parajulirajesh.com.np

Study Material

Computer Software and operating System

3.1 Concept of Software

3.1.1 Definition of Software

Software is a set of programs, instructions, and related data that tell a computer how to perform tasks. It is intangible (cannot be touched) and works with hardware to make a computer functional. Without software, hardware cannot perform any meaningful work.


3.1.2 Categories of Software

1. System Software

System software manages and controls the internal operations of a computer system. It acts as a bridge between hardware and application software.
Examples include operating systems like Windows 10 and Linux.
It ensures proper functioning of hardware components such as CPU, memory, and devices.


2. Utility Software

Utility software is designed to maintain, analyze, and optimize the performance of a computer system.
It helps in protecting the system and improving efficiency.
Examples include antivirus programs, disk cleanup tools, and backup software.


3. Application Software

Application software is created to help users perform specific tasks.
It can be general-purpose (like word processing) or specialized (like accounting software).
Examples include document editors, browsers, and media players.


4. Web-Based Software

Web-based software operates through internet browsers without needing installation.
These applications are stored on remote servers and accessed online.
Examples include email services and cloud-based tools.


5. Mobile Apps

Mobile applications are designed specifically for smartphones and tablets.
They are optimized for touch interfaces and mobile hardware.
Examples include messaging apps, social media apps, and mobile games.


3.2 Concept of Operating System

3.2.1 Introduction to Operating System

An Operating System (OS) is the most important system software that manages computer hardware and software resources. It provides a platform for users to interact with the computer and run applications.
Examples include Windows 10, Linux, and macOS.


3.2.2 Role of Operating System

The operating system performs several key roles:

  • It provides an interface between the user and hardware
  • It manages all hardware resources efficiently
  • It runs and controls application programs
  • It ensures system security and data protection
  • It handles input and output operations

3.2.3 Functions of an Operating System

Process Management

Controls and manages all running programs by allocating CPU time.

Memory Management

Allocates and deallocates memory space as required by programs.

File System Management

Organizes data into files and folders and controls access.

Device Management

Manages communication between hardware devices and the system.

Security Management

Protects system data and prevents unauthorized access.


3.2.4 Operating System Terminology

  • Multiprogramming: Multiple programs are loaded into memory and executed one after another to improve CPU usage.
  • Multitasking: The OS allows multiple tasks to run at the same time, giving the illusion of parallel execution.
  • Multiprocessing: Uses two or more processors (CPUs) to perform tasks simultaneously.
  • Distributed System: Multiple computers connected via a network work together as a single system.

3.3 Windows Operating System

3.3.1 Introduction to GUI-Based Operating System and Its Features

A GUI-based OS allows users to interact with the system through graphical elements like icons, buttons, and windows instead of text commands.

Features:

  • Easy to use and learn
  • Uses icons, menus, and windows
  • Supports multitasking
  • Allows direct interaction using mouse and keyboard

3.3.2 Working in Desktop Application and Window Environment

The desktop is the main working area of the system.
Applications open in windows, which can be resized, minimized, or closed.
The taskbar shows running applications and allows switching between them easily.


3.3.3 Manage Files and Folders with File Explorer

File Explorer is used to manage data in the computer:

  • Create and organize files and folders
  • Copy, move, rename, and delete files
  • Search for specific files
  • View file properties and details

3.3.4 Customize the Start Screen and Desktop

Users can personalize their system by:

  • Changing background images (wallpaper)
  • Selecting themes and colors
  • Pinning frequently used apps
  • Arranging desktop icons

3.3.5 Installing and Removing Devices

Devices like printers, USB drives, and keyboards can be added or removed.
Drivers are required for proper functioning and are usually installed automatically by the OS.
Devices should be safely removed to prevent data loss.


3.3.6 Manage Passwords and Privacy Levels

Users can secure their system by:

  • Setting strong passwords or PINs
  • Enabling login security options
  • Controlling app permissions (camera, microphone, location)
  • Managing data sharing and privacy settings

3.3.7 Use of Control Panel, System Tools and Accessories

Control Panel

Used for advanced configuration of system settings such as hardware, programs, and user accounts.

System Tools

Provide maintenance and troubleshooting options:

  • Disk Cleanup removes unnecessary files
  • System Restore restores previous system state
  • Backup tools protect data

Accessories

Basic programs included with the OS for daily tasks:

  • Notepad (text editing)
  • Paint (drawing)
  • Calculator (calculations)
  • Snipping Tool (screenshots)

3.4 Open Source and Mobile Operating System

3.4.1 Concept of Open Source Operating System

Open source operating systems allow users to access, modify, and distribute source code freely.
They encourage collaboration and innovation.

Examples include Linux and Android.


3.4.2 Introduction to Linux and UNIX

Linux

  • Linux is an open-source OS created by Linus Torvalds
  • Based on UNIX principles
  • Widely used in servers, desktops, and mobile devices

Linux is an open-source operating system based on UNIX principles.
It is flexible, secure, and widely used in servers and personal computers.
It was developed by Linus Torvalds.

UNIX

  • UNIX is an older, powerful OS developed in the 1970s
  • Multi-user and multitasking system
  • Mostly used in servers and workstations

UNIX is a powerful multi-user operating system developed in the 1970s.
It is mainly used in large systems and servers and is known for stability and security.


3.4.3 Linux Distributions

A Linux Distribution (Distro) is a complete OS built using the Linux kernel with additional software.

Examples:

  • Ubuntu – User-friendly
  • Fedora – Latest features
  • Debian – Stable and secure
  • Kali Linux – Security and hacking tools
  • Red Hat Enterprise Linux – Commercial use

3.4.4 Concept of Mobile Operating System

A Mobile Operating System is software that runs on smartphones and tablets and manages hardware and applications.

🔹 Functions:

  • Manages device hardware (camera, battery, etc.)
  • Runs mobile apps
  • Provides user interface (touch screen)
  • Controls connectivity (Wi-Fi, Bluetooth)

A mobile operating system is designed for portable devices such as smartphones and tablets.
It controls device functions, supports mobile applications, and provides a touch-based interface.


3.4.5 Types of Mobile Operating System

Common Types:

  1. Android
    • Developed by Google
    • Open-source and widely used
  2. iOS
    • Developed by Apple Inc.
    • Used in iPhones
  3. Windows Phone
    • Developed by Microsoft
    • Now discontinued
  4. BlackBerry OS
    • Known for security features
    • Mostly outdated
  5. Symbian
    • Used in older Nokia phones
  • Android – Open source and widely used worldwide
  • iOS – Developed by Apple, known for security
  • Windows Phone – Discontinued
  • BlackBerry OS – Secure but outdated
  • Symbian – Used in older mobile phones

Unit 8 Information security and cyber Law

8.1 Digital Society and Computer Ethics

Digital Society: A digital society is a society where people use computers, the internet, mobile phones, and digital technologies for communication, education, business, banking, and government services. It makes life easier, faster, and more connected. Examples include online shopping, digital payments, e-learning, and social media.

Computer Ethics

Computer ethics refers to moral principles and rules that guide the proper use of computers and digital technologies. It teaches users to use technology honestly, responsibly, and legally. कम्प्युटर प्रयोग गर्दा इमानदार, जिम्मेवार र अरूको अधिकारको सम्मान गर्नु नै Computer Ethics हो।

Ethical Issues in Computing

  • Privacy Violation: Accessing or sharing someone’s personal information without permission.
  • Software Piracy: Copying or using software illegally.
  • Hacking: Unauthorized access to computer systems.
  • Plagiarism: Copying digital content and claiming it as one’s own.
  • Spreading False Information: Sharing fake news or misleading information online.

Commandments of Computer Ethics (कम्प्युटर आचारसंहिताका नियमहरू)

The Ten Commandments of Computer Ethics were created by the Computer Ethics Institute as guidelines for ethical computer use.

  1. Do not use a computer to harm other people.
    Do not use computers to damage others, spread viruses, or commit cybercrime.
  2. Do not interfere with other people’s computer work.
    Do not disrupt or interrupt another person’s work, files, or systems.
  3. Do not snoop around in other people’s files.
    Do not access someone’s private data without permission.
  4. Do not use a computer to steal.
    Do not use computers for fraud, identity theft, or stealing data.
  5. Do not use a computer to bear false witness.
    Do not spread false information, fake messages, or misinformation.
  6. Do not copy or use proprietary software for which you have not paid.
    Do not use pirated software illegally.
  7. Do not use other people’s computer resources without authorization.
    Do not use others’ internet, systems, or accounts without permission.
  8. Do not appropriate other people’s intellectual output.
    Do not plagiarize or claim others’ work as your own.
  9. Think about the social consequences of the program you write or system you design.
    Consider how technology may affect people and society.
  10. Always use a computer in ways that ensure consideration and respect for others.
    Use technology responsibly, ethically, and respectfully.

Computer Crimes

Computer crimes are illegal activities carried out using computers or networks. Examples include cyber fraud, identity theft, hacking, and cyberbullying.

  • Cyber fraud → cheating people on the internet to get money or information
  • Identity theft → taking someone’s personal details and using them as your own
  • Hacking → getting into someone’s computer or account without permission
  • Cyberbullying → using the internet to hurt or harass someone

Cyber Crimes can be basically divide into three categories:

  • Cybercrimes against persons.
  • Cybercrimes against property
  • Cybercrimes against governement

Security Measures

Security measures help protect computers and data from threats. These include strong passwords, antivirus software, firewalls, and regular updates.

  • Strong passwords
  • Two-factor authentication (2FA)
  • Antivirus
  • Regular software updates

Digital Divide

Digital Divide is the gap between people who have access to digital technology (internet, computers, smartphones) and those who do not.

Types of Digital Divide

  1. Access Divide: Difference in access to devices and internet.
    Example: Urban areas have better internet than rural areas.
  2. Skill Divide: Difference in digital knowledge and skills.
    Example: Some people have internet but do not know how to use online services.
  3. Usage Divide: Difference in how technology is used.
    Example: Some use internet for education and business, others only for communication.

Causes of digital divide

  • Poverty
  • Lack of internet infrastructure
  • Low digital literacy
  • High cost of devices and data
  • Geographic barriers

Effects of digital divide

  • Unequal education access
  • Fewer job opportunities
  • Limited online services
  • Social and economic inequality

Ways to Reduce of digital divide

  • Expand internet access
  • Improve digital education
  • Provide affordable devices
  • Develop rural ICT infrastructure

In Nepal

Digital divide exists between urban and rural areas. The National Information and Communication Technology Policy helps improve digital access and inclusion.

8.2 Concept of Information Security

Information Security (InfoSec): Protection of data from unauthorized access, misuse, or damage.

Main Principles (CIA Triad):

  • Confidentiality → Only authorized users access data
  • Integrity → Data remains accurate
  • Availability → Data available when needed

Threats: In cyber security, threats means anything that can damage, steal, or misuse data or systems.

  • Hackers → people who try to get into computer systems or accounts without permission
  • Viruses → harmful programs that spread in computers and damage or steal data
  • Data breaches → when private or sensitive information is exposed or stolen
  • Insider attacks → when someone inside an organization (like an employee) misuses access to harm or leak information

Encryption (LOCK)→ changing readable information into a secret code. Plain text to cipher text.

Decryption (UNLOCK)→ changing the secret code back into normal readable information. Cipher Text to plain text.

8.3 Concept of Cybercrime

Cybercrime: Crime committed using computers or the internet.

Types:

  • Hacking → getting into a computer or account without permission
  • Phishing → tricking people into giving personal information (like passwords) using fake messages or websites
  • Online fraud → cheating people on the internet to get money or data
  • Cyberstalking → repeatedly following, watching, or harassing someone online
  • Ransomware attacks → locking someone’s data and asking for money to unlock it

Cyber Laws: Laws to prevent cybercrime and punish offenders.

Implications (परिणाम):

  • Financial loss → money loss (आर्थिक नोक्सानी)
  • Privacy breach → personal information getting exposed (गोपनीयता भंग)
  • Reputation damage → losing good name or respect (प्रतिष्ठामा हानी)
  • Legal consequences → facing legal problems or punishment (कानुनी परिणाम)

8.4 Malicious Software and Spam

Malicious Software (Malware)

Malware is harmful software designed to damage systems or steal data.

Types of Malware

  • Virus: Attaches to files and spreads when executed.
  • Worm: Self-replicates and spreads automatically.
  • Trojan Horse: Looks legitimate but contains harmful code.
  • Ransomware: Locks files and demands payment.
  • Spyware: Secretly collects user information.

Phishing

Phishing is a cyber attack where fake emails or websites trick users into giving passwords or bank details.

Spam

Spam is unwanted bulk email or messages, often used for advertising or fraud.

Preventive Measures

Avoid suspicious links, use antivirus, enable spam filters, and verify unknown messages.

8.5 Protection from Cybercrime

Cybersecurity Measures

Cybersecurity involves protecting systems and networks from attacks through security practices.

Measures include:

  • Strong passwords
  • Two-factor authentication
  • Regular updates
  • Secure networks

Firewall

A firewall is a security system that monitors and blocks unauthorized network access.

Antivirus Software

Antivirus software detects, prevents, and removes viruses and malware.

Data Backup

Data backup means creating copies of important data so it can be restored if lost or attacked.

8.6 Intellectual Property Right (IPR)

Intellectual Property Right

IPR gives legal protection to creators for their inventions and creative works.

Copyright

Copyright protects books, music, software, films, and digital content from unauthorized copying.

Patent

A patent gives an inventor exclusive rights to use or sell an invention for a specific period.

Trademark

A trademark protects brand names, logos, and symbols.

Importance of IPR

  • Protects creators
  • Prevents unauthorized copying
  • Encourages innovation
  • Supports economic growth

8.7 Concept of Digital Signature

Digital Signature

A digital signature is an electronic signature used to verify identity and authenticate digital documents.

Uses of Digital Signature

  • Secure online transactions
  • Signing digital documents
  • Authenticating email senders

Benefits

  • Security → protecting data and systems from danger or unauthorized access (सुरक्षा)
  • Authentication → checking if a user is really who they claim to be (पहिचान प्रमाणित गर्ने प्रक्रिया)
  • Prevents tampering → stops data from being changed or misused without permission (अनधिकृत परिवर्तन रोक्ने)
  • Non-repudiation → proving that a person cannot deny their action (like sending a message or making a transaction) (कारबाही अस्वीकार गर्न नसकिने प्रमाण)

8.8 Concept of Cyber Law in Nepal

Cyber Law in Nepal

Cyber law in Nepal governs online activities, cybercrimes, and electronic transactions.

Main law:

  • Electronic Transactions Act (ETA 2063)

Provisions of ETA

  • Punishment for hacking
  • Control of cyber fraud
  • Recognition of digital signatures
  • Legal validity of electronic records

Importance

It helps control cybercrime, protect users, and support secure digital transactions.

8.9 ICT Policy in Nepal

ICT Policy

ICT Policy is the government framework for developing information and communication technology.

Example:

  • National Information and Communication Technology Policy

Objectives of ICT Policy

  • Expand internet access
  • Promote e-governance
  • Develop digital education
  • Improve cybersecurity
  • Support IT industries

Importance

ICT policy helps digital development, improves public services, and promotes a knowledge-based economy.

Scroll to Top

Rajesh Parajuli

BICTE GMC

LEC.RAJESH PARAJULI

Address: Ghodaghodi Municipality-1 Sukhad kailali

Contact: 9847546279

Ghodaghodi Multiple Campus BICTE