SlideShare una empresa de Scribd logo
1 de 66
Descargar para leer sin conexión
System Administration
Muhammad Umar
Muhammad Adnan
Abdul Muteeb
Muhammad Mudasser
Bilal Ahmad 3029
Hanzala Ashraf
CoderCompany.com
Principles and Learning Objectives
 Definition of system administrator.
 Software and Their Types.
 We Discuss operating System, function and their importance.
 What is utility programmers.
 How we Make USB Boot.
 How We install Window in Computer.
 Window Features.
 Difference between Virus and Anti virus.
CoderCompany.com
What is system Administrator?
A SYSTEM ADMINISTRATOR, OR SYS
ADMIN, IS A PERSON WHO IS
RESPONSIBLE FOR THE UPKEEP,
CONFIGURATION, AND RELIABLE
OPERATION OF COMPUTER SYSTEMS;
ESPECIALLY MULTI-USER COMPUTERS,
SUCH AS SERVERS
CoderCompany.com
Software and their Types:
 What is Software
 The term Software refers to a set of Computer programs,
procedures and associated documents describing the
programs , and how they are to be used .
 Software Classified in Two Types.
1. System Software .
2. Application Software.
CoderCompany.com
Difference Between System and
Application Software
System Software:
Systems software includes
the programs that are dedicated to
managing the computer itself, such as
the operating system, file management
utilities, and disk operating system (or
DOS).
Application Software:
Application software is a program or
group of programs designed for end
users.
CoderCompany.com
Check this image.
What is Operating System?
 An operating system (OS)
is system software that manages
computer hardware and software
resources and provides common services
for computer programs. All computer
programs, excluding firmware, require
an operating system to function.
Most popular Operating System
 The most popular operating system
today is Microsoft's Windows operating
system. Macintosh computers have their
own operating system, the most recent
of which is called Mac OS X. There are
also open source operating systems such
as Linux.
History of Macintosh
Computer.
 The Macintosh (/ MAK-in-tosh), or Mac, is a series of
personal computers (PCs) designed, developed, and
marketed by Apple Inc. Steve Jobs introduced the
original Macintosh computer on January 24, 1984. This
was the first mass-market personal computer featuring an
integral graphical user interface and mouse.
CoderCompany.com
Windows and Mac are GUI’s
 Microsoft Windows and Apple Macintosh operating systems are
“graphical user interfaces” or GUI’s.
 GUI is defined as: A picture used in place of a word or words to issue
commands
CoderCompany.com
GUI – Standards
 GUI interfaces have standards that are usually the same or similar in
all systems and applications.
 Standards apply to:
• Pointers and pointing devices
• Icons, desktops, windows and me
What does Operating System
do?
 Operating System is the set of programs that
controls a computer.
 It provide a pleasant and effective interface
between the user and the hardware.
 Makes the computer more convenient to use
What is Operating System, Utility program,virus and anti_virus
Types of Operating System?
 Real-time operating system(RTOS) –Real-time operating systems are used to control
machinery, scientific instruments and industrial systems.
 Single-user, single task : As the name implies, this operating system is designed to
manage the computer so that one user can effectively do one thing at a time.
 Single-user, multi-tasking : This is the type of operating system most people use on
their desktop and laptop computers today.
 Multi-user : A multi-user operating system allows many different users to take
advantage of the computer's resources simultaneously.
 Distributed: A distributed operating system manages a group of independent
computers and makes them appear to be a single computer.
 Embedded: Embedded operating systems are designed to be used in embedded
computer systems. They are designed to operate on small machines like PDAs with less
autonomy.
Features of Good Operating System
 efficient
time spent to execute its programs
should be short
 small in size
memory occupied should be as small as possible
 reliable
CoderCompany.com
Functions of Operating System
 Process Management.
 Resource Management.
 File Management.
 Communication Management.
 Security Management.
 Memory Management.
CoderCompany.com
Process Management
 All process from start to shut down.
 Booting
 Open
 Save
 Install
 Copy
 Print
 Send, etc. CoderCompany.com
Resource Management
 Installing drivers required for input, output, memory, power,
communication devices.
 Coordinating among peripherals
File Management
 Name.
 Folders.
 Location.
 Attributes – size, type, modified, protection, password etc.
CoderCompany.com
Communication Management.
 User – Application S/W – Hardware.
 One computer to other computer in LAN/WAN.
 Command interpretation.
 Downloading-Uploading.
Memory Management
 The different types of memory in the system must be used properly so
that each process can run most effectively.
Cache Memory
 •Cache - A section of a computer's memory which temporarily retains
recently accessed data in order to speed up repeated access to the same
data.
 It provides rapid access without having to wait for systems to load.
RAM Memory
 Random access memory (RAM) is the best known form of computer
memory.
 • RAM is considered "random access" because you can access any
memory cell directly if you know the row and column that intersect at
that cell.
 A ROM chip is non-volatile storage and does not require a constant
source of power to retain information stored on it. When power is lost
or turned off, a ROM chip will keep the information stored on it. In
contrast, a RAM chip is volatile and requires a constant source of
power to retain information.
CoderCompany.com
Security Management
 Virus management.
 Alert messages.
 Dialogue boxes.
 Firewall.
 Passwords./ Access protection.
Functionalities
 Protects file and documents of the users.
 Protect the computer system from
unauthorized user.
 Provision of operate computer system by
only authorized users.
 Extended the security level of users account
i.e. either it is administration or guest
account.
 Disallow the unauthorized users to use the
resources and data of the computer and also
to share that resources.
Function of Operating System:
Boot Device:
A boot device is any piece of hardware that can read or contains the files required for a
computer to start.
Boot Disk:
A boot disk is a removable digital data storage medium from which a computer can load
and run (boot) an operating system or utility program.
 Recovery Disk:
A recovery disk contains a few system files that will start the computer
Utility programmers
 A utility program, also called a utility, is a
type of system software that allows a user to
perform maintenance-type tasks, usually
related to managing a computer, its devices,
or its programs.
 Utility programs are built-in to many
operating systems or can be purchased
separately.
Utility programmers
 Functions provided include: managing files,
searching for files, viewing images, uninstalling
programs, cleaning up disks, defragmenting
disks, backing up files and disks, setting up
screen savers, securing a computer, etc.
Types of Utility Programs
 There are many types of utility programs
1. File Manager
2. Image Viewer
3. Search Utility
4. Personal Firewall
5. Antivirus
6. Disk Defragmenter
7. Screen Saver
8. Backup and restore utilities
CoderCompany.com
File Manager
CoderCompany.com
What is File Manager?
 A file manager or file browser is a computer program that provides a user
interface to manage files and folders.
 Examples:
 Window Explorer
 Web browser are also has the feature of file managing. e.g. Internet
Explore.
 File Commander.
 Some file managers provide network connectivity via protocols, such as
FTP, NFS……etc.
CoderCompany.com
Uses/Purposes
 The most common operations performed on files or groups of files
include:
 Creating
 Opening (e.g. viewing, playing, editing or printing)
 Renaming
 Moving or copying
 Deleting and searching for files
 Modifying file attributes
 Properties and file permissions ……….etc
CoderCompany.com
Image Viewer
CoderCompany.com
What is Image viewer?
 An image viewer or image browser is a computer program that can display stored
graphical images; it can often handle various graphics file formats.
Example:
 such as Photoshop or the GIMP or the StylePix
 Windows Photo viewer.
 Windows Picture and Fax Viewer in Windows XP
 ACDSee, FastPictureViewer, FastStone Image Viewer, Imagine, IrfanView, Media Pro 1,
pViewer, XnView
Features:
Typical features of image viewers are:
 basic viewing operations such as zooming and rotation
 full screen display
 slideshow
 thumbnail display
 printing
 screen capture
CoderCompany.com
Advanced features are:
 decode next image in advance and keep previous decoded image in
memory for fast image changes
 display (and edit) metadata such as XMP, IPTC Information
Interchange Model and Exif
 batch conversion (image format, image dimensions, etc.) and
renaming
 create contact sheets
 create HTML thumbnail pages
 different transition effects for slideshows
CoderCompany.com
Search Utility
 Introduction:
A couple of years back there were
no contenders for this title. Today we have a
wealth of choices. Wasting time looking for a
file is a huge aggravation. Here are several
tools to keep you from falling into that trap.
Definition
 Any utility that is used locally to help find specific data on either the
desktop or on an on-premise server. In other words, Internet search
utilities are not included, but everything else is fair game.
Search Utility
 A search utility is a program that attempts to locate a file on your
computer based on criteria you specify.
 The criteria may include a word or words contained in a file, date of
creation or modification, size of the file, location, file name, author, and
other properties.
 Search utilities typically use an index, which stores a variety of
information about the file, including its name, date created and
modified, and author to quickly locate the file.
CoderCompany.com
Search Utility
 In Windows, Explorer and the Start Menu contain a search box where you enter the
search criteria.
Disk Burning
Disc burning software is used to write text, graphics,
audio and video files on a recordable or rewriteable
CD(Compact Disc) and DVD(Digital Versatile Disc).It
allows the user to backup data on optical disc.
Ways to burn a CD/DVD
 Windows Default disc burning
 By using desired software
CoderCompany.com
Default burning
 By using default utility
What is Operating System, Utility program,virus and anti_virus
By using “DVD Flick”
 http://www.dvdflick.net/download.php(For Download)
Steps for Disk burning using “DVD
Flick”
1. Insert CD/DVD
2. Add title(add file you want to burn)
3. Menu Settings(to Insert a menu view)
4. Project setting(to give a title)
5. Burning(check the boxes ISO image, Burn project, disc label(write title name), Eject
when done).
File compression
 File Compression is used to shrink the file size. It is easier and faster to
send files over the internet.
Ways of File Compression
 Default (Built-in).
 Using desired software(Winrar).
Default Compression
1. Right click on folder that you want to compress then click on
properties.
2. Click on Send TO.
3. Check or click “Compression contents to save the disk space”.
4. Check the folder’s properties that you have compressed.
WinRAR
 This is popular file compression software
 We can upload folds and more than one files using WinRAR
 It is also used to secure the files from viruses.
 It can highly compress the files .
 Download link for WinRAR
http://www.win-
rar.com/predownload.html?&f=wrar511.exe&spV=true&subD=true&L=0
Make Bootable USB
This process By using UltraISO
Steps For Installing and Making Win Boot
1. First You have to download Widows ISO file from any platform you like.
2. Downlaod Forms for windows ISO.
* https://www.microsoft.com/
* http://webforpc.com/
*http://windows-8.en.malavida.com/
3. Download PowerISO/UltraISO/Rufus software to Make bootable Windows.
4. After downloading Install any of the Software You downloaded.
5. Now open your installed software.
Installation Process
7. Now Open Program You installed on your Pc
8. Now go to Tools And select Create Bootable
USB drive Mentioned in Picture Below
9. Now select ISO file You
downloaded in your PC
11. Now Hit Start button As mentioned in
Screenshot Below
Windows 7 Installation
CPU’s requirements for installation of win 7
Minimum hardware that you need to have on your computer and should
be checked in advance of installing.
 1 GHz CPU with 32 bits or 64 bits.
 1 GB Ram for 32 bits or 2 GB Ram for 64 bits.
 16 GB empty space hard disk for 32 bits or 20 GB for 64 bits.
 DVD drive (if installing from a DVD).
 Steps for windows 7 Installation
1. Turn your computer on then press Del or F2 (depend on your computer’s
mainboard) to enter the system BIOS.
2. choose Boot From CD/DVD.
3. Insert Windows 7 DVD into your DVD drive then start
up your computer, Windows 7 will be loading files.
4. Select these parts: Language to Install, Time and
currency format, Keyboard or input method. Then
click Next.
5. Choose Install Now if you want to install Windows 7.
6. Click 'I accept the license terms' in 'Please read the
license' then click Next.
7. Custom (advance)' if you want to install a new
version of Windows.
8. Choose Partition for installation.
9. Wait for Installing Windows to progress.
Computer Virus
Definition:
 “A virus is a program that copy itself without the permission and knowledge of the user”.
 “Virus + computer=Death”.
Characteristics
Ability to replicated itself
Ability to attached itself to another computer file
Slow down the response time
Extensive pop-up-ads.
Damage the computer hard drive
Differentiate virus and Worm
Some people distinguish between
general viruses and worms. A worm is a
special type of virus that can replicate
itself and use memory, but cannot attach
itself to other programs.
Worm is too dangerous than virus
Types of Computer Viruses
 Boot Sector Virus
 Browser Hijacker
 File Infector Virus
 Macro Virus
 Multipartite Virus
 Polymorphic Virus
 Resident Virus
 Web Scripting Virus
CoderCompany.com
Viruses
Corrupt
data
Show
massages
Disable
Hardware
Corrupt
window
Slowdown
computer
Delete
Data files
Working Of
Virus
CoderCompany.com
History of virus
 1949, scientist of Mathematics JOHAN VON NEUMANN proposed the idea of self
replicated program which he describe the acting motion of virus in a real world.
 1960,A group of programmer developed a game called core ware which produced a
copy itself as well as the games Is run.
 1980, Microsoft developed MS-DOS ,A fast OS on the planet . After this virus become
more thick and fast.
 1986 major mile stone world protrusion called pc-writ.it is also called Trojan Hoarse.
 1988,a virus called MORRIS work for MS-DOS
 1999, A famous MELISSA virus W97M/Melissa executed a macro with an attachment file
from an email. This is turn forward into the 50people.Now they used internet
 2000,I love you virus developed .its function like Melissa but it is too power full than
Melissa .it would delete the media files like MP3 Images Videos etc.
 2001 core red 1&2 Virus developed. Sven hundred thousand machine infected from this
and 2 billion dollar of the damage.
 2003, SQL Slammer virus developed .from this internet become very slow all over the
world.6 moths later MICROSOFT released a Fix For the BUG called slammer.
 2007, A virus developed called STORM WORM.it connect computer to the BOT-NET.
 2016, Different virus MALWARE, ADWAER, SPYWARE which steel information today from
the computer alover the world
ANTIVIRUS
Definition:
 Antivirus is a software which is used to preventing a computer system from
virus by detecting and removing it.
 Antivirus are special program that detect and remove virus from computer
system.
Virus Scanning Process
 .
Antivirus
Scene system
Virus not found
Virus found/ detected
Show message
Remove virus
CoderCompany.com
List of Antivirus
CoderCompany.com
Codercompany.com
Best Web Design Company in Pakistan
Contact Us for any web Related Services
Thank You for Your Attention

Más contenido relacionado

La actualidad más candente

Introduction to Java programming - Java tutorial for beginners to teach Java ...
Introduction to Java programming - Java tutorial for beginners to teach Java ...Introduction to Java programming - Java tutorial for beginners to teach Java ...
Introduction to Java programming - Java tutorial for beginners to teach Java ...Duckademy IT courses
 
Android's Multimedia Framework
Android's Multimedia FrameworkAndroid's Multimedia Framework
Android's Multimedia FrameworkOpersys inc.
 
ELCE 2012 - Dive into Android Networking: Adding Ethernet Connectivity
ELCE 2012 - Dive into Android Networking: Adding Ethernet ConnectivityELCE 2012 - Dive into Android Networking: Adding Ethernet Connectivity
ELCE 2012 - Dive into Android Networking: Adding Ethernet ConnectivityBenjamin Zores
 
CELTA -Lessons from the Classroom assignment
CELTA -Lessons from the Classroom assignmentCELTA -Lessons from the Classroom assignment
CELTA -Lessons from the Classroom assignmentJo Gakonga
 
Jetking questions and answers 8.5x11
Jetking   questions and answers 8.5x11Jetking   questions and answers 8.5x11
Jetking questions and answers 8.5x11sunil kumar
 
Computer Troubleshooting - T.L.E.
Computer Troubleshooting - T.L.E.Computer Troubleshooting - T.L.E.
Computer Troubleshooting - T.L.E.BooNeil
 
PC Maintenance Security and Troubleshooting
PC Maintenance Security and TroubleshootingPC Maintenance Security and Troubleshooting
PC Maintenance Security and TroubleshootingThe Toolbox, Inc.
 
Cross-Platform App Development with Flutter, Xamarin, React Native
Cross-Platform App Development with Flutter, Xamarin, React NativeCross-Platform App Development with Flutter, Xamarin, React Native
Cross-Platform App Development with Flutter, Xamarin, React NativeKorhan Bircan
 
DEVELOPING SPEAKING LESSON PLANS
DEVELOPING SPEAKING LESSON PLANSDEVELOPING SPEAKING LESSON PLANS
DEVELOPING SPEAKING LESSON PLANSmarly villacrusis
 
Red hat linux essentials
Red hat linux essentialsRed hat linux essentials
Red hat linux essentialsHaitham Raik
 
Security features of fedora
Security features of fedoraSecurity features of fedora
Security features of fedoraBadrul Alam
 
04 software system and application software
04 software   system and application software04 software   system and application software
04 software system and application softwareSowmini Gowda
 
task manager presentation in Operating System
task manager presentation in Operating System task manager presentation in Operating System
task manager presentation in Operating System FariaChaudhry6
 

La actualidad más candente (20)

Introduction to Java programming - Java tutorial for beginners to teach Java ...
Introduction to Java programming - Java tutorial for beginners to teach Java ...Introduction to Java programming - Java tutorial for beginners to teach Java ...
Introduction to Java programming - Java tutorial for beginners to teach Java ...
 
Android's Multimedia Framework
Android's Multimedia FrameworkAndroid's Multimedia Framework
Android's Multimedia Framework
 
ppt on cmd cammand
ppt on cmd cammandppt on cmd cammand
ppt on cmd cammand
 
ELCE 2012 - Dive into Android Networking: Adding Ethernet Connectivity
ELCE 2012 - Dive into Android Networking: Adding Ethernet ConnectivityELCE 2012 - Dive into Android Networking: Adding Ethernet Connectivity
ELCE 2012 - Dive into Android Networking: Adding Ethernet Connectivity
 
CELTA -Lessons from the Classroom assignment
CELTA -Lessons from the Classroom assignmentCELTA -Lessons from the Classroom assignment
CELTA -Lessons from the Classroom assignment
 
Jetking questions and answers 8.5x11
Jetking   questions and answers 8.5x11Jetking   questions and answers 8.5x11
Jetking questions and answers 8.5x11
 
Embedded Android : System Development - Part II (HAL)
Embedded Android : System Development - Part II (HAL)Embedded Android : System Development - Part II (HAL)
Embedded Android : System Development - Part II (HAL)
 
Computer Troubleshooting - T.L.E.
Computer Troubleshooting - T.L.E.Computer Troubleshooting - T.L.E.
Computer Troubleshooting - T.L.E.
 
Building aosp
Building aospBuilding aosp
Building aosp
 
PC Maintenance Security and Troubleshooting
PC Maintenance Security and TroubleshootingPC Maintenance Security and Troubleshooting
PC Maintenance Security and Troubleshooting
 
Android Things : Building Embedded Devices
Android Things : Building Embedded DevicesAndroid Things : Building Embedded Devices
Android Things : Building Embedded Devices
 
Cross-Platform App Development with Flutter, Xamarin, React Native
Cross-Platform App Development with Flutter, Xamarin, React NativeCross-Platform App Development with Flutter, Xamarin, React Native
Cross-Platform App Development with Flutter, Xamarin, React Native
 
CELTA Lesson Plan
CELTA Lesson PlanCELTA Lesson Plan
CELTA Lesson Plan
 
DEVELOPING SPEAKING LESSON PLANS
DEVELOPING SPEAKING LESSON PLANSDEVELOPING SPEAKING LESSON PLANS
DEVELOPING SPEAKING LESSON PLANS
 
Red hat linux essentials
Red hat linux essentialsRed hat linux essentials
Red hat linux essentials
 
Lesson plan opposite writing
Lesson plan opposite writingLesson plan opposite writing
Lesson plan opposite writing
 
Windows 7
Windows 7Windows 7
Windows 7
 
Security features of fedora
Security features of fedoraSecurity features of fedora
Security features of fedora
 
04 software system and application software
04 software   system and application software04 software   system and application software
04 software system and application software
 
task manager presentation in Operating System
task manager presentation in Operating System task manager presentation in Operating System
task manager presentation in Operating System
 

Destacado

Presentation by Ralf Lindner, JERRI project
Presentation by Ralf Lindner, JERRI projectPresentation by Ralf Lindner, JERRI project
Presentation by Ralf Lindner, JERRI projectRRI Tools
 
TDS IM_Brief_Template SMB Final 30 03 16 for Linkedin
TDS IM_Brief_Template SMB Final 30 03 16 for LinkedinTDS IM_Brief_Template SMB Final 30 03 16 for Linkedin
TDS IM_Brief_Template SMB Final 30 03 16 for LinkedinSteve Baines
 
2016 Annual Report - First Place for Youth
2016 Annual Report - First Place for Youth2016 Annual Report - First Place for Youth
2016 Annual Report - First Place for YouthClaudia Miller
 
Problemas de-mc3a1ximos-y-mc3adnimos
Problemas de-mc3a1ximos-y-mc3adnimosProblemas de-mc3a1ximos-y-mc3adnimos
Problemas de-mc3a1ximos-y-mc3adnimoslee lib
 
Data Driven Hiring
Data Driven HiringData Driven Hiring
Data Driven HiringQSXL
 
Greatest sports venues
Greatest sports venuesGreatest sports venues
Greatest sports venuesMike Moss
 
Intro to linux
Intro to linuxIntro to linux
Intro to linuxgabrail
 

Destacado (11)

Utility programs
Utility programsUtility programs
Utility programs
 
Presentation by Ralf Lindner, JERRI project
Presentation by Ralf Lindner, JERRI projectPresentation by Ralf Lindner, JERRI project
Presentation by Ralf Lindner, JERRI project
 
TDS IM_Brief_Template SMB Final 30 03 16 for Linkedin
TDS IM_Brief_Template SMB Final 30 03 16 for LinkedinTDS IM_Brief_Template SMB Final 30 03 16 for Linkedin
TDS IM_Brief_Template SMB Final 30 03 16 for Linkedin
 
2016 Annual Report - First Place for Youth
2016 Annual Report - First Place for Youth2016 Annual Report - First Place for Youth
2016 Annual Report - First Place for Youth
 
Problemas de-mc3a1ximos-y-mc3adnimos
Problemas de-mc3a1ximos-y-mc3adnimosProblemas de-mc3a1ximos-y-mc3adnimos
Problemas de-mc3a1ximos-y-mc3adnimos
 
Manual
ManualManual
Manual
 
Data Driven Hiring
Data Driven HiringData Driven Hiring
Data Driven Hiring
 
Greatest sports venues
Greatest sports venuesGreatest sports venues
Greatest sports venues
 
bsd
bsdbsd
bsd
 
Bsd presentation
Bsd presentationBsd presentation
Bsd presentation
 
Intro to linux
Intro to linuxIntro to linux
Intro to linux
 

Similar a What is Operating System, Utility program,virus and anti_virus

Features Of A Operating System
Features Of A Operating SystemFeatures Of A Operating System
Features Of A Operating SystemAlexis Naranjo
 
Computer system software
Computer system softwareComputer system software
Computer system softwareMozaSaid
 
Computer software form 4
Computer software form 4Computer software form 4
Computer software form 4norhaslinamj
 
Functions of OS.ppt
 Functions of OS.ppt Functions of OS.ppt
Functions of OS.pptJunaidAkbar37
 
Management Information System
Management Information SystemManagement Information System
Management Information SystemCh Irfan
 
ComputerSoftware.pdf
ComputerSoftware.pdfComputerSoftware.pdf
ComputerSoftware.pdfAFANJIPHILL
 
Final intrict without vid
Final intrict without vidFinal intrict without vid
Final intrict without vidpringles77
 
computer software in Computer Fundamentals
computer software in Computer Fundamentalscomputer software in Computer Fundamentals
computer software in Computer FundamentalsARDEN16
 
lecture 1 (Introduction to Operating System.)
lecture 1 (Introduction to Operating System.)lecture 1 (Introduction to Operating System.)
lecture 1 (Introduction to Operating System.)WajeehaBaig
 
week-1-200310134908.pptx
week-1-200310134908.pptxweek-1-200310134908.pptx
week-1-200310134908.pptxssuser5c874e
 
Vskills c++ developer sample material
Vskills c++ developer sample materialVskills c++ developer sample material
Vskills c++ developer sample materialVskills
 
What Is Software and Exploring Its Types A Comprehensive Guide
What Is Software and Exploring Its Types A Comprehensive GuideWhat Is Software and Exploring Its Types A Comprehensive Guide
What Is Software and Exploring Its Types A Comprehensive GuidePolyxer Systems
 
Unit 10 Operating Systems P2
Unit 10 Operating Systems P2Unit 10 Operating Systems P2
Unit 10 Operating Systems P2Melissa Jackson
 
Vskills c developer sample material
Vskills c developer sample materialVskills c developer sample material
Vskills c developer sample materialVskills
 

Similar a What is Operating System, Utility program,virus and anti_virus (20)

Features Of A Operating System
Features Of A Operating SystemFeatures Of A Operating System
Features Of A Operating System
 
Computer system software
Computer system softwareComputer system software
Computer system software
 
Computer software form 4
Computer software form 4Computer software form 4
Computer software form 4
 
System Software
System SoftwareSystem Software
System Software
 
Unit 4 software
Unit 4  softwareUnit 4  software
Unit 4 software
 
Functions of OS.ppt
 Functions of OS.ppt Functions of OS.ppt
Functions of OS.ppt
 
Management Information System
Management Information SystemManagement Information System
Management Information System
 
Computer Fundamental
Computer Fundamental Computer Fundamental
Computer Fundamental
 
Software 3
Software 3Software 3
Software 3
 
System software vt
System software vtSystem software vt
System software vt
 
ComputerSoftware.pdf
ComputerSoftware.pdfComputerSoftware.pdf
ComputerSoftware.pdf
 
Final intrict without vid
Final intrict without vidFinal intrict without vid
Final intrict without vid
 
computer software in Computer Fundamentals
computer software in Computer Fundamentalscomputer software in Computer Fundamentals
computer software in Computer Fundamentals
 
lecture 1 (Introduction to Operating System.)
lecture 1 (Introduction to Operating System.)lecture 1 (Introduction to Operating System.)
lecture 1 (Introduction to Operating System.)
 
week-1-200310134908.pptx
week-1-200310134908.pptxweek-1-200310134908.pptx
week-1-200310134908.pptx
 
Vskills c++ developer sample material
Vskills c++ developer sample materialVskills c++ developer sample material
Vskills c++ developer sample material
 
What Is Software and Exploring Its Types A Comprehensive Guide
What Is Software and Exploring Its Types A Comprehensive GuideWhat Is Software and Exploring Its Types A Comprehensive Guide
What Is Software and Exploring Its Types A Comprehensive Guide
 
Unit 10 Operating Systems P2
Unit 10 Operating Systems P2Unit 10 Operating Systems P2
Unit 10 Operating Systems P2
 
Vskills c developer sample material
Vskills c developer sample materialVskills c developer sample material
Vskills c developer sample material
 
Computer software
Computer softwareComputer software
Computer software
 

Último

Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideIEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideHironori Washizaki
 
99.99% of Your Traces Are (Probably) Trash (SRECon NA 2024).pdf
99.99% of Your Traces  Are (Probably) Trash (SRECon NA 2024).pdf99.99% of Your Traces  Are (Probably) Trash (SRECon NA 2024).pdf
99.99% of Your Traces Are (Probably) Trash (SRECon NA 2024).pdfPaige Cruz
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Governance in SharePoint Premium:What's in the box?
Governance in SharePoint Premium:What's in the box?Governance in SharePoint Premium:What's in the box?
Governance in SharePoint Premium:What's in the box?Juan Carlos Gonzalez
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Valere | Digital Solutions & AI Transformation Portfolio | 2024
Valere | Digital Solutions & AI Transformation Portfolio | 2024Valere | Digital Solutions & AI Transformation Portfolio | 2024
Valere | Digital Solutions & AI Transformation Portfolio | 2024Alexander Turgeon
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 

Último (20)

Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideIEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
99.99% of Your Traces Are (Probably) Trash (SRECon NA 2024).pdf
99.99% of Your Traces  Are (Probably) Trash (SRECon NA 2024).pdf99.99% of Your Traces  Are (Probably) Trash (SRECon NA 2024).pdf
99.99% of Your Traces Are (Probably) Trash (SRECon NA 2024).pdf
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Governance in SharePoint Premium:What's in the box?
Governance in SharePoint Premium:What's in the box?Governance in SharePoint Premium:What's in the box?
Governance in SharePoint Premium:What's in the box?
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Valere | Digital Solutions & AI Transformation Portfolio | 2024
Valere | Digital Solutions & AI Transformation Portfolio | 2024Valere | Digital Solutions & AI Transformation Portfolio | 2024
Valere | Digital Solutions & AI Transformation Portfolio | 2024
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 

What is Operating System, Utility program,virus and anti_virus

  • 1. System Administration Muhammad Umar Muhammad Adnan Abdul Muteeb Muhammad Mudasser Bilal Ahmad 3029 Hanzala Ashraf CoderCompany.com
  • 2. Principles and Learning Objectives  Definition of system administrator.  Software and Their Types.  We Discuss operating System, function and their importance.  What is utility programmers.  How we Make USB Boot.  How We install Window in Computer.  Window Features.  Difference between Virus and Anti virus. CoderCompany.com
  • 3. What is system Administrator? A SYSTEM ADMINISTRATOR, OR SYS ADMIN, IS A PERSON WHO IS RESPONSIBLE FOR THE UPKEEP, CONFIGURATION, AND RELIABLE OPERATION OF COMPUTER SYSTEMS; ESPECIALLY MULTI-USER COMPUTERS, SUCH AS SERVERS CoderCompany.com
  • 4. Software and their Types:  What is Software  The term Software refers to a set of Computer programs, procedures and associated documents describing the programs , and how they are to be used .  Software Classified in Two Types. 1. System Software . 2. Application Software. CoderCompany.com
  • 5. Difference Between System and Application Software System Software: Systems software includes the programs that are dedicated to managing the computer itself, such as the operating system, file management utilities, and disk operating system (or DOS). Application Software: Application software is a program or group of programs designed for end users. CoderCompany.com
  • 7. What is Operating System?  An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs. All computer programs, excluding firmware, require an operating system to function.
  • 8. Most popular Operating System  The most popular operating system today is Microsoft's Windows operating system. Macintosh computers have their own operating system, the most recent of which is called Mac OS X. There are also open source operating systems such as Linux.
  • 9. History of Macintosh Computer.  The Macintosh (/ MAK-in-tosh), or Mac, is a series of personal computers (PCs) designed, developed, and marketed by Apple Inc. Steve Jobs introduced the original Macintosh computer on January 24, 1984. This was the first mass-market personal computer featuring an integral graphical user interface and mouse. CoderCompany.com
  • 10. Windows and Mac are GUI’s  Microsoft Windows and Apple Macintosh operating systems are “graphical user interfaces” or GUI’s.  GUI is defined as: A picture used in place of a word or words to issue commands CoderCompany.com
  • 11. GUI – Standards  GUI interfaces have standards that are usually the same or similar in all systems and applications.  Standards apply to: • Pointers and pointing devices • Icons, desktops, windows and me
  • 12. What does Operating System do?  Operating System is the set of programs that controls a computer.  It provide a pleasant and effective interface between the user and the hardware.  Makes the computer more convenient to use
  • 14. Types of Operating System?  Real-time operating system(RTOS) –Real-time operating systems are used to control machinery, scientific instruments and industrial systems.  Single-user, single task : As the name implies, this operating system is designed to manage the computer so that one user can effectively do one thing at a time.  Single-user, multi-tasking : This is the type of operating system most people use on their desktop and laptop computers today.  Multi-user : A multi-user operating system allows many different users to take advantage of the computer's resources simultaneously.  Distributed: A distributed operating system manages a group of independent computers and makes them appear to be a single computer.  Embedded: Embedded operating systems are designed to be used in embedded computer systems. They are designed to operate on small machines like PDAs with less autonomy.
  • 15. Features of Good Operating System  efficient time spent to execute its programs should be short  small in size memory occupied should be as small as possible  reliable CoderCompany.com
  • 16. Functions of Operating System  Process Management.  Resource Management.  File Management.  Communication Management.  Security Management.  Memory Management. CoderCompany.com
  • 17. Process Management  All process from start to shut down.  Booting  Open  Save  Install  Copy  Print  Send, etc. CoderCompany.com
  • 18. Resource Management  Installing drivers required for input, output, memory, power, communication devices.  Coordinating among peripherals File Management  Name.  Folders.  Location.  Attributes – size, type, modified, protection, password etc. CoderCompany.com
  • 19. Communication Management.  User – Application S/W – Hardware.  One computer to other computer in LAN/WAN.  Command interpretation.  Downloading-Uploading.
  • 20. Memory Management  The different types of memory in the system must be used properly so that each process can run most effectively.
  • 21. Cache Memory  •Cache - A section of a computer's memory which temporarily retains recently accessed data in order to speed up repeated access to the same data.  It provides rapid access without having to wait for systems to load.
  • 22. RAM Memory  Random access memory (RAM) is the best known form of computer memory.  • RAM is considered "random access" because you can access any memory cell directly if you know the row and column that intersect at that cell.  A ROM chip is non-volatile storage and does not require a constant source of power to retain information stored on it. When power is lost or turned off, a ROM chip will keep the information stored on it. In contrast, a RAM chip is volatile and requires a constant source of power to retain information. CoderCompany.com
  • 23. Security Management  Virus management.  Alert messages.  Dialogue boxes.  Firewall.  Passwords./ Access protection.
  • 24. Functionalities  Protects file and documents of the users.  Protect the computer system from unauthorized user.  Provision of operate computer system by only authorized users.  Extended the security level of users account i.e. either it is administration or guest account.  Disallow the unauthorized users to use the resources and data of the computer and also to share that resources.
  • 25. Function of Operating System: Boot Device: A boot device is any piece of hardware that can read or contains the files required for a computer to start. Boot Disk: A boot disk is a removable digital data storage medium from which a computer can load and run (boot) an operating system or utility program.  Recovery Disk: A recovery disk contains a few system files that will start the computer
  • 26. Utility programmers  A utility program, also called a utility, is a type of system software that allows a user to perform maintenance-type tasks, usually related to managing a computer, its devices, or its programs.  Utility programs are built-in to many operating systems or can be purchased separately.
  • 27. Utility programmers  Functions provided include: managing files, searching for files, viewing images, uninstalling programs, cleaning up disks, defragmenting disks, backing up files and disks, setting up screen savers, securing a computer, etc.
  • 28. Types of Utility Programs  There are many types of utility programs 1. File Manager 2. Image Viewer 3. Search Utility 4. Personal Firewall 5. Antivirus 6. Disk Defragmenter 7. Screen Saver 8. Backup and restore utilities CoderCompany.com
  • 30. What is File Manager?  A file manager or file browser is a computer program that provides a user interface to manage files and folders.  Examples:  Window Explorer  Web browser are also has the feature of file managing. e.g. Internet Explore.  File Commander.  Some file managers provide network connectivity via protocols, such as FTP, NFS……etc. CoderCompany.com
  • 31. Uses/Purposes  The most common operations performed on files or groups of files include:  Creating  Opening (e.g. viewing, playing, editing or printing)  Renaming  Moving or copying  Deleting and searching for files  Modifying file attributes  Properties and file permissions ……….etc CoderCompany.com
  • 33. What is Image viewer?  An image viewer or image browser is a computer program that can display stored graphical images; it can often handle various graphics file formats. Example:  such as Photoshop or the GIMP or the StylePix  Windows Photo viewer.  Windows Picture and Fax Viewer in Windows XP  ACDSee, FastPictureViewer, FastStone Image Viewer, Imagine, IrfanView, Media Pro 1, pViewer, XnView
  • 34. Features: Typical features of image viewers are:  basic viewing operations such as zooming and rotation  full screen display  slideshow  thumbnail display  printing  screen capture CoderCompany.com
  • 35. Advanced features are:  decode next image in advance and keep previous decoded image in memory for fast image changes  display (and edit) metadata such as XMP, IPTC Information Interchange Model and Exif  batch conversion (image format, image dimensions, etc.) and renaming  create contact sheets  create HTML thumbnail pages  different transition effects for slideshows CoderCompany.com
  • 36. Search Utility  Introduction: A couple of years back there were no contenders for this title. Today we have a wealth of choices. Wasting time looking for a file is a huge aggravation. Here are several tools to keep you from falling into that trap.
  • 37. Definition  Any utility that is used locally to help find specific data on either the desktop or on an on-premise server. In other words, Internet search utilities are not included, but everything else is fair game.
  • 38. Search Utility  A search utility is a program that attempts to locate a file on your computer based on criteria you specify.  The criteria may include a word or words contained in a file, date of creation or modification, size of the file, location, file name, author, and other properties.  Search utilities typically use an index, which stores a variety of information about the file, including its name, date created and modified, and author to quickly locate the file. CoderCompany.com
  • 39. Search Utility  In Windows, Explorer and the Start Menu contain a search box where you enter the search criteria.
  • 40. Disk Burning Disc burning software is used to write text, graphics, audio and video files on a recordable or rewriteable CD(Compact Disc) and DVD(Digital Versatile Disc).It allows the user to backup data on optical disc. Ways to burn a CD/DVD  Windows Default disc burning  By using desired software CoderCompany.com
  • 41. Default burning  By using default utility
  • 43. By using “DVD Flick”  http://www.dvdflick.net/download.php(For Download)
  • 44. Steps for Disk burning using “DVD Flick” 1. Insert CD/DVD 2. Add title(add file you want to burn) 3. Menu Settings(to Insert a menu view) 4. Project setting(to give a title) 5. Burning(check the boxes ISO image, Burn project, disc label(write title name), Eject when done).
  • 45. File compression  File Compression is used to shrink the file size. It is easier and faster to send files over the internet. Ways of File Compression  Default (Built-in).  Using desired software(Winrar).
  • 46. Default Compression 1. Right click on folder that you want to compress then click on properties. 2. Click on Send TO. 3. Check or click “Compression contents to save the disk space”. 4. Check the folder’s properties that you have compressed.
  • 47. WinRAR  This is popular file compression software  We can upload folds and more than one files using WinRAR  It is also used to secure the files from viruses.  It can highly compress the files .  Download link for WinRAR http://www.win- rar.com/predownload.html?&f=wrar511.exe&spV=true&subD=true&L=0
  • 48. Make Bootable USB This process By using UltraISO Steps For Installing and Making Win Boot 1. First You have to download Widows ISO file from any platform you like. 2. Downlaod Forms for windows ISO. * https://www.microsoft.com/ * http://webforpc.com/ *http://windows-8.en.malavida.com/ 3. Download PowerISO/UltraISO/Rufus software to Make bootable Windows. 4. After downloading Install any of the Software You downloaded. 5. Now open your installed software.
  • 50. 7. Now Open Program You installed on your Pc
  • 51. 8. Now go to Tools And select Create Bootable USB drive Mentioned in Picture Below
  • 52. 9. Now select ISO file You downloaded in your PC
  • 53. 11. Now Hit Start button As mentioned in Screenshot Below
  • 54. Windows 7 Installation CPU’s requirements for installation of win 7 Minimum hardware that you need to have on your computer and should be checked in advance of installing.  1 GHz CPU with 32 bits or 64 bits.  1 GB Ram for 32 bits or 2 GB Ram for 64 bits.  16 GB empty space hard disk for 32 bits or 20 GB for 64 bits.  DVD drive (if installing from a DVD).  Steps for windows 7 Installation 1. Turn your computer on then press Del or F2 (depend on your computer’s mainboard) to enter the system BIOS. 2. choose Boot From CD/DVD.
  • 55. 3. Insert Windows 7 DVD into your DVD drive then start up your computer, Windows 7 will be loading files. 4. Select these parts: Language to Install, Time and currency format, Keyboard or input method. Then click Next. 5. Choose Install Now if you want to install Windows 7. 6. Click 'I accept the license terms' in 'Please read the license' then click Next. 7. Custom (advance)' if you want to install a new version of Windows. 8. Choose Partition for installation. 9. Wait for Installing Windows to progress.
  • 56. Computer Virus Definition:  “A virus is a program that copy itself without the permission and knowledge of the user”.  “Virus + computer=Death”.
  • 57. Characteristics Ability to replicated itself Ability to attached itself to another computer file Slow down the response time Extensive pop-up-ads. Damage the computer hard drive
  • 58. Differentiate virus and Worm Some people distinguish between general viruses and worms. A worm is a special type of virus that can replicate itself and use memory, but cannot attach itself to other programs. Worm is too dangerous than virus
  • 59. Types of Computer Viruses  Boot Sector Virus  Browser Hijacker  File Infector Virus  Macro Virus  Multipartite Virus  Polymorphic Virus  Resident Virus  Web Scripting Virus CoderCompany.com
  • 61. History of virus  1949, scientist of Mathematics JOHAN VON NEUMANN proposed the idea of self replicated program which he describe the acting motion of virus in a real world.  1960,A group of programmer developed a game called core ware which produced a copy itself as well as the games Is run.  1980, Microsoft developed MS-DOS ,A fast OS on the planet . After this virus become more thick and fast.  1986 major mile stone world protrusion called pc-writ.it is also called Trojan Hoarse.  1988,a virus called MORRIS work for MS-DOS
  • 62.  1999, A famous MELISSA virus W97M/Melissa executed a macro with an attachment file from an email. This is turn forward into the 50people.Now they used internet  2000,I love you virus developed .its function like Melissa but it is too power full than Melissa .it would delete the media files like MP3 Images Videos etc.  2001 core red 1&2 Virus developed. Sven hundred thousand machine infected from this and 2 billion dollar of the damage.  2003, SQL Slammer virus developed .from this internet become very slow all over the world.6 moths later MICROSOFT released a Fix For the BUG called slammer.  2007, A virus developed called STORM WORM.it connect computer to the BOT-NET.  2016, Different virus MALWARE, ADWAER, SPYWARE which steel information today from the computer alover the world
  • 63. ANTIVIRUS Definition:  Antivirus is a software which is used to preventing a computer system from virus by detecting and removing it.  Antivirus are special program that detect and remove virus from computer system.
  • 64. Virus Scanning Process  . Antivirus Scene system Virus not found Virus found/ detected Show message Remove virus CoderCompany.com
  • 66. Codercompany.com Best Web Design Company in Pakistan Contact Us for any web Related Services Thank You for Your Attention