SlideShare a Scribd company logo
1 of 19
Software
GCSE Computing Theory
Get your brains logged on!
 Which is the odd one out?
Get your brains logged on!
 Which is the odd one out?
By the end of this lesson:
• All of you be able to explain the main functions
  of an operating system.

• Most of you will be able to describe the purpose
  and use of common utility programs for security
  and maintenance.

• A few of you will explore the differences between
  custom written, off the shelf, open source and
  proprietary software.
Main functions of an OS
• Think MUMPS!

•   Memory management
•   User interface
•   Multi-tasking
•   Peripheral management
•   Security
Memory Management
• The OS manages the transfer of data
  between the CPU, RAM and main storage
  (e.g. hard drive)
User interface
• The OS provides the user with a way of
  controlling the functions of the computer
  without resorting to machine code.
• It can be:




Graphical (GUI – Graphic User      Text-based [no mouse] (CLI –
   Interface), e.g. Windows     Command Line Interface), e.g. MS-DOS
Multi-tasking


Word processor


Virus scanner
                 Operating
                  System
Email              (OS)


Web browser                        CPU
Peripheral Management




       Operating
      System (OS)
Security
• The OS provides security features to
  restrict access to the system or particular
  files.
Your Task:
• Write down the answer to the following
  question (you can use the notes to help):

• Describe the main functions of an
  Operating System.
Utility Programs
• Utility software is system software
  designed to help analyze, configure,
  optimize or maintain a computer.

• A single piece of utility software is usually
  called a utility or tool.
  Card sort: Match the utility tool to its description.
  Group the utilities into security and maintenance.

                                               Source: Wikipedia.org
Software Development
• For main routes to software development:


  –Custom written / bespoke
  –Off-the-shelf
  –Open source
  –Proprietary
Custom written / bespoke
• Developed specifically for a particular
  organisation

        Benefits               Limitations

  Custom-made to meet       Very expensive to
   the exact purpose        produce and need
                          technical expertise to
                                develop.
Off-the-shelf
• Developed by a software company to be
  sold to the general public, e.g. MS Office.

        Benefits               Limitations

      Cheaper than         Inflexible – software
  developing it yourself       might not do
    and tech support       everything you want
   available. May not              it do.
      have skills in
     organisation to
    develop yourself.
Open source
• Written by general public for everyone else
  to use. Source code provided so software
  can be tweaked.
        Benefits               Limitations

    Allows anyone to        As source code can
      use/adapt the          be viewed, could
  software to meet their    provide opportunity
   needs. Collaborative     for people to “take
       approach to            advantage” and
      development.         compromise security.
Proprietary
• Written by developer and allowed to be used by
  others but with certain restrictions, e.g. can’t
  adapt software. Source code is hidden.

         Benefits                Limitations

  Can allow for different    Source code cannot
    versions of same         be looked at so may
      software, e.g.          contain spyware or
   educational version          other malicious
       with limited         features hidden within
      functionality.             the software.
Test your knowledge
• Karen wants to use handheld computers
  to take customers’ orders in her
  restaurant. She is thinking of using custom
  written software.

  a) State what is meant by custom written
     software.
  b) State two reasons why Karen may decide to
     use custom written software.
Test your knowledge
a) Software created especially for a user/the
   restaurant
b) Two from:
  – Appropriate software may not exist
  – Existing software may not do exactly what
    restaurant wants
  – Existing software may not be compatible with
    restaurant’s hardware
  – Existing software may contain additional
    features (more complex and expensive)

More Related Content

What's hot

Chapter 10 authoring
Chapter 10 authoringChapter 10 authoring
Chapter 10 authoringshelly3160
 
Introduction to Authorware
Introduction to AuthorwareIntroduction to Authorware
Introduction to AuthorwareJazihan Mahat
 
7 application software categories
7 application software categories7 application software categories
7 application software categoriesMrQaz996
 
Application software
Application softwareApplication software
Application softwaremoazamali28
 
Itc tinfo ingl_software
Itc tinfo ingl_softwareItc tinfo ingl_software
Itc tinfo ingl_softwareClaudia Prati
 
Resource discovery on mobile devices keren mills
Resource discovery on mobile devices   keren millsResource discovery on mobile devices   keren mills
Resource discovery on mobile devices keren millsKeren Mills
 
Ao2 programminglanguages
Ao2 programminglanguagesAo2 programminglanguages
Ao2 programminglanguagesTom Cartwright
 
computer language with full detail
computer language with full detail computer language with full detail
computer language with full detail sonykhan3
 
ICT AS Level Software AQA
ICT AS Level Software AQA ICT AS Level Software AQA
ICT AS Level Software AQA Ben Williams
 
What is computer software
What is computer softwareWhat is computer software
What is computer softwarealldesign
 
Chapter 5 Text
Chapter 5 TextChapter 5 Text
Chapter 5 Textshelly3160
 
Review. Version 2.0
Review. Version 2.0Review. Version 2.0
Review. Version 2.0203pitches
 

What's hot (13)

Chapter 10 authoring
Chapter 10 authoringChapter 10 authoring
Chapter 10 authoring
 
Introduction to Authorware
Introduction to AuthorwareIntroduction to Authorware
Introduction to Authorware
 
7 application software categories
7 application software categories7 application software categories
7 application software categories
 
Application software
Application softwareApplication software
Application software
 
Itc tinfo ingl_software
Itc tinfo ingl_softwareItc tinfo ingl_software
Itc tinfo ingl_software
 
Mobile Apps Testing - Part 2
Mobile Apps Testing - Part 2Mobile Apps Testing - Part 2
Mobile Apps Testing - Part 2
 
Resource discovery on mobile devices keren mills
Resource discovery on mobile devices   keren millsResource discovery on mobile devices   keren mills
Resource discovery on mobile devices keren mills
 
Ao2 programminglanguages
Ao2 programminglanguagesAo2 programminglanguages
Ao2 programminglanguages
 
computer language with full detail
computer language with full detail computer language with full detail
computer language with full detail
 
ICT AS Level Software AQA
ICT AS Level Software AQA ICT AS Level Software AQA
ICT AS Level Software AQA
 
What is computer software
What is computer softwareWhat is computer software
What is computer software
 
Chapter 5 Text
Chapter 5 TextChapter 5 Text
Chapter 5 Text
 
Review. Version 2.0
Review. Version 2.0Review. Version 2.0
Review. Version 2.0
 

Similar to Software

COM 311 L -2.pptx
COM 311 L -2.pptxCOM 311 L -2.pptx
COM 311 L -2.pptxHarinianu2
 
Hardware and Software
Hardware and Software Hardware and Software
Hardware and Software Defron Dvl
 
A presentation on system software
A presentation on system software A presentation on system software
A presentation on system software Ankit Sangwan
 
software final presentation.pptx
software final presentation.pptxsoftware final presentation.pptx
software final presentation.pptxRafaelPurano
 
BSC Software & Software engineering-UNIT-IV
BSC Software & Software engineering-UNIT-IVBSC Software & Software engineering-UNIT-IV
BSC Software & Software engineering-UNIT-IVYamunaP6
 
Problem Solving and Program Design in C_1.pdf
Problem Solving and Program Design in C_1.pdfProblem Solving and Program Design in C_1.pdf
Problem Solving and Program Design in C_1.pdfjlu08167
 
Softwares and Operating System.pptx
Softwares and Operating System.pptxSoftwares and Operating System.pptx
Softwares and Operating System.pptxUsmanAhmed838004
 
Introduction to computer software
Introduction to computer softwareIntroduction to computer software
Introduction to computer softwareElike Ikechukwu
 
1.7 selection and use of appropriate software
1.7 selection and use of appropriate software1.7 selection and use of appropriate software
1.7 selection and use of appropriate softwaremrmwood
 
SPOS_UNIT I System Programming and Operating System.pdf
SPOS_UNIT I System Programming and Operating System.pdfSPOS_UNIT I System Programming and Operating System.pdf
SPOS_UNIT I System Programming and Operating System.pdfreshma96176
 

Similar to Software (20)

COM 311 L -2.pptx
COM 311 L -2.pptxCOM 311 L -2.pptx
COM 311 L -2.pptx
 
Exam 1 in ITEP 132
Exam 1 in ITEP 132Exam 1 in ITEP 132
Exam 1 in ITEP 132
 
ict act 1.pptx
ict act 1.pptxict act 1.pptx
ict act 1.pptx
 
Types of software
Types of softwareTypes of software
Types of software
 
Hardware and Software
Hardware and Software Hardware and Software
Hardware and Software
 
module_1-_5_computer_software.ppt
module_1-_5_computer_software.pptmodule_1-_5_computer_software.ppt
module_1-_5_computer_software.ppt
 
A presentation on system software
A presentation on system software A presentation on system software
A presentation on system software
 
software final presentation.pptx
software final presentation.pptxsoftware final presentation.pptx
software final presentation.pptx
 
BSC Software & Software engineering-UNIT-IV
BSC Software & Software engineering-UNIT-IVBSC Software & Software engineering-UNIT-IV
BSC Software & Software engineering-UNIT-IV
 
Software
SoftwareSoftware
Software
 
Problem Solving and Program Design in C_1.pdf
Problem Solving and Program Design in C_1.pdfProblem Solving and Program Design in C_1.pdf
Problem Solving and Program Design in C_1.pdf
 
Softwares and Operating System.pptx
Softwares and Operating System.pptxSoftwares and Operating System.pptx
Softwares and Operating System.pptx
 
Computer software
Computer softwareComputer software
Computer software
 
Introduction to computer software
Introduction to computer softwareIntroduction to computer software
Introduction to computer software
 
Introduction To Computing.pptx
Introduction To Computing.pptxIntroduction To Computing.pptx
Introduction To Computing.pptx
 
1.7 selection and use of appropriate software
1.7 selection and use of appropriate software1.7 selection and use of appropriate software
1.7 selection and use of appropriate software
 
Software s1 so11
Software s1 so11Software s1 so11
Software s1 so11
 
Software s1 so11
Software s1 so11Software s1 so11
Software s1 so11
 
SPOS_UNIT I System Programming and Operating System.pdf
SPOS_UNIT I System Programming and Operating System.pdfSPOS_UNIT I System Programming and Operating System.pdf
SPOS_UNIT I System Programming and Operating System.pdf
 
E.s unit 6
E.s unit 6E.s unit 6
E.s unit 6
 

More from wardjo

Choosing the right software
Choosing the right softwareChoosing the right software
Choosing the right softwarewardjo
 
Lesson 3 source and components
Lesson 3   source and componentsLesson 3   source and components
Lesson 3 source and componentswardjo
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threatswardjo
 
Storage
StorageStorage
Storagewardjo
 
Secondary storage
Secondary storageSecondary storage
Secondary storagewardjo
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policieswardjo
 
Introduction to Networks & Topologies
Introduction to Networks & TopologiesIntroduction to Networks & Topologies
Introduction to Networks & Topologieswardjo
 
Representing text
Representing textRepresenting text
Representing textwardjo
 
Representing sound
Representing soundRepresenting sound
Representing soundwardjo
 
Hexadecimal
HexadecimalHexadecimal
Hexadecimalwardjo
 
Binary conversion and addition
Binary conversion and additionBinary conversion and addition
Binary conversion and additionwardjo
 
A451 memory (2-12)
A451   memory (2-12)A451   memory (2-12)
A451 memory (2-12)wardjo
 
A451 introduction to cpu (2-12)
A451   introduction to cpu (2-12)A451   introduction to cpu (2-12)
A451 introduction to cpu (2-12)wardjo
 
A451 cpu fetch execute cycle (2-12 & 2-14)
A451  cpu fetch execute cycle (2-12 & 2-14)A451  cpu fetch execute cycle (2-12 & 2-14)
A451 cpu fetch execute cycle (2-12 & 2-14)wardjo
 
Binary logic
Binary logicBinary logic
Binary logicwardjo
 

More from wardjo (15)

Choosing the right software
Choosing the right softwareChoosing the right software
Choosing the right software
 
Lesson 3 source and components
Lesson 3   source and componentsLesson 3   source and components
Lesson 3 source and components
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threats
 
Storage
StorageStorage
Storage
 
Secondary storage
Secondary storageSecondary storage
Secondary storage
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policies
 
Introduction to Networks & Topologies
Introduction to Networks & TopologiesIntroduction to Networks & Topologies
Introduction to Networks & Topologies
 
Representing text
Representing textRepresenting text
Representing text
 
Representing sound
Representing soundRepresenting sound
Representing sound
 
Hexadecimal
HexadecimalHexadecimal
Hexadecimal
 
Binary conversion and addition
Binary conversion and additionBinary conversion and addition
Binary conversion and addition
 
A451 memory (2-12)
A451   memory (2-12)A451   memory (2-12)
A451 memory (2-12)
 
A451 introduction to cpu (2-12)
A451   introduction to cpu (2-12)A451   introduction to cpu (2-12)
A451 introduction to cpu (2-12)
 
A451 cpu fetch execute cycle (2-12 & 2-14)
A451  cpu fetch execute cycle (2-12 & 2-14)A451  cpu fetch execute cycle (2-12 & 2-14)
A451 cpu fetch execute cycle (2-12 & 2-14)
 
Binary logic
Binary logicBinary logic
Binary logic
 

Recently uploaded

Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsPooky Knightsmith
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 

Recently uploaded (20)

Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young minds
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 

Software

  • 2. Get your brains logged on! Which is the odd one out?
  • 3. Get your brains logged on! Which is the odd one out?
  • 4. By the end of this lesson: • All of you be able to explain the main functions of an operating system. • Most of you will be able to describe the purpose and use of common utility programs for security and maintenance. • A few of you will explore the differences between custom written, off the shelf, open source and proprietary software.
  • 5. Main functions of an OS • Think MUMPS! • Memory management • User interface • Multi-tasking • Peripheral management • Security
  • 6. Memory Management • The OS manages the transfer of data between the CPU, RAM and main storage (e.g. hard drive)
  • 7. User interface • The OS provides the user with a way of controlling the functions of the computer without resorting to machine code. • It can be: Graphical (GUI – Graphic User Text-based [no mouse] (CLI – Interface), e.g. Windows Command Line Interface), e.g. MS-DOS
  • 8. Multi-tasking Word processor Virus scanner Operating System Email (OS) Web browser CPU
  • 9. Peripheral Management Operating System (OS)
  • 10. Security • The OS provides security features to restrict access to the system or particular files.
  • 11. Your Task: • Write down the answer to the following question (you can use the notes to help): • Describe the main functions of an Operating System.
  • 12. Utility Programs • Utility software is system software designed to help analyze, configure, optimize or maintain a computer. • A single piece of utility software is usually called a utility or tool. Card sort: Match the utility tool to its description. Group the utilities into security and maintenance. Source: Wikipedia.org
  • 13. Software Development • For main routes to software development: –Custom written / bespoke –Off-the-shelf –Open source –Proprietary
  • 14. Custom written / bespoke • Developed specifically for a particular organisation Benefits Limitations Custom-made to meet Very expensive to the exact purpose produce and need technical expertise to develop.
  • 15. Off-the-shelf • Developed by a software company to be sold to the general public, e.g. MS Office. Benefits Limitations Cheaper than Inflexible – software developing it yourself might not do and tech support everything you want available. May not it do. have skills in organisation to develop yourself.
  • 16. Open source • Written by general public for everyone else to use. Source code provided so software can be tweaked. Benefits Limitations Allows anyone to As source code can use/adapt the be viewed, could software to meet their provide opportunity needs. Collaborative for people to “take approach to advantage” and development. compromise security.
  • 17. Proprietary • Written by developer and allowed to be used by others but with certain restrictions, e.g. can’t adapt software. Source code is hidden. Benefits Limitations Can allow for different Source code cannot versions of same be looked at so may software, e.g. contain spyware or educational version other malicious with limited features hidden within functionality. the software.
  • 18. Test your knowledge • Karen wants to use handheld computers to take customers’ orders in her restaurant. She is thinking of using custom written software. a) State what is meant by custom written software. b) State two reasons why Karen may decide to use custom written software.
  • 19. Test your knowledge a) Software created especially for a user/the restaurant b) Two from: – Appropriate software may not exist – Existing software may not do exactly what restaurant wants – Existing software may not be compatible with restaurant’s hardware – Existing software may contain additional features (more complex and expensive)