You are on page 1of 17

Chapter -2 Software Concepts

Type A:Very Short Answer Questions Q1. Differentiate between hardware and software. Ans: Hardware represents the physical and tangible components of the computer i.e, the components that can be seen and touched. Input device, Output devices. CPU, Floppy disk, Hard disk, etc. are examples of computer hardware.

Software represents the set of programs that govern the operation of a computer system and make the hardware run.

Q2. How can computer software be classified? Ans: The system software can be classified into two categories: (1) Operating System (2) Language Processor.

Q3. What are two categories of system software? Ans: The system software can be classified into two categories: (1) Operating System (2) Language Processor.

Q4. What is an operating system? What is its role?

Ans: An operating system is a program which acts as an interface between a user and the hardware (computer resources).

Q5.

Name various types of operating systems. Ans: The operating systems are of mainly following types: (a) (b) (c) (d) (e) Single Program OS Multiprogram OS Time Sharing OS Real Time OS Multiprocessing OS

Q6. Name various language processors. Ans: The various language processors are given below: (a) (b) (c) Assembler Interpreter Compiler

Q7. What is application software? What are the three categories of application software? Ans: An Application Software is the set of programs necessary to carry out operations for a specified application.

Application software can further be subdivided into our categories. (a) (b) (c) (d) Packages Utilities Customized software Developer tools

Q8. Compare packages and utilities. Ans: Some general software designed to suit the individual users requirement and needs are known as packages. It might be (a) Word Processing Package (b) Electronic Spreadsheet Package (c) Electronic Presentation Graphic Package (d) Database Management System (e) Desktop Publishing Software Package

Utilities are those application programs that assists the computer by performing housekeeping like backing-up disk or scanning / cleaning viruses or arranging information etc. (a) (b) (c) (d) Text Editor Backup Utility Compression Utility Disk Defragmentor

(e)

Antivirus Software

Q9. Differentiate between a compiler and interpreter. Ans: An Interpreter converts an HLL program into machine language line by line and simultaneously executrs the converted line. Also, an interpreter must always be present in the memory along with the program for its execution. If an error occurs in a line, the line is displayed and interpreter does not proceed unless the error is rectified.

An Compiler converts an HLL program in machine language in one go. If there are errors in the program, it given the error list along with the line numbers. Once the error are removed, error-free object code is made available and after this compiler is no more needed in the memory.

Q10.

What are developer tools? Name a few.

Ans: Tools used by programmers to develop a software for any type of application, they need an array of developer tools that help them accomplish their task.

Some most commonly used developer tools are: (a) (b) (c) Compiler Interpreter Integrated Development Environment (IDE)

Q11.

What is an IDE? IDE (Integrated Development Environment) is an application program consisting of different development tools for developing an application.

Q12.

What is a virus? What is anti-virus software?

Ans: Computer virus are malicious code / programs that cuase damage to data and files on a system.

Anti-Virus software not only remove virus and other infected threats from our computer system but at the same time also protect our systems from data loss, destruction and attack of any external threats like virus, worm and Trojan.

Type B: Short Answer Questions Q1. What is a system software? What role does it play in the functioning of the computer? Ans: The functions of all the physical components of a computer system are guided by some instructions or program collectively known as System Software. System Software controls all internal activities inside a computer system and between all attached components of a computer system.

It controls all possible activities inside the computer system which can be summarized as follows: Reads data and instructions through the input devices; Translates all data and instruction into computer understandable form and vice versa; Controls all devices attached to the computer system; Processes and generates the result on the output devices;

Q2. How are following operating systems different from one another? a. Multiprogramming OS and Multiprocessing OS Ans: Multiprogramming OS It Supports Multiprogramming i.e., more than one user can be supported by it. More than one user programs are loaded and active in the main store at the same time. Active programs are executed using some techniques one by one. Multiprocessing OS It supports more than one processor (computer) as the job have to be executed on more than one processor. It should be capable of loadsharing in case of identical processors so that the systems efficiency improves. It should be able to control the main processor and in turn control the working of

slave processor. b. Time sharing OS and Real time OS Time Sharing OS This OS uses time sharing techniques. Each Active user program is given a fair share of CPU time, if the elapses or an I/O operation is requested. Real Time OS Responds to input instantly. Real-time operating systems are commonly found and used in robotics, complex multimedia and animation, communications and has various military and government uses. LYNX and Windows CE are examples of real time operating systems.

Q3. Write short notes on the following: a. Word Processor Ans: Ref: pg 59 b. Electronic Spreadsheet Ans: Ref Pg 60 c. Dbms Ans: Ref Pg 61 d. Graphic, multimedia and presentation software

Ans: Ref Pg 62 e. DTP software Ans: Ref Pg. 61

Q4.

Discuss the roles of utility software in the context of computer performance. Ans: After all the basic and necessary software like Operating System and Device Drivers have been installed, we also require some additional software to keep our computer system efficient and trouble free. Generally these software come bundled with the Operating System Software but we can also use utility software provided by other vendors. Few examples of utility software are as follows:

Compression Utility software Backup Utility Software Antivirus Protection and Detection Software Disk De-fragmentation Utility Software Text Editor

Q5. Why is disk fragmentor useful? Ans: It speeds up disk access by rearranging the files and free space on your computer, so that files are stored in contiguous units and free space is consolidated in one contiguous block.

Q6. How is backup utility useful? Is it necessary to take backup of data? Ans: In Information Technology, a backup or the process of backing up refers to making copies of data so that these additional copies may be used to restore the original after a data loss event.

Backups have two distinct purposes. (1) The primary purpose is to recover data as a reaction to data loss, be it by data deletion or corrupted data. Data loss is a very common experience of computer users. 67% of internet users have suffered serious data loss. (2) The secondary purpose of backups is to recover data from a historical period of time

within the constraints of a user-defined data retention policy, typically configured within a backup application for how long copies of data are required.

Q7. What is a computer virus? How can it affect your computer? Ans: A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.

Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.

Q8. Why are antivirus software considered important? Ans: Antivirus or anti-virus software is used to prevent, detect, and remove malware, including but not limited to computer viruses, computer worm, Trojan horses, spyware and adware.

A variety of strategies are typically employed. Signaturebased detection involves searching for known patterns of data within executable code. However, it is possible for a computer to be infected with new malware for which no signature is yet known. To counter such so- called zero- day threats, heuristics can be used.

Q9. Why do you development?

think

IDEs

are

useful

in

application

Ans: IDEs are designed to maximize programmer productivity by providing tightly-knit components with similar user interfaces. This should mean that the programmer has to do less mode switching versus using discrete development programs. However, because an IDE is a complicated piece of software by its very nature, this higher productivity only occurs after a lengthy learning process.

Typically an IDE is dedicated to a specific programming language, allowing a feature set that most closely matches the programming paradigms of the language. However, there are some multiple-language IDEs, such as Eclipse, ActiveState Komodo, IntelliJ IDEA, recent versions of NetBeans, Microsoft Visual Studio, WinDev, and Xcode.

Q10. What are different types of threats to computer security? Ans: In Computer security a threat is a possible danger that might exploit a vulnerability to breach security and thus cause possible harm.

Threats can be classified according to their type and origin:[2]


Type Physical damage


fire water pollution climatic seismic volcanic electrical power air conditioning telecommunication eavesdropping, theft of media retrieval of discarded materials equipment software capacity saturation error in use abuse of rights denial of actions

natural events

loss of essential services


compromise of information

technical failures

compromise of functions

Origin Deliberate: aiming at information asset


spying illegal processing of data equipment failure software failure

accidental

environmental

natural event loss of power supply

Q11. What type of damages can be caused by virus to your computer? Ans: Computer Virus are designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior.

Q12. What are Malware? What type of damage can they cause to your computer? Ans: Malware, short for malicious software, consists of programming (code, scripts, active content, and other software) designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior

Q13. What is a spam? Why has it become a big Internet issue? Ans: Spam is the use of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media:

Q14. What do you understand by PC intrusion? Ans: Every PC connected to the internet is a potential target for hackers. Computers are under constant attack from cyber vandals. PC intrusion can occur in any of the following form. a. Sweeper Attack b. Denial of Service c. Password Guessing

Q15. What measure would you take to avoid: a. Virus attack b. Spyware c. Adware d. Spam
e.

PC Intrusion

Ans: a. b. c. d. e. f. g. Use Anti-Virus and Anti-Spyware software Download Updates Regularly Run Frequent Full-System scans Use caution when downloading files on the internet Be careful with email. Disable cookies, if possible. Keep your system up-to-date.

Q16. What are denial-of-service and sweeper attacks? Ans: Denial of Services: this type of attack eats up all the resources of a system and the system or application come to a halt.

Sweeper Attacks: This is another malicious program used by hackers. It sweeps i.e., deletes all the data from the system.

Q17. What is phishing? Ans: It is criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords, credit card information, account data, etc.

Type C: Long Answer Questions Q18. Discuss different types of utility software. Ans: Few examples of utility software are as follows:

Compression utility software: Using this software, you can reduce (compress) the storage size of any computer program/file while not in use transfer either through internet or using storage devices like Pen Drive, CD or DVD.

Backup utility software: This utility software facilitates you to take regular back-up of important files and folders

stored in a drive into another storage device like a Pen drive or CD or a DVD or another computer. This backup data can be restored in case of any unforeseen situation.

Disk De-fragmentation Utility software: This simply means that different parts of the file are scattered across the hard drive in noncontiguous locations. This type of fragmented file requires some extra time to access and slows down the system. Disk de-fragmentation utility software speeds up the system by rearranging such fragmented files stored on a disk in contiguous locations in order to optimize the system performance.

Antivirus detection and protection software: This utility software provides the user with a virus free work environment by restricting the entry of any unwanted program into the system.

Text Editor: This utility software helps one to create, store or edit a basic text file. A text file generally stores English type text and can also store numeric and special characters with little formatting.

Q19.

What do you understand by computer security, various threats to computer security and possible solution to computer security? Ans: Computer Security commonly refers to as CIA (short form of Confidentiality, Integrity and Authentication),

protects our computer from any unauthorized access and maintains the system resources. Precisely,

Confidentiality ensures protection of the computer system from any unauthorized access
1)

Integrity ensures that computer is protected


2)

information the

stored

in of

the the

Authentication authorized user


3)

ensures

authenticity

In Computer security a threat is a possible danger that might exploit a vulnerability to breach security and thus cause possible harm.

Possible solution to Computer Security: a. b. c. d. e. f. g. Use Anti-Virus and Anti-Spyware software Download Updates Regularly Run Frequent Full-System scans Use caution when downloading files on the internet Be careful with email. Disable cookies, if possible. Keep your system up-to-date.

You might also like