
other computers and files when the software or documents they are attached to are transferred
from one computer to another using a network, a disk, file-sharing methods, or through infected
email attachments.
A computer virus is a program which can harm our device and files and infect them for no
further use. When a virus program is executed, it replicates itself by modifying other computer
programs and instead enters its own coding. This code infects a file or program and if it spreads
massively, it may ultimately result in crashing of the device. Across the world, Computer
viruses are a great issue of concern as they can cause billions of dollars’ worth harm to the
economy each year.
• Speed of the System – In case a virus is completely executed into your device, the time
taken to open applications may become longer and the entire system processing may
start working slowly
• Pop-up Windows – One may start getting too many popup windows on their screen
which may be virus affected and harm the device even more
• Log out from Accounts – In case of a virus attack, the probability of accounts getting
hacked increase and password protected sites may also get hacked and you might get
logged out from all of them
• Crashing of the Device – In most cases, if the virus spreads in maximum files and
programs, there are chances that the entire device may crash and stop working
Parts of a Virus
There are various parts of a virus for it to function normally. It is a program which replicates
itself. The parts of the viruses are:-
• Infection mechanism:- this the way in which the viruses are spread it propagates. To
be simple, a virus follows a search routine in which the virus finds new files of new
disks to get them infected and harm the data stored in it in the process
• Trigger:- It is the part of the program which is the compiled version of it and can be
used anytime inside of a file which can be executed. During the time of the program
running in the computer determines the payload to be started. This Trigger may be a
particular data or a particular action performed by the user such as double Click to
upload a particular file
• Payload:-payload is the real body of the program which is to be executed for the
Malicious purpose Of the virus to be fulfilled. It is an activity which can cause harm to
the computer and at times it can be not harmful too But can lead to the spread of the
activity
Phases of Virus
4 stages of virus which are as follows:-
• Dormant phase- This is the time when the computer program is usually idle. This is
when the virus is hidden on your system, lying in wait. It signifies that time when the
virus has usually found out its target place in the computer but stays silent and does not
take action during this time .It waits for the virus to activate by the trigger
• Propagating phase- It is that part In time when the virus Starts its normal working
starting to replicate and multiply itself in various parts in the computer storage probably
every program which gets infected. The virus will have a clone which will be in the
propagating phase on its own. This is the viral stage, when the virus begins to self-
replicate, stashing copies of itself in files, programs, or other parts of your disk. The
clones may be slightly altered in an attempt to avoid detection, and these copies will
also self-replicate, creating more clones that continue to copy and spread
• Triggering phase- In the earlier stages we saw that the viruses were staying silent and
waiting for this moment. The trigger face gets activated when the several copies of the
virus at different files are off then facing the trigger of the viruses being activated starts
the execution of the program. A specific action is generally required to trigger or
activate the virus. This could be a user action, like clicking an icon or opening an app.
Other viruses are programmed to come to life after a certain amount of time, such as
a logic bomb designed to trigger after your computer has rebooted a certain number of
times (this is done to obfuscate the origin of the virus).
• Execution phase- These start the execution of the program in this phase the payload is
released and it can cause destructive activities such as detecting files on it’s own
corrupting files or even popping humorous messages on screen. Now the virus’s
program is executed and releases its payload, the malicious code that harms your
device
• Macro Virus – A virus written in the same macro language as used in the software
program and infects the computer if a word processor file is opened. Mainly the source
of such viruses is via emails.
MALWARE
The term "malware" refers to harmful software that disrupts or manipulates an electronic
device's normal operation. Malware can infect personal computers, smartphones, tablets,
servers and even equipment basically any device with computing capabilities. The first form
of malware ever developed was the computer virus. As technology, computing and software
have advanced during the last two decades, so has the sophistication and prevalence of
malicious software.
Types of malware include computer viruses, worms, Trojan horses, ransomware and spyware.
These malicious programs steal, encrypt and delete sensitive data; alter or hijack core
computing functions; and monitor end users' computer activity.
Malware can infect networks and devices and is designed to harm those devices, networks and
their users in some way. Depending on the type of malware and its goal, this harm might present
itself differently to the user or endpoint. In some cases, the effect of malware is relatively mild
and benign, and in others, it can be disastrous.
• Service disruption. Malware can disrupt services in several ways. For example, it can
lock up computers and make them unusable or hold them hostage for financial gain by
performing a ransomware attack. Malware can also target critical infrastructure, such
as power grids, healthcare facilities or transportation systems to cause service
disruptions.
• Identity theft. Malware can be used to steal personal data which can be used to
impersonate victims, commit fraud or gain access to additional resources. According to
the IBM X-Force Threat Intelligence Index 2024, there was a 71% rise in cyberattacks
using stolen identities in 2023 compared to the previous year.
• Stealing resources. Malware can use stolen system resources to send spam emails,
operate botnets and run cryptomining software, also known as cryptojacking.
• System damage. Certain types of malware, such as computer worms, can damage
devices by corrupting the system files, deleting data or changing system settings. This
damage can lead to an unstable or unusable system.
No matter the method, all types of malware are designed to exploit devices at the user's expense
and to benefit the hacker -- the person who has designed or deployed the malware.
• Removable drives. Malicious programs can be delivered to a system with a USB drive
or external hard drive. For example, malware can be automatically installed when an
infected removable drive connects to a PC.
• Infected websites. Malware can find its way into a device through popular
collaboration tools and drive-by downloads, which automatically download programs
from malicious websites to systems without the user's approval or knowledge.
delay execution until after it leaves the sandbox; and fileless malware that resides only
in the system's RAM to avoid being discovered.
• Software from third-party websites. There are instances where malware can be
downloaded and installed on a system concurrently with other programs or apps.
Typically, software from third-party websites or files shared over peer-to-peer networks
falls under this category. For example, a computer running a Microsoft operating
system (OS) might end up unknowingly installing software that Microsoft would deem
as a potentially unwanted program (PUP). However, by checking a box during the
installation, users can avoid installing unwanted software.
TYPES OF MALWARES
Different types of malware have the following unique traits and characteristics:
• Virus.
A virus is the most common type of malware that can execute itself and spread by
infecting other programs or files. A computer virus is designed to reproduce itself and
spread from one file or program to another, and, less frequently, to other computers on
a network.
After damaging all files on the current user's computer, the virus spreads and sends its
code via the network to the users whose e-mail addresses are stored on the current user's
computer system. Specific events may also trigger a virus. Several types of viruses
include parasitic, polymorphic, stealth, boot sector, memory resident, and metamorphic
viruses. Infection with a virus can be avoided by blocking the entry of a virus.
• Worm.
A worm can self-replicate without a host program and typically spreads without any
interaction from the malware authors. Computer worms replicate themselves to spread
through a network. A computer worm will spread across computer networks, as
opposed to viruses that usually spread from file to file on a single computer.
A worm is a form of a malicious program (virus) that replicates itself as it moves from
one system to another and leaves copies of itself in the memory of each system. A worm
• Trojan horse.
A Trojan horse is designed to appear as a legitimate software program to gain access to
a system. Once activated following installation, Trojans can execute their malicious
functions. Trojan horses masquerade as harmless programs, but when activated, they
damage their host computer. Unlike a virus, a Trojan horse does not replicate itself;
instead, this malware usually attempts to steal files or passwords
The Trojan horse gets its name from the well-known story of the Trojan War. It is a
malicious piece of code with the ability to take control of the system. It is intended to
steal, damage, or do some other harmful actions on the computer system. It attempts to
deceive the user into loading and running the files on the device. Once it executes, it
permits cybercriminals to execute various tasks on the user's system, like modifying
data from files, deleting data from files, etc. The trojan horse cannot replicate itself,
unlike many viruses or worms.
A Trojan virus spreads by spamming a huge number of users' inboxes with genuine-
looking e-mails and attachments. If cybercriminals induce users to download malicious
software, it may affect the users' devices. Malicious malware could be hidden in pop-
up ads, banner adverts, or website links.
Some well-known Trojan horses' instances are Beast, Back Orifice, Zeus, and The
Blackhole Exploit Kit.
• Spyware. Spyware collects information and data on the device and user, as well as
observes the user's activity without their knowledge. Spyware infects and operates on
a user’s computer to monitor user activity and extract information. For instance, while
spyware runs on a machine, the hacker can monitor the programs used and sites visited
while tracking keystrokes to determine login and password information.
• Backdoor virus. A backdoor virus or remote access Trojan (RAT) secretly creates a
backdoor into an infected computer system that lets threat actors remotely access it
without alerting the user or the system's security programs.
• Adware. Adware tracks a user's browser and download history with the intent to
display pop-up or banner advertisements that lure the user into making a purchase. For
example, an advertiser might use cookies to track the webpages a user visits to better
target advertising.
• Keyloggers. Keyloggers, also called system monitors, track nearly everything a user
does on their computer. This includes writing emails, opening webpages, accessing
computer programs and typing keystrokes.
• Logic bombs. This type of malicious malware is designed to cause harm and typically
gets inserted into a system once specific conditions are met. Logic bombs stay dormant
and are triggered when a certain event or condition is met, such as when a user takes a
specific action on a certain date or time. Logic bombs are concealed in programs and
can either be triggered by a user’s action or released at a predetermined time. They can
crash a system or wipe a hard drive
Infection Viruses spread Worms take advantage of The Trojan horse runs
Method through system flaws. as a program and is
executable files. interpreted as utility
software.
Rate of Viruses spread Worms spread at a quicker rate In addition, the spread
Spreading at a moderate than viruses and Trojan horses. rate of Trojan horses is
rate. slower than that of
viruses and worms.
Damage Can cause loss Can overload system resources Can steal personal and
of data and and network bandwidth. financial information.
corruption of
programs.
Antivirus and antimalware software can be installed on a device to detect and remove malware.
These tools can provide real-time protection through constant scanning or detect and remove
malware by executing routine system scans.
2. Exercise caution with email: Users can prevent malware by practicing safe behavior
on their computers or other personal devices. This includes not opening email
attachments from strange addresses that might contain malware disguised as a
legitimate attachment -- such emails might even claim to be from legitimate companies
but have unofficial email domains.
3. Use a firewall: Users should enable or configure a firewall on their network router to
monitor and control incoming and outgoing network traffic. Firewalls can help block
unauthorized access and protect against the spread of malware.
5. Avoid pop-ups: Users should always avoid clicking on pop-ups even if they look
legitimate. Clicking on a pop-up advertisement can lead to unintentional downloads of
malware or redirect users to malicious websites where malware could be automatically
downloaded or installed without their consent. Additionally, web browser settings
should be set to block both pop-ups and adware.
6. Use strong passwords: Strong and unique passwords that aren't easily guessable
should be created for all accounts and devices. Additionally, multifactor
authentication should be enabled wherever possible, as it requires multiple levels of
authentication from a user before they can log in or access a system.
7. Avoid dubious websites: Users should be selective when browsing online and avoid
websites that seem risky, such as those that offer screensavers for download.
8. Perform regular backups: Users should do regular offsite or offline backups to ensure
the most recent version of data can't be breached but is available to be recovered after
a malware attack.
What is an Anti-Virus?
An anti-virus is a software which comprises programs or set of programs which can detect and
remove all the harmful and malicious software from your device. This anti-virus software is
designed in a manner that they can search through the files in a computer and determine the
files which are heavy or mildly infected by a virus.
Antivirus software is a program that searches for, detects, prevents, and removes software
infections that can harm your computer. Antivirus can also detect and remove other dangerous
software such as worms, adware, and other dangers. This software is intended to be used as a
preventative measure against cyber dangers, keeping them from entering your computer and
causing problems. Antivirus is available for free as well. Anti-virus software that is available
for free only provides limited virus protection, whereas premium anti-virus software offers
more effective security.
Given below is a list of few of the major antivirus software which is most commonly used:
• Norton Antivirus
• F-Secure Antivirus
• Kaspersky Antivirus
• AVAST Antivirus
• Comodo Antivirus
• McAfee Antivirus
These are few of the many anti-virus software widely used to remove viruses from a device.
E-WASTE
E-waste, also known as electronic waste, refers to discarded or broken electronic devices like
computers, smartphones, televisions, and other household appliances. With the rapid
advancements in technology, e-waste is becoming an increasingly significant problem.
Computer equipment, monitors/TV’s, cell phones, batteries, stereos, etc. are popular examples
of items that contain harmful toxic components that need to be recycled properly. Although E-
waste is simply categorized as hazardous waste, it has significant potential for value recovery.
E-waste in fact consists of several valuable materials (such as iron, copper, aluminum, and
plastics) as well as precious metals (such as gold, silver, platinum, and palladium). Hence, it
could be said that E-waste is a feasible urban mine. It provides materials for remanufacture,
refurbishment as well as recycling. E-waste is a complex mixture of many materials that
contain up to 1,000 toxic substances. E-waste is classified as a hazardous waste because it is
composed of toxic substances such as antimony, arsenic, barium, cadmium, chromium, lead,
manganese, mercury, indium, selenium, brominated flame retardants, polyaromatic
hydrocarbons, polybrominated diphenyl ethers, and polychlorinated biphenyls. Distinct from
other categorization, E-waste also has significant potential for value recovery. E-waste can be
composed of several valuable materials (such as aluminum, copper, iron, and plastics) and
precious metals (such as gold, silver, platinum, and palladium)
The resource in E-waste is normally recycled by both formal and informal procedures. Manual
E-waste recycling inescapably leads to the release of toxins and persistent organic pollutants
into the environment in addition to harming the health of the recycling person due to the
primitive techniques used. The hazards of E-waste contamination to the surrounding
environment including soil, sediment, water, and air has become a serious issue in many
countries such as in China, India, Thailand, USA. In case of humans, exposure to toxic
substances through inhalation, ingestion and dermal contact can harm the human health in both
chronic and acute conditions
E-waste recycling industries become increasingly aware of such danger, and start to mitigate
impacts from unsafe procedures along with applying appropriate E-waste treatment
technologies. Innovative technologies including pyrometallurgy, hydrometallurgy,
biometallurgy, high-pressure compaction, thermal treatment, organic dissolution, thermal
plasma coupled with acid leaching, substrate oxidation and bioleaching can be applied to
recover the potential resources in E-waste.
REFERENCES
(1) https://www.javatpoint.com
(2) https://www.tutorialspoint.com
(3) https://www.geeksforgeeks.org
inprotected.com