Software is a set of programs, instructions, and related data that tell a computer how to perform tasks. It is intangible (cannot be touched) and works with hardware to make a computer functional. Without software, hardware cannot perform any meaningful work.
System software manages and controls the internal operations of a computer system. It acts as a bridge between hardware and application software.
Examples include operating systems like Windows 10 and Linux.
It ensures proper functioning of hardware components such as CPU, memory, and devices.
Utility software is designed to maintain, analyze, and optimize the performance of a computer system.
It helps in protecting the system and improving efficiency.
Examples include antivirus programs, disk cleanup tools, and backup software.
Application software is created to help users perform specific tasks.
It can be general-purpose (like word processing) or specialized (like accounting software).
Examples include document editors, browsers, and media players.
Web-based software operates through internet browsers without needing installation.
These applications are stored on remote servers and accessed online.
Examples include email services and cloud-based tools.
Mobile applications are designed specifically for smartphones and tablets.
They are optimized for touch interfaces and mobile hardware.
Examples include messaging apps, social media apps, and mobile games.
An Operating System (OS) is the most important system software that manages computer hardware and software resources. It provides a platform for users to interact with the computer and run applications.
Examples include Windows 10, Linux, and macOS.
The operating system performs several key roles:
Controls and manages all running programs by allocating CPU time.
Allocates and deallocates memory space as required by programs.
Organizes data into files and folders and controls access.
Manages communication between hardware devices and the system.
Protects system data and prevents unauthorized access.
A GUI-based OS allows users to interact with the system through graphical elements like icons, buttons, and windows instead of text commands.
Features:
The desktop is the main working area of the system.
Applications open in windows, which can be resized, minimized, or closed.
The taskbar shows running applications and allows switching between them easily.
File Explorer is used to manage data in the computer:
Users can personalize their system by:
Devices like printers, USB drives, and keyboards can be added or removed.
Drivers are required for proper functioning and are usually installed automatically by the OS.
Devices should be safely removed to prevent data loss.
Users can secure their system by:
Used for advanced configuration of system settings such as hardware, programs, and user accounts.
Provide maintenance and troubleshooting options:
Basic programs included with the OS for daily tasks:
Open source operating systems allow users to access, modify, and distribute source code freely.
They encourage collaboration and innovation.
Examples include Linux and Android.
Linux is an open-source operating system based on UNIX principles.
It is flexible, secure, and widely used in servers and personal computers.
It was developed by Linus Torvalds.
UNIX is a powerful multi-user operating system developed in the 1970s.
It is mainly used in large systems and servers and is known for stability and security.
A Linux Distribution (Distro) is a complete OS built using the Linux kernel with additional software.
Examples:
A Mobile Operating System is software that runs on smartphones and tablets and manages hardware and applications.
A mobile operating system is designed for portable devices such as smartphones and tablets.
It controls device functions, supports mobile applications, and provides a touch-based interface.
8.1 Digital Society and Computer Ethics
Digital Society: A digital society is a society where people use computers, the internet, mobile phones, and digital technologies for communication, education, business, banking, and government services. It makes life easier, faster, and more connected. Examples include online shopping, digital payments, e-learning, and social media.
Computer ethics refers to moral principles and rules that guide the proper use of computers and digital technologies. It teaches users to use technology honestly, responsibly, and legally. कम्प्युटर प्रयोग गर्दा इमानदार, जिम्मेवार र अरूको अधिकारको सम्मान गर्नु नै Computer Ethics हो।
The Ten Commandments of Computer Ethics were created by the Computer Ethics Institute as guidelines for ethical computer use.
Computer crimes are illegal activities carried out using computers or networks. Examples include cyber fraud, identity theft, hacking, and cyberbullying.
Cyber Crimes can be basically divide into three categories:
Security measures help protect computers and data from threats. These include strong passwords, antivirus software, firewalls, and regular updates.
Digital Divide
Digital Divide is the gap between people who have access to digital technology (internet, computers, smartphones) and those who do not.
Types of Digital Divide
Causes of digital divide
Effects of digital divide
Ways to Reduce of digital divide
In Nepal
Digital divide exists between urban and rural areas. The National Information and Communication Technology Policy helps improve digital access and inclusion.
8.2 Concept of Information Security
Information Security (InfoSec): Protection of data from unauthorized access, misuse, or damage.
Main Principles (CIA Triad):
Threats: In cyber security, threats means anything that can damage, steal, or misuse data or systems.
Encryption (LOCK)→ changing readable information into a secret code. Plain text to cipher text.
Decryption (UNLOCK)→ changing the secret code back into normal readable information. Cipher Text to plain text.
8.3 Concept of Cybercrime
Cybercrime: Crime committed using computers or the internet.
Types:
Cyber Laws: Laws to prevent cybercrime and punish offenders.
Implications (परिणाम):
8.4 Malicious Software and Spam
Malicious Software (Malware)
Malware is harmful software designed to damage systems or steal data.
Types of Malware
Phishing is a cyber attack where fake emails or websites trick users into giving passwords or bank details.
Spam is unwanted bulk email or messages, often used for advertising or fraud.
Avoid suspicious links, use antivirus, enable spam filters, and verify unknown messages.
8.5 Protection from Cybercrime
Cybersecurity Measures
Cybersecurity involves protecting systems and networks from attacks through security practices.
Measures include:
Firewall
A firewall is a security system that monitors and blocks unauthorized network access.
Antivirus Software
Antivirus software detects, prevents, and removes viruses and malware.
Data Backup
Data backup means creating copies of important data so it can be restored if lost or attacked.
8.6 Intellectual Property Right (IPR)
Intellectual Property Right
IPR gives legal protection to creators for their inventions and creative works.
Copyright
Copyright protects books, music, software, films, and digital content from unauthorized copying.
Patent
A patent gives an inventor exclusive rights to use or sell an invention for a specific period.
Trademark
A trademark protects brand names, logos, and symbols.
Importance of IPR
8.7 Concept of Digital Signature
Digital Signature
A digital signature is an electronic signature used to verify identity and authenticate digital documents.
Uses of Digital Signature
Benefits
8.8 Concept of Cyber Law in Nepal
Cyber Law in Nepal
Cyber law in Nepal governs online activities, cybercrimes, and electronic transactions.
Main law:
Provisions of ETA
Importance
It helps control cybercrime, protect users, and support secure digital transactions.
8.9 ICT Policy in Nepal
ICT Policy
ICT Policy is the government framework for developing information and communication technology.
Example:
Objectives of ICT Policy
Importance
ICT policy helps digital development, improves public services, and promotes a knowledge-based economy.