SlideShare a Scribd company logo
1 of 26
CHAPTER FOUR
COMPUTER
SOFTWARE
CHAPTER HIGHLIGHTS
• Main categories of software
– Operating system
– Application
– Programming
• Functions of the operating system
• Types of programming languages
• Software for multimedia development
2
SOFTWARE
• A collection of computer programs that
govern the operation of a computer.
– Program: list of instructions that can be carried
out by the computer.
• Three categories of software:
– Operating systems
– Programming languages
– Applications.
3
YOU DECIDE … Software
1. Word
2. Photoshop
3. Java
4. OS X
5. Visual Basic
6. Flash
7. Windows 8
8. C+
4
Label each as an operating system, programming
language, application.
9. Linux
10. Open Office
11. HTML
12. Javascript
13. Browser
14. Director
15. Unix
16. Assembly
OPERATING SYSTEM
• Collection of programs that:
– Provides a user interface
– Manages computer resources
– Executes application programs.
• User interface: a means to communicate with the
programs and hardware.
– Command line interface
– Graphical user interface (GUI)
– Natural user interface (NUI).
5
OPERATING SYSTEM
• Manages computer resources such as:
– Processor
– Memory
– Peripheral devices
– Networks.
6
MANAGE COMPUTER RESOURCES
• Manage the processor
– Controls how and when programs are executed.
– Control methods:
• Single user, single tasking
• Single user, multi-tasking
– If the processor is sufficiently powerful users are
not aware of sharing the resources.
7
MANAGE COMPUTER RESOURCES
• Manage memory
– Controls how much memory is accessed and used
by application programs.
• Virtual memory: operating system assigns a
portion of the hard disk to simulate RAM.
– Problem: access to files in virtual memory is
slowed.
– Solution: install more RAM.
8
MANAGE COMPUTER RESOURCES
• Control peripherals
– Built-in programs control devices such as
monitors, printers, storage drives.
– Additional device drivers can be
downloaded or come with the installation
CD.
• Plug and Play
– Operating system senses that a new device
is plugged into the system board and
immediately responds to "play" the device.
9
MANAGE COMPUTER RESOURCES
• Manage access and security of network
computers through:
– Built in protocols to connect to WANs (TCP/IP)
– Built in protocols to connect to LANs (Ethernet)
– Support for WiFi and Bluetooth connectivity
– Network firewall protection.
10
MANAGE COMPUTER RESOURCES
• Utility programs
– Tools to optimize operating system functions such as:
• CD and DVD recording
• Screen savers
• Speech recognition for basic commands
• Text editors
• Multimedia utilities.
– Disk management utility
• Partition and format drives.
• Defragment and detect disk errors.
11
MANAGE COMPUTER RESOURCES
• File management.
– Operating systems govern storage and retrieval of
files.
– Basic file management includes:
• Copy
• Delete
• Rename
• Move.
– File extensions identify a file as data or program
for the operating system.
12
FILE MANAGEMENT
• Directories are storage locations for
groups of files.
– Directory path is identified by the operating
system.
– Directories (or folders) are created, moved,
copied, deleted using file management utility.
13
PROGRAMMING LANGUAGES
14
SYNTAX AND SEMANTICS TO WRITE
COMPUTER PROGRAMS.
PROGRAMMING LANGUAGES
• Low-Level Languages.
– Programs are written for a specific computer
system.
– Machine code — binary code the processor
directly executes.
– Assembly code — text abbreviations for binary
commands.
• Requires a program (assembler) to convert the
abbreviations to binary code.
15
PROGRAMMING LANGUAGES
• High-Level Languages.
– Syntax and semantics are not dependent on a
specific computer system.
– More English-like commands.
– Easier to debug errors.
• Two methods to convert to machine code:
– Interpreter converts and executes one line of code
at a time.
– Compiler converts entire program to an
executable file.
16
Approaches to Programming
• Procedural approach:
– Follows a series of computational steps that focus
on a specific result.
• Divides complex tasks into subroutines, functions that can
be reused within a single program environment.
• Code modules cannot be ported to other applications
without significant modification which leads to
inefficiency in programming tasks.
• Non-procedural:
– Maximizes programmer productivity by recycling
modules from one program into other applications.
17
Two Non-procedural options
• Object-Oriented languages.
– Modular approach reduces time to recode similar
object routines.
• Visual programming.
– Use graphical interface to expedite programming
process.
– Enables Rapid Application Development.
18
APPLICATION SOFTWARE
19
SOFTWARE THAT PERFORMS
A SPECIFIC TASK.
APPLICATION SOFTWARE
• Two main categories for multimedia
development.
– Media-specific applications.
• Create and edit specific media content.
– Authoring applications.
• Tools to integrate media components and provide a
user interface.
20
MEDIA-SPECIFIC APPLICATIONS
• Text media applications include:
– Word processors
– Text editors
– Portable document generators.
• Graphics media applications include:
– Paint programs
– Draw programs
– 3-D imaging applications.
21
MEDIA-SPECIFIC APPLICATIONS
• Sound media.
– Sound capture applications.
– Synthesized sound applications.
• Video applications combine:
– Source material
– Synchronize clips to sound track
– Add special effects
– Save as a digital video.
22
MEDIA-SPECIFIC APPLICATIONS
• Animation applications.
– Software to create and edit animated sequences.
– Objects are drawn or imported into the software
where they are manipulated in a series of frames.
• Media utilities.
– Add functionality to media-specific applications
such as file compression and file conversion.
23
AUTHORING SOFTWARE
• Programs designed to facilitate the
creation of multimedia products.
– Assemble media elements
– Synchronize content
– Design user interface
– Provide user interactivity.
• Authoring metaphors are:
– Card based
– Timeline
– Icon.
24
PowerPoint uses a card metaphor.
Authorware uses a icon metaphor.
Flash uses a timeline metaphor.
WRAP UP
• Three software categories.
• Functions of operating system.
• Disk and file management practices.
• Levels of programming languages.
• Application software for multimedia.
– Media-specific software.
– Authoring software.
25
KEY TERM CHECK UP
26

More Related Content

What's hot

Chapter 10 authoring
Chapter 10 authoringChapter 10 authoring
Chapter 10 authoringshelly3160
 
CSC1100 - Chapter11 - Programming Languages and Program Development
CSC1100 - Chapter11 - Programming Languages and Program DevelopmentCSC1100 - Chapter11 - Programming Languages and Program Development
CSC1100 - Chapter11 - Programming Languages and Program DevelopmentYhal Htet Aung
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 13 - Progra...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 13 - Progra...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 13 - Progra...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 13 - Progra...yaminohime
 
Nato workshop subsequent-activities-participants_info_2012-11-01
Nato workshop subsequent-activities-participants_info_2012-11-01Nato workshop subsequent-activities-participants_info_2012-11-01
Nato workshop subsequent-activities-participants_info_2012-11-01Salim Saay
 
Tony Blaes Resume
Tony Blaes ResumeTony Blaes Resume
Tony Blaes Resumetblaes
 
Mba i-ifm-u-2-computer software
Mba i-ifm-u-2-computer softwareMba i-ifm-u-2-computer software
Mba i-ifm-u-2-computer softwareRai University
 
Chap05# Information Systems in Business Software
Chap05# Information Systems in Business SoftwareChap05# Information Systems in Business Software
Chap05# Information Systems in Business SoftwareTuru Turuu
 
Chapter 4 Computer Software
Chapter 4 Computer SoftwareChapter 4 Computer Software
Chapter 4 Computer Softwareshelly3160
 
Paul Fritz Resume
Paul Fritz ResumePaul Fritz Resume
Paul Fritz ResumePaul Fritz
 

What's hot (15)

Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Chapter 10 authoring
Chapter 10 authoringChapter 10 authoring
Chapter 10 authoring
 
Software
SoftwareSoftware
Software
 
Multimedi
MultimediMultimedi
Multimedi
 
Multimedia
MultimediaMultimedia
Multimedia
 
CSC1100 - Chapter11 - Programming Languages and Program Development
CSC1100 - Chapter11 - Programming Languages and Program DevelopmentCSC1100 - Chapter11 - Programming Languages and Program Development
CSC1100 - Chapter11 - Programming Languages and Program Development
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 13 - Progra...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 13 - Progra...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 13 - Progra...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 13 - Progra...
 
WDA_Resume
WDA_ResumeWDA_Resume
WDA_Resume
 
Nato workshop subsequent-activities-participants_info_2012-11-01
Nato workshop subsequent-activities-participants_info_2012-11-01Nato workshop subsequent-activities-participants_info_2012-11-01
Nato workshop subsequent-activities-participants_info_2012-11-01
 
Tony Blaes Resume
Tony Blaes ResumeTony Blaes Resume
Tony Blaes Resume
 
Mba i-ifm-u-2-computer software
Mba i-ifm-u-2-computer softwareMba i-ifm-u-2-computer software
Mba i-ifm-u-2-computer software
 
Information systems ‫ system‬
Information systems  ‫ system‬Information systems  ‫ system‬
Information systems ‫ system‬
 
Chap05# Information Systems in Business Software
Chap05# Information Systems in Business SoftwareChap05# Information Systems in Business Software
Chap05# Information Systems in Business Software
 
Chapter 4 Computer Software
Chapter 4 Computer SoftwareChapter 4 Computer Software
Chapter 4 Computer Software
 
Paul Fritz Resume
Paul Fritz ResumePaul Fritz Resume
Paul Fritz Resume
 

Viewers also liked

Chapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare SectorChapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare SectorNada G.Youssef
 
Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants Nada G.Youssef
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksSlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShareSlideShare
 

Viewers also liked (10)

Chapter Nine
Chapter NineChapter Nine
Chapter Nine
 
Chapter Eight
Chapter Eight Chapter Eight
Chapter Eight
 
Chapter Two
Chapter TwoChapter Two
Chapter Two
 
Chapter Seven
Chapter SevenChapter Seven
Chapter Seven
 
Chapter Six
Chapter SixChapter Six
Chapter Six
 
Chapter one
Chapter oneChapter one
Chapter one
 
Chapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare SectorChapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare Sector
 
Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 

Similar to Chapter Four (20)

ITE 101 - Week 5
ITE 101 - Week 5ITE 101 - Week 5
ITE 101 - Week 5
 
Caim ppt
Caim pptCaim ppt
Caim ppt
 
Computer Languages
Computer Languages Computer Languages
Computer Languages
 
Management information system software
Management information system softwareManagement information system software
Management information system software
 
программное обеспечение (по)
программное обеспечение (по) программное обеспечение (по)
программное обеспечение (по)
 
Basic software
Basic softwareBasic software
Basic software
 
software system and application software
software system and application softwaresoftware system and application software
software system and application software
 
Ch 2
Ch 2Ch 2
Ch 2
 
Chapter 05 os dan utility program csc & tts
Chapter 05 os dan utility program csc & ttsChapter 05 os dan utility program csc & tts
Chapter 05 os dan utility program csc & tts
 
Software
SoftwareSoftware
Software
 
Is ch04
Is ch04Is ch04
Is ch04
 
Chapter 1 Introduction to android.ppt pl
Chapter 1 Introduction to android.ppt plChapter 1 Introduction to android.ppt pl
Chapter 1 Introduction to android.ppt pl
 
Overview of softwares and their applications
Overview of softwares and their applicationsOverview of softwares and their applications
Overview of softwares and their applications
 
K04 software
K04 softwareK04 software
K04 software
 
Android General information
Android General informationAndroid General information
Android General information
 
Types of software
Types of softwareTypes of software
Types of software
 
Software: Systems and Application Software
Software:  Systems and Application SoftwareSoftware:  Systems and Application Software
Software: Systems and Application Software
 
Lecture3.pptx
Lecture3.pptxLecture3.pptx
Lecture3.pptx
 
2 software
2 software2 software
2 software
 
Software introduction
Software introductionSoftware introduction
Software introduction
 

More from Nada G.Youssef

Chapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial InstitutionsChapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial InstitutionsNada G.Youssef
 
Chapter 12: Business Continuity Management
Chapter 12: Business Continuity ManagementChapter 12: Business Continuity Management
Chapter 12: Business Continuity ManagementNada G.Youssef
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementNada G.Youssef
 
Chapter 10: Information Systems Acquisition, Development, and Maintenance
			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance
Chapter 10: Information Systems Acquisition, Development, and MaintenanceNada G.Youssef
 
Chapter 9: Access Control Management
Chapter 9: Access Control ManagementChapter 9: Access Control Management
Chapter 9: Access Control ManagementNada G.Youssef
 
Chapter 8: Communications and Operations Security
Chapter 8: Communications and Operations SecurityChapter 8: Communications and Operations Security
Chapter 8: Communications and Operations SecurityNada G.Youssef
 
Chapter 7: Physical & Environmental Security
Chapter 7: Physical & Environmental Security Chapter 7: Physical & Environmental Security
Chapter 7: Physical & Environmental Security Nada G.Youssef
 
Chapter 6: Human Resources Security
Chapter 6: Human Resources SecurityChapter 6: Human Resources Security
Chapter 6: Human Resources SecurityNada G.Youssef
 
Chapter 5: Asset Management
Chapter 5: Asset ManagementChapter 5: Asset Management
Chapter 5: Asset ManagementNada G.Youssef
 
Chapter 4: Governance and Risk Management
Chapter 4: Governance and Risk ManagementChapter 4: Governance and Risk Management
Chapter 4: Governance and Risk ManagementNada G.Youssef
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security FrameworkNada G.Youssef
 
Chapter 2: Policy Elements and style
Chapter 2: Policy Elements and style Chapter 2: Policy Elements and style
Chapter 2: Policy Elements and style Nada G.Youssef
 
Chapter 1: Understanding Policy
Chapter 1: Understanding Policy Chapter 1: Understanding Policy
Chapter 1: Understanding Policy Nada G.Youssef
 
Preparatory Year of Saudi Electronic University
Preparatory Year of Saudi Electronic University Preparatory Year of Saudi Electronic University
Preparatory Year of Saudi Electronic University Nada G.Youssef
 

More from Nada G.Youssef (17)

مجلة 1
مجلة 1مجلة 1
مجلة 1
 
Chapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial InstitutionsChapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial Institutions
 
Chapter 12: Business Continuity Management
Chapter 12: Business Continuity ManagementChapter 12: Business Continuity Management
Chapter 12: Business Continuity Management
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident Management
 
Chapter 10: Information Systems Acquisition, Development, and Maintenance
			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance
Chapter 10: Information Systems Acquisition, Development, and Maintenance
 
Chapter 9: Access Control Management
Chapter 9: Access Control ManagementChapter 9: Access Control Management
Chapter 9: Access Control Management
 
Chapter 8: Communications and Operations Security
Chapter 8: Communications and Operations SecurityChapter 8: Communications and Operations Security
Chapter 8: Communications and Operations Security
 
Chapter 7: Physical & Environmental Security
Chapter 7: Physical & Environmental Security Chapter 7: Physical & Environmental Security
Chapter 7: Physical & Environmental Security
 
Chapter 6: Human Resources Security
Chapter 6: Human Resources SecurityChapter 6: Human Resources Security
Chapter 6: Human Resources Security
 
Chapter 5: Asset Management
Chapter 5: Asset ManagementChapter 5: Asset Management
Chapter 5: Asset Management
 
Chapter 4: Governance and Risk Management
Chapter 4: Governance and Risk ManagementChapter 4: Governance and Risk Management
Chapter 4: Governance and Risk Management
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
 
Chapter 2: Policy Elements and style
Chapter 2: Policy Elements and style Chapter 2: Policy Elements and style
Chapter 2: Policy Elements and style
 
Chapter 1: Understanding Policy
Chapter 1: Understanding Policy Chapter 1: Understanding Policy
Chapter 1: Understanding Policy
 
Preparatory Year of Saudi Electronic University
Preparatory Year of Saudi Electronic University Preparatory Year of Saudi Electronic University
Preparatory Year of Saudi Electronic University
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 

Recently uploaded

WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2
 
Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2WSO2
 
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public AdministrationWSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public AdministrationWSO2
 
WSO2Con2024 - Organization Management: The Revolution in B2B CIAM
WSO2Con2024 - Organization Management: The Revolution in B2B CIAMWSO2Con2024 - Organization Management: The Revolution in B2B CIAM
WSO2Con2024 - Organization Management: The Revolution in B2B CIAMWSO2
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
WSO2Con2024 - Facilitating Broadband Switching Services for UK Telecoms Provi...
WSO2Con2024 - Facilitating Broadband Switching Services for UK Telecoms Provi...WSO2Con2024 - Facilitating Broadband Switching Services for UK Telecoms Provi...
WSO2Con2024 - Facilitating Broadband Switching Services for UK Telecoms Provi...WSO2
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
WSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital BusinessesWSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital BusinessesWSO2
 
WSO2Con2024 - Software Delivery in Hybrid Environments
WSO2Con2024 - Software Delivery in Hybrid EnvironmentsWSO2Con2024 - Software Delivery in Hybrid Environments
WSO2Con2024 - Software Delivery in Hybrid EnvironmentsWSO2
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareJim McKeeth
 
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public AdministrationWSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public AdministrationWSO2
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2
 
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...WSO2
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2
 
Evolving Data Governance for the Real-time Streaming and AI Era
Evolving Data Governance for the Real-time Streaming and AI EraEvolving Data Governance for the Real-time Streaming and AI Era
Evolving Data Governance for the Real-time Streaming and AI Eraconfluent
 
WSO2CON 2024 - Building a Digital Government in Uganda
WSO2CON 2024 - Building a Digital Government in UgandaWSO2CON 2024 - Building a Digital Government in Uganda
WSO2CON 2024 - Building a Digital Government in UgandaWSO2
 
WSO2Con2024 - Low-Code Integration Tooling
WSO2Con2024 - Low-Code Integration ToolingWSO2Con2024 - Low-Code Integration Tooling
WSO2Con2024 - Low-Code Integration ToolingWSO2
 
WSO2CON 2024 - Lessons from the Field: Legacy Platforms – It's Time to Let Go...
WSO2CON 2024 - Lessons from the Field: Legacy Platforms – It's Time to Let Go...WSO2CON 2024 - Lessons from the Field: Legacy Platforms – It's Time to Let Go...
WSO2CON 2024 - Lessons from the Field: Legacy Platforms – It's Time to Let Go...WSO2
 

Recently uploaded (20)

WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2
 
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public AdministrationWSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
 
WSO2Con2024 - Organization Management: The Revolution in B2B CIAM
WSO2Con2024 - Organization Management: The Revolution in B2B CIAMWSO2Con2024 - Organization Management: The Revolution in B2B CIAM
WSO2Con2024 - Organization Management: The Revolution in B2B CIAM
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
WSO2Con2024 - Facilitating Broadband Switching Services for UK Telecoms Provi...
WSO2Con2024 - Facilitating Broadband Switching Services for UK Telecoms Provi...WSO2Con2024 - Facilitating Broadband Switching Services for UK Telecoms Provi...
WSO2Con2024 - Facilitating Broadband Switching Services for UK Telecoms Provi...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
WSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital BusinessesWSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital Businesses
 
WSO2Con2024 - Software Delivery in Hybrid Environments
WSO2Con2024 - Software Delivery in Hybrid EnvironmentsWSO2Con2024 - Software Delivery in Hybrid Environments
WSO2Con2024 - Software Delivery in Hybrid Environments
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public AdministrationWSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
Evolving Data Governance for the Real-time Streaming and AI Era
Evolving Data Governance for the Real-time Streaming and AI EraEvolving Data Governance for the Real-time Streaming and AI Era
Evolving Data Governance for the Real-time Streaming and AI Era
 
WSO2CON 2024 - Building a Digital Government in Uganda
WSO2CON 2024 - Building a Digital Government in UgandaWSO2CON 2024 - Building a Digital Government in Uganda
WSO2CON 2024 - Building a Digital Government in Uganda
 
WSO2Con2024 - Low-Code Integration Tooling
WSO2Con2024 - Low-Code Integration ToolingWSO2Con2024 - Low-Code Integration Tooling
WSO2Con2024 - Low-Code Integration Tooling
 
WSO2CON 2024 - Lessons from the Field: Legacy Platforms – It's Time to Let Go...
WSO2CON 2024 - Lessons from the Field: Legacy Platforms – It's Time to Let Go...WSO2CON 2024 - Lessons from the Field: Legacy Platforms – It's Time to Let Go...
WSO2CON 2024 - Lessons from the Field: Legacy Platforms – It's Time to Let Go...
 

Chapter Four

  • 2. CHAPTER HIGHLIGHTS • Main categories of software – Operating system – Application – Programming • Functions of the operating system • Types of programming languages • Software for multimedia development 2
  • 3. SOFTWARE • A collection of computer programs that govern the operation of a computer. – Program: list of instructions that can be carried out by the computer. • Three categories of software: – Operating systems – Programming languages – Applications. 3
  • 4. YOU DECIDE … Software 1. Word 2. Photoshop 3. Java 4. OS X 5. Visual Basic 6. Flash 7. Windows 8 8. C+ 4 Label each as an operating system, programming language, application. 9. Linux 10. Open Office 11. HTML 12. Javascript 13. Browser 14. Director 15. Unix 16. Assembly
  • 5. OPERATING SYSTEM • Collection of programs that: – Provides a user interface – Manages computer resources – Executes application programs. • User interface: a means to communicate with the programs and hardware. – Command line interface – Graphical user interface (GUI) – Natural user interface (NUI). 5
  • 6. OPERATING SYSTEM • Manages computer resources such as: – Processor – Memory – Peripheral devices – Networks. 6
  • 7. MANAGE COMPUTER RESOURCES • Manage the processor – Controls how and when programs are executed. – Control methods: • Single user, single tasking • Single user, multi-tasking – If the processor is sufficiently powerful users are not aware of sharing the resources. 7
  • 8. MANAGE COMPUTER RESOURCES • Manage memory – Controls how much memory is accessed and used by application programs. • Virtual memory: operating system assigns a portion of the hard disk to simulate RAM. – Problem: access to files in virtual memory is slowed. – Solution: install more RAM. 8
  • 9. MANAGE COMPUTER RESOURCES • Control peripherals – Built-in programs control devices such as monitors, printers, storage drives. – Additional device drivers can be downloaded or come with the installation CD. • Plug and Play – Operating system senses that a new device is plugged into the system board and immediately responds to "play" the device. 9
  • 10. MANAGE COMPUTER RESOURCES • Manage access and security of network computers through: – Built in protocols to connect to WANs (TCP/IP) – Built in protocols to connect to LANs (Ethernet) – Support for WiFi and Bluetooth connectivity – Network firewall protection. 10
  • 11. MANAGE COMPUTER RESOURCES • Utility programs – Tools to optimize operating system functions such as: • CD and DVD recording • Screen savers • Speech recognition for basic commands • Text editors • Multimedia utilities. – Disk management utility • Partition and format drives. • Defragment and detect disk errors. 11
  • 12. MANAGE COMPUTER RESOURCES • File management. – Operating systems govern storage and retrieval of files. – Basic file management includes: • Copy • Delete • Rename • Move. – File extensions identify a file as data or program for the operating system. 12
  • 13. FILE MANAGEMENT • Directories are storage locations for groups of files. – Directory path is identified by the operating system. – Directories (or folders) are created, moved, copied, deleted using file management utility. 13
  • 14. PROGRAMMING LANGUAGES 14 SYNTAX AND SEMANTICS TO WRITE COMPUTER PROGRAMS.
  • 15. PROGRAMMING LANGUAGES • Low-Level Languages. – Programs are written for a specific computer system. – Machine code — binary code the processor directly executes. – Assembly code — text abbreviations for binary commands. • Requires a program (assembler) to convert the abbreviations to binary code. 15
  • 16. PROGRAMMING LANGUAGES • High-Level Languages. – Syntax and semantics are not dependent on a specific computer system. – More English-like commands. – Easier to debug errors. • Two methods to convert to machine code: – Interpreter converts and executes one line of code at a time. – Compiler converts entire program to an executable file. 16
  • 17. Approaches to Programming • Procedural approach: – Follows a series of computational steps that focus on a specific result. • Divides complex tasks into subroutines, functions that can be reused within a single program environment. • Code modules cannot be ported to other applications without significant modification which leads to inefficiency in programming tasks. • Non-procedural: – Maximizes programmer productivity by recycling modules from one program into other applications. 17
  • 18. Two Non-procedural options • Object-Oriented languages. – Modular approach reduces time to recode similar object routines. • Visual programming. – Use graphical interface to expedite programming process. – Enables Rapid Application Development. 18
  • 19. APPLICATION SOFTWARE 19 SOFTWARE THAT PERFORMS A SPECIFIC TASK.
  • 20. APPLICATION SOFTWARE • Two main categories for multimedia development. – Media-specific applications. • Create and edit specific media content. – Authoring applications. • Tools to integrate media components and provide a user interface. 20
  • 21. MEDIA-SPECIFIC APPLICATIONS • Text media applications include: – Word processors – Text editors – Portable document generators. • Graphics media applications include: – Paint programs – Draw programs – 3-D imaging applications. 21
  • 22. MEDIA-SPECIFIC APPLICATIONS • Sound media. – Sound capture applications. – Synthesized sound applications. • Video applications combine: – Source material – Synchronize clips to sound track – Add special effects – Save as a digital video. 22
  • 23. MEDIA-SPECIFIC APPLICATIONS • Animation applications. – Software to create and edit animated sequences. – Objects are drawn or imported into the software where they are manipulated in a series of frames. • Media utilities. – Add functionality to media-specific applications such as file compression and file conversion. 23
  • 24. AUTHORING SOFTWARE • Programs designed to facilitate the creation of multimedia products. – Assemble media elements – Synchronize content – Design user interface – Provide user interactivity. • Authoring metaphors are: – Card based – Timeline – Icon. 24 PowerPoint uses a card metaphor. Authorware uses a icon metaphor. Flash uses a timeline metaphor.
  • 25. WRAP UP • Three software categories. • Functions of operating system. • Disk and file management practices. • Levels of programming languages. • Application software for multimedia. – Media-specific software. – Authoring software. 25
  • 26. KEY TERM CHECK UP 26