SlideShare a Scribd company logo
Computer software, or simply software, is a collection of data or computer
instructions that tell the computer how to work.
There are two types of software −
1.System Software
2.Application Software
System Software
 The system software is a collection of programs
designed to operate, control, and extend the
processing capabilities of the computer itself.
 System software is generally prepared by the
computer manufacturers.
 These software products comprise of programs
written in low-level languages, which interact
with the hardware at a very basic level.
 System software serves as the interface between
the hardware and the end users.
 Some examples of system software are Operating
System, Compilers, Interpreter, Assemblers, etc.
 Close to the system
 Fast in speed
 Difficult to design
 Difficult to understand
 Less interactive
 Smaller in size
 Difficult to manipulate
 Generally written in low-level language
 Application software products are designed to satisfy
a particular need of a particular environment.
 All software applications prepared in the computer
lab can come under the category of Application
software.
 Application software may consist of a single
program, such as Microsoft's notepad for writing and
editing a simple text.
 It may also consist of a collection of programs, often
called a software package, which work together to
accomplish a task, such as a spreadsheet package
 Close to the user
 Easy to design
 More interactive
 Slow in speed
 Generally written in high-level language
 Easy to understand
 Easy to manipulate and use
 Bigger in size and requires large storage
space
 Operating system
 Device drivers
 Language translators
 System utilities
 A program that acts as an intermediary between a
user of a computer and the computer hardware
 Operating system goals:
› Execute user programs and make solving user
problems easier
› Make the computer system convenient to use
› Use the computer hardware in an efficient manner
 A collection of programs which control the
resources of a computer system.
 Written in low-level language(machine
dependent)
 An interface between users and hardware
 When the computer is on ,OS will first load into
the main memory
 Process Management
 The process management activities handled by
the OS are—
1. control access to shared resources like file,
memory, I/O and CPU
2. control execution of applications
3. create, execute and delete a process (system
process or user process)
4. cancel or resume a process
5. schedule a process
6. synchronization, communication and deadlock
handling for processes.
 Memory Management
 The activities of memory management handled
by OS are—
1. allocate memory
2. free memory
3. re-allocate memory to a program when a used
block is freed
4. keep track of memory usage
 File Management
 The file management tasks include —
1. create and delete both files and directories
2. provide access to files
3. allocate space for files
4. keep back-up of files
5. secure files
 Device Management
 The device management tasks handled by OS are—
1. open, close and write device drivers
2. communicate, control and monitor the device driver
 Protection and Security
 OS protects the resources of system. User authentication,
file attributes like read, write, encryption, and back-up of
data are used by OS to provide basic protection.
 User Interface or Command Interpreter
 Operating system provides an interface between the
computer user and the computer hardware. The user
interface is a set of commands or a graphical user
interface via which the user interacts with the
applications and the hardware.
 device driver or hardware driver is a group
of files that enable one or more hardware devices
to communicate with the computer's operating
system.
 Without drivers, the computer would not be able
to send and receive data correctly to hardware
devices
 If the appropriate driver is not installed, the
device may not function properly, if at all
 When buying an operating system, many device
drivers are built into the product.
 if a user later buys a new type of device that the
operating system did not anticipate, the new
device driver will have to be installed.
 A device driver essentially allows smooth
communication between a connected hardware
device and the operating system (OS).
 A driver acts as a translator between the device
and program
 Each device has its own set of specialized
commands that only its driver understands
 Eg: print instruction given by user/ program . Os
connect that program with driver. Driver invoke
corresponding set of code to print the data
 It is a program which is used to translate
instructions that are written in the source code to
object code
 Translate from high-level language or
assembly language into machine language.
 It also detects and reports the error during
translation.
Compiler
 Compiler is a translator which is used to convert programs in high-level
language to low-level language.
 It translates the entire program and also reports the errors in source program
encountered during the translation.
Interpreter
 Interpreter is a translator which is used to convert programs in high-level
language to low-level language
 Interpreter translates line by line and reports the error once it encountered
during the translation process.
 It directly executes the operations specified in the source program when the
input is given by the user.
 It gives better error diagnostics than a compiler.
Assembler
 Assembler is a translator which is used to translate the assembly language
code into machine language code.
system utility
 A utility or system utility is computer system
software intended to analyze, configure, monitor,
or help maintain a computer.
 Operating systems typically contain the
necessary tools for this, but separate utility
programs can provide improved functionality
 a utility is smaller than a standard program in
size and may be included with an operating
system or installed separately.
.
1.Antivirus
 A virus can be defined as a malicious program
that attaches itself to a host program and makes
multiple copies of itself, slowing down,
corrupting or destroying the system.
 A software that assists the OS in providing virus
free environment to the users is called antivirus.
 An anti-virus scans the system for any virus and
if detected, gets rid of it by deleting or isolating it
2.File management tools
 file management is an important function of
operating systems as all data and instructions are
stored in the computer in form of files.
 Utility software providing regular file
management tasks like browse, search, update,
preview, etc. are called file management tools.
3. Disk Cleanup
 Disk cleanup tools assist users in freeing up disk
space. The software scans hard disks to find files
that are no longer used and frees up space by
deleting them.
4.Compression tools
 operating systems are always looking at ways to
minimize amount of storage space taken by files.
 Compression tools are utilities that assist
operating systems in shortening files so that they
take less space.
 After compression files are stored in a different
format and cannot be read or edited directly.
 It needs to be uncompressed before it can be
accessed for further use.
 WinRAR, PeaZip, The Unarchiver, etc.
5 . Disk Defragmenter
 Disk defragmenter is a disk management
utility that increases file access speeds by
rearranging fragmented files on contiguous
locations.
 Large files are broken down into fragments and
may be stores in non-contiguous locations if
contiguous ones are not available.
 When such files are accessed by the user, access
speed is slow due to fragmentation.
 Disk defragmenter utility scans the hard disk and
tries to assemble file fragments so that they may
be stored in contiguous locations.
6. Backup
 Backup utility enables backing up of files,
folders, databases or complete disks.
 Backups are taken so that data may be restored in
case of data loss.
 Backup is a service provided by all operating
systems.
 In stand-alone systems backup may be taken in
the same or different drive.
 In case of networked systems backup may be
done on backup servers.
Types of application software
 Applications software is capable of dealing with user
inputs and helps the user to complete the task.
 It is also called end-user programs or only an app. It
resides above system software.
 Application Software are Word processing
software, Spreadsheets Software, Presentation,
Graphics, CAD/CAM
 Types of Application Software: According to the
need of users it is categorized into following types.

 Presentation program is a program to show the
information in the form of slides. We can add text,
graphics video and images to slides to make them
more informative.
 The software has three components:
1) Text editor for inputting and formatting text.
2) Inserting graphics, text, video and other multimedia
files.
3) Slideshow to display the information.
 Presentation software helps the presenter to present
their ideas with ease and visual information easy to
understand.
 Example of presentation software: Microsoft's
PowerPoint and Apple's Keynote.
 Spreadsheet software is used to perform manipulation
and calculations on data.
 In spreadsheet software data, is stored in intersection of
row and column.
 The intersection of row and column is known as a cell.
 The cell labelled with the row and column label like A1,
A2 etc.
 While entering data into the cell, we can also define the
data value like text, date, time, number.
 It provides many formula and function to perform
calculations like arithmetic operations, logical
operations, text operation etc.
 It provides charts, graphs to display data graphically.
 For example Microsoft Excel, lotus 1-2-3 for windows
and number for MAC OS.
 Database is a collection of data related to any
applications.
 every application has some database where data
regarding to the users are stored.
 For this purpose, we used database software. When
we operate the application data is accessed from the
database, and after manipulation, it gets back stored
in the database.
 Database Management System (DBMS) software
tool used for storing, modifying extracting and
searching for information within a database.
 MySQL, MS Access, Microsoft SQL Server and
Oracle is the example of database application
Software.
 Multimedia is a combination of text, graphics, audio
and Multimedia software used in the editing of
video, audio and text.
 Multimedia software used in the growth of business,
educations, information, remote system and
entertainment.
 Entertainment: This area deal with the general
public, media and telecommunication. With the
growth entertainment mode, many application is
available for mobile phone as well as the system.
Like Music and video entertainment app, navigation
app, social networking application, news and
weather application, educational apps and e-book
reader’s app for preparation of any type of exams.
 Process of modeling a real phenomenon with a set of
mathematical formulas.
 A program that allows the users to observe an operation
through simulation without performing that operation.
 Simulation is an imitation of real world and environment.
 The simulation creates a physical environment of the real
world to represent the similar behavior, function and key
nature of the selected topic.
 Simulation is technology for education, engineering, testing,
training, video games and for scientific modeling of natural
systems to gain insight into their functioning.
 Area of technology : flight, economics, automobiles,
Robotics, weather.
 Word Processing software is used to manipulate, format the text,
to create memos, letters, faxes and documents.
 word Processing Software is used to format and beautify the
text.
 It provides a list of features , the option provides synonyms,
antonyms and related words for chosen word or phrase.
 Find and replace feature enables users to scan and replace
selected words or phrases in the document.
 Font option provides font colours , font style, font effect, font
size to modify the txt.
 Word Art option to modify or animated titles, hyphens, columns
and text boxes in documents.
 Grammar and Spelling check option available for checking
errors. Many more option is listed here in software.
 For example Microsoft Word, Lotus Word Pro, Word pad
and Corel WordPerfect.
 Used to describe the creation of printed
documents using a desktop computer.
 It is a technique of using a personal computer to
design image and pages, assemble type and
graphics, and then using a laser printer or image
setter output the assembled pages onto a paper,
film, or printing plate.
 Software is used for creation of magazines and
books, newsletters etc.
 • System software gets installed when the operating system is
installed on the computer while application software is
installed according to the requirements of the user.
 • System software includes programs such as compilers,
debuggers, drivers, assemblers while application software
includes media players, word processors, and spreadsheet
programs.
 • Generally, users do not interact with system software as it
works in the background whereas users interact with
application software while doing different activities.
 • A computer may not require more than one type of system
software while there may be a number of application software
programs installed on the computer at the same time.
 • System software can run independently of the application
software while application software cannot run without the
presence of the system software.
 It is the unauthorized copying of an
organization’s internally developed software
 Illegal duplication of commercially available
software.
 Software piracy is the illegal copying,
distribution, or use of software
 The majority of software today is purchased as a
one-site license, meaning that only one computer
may have that software installed on it at one time
 Copying that software to multiple computers or
sharing it with your friend without multiple
licenses is considered software piracy, which is
illegal.
 Software piracy comes in many different forms.
1. soft loading
 Also known as soft lifting
 Sharing of software with someone who is not
authorized by the license agreement.
 Purchasing a single licensed copy of software
and loading that software onto many several
computers.
 Eg: sharing software with friends, co-workers
 2.software counterfeiting
 Producing fake copies of software and making it
look authentic
 This involve providing packaging box, CDs or
floppies all designed to look like original product
 Counterfeit software is sold on street corners,
unknowingly sold in retail store.
 Counterfeit software is sold at prices far below
the actual price
 3. Internet downloading
 Fastest growing form of piracy
 With the growing number of online users and
rapidly increasing connection speeds, the
exchange of software on internet Increased
 There are many sites that allow users to
unlimited downloading of software(warez sites).
 Warez sites is craked to eliminate any copy of
protection.
4. Renting
 Renting out a copy of software for temporary
use, without the permission of the copyright
holder.
 Eg: renting a video of a movie, violates the
license agreement.
5. Hard disk loading
 Installing an unauthorized copy of software onto
a computer being sold to the end user.
 It is often committed by hardware dealers.
 6. license misuse
 Software is distributed under special discount
licenses to high volume customers,
manufacturers or academic institutions.
 After getting a copy of software, it will
redistribute the software to others who do not
hold or qualify for these license
 The ways license can be misused:
1. Original equipment manufacturer unbundling
2. Academic product misuse
3. not for resale product misuse
1. Public domain software
 Public domain software is any software that has no
legal copyright or editing restrictions associated with
it.
 Public domain software has no ownership and is
available for use, modification and
commercialization by anyone.
 It is free and open-source software that can be
publicly modified, distributed or sold without any
restrictions.
 It is different from free software and freeware that
does has copyrights and patents associated with it.
 SQLite, I2P and CERN httpd are popular examples
of public domain software.
 2. freeware
 Freeware is any copyrighted software, application or program
that may be freely downloaded, installed, used and shared.
 Such programs are available for use at no cost to general end
users.
 Freeware differs from free software, as the latter allows a user
to modify source code for republishing or integration with
other software.
 As small software utilities, freeware is free to use throughout
its lifetime because it does not expire after a certain period.
 Freeware may be used for a desktop, mobile or Web-based
utility.
 Generally, freeware is a concise and limited version of a
larger and paid software program.
 large independent software vendors (ISV) publish freeware
to enhance brand buzz and market reputation.
 Available free of cost
 Can be distributed free of cost Some
examples of freeware software are –
 Adobe PDF
 yahoo messenger
 Google Talk
 MSN messenger
 3 .shareware
 Shareware is software that is distributed free on a
trial basis with the understanding that the user
may need or want to pay for it later.
 Some software developers offer a shareware
version of their program with a built-in
expiration date (after 30 days, the user can no
longer get access to the program).
 Other shareware (sometimes called liteware) is
offered with certain capabilities disabled as an
enticement to buy the complete version of the
program.
 4. Commercial software is any software or program
that is designed and developed for licensing or sale
to end users or that serves a commercial purpose.
 Commercial software was once considered to be
proprietary software, but now a number of free and
open-source software applications are licensed or
sold to end users.
 games or other software those sold in computer
specialty stores or even music stores and grocery
stores, are some examples of commercial software.
 Microsoft products such as the Windows Operating
System and MS Office are some of the most well-
known examples of commercial software.
 5.Open source software is software with source
code that anyone can inspect, modify, and enhance.
 Open-source software (OSS) is software that is
distributed with source code that may be read or
modified by users.
 The OSS community generally agrees that open-
source software should meet the following criteria:
 The program must be freely distributed
 Source code must be included with the program
 Anyone must be able to modify the source code
 Modified versions of the source code may be
redistributed
 6. Proprietary software is any software that is
copyrighted and bears limits against use,
distribution and modification that are imposed by
its publisher, vendor or developer.
 Proprietary software remains the property of its
owner/creator and is used by end-
users/organizations under predefined conditions.
 Proprietary software may also be called closed-
source software or commercial software.
 Proprietary software is primarily commercial
software
 It can be purchased or licensed for fee, but
relicensing, distribution or copying is prohibited.
 7. Firmware is a software program or set of instructions
programmed on a hardware device.
 It provides the necessary instructions for how the device
communicates with the other computer hardware.
 hardware device such as a keyboards, hard drive, BIOS,
or video cards.
 It is programmed to give permanent instructions to
communicate with other devices and perform functions
like basic input/output tasks.
 Firmware is typically stored in the flash ROM (read
only memory) of a hardware device. It can be erased and
rewritten.
 Firmware also retains the basic instructions for hardware
devices that make them operative. Without firmware, a
hardware device would be non-functional.
SOFTWARE PARADIGM

More Related Content

What's hot

Programming Fundamental Presentation
Programming Fundamental PresentationProgramming Fundamental Presentation
Programming Fundamental Presentation
fazli khaliq
 
Unit 4 sp macro
Unit 4 sp macroUnit 4 sp macro
Unit 4 sp macro
Deepmala Sharma
 
System calls
System callsSystem calls
System calls
Bernard Senam
 
Exception Handling in VB.Net
Exception Handling in VB.NetException Handling in VB.Net
Exception Handling in VB.Net
rishisingh190
 
Introduction to Algorithms & flow charts
Introduction to Algorithms & flow chartsIntroduction to Algorithms & flow charts
Introduction to Algorithms & flow charts
Yash Gupta
 
Web engineering - MVC
Web engineering - MVCWeb engineering - MVC
Web engineering - MVC
Nosheen Qamar
 
Polymorphism and its types
Polymorphism and its typesPolymorphism and its types
Polymorphism and its types
Suraj Bora
 
Component based software engineering
Component based software engineeringComponent based software engineering
Component based software engineering
Charotar University Of Science And Technology,Gujrat
 
Procedure oriented programming
Procedure oriented programmingProcedure oriented programming
Procedure oriented programming
MrShahbazRafiq
 
Application layer protocol - Electronic Mail
Application layer protocol - Electronic MailApplication layer protocol - Electronic Mail
Application layer protocol - Electronic Mail
AmishaSahu3
 
Integrated Development Environments (IDE)
Integrated Development Environments (IDE) Integrated Development Environments (IDE)
Integrated Development Environments (IDE)
SeanPereira2
 
VB Function and procedure
VB Function and procedureVB Function and procedure
VB Function and procedurepragya ratan
 
INLINE FUNCTION IN C++
INLINE FUNCTION IN C++INLINE FUNCTION IN C++
INLINE FUNCTION IN C++
Vraj Patel
 
Function overloading and overriding
Function overloading and overridingFunction overloading and overriding
Function overloading and overriding
Rajab Ali
 
Visual Basic menu
Visual Basic menuVisual Basic menu
Visual Basic menu
kuldeep94
 
Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]Ravindra Raju Kolahalam
 
Ch 4 linker loader
Ch 4 linker loaderCh 4 linker loader
Ch 4 linker loader
Malek Sumaiya
 

What's hot (20)

Programming Fundamental Presentation
Programming Fundamental PresentationProgramming Fundamental Presentation
Programming Fundamental Presentation
 
Unit 4 sp macro
Unit 4 sp macroUnit 4 sp macro
Unit 4 sp macro
 
System calls
System callsSystem calls
System calls
 
Exception Handling in VB.Net
Exception Handling in VB.NetException Handling in VB.Net
Exception Handling in VB.Net
 
Introduction to Algorithms & flow charts
Introduction to Algorithms & flow chartsIntroduction to Algorithms & flow charts
Introduction to Algorithms & flow charts
 
Assembly Language
Assembly LanguageAssembly Language
Assembly Language
 
Web engineering - MVC
Web engineering - MVCWeb engineering - MVC
Web engineering - MVC
 
Polymorphism and its types
Polymorphism and its typesPolymorphism and its types
Polymorphism and its types
 
Component based software engineering
Component based software engineeringComponent based software engineering
Component based software engineering
 
Procedure oriented programming
Procedure oriented programmingProcedure oriented programming
Procedure oriented programming
 
Application layer protocol - Electronic Mail
Application layer protocol - Electronic MailApplication layer protocol - Electronic Mail
Application layer protocol - Electronic Mail
 
Integrated Development Environments (IDE)
Integrated Development Environments (IDE) Integrated Development Environments (IDE)
Integrated Development Environments (IDE)
 
VB Function and procedure
VB Function and procedureVB Function and procedure
VB Function and procedure
 
INLINE FUNCTION IN C++
INLINE FUNCTION IN C++INLINE FUNCTION IN C++
INLINE FUNCTION IN C++
 
OOP java
OOP javaOOP java
OOP java
 
Function overloading and overriding
Function overloading and overridingFunction overloading and overriding
Function overloading and overriding
 
Visual Basic menu
Visual Basic menuVisual Basic menu
Visual Basic menu
 
Computer languages 11
Computer languages 11Computer languages 11
Computer languages 11
 
Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]
 
Ch 4 linker loader
Ch 4 linker loaderCh 4 linker loader
Ch 4 linker loader
 

Similar to SOFTWARE PARADIGM

unit 3.pptx
unit 3.pptxunit 3.pptx
unit 3.pptx
DivyaKS12
 
unit 3.ppt
unit 3.pptunit 3.ppt
unit 3.ppt
prakashvs7
 
System Softwares
System SoftwaresSystem Softwares
System Softwaresnshnt_snghl
 
Computer system software
Computer system softwareComputer system software
Computer system software
MozaSaid
 
Presentation it
Presentation itPresentation it
Presentation it
nabelas
 
Vskills c developer sample material
Vskills c developer sample materialVskills c developer sample material
Vskills c developer sample material
Vskills
 
Computer Notes
Computer NotesComputer Notes
Computer Notes
EHSAN KHAN
 
Vskills c++ developer sample material
Vskills c++ developer sample materialVskills c++ developer sample material
Vskills c++ developer sample material
Vskills
 
Computer Programs & System Softwares
Computer Programs & System SoftwaresComputer Programs & System Softwares
Computer Programs & System Softwares
Abijah Naresh Jumani
 
Operating System - I.pptx
Operating System - I.pptxOperating System - I.pptx
Operating System - I.pptx
Rahul779791
 
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)
SURBHI SAROHA
 
Topic
TopicTopic
Topic
nabelas
 
Presentation on computer software-system software.
Presentation on computer software-system software.Presentation on computer software-system software.
Presentation on computer software-system software.
johnraju213
 
Acem computer software
Acem computer softwareAcem computer software
Acem computer software
Aastha Kohli
 
System software vs application software
System software vs application softwareSystem software vs application software
System software vs application software
Anamta Dua
 
software4-150511081405-lva1-app6892 2.pdf
software4-150511081405-lva1-app6892 2.pdfsoftware4-150511081405-lva1-app6892 2.pdf
software4-150511081405-lva1-app6892 2.pdf
sachin325314
 
Software (4).ppt
Software (4).pptSoftware (4).ppt
Software (4).ppt
rishirvk1995
 
Powerpoint on Software Concept (ClassXI)
Powerpoint on Software Concept (ClassXI)Powerpoint on Software Concept (ClassXI)
Powerpoint on Software Concept (ClassXI)
Fernando Torres
 
Introduction of OS & Classification of Software
Introduction of OS & Classification of SoftwareIntroduction of OS & Classification of Software
Introduction of OS & Classification of Software
Vpmv
 

Similar to SOFTWARE PARADIGM (20)

unit 3.pptx
unit 3.pptxunit 3.pptx
unit 3.pptx
 
unit 3.ppt
unit 3.pptunit 3.ppt
unit 3.ppt
 
System Softwares
System SoftwaresSystem Softwares
System Softwares
 
Computer system software
Computer system softwareComputer system software
Computer system software
 
Presentation it
Presentation itPresentation it
Presentation it
 
Vskills c developer sample material
Vskills c developer sample materialVskills c developer sample material
Vskills c developer sample material
 
Computer Notes
Computer NotesComputer Notes
Computer Notes
 
Vskills c++ developer sample material
Vskills c++ developer sample materialVskills c++ developer sample material
Vskills c++ developer sample material
 
Computer Programs & System Softwares
Computer Programs & System SoftwaresComputer Programs & System Softwares
Computer Programs & System Softwares
 
Operating System - I.pptx
Operating System - I.pptxOperating System - I.pptx
Operating System - I.pptx
 
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)
 
Topic
TopicTopic
Topic
 
Presentation on computer software-system software.
Presentation on computer software-system software.Presentation on computer software-system software.
Presentation on computer software-system software.
 
Acem computer software
Acem computer softwareAcem computer software
Acem computer software
 
System software vs application software
System software vs application softwareSystem software vs application software
System software vs application software
 
software4-150511081405-lva1-app6892 2.pdf
software4-150511081405-lva1-app6892 2.pdfsoftware4-150511081405-lva1-app6892 2.pdf
software4-150511081405-lva1-app6892 2.pdf
 
Software (4).ppt
Software (4).pptSoftware (4).ppt
Software (4).ppt
 
Software
SoftwareSoftware
Software
 
Powerpoint on Software Concept (ClassXI)
Powerpoint on Software Concept (ClassXI)Powerpoint on Software Concept (ClassXI)
Powerpoint on Software Concept (ClassXI)
 
Introduction of OS & Classification of Software
Introduction of OS & Classification of SoftwareIntroduction of OS & Classification of Software
Introduction of OS & Classification of Software
 

More from DrThenmozhiKarunanit

CPU Scheduling Algorithm in Operating System.pptx
CPU Scheduling Algorithm in Operating System.pptxCPU Scheduling Algorithm in Operating System.pptx
CPU Scheduling Algorithm in Operating System.pptx
DrThenmozhiKarunanit
 
Comparison of C++ and JAVA.pptx
Comparison of C++ and JAVA.pptxComparison of C++ and JAVA.pptx
Comparison of C++ and JAVA.pptx
DrThenmozhiKarunanit
 
Modifying Rows and Columns
Modifying Rows and ColumnsModifying Rows and Columns
Modifying Rows and Columns
DrThenmozhiKarunanit
 
Introduction to spreadsheet
Introduction to spreadsheetIntroduction to spreadsheet
Introduction to spreadsheet
DrThenmozhiKarunanit
 
SOFTWARE COMPUTING
SOFTWARE COMPUTINGSOFTWARE COMPUTING
SOFTWARE COMPUTING
DrThenmozhiKarunanit
 
PROGRAMMING LANGUAGE AND TYPES
PROGRAMMING LANGUAGE AND TYPESPROGRAMMING LANGUAGE AND TYPES
PROGRAMMING LANGUAGE AND TYPES
DrThenmozhiKarunanit
 
NUMBER SYSTEMS- Binary, Decimal, Octal, Hexadecimal and Coversion.pptx
NUMBER SYSTEMS- Binary, Decimal, Octal, Hexadecimal and Coversion.pptxNUMBER SYSTEMS- Binary, Decimal, Octal, Hexadecimal and Coversion.pptx
NUMBER SYSTEMS- Binary, Decimal, Octal, Hexadecimal and Coversion.pptx
DrThenmozhiKarunanit
 
DBMS_Transaction processing – Schedule –Serializable Schedule – Concurrency C...
DBMS_Transaction processing – Schedule –Serializable Schedule – Concurrency C...DBMS_Transaction processing – Schedule –Serializable Schedule – Concurrency C...
DBMS_Transaction processing – Schedule –Serializable Schedule – Concurrency C...
DrThenmozhiKarunanit
 
DBMS outline.pptx
DBMS outline.pptxDBMS outline.pptx
DBMS outline.pptx
DrThenmozhiKarunanit
 
DBMS_Data Model,Keys,Attributes,Relationship.pptx
DBMS_Data Model,Keys,Attributes,Relationship.pptxDBMS_Data Model,Keys,Attributes,Relationship.pptx
DBMS_Data Model,Keys,Attributes,Relationship.pptx
DrThenmozhiKarunanit
 
Algorithm,Pseudocode,Flowchart.pptx
Algorithm,Pseudocode,Flowchart.pptxAlgorithm,Pseudocode,Flowchart.pptx
Algorithm,Pseudocode,Flowchart.pptx
DrThenmozhiKarunanit
 

More from DrThenmozhiKarunanit (11)

CPU Scheduling Algorithm in Operating System.pptx
CPU Scheduling Algorithm in Operating System.pptxCPU Scheduling Algorithm in Operating System.pptx
CPU Scheduling Algorithm in Operating System.pptx
 
Comparison of C++ and JAVA.pptx
Comparison of C++ and JAVA.pptxComparison of C++ and JAVA.pptx
Comparison of C++ and JAVA.pptx
 
Modifying Rows and Columns
Modifying Rows and ColumnsModifying Rows and Columns
Modifying Rows and Columns
 
Introduction to spreadsheet
Introduction to spreadsheetIntroduction to spreadsheet
Introduction to spreadsheet
 
SOFTWARE COMPUTING
SOFTWARE COMPUTINGSOFTWARE COMPUTING
SOFTWARE COMPUTING
 
PROGRAMMING LANGUAGE AND TYPES
PROGRAMMING LANGUAGE AND TYPESPROGRAMMING LANGUAGE AND TYPES
PROGRAMMING LANGUAGE AND TYPES
 
NUMBER SYSTEMS- Binary, Decimal, Octal, Hexadecimal and Coversion.pptx
NUMBER SYSTEMS- Binary, Decimal, Octal, Hexadecimal and Coversion.pptxNUMBER SYSTEMS- Binary, Decimal, Octal, Hexadecimal and Coversion.pptx
NUMBER SYSTEMS- Binary, Decimal, Octal, Hexadecimal and Coversion.pptx
 
DBMS_Transaction processing – Schedule –Serializable Schedule – Concurrency C...
DBMS_Transaction processing – Schedule –Serializable Schedule – Concurrency C...DBMS_Transaction processing – Schedule –Serializable Schedule – Concurrency C...
DBMS_Transaction processing – Schedule –Serializable Schedule – Concurrency C...
 
DBMS outline.pptx
DBMS outline.pptxDBMS outline.pptx
DBMS outline.pptx
 
DBMS_Data Model,Keys,Attributes,Relationship.pptx
DBMS_Data Model,Keys,Attributes,Relationship.pptxDBMS_Data Model,Keys,Attributes,Relationship.pptx
DBMS_Data Model,Keys,Attributes,Relationship.pptx
 
Algorithm,Pseudocode,Flowchart.pptx
Algorithm,Pseudocode,Flowchart.pptxAlgorithm,Pseudocode,Flowchart.pptx
Algorithm,Pseudocode,Flowchart.pptx
 

Recently uploaded

The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 

Recently uploaded (20)

The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 

SOFTWARE PARADIGM

  • 1. Computer software, or simply software, is a collection of data or computer instructions that tell the computer how to work. There are two types of software − 1.System Software 2.Application Software
  • 2. System Software  The system software is a collection of programs designed to operate, control, and extend the processing capabilities of the computer itself.  System software is generally prepared by the computer manufacturers.  These software products comprise of programs written in low-level languages, which interact with the hardware at a very basic level.  System software serves as the interface between the hardware and the end users.  Some examples of system software are Operating System, Compilers, Interpreter, Assemblers, etc.
  • 3.  Close to the system  Fast in speed  Difficult to design  Difficult to understand  Less interactive  Smaller in size  Difficult to manipulate  Generally written in low-level language
  • 4.
  • 5.  Application software products are designed to satisfy a particular need of a particular environment.  All software applications prepared in the computer lab can come under the category of Application software.  Application software may consist of a single program, such as Microsoft's notepad for writing and editing a simple text.  It may also consist of a collection of programs, often called a software package, which work together to accomplish a task, such as a spreadsheet package
  • 6.
  • 7.  Close to the user  Easy to design  More interactive  Slow in speed  Generally written in high-level language  Easy to understand  Easy to manipulate and use  Bigger in size and requires large storage space
  • 8.  Operating system  Device drivers  Language translators  System utilities
  • 9.  A program that acts as an intermediary between a user of a computer and the computer hardware  Operating system goals: › Execute user programs and make solving user problems easier › Make the computer system convenient to use › Use the computer hardware in an efficient manner
  • 10.  A collection of programs which control the resources of a computer system.  Written in low-level language(machine dependent)  An interface between users and hardware  When the computer is on ,OS will first load into the main memory
  • 11.
  • 12.
  • 13.  Process Management  The process management activities handled by the OS are— 1. control access to shared resources like file, memory, I/O and CPU 2. control execution of applications 3. create, execute and delete a process (system process or user process) 4. cancel or resume a process 5. schedule a process 6. synchronization, communication and deadlock handling for processes.
  • 14.  Memory Management  The activities of memory management handled by OS are— 1. allocate memory 2. free memory 3. re-allocate memory to a program when a used block is freed 4. keep track of memory usage  File Management  The file management tasks include — 1. create and delete both files and directories 2. provide access to files 3. allocate space for files 4. keep back-up of files 5. secure files
  • 15.  Device Management  The device management tasks handled by OS are— 1. open, close and write device drivers 2. communicate, control and monitor the device driver  Protection and Security  OS protects the resources of system. User authentication, file attributes like read, write, encryption, and back-up of data are used by OS to provide basic protection.  User Interface or Command Interpreter  Operating system provides an interface between the computer user and the computer hardware. The user interface is a set of commands or a graphical user interface via which the user interacts with the applications and the hardware.
  • 16.  device driver or hardware driver is a group of files that enable one or more hardware devices to communicate with the computer's operating system.  Without drivers, the computer would not be able to send and receive data correctly to hardware devices  If the appropriate driver is not installed, the device may not function properly, if at all
  • 17.  When buying an operating system, many device drivers are built into the product.  if a user later buys a new type of device that the operating system did not anticipate, the new device driver will have to be installed.  A device driver essentially allows smooth communication between a connected hardware device and the operating system (OS).
  • 18.  A driver acts as a translator between the device and program  Each device has its own set of specialized commands that only its driver understands  Eg: print instruction given by user/ program . Os connect that program with driver. Driver invoke corresponding set of code to print the data
  • 19.
  • 20.
  • 21.  It is a program which is used to translate instructions that are written in the source code to object code  Translate from high-level language or assembly language into machine language.  It also detects and reports the error during translation.
  • 22. Compiler  Compiler is a translator which is used to convert programs in high-level language to low-level language.  It translates the entire program and also reports the errors in source program encountered during the translation. Interpreter  Interpreter is a translator which is used to convert programs in high-level language to low-level language  Interpreter translates line by line and reports the error once it encountered during the translation process.  It directly executes the operations specified in the source program when the input is given by the user.  It gives better error diagnostics than a compiler. Assembler  Assembler is a translator which is used to translate the assembly language code into machine language code.
  • 23.
  • 24. system utility  A utility or system utility is computer system software intended to analyze, configure, monitor, or help maintain a computer.  Operating systems typically contain the necessary tools for this, but separate utility programs can provide improved functionality  a utility is smaller than a standard program in size and may be included with an operating system or installed separately. .
  • 25. 1.Antivirus  A virus can be defined as a malicious program that attaches itself to a host program and makes multiple copies of itself, slowing down, corrupting or destroying the system.  A software that assists the OS in providing virus free environment to the users is called antivirus.  An anti-virus scans the system for any virus and if detected, gets rid of it by deleting or isolating it
  • 26. 2.File management tools  file management is an important function of operating systems as all data and instructions are stored in the computer in form of files.  Utility software providing regular file management tasks like browse, search, update, preview, etc. are called file management tools. 3. Disk Cleanup  Disk cleanup tools assist users in freeing up disk space. The software scans hard disks to find files that are no longer used and frees up space by deleting them.
  • 27. 4.Compression tools  operating systems are always looking at ways to minimize amount of storage space taken by files.  Compression tools are utilities that assist operating systems in shortening files so that they take less space.  After compression files are stored in a different format and cannot be read or edited directly.  It needs to be uncompressed before it can be accessed for further use.  WinRAR, PeaZip, The Unarchiver, etc.
  • 28. 5 . Disk Defragmenter  Disk defragmenter is a disk management utility that increases file access speeds by rearranging fragmented files on contiguous locations.  Large files are broken down into fragments and may be stores in non-contiguous locations if contiguous ones are not available.  When such files are accessed by the user, access speed is slow due to fragmentation.  Disk defragmenter utility scans the hard disk and tries to assemble file fragments so that they may be stored in contiguous locations.
  • 29. 6. Backup  Backup utility enables backing up of files, folders, databases or complete disks.  Backups are taken so that data may be restored in case of data loss.  Backup is a service provided by all operating systems.  In stand-alone systems backup may be taken in the same or different drive.  In case of networked systems backup may be done on backup servers.
  • 30. Types of application software  Applications software is capable of dealing with user inputs and helps the user to complete the task.  It is also called end-user programs or only an app. It resides above system software.  Application Software are Word processing software, Spreadsheets Software, Presentation, Graphics, CAD/CAM  Types of Application Software: According to the need of users it is categorized into following types. 
  • 31.  Presentation program is a program to show the information in the form of slides. We can add text, graphics video and images to slides to make them more informative.  The software has three components: 1) Text editor for inputting and formatting text. 2) Inserting graphics, text, video and other multimedia files. 3) Slideshow to display the information.  Presentation software helps the presenter to present their ideas with ease and visual information easy to understand.  Example of presentation software: Microsoft's PowerPoint and Apple's Keynote.
  • 32.
  • 33.  Spreadsheet software is used to perform manipulation and calculations on data.  In spreadsheet software data, is stored in intersection of row and column.  The intersection of row and column is known as a cell.  The cell labelled with the row and column label like A1, A2 etc.  While entering data into the cell, we can also define the data value like text, date, time, number.  It provides many formula and function to perform calculations like arithmetic operations, logical operations, text operation etc.  It provides charts, graphs to display data graphically.  For example Microsoft Excel, lotus 1-2-3 for windows and number for MAC OS.
  • 34.
  • 35.  Database is a collection of data related to any applications.  every application has some database where data regarding to the users are stored.  For this purpose, we used database software. When we operate the application data is accessed from the database, and after manipulation, it gets back stored in the database.  Database Management System (DBMS) software tool used for storing, modifying extracting and searching for information within a database.  MySQL, MS Access, Microsoft SQL Server and Oracle is the example of database application Software.
  • 36.  Multimedia is a combination of text, graphics, audio and Multimedia software used in the editing of video, audio and text.  Multimedia software used in the growth of business, educations, information, remote system and entertainment.  Entertainment: This area deal with the general public, media and telecommunication. With the growth entertainment mode, many application is available for mobile phone as well as the system. Like Music and video entertainment app, navigation app, social networking application, news and weather application, educational apps and e-book reader’s app for preparation of any type of exams.
  • 37.  Process of modeling a real phenomenon with a set of mathematical formulas.  A program that allows the users to observe an operation through simulation without performing that operation.  Simulation is an imitation of real world and environment.  The simulation creates a physical environment of the real world to represent the similar behavior, function and key nature of the selected topic.  Simulation is technology for education, engineering, testing, training, video games and for scientific modeling of natural systems to gain insight into their functioning.  Area of technology : flight, economics, automobiles, Robotics, weather.
  • 38.  Word Processing software is used to manipulate, format the text, to create memos, letters, faxes and documents.  word Processing Software is used to format and beautify the text.  It provides a list of features , the option provides synonyms, antonyms and related words for chosen word or phrase.  Find and replace feature enables users to scan and replace selected words or phrases in the document.  Font option provides font colours , font style, font effect, font size to modify the txt.  Word Art option to modify or animated titles, hyphens, columns and text boxes in documents.  Grammar and Spelling check option available for checking errors. Many more option is listed here in software.  For example Microsoft Word, Lotus Word Pro, Word pad and Corel WordPerfect.
  • 39.  Used to describe the creation of printed documents using a desktop computer.  It is a technique of using a personal computer to design image and pages, assemble type and graphics, and then using a laser printer or image setter output the assembled pages onto a paper, film, or printing plate.  Software is used for creation of magazines and books, newsletters etc.
  • 40.
  • 41.  • System software gets installed when the operating system is installed on the computer while application software is installed according to the requirements of the user.  • System software includes programs such as compilers, debuggers, drivers, assemblers while application software includes media players, word processors, and spreadsheet programs.  • Generally, users do not interact with system software as it works in the background whereas users interact with application software while doing different activities.  • A computer may not require more than one type of system software while there may be a number of application software programs installed on the computer at the same time.  • System software can run independently of the application software while application software cannot run without the presence of the system software.
  • 42.
  • 43.  It is the unauthorized copying of an organization’s internally developed software  Illegal duplication of commercially available software.  Software piracy is the illegal copying, distribution, or use of software  The majority of software today is purchased as a one-site license, meaning that only one computer may have that software installed on it at one time
  • 44.  Copying that software to multiple computers or sharing it with your friend without multiple licenses is considered software piracy, which is illegal.  Software piracy comes in many different forms.
  • 45. 1. soft loading  Also known as soft lifting  Sharing of software with someone who is not authorized by the license agreement.  Purchasing a single licensed copy of software and loading that software onto many several computers.  Eg: sharing software with friends, co-workers
  • 46.  2.software counterfeiting  Producing fake copies of software and making it look authentic  This involve providing packaging box, CDs or floppies all designed to look like original product  Counterfeit software is sold on street corners, unknowingly sold in retail store.  Counterfeit software is sold at prices far below the actual price
  • 47.  3. Internet downloading  Fastest growing form of piracy  With the growing number of online users and rapidly increasing connection speeds, the exchange of software on internet Increased  There are many sites that allow users to unlimited downloading of software(warez sites).  Warez sites is craked to eliminate any copy of protection.
  • 48. 4. Renting  Renting out a copy of software for temporary use, without the permission of the copyright holder.  Eg: renting a video of a movie, violates the license agreement. 5. Hard disk loading  Installing an unauthorized copy of software onto a computer being sold to the end user.  It is often committed by hardware dealers.
  • 49.  6. license misuse  Software is distributed under special discount licenses to high volume customers, manufacturers or academic institutions.  After getting a copy of software, it will redistribute the software to others who do not hold or qualify for these license  The ways license can be misused: 1. Original equipment manufacturer unbundling 2. Academic product misuse 3. not for resale product misuse
  • 50. 1. Public domain software  Public domain software is any software that has no legal copyright or editing restrictions associated with it.  Public domain software has no ownership and is available for use, modification and commercialization by anyone.  It is free and open-source software that can be publicly modified, distributed or sold without any restrictions.  It is different from free software and freeware that does has copyrights and patents associated with it.  SQLite, I2P and CERN httpd are popular examples of public domain software.
  • 51.
  • 52.  2. freeware  Freeware is any copyrighted software, application or program that may be freely downloaded, installed, used and shared.  Such programs are available for use at no cost to general end users.  Freeware differs from free software, as the latter allows a user to modify source code for republishing or integration with other software.  As small software utilities, freeware is free to use throughout its lifetime because it does not expire after a certain period.  Freeware may be used for a desktop, mobile or Web-based utility.  Generally, freeware is a concise and limited version of a larger and paid software program.  large independent software vendors (ISV) publish freeware to enhance brand buzz and market reputation.
  • 53.  Available free of cost  Can be distributed free of cost Some examples of freeware software are –  Adobe PDF  yahoo messenger  Google Talk  MSN messenger
  • 54.  3 .shareware  Shareware is software that is distributed free on a trial basis with the understanding that the user may need or want to pay for it later.  Some software developers offer a shareware version of their program with a built-in expiration date (after 30 days, the user can no longer get access to the program).  Other shareware (sometimes called liteware) is offered with certain capabilities disabled as an enticement to buy the complete version of the program.
  • 55.  4. Commercial software is any software or program that is designed and developed for licensing or sale to end users or that serves a commercial purpose.  Commercial software was once considered to be proprietary software, but now a number of free and open-source software applications are licensed or sold to end users.  games or other software those sold in computer specialty stores or even music stores and grocery stores, are some examples of commercial software.  Microsoft products such as the Windows Operating System and MS Office are some of the most well- known examples of commercial software.
  • 56.  5.Open source software is software with source code that anyone can inspect, modify, and enhance.  Open-source software (OSS) is software that is distributed with source code that may be read or modified by users.  The OSS community generally agrees that open- source software should meet the following criteria:  The program must be freely distributed  Source code must be included with the program  Anyone must be able to modify the source code  Modified versions of the source code may be redistributed
  • 57.  6. Proprietary software is any software that is copyrighted and bears limits against use, distribution and modification that are imposed by its publisher, vendor or developer.  Proprietary software remains the property of its owner/creator and is used by end- users/organizations under predefined conditions.  Proprietary software may also be called closed- source software or commercial software.  Proprietary software is primarily commercial software  It can be purchased or licensed for fee, but relicensing, distribution or copying is prohibited.
  • 58.  7. Firmware is a software program or set of instructions programmed on a hardware device.  It provides the necessary instructions for how the device communicates with the other computer hardware.  hardware device such as a keyboards, hard drive, BIOS, or video cards.  It is programmed to give permanent instructions to communicate with other devices and perform functions like basic input/output tasks.  Firmware is typically stored in the flash ROM (read only memory) of a hardware device. It can be erased and rewritten.  Firmware also retains the basic instructions for hardware devices that make them operative. Without firmware, a hardware device would be non-functional.