Software: 1. Operating System 2. Utility Software
Software: 1. Operating System 2. Utility Software
1. Operating System
2. Utility software
3. Applications software
2. Utility software
3. Applications software
2. Utility software
3. Applications software
2. Utility software
3. Applications software
Disk editor
Defragmenter
Virus checker
After a time, the disk starts to fill up and files are edited and
deleted. The remaining free blocks are not necessarily next
to each other.
When new files are saved the blocks may Virus checker
be on different parts of the disk. It then
takes longer to access these files.
file virus
A file virus attaches itself to an executable file (program
which you can run). e.g. Word, Photoshop, FIFA09.
macro virus
What is a macro ?
A macro is a saved sequence of commands or keyboard
strokes that can be stored and then recalled. It makes use
of the programming language which is contained in some
applications. e.g. Visual Basic for Applications (VBA)
macro virus
macro virus
A macro virus contains instructions which may damage a
document or other software.
It causes a sequence of actions to be performed automatically
when the application is started or something else triggers it.
Once a macro virus gets onto your machine, it can embed
itself in all future documents you create with the application.
camouflage
watching
delivery
replication
A virus makes copies of itself into other program files.
camouflage
Virus program writers can have fake code within the program
to prevent virus checkers from spotting the patterns of
instructions which are commonly used in virus programs.
camouflage
watching
delivery
watching
Some virus programs remain dormant in a computer until a
particular event triggers them into action. This can be a
certain date, time or the running of a specific application.
delivery
This is the term used for when the virus executes and carries
out its intended actions.
NO
Worms spread from computer to computer and, unlike a virus,
have the ability to travel without any help from a person
A worm does not alter files but resides in active memory and
replicates. Worms use parts of an operating system that are
automatic and usually invisible to the user.
NO
Due to the copying nature of a worm and its ability to travel
across networks the end result in most cases is that the worm
consumes too much system memory (or network bandwidth).
NO
Trojan horses do not reproduce by infecting other files
nor do they self-replicate.
NO
Some Trojans are designed to be more annoying than
malicious (like changing your desktop, adding silly active
desktop icons) or they can cause serious damage by deleting
files and destroying information on your system.
Use of checksum
Searching for Virus signature
Heuristic detection
Memory resident monitoring
If the checksums dont match then it may be that the file now
contains some virus code.
Compression
Graphics files, particularly bit-mapped graphics, can
generate very large file sizes.
Lossless Compression
This technique manages to cut down on the amount of data
which needs to be stored but does not actually lose any of
the data. This means that the quality of the image is not
affected.
Lossy Compression
This technique cuts down on the amount of data which
needs to be stored by discarding some of the data. This
means that the quality of the image is affected.
CS Topic 5 - Computer Software v2 37
jpeg
gif
TIFF
jpeg (Joint Picture Experts Group)
JPEG is designed for compressing either full-colour or grey-
scale images of natural, real-world scenes. It works well on
photographs, naturalistic artwork, and similar material; not so
well on lettering, simple cartoons, or line drawings
Storage Requirements
i.e. how much Hard Disk space is required for the software.
OS compatibility
i.e. which operating system it requires.
CS Topic 5 - Computer Software v2 42