SlideShare a Scribd company logo
1 of 10
USES , MISUSES
AND RISK OF SOFTWARE
Name: AHSSAN AKHTAR
Roll: 14749
Semester : 6th(morning)
Subject : professional Practices
Department of Government college University
Faisalabad
Software:
Definition:
Software is the set of instruction that enable the user to
communicate with computer and perform its task . with out
software hardware is nothing.
Example:
without browser you cannot surf internet. In this way with
out operating system you cannot run browser and do any thing
on computer.
Types of software:
Two types of software:
System software:
system software is a program that is designs to
run hardware and application programs like mac , windows , etc.
Application software
Application software is designs to help
the user to complete its task.in other words the applications
software are the application that run on computer .
Uses of Software
Software's are commonly uses in every field of life because of the
increase of the use of computer in every field.
• Business
• Medical field
• Home
• Education
• Industries
• Communication
Business:
Almost every business uses computer to
complete its daily tasks . from making contacts with clients, input
records and generating reports and allow business more
mannered way as tradition like paper work.
Marketing:
Computer allows business to make websites,
stunning ads and a complete marketing operations . marketing
videos editing and creating marketing ads in-home with special
software's.
At home:
At home computer are used for variety of purposes .
Computer in home providing training , technical reports, internet
for students , families in participating and for calculating monthly
expenses.
Education:
Computer is used in education in teacher learning,
testing and evaluation ,guidance purpose and school
administration.
Miss uses of software's:
Computer are also used for beneficial as well as illegal and
destroy purpose . with the help of it people committing farads ,
stealing data and cause damage other records etc.
Uses of software in hacking purpose and disobey privacy policies
of other .
A license agreement is the establish a legal agreement between
customer and the man or company that develop the software . if
a person is use this software with out purchasing is misuse of
software.
Example:
If a person buy software from un authorized
site and then he want to activate it . It not activate because the
license is used by the previous user from which he purchase .
and software id not registered because license is not
transferable.
Risks of software:
Risk:
Risk is future uncertain events with a probability(‫)امکان‬ of
occurrence and a potential for loss.
Product risk is the possibility that the system or software might
fail to satisfy or fulfill some reasonable expectation of the
customer, user, or stakeholder. (Some authors also called the
‘Product risks’ as ‘Quality risks’ as they are risks to the quality of
the product.)
Some software product risks :
• If the software skips some key function that the customers
specified, the users required or the stakeholders were
promised.
• If the software is unreliable and frequently fails to work.
• If software fail in ways that cause financial or other damage to a
user or the company that user works for.
• If the software has problems related to a particular quality
characteristic, which might not be functionality, but rather
security, reliability, usability, maintainability or performance.

More Related Content

What's hot

intellectual property rights
 intellectual property rights intellectual property rights
intellectual property rightsHamza Cheema
 
Evolving role of Software,Legacy software,CASE tools,Process Models,CMMI
Evolving role of Software,Legacy software,CASE tools,Process Models,CMMIEvolving role of Software,Legacy software,CASE tools,Process Models,CMMI
Evolving role of Software,Legacy software,CASE tools,Process Models,CMMInimmik4u
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5AfiqEfendy Zaen
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software EngineeringSaqib Raza
 
anatomy of a sw house
anatomy of a sw houseanatomy of a sw house
anatomy of a sw houseHamza Cheema
 
Software Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional PracticeSoftware Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional Practice Saqib Raza
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software EngineeringZahoor Khan
 
Information security management
Information security managementInformation security management
Information security managementUMaine
 
Administering security
Administering securityAdministering security
Administering securityG Prachi
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Cryptography & Network Security
Cryptography & Network SecurityCryptography & Network Security
Cryptography & Network SecurityFahad Shaikh
 
Unified process model
Unified process modelUnified process model
Unified process modelRyndaMaala
 
Lecture 1 introduction to software engineering 1
Lecture 1   introduction to software engineering 1Lecture 1   introduction to software engineering 1
Lecture 1 introduction to software engineering 1IIUI
 

What's hot (20)

intellectual property rights
 intellectual property rights intellectual property rights
intellectual property rights
 
Evolving role of Software,Legacy software,CASE tools,Process Models,CMMI
Evolving role of Software,Legacy software,CASE tools,Process Models,CMMIEvolving role of Software,Legacy software,CASE tools,Process Models,CMMI
Evolving role of Software,Legacy software,CASE tools,Process Models,CMMI
 
01 computing
01 computing01 computing
01 computing
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Generation of os
Generation of osGeneration of os
Generation of os
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software Engineering
 
Software liability
Software liabilitySoftware liability
Software liability
 
anatomy of a sw house
anatomy of a sw houseanatomy of a sw house
anatomy of a sw house
 
Software Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional PracticeSoftware Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional Practice
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software Engineering
 
Information security management
Information security managementInformation security management
Information security management
 
Administering security
Administering securityAdministering security
Administering security
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Paging and segmentation
Paging and segmentationPaging and segmentation
Paging and segmentation
 
Cryptography & Network Security
Cryptography & Network SecurityCryptography & Network Security
Cryptography & Network Security
 
Chapter 1: Professional Issues in Software Engineering
Chapter 1: Professional Issues in Software Engineering  Chapter 1: Professional Issues in Software Engineering
Chapter 1: Professional Issues in Software Engineering
 
Unified process model
Unified process modelUnified process model
Unified process model
 
Lecture 1 introduction to software engineering 1
Lecture 1   introduction to software engineering 1Lecture 1   introduction to software engineering 1
Lecture 1 introduction to software engineering 1
 
Software security
Software securitySoftware security
Software security
 

Similar to Uses,mis uses and risk of software

Uses misuses and risk of software
Uses misuses and risk of softwareUses misuses and risk of software
Uses misuses and risk of softwareBurhan Ahmed
 
CSE18R264 - Unit 1.pptx
CSE18R264 - Unit 1.pptxCSE18R264 - Unit 1.pptx
CSE18R264 - Unit 1.pptxYouTube299255
 
SE 18CS35 Module 1.pdf
SE 18CS35 Module 1.pdfSE 18CS35 Module 1.pdf
SE 18CS35 Module 1.pdfbalaji984829
 
Ethical consideration in open source software
Ethical consideration in open source softwareEthical consideration in open source software
Ethical consideration in open source softwareaamatya
 
Ethical consideration in open source software
Ethical consideration in open source softwareEthical consideration in open source software
Ethical consideration in open source softwareaamatya
 
Computer software is defined .docx
Computer software is defined       .docxComputer software is defined       .docx
Computer software is defined .docxKamran Abdullah
 
Week 7 - Choices in Systems Acquisition and Risks, Security,.docx
Week 7 - Choices in Systems Acquisition and Risks, Security,.docxWeek 7 - Choices in Systems Acquisition and Risks, Security,.docx
Week 7 - Choices in Systems Acquisition and Risks, Security,.docxhelzerpatrina
 
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...CSCJournals
 
Class work 3_computer_network_317
Class work 3_computer_network_317Class work 3_computer_network_317
Class work 3_computer_network_317Khondoker Sadia
 
Key Steps & Best Practices to Custom Mobile App Development Process
Key Steps & Best Practices to Custom Mobile App Development ProcessKey Steps & Best Practices to Custom Mobile App Development Process
Key Steps & Best Practices to Custom Mobile App Development ProcessThinkers Media
 
Software Assurance CSS321Security Static Ana.docx
Software Assurance CSS321Security Static Ana.docxSoftware Assurance CSS321Security Static Ana.docx
Software Assurance CSS321Security Static Ana.docxwhitneyleman54422
 
Software Licences
Software LicencesSoftware Licences
Software LicencesAjay Jassi
 
application development complete knoeledge
application development complete knoeledgeapplication development complete knoeledge
application development complete knoeledgesthlmteachpartner
 
Types of software, advantages and disadvantages
Types of software, advantages and disadvantagesTypes of software, advantages and disadvantages
Types of software, advantages and disadvantagesRocket11986
 
Group Presentation 2 - CIS285 - End User Application Softwares.pptx
Group Presentation 2 - CIS285 - End User Application Softwares.pptxGroup Presentation 2 - CIS285 - End User Application Softwares.pptx
Group Presentation 2 - CIS285 - End User Application Softwares.pptxssuserecb346
 
Software Engineering notes by K. Adisesha.pdf
Software Engineering notes by K. Adisesha.pdfSoftware Engineering notes by K. Adisesha.pdf
Software Engineering notes by K. Adisesha.pdfProf. Dr. K. Adisesha
 

Similar to Uses,mis uses and risk of software (20)

Uses misuses and risk of software
Uses misuses and risk of softwareUses misuses and risk of software
Uses misuses and risk of software
 
CSE18R264 - Unit 1.pptx
CSE18R264 - Unit 1.pptxCSE18R264 - Unit 1.pptx
CSE18R264 - Unit 1.pptx
 
Ch # 03 software
Ch # 03  softwareCh # 03  software
Ch # 03 software
 
SE 18CS35 Module 1.pdf
SE 18CS35 Module 1.pdfSE 18CS35 Module 1.pdf
SE 18CS35 Module 1.pdf
 
Ethical consideration in open source software
Ethical consideration in open source softwareEthical consideration in open source software
Ethical consideration in open source software
 
Ethical consideration in open source software
Ethical consideration in open source softwareEthical consideration in open source software
Ethical consideration in open source software
 
Software piracy in Bangladesh
Software piracy in BangladeshSoftware piracy in Bangladesh
Software piracy in Bangladesh
 
Computer software is defined .docx
Computer software is defined       .docxComputer software is defined       .docx
Computer software is defined .docx
 
Week 7 - Choices in Systems Acquisition and Risks, Security,.docx
Week 7 - Choices in Systems Acquisition and Risks, Security,.docxWeek 7 - Choices in Systems Acquisition and Risks, Security,.docx
Week 7 - Choices in Systems Acquisition and Risks, Security,.docx
 
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
 
how to choose right mobile app development tools
how to choose right mobile app development toolshow to choose right mobile app development tools
how to choose right mobile app development tools
 
Class work 3_computer_network_317
Class work 3_computer_network_317Class work 3_computer_network_317
Class work 3_computer_network_317
 
Key Steps & Best Practices to Custom Mobile App Development Process
Key Steps & Best Practices to Custom Mobile App Development ProcessKey Steps & Best Practices to Custom Mobile App Development Process
Key Steps & Best Practices to Custom Mobile App Development Process
 
Software Assurance CSS321Security Static Ana.docx
Software Assurance CSS321Security Static Ana.docxSoftware Assurance CSS321Security Static Ana.docx
Software Assurance CSS321Security Static Ana.docx
 
Software Licences
Software LicencesSoftware Licences
Software Licences
 
application development complete knoeledge
application development complete knoeledgeapplication development complete knoeledge
application development complete knoeledge
 
Types of software, advantages and disadvantages
Types of software, advantages and disadvantagesTypes of software, advantages and disadvantages
Types of software, advantages and disadvantages
 
Group Presentation 2 - CIS285 - End User Application Softwares.pptx
Group Presentation 2 - CIS285 - End User Application Softwares.pptxGroup Presentation 2 - CIS285 - End User Application Softwares.pptx
Group Presentation 2 - CIS285 - End User Application Softwares.pptx
 
Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
 
Software Engineering notes by K. Adisesha.pdf
Software Engineering notes by K. Adisesha.pdfSoftware Engineering notes by K. Adisesha.pdf
Software Engineering notes by K. Adisesha.pdf
 

Recently uploaded

Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 

Recently uploaded (20)

Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 

Uses,mis uses and risk of software

  • 1. USES , MISUSES AND RISK OF SOFTWARE Name: AHSSAN AKHTAR Roll: 14749 Semester : 6th(morning) Subject : professional Practices Department of Government college University Faisalabad
  • 2. Software: Definition: Software is the set of instruction that enable the user to communicate with computer and perform its task . with out software hardware is nothing. Example: without browser you cannot surf internet. In this way with out operating system you cannot run browser and do any thing on computer.
  • 3. Types of software: Two types of software: System software: system software is a program that is designs to run hardware and application programs like mac , windows , etc. Application software Application software is designs to help the user to complete its task.in other words the applications software are the application that run on computer .
  • 4. Uses of Software Software's are commonly uses in every field of life because of the increase of the use of computer in every field. • Business • Medical field • Home • Education • Industries • Communication
  • 5. Business: Almost every business uses computer to complete its daily tasks . from making contacts with clients, input records and generating reports and allow business more mannered way as tradition like paper work. Marketing: Computer allows business to make websites, stunning ads and a complete marketing operations . marketing videos editing and creating marketing ads in-home with special software's.
  • 6. At home: At home computer are used for variety of purposes . Computer in home providing training , technical reports, internet for students , families in participating and for calculating monthly expenses. Education: Computer is used in education in teacher learning, testing and evaluation ,guidance purpose and school administration.
  • 7. Miss uses of software's: Computer are also used for beneficial as well as illegal and destroy purpose . with the help of it people committing farads , stealing data and cause damage other records etc. Uses of software in hacking purpose and disobey privacy policies of other . A license agreement is the establish a legal agreement between customer and the man or company that develop the software . if a person is use this software with out purchasing is misuse of software.
  • 8. Example: If a person buy software from un authorized site and then he want to activate it . It not activate because the license is used by the previous user from which he purchase . and software id not registered because license is not transferable.
  • 9. Risks of software: Risk: Risk is future uncertain events with a probability(‫)امکان‬ of occurrence and a potential for loss. Product risk is the possibility that the system or software might fail to satisfy or fulfill some reasonable expectation of the customer, user, or stakeholder. (Some authors also called the ‘Product risks’ as ‘Quality risks’ as they are risks to the quality of the product.)
  • 10. Some software product risks : • If the software skips some key function that the customers specified, the users required or the stakeholders were promised. • If the software is unreliable and frequently fails to work. • If software fail in ways that cause financial or other damage to a user or the company that user works for. • If the software has problems related to a particular quality characteristic, which might not be functionality, but rather security, reliability, usability, maintainability or performance.