Chapter 3 Software Application Software

485 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
485
On SlideShare
0
From Embeds
0
Number of Embeds
25
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Chapter 3 Software Application Software

  1. 1. Chapter 3 Software
  2. 2. Application Software <ul><li>Commercial software is software that must be purchased </li></ul><ul><li>Copyright </li></ul><ul><li>Software License </li></ul><ul><ul><li>Backup or archive copies are often permitted </li></ul></ul><ul><ul><li>Site </li></ul></ul><ul><ul><li>Concurrent </li></ul></ul><ul><ul><li>Multi-user </li></ul></ul><ul><ul><li>Single-user </li></ul></ul><ul><li>Software Versions and Releases </li></ul>
  3. 3. Application Software <ul><li>Public Domain SW: Not copyrighted, may be duplicated </li></ul><ul><li>Shareware: Copyrighted, distributed for free, must pay to continue using it </li></ul><ul><li>Freeware: Copyrighted, distributed for free, may not be modified and redistributed </li></ul><ul><li>Rentalware: Leased usage </li></ul><ul><li>Pirated SW: Illegally obtained/copied software </li></ul><ul><li>Abandonware: Copyrighted*, software that is no longer sold or supported by its publisher </li></ul><ul><li>Custom SW: Copyrighted*, software designed to meet the unique needs of an organization </li></ul>
  4. 4. Components of System Software <ul><li>System Software enables application software to interact with the computer and manages the computer’s resources </li></ul><ul><li>Operating System (OS): The principal component of system software, manages basic operations of the computer </li></ul><ul><li>Device Driver: Helps the computer control peripheral devices </li></ul><ul><li>Utility Program: Supports, enhances, and expands capabilities of existing programs </li></ul><ul><li>Language Translator: Translates high-level language programs to machine code </li></ul>
  5. 5. The Operating System <ul><li>Booting: The process of loading the operating system into a computer’s main memory </li></ul><ul><ul><li>Step 1: Diagnostic routines test main memory, CPU, etc. </li></ul></ul><ul><ul><li>Step 2: The BIOS is copied from the read-only memory (ROM) into the main memory (RAM), it allows basic I/O </li></ul></ul><ul><ul><li>Step 3: OS is loaded from the hard disk into the main memory </li></ul></ul><ul><ul><li>Cold vs. warm boot </li></ul></ul><ul><li>The Supervisor (Kernel): The program which remains in the RAM while the computer is running, and directs other “non-resident” programs to perform tasks that support application programs </li></ul><ul><li>File Management & Formatting: File systems, formatting a PC </li></ul><ul><li>Task Management: Multi-tasking, multi-programming, time sharing, multi-processing </li></ul><ul><li>Security Management </li></ul>
  6. 6. Common Operating Systems <ul><li>Platform: A particular processor model and operating system on which a computer is based, e.g. Wintel (Windows OS + Intel processor), Mactel </li></ul><ul><li>GUI vs. command driven operating systems </li></ul><ul><li>Open source computing: pros and cons </li></ul><ul><li>Disk Operating System (DOS): The original OS by Microsoft, command-driven user interface </li></ul><ul><li>Windows: 3.X, 95, 98, etc. </li></ul><ul><li>Mac OS: For Apple Macintosh computers, first GUI-based OS </li></ul><ul><li>Network Operating Systems: Netware, Linux, Unix, etc. </li></ul>
  7. 7. Utility Programs <ul><li>Backup: Makes a duplicate copy of the specified data </li></ul><ul><li>Data-Recovery: Restores data that has been physically damaged or corrupted </li></ul><ul><li>Virus Protection: Scans files, detects, and removes viruses </li></ul><ul><li>Data Compression: Removes redundant elements, gaps, and unnecessary data from files </li></ul><ul><li>Disk Scanner & Cleanup: Detects and removes unnecessary files, detects and corrects disk problems </li></ul><ul><li>Defragmenter: Finds all scattered files on a hard disk and reorganizes them as contiguous files </li></ul>
  8. 8. Fragmentation Visualized

×