Fundamental elements of the computer softwarePresentation Transcript
FUNDAMENTAL ELEMENTS OF THE COMPUTER The Software
Computer software may be defined as: computer programs, procedures, rules, associated documentation and data pertaining to the operation of a computer system
A single program or a collection of programs which performs many task and/or system related functions Software is the detailed instructions that control the operation of hardware. Without software, hardware can not extend its capabilities or utilities
Software Programming Language Application Operating System
PROGRAMMING LANGUAGES ARE USED TO CREATE ALL OTHER PROGRAMS WHETHER IT IS AN OPERATING SYSTEM OR APPLICATION SOFTWARE.
OPERATING SYSTEM CONTROLS THE COMPUTER APPLICATIONS AND KEEP ALL THE HARDWARE RUNS SMOOTHLY.
APPLICATION SOFTWARE THIS ARE PROGRAM THAT PEOPLE USE TO GET THEIR WORK DONE.
CATEGORY OF SOFTWARE PROPRIETARY- THIS IS PROTECTED BY LAWS, IT WAS OWNED BY A PARTICULAR PERSON OR GROUPS OF PERSON. OPEN SYSTEM OR OPEN SOURCE- THIS CAN BE MODIFIED, NOT EXCLUSIVE PROPERTY OR PARTICULAR VENDOR.
Freeware Freeware is also downloadable in the Internet and free of charge. Often freeware is only free for personal use, while commercial use requires a paid license.
SHAREWARE THIS SOFTWARE IS DOWNLOADABLE FROM THE INTERNET. LICENSES DIFFER, BUT COMMONLY THE USER IS ALLOWED TO TRY THE PROGRAM FOR FREE, FOR A PERIOD STIPULATED IN THE LICENSE, USUALLY THIRTY DAYS. AT THE END OF THE TRIAL PERIOD, THE SOFTWARE MUST BE PURCHASED OR UNINSTALLED.
CRIPPLEWARE THIS SOFTWARE IS SIMILAR TO SHAREWARE EXCEPT THAT KEY FEATURES WILL CEASE TO WORK AFTER THE TRIAL PERIOD HAS ENDED. FOR EXAMPLE, THE "SAVE" FUNCTION, THE PRINT FUNCTION, OR SOME OTHER VITAL FEATURE NECESSARY TO USE THE PROGRAM EFFECTIVELY MAY BECOME UNUSABLE.
Adware This is free software that is supported by advertisements built into the program itself. Some adware requires a live Internet feed and uses constant bandwidth to upload new advertisements.
MALWARE short for malicious software, consists of programming designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior
IS A TYPE OF MALWARE THAT CAN BE INSTALLED ON COMPUTERS, AND WHICH COLLECTS SMALL PIECES OF INFORMATION ABOUT USERS WITHOUT THEIR KNOWLEDGE