SlideShare a Scribd company logo
1 of 16
Download to read offline
I.T. for Management



   Chapter 7

Other Systems & Application Software
Other Systems & Application
Networking
              Software
Most current operating systems are capable of using
the TCP/IP networking protocols. This means that
one system can appear on a network of the other and
share resources such as files, printers, and scanners
using either wired or wireless connections.
Many operating systems also support one or more
vendor-specific legacy networking protocols as well,
for example, SNA on IBM systems, DECnet on
systems from Digital Equipment Corporation, and
Microsoft-specific protocols on Windows. Specific
protocols for specific tasks may also be supported
such as NFS for file access.
Other Systems & Application
            Software

Security Software


Many operating systems include some level of
security. Security is based on the two ideas that:
•The operating system provides access to a
number of resources, directly or indirectly, such
as files on a local disk, privileged system calls,
personal information about users, and the services
offered by the programs running on the system
Other Systems & Application
                Software

Security Software
Many operating systems include some level of security.
Security is based on the two ideas that:
The operating system provides access to a number of
resources, directly or indirectly, such as files on a local
disk, privileged system calls, personal information about
users, and the services offered by the programs running on
the system;
The operating system is capable of distinguishing between
some requesters of these resources who are authorized
(allowed) to access the resource, and others who are not
authorized (forbidden).
Other Systems & Application
                 Software

Security Software
While some systems may simply distinguish between
"privileged" and "non-privileged", systems commonly have a
form of requester identity, such as a user name. Requesters, in
turn, divide into two categories:
Internal security: an already running program. On some
systems, a program once it is running has no limitations,
but commonly the program has an identity which it keeps
and is used to check all of its requests for resources.
Other Systems & Application
              Software

Security Software
  Security software assists in implementing some
security controls and safeguards against certain
type of risk . Some of these areas includes :
  Software based Firewalls: These help in filtering
out unwanted packets of information thereby
protecting the information within the server
  Anti -Virus Solutions Scan every data file which
comes in to the organization for possible virus

       C
Other Systems & Application
              Software

Security Software
Intrusion Detection System :
IDS are special security monitoring software which
inspects all traffic on the network to detect any
pattern.This helps in early identification of attacks
by hackers
Proxy Server:
This software acts as intermediary.With various
uses On the network on one hand and the servers
and other external services on other.
Other Systems & Application
              Software

Security Software
Network operating system:
 NOS controls the functioning of the network
At a very basic level it manages uses by a way of formal
log in
It would define the privileges which the user may enjoy
on the network
Other Software:
Citrix helps create a server based computing
environment You can have desktops without any local
drive
Infrastructure management Software


Most organizations have very huge infrastructure
Managing such huge infrastructure needs support
from IT itself
Infrastructure management software such as HP
open view or IBM’s Tivoli are proven softwares
can scale to any size of organization
These software help in effectively and efficiently
Managing IT infrastructures in large enterprise
Other types of System Software

Some of these include the following:
Web Server requires for Web application
Application server: required for running applications
Transaction monitor: Support large transaction
processing system
Varity of software components for specific purposes
Application Software

Application software is a software which helps to perform a
specific business function
It makes computer useful to the end user
Application software is a subclass of computer software
that employs the capabilities of a computer directly to a task
that the user wishes to perform. This should be contrasted
with system software which is involved in integrating a
computer's various capabilities, but typically does not
directly apply them in the performance of tasks that benefit
the user. In this context the term application refers to both the
application software and its implementation.
Application Software

The exact delineation between the operating system
and application software is not precise, however, and
is occasionally subject to controversy. For example,
one of the key questions in the United States v.
Microsoft antitrust trial was whether Microsoft's Internet
Explorer web browser was part of its Windows
operating system or a separable piece of application
software. As another example, the GNU/Linux naming
controversy is, in part, due to disagreement about the
relationship between the Linux kernel and the Linux
operating system.
Typical examples of software applications are word
processors, spreadsheets, and media players.
Application Software
There are many subtypes of Application Software:
   •Enterprise software addresses the needs of organization
   processes and data flow, often in a large distributed
   ecosystem. (Examples include Financial, Customer
   Relationship Management, and Supply Chain
   Management). Note that Departmental Software is a sub-
   type of Enterprise Software with a focus on smaller
   organizations or groups within a large organization.
   (Examples include Travel Expense Management, and IT
   Helpdesk)
Enterprise infrastructure software provides common
capabilities needed to create Enterprise Software systems.
(Examples include Databases, Email servers, and Network
and Security Management)
Application Software

Information worker software addresses the needs of
individuals to create and manage information, often for
individual projects within a department, in contrast to
enterprise management. Examples include time management,
resource management, documentation tools, analytical, and
collaborative. Word processors, spreadsheets, email and blog
clients, personal information system, and individual media
editors may aid in multiple information worker tasks
Media and entertainment software addresses the needs of
individuals and groups to consume digital entertainment and
published digital content. (Examples include Media Players,
Web Browsers, Help browsers, and Games)
Application Software


Educational software is related to Media and Entertainment
Software, but has distinct requirements for delivering
evaluations (tests) and tracking progress through material. It
is also related to collaboration software in that many
Educational Software systems include collaborative
capabilities.
Product engineering software is used in developing
hardware and software products. This includes computer
aided design (CAD), computer aided engineering (CAE),
computer language editing and compiling tools, Integrated
Development Environments, and Application Programmer
Interfaces.
I.T. for Management




 End of Chapter 7

More Related Content

What's hot

Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepointpabatan
 
Foundations of Information System in Business - Mark John Lado
Foundations of Information System in Business - Mark John LadoFoundations of Information System in Business - Mark John Lado
Foundations of Information System in Business - Mark John LadoMark John Lado, MIT
 
Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)pabatan
 
Chapter 5 database security
Chapter 5   database securityChapter 5   database security
Chapter 5 database securitySyaiful Ahdan
 
Decision support systems
Decision support systemsDecision support systems
Decision support systemsjatin Sareen
 
Fasoo Company And Product Information
Fasoo Company And Product InformationFasoo Company And Product Information
Fasoo Company And Product Informationpabatan
 
Sysctr Track: Unified Device Management: It’s all about the experience
Sysctr Track: Unified Device Management: It’s all about the experienceSysctr Track: Unified Device Management: It’s all about the experience
Sysctr Track: Unified Device Management: It’s all about the experienceITProceed
 
Embedded systems software
Embedded systems softwareEmbedded systems software
Embedded systems softwarealanradley
 
Chapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systemsChapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systemsjayussuryawan
 
20110428 ARMA Amarillo IT for Records Managers
20110428 ARMA Amarillo IT for Records Managers20110428 ARMA Amarillo IT for Records Managers
20110428 ARMA Amarillo IT for Records ManagersJesse Wilkins
 
Data base security
Data base securityData base security
Data base securitySara Nazir
 
Electronic document management system
Electronic document management systemElectronic document management system
Electronic document management systemBiodor Bonifacio
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalQuek Lilian
 
University electronic management system
University electronic management systemUniversity electronic management system
University electronic management systemAleksey Lashin
 
01 database security ent-db
01  database security ent-db01  database security ent-db
01 database security ent-dbuncleRhyme
 
Distributed systems-analysis-and-design
Distributed systems-analysis-and-designDistributed systems-analysis-and-design
Distributed systems-analysis-and-designEstiak Khan
 

What's hot (20)

Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepoint
 
Foundations of Information System in Business - Mark John Lado
Foundations of Information System in Business - Mark John LadoFoundations of Information System in Business - Mark John Lado
Foundations of Information System in Business - Mark John Lado
 
Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)
 
Chapter 5 database security
Chapter 5   database securityChapter 5   database security
Chapter 5 database security
 
Decision support systems
Decision support systemsDecision support systems
Decision support systems
 
Fasoo Company And Product Information
Fasoo Company And Product InformationFasoo Company And Product Information
Fasoo Company And Product Information
 
Sysctr Track: Unified Device Management: It’s all about the experience
Sysctr Track: Unified Device Management: It’s all about the experienceSysctr Track: Unified Device Management: It’s all about the experience
Sysctr Track: Unified Device Management: It’s all about the experience
 
SoftAge eDMS
SoftAge eDMSSoftAge eDMS
SoftAge eDMS
 
Embedded systems software
Embedded systems softwareEmbedded systems software
Embedded systems software
 
Chapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systemsChapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systems
 
20110428 ARMA Amarillo IT for Records Managers
20110428 ARMA Amarillo IT for Records Managers20110428 ARMA Amarillo IT for Records Managers
20110428 ARMA Amarillo IT for Records Managers
 
Data base security
Data base securityData base security
Data base security
 
Electronic document management system
Electronic document management systemElectronic document management system
Electronic document management system
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
 
Database security
Database securityDatabase security
Database security
 
University electronic management system
University electronic management systemUniversity electronic management system
University electronic management system
 
Database security
Database securityDatabase security
Database security
 
01 database security ent-db
01  database security ent-db01  database security ent-db
01 database security ent-db
 
Database Design
Database DesignDatabase Design
Database Design
 
Distributed systems-analysis-and-design
Distributed systems-analysis-and-designDistributed systems-analysis-and-design
Distributed systems-analysis-and-design
 

Viewers also liked

Business and Revenue Models in E-Commerce
Business and Revenue Models in E-CommerceBusiness and Revenue Models in E-Commerce
Business and Revenue Models in E-CommercePranay Panday
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commercem8817
 
Overview of Key Performance Indicators
Overview of Key Performance IndicatorsOverview of Key Performance Indicators
Overview of Key Performance IndicatorsMicheal Axelsen
 
E commerce
E commerceE commerce
E commerceGBC
 

Viewers also liked (7)

Business and Revenue Models in E-Commerce
Business and Revenue Models in E-CommerceBusiness and Revenue Models in E-Commerce
Business and Revenue Models in E-Commerce
 
The e-commerce models
The e-commerce modelsThe e-commerce models
The e-commerce models
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
Overview of Key Performance Indicators
Overview of Key Performance IndicatorsOverview of Key Performance Indicators
Overview of Key Performance Indicators
 
E commerce ppt
E commerce pptE commerce ppt
E commerce ppt
 
E commerce
E commerceE commerce
E commerce
 
E commerce
E commerceE commerce
E commerce
 

Similar to Other Systems & Application Software

Lesson 5 computer software
Lesson 5 computer softwareLesson 5 computer software
Lesson 5 computer softwareVishal Patyal
 
Introduction to computer software
Introduction to computer softwareIntroduction to computer software
Introduction to computer softwareElike Ikechukwu
 
What Is Software and Exploring Its Types A Comprehensive Guide
What Is Software and Exploring Its Types A Comprehensive GuideWhat Is Software and Exploring Its Types A Comprehensive Guide
What Is Software and Exploring Its Types A Comprehensive GuidePolyxer Systems
 
computer software
computer softwarecomputer software
computer softwareAhsan Khan
 
Hardware , software and filmware
Hardware , software and filmwareHardware , software and filmware
Hardware , software and filmwareMH Shihab
 
Thing to understand about software
Thing to understand about softwareThing to understand about software
Thing to understand about softwaredfghjrtyuj
 
itcpresentationnew-150929164902-lva1-app6891.pdf
itcpresentationnew-150929164902-lva1-app6891.pdfitcpresentationnew-150929164902-lva1-app6891.pdf
itcpresentationnew-150929164902-lva1-app6891.pdfSaddamAliBehana
 
computer software
computer softwarecomputer software
computer softwareRiya Gupta
 
Software and its Types All About Computer Software
Software and its Types All About Computer SoftwareSoftware and its Types All About Computer Software
Software and its Types All About Computer Softwarekhang950262
 
Management information systems
Management information systemsManagement information systems
Management information systemsaz00z
 
As media studies software and systems presentation
As media studies software and systems presentationAs media studies software and systems presentation
As media studies software and systems presentationpaddy249
 
Chapter 3 Software.ppt
Chapter 3 Software.pptChapter 3 Software.ppt
Chapter 3 Software.pptAmanuelZewdie4
 

Similar to Other Systems & Application Software (20)

Lesson 5 computer software
Lesson 5 computer softwareLesson 5 computer software
Lesson 5 computer software
 
Introduction to computer software
Introduction to computer softwareIntroduction to computer software
Introduction to computer software
 
What Is Software and Exploring Its Types A Comprehensive Guide
What Is Software and Exploring Its Types A Comprehensive GuideWhat Is Software and Exploring Its Types A Comprehensive Guide
What Is Software and Exploring Its Types A Comprehensive Guide
 
Fg b
Fg bFg b
Fg b
 
computer software
computer softwarecomputer software
computer software
 
Hardware , software and filmware
Hardware , software and filmwareHardware , software and filmware
Hardware , software and filmware
 
system Security
system Security system Security
system Security
 
Exam 1 in ITEP 132
Exam 1 in ITEP 132Exam 1 in ITEP 132
Exam 1 in ITEP 132
 
Thing to understand about software
Thing to understand about softwareThing to understand about software
Thing to understand about software
 
itcpresentationnew-150929164902-lva1-app6891.pdf
itcpresentationnew-150929164902-lva1-app6891.pdfitcpresentationnew-150929164902-lva1-app6891.pdf
itcpresentationnew-150929164902-lva1-app6891.pdf
 
computer software
computer softwarecomputer software
computer software
 
Software and its Types All About Computer Software
Software and its Types All About Computer SoftwareSoftware and its Types All About Computer Software
Software and its Types All About Computer Software
 
B) Computer Basics
B) Computer BasicsB) Computer Basics
B) Computer Basics
 
software engineering
software engineeringsoftware engineering
software engineering
 
MCA-5 unit1
MCA-5 unit1MCA-5 unit1
MCA-5 unit1
 
Computer notes
Computer notesComputer notes
Computer notes
 
Management information systems
Management information systemsManagement information systems
Management information systems
 
As media studies software and systems presentation
As media studies software and systems presentationAs media studies software and systems presentation
As media studies software and systems presentation
 
It kamus virus security glossary
It kamus virus   security glossaryIt kamus virus   security glossary
It kamus virus security glossary
 
Chapter 3 Software.ppt
Chapter 3 Software.pptChapter 3 Software.ppt
Chapter 3 Software.ppt
 

More from We Learn - A Continuous Learning Forum from Welingkar's Distance Learning Program.

More from We Learn - A Continuous Learning Forum from Welingkar's Distance Learning Program. (20)

PGDM in Supply Chain Management
PGDM in Supply Chain ManagementPGDM in Supply Chain Management
PGDM in Supply Chain Management
 
PGDM in Rural & Agribusiness Management
PGDM in Rural & Agribusiness ManagementPGDM in Rural & Agribusiness Management
PGDM in Rural & Agribusiness Management
 
PGDM in E-Commerce Management
PGDM in E-Commerce ManagementPGDM in E-Commerce Management
PGDM in E-Commerce Management
 
PGDM in Service Excellence
PGDM in Service ExcellencePGDM in Service Excellence
PGDM in Service Excellence
 
PGDM in International Management
PGDM in International ManagementPGDM in International Management
PGDM in International Management
 
PGDM in IT Project Management
PGDM in IT Project ManagementPGDM in IT Project Management
PGDM in IT Project Management
 
Distance Learning PGDM in E-Business Management
Distance Learning PGDM in E-Business ManagementDistance Learning PGDM in E-Business Management
Distance Learning PGDM in E-Business Management
 
Distance Learning PGDM in Business Administration
Distance Learning PGDM in Business AdministrationDistance Learning PGDM in Business Administration
Distance Learning PGDM in Business Administration
 
PGDM in Finance Management
PGDM in Finance ManagementPGDM in Finance Management
PGDM in Finance Management
 
PGDM in Marketing Management
PGDM in Marketing ManagementPGDM in Marketing Management
PGDM in Marketing Management
 
PGDM in Operation Management
PGDM in Operation ManagementPGDM in Operation Management
PGDM in Operation Management
 
Marketing Management
Marketing ManagementMarketing Management
Marketing Management
 
PGDM in Media & Advertising
PGDM in Media & AdvertisingPGDM in Media & Advertising
PGDM in Media & Advertising
 
We School HR Management
We School HR ManagementWe School HR Management
We School HR Management
 
WE SCHOOL TRAVEL & TOURISM MANAGEMENT
WE SCHOOL TRAVEL & TOURISM MANAGEMENTWE SCHOOL TRAVEL & TOURISM MANAGEMENT
WE SCHOOL TRAVEL & TOURISM MANAGEMENT
 
Personal budgeting
Personal budgetingPersonal budgeting
Personal budgeting
 
Maintaining the financial health of businesses through financial accounting
Maintaining the financial health of businesses through financial accountingMaintaining the financial health of businesses through financial accounting
Maintaining the financial health of businesses through financial accounting
 
Asset Management Case Sstudy
Asset Management  Case SstudyAsset Management  Case Sstudy
Asset Management Case Sstudy
 
Team management’ scored on the football
Team management’ scored on the footballTeam management’ scored on the football
Team management’ scored on the football
 
Mc donalds Recruitment Case Study
Mc donalds Recruitment Case StudyMc donalds Recruitment Case Study
Mc donalds Recruitment Case Study
 

Recently uploaded

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Recently uploaded (20)

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 

Other Systems & Application Software

  • 1. I.T. for Management Chapter 7 Other Systems & Application Software
  • 2. Other Systems & Application Networking Software Most current operating systems are capable of using the TCP/IP networking protocols. This means that one system can appear on a network of the other and share resources such as files, printers, and scanners using either wired or wireless connections. Many operating systems also support one or more vendor-specific legacy networking protocols as well, for example, SNA on IBM systems, DECnet on systems from Digital Equipment Corporation, and Microsoft-specific protocols on Windows. Specific protocols for specific tasks may also be supported such as NFS for file access.
  • 3. Other Systems & Application Software Security Software Many operating systems include some level of security. Security is based on the two ideas that: •The operating system provides access to a number of resources, directly or indirectly, such as files on a local disk, privileged system calls, personal information about users, and the services offered by the programs running on the system
  • 4. Other Systems & Application Software Security Software Many operating systems include some level of security. Security is based on the two ideas that: The operating system provides access to a number of resources, directly or indirectly, such as files on a local disk, privileged system calls, personal information about users, and the services offered by the programs running on the system; The operating system is capable of distinguishing between some requesters of these resources who are authorized (allowed) to access the resource, and others who are not authorized (forbidden).
  • 5. Other Systems & Application Software Security Software While some systems may simply distinguish between "privileged" and "non-privileged", systems commonly have a form of requester identity, such as a user name. Requesters, in turn, divide into two categories: Internal security: an already running program. On some systems, a program once it is running has no limitations, but commonly the program has an identity which it keeps and is used to check all of its requests for resources.
  • 6. Other Systems & Application Software Security Software Security software assists in implementing some security controls and safeguards against certain type of risk . Some of these areas includes : Software based Firewalls: These help in filtering out unwanted packets of information thereby protecting the information within the server Anti -Virus Solutions Scan every data file which comes in to the organization for possible virus C
  • 7. Other Systems & Application Software Security Software Intrusion Detection System : IDS are special security monitoring software which inspects all traffic on the network to detect any pattern.This helps in early identification of attacks by hackers Proxy Server: This software acts as intermediary.With various uses On the network on one hand and the servers and other external services on other.
  • 8. Other Systems & Application Software Security Software Network operating system: NOS controls the functioning of the network At a very basic level it manages uses by a way of formal log in It would define the privileges which the user may enjoy on the network Other Software: Citrix helps create a server based computing environment You can have desktops without any local drive
  • 9. Infrastructure management Software Most organizations have very huge infrastructure Managing such huge infrastructure needs support from IT itself Infrastructure management software such as HP open view or IBM’s Tivoli are proven softwares can scale to any size of organization These software help in effectively and efficiently Managing IT infrastructures in large enterprise
  • 10. Other types of System Software Some of these include the following: Web Server requires for Web application Application server: required for running applications Transaction monitor: Support large transaction processing system Varity of software components for specific purposes
  • 11. Application Software Application software is a software which helps to perform a specific business function It makes computer useful to the end user Application software is a subclass of computer software that employs the capabilities of a computer directly to a task that the user wishes to perform. This should be contrasted with system software which is involved in integrating a computer's various capabilities, but typically does not directly apply them in the performance of tasks that benefit the user. In this context the term application refers to both the application software and its implementation.
  • 12. Application Software The exact delineation between the operating system and application software is not precise, however, and is occasionally subject to controversy. For example, one of the key questions in the United States v. Microsoft antitrust trial was whether Microsoft's Internet Explorer web browser was part of its Windows operating system or a separable piece of application software. As another example, the GNU/Linux naming controversy is, in part, due to disagreement about the relationship between the Linux kernel and the Linux operating system. Typical examples of software applications are word processors, spreadsheets, and media players.
  • 13. Application Software There are many subtypes of Application Software: •Enterprise software addresses the needs of organization processes and data flow, often in a large distributed ecosystem. (Examples include Financial, Customer Relationship Management, and Supply Chain Management). Note that Departmental Software is a sub- type of Enterprise Software with a focus on smaller organizations or groups within a large organization. (Examples include Travel Expense Management, and IT Helpdesk) Enterprise infrastructure software provides common capabilities needed to create Enterprise Software systems. (Examples include Databases, Email servers, and Network and Security Management)
  • 14. Application Software Information worker software addresses the needs of individuals to create and manage information, often for individual projects within a department, in contrast to enterprise management. Examples include time management, resource management, documentation tools, analytical, and collaborative. Word processors, spreadsheets, email and blog clients, personal information system, and individual media editors may aid in multiple information worker tasks Media and entertainment software addresses the needs of individuals and groups to consume digital entertainment and published digital content. (Examples include Media Players, Web Browsers, Help browsers, and Games)
  • 15. Application Software Educational software is related to Media and Entertainment Software, but has distinct requirements for delivering evaluations (tests) and tracking progress through material. It is also related to collaboration software in that many Educational Software systems include collaborative capabilities. Product engineering software is used in developing hardware and software products. This includes computer aided design (CAD), computer aided engineering (CAE), computer language editing and compiling tools, Integrated Development Environments, and Application Programmer Interfaces.
  • 16. I.T. for Management End of Chapter 7