SlideShare a Scribd company logo
1 of 16
FUNDAMENTAL ELEMENTS OF THE COMPUTER The Software
Computer software may be defined as: computer programs, procedures, rules, associated documentation and data pertaining to the operation of a computer system
A single program or a collection of programs which performs many task and/or system related functions Software is the detailed instructions that control the operation of hardware. Without software, hardware can not extend its capabilities or utilities
Software Programming Language Application  Operating System
PROGRAMMING LANGUAGES ARE USED TO CREATE ALL OTHER PROGRAMS WHETHER IT IS AN OPERATING SYSTEM OR APPLICATION SOFTWARE.
OPERATING SYSTEM CONTROLS THE COMPUTER APPLICATIONS AND KEEP ALL THE HARDWARE RUNS SMOOTHLY.
APPLICATION SOFTWARE THIS ARE PROGRAM THAT PEOPLE USE TO GET THEIR WORK DONE.
CATEGORY OF SOFTWARE PROPRIETARY-  THIS IS PROTECTED BY LAWS, IT WAS OWNED BY A PARTICULAR PERSON OR GROUPS OF PERSON. OPEN SYSTEM OR OPEN SOURCE- THIS CAN BE MODIFIED, NOT EXCLUSIVE PROPERTY OR PARTICULAR VENDOR.
Freeware  Freeware is also downloadable in the Internet and free of charge. Often freeware is only free for personal use, while commercial use requires a paid license.
SHAREWARE THIS SOFTWARE IS DOWNLOADABLE FROM THE INTERNET. LICENSES DIFFER, BUT COMMONLY THE USER IS ALLOWED TO TRY THE PROGRAM FOR FREE, FOR A PERIOD STIPULATED IN THE LICENSE, USUALLY THIRTY DAYS. AT THE END OF THE TRIAL PERIOD, THE SOFTWARE MUST BE PURCHASED OR UNINSTALLED.
CRIPPLEWARE	 THIS SOFTWARE IS SIMILAR TO SHAREWARE EXCEPT THAT KEY FEATURES WILL CEASE TO WORK AFTER THE TRIAL PERIOD HAS ENDED. FOR EXAMPLE, THE "SAVE" FUNCTION, THE PRINT FUNCTION, OR SOME OTHER VITAL FEATURE NECESSARY TO USE THE PROGRAM EFFECTIVELY MAY BECOME UNUSABLE.
Adware	  This is free software that is supported by advertisements built into the program itself. Some adware requires a live Internet feed and uses constant bandwidth to upload new advertisements.
MALWARE short for malicious software, consists of programming designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior
SPYWARE ,[object Object]

More Related Content

What's hot

Five ways to Securing and Hardening your Windows 10 system
Five ways to Securing and Hardening your Windows 10 systemFive ways to Securing and Hardening your Windows 10 system
Five ways to Securing and Hardening your Windows 10 systemFemi Baiyekusi
 
Dronesafe™ Flyer - Simply connect, stream and comply
Dronesafe™ Flyer  - Simply connect, stream and complyDronesafe™ Flyer  - Simply connect, stream and comply
Dronesafe™ Flyer - Simply connect, stream and complyPaul New
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacyVikas Patel
 
The Remote Manage App for Configuration Manager Webinar!
The Remote Manage App for Configuration Manager Webinar!The Remote Manage App for Configuration Manager Webinar!
The Remote Manage App for Configuration Manager Webinar!Cireson
 
Publicidad de los programas (1)
Publicidad de los programas (1)Publicidad de los programas (1)
Publicidad de los programas (1)GABO
 
Quick Heal
Quick HealQuick Heal
Quick Healdheva B
 
Publicidad de los programas
Publicidad de los programasPublicidad de los programas
Publicidad de los programasGABO
 
Sa No Scan Paper
Sa No Scan PaperSa No Scan Paper
Sa No Scan Papertafinley
 
A14 esenovsh
A14 esenovshA14 esenovsh
A14 esenovsh7474646s
 
Software Failure Air Traffic Control System
Software Failure Air Traffic Control SystemSoftware Failure Air Traffic Control System
Software Failure Air Traffic Control SystemShakeel Ahmed
 
POC-Netsparker
POC-NetsparkerPOC-Netsparker
POC-NetsparkerRaj Sawant
 
O P Manager
O P  ManagerO P  Manager
O P Managerblakka
 
Vulnerability , Malware and Risk
Vulnerability , Malware and RiskVulnerability , Malware and Risk
Vulnerability , Malware and RiskSecPod Technologies
 
A Brief Overview of Adware
A Brief Overview of Adware A Brief Overview of Adware
A Brief Overview of Adware SpeedMaxPC
 

What's hot (20)

Malware
MalwareMalware
Malware
 
Five ways to Securing and Hardening your Windows 10 system
Five ways to Securing and Hardening your Windows 10 systemFive ways to Securing and Hardening your Windows 10 system
Five ways to Securing and Hardening your Windows 10 system
 
Dronesafe™ Flyer - Simply connect, stream and comply
Dronesafe™ Flyer  - Simply connect, stream and complyDronesafe™ Flyer  - Simply connect, stream and comply
Dronesafe™ Flyer - Simply connect, stream and comply
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
The Remote Manage App for Configuration Manager Webinar!
The Remote Manage App for Configuration Manager Webinar!The Remote Manage App for Configuration Manager Webinar!
The Remote Manage App for Configuration Manager Webinar!
 
Reflexion rtc
Reflexion rtcReflexion rtc
Reflexion rtc
 
Publicidad de los programas (1)
Publicidad de los programas (1)Publicidad de los programas (1)
Publicidad de los programas (1)
 
Quick Heal
Quick HealQuick Heal
Quick Heal
 
Publicidad de los programas
Publicidad de los programasPublicidad de los programas
Publicidad de los programas
 
QuickHeal Anti-Virus
QuickHeal Anti-VirusQuickHeal Anti-Virus
QuickHeal Anti-Virus
 
Sa No Scan Paper
Sa No Scan PaperSa No Scan Paper
Sa No Scan Paper
 
Swascan
Swascan Swascan
Swascan
 
A14 esenovsh
A14 esenovshA14 esenovsh
A14 esenovsh
 
Software Failure Air Traffic Control System
Software Failure Air Traffic Control SystemSoftware Failure Air Traffic Control System
Software Failure Air Traffic Control System
 
POC-Netsparker
POC-NetsparkerPOC-Netsparker
POC-Netsparker
 
Ch. 3 computer virus
Ch. 3 computer virusCh. 3 computer virus
Ch. 3 computer virus
 
Ninja tune up
Ninja tune upNinja tune up
Ninja tune up
 
O P Manager
O P  ManagerO P  Manager
O P Manager
 
Vulnerability , Malware and Risk
Vulnerability , Malware and RiskVulnerability , Malware and Risk
Vulnerability , Malware and Risk
 
A Brief Overview of Adware
A Brief Overview of Adware A Brief Overview of Adware
A Brief Overview of Adware
 

Viewers also liked

Fundamental elements of computer
Fundamental elements of computerFundamental elements of computer
Fundamental elements of computerJesus Obenita Jr.
 
M4 Computing - Lesson 3 - How A Computer Works
M4 Computing - Lesson 3 - How A Computer WorksM4 Computing - Lesson 3 - How A Computer Works
M4 Computing - Lesson 3 - How A Computer WorksJamie Hutt
 
Computer Hardware and Software Elements
Computer Hardware and Software ElementsComputer Hardware and Software Elements
Computer Hardware and Software ElementsAdetula Bunmi
 
Elements of Computer
Elements  of ComputerElements  of Computer
Elements of ComputerLUZ PINGOL
 
The elements of a computer system
The elements of a computer systemThe elements of a computer system
The elements of a computer systemMary Zharina
 
Lesson 3.0 basic parts and functions of computer
Lesson 3.0   basic parts and functions of computerLesson 3.0   basic parts and functions of computer
Lesson 3.0 basic parts and functions of computerJoshua Hernandez
 
Parts and Function of Computer
Parts and Function of ComputerParts and Function of Computer
Parts and Function of ComputerRhenan Belisario
 
COMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONSCOMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONSAngel Mary George
 

Viewers also liked (9)

Fundamental elements of computer
Fundamental elements of computerFundamental elements of computer
Fundamental elements of computer
 
M4 Computing - Lesson 3 - How A Computer Works
M4 Computing - Lesson 3 - How A Computer WorksM4 Computing - Lesson 3 - How A Computer Works
M4 Computing - Lesson 3 - How A Computer Works
 
Types of Computer Memory
Types of Computer MemoryTypes of Computer Memory
Types of Computer Memory
 
Computer Hardware and Software Elements
Computer Hardware and Software ElementsComputer Hardware and Software Elements
Computer Hardware and Software Elements
 
Elements of Computer
Elements  of ComputerElements  of Computer
Elements of Computer
 
The elements of a computer system
The elements of a computer systemThe elements of a computer system
The elements of a computer system
 
Lesson 3.0 basic parts and functions of computer
Lesson 3.0   basic parts and functions of computerLesson 3.0   basic parts and functions of computer
Lesson 3.0 basic parts and functions of computer
 
Parts and Function of Computer
Parts and Function of ComputerParts and Function of Computer
Parts and Function of Computer
 
COMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONSCOMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONS
 

Similar to Fundamental elements of the computer software

Types of software, advantages and disadvantages
Types of software, advantages and disadvantagesTypes of software, advantages and disadvantages
Types of software, advantages and disadvantagesRocket11986
 
software4-150511081405-lva1-app6892 2.pdf
software4-150511081405-lva1-app6892 2.pdfsoftware4-150511081405-lva1-app6892 2.pdf
software4-150511081405-lva1-app6892 2.pdfsachin325314
 
Opeating system programs
Opeating system programsOpeating system programs
Opeating system programsJotham Gadot
 
Software licences
Software licencesSoftware licences
Software licencesOriginalGSM
 
Class work 3_computer_network_317
Class work 3_computer_network_317Class work 3_computer_network_317
Class work 3_computer_network_317Khondoker Sadia
 
How to Identify Potentially Unwanted Applications
How to Identify Potentially Unwanted ApplicationsHow to Identify Potentially Unwanted Applications
How to Identify Potentially Unwanted ApplicationsOPSWAT
 

Similar to Fundamental elements of the computer software (20)

Types Of Software
Types Of SoftwareTypes Of Software
Types Of Software
 
Software tpyes
Software tpyesSoftware tpyes
Software tpyes
 
Types of software, advantages and disadvantages
Types of software, advantages and disadvantagesTypes of software, advantages and disadvantages
Types of software, advantages and disadvantages
 
Software (4).ppt
Software (4).pptSoftware (4).ppt
Software (4).ppt
 
Software
SoftwareSoftware
Software
 
software4-150511081405-lva1-app6892 2.pdf
software4-150511081405-lva1-app6892 2.pdfsoftware4-150511081405-lva1-app6892 2.pdf
software4-150511081405-lva1-app6892 2.pdf
 
Playrlic
PlayrlicPlayrlic
Playrlic
 
License
LicenseLicense
License
 
Opeating system programs
Opeating system programsOpeating system programs
Opeating system programs
 
License
LicenseLicense
License
 
Software licences
Software licencesSoftware licences
Software licences
 
Class work 3_computer_network_317
Class work 3_computer_network_317Class work 3_computer_network_317
Class work 3_computer_network_317
 
LicenseFs 4
LicenseFs 4LicenseFs 4
LicenseFs 4
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
Computer software
Computer softwareComputer software
Computer software
 
How to Identify Potentially Unwanted Applications
How to Identify Potentially Unwanted ApplicationsHow to Identify Potentially Unwanted Applications
How to Identify Potentially Unwanted Applications
 
Dtl 2012 kl-app_ctl1.2
Dtl 2012 kl-app_ctl1.2Dtl 2012 kl-app_ctl1.2
Dtl 2012 kl-app_ctl1.2
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 

More from Jesus Obenita Jr.

More from Jesus Obenita Jr. (20)

Organization and management 3 a Evolution of Management Theory
Organization and management 3 a Evolution of Management TheoryOrganization and management 3 a Evolution of Management Theory
Organization and management 3 a Evolution of Management Theory
 
Organization and management 2 Management Function
Organization and management 2 Management FunctionOrganization and management 2 Management Function
Organization and management 2 Management Function
 
Organization and management 1
Organization and management 1Organization and management 1
Organization and management 1
 
Designing web page marquee and img tag
Designing web page  marquee and img tagDesigning web page  marquee and img tag
Designing web page marquee and img tag
 
Ms excel 2013 formatting worksheets
Ms excel 2013 formatting worksheetsMs excel 2013 formatting worksheets
Ms excel 2013 formatting worksheets
 
Ms excel 2013 data management
Ms excel 2013 data managementMs excel 2013 data management
Ms excel 2013 data management
 
Microsoft Excel introduction
Microsoft Excel introductionMicrosoft Excel introduction
Microsoft Excel introduction
 
Word 2013 working with pictures
Word 2013 working with picturesWord 2013 working with pictures
Word 2013 working with pictures
 
Word 2013 Formatting Page
Word 2013 Formatting PageWord 2013 Formatting Page
Word 2013 Formatting Page
 
Word 2013 8
Word 2013 8Word 2013 8
Word 2013 8
 
Ms word 2013 7
Ms word 2013 7Ms word 2013 7
Ms word 2013 7
 
Ms word 2013 6
Ms word 2013 6Ms word 2013 6
Ms word 2013 6
 
Ms word 2013 4
Ms word 2013 4Ms word 2013 4
Ms word 2013 4
 
Ms word 2013 2
Ms word 2013 2Ms word 2013 2
Ms word 2013 2
 
Ms word 2013
Ms word 2013Ms word 2013
Ms word 2013
 
Parts of the ms word 2013 screen and
Parts of the ms word 2013 screen andParts of the ms word 2013 screen and
Parts of the ms word 2013 screen and
 
Word processor
Word processorWord processor
Word processor
 
Session 2 test construction.mt's
Session 2   test construction.mt'sSession 2   test construction.mt's
Session 2 test construction.mt's
 
Cooking ingredients
Cooking ingredientsCooking ingredients
Cooking ingredients
 
Color theory
Color theoryColor theory
Color theory
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Fundamental elements of the computer software

  • 1. FUNDAMENTAL ELEMENTS OF THE COMPUTER The Software
  • 2.
  • 3. Computer software may be defined as: computer programs, procedures, rules, associated documentation and data pertaining to the operation of a computer system
  • 4. A single program or a collection of programs which performs many task and/or system related functions Software is the detailed instructions that control the operation of hardware. Without software, hardware can not extend its capabilities or utilities
  • 5. Software Programming Language Application Operating System
  • 6. PROGRAMMING LANGUAGES ARE USED TO CREATE ALL OTHER PROGRAMS WHETHER IT IS AN OPERATING SYSTEM OR APPLICATION SOFTWARE.
  • 7.
  • 8. OPERATING SYSTEM CONTROLS THE COMPUTER APPLICATIONS AND KEEP ALL THE HARDWARE RUNS SMOOTHLY.
  • 9. APPLICATION SOFTWARE THIS ARE PROGRAM THAT PEOPLE USE TO GET THEIR WORK DONE.
  • 10. CATEGORY OF SOFTWARE PROPRIETARY- THIS IS PROTECTED BY LAWS, IT WAS OWNED BY A PARTICULAR PERSON OR GROUPS OF PERSON. OPEN SYSTEM OR OPEN SOURCE- THIS CAN BE MODIFIED, NOT EXCLUSIVE PROPERTY OR PARTICULAR VENDOR.
  • 11. Freeware Freeware is also downloadable in the Internet and free of charge. Often freeware is only free for personal use, while commercial use requires a paid license.
  • 12. SHAREWARE THIS SOFTWARE IS DOWNLOADABLE FROM THE INTERNET. LICENSES DIFFER, BUT COMMONLY THE USER IS ALLOWED TO TRY THE PROGRAM FOR FREE, FOR A PERIOD STIPULATED IN THE LICENSE, USUALLY THIRTY DAYS. AT THE END OF THE TRIAL PERIOD, THE SOFTWARE MUST BE PURCHASED OR UNINSTALLED.
  • 13. CRIPPLEWARE THIS SOFTWARE IS SIMILAR TO SHAREWARE EXCEPT THAT KEY FEATURES WILL CEASE TO WORK AFTER THE TRIAL PERIOD HAS ENDED. FOR EXAMPLE, THE "SAVE" FUNCTION, THE PRINT FUNCTION, OR SOME OTHER VITAL FEATURE NECESSARY TO USE THE PROGRAM EFFECTIVELY MAY BECOME UNUSABLE.
  • 14. Adware This is free software that is supported by advertisements built into the program itself. Some adware requires a live Internet feed and uses constant bandwidth to upload new advertisements.
  • 15. MALWARE short for malicious software, consists of programming designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior
  • 16.