[go: up one dir, main page]

0% found this document useful (0 votes)
3 views2 pages

Assignment 4

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 2

Name: John Lester A.

Baluyot
Date: December 08, 2024

Part I. Unscramble each word and write it in the provided space. After identifying the words,
provide a brief description or definition based on your own understanding.

1) OSTEFAWR
Answer: SOFTWARE - Software is a collection of programs, data, and instructions that enable
a computer or electronic device to perform specific tasks.

2) LAMARWE
Answer: MALWARE - Malware, short for malicious software, refers to any software designed
to harm, exploit, or otherwise compromise the integrity and functionality of computer systems,
networks, or devices.

3) PAINLPOTACI
Answer: APPLICATION - An application, often referred to as an app, is a software program
designed to perform specific tasks or functions for the user.

4) GOTERNPAI SMETSY
Answer: OPERATING SYSTEM - An operating system (OS) is software that acts as an
intermediary between computer hardware and users, managing hardware resources and
providing services for computer programs.

5) RCNAIETFE
Answer: INTERFACE - An interface is a point of interaction or communication between two
systems, devices, or software applications.

Part II. Briefly answer the questions afterwards.


1) List all the software and applications installed you know and identify their type or category
based on the discussion in this learning packet.
2) Why do you think there are so many different types of operating systems?
3) Identify any malware you know and explain why you believe they are harmful.

Answer:

1) Operating System
*Microsoft Windows
Type/Category: Operating System
Examples: Windows 10, Windows 11
*MacOS
Type/Category: Operating System
Examples: macOS Mojave, macOS Catalina, macOS Big Sur, macOS Monterey
2) There are many different types of operating systems because they are designed to meet
diverse user needs, hardware configurations, and specific applications. Variations arise from
factors like user interface preferences, performance requirements, security features, and the
specific environments they cater to ( servers, mobile devices, embedded systems). This
diversity allows greater flexibility and optimization for various tasks and user demographics.

3) Viruses: A virus attaches itself to clean files and spreads throughout a computer system,
corrupting data and software as it goes. When a user runs an infected file, the virus activates
and can replicate, affecting other files. Viruses can cause significant data loss and system
malfunctions.

Worms: Unlike viruses, worms can self-replicate and spread across networks without human
intervention. They often exploit vulnerabilities in software to propagate. Worms can consume
bandwidth, slow down networks, and lead to system crashes. The 1988 Morris Worm is one of
the earliest examples, causing widespread disruption.

Part III. Write your opinion on the quote provided below. Justify your thought using a real-
world example. “You Can't Write Perfect Software” - Andrew Hunt

Answer:

As a student, I agree with Andrew Hunt’s quote, "You Can't Write Perfect Software," as the
complexity and variability of software development inevitably lead to imperfections. Despite
rigorous testing, the intricate interactions of numerous software components and external
factors can lead to unforeseen bugs, illustrating that perfection in software is unachievable. This
emphasizes the importance of continuous testing, updates, and a culture of feedback in
software development.

You might also like