Вы находитесь на странице: 1из 11

(3)

WHAT IS VIRUS

A computer virus is a program, script, or macro designed to cause damage,


steal personal information, modify data, send e-mail, display messages, or
some combination of these actions.

When the virus is executed, it spreads by copying itself into or over data files,
programs, or boot sector of a computer's hard drive, or potentially anything
else writable. To help spread an infection, the virus writers use detailed
knowledge of security vulnerabilities, zero days, or social engineering to gain
access to a host's computer.

A computer virus cannot infect a CD or DVD, as most CDs or DVDs are locked
after being created, preventing additional files from being put on that disc.
However, if during the creation of the disc a virus is also copied to the disc it
would become infected.

WHAT IS ANTI VIRUS

Antivirus software is a program or set of programs that are designed to


prevent, search for, detect, and remove software viruses, and other malicious
software like worms, trojans, adware, and more.

Nobody willingly or knowingly allows a virus to infect their computer, and it


doesn't happen on its own. A virus attacks your computer when you
inadvertently allow it to slip past your defenses and onto your computer.
Here the basic ways that we can avoid being the victim of a computer virus:
1. Don't start your computer when there is a USB (thumb) drive or other
type of removable media in a port or driver, especially if that media
came from someone you don't know or trust 100%. Why? Because if
there is a virus on that media, it will load onto your hard drive when
you start up.

2. Think twice before opening any attachment that comes in an email.

3. If you receive an email from a stranger, either mark it as spam


immediately or delete it without opening the email.

4. Learn how to disable and enable macros, which are instructions saved
in spreadsheet and word processing programs. A macro isn't bad,
unless someone who wants to infect your computer puts one there.

5. Make sure you have an antivirus program running on your computer,


and keep it updated. It will identify and remove viruses in your
memory, storage media and any incoming files. Most importantly, an
antivirus program automatically scans files you download from the
Internet, email attachments and open files.

6. Think about installing a software or hardware firewall. A router is an


example of a hardware firewall. Microsoft includes a personal
software firewall in its operating system.

7. Keep your guard up! There are websites that publish lists of the latest
known virus alerts and virus hoaxes.

(4)

Software Development Life Cycle (SDLC) is a process used by the software


industry to design, develop and test high quality softwares. The SDLC aims to
produce a high-quality software that meets or exceeds customer
expectations, reaches completion within times and cost estimates.
 SDLC is the acronym of Software Development Life Cycle.
 It is also called as Software Development Process.
 SDLC is a framework defining tasks performed at each step in the
software development process.
 ISO/IEC 12207 is an international standard for software life-cycle
processes. It aims to be the standard that defines all the tasks required
for developing and maintaining software.

What is SDLC?
SDLC is a process followed for a software project, within a software
organization. It consists of a detailed plan describing how to develop,
maintain, replace and alter or enhance specific software. The life cycle
defines a methodology for improving the quality of software and the overall
development process.
The following figure is a graphical representation of the various stages of a
typical SDLC.
The Waterfall Model was the first Process Model to be introduced. It is also
referred to as a linear-sequential life cycle model. It is very simple to
understand and use. In a waterfall model, each phase must be completed
before the next phase can begin and there is no overlapping in the phases.
The Waterfall model is the earliest SDLC approach that was used for software
development.
The waterfall Model illustrates the software development process in a linear
sequential flow. This means that any phase in the development process
begins only if the previous phase is complete. In this waterfall model, the
phases do not overlap.

Waterfall Model - Design


Waterfall approach was first SDLC Model to be used widely in Software
Engineering to ensure success of the project. In "The Waterfall" approach, the
whole process of software development is divided into separate phases. In
this Waterfall model, typically, the outcome of one phase acts as the input for
the next phase sequentially.
The following illustration is a representation of the different phases of the
Waterfall Model.
The sequential phases in Waterfall model are −
 Requirement Gathering and analysis − All possible requirements of the
system to be developed are captured in this phase and documented in a
requirement specification document.
 System Design − The requirement specifications from first phase are
studied in this phase and the system design is prepared. This system
design helps in specifying hardware and system requirements and
helps in defining the overall system architecture.
 Implementation − With inputs from the system design, the system is
first developed in small programs called units, which are integrated in
the next phase. Each unit is developed and tested for its functionality,
which is referred to as Unit Testing.
 Integration and Testing − All the units developed in the implementation
phase are integrated into a system after testing of each unit. Post
integration the entire system is tested for any faults and failures.
 Deployment of system − Once the functional and non-functional testing
is done; the product is deployed in the customer environment or
released into the market.
 Maintenance − There are some issues which come up in the client
environment. To fix those issues, patches are released. Also to enhance
the product some better versions are released. Maintenance is done to
deliver these changes in the customer environment.

All these phases are cascaded to each other in which progress is seen as
flowing steadily downwards (like a waterfall) through the phases. The next
phase is started only after the defined set of goals are achieved for previous
phase and it is signed off, so the name "Waterfall Model". In this model,
phases do not overlap.
(5)

INTERNET

Alternatively referred to as the net or web, the Internet (interconnected


network) was initially developed to aid in the progress of computing
technology by linking academic computer centers. The Internet as we know it
today first started being developed in the late 1960s with the start
of ARPANET and transmitted its first message on Friday, October 29, 1969.
In 1993, the Internet experienced one of its largest growths to date and today
is accessible by people all over the world.

The Internet contains billions of web pages created by people and companies
from around the world, making it a limitless place to locate information and
entertainment. The Internet also has thousands of services that help make life
more convenient. For example, many financial institutions offer online
banking that enables a user to manage and view their account from different
locations. The picture is a representation and map of the Internet done by The
Opte Project.

WHAT ARE THE ADVANTAGES OF INTERNET?


O COMMUNICATION:

The main advantage of internet is the faster communication than any other devices. It’s an
instant process. Communication in the form of video calls, emails etc. is possible using
internet. Thus, there is no specific region that can be accessed. It is accessible all over the
world. Hence, because of this global issues are reduced since video conferencing is possible
where everyone across the world can be in single place and can solve out a problem.

O INFORMATION:

The internet is the source of knowledge. All kinds of information is present in it. it is easily
accessed and can be searched more to get more additional knowledge. Information like
educational related, government laws, market sales, stocks and shares, new creations etc. is
gathered from a single place.

O LEARNING:

The internet has now become a part of education. Education like home schooling is easily
carried out using internet. Teachers can upload their teaching videos in the internet and is
accessed by people across the world which is helpful for all students. The marks are also
released in the internet since, releasing mark for the whole institution in notice boards will
create chaos.

O ENTERTAINMENT:

The internet is now the most popular form of entertainment. Movies, songs, videos, games
etc. is available in internet for free. Social networking is also possible using internet. Hence,
there is tons of entertainment that is available in online in the internet.

O SOCIAL NETWORK:

The social networking is the sharing of information to people across the world. Apart from
being an entertainment website, it has many uses. Any job vacancy, emergency news, ideas
etc. can be shared in the website and the information gets passed on quickly to wide
area. Also the social networking websites are used to easy communications. Example:
Facebook and twitter.

O E-COMMERCE:

All business deals can be carried in the internet like transaction of money etc. this is called
E commerce. Online reservations, online ticket booking for movie etc. can be done easily. It
saves us lots of time. Online shopping is now the latest trend in internet world where
products from dresses to household furniture is available at door step.
WHAT ARE THE DISADVANTAGES OF INTERNET?

O INFORMATION LOSS:

The information crucial to us or any important files can be easily taken by the hackers.
There is no exact proof for the security for the details we store like account number,
passwords etc. hence, sensitive information must be carefully stored by the people.

O SPAM:

The unnecessary emails, advertisements etc. sometimes are said to be spam because they
have the ability to slow down the system and makes the users to face lots of problems.
Spam makes the people get more confused since important emails are also stored along
with spam.

O VIRUS ATTACKS:

The malware or virus threats are so deadly that affects the system to a greater extend. It
immediately deletes all important files and finally the system ends up being crashed. The
virus attack is possible in three ways. One it attacks selected files. Two, it harms the
executable boot files and most dangerous of all is the macro virus which has the ability to
replicate and expand to all parts of files.

O VIRTUAL WORLD:

The people using internet often will forget the difference between virtual and real world.
This causes the people to get depressed quickly and it leads to social isolation and obesity
problems. The obesity is due to the lack of any physical exercises. So its better to play
outdoor rather in the internet.
(7)

A relational database (RDB) is a collective set of multiple data sets


organized by tables, records and columns. RDBs establish a well-
defined relationship between database tables. Tables communicate
and share information, which facilitates data search ability,
organization and reporting.
RDBs use Structured Query Language (SQL), which is a standard
user application that provides an easy programming interface for
database interaction.
RDB is derived from the mathematical function concept of mapping
data sets and was developed by Edgar F. Codd.

RDBs organize data in different ways. Each table is known as a


relation, which contains one or more data category columns. Each
table record (or row) contains a unique data instance defined for a
corresponding column category. One or more data or record
characteristics relate to one or many records to form functional
dependencies. These are classified as follows:

 One to One: One table record relates to another record in


another table.
 One to Many: One table record relates to many records in
another table.
 Many to One: More than one table record relates to another
table record.
 Many to Many: More than one table record relates to more
than one record in another table.

RDB performs "select", "project" and "join" database operations,


where select is used for data retrieval, project identifies data
attributes, and join combines relations.
T h e A d va n t a g e s o f a R e l a t i o n a l D a t a b a s e M a n a g e m e n t S ys t e m

Data Structure

The table format is simple and easy for database users to understand and use.
RDBMSs provide data access using a natural structure and organization of the data.
Database queries can search any column for matching entries.

Multi-User Access

RDBMSs allow multiple database users to access a database simultaneously. Built-in


locking and transactions management functionality allow users to access data as it is
being changed, prevents collisions between two users updating the data, and keeps
users from accessing partially updated records.

Privileges

Authorization and privilege control features in an RDBMS allow the database


administrator to restrict access to authorized users, and grant privileges to individual
users based on the types of database tasks they need to perform.

Network Access

RDBMSs provide access to the database through a server daemon, a specialized


software program that listens for requests on a network, and allows database clients to
connect to and use the database. Users do not need to be able to log in to the physical
computer system to use the database, providing convenience for the users and a layer
of security for the database. Network access allows developers to build desktop tools
and Web applications to interact with databases.

Speed

The relational database model is not the fastest data structure. RDBMS advantages,
such as simplicity, make the slower speed a fair trade-off. Optimizations built into an
RDBMS, and the design of the databases, enhance performance, allowing RDBMSs to
perform more than fast enough for most applications and data sets. Improvements in
technology, increasing processor speeds and decreasing memory and storage costs
allow systems administrators to build incredibly fast systems that can overcome any
database performance shortcomings.

Maintenance

RDBMSs feature maintenance utilities that provide database administrators with tools to
easily maintain, test, repair and back up the databases housed in the system. Many of
the functions can be automated using built-in automation in the RDBMS, or automation
tools available on the operating system.

Вам также может понравиться