SlideShare a Scribd company logo
USES, MISUSESANDRISKOFSOFTWARE
SOFTWARE:
Definition:
Software is the set of instruction that enable the user to
communicate with computer and perform its task . with out
software hardware is nothing.
Example:
without browser you cannot surf internet. In this way with
out operating system you cannot run browser and do any thing
on computer.
TYPESOF SOFTWARE:
Two types of software:
System software:
system software is a program that is designs to
run hardware and application programs like mac , windows , etc.
Application software
Application software is designs to help
the user to complete its task.in other words the applications
software are the application that run on computer .
USESOF SOFTWARE
Software's are commonly uses in every field of life because of the
increase of the use of computer in every field.
• Business
• Medical field
• Home
• Education
• Industries
• Communication
BUSINESS:
Almost every business uses computer to
complete its daily tasks . from making contacts with clients, input
records and generating reports and allow business more
mannered way as tradition like paper work.
Marketing:
Computer allows business to make websites,
stunning ads and a complete marketing operations . marketing
videos editing and creating marketing ads in-home with special
software's.
ATHOME:
At home computer are used for variety of purposes .
Computer in home providing training , technical reports, internet
for students , families in participating and for calculating monthly
expenses.
Education:
Computer is used in education in teacher learning,
testing and evaluation ,guidance purpose and school
administration.
MISSUSESOF SOFTWARE'S:
Computer are also used for beneficial as well as illegal and
destroy purpose . with the help of it people committing farads ,
stealing data and cause damage other records etc.
Uses of software in hacking purpose and disobey privacy policies
of other .
A license agreement is the establish a legal agreement between
customer and the man or company that develop the software . if
a person is use this software with out purchasing is misuse of
software.
EXAMPLE:
If a person buy software from un authorized
site and then he want to activate it . It not activate because the
license is used by the previous user from which he purchase .
and software id not registered because license is not
transferable.
RISKSOF SOFTWARE:
Risk:
Risk is future uncertain events with a probability( ‫ن‬‫ا‬‫کم‬‫ا‬ ) of
occurrence and a potential for loss.
Product risk is the possibility that the system or software might
fail to satisfy or fulfill some reasonable expectation of the
customer, user, or stakeholder. (Some authors also called the
‘Product risks’ as ‘Quality risks’ as they are risks to the quality of
the product.)
SOMESOFTWARE PRODUCT RISKS:
 If the software is unreliable and frequently fails to work.
 If software fail in ways that cause financial or other damage to
a user or the company that user works for.
 If the software has problems related to a particular quality
characteristic, which might not be functionality, but rather
security, reliability, usability, maintainability or performance.

More Related Content

What's hot

Email Security Best Practices
Email Security Best PracticesEmail Security Best Practices
Email Security Best Practices
KnowBe4
 
TIAD 2016 : Ethics in software development
TIAD 2016 : Ethics in software developmentTIAD 2016 : Ethics in software development
TIAD 2016 : Ethics in software development
The Incredible Automation Day
 
intellectual property rights
 intellectual property rights intellectual property rights
intellectual property rights
Hamza Cheema
 
Ethics for it professionals and it users
Ethics for it professionals and it usersEthics for it professionals and it users
Ethics for it professionals and it usersBhanja Kishor Samudra
 
6 software contracts
6 software contracts6 software contracts
6 software contracts
Saqib Raza
 
Software Evolution
Software EvolutionSoftware Evolution
Software Evolution
Michele Lanza
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
The ethics of software engineering
The ethics of software engineeringThe ethics of software engineering
The ethics of software engineering
jndatirwa
 
Error,Failure and Risk
Error,Failure and RiskError,Failure and Risk
Error,Failure and Risk
Nazrul Islam
 
Autopsy Digital forensics tool
Autopsy Digital forensics toolAutopsy Digital forensics tool
Autopsy Digital forensics tool
Sreekanth Narendran
 
professional Issues in COmputer science and Engineering
professional Issues in COmputer science and Engineeringprofessional Issues in COmputer science and Engineering
professional Issues in COmputer science and Engineering
Mohibullah Saail
 
Skpl simasjid b13 140081402014705
Skpl simasjid b13 140081402014705Skpl simasjid b13 140081402014705
Skpl simasjid b13 140081402014705
Winda Dwiastini
 
Piracy and Types
Piracy and TypesPiracy and Types
Piracy and Types
Syed Muhammad Shah
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
Ersoy AKSOY
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
Creative Technology
 
Software Piracy
Software PiracySoftware Piracy
Software PiracyByerdavi
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
Piyush Jain
 

What's hot (20)

Spyware
SpywareSpyware
Spyware
 
Email Security Best Practices
Email Security Best PracticesEmail Security Best Practices
Email Security Best Practices
 
TIAD 2016 : Ethics in software development
TIAD 2016 : Ethics in software developmentTIAD 2016 : Ethics in software development
TIAD 2016 : Ethics in software development
 
intellectual property rights
 intellectual property rights intellectual property rights
intellectual property rights
 
Ethics for it professionals and it users
Ethics for it professionals and it usersEthics for it professionals and it users
Ethics for it professionals and it users
 
6 software contracts
6 software contracts6 software contracts
6 software contracts
 
Software Evolution
Software EvolutionSoftware Evolution
Software Evolution
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
The ethics of software engineering
The ethics of software engineeringThe ethics of software engineering
The ethics of software engineering
 
Error,Failure and Risk
Error,Failure and RiskError,Failure and Risk
Error,Failure and Risk
 
Autopsy Digital forensics tool
Autopsy Digital forensics toolAutopsy Digital forensics tool
Autopsy Digital forensics tool
 
professional Issues in COmputer science and Engineering
professional Issues in COmputer science and Engineeringprofessional Issues in COmputer science and Engineering
professional Issues in COmputer science and Engineering
 
Skpl simasjid b13 140081402014705
Skpl simasjid b13 140081402014705Skpl simasjid b13 140081402014705
Skpl simasjid b13 140081402014705
 
Piracy and Types
Piracy and TypesPiracy and Types
Piracy and Types
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Computer security and
Computer security andComputer security and
Computer security and
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
 

Similar to Uses misuses and risk of software

Computer software is defined .docx
Computer software is defined       .docxComputer software is defined       .docx
Computer software is defined .docx
Kamran Abdullah
 
Types of software, advantages and disadvantages
Types of software, advantages and disadvantagesTypes of software, advantages and disadvantages
Types of software, advantages and disadvantages
Rocket11986
 
Application Software
Application SoftwareApplication Software
Application Software
Christian Gabriel
 
CSE18R264 - Unit 1.pptx
CSE18R264 - Unit 1.pptxCSE18R264 - Unit 1.pptx
CSE18R264 - Unit 1.pptx
YouTube299255
 
Class work 3_computer_network_317
Class work 3_computer_network_317Class work 3_computer_network_317
Class work 3_computer_network_317
Khondoker Sadia
 
Software Licences
Software LicencesSoftware Licences
Software Licences
Ajay Jassi
 
Ch # 03 software
Ch # 03  softwareCh # 03  software
Ch # 03 software
MuhammadRobeel3
 
COM 115.pdf
COM 115.pdfCOM 115.pdf
Application Software in Computer and Services.pptx
Application Software in Computer and Services.pptxApplication Software in Computer and Services.pptx
Application Software in Computer and Services.pptx
JessaBejer1
 
An Ultimate Guide To Custom Software Development
An Ultimate Guide To Custom Software DevelopmentAn Ultimate Guide To Custom Software Development
An Ultimate Guide To Custom Software Development
Vrinsoft Technology
 
Ethical consideration in open source software
Ethical consideration in open source softwareEthical consideration in open source software
Ethical consideration in open source softwareaamatya
 
Ethical consideration in open source software
Ethical consideration in open source softwareEthical consideration in open source software
Ethical consideration in open source software
aamatya
 
SE 18CS35 Module 1.pdf
SE 18CS35 Module 1.pdfSE 18CS35 Module 1.pdf
SE 18CS35 Module 1.pdf
balaji984829
 
All about APPS
All about APPSAll about APPS
All about APPS
DaisyJeffenYRios
 
Group Presentation 2 - CIS285 - End User Application Softwares.pptx
Group Presentation 2 - CIS285 - End User Application Softwares.pptxGroup Presentation 2 - CIS285 - End User Application Softwares.pptx
Group Presentation 2 - CIS285 - End User Application Softwares.pptx
ssuserecb346
 
TLE-ICT COMPUTER SYSTEMS SERVICING DIAGNOSING COMPUTER SYSTEM
TLE-ICT COMPUTER SYSTEMS SERVICING DIAGNOSING COMPUTER SYSTEMTLE-ICT COMPUTER SYSTEMS SERVICING DIAGNOSING COMPUTER SYSTEM
TLE-ICT COMPUTER SYSTEMS SERVICING DIAGNOSING COMPUTER SYSTEM
izarahmendoza
 
What is Application Software?
What is Application Software?What is Application Software?
What is Application Software?
DaisyJeffenYRios
 
Impacts of ICT on social effects
Impacts of ICT on social effectsImpacts of ICT on social effects
Impacts of ICT on social effects
Nandhini Sathiyanarayanan
 
Marketing of services Australian Education
Marketing of services Australian EducationMarketing of services Australian Education
Marketing of services Australian Education
Sourav Biswas
 
Why Developer fights Programmer
Why Developer fights ProgrammerWhy Developer fights Programmer
Why Developer fights Programmer
Rita Podkova
 

Similar to Uses misuses and risk of software (20)

Computer software is defined .docx
Computer software is defined       .docxComputer software is defined       .docx
Computer software is defined .docx
 
Types of software, advantages and disadvantages
Types of software, advantages and disadvantagesTypes of software, advantages and disadvantages
Types of software, advantages and disadvantages
 
Application Software
Application SoftwareApplication Software
Application Software
 
CSE18R264 - Unit 1.pptx
CSE18R264 - Unit 1.pptxCSE18R264 - Unit 1.pptx
CSE18R264 - Unit 1.pptx
 
Class work 3_computer_network_317
Class work 3_computer_network_317Class work 3_computer_network_317
Class work 3_computer_network_317
 
Software Licences
Software LicencesSoftware Licences
Software Licences
 
Ch # 03 software
Ch # 03  softwareCh # 03  software
Ch # 03 software
 
COM 115.pdf
COM 115.pdfCOM 115.pdf
COM 115.pdf
 
Application Software in Computer and Services.pptx
Application Software in Computer and Services.pptxApplication Software in Computer and Services.pptx
Application Software in Computer and Services.pptx
 
An Ultimate Guide To Custom Software Development
An Ultimate Guide To Custom Software DevelopmentAn Ultimate Guide To Custom Software Development
An Ultimate Guide To Custom Software Development
 
Ethical consideration in open source software
Ethical consideration in open source softwareEthical consideration in open source software
Ethical consideration in open source software
 
Ethical consideration in open source software
Ethical consideration in open source softwareEthical consideration in open source software
Ethical consideration in open source software
 
SE 18CS35 Module 1.pdf
SE 18CS35 Module 1.pdfSE 18CS35 Module 1.pdf
SE 18CS35 Module 1.pdf
 
All about APPS
All about APPSAll about APPS
All about APPS
 
Group Presentation 2 - CIS285 - End User Application Softwares.pptx
Group Presentation 2 - CIS285 - End User Application Softwares.pptxGroup Presentation 2 - CIS285 - End User Application Softwares.pptx
Group Presentation 2 - CIS285 - End User Application Softwares.pptx
 
TLE-ICT COMPUTER SYSTEMS SERVICING DIAGNOSING COMPUTER SYSTEM
TLE-ICT COMPUTER SYSTEMS SERVICING DIAGNOSING COMPUTER SYSTEMTLE-ICT COMPUTER SYSTEMS SERVICING DIAGNOSING COMPUTER SYSTEM
TLE-ICT COMPUTER SYSTEMS SERVICING DIAGNOSING COMPUTER SYSTEM
 
What is Application Software?
What is Application Software?What is Application Software?
What is Application Software?
 
Impacts of ICT on social effects
Impacts of ICT on social effectsImpacts of ICT on social effects
Impacts of ICT on social effects
 
Marketing of services Australian Education
Marketing of services Australian EducationMarketing of services Australian Education
Marketing of services Australian Education
 
Why Developer fights Programmer
Why Developer fights ProgrammerWhy Developer fights Programmer
Why Developer fights Programmer
 

More from Burhan Ahmed

Wireless mobile communication
Wireless mobile communicationWireless mobile communication
Wireless mobile communication
Burhan Ahmed
 
Virtual function
Virtual functionVirtual function
Virtual function
Burhan Ahmed
 
Types of computer
Types of computerTypes of computer
Types of computer
Burhan Ahmed
 
Trees
TreesTrees
Topology
TopologyTopology
Topology
Burhan Ahmed
 
The distinction of prophet muhammad (s.a.w) among the teachers of moral conduct
The distinction of prophet muhammad (s.a.w) among the teachers of moral conductThe distinction of prophet muhammad (s.a.w) among the teachers of moral conduct
The distinction of prophet muhammad (s.a.w) among the teachers of moral conduct
Burhan Ahmed
 
Software house organization
Software house organizationSoftware house organization
Software house organization
Burhan Ahmed
 
Social interaction
Social interactionSocial interaction
Social interaction
Burhan Ahmed
 
Role model
Role modelRole model
Role model
Burhan Ahmed
 
Rights and duties
Rights and dutiesRights and duties
Rights and duties
Burhan Ahmed
 
Planning work activities
Planning work activitiesPlanning work activities
Planning work activities
Burhan Ahmed
 
Peripheral devices
Peripheral devicesPeripheral devices
Peripheral devices
Burhan Ahmed
 
Parallel computing and its applications
Parallel computing and its applicationsParallel computing and its applications
Parallel computing and its applications
Burhan Ahmed
 
Operator overloading
Operator overloadingOperator overloading
Operator overloading
Burhan Ahmed
 
Normalization
NormalizationNormalization
Normalization
Burhan Ahmed
 
Managing strategy
Managing strategyManaging strategy
Managing strategy
Burhan Ahmed
 
Letter writing
Letter writingLetter writing
Letter writing
Burhan Ahmed
 
Job analysis and job design
Job analysis and job designJob analysis and job design
Job analysis and job design
Burhan Ahmed
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual property
Burhan Ahmed
 
Inheritance
InheritanceInheritance
Inheritance
Burhan Ahmed
 

More from Burhan Ahmed (20)

Wireless mobile communication
Wireless mobile communicationWireless mobile communication
Wireless mobile communication
 
Virtual function
Virtual functionVirtual function
Virtual function
 
Types of computer
Types of computerTypes of computer
Types of computer
 
Trees
TreesTrees
Trees
 
Topology
TopologyTopology
Topology
 
The distinction of prophet muhammad (s.a.w) among the teachers of moral conduct
The distinction of prophet muhammad (s.a.w) among the teachers of moral conductThe distinction of prophet muhammad (s.a.w) among the teachers of moral conduct
The distinction of prophet muhammad (s.a.w) among the teachers of moral conduct
 
Software house organization
Software house organizationSoftware house organization
Software house organization
 
Social interaction
Social interactionSocial interaction
Social interaction
 
Role model
Role modelRole model
Role model
 
Rights and duties
Rights and dutiesRights and duties
Rights and duties
 
Planning work activities
Planning work activitiesPlanning work activities
Planning work activities
 
Peripheral devices
Peripheral devicesPeripheral devices
Peripheral devices
 
Parallel computing and its applications
Parallel computing and its applicationsParallel computing and its applications
Parallel computing and its applications
 
Operator overloading
Operator overloadingOperator overloading
Operator overloading
 
Normalization
NormalizationNormalization
Normalization
 
Managing strategy
Managing strategyManaging strategy
Managing strategy
 
Letter writing
Letter writingLetter writing
Letter writing
 
Job analysis and job design
Job analysis and job designJob analysis and job design
Job analysis and job design
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual property
 
Inheritance
InheritanceInheritance
Inheritance
 

Recently uploaded

Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
ShivajiThube2
 

Recently uploaded (20)

Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
 

Uses misuses and risk of software

  • 2. SOFTWARE: Definition: Software is the set of instruction that enable the user to communicate with computer and perform its task . with out software hardware is nothing. Example: without browser you cannot surf internet. In this way with out operating system you cannot run browser and do any thing on computer.
  • 3. TYPESOF SOFTWARE: Two types of software: System software: system software is a program that is designs to run hardware and application programs like mac , windows , etc. Application software Application software is designs to help the user to complete its task.in other words the applications software are the application that run on computer .
  • 4. USESOF SOFTWARE Software's are commonly uses in every field of life because of the increase of the use of computer in every field. • Business • Medical field • Home • Education • Industries • Communication
  • 5. BUSINESS: Almost every business uses computer to complete its daily tasks . from making contacts with clients, input records and generating reports and allow business more mannered way as tradition like paper work. Marketing: Computer allows business to make websites, stunning ads and a complete marketing operations . marketing videos editing and creating marketing ads in-home with special software's.
  • 6. ATHOME: At home computer are used for variety of purposes . Computer in home providing training , technical reports, internet for students , families in participating and for calculating monthly expenses. Education: Computer is used in education in teacher learning, testing and evaluation ,guidance purpose and school administration.
  • 7. MISSUSESOF SOFTWARE'S: Computer are also used for beneficial as well as illegal and destroy purpose . with the help of it people committing farads , stealing data and cause damage other records etc. Uses of software in hacking purpose and disobey privacy policies of other . A license agreement is the establish a legal agreement between customer and the man or company that develop the software . if a person is use this software with out purchasing is misuse of software.
  • 8. EXAMPLE: If a person buy software from un authorized site and then he want to activate it . It not activate because the license is used by the previous user from which he purchase . and software id not registered because license is not transferable.
  • 9. RISKSOF SOFTWARE: Risk: Risk is future uncertain events with a probability( ‫ن‬‫ا‬‫کم‬‫ا‬ ) of occurrence and a potential for loss. Product risk is the possibility that the system or software might fail to satisfy or fulfill some reasonable expectation of the customer, user, or stakeholder. (Some authors also called the ‘Product risks’ as ‘Quality risks’ as they are risks to the quality of the product.)
  • 10. SOMESOFTWARE PRODUCT RISKS:  If the software is unreliable and frequently fails to work.  If software fail in ways that cause financial or other damage to a user or the company that user works for.  If the software has problems related to a particular quality characteristic, which might not be functionality, but rather security, reliability, usability, maintainability or performance.