SlideShare a Scribd company logo
Utilities: A utility is a programme that performs a specific task. They are not
regarded as an application because they only do one specific task which is related
to managing the computer. e.g. File converters, Virus scanners and security
checks.
File Management Software: file management software is provided as part of the
system software e.g. File/folder organisation, Backup copy creation, File
compression, Defragmentation, File recovery, Uninstallers.

Peripheral Driver: Each peripheral device (e.g. printer, scanner, digital cameras,
webcams) need some software to work with the hardware. All peripheral devices
attached to computers to make them work properly. The peripheral driver does:
provide communication between operating systems, convert instruction from
software into a form that the device can understand, enable the device to work
with other apps, produce an error message.
Printer drivers: there are many different types of printer different makes and
models with slightly different operating systems and application software. This
means they have to convert instruction in to a form that the printer can read.
Package software: A bundle of files necessary for a particular program to run along
with form of document to help a user to get the program to start.

Generic software: This is an application package that is appropriate for a wide
range of tasks and can be used in lots of areas of work, It can be appropriate for
home users, businesses and organisations.
Integrated software: This application package consisting of software for several
distinct applications. There will always be 2 or more application packages in
integrated software. Office software is integrated software consisting of wordprocessing, desktop, publishing software. Integrated software is cheaper than
buying individual packages and is easier to transfer data from one module to
another.
Specific software: This performs one particular e.g. payroll, stock control, income
tax tec.
Bespoke software: specially created and written for a particular business or
organisation. It is produced when there is no suitable packages available and is a
very expensive option. With this software; organisations don’t have to change how
it works, you can specify exactly what the software must do, the software can be
designed to work with current software and hardware but its more expensive and
could contain errors.
Purposes of application software: software that has been produced to allow the
user to carry out a specific task.
Generic packages: software that is not restricted to any particular job. It would
include: word processor, database management software, spread sheet,
presentation software, desktop publishing and web browsing.
Word-processing: packages are used to include documents containing text such as
letters, reports etc. and for preparing text for other applications e.g. text could be
typed using word-process software.

justification

Bullet points/ numbering
Formatting blocks of text

Tabs and indents

Line spacing

hyphenation
System software and aplication software types

More Related Content

What's hot

Types of application software
Types of application softwareTypes of application software
Types of application softwareJesus Obenita Jr.
 
software terms powerpoint
software terms powerpointsoftware terms powerpoint
software terms powerpointrryyaann96
 
software terms
software termssoftware terms
software termsrryyaann96
 
Software
Software Software
Computer Software & its Types
Computer Software & its Types Computer Software & its Types
Computer Software & its Types
Muhammad Hammad Waseem
 
What is software
What is softwareWhat is software
What is software
Anil815218
 
computer software
computer softwarecomputer software
computer software
MdArifHossain30
 
Computer hw sw
Computer hw swComputer hw sw
Computer hw sw
Chittagong University
 
Softwares
SoftwaresSoftwares
Softwares
ankur bhalla
 
Types of software
Types of softwareTypes of software
Types of software
vishal kumar
 
Contents of Computer Software
Contents of Computer SoftwareContents of Computer Software
Contents of Computer Software
Avinash Rouniyar
 
Application software and system software
Application software and system softwareApplication software and system software
Application software and system software
Sandhiya Ramesh
 
Jam814
Jam814Jam814
Jam814ino814
 
Presentation on different kinds of software
Presentation on different kinds of softwarePresentation on different kinds of software
Presentation on different kinds of softwareNitish Xavier Tirkey
 
violet814
violet814violet814
violet814
jamviolet814
 
Software cob3
Software cob3Software cob3
Software cob3
rosaltang
 

What's hot (19)

Types of application software
Types of application softwareTypes of application software
Types of application software
 
Soft wares
Soft waresSoft wares
Soft wares
 
software terms powerpoint
software terms powerpointsoftware terms powerpoint
software terms powerpoint
 
software terms
software termssoftware terms
software terms
 
Application software
Application softwareApplication software
Application software
 
Software
Software Software
Software
 
Computer Software & its Types
Computer Software & its Types Computer Software & its Types
Computer Software & its Types
 
What is software
What is softwareWhat is software
What is software
 
computer software
computer softwarecomputer software
computer software
 
Computer hw sw
Computer hw swComputer hw sw
Computer hw sw
 
Softwares
SoftwaresSoftwares
Softwares
 
Types of software
Types of softwareTypes of software
Types of software
 
Contents of Computer Software
Contents of Computer SoftwareContents of Computer Software
Contents of Computer Software
 
Application software and system software
Application software and system softwareApplication software and system software
Application software and system software
 
Computer software
Computer softwareComputer software
Computer software
 
Jam814
Jam814Jam814
Jam814
 
Presentation on different kinds of software
Presentation on different kinds of softwarePresentation on different kinds of software
Presentation on different kinds of software
 
violet814
violet814violet814
violet814
 
Software cob3
Software cob3Software cob3
Software cob3
 

Similar to System software and aplication software types

computer software
computer softwarecomputer software
computer software
Ahsan Khan
 
itcpresentationnew-150929164902-lva1-app6891.pdf
itcpresentationnew-150929164902-lva1-app6891.pdfitcpresentationnew-150929164902-lva1-app6891.pdf
itcpresentationnew-150929164902-lva1-app6891.pdf
SaddamAliBehana
 
software4-150511081405-lva1-app6892 2.pdf
software4-150511081405-lva1-app6892 2.pdfsoftware4-150511081405-lva1-app6892 2.pdf
software4-150511081405-lva1-app6892 2.pdf
sachin325314
 
Software (4).ppt
Software (4).pptSoftware (4).ppt
Software (4).ppt
rishirvk1995
 
Presentation it
Presentation itPresentation it
Presentation it
nabelas
 
Computer software part B
Computer software part BComputer software part B
Computer software part B
Ehtashamulhaq17
 
Computer software lecture
Computer software lecture Computer software lecture
Computer software lecture
Ehtashamulhaq17
 
Basic of computer 3
Basic of computer 3Basic of computer 3
Basic of computer 3
Prakash Pandey
 
Lesson 5 computer software
Lesson 5 computer softwareLesson 5 computer software
Lesson 5 computer software
Vishal Patyal
 
Acem computer software
Acem computer softwareAcem computer software
Acem computer software
Aastha Kohli
 
MCA-5 unit1
MCA-5 unit1MCA-5 unit1
MCA-5 unit1
Vasanti Dutta
 
unit 3.ppt
unit 3.pptunit 3.ppt
unit 3.ppt
prakashvs7
 
Usage Of Application Software
Usage Of Application SoftwareUsage Of Application Software
Usage Of Application Software'Atikah Khalil
 
Topic
TopicTopic
Topic
nabelas
 
computer software
computer softwarecomputer software
computer softwareRiya Gupta
 
unit 3.pptx
unit 3.pptxunit 3.pptx
unit 3.pptx
DivyaKS12
 
SOFTWARE PARADIGM
SOFTWARE PARADIGMSOFTWARE PARADIGM
SOFTWARE PARADIGM
DrThenmozhiKarunanit
 
Computer ppt by nikund
Computer ppt by nikundComputer ppt by nikund
Computer ppt by nikund
sheshank jain
 
Powerpoint on Software Concept (ClassXI)
Powerpoint on Software Concept (ClassXI)Powerpoint on Software Concept (ClassXI)
Powerpoint on Software Concept (ClassXI)
Fernando Torres
 

Similar to System software and aplication software types (20)

computer software
computer softwarecomputer software
computer software
 
itcpresentationnew-150929164902-lva1-app6891.pdf
itcpresentationnew-150929164902-lva1-app6891.pdfitcpresentationnew-150929164902-lva1-app6891.pdf
itcpresentationnew-150929164902-lva1-app6891.pdf
 
software4-150511081405-lva1-app6892 2.pdf
software4-150511081405-lva1-app6892 2.pdfsoftware4-150511081405-lva1-app6892 2.pdf
software4-150511081405-lva1-app6892 2.pdf
 
Software (4).ppt
Software (4).pptSoftware (4).ppt
Software (4).ppt
 
Software
SoftwareSoftware
Software
 
Presentation it
Presentation itPresentation it
Presentation it
 
Computer software part B
Computer software part BComputer software part B
Computer software part B
 
Computer software lecture
Computer software lecture Computer software lecture
Computer software lecture
 
Basic of computer 3
Basic of computer 3Basic of computer 3
Basic of computer 3
 
Lesson 5 computer software
Lesson 5 computer softwareLesson 5 computer software
Lesson 5 computer software
 
Acem computer software
Acem computer softwareAcem computer software
Acem computer software
 
MCA-5 unit1
MCA-5 unit1MCA-5 unit1
MCA-5 unit1
 
unit 3.ppt
unit 3.pptunit 3.ppt
unit 3.ppt
 
Usage Of Application Software
Usage Of Application SoftwareUsage Of Application Software
Usage Of Application Software
 
Topic
TopicTopic
Topic
 
computer software
computer softwarecomputer software
computer software
 
unit 3.pptx
unit 3.pptxunit 3.pptx
unit 3.pptx
 
SOFTWARE PARADIGM
SOFTWARE PARADIGMSOFTWARE PARADIGM
SOFTWARE PARADIGM
 
Computer ppt by nikund
Computer ppt by nikundComputer ppt by nikund
Computer ppt by nikund
 
Powerpoint on Software Concept (ClassXI)
Powerpoint on Software Concept (ClassXI)Powerpoint on Software Concept (ClassXI)
Powerpoint on Software Concept (ClassXI)
 

Recently uploaded

Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 

Recently uploaded (20)

Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 

System software and aplication software types

  • 1. Utilities: A utility is a programme that performs a specific task. They are not regarded as an application because they only do one specific task which is related to managing the computer. e.g. File converters, Virus scanners and security checks. File Management Software: file management software is provided as part of the system software e.g. File/folder organisation, Backup copy creation, File compression, Defragmentation, File recovery, Uninstallers. Peripheral Driver: Each peripheral device (e.g. printer, scanner, digital cameras, webcams) need some software to work with the hardware. All peripheral devices attached to computers to make them work properly. The peripheral driver does: provide communication between operating systems, convert instruction from software into a form that the device can understand, enable the device to work with other apps, produce an error message.
  • 2. Printer drivers: there are many different types of printer different makes and models with slightly different operating systems and application software. This means they have to convert instruction in to a form that the printer can read. Package software: A bundle of files necessary for a particular program to run along with form of document to help a user to get the program to start. Generic software: This is an application package that is appropriate for a wide range of tasks and can be used in lots of areas of work, It can be appropriate for home users, businesses and organisations. Integrated software: This application package consisting of software for several distinct applications. There will always be 2 or more application packages in integrated software. Office software is integrated software consisting of wordprocessing, desktop, publishing software. Integrated software is cheaper than buying individual packages and is easier to transfer data from one module to another.
  • 3. Specific software: This performs one particular e.g. payroll, stock control, income tax tec. Bespoke software: specially created and written for a particular business or organisation. It is produced when there is no suitable packages available and is a very expensive option. With this software; organisations don’t have to change how it works, you can specify exactly what the software must do, the software can be designed to work with current software and hardware but its more expensive and could contain errors. Purposes of application software: software that has been produced to allow the user to carry out a specific task. Generic packages: software that is not restricted to any particular job. It would include: word processor, database management software, spread sheet, presentation software, desktop publishing and web browsing.
  • 4. Word-processing: packages are used to include documents containing text such as letters, reports etc. and for preparing text for other applications e.g. text could be typed using word-process software. justification Bullet points/ numbering Formatting blocks of text Tabs and indents Line spacing hyphenation