SlideShare a Scribd company logo
1 of 37
Introduction to Information Technology 
Turban, Rainer and Potter 
John Wiley & Sons, Inc. 
Copyright 2005
Computer Software
Chapter Outline 
Significance of software 
System software 
Application software 
Software issues 
Programming languages 
Enterprises software 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 3
Learning Objectives 
Differentiate between the two major types of software. 
Describe the general functions of the operating system. 
Differentiate among types of operating systems and describe 
each type. 
Identify three methods for developing application software. 
Describe the major types of application software. 
Describe the major software issues that organization face today. 
Explain how software has evolved and trends for the future. 
Describe middleware and enterprise software. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 4
TG2.1 Significance of software 
 Computer program. The sequences of instructions for 
the computer, which comprise software. 
 Stored program concept. Modern hardware architecture 
in which stored software programs are accessed and 
their instructions are executed (followed) in the 
computer’s CPU, one after another. 
 Documentation. Written description of the functions of a 
software program. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 5
Different types of software: 
System software: The class of computer instruction that 
serve primarily as an intermediary between computer 
hardware and application programs; provides important 
self-regulatory functions for computer systems. 
Application software: The class of computer instructions 
that direct a computer system to perform specific 
processing activities and provide functionality for users. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 6
TG2.2 Systems software 
System control programs: Software programs that 
controls the use of the hardware, software, and data 
resources of a computer system. 
Operating system: The main system control program, 
which supervises the overall operations of the computer, 
allocates CPU time and main memory to programs, and 
provides an interface between the user and the 
hardware. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 7
 Multitasking/ multiprogramming: The management 
of two or more tasks, or programs, running 
concurrently on the computer system (one CPU). 
 Multithreading: A form of multitasking that runs 
multiple tasks within a single application 
simultaneously. 
 Multiprocessing: simultaneous processing of more 
than one program by assigning them to different 
processors (multiple CPUs). 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 8
Virtual Memory: A feature that simulates more main 
memory than actually exists in the computer system by 
extending primary storage into secondary storage. 
Graphical user interface (GUI): system software that allows 
users to have direct control of visible objects (such as icons) 
and actions, which replace command syntax. 
Social interface. A user interface that guides the user through 
computer applications by using cartoonlike characters, 
graphics, animation, and voice commands. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 9
Operating environment. A set of computer programs 
that add features that enable developers to create 
applications without directly accessing the operating 
systems; function only with an operating system. 
Plug-and-Play. Feature that enables the operating 
system to recognize new hardware and install the 
necessary software (called device drivers) 
automatically. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 10
Linux: A powerful version of the UNIX operating 
system that is open source software (publicly and 
freely available). 
Java operating system (Java OS): Operating system 
designed to execute programs written in Java, for 
Internet and Intranet applications, embedded 
devices, handheld products, and thin-client 
computing. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 11
System support programs: Software that supports 
the operations management and users of a 
computer system by providing a variety of support 
services (e.g. system utility programs, performance 
monitors, and security monitors). 
System utilities: Programs that accomplish common 
tasks such as sorting records, locating files, and 
managing memory usage. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 12
System performance monitors: Programs that 
monitor the processing of jobs on a computer 
system and monitor system performance in areas 
such as processor time, memory space and 
application programs. 
System security monitors: Programs that monitor a 
computer system to protect it and its resources form 
unauthorized use, fraud,or destruction. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 13
TG2.3 Application Software 
Proprietary application software. Software that addresses a 
specific or unique business need for a company ; may be 
developed in-house or may be commissioned from a software 
vendor. 
Contract software. Specific software programs developed for 
a particular company by a vendor. 
Off-the-shelf application software. Software purchased, 
leased, or rented from a vendor that develops programs and 
sell them to many organizations; can be standard 
customizable. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 14
Personal application software 
Spreadsheets. Software that uses a grid of 
coded rows and columns to display numeric 
or textual data in cells. 
Macros. Sequences of commands used in 
spreadsheet software that can be executed 
with just one simple instruction. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 15
 Integrated packages. Spreadsheet packages 
that offer data management and graphical 
capabilities in addition to regular spreadsheet 
functionality. 
 Data management. Software that supports the 
storage, retrieval, and manipulation of related 
data. 
 Word processing. Software that allows the user 
to manipulate text using many writing and 
editing features. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 16
WYSIWYG. Acronym for ‘ what you see is what 
you get’ (pronounced ‘ wiz-e-wig’, indicating that 
text material is displayed on the computer screen 
just as it will look on the final printed page. 
Desktop publishing software. Software that 
enables microcomputers to combined 
photographs and graphic images with text, to 
produce a finished, camera-ready document. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 17
Graphics software. software that enable the user to 
create, store, and display or print charts, graphs, 
maps, and drawings. 
Presentation graphic software. Software that enables 
users to create graphically rich presentations by 
“pasting” graphic images into a textual presentation. 
Analysis graphic software. Software that provides the 
ability to convert previously analyzed data into 
graphic formats (e.g. bar charts, pie charts). 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 18
Computer aided design (CAD) software 
Software that allows designers to design and build 
production prototypes in software, test them, compile 
parts lists, out-line assembly procedures, and then 
transmit the final design directly to machines. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 19
Multimedia software: Software that combines 
spatially based media (text and images) with time 
based media ( sound and video) for input or output of 
data. 
Communications software. Software that allows 
computers, wherever they are located, to exchange 
data via cables, telephone lines, satellite relay 
systems, or microwave circuits. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 20
Speech-recognition software: recognizes and 
interprets human speech, either one word at a 
time (discrete speech) or in a stream 
(continuous speech). 
Groupware: Software that facilitate 
communication, coordination, and collaboration 
among people. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 21
TG2.4 Software Issues 
Software defects 
Alien software 
Software evaluation and selection 
Software licensing 
Software upgrades 
Open systems 
Open source software 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 22
Alien Software 
 Pestware. Clandestine software that becomes installed 
on your PC through duplicitous channels; also called 
malware or scumware. 
 Adware. Software that is designed to facilitate the 
propagation of pop-up advertisements on your screen. 
 Spyware. Software that records your keystrokes and/or 
your password. 
 Spamware. Software designed to use your computer as 
a launch pad for spammers. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 23
Software selection factors 
Factor Consideration 
Size and location of user 
base 
Dose the proposed software support a few users in a single location? Or 
can it accommodate large number or geographically dispersed users? 
Availability of system 
Administration tools 
Dose the software offer tools that monitor system usage? Does it 
maintain a list of authorized users and provide the level of security 
needed? 
Cost: initial and 
subsequent 
Is the software affordable, taking into account all costs, including 
installation training, and maintenance? 
System capabilities Dose the software meet both current and anticipated future needs? 
Existing computing 
environment 
Is the software compatible with existing hardware, software and 
communications network? 
In-house technical skills Should the organization develop software applications in-house, 
purchase off the shelf, or contract software out of house? 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 24
TG2.5 Programming Languages 
Machine Language. The lowest level 
programming language, composed of 
binary digits. 
First-generation language. Machine 
language; the level of programming 
languages actually understood by CPU. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 25
 Assembly language. A lower-level programming 
language that is slightly more user-friendly than 
machine language. 
 Second- generation language. Assembly 
language; requires that each statement be 
translated into machine language through use of 
on assembler. 
 Assembler. A system software program that 
translates an assembly language program into 
machine language. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 26
 Procedural languages. User-oriented programming 
languages, which require programmers to specify 
step by step how the computer must accomplish a 
task. 
 Third-generation languages. The first level of higher-level 
programming languages, which are closer to 
natural language and therefore easier for 
programmers to use. 
 Compiler. Software program that translates an entire 
high-level language program into object code at 
once. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 27
Interpreter. A compiler that translates and 
executes one source program statement at a time. 
Nonprocedural languages. A type of high-level 
language that enables user to specify the desired 
result without having to specify the detailed 
procedures needed for achieving the result. 
Fourth–generation language (4GLs). A type of 
high-level programming languages, which can be 
used by nontechnical users to carry out specific 
functional tasks. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 28
Virtual Programming languages: use a mouse, icons, 
symbols on the screen, or pull-down menus to make 
programming easier and more intuitive. 
Hypertext. An approach to data management in which 
data are stored in a network of nodes connected by links 
and are accessed through interactive browsing. 
Hyperlinks. The links that connect data nodes in 
hypertext. 
Hypertext document . The combination of nodes, links, 
and supporting indexes for any particular topic in 
hypertext. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 29
Hypertext markup language (HTML). The standard 
programming language used on the Web to create 
and recognize hypertext documents. 
Dynamic HTML. lets users interact with the 
content of richly formatted pages without having to 
download additional content from the server. 
Cascading style sheet (CSS). An enhancement to 
HTML that adds page layout features to web 
documents 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 30
Extensible Markup Language (XML). A 
programming language designed to improve the 
functionality of web documents by providing 
more flexible and adaptable data identification. 
Componentware. A term used to describe 
component – based software applications. 
Software components. The “building blocks” of 
applications, which can be used again and again 
by the applications. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 31
 Virtual reality modeling Language (VRML). 
Programming language that can describe three 
dimensional interactive worlds and objects; used 
on the web to create three dimensional 
representations of complex scenes. 
 Object- oriented programming (OPP) languages. 
Programming language that encapsulate a small 
amount of data with instructions about what to 
do with data. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 32
 Methods. In object- oriented programming, the 
instructions about what to do with encapsulated 
data objects. 
 Object. In object- oriented programming the 
combination of a small amount of data with the 
data. 
 Encapsulation. In object-oriented programming 
the process of creating an object 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 33
 Reusability feature. Feature of object- oriented 
languages that allows classes created for one 
purpose to be used in a different object-oriented 
program if desired. 
 Java. Object-oriented programming language, 
that gives programmers the ability to develop 
applications that work across the Internet. 
 Applets. Small Java applications that can be 
included in an HTML page on the Internet. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 34
Unified modelling language (UML) 
 A programming language that provides a 
common set of notations for object-oriented 
software system 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 35
TG2.6 Enterprise software 
 Middleware. Software designed to link 
application modules developed in different 
computer languages and running on 
heterogeneous platforms. 
 Enterprise software. Software programs that 
mange the vital operations of an organization 
(enterprise). 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 36
All rights reserved. Reproduction or translation of this 
work beyond that permitted in section 117 of the United 
States Copyright Act without express permission of the 
copyright owner is unlawful. Request for information 
should be addressed to the permission department, John 
Wiley & Sons, Inc. The purchaser may make back-up 
copies for his/her own use only and not for distribution or 
resale. The publisher assumes no responsibility for error, 
omissions, or damages caused by the use of these 
programs or from the use of the information herein. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 2 37

More Related Content

What's hot

Management Information System
Management Information SystemManagement Information System
Management Information SystemCh Irfan
 
Application Software in Management
Application Software in ManagementApplication Software in Management
Application Software in ManagementSyahremie Teja
 
PPT on MS-CIT Unit 3 (slide share)
PPT on MS-CIT Unit 3 (slide share)PPT on MS-CIT Unit 3 (slide share)
PPT on MS-CIT Unit 3 (slide share)SHRIBALAJIINFOTECH
 
Part 5.1 Hardware | Software | System Software | Application Software
Part 5.1 Hardware | Software | System Software | Application SoftwarePart 5.1 Hardware | Software | System Software | Application Software
Part 5.1 Hardware | Software | System Software | Application SoftwarePro Guide
 
TYBSC IT SEM 6 PROJECT MANAGEMENT NOTES
TYBSC IT SEM 6 PROJECT MANAGEMENT NOTESTYBSC IT SEM 6 PROJECT MANAGEMENT NOTES
TYBSC IT SEM 6 PROJECT MANAGEMENT NOTESWE-IT TUTORIALS
 
Comparison of Concurrent Mobile OS Characteristics
Comparison of Concurrent Mobile OS CharacteristicsComparison of Concurrent Mobile OS Characteristics
Comparison of Concurrent Mobile OS CharacteristicsIJLT EMAS
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 6 - Applica...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 6 - Applica...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 6 - Applica...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 6 - Applica...yaminohime
 

What's hot (17)

Management Information System
Management Information SystemManagement Information System
Management Information System
 
Application Software in Management
Application Software in ManagementApplication Software in Management
Application Software in Management
 
PPT on MS-CIT Unit 3 (slide share)
PPT on MS-CIT Unit 3 (slide share)PPT on MS-CIT Unit 3 (slide share)
PPT on MS-CIT Unit 3 (slide share)
 
Input
InputInput
Input
 
Ch1
Ch1Ch1
Ch1
 
Part 5.1 Hardware | Software | System Software | Application Software
Part 5.1 Hardware | Software | System Software | Application SoftwarePart 5.1 Hardware | Software | System Software | Application Software
Part 5.1 Hardware | Software | System Software | Application Software
 
Ch1 introduction
Ch1 introductionCh1 introduction
Ch1 introduction
 
MSCIT Unit 1
MSCIT Unit 1MSCIT Unit 1
MSCIT Unit 1
 
PPT on MS-CIT Unit-2
PPT on MS-CIT Unit-2PPT on MS-CIT Unit-2
PPT on MS-CIT Unit-2
 
TYBSC IT SEM 6 PROJECT MANAGEMENT NOTES
TYBSC IT SEM 6 PROJECT MANAGEMENT NOTESTYBSC IT SEM 6 PROJECT MANAGEMENT NOTES
TYBSC IT SEM 6 PROJECT MANAGEMENT NOTES
 
Comparison of Concurrent Mobile OS Characteristics
Comparison of Concurrent Mobile OS CharacteristicsComparison of Concurrent Mobile OS Characteristics
Comparison of Concurrent Mobile OS Characteristics
 
Chapter 01 (Discovering Computers)
Chapter 01 (Discovering Computers)Chapter 01 (Discovering Computers)
Chapter 01 (Discovering Computers)
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 6 - Applica...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 6 - Applica...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 6 - Applica...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 6 - Applica...
 
Lecture 10
Lecture 10Lecture 10
Lecture 10
 
Netcool Impact docs
Netcool Impact docsNetcool Impact docs
Netcool Impact docs
 
Cm24585587
Cm24585587Cm24585587
Cm24585587
 
Storage
StorageStorage
Storage
 

Similar to Tg02

Similar to Tg02 (20)

Exam 1 in ITEP 132
Exam 1 in ITEP 132Exam 1 in ITEP 132
Exam 1 in ITEP 132
 
The Pc And Its Operating Systems
The Pc And Its Operating SystemsThe Pc And Its Operating Systems
The Pc And Its Operating Systems
 
Fg b
Fg bFg b
Fg b
 
Computer notes
Computer notesComputer notes
Computer notes
 
Computer system soft ware
Computer system soft wareComputer system soft ware
Computer system soft ware
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
SESSION 3 - Computer Software-1.pptx
SESSION 3 - Computer Software-1.pptxSESSION 3 - Computer Software-1.pptx
SESSION 3 - Computer Software-1.pptx
 
Chapter 3 Software.ppt
Chapter 3 Software.pptChapter 3 Software.ppt
Chapter 3 Software.ppt
 
ComputerSoftware.pdf
ComputerSoftware.pdfComputerSoftware.pdf
ComputerSoftware.pdf
 
It in business(komal doua)
It in business(komal doua)It in business(komal doua)
It in business(komal doua)
 
Thing to understand about software
Thing to understand about softwareThing to understand about software
Thing to understand about software
 
2 software
2 software2 software
2 software
 
Software
SoftwareSoftware
Software
 
MCA-5 unit1
MCA-5 unit1MCA-5 unit1
MCA-5 unit1
 
System Software
System SoftwareSystem Software
System Software
 
Introduction to computer software
Introduction to computer softwareIntroduction to computer software
Introduction to computer software
 
SOFDESG 01 Introduction.pdf
SOFDESG 01 Introduction.pdfSOFDESG 01 Introduction.pdf
SOFDESG 01 Introduction.pdf
 
Software ppt
Software pptSoftware ppt
Software ppt
 
Computer software and computer network
Computer software and computer networkComputer software and computer network
Computer software and computer network
 
Computer systems
Computer systemsComputer systems
Computer systems
 

More from kelasapa (18)

aaaaaa
aaaaaaaaaaaa
aaaaaa
 
Tg03
Tg03Tg03
Tg03
 
Tg06
Tg06Tg06
Tg06
 
Tg05
Tg05Tg05
Tg05
 
Tg04
Tg04Tg04
Tg04
 
Tg01
Tg01Tg01
Tg01
 
Ch12
Ch12Ch12
Ch12
 
Ch11
Ch11Ch11
Ch11
 
Ch10
Ch10Ch10
Ch10
 
Ch09
Ch09Ch09
Ch09
 
Ch08
Ch08Ch08
Ch08
 
Ch07
Ch07Ch07
Ch07
 
Ch06
Ch06Ch06
Ch06
 
Ch05
Ch05Ch05
Ch05
 
Ch04
Ch04Ch04
Ch04
 
Ch03
Ch03Ch03
Ch03
 
Ch02
Ch02Ch02
Ch02
 
Ch01
Ch01Ch01
Ch01
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Tg02

  • 1. Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005
  • 3. Chapter Outline Significance of software System software Application software Software issues Programming languages Enterprises software “ Copyright 2005 John Wiley & Sons Inc.” TG 2 3
  • 4. Learning Objectives Differentiate between the two major types of software. Describe the general functions of the operating system. Differentiate among types of operating systems and describe each type. Identify three methods for developing application software. Describe the major types of application software. Describe the major software issues that organization face today. Explain how software has evolved and trends for the future. Describe middleware and enterprise software. “ Copyright 2005 John Wiley & Sons Inc.” TG 2 4
  • 5. TG2.1 Significance of software  Computer program. The sequences of instructions for the computer, which comprise software.  Stored program concept. Modern hardware architecture in which stored software programs are accessed and their instructions are executed (followed) in the computer’s CPU, one after another.  Documentation. Written description of the functions of a software program. “ Copyright 2005 John Wiley & Sons Inc.” TG 2 5
  • 6. Different types of software: System software: The class of computer instruction that serve primarily as an intermediary between computer hardware and application programs; provides important self-regulatory functions for computer systems. Application software: The class of computer instructions that direct a computer system to perform specific processing activities and provide functionality for users. “ Copyright 2005 John Wiley & Sons Inc.” TG 2 6
  • 7. TG2.2 Systems software System control programs: Software programs that controls the use of the hardware, software, and data resources of a computer system. Operating system: The main system control program, which supervises the overall operations of the computer, allocates CPU time and main memory to programs, and provides an interface between the user and the hardware. “ Copyright 2005 John Wiley & Sons Inc.” TG 2 7
  • 8.  Multitasking/ multiprogramming: The management of two or more tasks, or programs, running concurrently on the computer system (one CPU).  Multithreading: A form of multitasking that runs multiple tasks within a single application simultaneously.  Multiprocessing: simultaneous processing of more than one program by assigning them to different processors (multiple CPUs). “ Copyright 2005 John Wiley & Sons Inc.” TG 2 8
  • 9. Virtual Memory: A feature that simulates more main memory than actually exists in the computer system by extending primary storage into secondary storage. Graphical user interface (GUI): system software that allows users to have direct control of visible objects (such as icons) and actions, which replace command syntax. Social interface. A user interface that guides the user through computer applications by using cartoonlike characters, graphics, animation, and voice commands. “ Copyright 2005 John Wiley & Sons Inc.” TG 2 9
  • 10. Operating environment. A set of computer programs that add features that enable developers to create applications without directly accessing the operating systems; function only with an operating system. Plug-and-Play. Feature that enables the operating system to recognize new hardware and install the necessary software (called device drivers) automatically. “ Copyright 2005 John Wiley & Sons Inc.” TG 2 10
  • 11. Linux: A powerful version of the UNIX operating system that is open source software (publicly and freely available). Java operating system (Java OS): Operating system designed to execute programs written in Java, for Internet and Intranet applications, embedded devices, handheld products, and thin-client computing. “ Copyright 2005 John Wiley & Sons Inc.” TG 2 11
  • 12. System support programs: Software that supports the operations management and users of a computer system by providing a variety of support services (e.g. system utility programs, performance monitors, and security monitors). System utilities: Programs that accomplish common tasks such as sorting records, locating files, and managing memory usage. “ Copyright 2005 John Wiley & Sons Inc.” TG 2 12
  • 13. System performance monitors: Programs that monitor the processing of jobs on a computer system and monitor system performance in areas such as processor time, memory space and application programs. System security monitors: Programs that monitor a computer system to protect it and its resources form unauthorized use, fraud,or destruction. “ Copyright 2005 John Wiley & Sons Inc.” TG 2 13
  • 14. TG2.3 Application Software Proprietary application software. Software that addresses a specific or unique business need for a company ; may be developed in-house or may be commissioned from a software vendor. Contract software. Specific software programs developed for a particular company by a vendor. Off-the-shelf application software. Software purchased, leased, or rented from a vendor that develops programs and sell them to many organizations; can be standard customizable. “ Copyright 2005 John Wiley & Sons Inc.” TG 2 14
  • 15. Personal application software Spreadsheets. Software that uses a grid of coded rows and columns to display numeric or textual data in cells. Macros. Sequences of commands used in spreadsheet software that can be executed with just one simple instruction. “ Copyright 2005 John Wiley & Sons Inc.” TG 2 15
  • 16.  Integrated packages. Spreadsheet packages that offer data management and graphical capabilities in addition to regular spreadsheet functionality.  Data management. Software that supports the storage, retrieval, and manipulation of related data.  Word processing. Software that allows the user to manipulate text using many writing and editing features. “ Copyright 2005 John Wiley & Sons Inc.” TG 2 16
  • 17. WYSIWYG. Acronym for ‘ what you see is what you get’ (pronounced ‘ wiz-e-wig’, indicating that text material is displayed on the computer screen just as it will look on the final printed page. Desktop publishing software. Software that enables microcomputers to combined photographs and graphic images with text, to produce a finished, camera-ready document. “ Copyright 2005 John Wiley & Sons Inc.” TG 2 17
  • 18. Graphics software. software that enable the user to create, store, and display or print charts, graphs, maps, and drawings. Presentation graphic software. Software that enables users to create graphically rich presentations by “pasting” graphic images into a textual presentation. Analysis graphic software. Software that provides the ability to convert previously analyzed data into graphic formats (e.g. bar charts, pie charts). “ Copyright 2005 John Wiley & Sons Inc.” TG 2 18
  • 19. Computer aided design (CAD) software Software that allows designers to design and build production prototypes in software, test them, compile parts lists, out-line assembly procedures, and then transmit the final design directly to machines. “ Copyright 2005 John Wiley & Sons Inc.” TG 2 19
  • 20. Multimedia software: Software that combines spatially based media (text and images) with time based media ( sound and video) for input or output of data. Communications software. Software that allows computers, wherever they are located, to exchange data via cables, telephone lines, satellite relay systems, or microwave circuits. “ Copyright 2005 John Wiley & Sons Inc.” TG 2 20
  • 21. Speech-recognition software: recognizes and interprets human speech, either one word at a time (discrete speech) or in a stream (continuous speech). Groupware: Software that facilitate communication, coordination, and collaboration among people. “ Copyright 2005 John Wiley & Sons Inc.” TG 2 21
  • 22. TG2.4 Software Issues Software defects Alien software Software evaluation and selection Software licensing Software upgrades Open systems Open source software “ Copyright 2005 John Wiley & Sons Inc.” TG 2 22
  • 23. Alien Software  Pestware. Clandestine software that becomes installed on your PC through duplicitous channels; also called malware or scumware.  Adware. Software that is designed to facilitate the propagation of pop-up advertisements on your screen.  Spyware. Software that records your keystrokes and/or your password.  Spamware. Software designed to use your computer as a launch pad for spammers. “ Copyright 2005 John Wiley & Sons Inc.” TG 2 23
  • 24. Software selection factors Factor Consideration Size and location of user base Dose the proposed software support a few users in a single location? Or can it accommodate large number or geographically dispersed users? Availability of system Administration tools Dose the software offer tools that monitor system usage? Does it maintain a list of authorized users and provide the level of security needed? Cost: initial and subsequent Is the software affordable, taking into account all costs, including installation training, and maintenance? System capabilities Dose the software meet both current and anticipated future needs? Existing computing environment Is the software compatible with existing hardware, software and communications network? In-house technical skills Should the organization develop software applications in-house, purchase off the shelf, or contract software out of house? “ Copyright 2005 John Wiley & Sons Inc.” TG 2 24
  • 25. TG2.5 Programming Languages Machine Language. The lowest level programming language, composed of binary digits. First-generation language. Machine language; the level of programming languages actually understood by CPU. “ Copyright 2005 John Wiley & Sons Inc.” TG 2 25
  • 26.  Assembly language. A lower-level programming language that is slightly more user-friendly than machine language.  Second- generation language. Assembly language; requires that each statement be translated into machine language through use of on assembler.  Assembler. A system software program that translates an assembly language program into machine language. “ Copyright 2005 John Wiley & Sons Inc.” TG 2 26
  • 27.  Procedural languages. User-oriented programming languages, which require programmers to specify step by step how the computer must accomplish a task.  Third-generation languages. The first level of higher-level programming languages, which are closer to natural language and therefore easier for programmers to use.  Compiler. Software program that translates an entire high-level language program into object code at once. “ Copyright 2005 John Wiley & Sons Inc.” TG 2 27
  • 28. Interpreter. A compiler that translates and executes one source program statement at a time. Nonprocedural languages. A type of high-level language that enables user to specify the desired result without having to specify the detailed procedures needed for achieving the result. Fourth–generation language (4GLs). A type of high-level programming languages, which can be used by nontechnical users to carry out specific functional tasks. “ Copyright 2005 John Wiley & Sons Inc.” TG 2 28
  • 29. Virtual Programming languages: use a mouse, icons, symbols on the screen, or pull-down menus to make programming easier and more intuitive. Hypertext. An approach to data management in which data are stored in a network of nodes connected by links and are accessed through interactive browsing. Hyperlinks. The links that connect data nodes in hypertext. Hypertext document . The combination of nodes, links, and supporting indexes for any particular topic in hypertext. “ Copyright 2005 John Wiley & Sons Inc.” TG 2 29
  • 30. Hypertext markup language (HTML). The standard programming language used on the Web to create and recognize hypertext documents. Dynamic HTML. lets users interact with the content of richly formatted pages without having to download additional content from the server. Cascading style sheet (CSS). An enhancement to HTML that adds page layout features to web documents “ Copyright 2005 John Wiley & Sons Inc.” TG 2 30
  • 31. Extensible Markup Language (XML). A programming language designed to improve the functionality of web documents by providing more flexible and adaptable data identification. Componentware. A term used to describe component – based software applications. Software components. The “building blocks” of applications, which can be used again and again by the applications. “ Copyright 2005 John Wiley & Sons Inc.” TG 2 31
  • 32.  Virtual reality modeling Language (VRML). Programming language that can describe three dimensional interactive worlds and objects; used on the web to create three dimensional representations of complex scenes.  Object- oriented programming (OPP) languages. Programming language that encapsulate a small amount of data with instructions about what to do with data. “ Copyright 2005 John Wiley & Sons Inc.” TG 2 32
  • 33.  Methods. In object- oriented programming, the instructions about what to do with encapsulated data objects.  Object. In object- oriented programming the combination of a small amount of data with the data.  Encapsulation. In object-oriented programming the process of creating an object “ Copyright 2005 John Wiley & Sons Inc.” TG 2 33
  • 34.  Reusability feature. Feature of object- oriented languages that allows classes created for one purpose to be used in a different object-oriented program if desired.  Java. Object-oriented programming language, that gives programmers the ability to develop applications that work across the Internet.  Applets. Small Java applications that can be included in an HTML page on the Internet. “ Copyright 2005 John Wiley & Sons Inc.” TG 2 34
  • 35. Unified modelling language (UML)  A programming language that provides a common set of notations for object-oriented software system “ Copyright 2005 John Wiley & Sons Inc.” TG 2 35
  • 36. TG2.6 Enterprise software  Middleware. Software designed to link application modules developed in different computer languages and running on heterogeneous platforms.  Enterprise software. Software programs that mange the vital operations of an organization (enterprise). “ Copyright 2005 John Wiley & Sons Inc.” TG 2 36
  • 37. All rights reserved. Reproduction or translation of this work beyond that permitted in section 117 of the United States Copyright Act without express permission of the copyright owner is unlawful. Request for information should be addressed to the permission department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The publisher assumes no responsibility for error, omissions, or damages caused by the use of these programs or from the use of the information herein. “ Copyright 2005 John Wiley & Sons Inc.” TG 2 37