Term1, Js3 Notes Students
Term1, Js3 Notes Students
By Olawale Dorothy
WEEKS TOPICS OBJECTIVES
1. Software developer
Daily duties:
Design or customize computer applications software
Modify existing software to optimize operational efficiency or correct errors
Evaluate software requirements and user needs to determine software feasibility
5. Database administrator
Daily duties:
Test and administer computer databases
Coordinate changes and correct errors to computer databases
Apply security measures to safeguard information
6. Business intelligence analyst
Daily duties:
Analyze market strategies through examining competitors and share trends
Collect and compile data from public information, industry reports or purchased sources
Produce business intelligence and trend data to support recommendations for plans of action
7. Web developer
2
Daily duties:
Page
Write, design or edit web page content, or direct others producing content
Identify and correct problems uncovered by testing or user feedback
Back up website files for immediate recovery in case of problems
8. Computer programmer
Daily duties:
Create and test the code that allows computers to run properly
Analyze user needs and develop software solutions
Write computer programs to store, locate or retrieve data
A person who has undergone training in a computer-field-related colleges, universities and computer institutes;
or a person who has proven extensive knowledge in the area of computing.
Job titles for a computer professional include:
4
Page
COMPUTER VIRUS
A virus is a malicious software designed to replicate itself and stealthily gain access to computer files in order
to disrupt its normal functioning.
A virus is a type of malicious software program ("malware") that, when executed, replicates itself by modifying
other computer programs and inserting its own code. Infected computer programs can include, as well, data files,
or the "boot" sector of the hard drive. When this replication succeeds, the affected areas are then said to be
"infected" with a computer virus.
Classes of virus:
1. Boot sector virus: From a user perspective, boot sector viruses are some of the most dangerous. Because
they infect the master boot record, they are notoriously difficult to remove, often requiring a full system
format. This is especially true if the virus has encrypted the boot sector or excessively damaged the code.
2. Direct Action Virus: A direct action virus is one of the two main types of file infector viruses (the other
being a resident virus). The virus is considered “non-resident”; it doesn’t install itself or remain hidden
in your computer’s memory.
It works by attaching itself to a particular type of file (typically EXE or COM files). When someone
executes the file, it springs into life, looking for other similar files in the directory for it to spread to.
3. Resident Virus: Resident viruses are the other primary type of file infectors. Unlike direct action
viruses, they install themselves on a computer. It allows them to work even when the original source of
the infection has been eradicated. As such, experts consider them to be more dangerous than their direct
action cousin.
4. Multipartite Virus: While some viruses are happy to spread via one method or deliver a single payload,
Multipartite viruses want it all. A virus of this type may spread in multiple ways, and it may take different
actions on an infected computer depending on variables, such as the operating system installed or the
existence of certain files.
They can simultaneously infect both the boot sector and executable files, allowing them to act quickly
and spread rapidly.
The two-pronged attack makes them tough to remove. Even if you clean a machine’s program files, if
the virus remains in the boot sector, it will immediately reproduce once you turn on the computer again.
5. Polymorphic Virus
According to Symantec, polymorphic viruses are one of the most difficult to detect for an anti-virus
program. It claims anti-virus firms need to “spend days or months creating the detection routines needed
to catch a single polymorphic”. But why are they so hard to protect against? The clue is in the name.
Anti-virus software can only blacklist one variant of a virus – but a polymorphic virus changes its
signature (binary pattern) every time it replicates. To an anti-virus program, it looks like an entirely
different piece of software, and can, therefore, elude the blacklist.
6. Overwrite Virus
5
To an end-user, an overwrite virus is one of the most frustrating, even if it’s not particularly dangerous
Page
Overwrite viruses typically have low visibility and are spread via email, making them hard to identify
for an average PC user. They enjoyed a heyday in the early 2000s with Windows 2000 and Windows
NT, but you can still find them in the wild.
7. Spacefiller Virus
Also known as “Cavity Viruses”, spacefiller viruses are more intelligent than most of their counterparts.
A typical modus operandi for a virus is to simply attach itself to a file, but spacefillers try to get into the
empty space which can sometimes be found within the file itself.
This method allows it to infect a program without damaging the code or increasing its size, thus enabling
it to bypass the need for the stealthy anti-detection techniques other viruses rely on.
Luckily, this type of virus is relatively rare, though the growth of Windows Portable Executable files is
giving them a new lease of life.
As always, taking sensible steps to protect yourself is preferable to dealing with the potentially crippling fallout
if you’re unlucky enough to get infected.
Use a highly-regarded anti-virus suite, don’t open emails from unrecognized sources, don’t trust free USB
sticks from conferences and expos, don’t let strangers use your system, and don’t install software from random
websites.
Examples of virus:
1. C-Brain: Amjad and Basit, two pakistani brothers, developed this software in January 1986.
2. Macmag: This virus attacked Apple Macintosh computers only. Not much damage is reported because of this
virus. This was not noticed on any IBM compatible PCs. It displayed a message of peace on the monitor and
killed itself.
3. Cascade: This virus attacked IBM PCs and compatibles. The letters on the screen could be seen dropping
vertically down to the bottom of screen after the virus picked them off in alphabetical order. This is a sort of
parasitic virus. It attaches itself to other programs and gets activated when the host program is executed. It gets
copied to other PCs when the programs are copied.
4. Jerusalem: Found in 1987 at Hebrew University, Jerusalem, this virus was designed to activate only on Friday,
January 13 and delete all the files executed on that day. This infects the COM and EXE files.
5. Daracrime/Columbus or October the 13th virus: This virus is similar to Jerusalem and was programmed to
attack on October 13, 1989. Track zero of computer hard disk is destroyed and the contents of discs are rendered
unreadable. This virus enters COM and EXE files and damages the hard disk.
6. Bomb: This is also known as 'Logic Bomb' and 'Time Bomb'. An event triggered routine in a program that
6
causes a program to crash is defined as a 'bomb'. Generally, 'bomb' is a software inserted in a program by a
Page
One of the primary purposes of a computer virus is to infect as many other systems as possible. In order to do
this, the virus replicates itself by attaching to other files on your computer. A common method of spreading to
other computers is by sending out email messages with a infected attachments to everyone in your address book.
If you find that the free space on your computer is rapidly decreasing or people are receiving infected email from
you, it is very possible that your computer has a virus.
While computers can become slower over time due to the amount of available hard drive space decreasing, it is
also possible for a virus to drastically reduce performance. The boot time of an infected computer is often much
slower than usual and programs take much longer to launch as well. You might also notice an increase in crashes
and freezes when working with the infected computer. It is also not uncommon for the infected computer to
restart unexpectedly or display strange error messages.
The data on a computer that is infected by a virus often becomes corrupted. This is either through the virus
attaching itself to files which renders these files unusable in the process or by maliciously destroying the data.
Files or folders are either deleted outright or become inaccessible. When attempting to launch applications, you
might receive error messages about the file not being found or not being valid. In some cases, this can lead to
the operating system not starting due to missing or corrupted files.
While pop-ups are on the Internet are normal, if you repeatedly receive the same ones no matter what Web page
you are viewing it could be due to a virus. Once your computer is infected, the virus might also change your
browser startup page to a website that contains other malicious code. The virus also sometimes blocks access to
7
security websites with updates or information on how to remove it. These types of viruses often attempt to install
Page
further malware on your computer by displaying links – disguised as system messages – to software that will
purportedly clean the infection.
5. Loss of Integrity: As a business enterprise, once your company and organization have been attacked, it
becomes difficult for people doing business or keeping their funds with you to trust you. As such, integrity and
reputation that takes years to build is lost. When this continues, your business may seize to exist in the nearest
future (extinction).
Antivirus Software: Anti-virus software is a program or set of programs that are designed to prevent, search
for, detect, and remove software viruses, and other malicious software like worms, trojans, adware, and more.
These tools are critical for users to have installed and up-to-date because a computer without anti-virus software
installed will be infected within minutes of connecting to the internet.
1. Avast
2. Kaspersky
3. 360 Total Security
4. Avira
5. NOD -32
6. Comodo
7. Panda
8
Page
COMPUTER NETWORK
A network is a link of two or more computers (nodes) and or relevant devices to share resources and
communicate.
They are various types of networks. Networks are classified based on various criteria
Classification based on proximity of the computers/ devices we have
NETWORK TOPOLOGY
This is the physical/logical arrangement of computers in a network.
BUS Topology
Bus topology is a network type in which every computer and network device is connected to single cable. When
it has exactly two endpoints, then it is called Linear Bus topology.
RING Topology
It is called ring topology because it forms a ring as each computer is connected to another computer, with the
last one connected to the first. Exactly two neighbours for each device.
1. A number of repeaters are used for Ring topology with large number of nodes, because if someone wants to
send some data to the last node in the ring topology with 100 nodes, then the data will have to pass through
99 nodes to reach the 100th node. Hence to prevent data loss repeaters are used in the network.
2. The transmission is unidirectional, but it can be made bidirectional by having 2 connections between each
Network Node, it is called Dual Ring Topology.
3. In Dual Ring Topology, two ring networks are formed, and data flow is in opposite direction in them. Also,
if one ring fails, the second ring can act as a backup, to keep the network up.
4. Data is transferred in a sequential manner that is bit by bit. Data transmitted, has to pass through each node
of the network, till the destination node.
10
Page
Advantages of Ring Topology
1. Transmitting network is not affected by high traffic or by adding more nodes, as only the nodes having tokens
can transmit data.
2. Cheap to install and expand
STAR Topology
In this type of topology all the computers are connected to a single hub through a cable. This hub is the central
node and all others nodes are connected to the central node.
MESH Topology
It is a point-to-point connection to other nodes or devices. All the network nodes are connected to each other.
Mesh has n(n-1)/2 physical channels to link n devices.
There are two techniques to transmit data over the Mesh topology, they are :
1. Routing
2. Flooding
Routing
In routing, the nodes have a routing logic, as per the network requirements. Like routing logic to direct the data
to reach the destination using the shortest distance. Or, routing logic which has information about the broken
links, and it avoids those node etc. We can even have routing logic, to re-configure the failed nodes.
Flooding
In flooding, the same data is transmitted to all the network nodes, hence no routing logic is required. The network
is robust, and the its very unlikely to lose the data. But it leads to unwanted load over the network.
1. Partial Mesh Topology : In this topology some of the systems are connected in the same fashion as mesh
topology but some devices are only connected to two or three devices.
12
2. Full Mesh Topology : Each and every nodes or devices are connected to each other.
Page
Features of Mesh Topology
1. Fully connected.
2. Robust.
3. Not flexible.
TREE Topology
It has a root node and all other nodes are connected to it forming a hierarchy. It is also called hierarchical
topology. It should at least have three levels to the hierarchy.
HYBRID Topology
It is two different types of topologies which is a mixture of two or more topologies. For example if in an office
in one department ring topology is used and in another star topology is used, connecting these topologies will
result in Hybrid Topology (ring topology and star topology).
1. Complex in design.
2. Costly.
14
Page
LOGIC GATES AND TRUTH TABLES
Logic gates are electronic circuits that regulate the flow of electricity/signals through it when certain conditions
are met. Each gate has minimum two inputs except for the NOT gate which accepts only one input.
The diagram below explains further.
15
Page
COREL DRAW
INTRODUCTION TO CORELDRAW
CorelDraw is a vector graphics editor developed and marketed by Corel Corporation of Ottawa, Canada. It is
also the name of Corel's Graphics Suite, which bundles CorelDraw with a bitmap image editor, Corel Photo
Paint, and other graphics-related programs
Versions of CorelDraw
CorelDraw versions are from 1 through sixteen known as (X6). However, the famous ones are version 9, 12, 14,
15 and 16.
Tools in CorelDraw
Here is a list of the basic tools of CorelDraw’s interface. To view animation of how it works, just click on the
icon or the name of the tool. These icon were based on CorelDraw X5 interface.
16
Page
Page
17
Page
18
PECULIARITY IN CORELDRAW VERSIONS ON DIFFERENT PLATFORMS
Different versions of CorelDraw run on different platforms. The computer program user should be conversant
with these peculiarities as it can affect software functionality.
b. Invoice
c. Receipt
d. Greeting cards
e. Complementary cards
f. I.D Cards
g. Posters
h. Banners etc.