SlideShare a Scribd company logo
Business Software
Packages
Software
Generic term for organized collections of data and instructions.
1. System Software
2. Application Software
Two Basic Types of Software
System Software performs certain fundamental tasks that all users of
a particular computer require.
These are tasks that relate to the hardware and not to the
applications that the firm performs
There are three (3) basic types of System Software:
1. Operating Systems
2. Utility Programs
3. Language Translators
System Software
The Operating System manages the computer’s processes,
functioning as an interface connecting the user, the software that
processes the firm’s data and the hardware
Examples are:
-UNIX
-Windows
-Linux
-Mac OS
Operating System
1. Schedule Tasks
2. Manage Hardware and Software Resources
3. Maintain System Security
Password – a group of characters that identifies users as being
authorized to have access to the system
4. Enable Multiple user Resource Sharing
Multitasking – an OS feature that handles the scheduling and
execution of programs for many users at the same time
5. Handle Interrupts
Interrupt – a technique used by OS to suspend temporarily the
processing of one program to allow execution of another program
Basic Functions of an OS
A utility program is a routine that enables the user to perform
certain basic data processing operations that are not unique to a
particular user’s applications.
Utilities enable users to copy files, erase files, sort the contents of
files, merge two or more files together, and preapre removable
storage media for use.
Other utilities allow lost or bad files recovery, monitor system
performance and even control the flow of data bet. Users and
computers.
Utility Programs
Translators, programming languages that translate the programmer’s
instructions into those of the computer, were developed to proved a
more friendly way to instruct the computer.
Examples are: COBOL, C, C++, Java and Visual Basic
Language Translators
A fourth-generation language is one that expresses what is to be
done by the computer without explicitly defining how the tasks will
take place.
Database Management System software contains 4GL in the form of
query languages and report generator languages.
Fourth Generation Languages (4GL)
Application Software processes the firm’s data.
Two basic types:
1. Prewritten
2. Custom
Application Software
Prewritten Application Packages also known as off-the-shelf
application software, are produced by suppliers and sold to users.
To use it, the users need only to install the software on their
hardware, with little or no modification.
Two important benefits:
1. It is available NOW
2. Less expensive than custom software
Prewritten Application Software
Custom Application Software, as it name suggests, are software
written by business’ own computer programmers or consulting group
of programmers to meet its needs.’
Custom Application Software
Computer software that is simple and intuitive to use is frequently
said to be user friendly.
The term may elicit a negative connotation in that it implies that the
application has been made very simplistic so that anyone can use it.
Actually, it means that the application has been carefully engineered
so that the varied talents and skills ofa wide range of users can be
accommodated.
The Role of User-Friendly Software
Accounting Software
Information System
Data Processing (DP) is the manipulation or transformation of such
symbols as numbers and letters for the purpose of increasing their
usefulness.
Transaction Processing (TP), is data processing applied in business
data.
The two terms can be used interchangeably.
What is Data Processing?
A firm’s data processing tasks are performed
by an accounting information system (AIS)
that gathers data describing the firm’s
activities, transforms the data into
information and makes the information
available to users both inside and outside the
firm.
Accounting Information System
The AIS performs four basic data processing tasks:
1. Data Gathering
2. Data Manipulation
3. Data Storage
4. Document Preparation
Data Processing Tasks
As the firm provides products and services to its environment, each
action is described by a data record. When the action involves an
environmental element, it is called a transaction, hence the term
transaction processing.
The data processing system gathers the data that describe each of the
firm’s internal actions and its environmental transactions.
Data Gathering
It is necesarry to manipulate the data to transform it into
information. Data manipulation operations include:
1. Classifying
2. Sorting
3. Calculating
4. Summarizing
Data Manipulation
In a small firm there can be hundreds of transactions and actions each
day; in a large firm there are thousands.
Each transaction is described by several data elements. All of this
data must be kept somewhere until it is needed., and that is the
purpose of data storage.
Data Storage
The AIS produces outputs for individuals and organizations both inside
and outside the firm. The output is triggered in two ways:
• By an action
Outputs are produced when something happens. An example
is the bill that is prepared each time a customer order is filled.
• By a time schedule
Outputs are produced at a particular time. An example is a
payroll check that is prepared each Friday.
Document Preparation
There are several characteristics of data processing that clearly
distinguish the AIS from other Computer Based Information
Systems:
1. Performs necessary tasks
2. Adheres to relatively standardized procedures
3. Handles detailed data
4. Has a primarily historical focus
5. Provides minimal problem-solving information
Characteristics of the AIS
A good example of an AIS is the one that is used by
distribution firms – firms that distribute products or
services to their customers.
We call the system the distribution system.
A Sample Accounting Information System
System Overview
Distribution
System
Customers
Suppliers
Management

More Related Content

What's hot

Functional units of computer
Functional units of computerFunctional units of computer
Functional units of computer
gaurav jain
 
Binary logic
Binary logicBinary logic
Binary logic
wardjo
 
Data processing
Data processingData processing
Data processing
Dr. Shalini Pandey
 
Introduction to Software Engineering Lecture 0
Introduction to Software Engineering  Lecture 0Introduction to Software Engineering  Lecture 0
Introduction to Software Engineering Lecture 0
Mohamed Essam
 
Itc lec 1 introduction to computer applications
Itc lec 1 introduction to computer applicationsItc lec 1 introduction to computer applications
Itc lec 1 introduction to computer applications
AnzaDar3
 
Computer application in business
Computer application in businessComputer application in business
Computer application in business
Manas Saha
 
Introduction to Computer Software
Introduction to Computer SoftwareIntroduction to Computer Software
Computer application in business
Computer application in businessComputer application in business
Computer application in business
MONCY KURIAKOSE
 
Binary system ppt
Binary system pptBinary system ppt
Binary system ppt
BBDITM LUCKNOW
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5
Sehrish Rafiq
 
INFORMATION TECHNOLOGY FOR BUSINESS
INFORMATION TECHNOLOGY FOR BUSINESSINFORMATION TECHNOLOGY FOR BUSINESS
INFORMATION TECHNOLOGY FOR BUSINESS
METHODIST COLLEGE OF ENGG & TECH
 
Ch3
Ch3Ch3
TPS Vs MIS
TPS Vs MISTPS Vs MIS
Computer networking and E-commerce
Computer networking and E-commerce Computer networking and E-commerce
Computer networking and E-commerce
Haroon Khaliq
 
Compiler Questions
Compiler QuestionsCompiler Questions
Compiler Questions
Dr. C.V. Suresh Babu
 
KEYBOARD
KEYBOARDKEYBOARD
KEYBOARD
subasreej
 
Information System and Information Technology
Information System and Information TechnologyInformation System and Information Technology
Information System and Information Technology
megat zainurul anuar
 
Relationship Among Token, Lexeme & Pattern
Relationship Among Token, Lexeme & PatternRelationship Among Token, Lexeme & Pattern
Relationship Among Token, Lexeme & Pattern
Bharat Rathore
 
Operating System a Case Study
Operating System a Case StudyOperating System a Case Study
Operating System a Case Study
ijtsrd
 
Computer Number system
Computer Number systemComputer Number system
Computer Number system
Anil Kumar Prajapati
 

What's hot (20)

Functional units of computer
Functional units of computerFunctional units of computer
Functional units of computer
 
Binary logic
Binary logicBinary logic
Binary logic
 
Data processing
Data processingData processing
Data processing
 
Introduction to Software Engineering Lecture 0
Introduction to Software Engineering  Lecture 0Introduction to Software Engineering  Lecture 0
Introduction to Software Engineering Lecture 0
 
Itc lec 1 introduction to computer applications
Itc lec 1 introduction to computer applicationsItc lec 1 introduction to computer applications
Itc lec 1 introduction to computer applications
 
Computer application in business
Computer application in businessComputer application in business
Computer application in business
 
Introduction to Computer Software
Introduction to Computer SoftwareIntroduction to Computer Software
Introduction to Computer Software
 
Computer application in business
Computer application in businessComputer application in business
Computer application in business
 
Binary system ppt
Binary system pptBinary system ppt
Binary system ppt
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5
 
INFORMATION TECHNOLOGY FOR BUSINESS
INFORMATION TECHNOLOGY FOR BUSINESSINFORMATION TECHNOLOGY FOR BUSINESS
INFORMATION TECHNOLOGY FOR BUSINESS
 
Ch3
Ch3Ch3
Ch3
 
TPS Vs MIS
TPS Vs MISTPS Vs MIS
TPS Vs MIS
 
Computer networking and E-commerce
Computer networking and E-commerce Computer networking and E-commerce
Computer networking and E-commerce
 
Compiler Questions
Compiler QuestionsCompiler Questions
Compiler Questions
 
KEYBOARD
KEYBOARDKEYBOARD
KEYBOARD
 
Information System and Information Technology
Information System and Information TechnologyInformation System and Information Technology
Information System and Information Technology
 
Relationship Among Token, Lexeme & Pattern
Relationship Among Token, Lexeme & PatternRelationship Among Token, Lexeme & Pattern
Relationship Among Token, Lexeme & Pattern
 
Operating System a Case Study
Operating System a Case StudyOperating System a Case Study
Operating System a Case Study
 
Computer Number system
Computer Number systemComputer Number system
Computer Number system
 

Viewers also liked

Systems software and applications packages
Systems software and applications packagesSystems software and applications packages
Systems software and applications packages
listergc
 
Application software packages
Application software packagesApplication software packages
Application software packages
Rana Fahad
 
Quality of software
Quality of softwareQuality of software
Quality of software
Palak Pandoh
 
Capability maturity model cmm lecture 8
Capability maturity model cmm lecture 8Capability maturity model cmm lecture 8
Capability maturity model cmm lecture 8
Abdul Basit
 
Monitoring the control
Monitoring the control Monitoring the control
Monitoring the control
north south university
 
PM Session 6
PM Session 6PM Session 6
PM Session 6
dmdk12
 
160155061 project-monitoring-control
160155061 project-monitoring-control160155061 project-monitoring-control
160155061 project-monitoring-control
eidalin95
 
Ch 9 project monitoring & control updated
Ch 9 project monitoring & control updatedCh 9 project monitoring & control updated
Ch 9 project monitoring & control updated
Farhana Rehman
 
Modern Software Productivity Measurement: The Pragmatic Guide
Modern Software Productivity Measurement: The Pragmatic GuideModern Software Productivity Measurement: The Pragmatic Guide
Modern Software Productivity Measurement: The Pragmatic Guide
CAST
 
Uses of software packages in different areas
Uses of software packages in different areasUses of software packages in different areas
Uses of software packages in different areas
Saba96
 
Configuration Management in Software Engineering - SE29
Configuration Management in Software Engineering - SE29Configuration Management in Software Engineering - SE29
Configuration Management in Software Engineering - SE29
koolkampus
 
Understanding and improving software productivity
Understanding and improving software productivityUnderstanding and improving software productivity
Understanding and improving software productivity
George Valiyaveetil
 
Software configuration management
Software configuration managementSoftware configuration management
Software configuration management
Julia Carolina
 
Lecture 8 monitoring & controlling (1)
Lecture 8  monitoring & controlling (1)Lecture 8  monitoring & controlling (1)
Lecture 8 monitoring & controlling (1)
Nur Azwin
 
Chap008
Chap008Chap008
Project Monitoring And Controlling
Project Monitoring And ControllingProject Monitoring And Controlling
Project Monitoring And Controlling
Tom Milner
 
Project Monitoring and Control
Project Monitoring and ControlProject Monitoring and Control
Project Monitoring and Control
TrainingandCoaching Trainer
 
Project Monitoring and Control
Project Monitoring and ControlProject Monitoring and Control
Project Monitoring and Control
guy_davis
 
7 application software categories
7 application software categories7 application software categories
7 application software categories
MrQaz996
 
Software configuration management
Software configuration managementSoftware configuration management
Software configuration management
Shivani Garg
 

Viewers also liked (20)

Systems software and applications packages
Systems software and applications packagesSystems software and applications packages
Systems software and applications packages
 
Application software packages
Application software packagesApplication software packages
Application software packages
 
Quality of software
Quality of softwareQuality of software
Quality of software
 
Capability maturity model cmm lecture 8
Capability maturity model cmm lecture 8Capability maturity model cmm lecture 8
Capability maturity model cmm lecture 8
 
Monitoring the control
Monitoring the control Monitoring the control
Monitoring the control
 
PM Session 6
PM Session 6PM Session 6
PM Session 6
 
160155061 project-monitoring-control
160155061 project-monitoring-control160155061 project-monitoring-control
160155061 project-monitoring-control
 
Ch 9 project monitoring & control updated
Ch 9 project monitoring & control updatedCh 9 project monitoring & control updated
Ch 9 project monitoring & control updated
 
Modern Software Productivity Measurement: The Pragmatic Guide
Modern Software Productivity Measurement: The Pragmatic GuideModern Software Productivity Measurement: The Pragmatic Guide
Modern Software Productivity Measurement: The Pragmatic Guide
 
Uses of software packages in different areas
Uses of software packages in different areasUses of software packages in different areas
Uses of software packages in different areas
 
Configuration Management in Software Engineering - SE29
Configuration Management in Software Engineering - SE29Configuration Management in Software Engineering - SE29
Configuration Management in Software Engineering - SE29
 
Understanding and improving software productivity
Understanding and improving software productivityUnderstanding and improving software productivity
Understanding and improving software productivity
 
Software configuration management
Software configuration managementSoftware configuration management
Software configuration management
 
Lecture 8 monitoring & controlling (1)
Lecture 8  monitoring & controlling (1)Lecture 8  monitoring & controlling (1)
Lecture 8 monitoring & controlling (1)
 
Chap008
Chap008Chap008
Chap008
 
Project Monitoring And Controlling
Project Monitoring And ControllingProject Monitoring And Controlling
Project Monitoring And Controlling
 
Project Monitoring and Control
Project Monitoring and ControlProject Monitoring and Control
Project Monitoring and Control
 
Project Monitoring and Control
Project Monitoring and ControlProject Monitoring and Control
Project Monitoring and Control
 
7 application software categories
7 application software categories7 application software categories
7 application software categories
 
Software configuration management
Software configuration managementSoftware configuration management
Software configuration management
 

Similar to Business software packages

SOFTWARE PARADIGM
SOFTWARE PARADIGMSOFTWARE PARADIGM
SOFTWARE PARADIGM
DrThenmozhiKarunanit
 
Chapter 8 - Systems Development Life Cycle Pt.1.pptx
Chapter 8 - Systems Development Life Cycle Pt.1.pptxChapter 8 - Systems Development Life Cycle Pt.1.pptx
Chapter 8 - Systems Development Life Cycle Pt.1.pptx
BiancaBen3
 
unit 3.pptx
unit 3.pptxunit 3.pptx
unit 3.pptx
DivyaKS12
 
unit 3.ppt
unit 3.pptunit 3.ppt
unit 3.ppt
prakashvs7
 
What Is Software and Exploring Its Types A Comprehensive Guide
What Is Software and Exploring Its Types A Comprehensive GuideWhat Is Software and Exploring Its Types A Comprehensive Guide
What Is Software and Exploring Its Types A Comprehensive Guide
Polyxer Systems
 
C LECTURE NOTES FULL_1.pdf
C LECTURE NOTES FULL_1.pdfC LECTURE NOTES FULL_1.pdf
C LECTURE NOTES FULL_1.pdf
Priyanka542143
 
Computer software and computer network
Computer software and computer networkComputer software and computer network
Computer software and computer network
Infinity Tech Solutions
 
Management Information System
Management Information SystemManagement Information System
Management Information System
Ch Irfan
 
Fg b
Fg bFg b
Fg b
Taha Khan
 
B.Ed class-1
B.Ed class-1B.Ed class-1
B.Ed class-1
Santhosh Thomas
 
C program full materials.pdf
C program  full materials.pdfC program  full materials.pdf
C program full materials.pdf
RSathyaPriyaCSEKIOT
 
1.7 selection and use of appropriate software
1.7 selection and use of appropriate software1.7 selection and use of appropriate software
1.7 selection and use of appropriate software
mrmwood
 
Presentation it
Presentation itPresentation it
Presentation it
nabelas
 
EDUC 611_SYSTEM SOFTWARE, TECHNOLOGY INTEGRATION
EDUC 611_SYSTEM SOFTWARE, TECHNOLOGY INTEGRATIONEDUC 611_SYSTEM SOFTWARE, TECHNOLOGY INTEGRATION
EDUC 611_SYSTEM SOFTWARE, TECHNOLOGY INTEGRATION
catherineCerteza
 
Components of computer and organization
Components of computer and organizationComponents of computer and organization
Components of computer and organization
University of Potsdam
 
What is computer software, difference between hardware and software, types of...
What is computer software, difference between hardware and software, types of...What is computer software, difference between hardware and software, types of...
What is computer software, difference between hardware and software, types of...
A. S. M. Shafi
 
BSC Software & Software engineering-UNIT-IV
BSC Software & Software engineering-UNIT-IVBSC Software & Software engineering-UNIT-IV
BSC Software & Software engineering-UNIT-IV
YamunaP6
 
Infote groupwork 1
Infote groupwork 1Infote groupwork 1
Infote groupwork 1
noel_paningbatan
 
c and data structures first unit notes (jntuh syllabus)
c and data structures first unit notes (jntuh syllabus)c and data structures first unit notes (jntuh syllabus)
c and data structures first unit notes (jntuh syllabus)
Acad
 
Computer ppt by nikund
Computer ppt by nikundComputer ppt by nikund
Computer ppt by nikund
sheshank jain
 

Similar to Business software packages (20)

SOFTWARE PARADIGM
SOFTWARE PARADIGMSOFTWARE PARADIGM
SOFTWARE PARADIGM
 
Chapter 8 - Systems Development Life Cycle Pt.1.pptx
Chapter 8 - Systems Development Life Cycle Pt.1.pptxChapter 8 - Systems Development Life Cycle Pt.1.pptx
Chapter 8 - Systems Development Life Cycle Pt.1.pptx
 
unit 3.pptx
unit 3.pptxunit 3.pptx
unit 3.pptx
 
unit 3.ppt
unit 3.pptunit 3.ppt
unit 3.ppt
 
What Is Software and Exploring Its Types A Comprehensive Guide
What Is Software and Exploring Its Types A Comprehensive GuideWhat Is Software and Exploring Its Types A Comprehensive Guide
What Is Software and Exploring Its Types A Comprehensive Guide
 
C LECTURE NOTES FULL_1.pdf
C LECTURE NOTES FULL_1.pdfC LECTURE NOTES FULL_1.pdf
C LECTURE NOTES FULL_1.pdf
 
Computer software and computer network
Computer software and computer networkComputer software and computer network
Computer software and computer network
 
Management Information System
Management Information SystemManagement Information System
Management Information System
 
Fg b
Fg bFg b
Fg b
 
B.Ed class-1
B.Ed class-1B.Ed class-1
B.Ed class-1
 
C program full materials.pdf
C program  full materials.pdfC program  full materials.pdf
C program full materials.pdf
 
1.7 selection and use of appropriate software
1.7 selection and use of appropriate software1.7 selection and use of appropriate software
1.7 selection and use of appropriate software
 
Presentation it
Presentation itPresentation it
Presentation it
 
EDUC 611_SYSTEM SOFTWARE, TECHNOLOGY INTEGRATION
EDUC 611_SYSTEM SOFTWARE, TECHNOLOGY INTEGRATIONEDUC 611_SYSTEM SOFTWARE, TECHNOLOGY INTEGRATION
EDUC 611_SYSTEM SOFTWARE, TECHNOLOGY INTEGRATION
 
Components of computer and organization
Components of computer and organizationComponents of computer and organization
Components of computer and organization
 
What is computer software, difference between hardware and software, types of...
What is computer software, difference between hardware and software, types of...What is computer software, difference between hardware and software, types of...
What is computer software, difference between hardware and software, types of...
 
BSC Software & Software engineering-UNIT-IV
BSC Software & Software engineering-UNIT-IVBSC Software & Software engineering-UNIT-IV
BSC Software & Software engineering-UNIT-IV
 
Infote groupwork 1
Infote groupwork 1Infote groupwork 1
Infote groupwork 1
 
c and data structures first unit notes (jntuh syllabus)
c and data structures first unit notes (jntuh syllabus)c and data structures first unit notes (jntuh syllabus)
c and data structures first unit notes (jntuh syllabus)
 
Computer ppt by nikund
Computer ppt by nikundComputer ppt by nikund
Computer ppt by nikund
 

More from Joel Briza

Management Information Systems - Chapter 3
Management Information Systems - Chapter 3Management Information Systems - Chapter 3
Management Information Systems - Chapter 3
Joel Briza
 
Management Information Systems - Chapter 2
Management Information Systems - Chapter 2Management Information Systems - Chapter 2
Management Information Systems - Chapter 2
Joel Briza
 
Management Information Technology - Chapter 1
Management Information Technology - Chapter 1Management Information Technology - Chapter 1
Management Information Technology - Chapter 1
Joel Briza
 
System analysis and design Part2
System analysis and design Part2System analysis and design Part2
System analysis and design Part2
Joel Briza
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
Joel Briza
 
Web programming and development - Introduction
Web programming and development - IntroductionWeb programming and development - Introduction
Web programming and development - Introduction
Joel Briza
 
Business software packages mkis
Business software packages   mkisBusiness software packages   mkis
Business software packages mkis
Joel Briza
 
Network security Encryption
Network security EncryptionNetwork security Encryption
Network security Encryption
Joel Briza
 
XML - Data Modeling
XML - Data ModelingXML - Data Modeling
XML - Data Modeling
Joel Briza
 
Business software packages - Accounting Software Systems
Business software packages - Accounting Software SystemsBusiness software packages - Accounting Software Systems
Business software packages - Accounting Software Systems
Joel Briza
 
Database management systems
Database management systemsDatabase management systems
Database management systems
Joel Briza
 

More from Joel Briza (11)

Management Information Systems - Chapter 3
Management Information Systems - Chapter 3Management Information Systems - Chapter 3
Management Information Systems - Chapter 3
 
Management Information Systems - Chapter 2
Management Information Systems - Chapter 2Management Information Systems - Chapter 2
Management Information Systems - Chapter 2
 
Management Information Technology - Chapter 1
Management Information Technology - Chapter 1Management Information Technology - Chapter 1
Management Information Technology - Chapter 1
 
System analysis and design Part2
System analysis and design Part2System analysis and design Part2
System analysis and design Part2
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
 
Web programming and development - Introduction
Web programming and development - IntroductionWeb programming and development - Introduction
Web programming and development - Introduction
 
Business software packages mkis
Business software packages   mkisBusiness software packages   mkis
Business software packages mkis
 
Network security Encryption
Network security EncryptionNetwork security Encryption
Network security Encryption
 
XML - Data Modeling
XML - Data ModelingXML - Data Modeling
XML - Data Modeling
 
Business software packages - Accounting Software Systems
Business software packages - Accounting Software SystemsBusiness software packages - Accounting Software Systems
Business software packages - Accounting Software Systems
 
Database management systems
Database management systemsDatabase management systems
Database management systems
 

Recently uploaded

Penify - Let AI do the Documentation, you write the Code.
Penify - Let AI do the Documentation, you write the Code.Penify - Let AI do the Documentation, you write the Code.
Penify - Let AI do the Documentation, you write the Code.
KrishnaveniMohan1
 
Refactoring legacy systems using events commands and bubble contexts
Refactoring legacy systems using events commands and bubble contextsRefactoring legacy systems using events commands and bubble contexts
Refactoring legacy systems using events commands and bubble contexts
Michał Kurzeja
 
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
kalichargn70th171
 
Photoshop Tutorial for Beginners (2024 Edition)
Photoshop Tutorial for Beginners (2024 Edition)Photoshop Tutorial for Beginners (2024 Edition)
Photoshop Tutorial for Beginners (2024 Edition)
alowpalsadig
 
Hands-on with Apache Druid: Installation & Data Ingestion Steps
Hands-on with Apache Druid: Installation & Data Ingestion StepsHands-on with Apache Druid: Installation & Data Ingestion Steps
Hands-on with Apache Druid: Installation & Data Ingestion Steps
servicesNitor
 
Orca: Nocode Graphical Editor for Container Orchestration
Orca: Nocode Graphical Editor for Container OrchestrationOrca: Nocode Graphical Editor for Container Orchestration
Orca: Nocode Graphical Editor for Container Orchestration
Pedro J. Molina
 
Ensuring Efficiency and Speed with Practical Solutions for Clinical Operations
Ensuring Efficiency and Speed with Practical Solutions for Clinical OperationsEnsuring Efficiency and Speed with Practical Solutions for Clinical Operations
Ensuring Efficiency and Speed with Practical Solutions for Clinical Operations
OnePlan Solutions
 
How GenAI Can Improve Supplier Performance Management.pdf
How GenAI Can Improve Supplier Performance Management.pdfHow GenAI Can Improve Supplier Performance Management.pdf
How GenAI Can Improve Supplier Performance Management.pdf
Zycus
 
Beginner's Guide to Observability@Devoxx PL 2024
Beginner's  Guide to Observability@Devoxx PL 2024Beginner's  Guide to Observability@Devoxx PL 2024
Beginner's Guide to Observability@Devoxx PL 2024
michniczscribd
 
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptxMigration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
ervikas4
 
Hyperledger Besu 빨리 따라하기 (Private Networks)
Hyperledger Besu 빨리 따라하기 (Private Networks)Hyperledger Besu 빨리 따라하기 (Private Networks)
Hyperledger Besu 빨리 따라하기 (Private Networks)
wonyong hwang
 
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
kalichargn70th171
 
Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7
Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7
Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7
manji sharman06
 
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
kgyxske
 
Boost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management AppsBoost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management Apps
Jhone kinadey
 
Going AOT: Everything you need to know about GraalVM for Java applications
Going AOT: Everything you need to know about GraalVM for Java applicationsGoing AOT: Everything you need to know about GraalVM for Java applications
Going AOT: Everything you need to know about GraalVM for Java applications
Alina Yurenko
 
TheFutureIsDynamic-BoxLang-CFCamp2024.pdf
TheFutureIsDynamic-BoxLang-CFCamp2024.pdfTheFutureIsDynamic-BoxLang-CFCamp2024.pdf
TheFutureIsDynamic-BoxLang-CFCamp2024.pdf
Ortus Solutions, Corp
 
Secure-by-Design Using Hardware and Software Protection for FDA Compliance
Secure-by-Design Using Hardware and Software Protection for FDA ComplianceSecure-by-Design Using Hardware and Software Protection for FDA Compliance
Secure-by-Design Using Hardware and Software Protection for FDA Compliance
ICS
 
Building API data products on top of your real-time data infrastructure
Building API data products on top of your real-time data infrastructureBuilding API data products on top of your real-time data infrastructure
Building API data products on top of your real-time data infrastructure
confluent
 
Software Test Automation - A Comprehensive Guide on Automated Testing.pdf
Software Test Automation - A Comprehensive Guide on Automated Testing.pdfSoftware Test Automation - A Comprehensive Guide on Automated Testing.pdf
Software Test Automation - A Comprehensive Guide on Automated Testing.pdf
kalichargn70th171
 

Recently uploaded (20)

Penify - Let AI do the Documentation, you write the Code.
Penify - Let AI do the Documentation, you write the Code.Penify - Let AI do the Documentation, you write the Code.
Penify - Let AI do the Documentation, you write the Code.
 
Refactoring legacy systems using events commands and bubble contexts
Refactoring legacy systems using events commands and bubble contextsRefactoring legacy systems using events commands and bubble contexts
Refactoring legacy systems using events commands and bubble contexts
 
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
 
Photoshop Tutorial for Beginners (2024 Edition)
Photoshop Tutorial for Beginners (2024 Edition)Photoshop Tutorial for Beginners (2024 Edition)
Photoshop Tutorial for Beginners (2024 Edition)
 
Hands-on with Apache Druid: Installation & Data Ingestion Steps
Hands-on with Apache Druid: Installation & Data Ingestion StepsHands-on with Apache Druid: Installation & Data Ingestion Steps
Hands-on with Apache Druid: Installation & Data Ingestion Steps
 
Orca: Nocode Graphical Editor for Container Orchestration
Orca: Nocode Graphical Editor for Container OrchestrationOrca: Nocode Graphical Editor for Container Orchestration
Orca: Nocode Graphical Editor for Container Orchestration
 
Ensuring Efficiency and Speed with Practical Solutions for Clinical Operations
Ensuring Efficiency and Speed with Practical Solutions for Clinical OperationsEnsuring Efficiency and Speed with Practical Solutions for Clinical Operations
Ensuring Efficiency and Speed with Practical Solutions for Clinical Operations
 
How GenAI Can Improve Supplier Performance Management.pdf
How GenAI Can Improve Supplier Performance Management.pdfHow GenAI Can Improve Supplier Performance Management.pdf
How GenAI Can Improve Supplier Performance Management.pdf
 
Beginner's Guide to Observability@Devoxx PL 2024
Beginner's  Guide to Observability@Devoxx PL 2024Beginner's  Guide to Observability@Devoxx PL 2024
Beginner's Guide to Observability@Devoxx PL 2024
 
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptxMigration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
 
Hyperledger Besu 빨리 따라하기 (Private Networks)
Hyperledger Besu 빨리 따라하기 (Private Networks)Hyperledger Besu 빨리 따라하기 (Private Networks)
Hyperledger Besu 빨리 따라하기 (Private Networks)
 
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
 
Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7
Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7
Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7
 
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
 
Boost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management AppsBoost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management Apps
 
Going AOT: Everything you need to know about GraalVM for Java applications
Going AOT: Everything you need to know about GraalVM for Java applicationsGoing AOT: Everything you need to know about GraalVM for Java applications
Going AOT: Everything you need to know about GraalVM for Java applications
 
TheFutureIsDynamic-BoxLang-CFCamp2024.pdf
TheFutureIsDynamic-BoxLang-CFCamp2024.pdfTheFutureIsDynamic-BoxLang-CFCamp2024.pdf
TheFutureIsDynamic-BoxLang-CFCamp2024.pdf
 
Secure-by-Design Using Hardware and Software Protection for FDA Compliance
Secure-by-Design Using Hardware and Software Protection for FDA ComplianceSecure-by-Design Using Hardware and Software Protection for FDA Compliance
Secure-by-Design Using Hardware and Software Protection for FDA Compliance
 
Building API data products on top of your real-time data infrastructure
Building API data products on top of your real-time data infrastructureBuilding API data products on top of your real-time data infrastructure
Building API data products on top of your real-time data infrastructure
 
Software Test Automation - A Comprehensive Guide on Automated Testing.pdf
Software Test Automation - A Comprehensive Guide on Automated Testing.pdfSoftware Test Automation - A Comprehensive Guide on Automated Testing.pdf
Software Test Automation - A Comprehensive Guide on Automated Testing.pdf
 

Business software packages

  • 2. Software Generic term for organized collections of data and instructions.
  • 3. 1. System Software 2. Application Software Two Basic Types of Software
  • 4. System Software performs certain fundamental tasks that all users of a particular computer require. These are tasks that relate to the hardware and not to the applications that the firm performs There are three (3) basic types of System Software: 1. Operating Systems 2. Utility Programs 3. Language Translators System Software
  • 5. The Operating System manages the computer’s processes, functioning as an interface connecting the user, the software that processes the firm’s data and the hardware Examples are: -UNIX -Windows -Linux -Mac OS Operating System
  • 6. 1. Schedule Tasks 2. Manage Hardware and Software Resources 3. Maintain System Security Password – a group of characters that identifies users as being authorized to have access to the system 4. Enable Multiple user Resource Sharing Multitasking – an OS feature that handles the scheduling and execution of programs for many users at the same time 5. Handle Interrupts Interrupt – a technique used by OS to suspend temporarily the processing of one program to allow execution of another program Basic Functions of an OS
  • 7. A utility program is a routine that enables the user to perform certain basic data processing operations that are not unique to a particular user’s applications. Utilities enable users to copy files, erase files, sort the contents of files, merge two or more files together, and preapre removable storage media for use. Other utilities allow lost or bad files recovery, monitor system performance and even control the flow of data bet. Users and computers. Utility Programs
  • 8. Translators, programming languages that translate the programmer’s instructions into those of the computer, were developed to proved a more friendly way to instruct the computer. Examples are: COBOL, C, C++, Java and Visual Basic Language Translators
  • 9. A fourth-generation language is one that expresses what is to be done by the computer without explicitly defining how the tasks will take place. Database Management System software contains 4GL in the form of query languages and report generator languages. Fourth Generation Languages (4GL)
  • 10. Application Software processes the firm’s data. Two basic types: 1. Prewritten 2. Custom Application Software
  • 11. Prewritten Application Packages also known as off-the-shelf application software, are produced by suppliers and sold to users. To use it, the users need only to install the software on their hardware, with little or no modification. Two important benefits: 1. It is available NOW 2. Less expensive than custom software Prewritten Application Software
  • 12. Custom Application Software, as it name suggests, are software written by business’ own computer programmers or consulting group of programmers to meet its needs.’ Custom Application Software
  • 13. Computer software that is simple and intuitive to use is frequently said to be user friendly. The term may elicit a negative connotation in that it implies that the application has been made very simplistic so that anyone can use it. Actually, it means that the application has been carefully engineered so that the varied talents and skills ofa wide range of users can be accommodated. The Role of User-Friendly Software
  • 15. Data Processing (DP) is the manipulation or transformation of such symbols as numbers and letters for the purpose of increasing their usefulness. Transaction Processing (TP), is data processing applied in business data. The two terms can be used interchangeably. What is Data Processing?
  • 16. A firm’s data processing tasks are performed by an accounting information system (AIS) that gathers data describing the firm’s activities, transforms the data into information and makes the information available to users both inside and outside the firm. Accounting Information System
  • 17.
  • 18. The AIS performs four basic data processing tasks: 1. Data Gathering 2. Data Manipulation 3. Data Storage 4. Document Preparation Data Processing Tasks
  • 19. As the firm provides products and services to its environment, each action is described by a data record. When the action involves an environmental element, it is called a transaction, hence the term transaction processing. The data processing system gathers the data that describe each of the firm’s internal actions and its environmental transactions. Data Gathering
  • 20. It is necesarry to manipulate the data to transform it into information. Data manipulation operations include: 1. Classifying 2. Sorting 3. Calculating 4. Summarizing Data Manipulation
  • 21. In a small firm there can be hundreds of transactions and actions each day; in a large firm there are thousands. Each transaction is described by several data elements. All of this data must be kept somewhere until it is needed., and that is the purpose of data storage. Data Storage
  • 22. The AIS produces outputs for individuals and organizations both inside and outside the firm. The output is triggered in two ways: • By an action Outputs are produced when something happens. An example is the bill that is prepared each time a customer order is filled. • By a time schedule Outputs are produced at a particular time. An example is a payroll check that is prepared each Friday. Document Preparation
  • 23. There are several characteristics of data processing that clearly distinguish the AIS from other Computer Based Information Systems: 1. Performs necessary tasks 2. Adheres to relatively standardized procedures 3. Handles detailed data 4. Has a primarily historical focus 5. Provides minimal problem-solving information Characteristics of the AIS
  • 24. A good example of an AIS is the one that is used by distribution firms – firms that distribute products or services to their customers. We call the system the distribution system. A Sample Accounting Information System