In Order to Run Software Applications, Computers Must Translate Software

Total Page:16

File Type:pdf, Size:1020Kb

In Order to Run Software Applications, Computers Must Translate Software Introduction to Computers Chapter One Information Technology in Perspective Computers are everywhere: at work, at school, and at home. People use all types and sizes of computers. While some computers sit on top of a desk or on the floor, mobile computers and mobile devices are small enough to carry. Mobile devices, such as many cell phones, often are classified as computers. Computers are a primary means of local and global communication for billions of people. Consumers use computers to correspond with businesses, students with classmates and teachers, and family members with friends and other family members. People use computers to share photos, drawings, documents, calendars, journals, music, and videos. Through computers, society has instant From the computer, you can make a telephone call, meet new friends, share opinions or life stories, book flights, shop, fill prescriptions, file taxes, take a course, receive alerts, and automate your home. Computer is an Electronic device operating under the control of instructions stored in its own memory. Information Technology= Information +technology • Definition of Technology: The application of scientific knowledge to the practical aims of human life. Technology is people using knowledge, tools, and systems to make their lives easier and better • Science deals with the study of phenomena in the natural world (physics, chemistry, geology, • Science deals with "understanding" while technology deals with "doing“ Knowledge chain: data --- Information --- Knowledge Data • Raw facts, a collection of facts from which conclusions may be drawn with different forms such as: text, numbers, images, or thoughts. Information • Processed meaningful data as a result of processing, manipulating and organizing data. Information leads to knowledge Knowledge is the result of perception and learning and reasoning. Information Technology (IT) refers to the integration between computer Technology and Information processing. The implementation of different branches of technology(hardware, software, firmware, and procedure) in information processing (acquisition, storage, manipulation, management, control, display, switching, interchange, transmission, and reception of data). Introduction to Computers. By: Rami Hodrob and Ra’fat Amarneh. 1 Information Processing Cycle: The series of input, process, output, storage and communications. Computers process data (input) into information (output). Computers carry out processes using instructions, which are the steps that tell the computer how to perform a particular task. A collection of related instructions organized for a common purpose is referred to as software. A computer often holds data, information, and instructions in storage for future use. Common Computer Hardware Devices Introduction to Computers. By: Rami Hodrob and Ra’fat Amarneh. 2 Computer system: Is the integration of physical components called Hardware and none physical components called Software. 1. Hardware (H.W.): which are the touchable components and electronic devices (The physical parts of the computer). Including: the Central processing Unit (CPU), Memory and peripheral devices as: Keyboard, mouse, screen,… 2. Software (S.W.): The programs that run over the computer. Hardware (H.W.): Hardware has the following basic components: 1. Input Unit: Devices that enter data to the computer Examples: keyboard, mouse, scanner, camera,………….. 2. Output Unit: The devices, that output information from the computer after processing data. Examples: screen, printer, speaker ………... 3. System Unit The system unit is a case that contains the electronic components of the computer that are used to process data. It includes most of the followings: A. Motherboard: The circuitry of the system unit usually is part of or is connected to a circuit board. Two main components on the motherboard are the processor and memory. The processor, also called a CPU (central processing unit). Central Processing Unit (CPU). Memory (RAM, ROM) Which are mainly the processor and some of the devices on the motherboard (main board). B. CPU is the electronic component that interprets and carries out the basic instructions that operate the computer. CPU has three components: 1- CU (Control Unit): Controls the flow of input/output. Used to ftch and decode instructions. 2- ALU (Arithmetic Logic Unit): Does the logical and arithmetic operations. 3- Registers: Very high speed storage arrears. C. Memory (RAM & ROM, cache): RAM is used to store programs and other data waiting for processing. Memory consists of electronic components that store instructions waiting to be executed and data needed by those instructions. Although some forms of memory are permanent (such as ROM), most memory keeps data and instructions temporarily (RAM), which means its contents are erased when the computer is shut off. D. Storage Unit: devices and media that is used to store data. Such as: Hard Disk, CDs, floppies, flash memory and tapes. Storage Unit: consists of two parts: 1. Primary Storage: RAM (Random Access Memory): is a volatile memory (Data will be lost when turn off the computer). Introduction to Computers. By: Rami Hodrob and Ra’fat Amarneh. 3 ROM (Read Only Memory): is a non volatile memory. (it holds the instructions that boot (startup) and prepare a computer for use). 2. Secondary Storage: Is a part of memory of a computer where programs and data are stored when not in use, like (hard disk, floppy disk, CD, flash memory…). Software (S/W.): Computer programs. Program consists of a series of instructions that tells the computer what to do and how to do it. Types of software: 1) System Software: consists of the programs that control or maintain the operations of the computer and its devices. System Software is needed to operate the computer such as Operating system (Programs that control the operations of the computer, serves as the interface between the user, the application software, and the computer’s hardware. Used to configure and setup the computer options). A. Operating Systems (OS): is a program that acts as an intermediate between a user of a computer and the computer hardware. OS is used for Managing operations, controlling the computer systems, implementing the security, & manages the secondary storage & others. Examples of O.S.: MS DOS (Microsoft Disk Operating System), windows (and its family: win95, win98, win2000, NT2000 and finally win 7 and …), UNIX. Progress of OS: . Batch processing: Only one job is done at the computer at a time. Interactive processing: computer could respond to users while in processing. Real time processing: Data processing keeps pace with tasks at hand so results are part of the transactions. Multi user system: many users use the same computer at the same time. These systems called time sharing systems. It is consisted of one main computer connected to several terminals which is called LAN with PC's. Multitasking system: Many tasks are done at the same computer at the same time. B. Utilities are Programs allow the user to perform maintenance-type tasks usually related to managing a computer, its devices or its programs such as antivirus and disk management and Pc tools 2) Applications Software: enables the users to do special tasks (Programs designed to make users more productive and/or assist them with personal tasks). Introduction to Computers. By: Rami Hodrob and Ra’fat Amarneh. 4 Examples of application software: Communications and Internet. All programs that manages the network system and that connects us to the web like web browsers, chatting, Email programs, dial up… etc. Multimedia and graphics, voice and video, examples: paint shop, Adobe photo shop... Office applications: - Word processors (MS word, word perfect) - Spread sheets (MS Access, Quattro pro) - Desktop publishing (MS publisher) - Project planning (MS project) Home software: like Home Medical Advisor. Games. Educational and research software CAD (Computer Aided Design) and CAM and CBT (Computer Based Training). Databases are environment to store and retrieve data and to manipulate and connect data to extract information. Examples on Database Management Systems are Oracle SQL, server2000, Informix, access. Web application: A software application that obtains information from the Web A programmer, sometimes called a computer programmer or developer, is someone who develops software or writes the instructions that direct the computer to process data into information. Programmers use a programming language or program development tool to create computer programs. Popular programming languages include C++, Java, JavaScript, Visual C#, and Visual Basic. Introduction to Computers. By: Rami Hodrob and Ra’fat Amarneh. 5 Computers are classified into categories according to their computing capabilities: 1. Personal computers (PC): is a computer that can perform all of its input, processing, output, and storage activities by itself. A personal computer contains a processor, memory, and one or more input, output, and storage devices. Personal computers also often contain a communications device. The CPU is on a single chip (one CPU). Used at homes, schools.… Is a single-user. Two types of personal computers are desktop computers and notebook computers. A mobile computer is a personal computer you can carry from place to place. Similarly, a mobile device is a computing device small enough to hold in your hand. A notebook computer, also called a laptop computer, is a portable, personal computer often designed to fit on your lap.
Recommended publications
  • Virus Bulletin, August 1994
    ISSN 0956-9979 AUGUST 1994 THE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL Editor: Richard Ford CONTENTS Technical Editor: Fridrik Skulason Consulting Editor: Edward Wilding, EDITORIAL Network Security Management, UK Bigger, By Being Better? 2 VIRUS PREVALENCE TABLE 3 NEWS Central Point Merger Completed 3 Pathogen Author Arrested 3 IBM PC VIRUSES (UPDATE) 4 IN THIS ISSUE: INSIGHT CARO explained. Many people have no idea what Schwartau on Security 6 CARO is, what it does, or how to join it. Everything you ever wanted to know about the organisation but were FEATURE afraid to ask is on pp.8-9. CARO: A Personal View 8 The professionals professional. For the first time VIRUS ANALYSES ever, VB reviews AVP, one of Russias leading virus 1. AntiCMOS - Brain Damage 9 scanners: have researchers behind the former Iron 2. A Pile of Junk? 11 Curtain made as many advances in their work as those in 3. Pure Thoughts 13 the West? FEATURE The Lotus position. Lotus has adopted a novel ap- Epidemic Virus Control 15 proach to the prevention of large-scale virus outbreaks within the company. How effective is its technique, and PRODUCT REVIEWS is it a practical alternative in other companies? See p.15. 1. AVP - A Professional Choice 18 2. NetShield 1.5 21 END NOTES & NEWS 24 VIRUS BULLETIN ©1994 Virus Bulletin Ltd, 21 The Quadrant, Abingdon, Oxfordshire, OX14 3YS, England. Tel. +44 (0)235 555139. /94/$0.00+2.50 No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form without the prior written permission of the publishers.
    [Show full text]
  • Virus Bulletin, August 1993
    August 1993 ISSN 0956-9979 THE AUTHORITATIVE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL Editor: Richard Ford Technical Editor: Fridrik Skulason Consulting Editor: Edward Wilding, Network Security Management, UK Advisory Board: Jim Bates, Bates Associates, UK, David M. Chess, IBM Research, USA, Phil Crewe, Ziff-Davis, UK, David Ferbrache, Defence Research Agency, UK, Ray Glath, RG Software Inc., USA, Hans Gliss, Datenschutz Berater, West Germany, Igor Grebert, McAfee Associates, USA, Ross M. Greenberg, Software Concepts Design, USA, Dr. Harold Joseph Highland, Compulit Microcomputer Security Evaluation Laboratory, USA, Dr. Jan Hruska, Sophos, UK, Dr. Keith Jackson, Walsham Contracts, UK, Owen Keane, Barrister, UK, John Laws, Defence Research Agency, UK, Dr. Tony Pitt, Digital Equipment Corporation, UK, Yisrael Radai, Hebrew University of Jerusalem, Israel, Roger Riordan, Cybec Pty, Australia, Martin Samociuk, Network Security Management, UK, John Sherwood, Sherwood Associates, UK, Prof. Eugene Spafford, Purdue University, USA, Dr. Peter Tippett, Symantec Corporation, USA, Steve R. White, IBM Research, USA, Joseph Wells, Symantec Corporation, USA, Dr. Ken Wong, PA Consulting Group, UK, Ken van Wyk, CERT, USA. CONTENTS VIRUS ANALYSES 1. Daemaen: Multi-multipartism 9 EDITORIAL 2. 8888 - The Poor Man’s Commander Bomber 12 Crime and Punishment 2 ROGUES’ GALLERY VIRUS PREVALENCE TABLE 3 Keep It To Yourself 14 NEWS Storing Up Trouble 3 PRODUCT REVIEW 40Hex Print DAME Source code... 3 Better CPAV than CPAV? 16 Crown Wins Logic Bomb Case 3 COMPARATIVE REVIEW IBM PC VIRUSES (UPDATE) 4 OS/2 Virus Protection 20 INSIGHT Getting to the Point 7 END NOTES & NEWS 24 VIRUS BULLETIN ©1993 Virus Bulletin Ltd, 21 The Quadrant, Abingdon Science Park, Oxon, OX14 3YS, England.
    [Show full text]
  • George Sanger Floppy Disk Project
    I N F 3 9 2 K - DIGITAL ARCHIVING AN D PRESERVATION GEORGE SANGER FLOPPY DISK PROJECT SPRING 2012 ERIC CARTIER MADELINE FENDLEY JOHN SCHOOLEY LISA CRUCES WELTY TABLE OF CONTENTS TABLE OF CONTENTS ...................................................... 2 INTRODUCTION .................................................................. 3 THE DOLPH BRISCOE CENTER FOR AMERICAN HISTORY 3 CREATOR SKETCH .............................................................. 3 SCOPE AND CONTENTS ................................................... 5 Our Collection ........................................................................... 5 3.5” Floppy Disks ..................................................................... 5 Format Issues ............................................................................. 6 COLLECTION ASSESSMENT ........................................... 6 SELECTION ............................................................................ 7 WORKFLOW ........................................................................... 7 SCREENSHOTS .................................................................... 12 STORAGE AND METADATA ......................................... 34 COLLECTION STRUCTURE ........................................... 35 RECOMMENDATIONS ..................................................... 36 ACKNOWLEDGEMENTS ................................................ 36 APPENDIX A - High-density Disk Image Records ........ 37 APPENDIX B - Norton Backup README File ............. 39 APPENDIX C - PCTOOLS README File
    [Show full text]
  • Deluxe Option Board Manual
    PC-MAC DATA EXCHANGE PROTECTED SOFTWARE BACKUP Deluxe Option Board Copyright 1989 Central Point Software, Inc. Central Point Software, Inc. License Agreement (Single User Products) This is a legal agreement between you, the end user, and Central Point Software, Inc. BY USING THIS SOFTWARE, YOU ARE AGREEING TO BE BOUND BY THE TERMS OF THIS AGREEMENT. IF YOU DO NOT AGREE TO THE TERMS OF THE AGREEMENT, PROMPTLY RETURN THE DISKS AND THE ACCOMPANYING ITEMS (including written materials and binders or other containers) TO THE PLACE YOU OBTAINED THEM FOR A FULL REFUND. CENTRAL POINT SOFTWARE, INC. SOFIWARE LICENSE 1. GRANT OF LICENSE. Central Point Software grants to you the right to use one copy of the enclosed Central Point software program (the “SOFTWARE”) on a single computer (i.e. with a single CPU at a single location). If you wish to put the SOFTWARE on a network server, you must purchase the same number of copies of the SOFTWARE as computers attached to the network. 2. COPYRIGHT. The SOFTWARE is owned by Central Point Software, Inc. or its suppliers and is protected by United States copyright laws and international treaty provisions. Therefore, you must treat the SOFTWARE like any other copyrighted material (e.g. a book or musical recording) except that you may (a) make copies of the SOFTWARE solely for backup or archival purposes, and (b) transfer the SOFTWARE to hard disks provided that only one copy of the SOFTWARE is used at any time. You may not copy the written materials accompanying the SOFTWARE. 3. OTHER RESTRICTIONS.
    [Show full text]
  • Troubleshooting1
    UNESCO-NIGERIA TECHNICAL & VOCATIONAL EDUCATION REVITALISATION PROJECT-PHASE II NATIONAL DIPLOMA IN COMPUTER TECHNOLOGY Computer System Troubleshooting1 COURSE CODE: COM 216 YEAR 2 SEMESTER 1 THEORETICAL BOOK Version 1: December 2008 Table Of Content Opening the Display Properties Panel ....................................................................... 107 The Layout of the Panel ............................................................................................. 108 Background ................................................................................................................ 108 Screen Saver............................................................................................................... 109 Appearance ................................................................................................................ 110 Effects ........................................................................................................................ 111 Web ............................................................................................................................ 111 Settings ....................................................................................................................... 112 Week 1 This Week Learning Outcome To Understand: The Process of Fault diagnosis The Universal Troubleshooting Process Regardless of how complex your particular computer or peripheral device might be, a dependable troubleshooting procedure can be broken down into four basic steps (Fig. 4-1):
    [Show full text]
  • Jonathan Burt's Presentation on The
    EVOLUTION OF HOME SOFTWARE The history of software and how it has evolved and changed over the years for home (and business) users. Welcome • Who am I? • Jonathan A Burt BSc Cert Mgmt HND FIAP IEng MBCS CITP • Batchelor of Science Degree (Open) • Professional Certificate in Management • Higher National Diploma in Computing • Fellow of the Institute of Analysts and Programmers • Incorporated Engineer with the Engineering Council • Member of the British Computer Society • Charted IT Professional • PRINCE2 Practitioner • Certified Novell Administrator (v5.x) • 25+ years experience of working in IT. • Long time member of the Isle of Wight PC User Group! Software Evolution • Over the years software and operating systems have evolved quite drastically. • Gone are the days of the Command Line Interface (CLI), and it’s all Windows and Mouse! • I have tried to show how our use of computers have changed with regard to the evolution of software. • Apologies if I don’t cover your “favourite”! 8bit, 16bit, 32bit, 64bit • Modern PCs use the x86 architecture and as such have limitations on the physical memory range within which they can operate, for example 2x where ‘x’ is: • 8-bit = 256K • 16-bit = 65,536K (i.e. 64 KB) • 32-bit = 4,294,967,296K (i.e. 4 GB) • 64-bit = 18,446,744,073,709,551,616 (i.e. 16 Exabyte or 18,000,000 Terabytes!) Operating Systems - DOS • The dominant Disk Operating System when IBM created the IBM PC, was CP/M (Control Program/Monitor and later Control Program for Microcomputers) owned by Digital Research for the 8-bit Intel 8080 range of processors.
    [Show full text]
  • Chapter 7 Setting up Non-Windows Applications
    Chapter 7 Setting Up Non-Windows Applications This chapter presents details about how to set up and run non-Windows applications under Microsoft Windows 3.1. For information about creating program information files, see Chapter 8, “ PIF s and PIF Editor.” For information about specific problems with running non-Windows applications, see Chapter 13, “Troubleshooting Windows 3.1.” Related information • Windows User’s Guide: Chapter 7, “Non-Windows Applications,” and Chapter 8, “ PIF Editor”; see also the background information on creating program groups and managing files in Chapter 3, “Program Manager,” and Chapter 4, “File Manager” • Windows Resource Kit: “ APPS.INF ” in Chapter 2, “The Windows Setup Information Files”; Part 2, “Configuring Windows 3.1” • Glossary terms: application, expanded memory, extended memory, grabber, PIF , virtual memory Contents of this chapter About Applications...........................................................................................284 Setting Up PIF s and Program Items ..................................................................285 Setting Up a PIF .........................................................................................285 Setting Up Icons in Program Manager.......................................................287 Starting Non-Windows Applications with Windows ........................................288 Starting an Application When Starting Windows......................................288 Starting an Application from the Desktop .................................................289
    [Show full text]
  • Rethinking Software Tying
    Note Rethinking Software Tying Renato Mariottit This Note proposes a new method of product definition in software tying cases. "Tying" is a refusal to sell one product unless the buyer also purchases another product and is a method by which firms are thought to be able to use their power over one product to obtain power over another. Tying is the principal antitrust allegation-brought against Microsoft, which refuses to sell its operating system (Windows) unless the buyer also receives a copy of its web browser (Internet Explorer). Yet Microsoft claims that it has integrated Internet Explorer into Windows, creating a single integrated product. But in order to have tying, two separate products must exist. This dilemma has been dubbed the "single-product problem " and has required courts to define products before conducting further analysis. · This Note explains why traditional methods of product definition cannot be applied to the software industry. The software industry not only requires a new method of defining products, however; it also, by its very nature, transforms the role of the court in software tying cases. After outlining a theory of software evolution, this Note presents a new method of evaluating integrated software and applies it to three recent examples, including the current case against Microsoft. The new test reveals that the combination ofInternet Explorer and Windows should not be considered a single integrated product, because the bundling harms consumer welfare. Introduction .............................................................................................. 368 I. The Traditional Method of Product Definition and Its Limitations ....................................................................................... 370 A Tying Precedents ...................................................................... 370 B. The Inapplicability ofthe Jefferson Parish Test.. ..................... 374 1.
    [Show full text]
  • WA2L/Wintools, End User Tools for Windows
    http://wa2l-wintools.sourceforge.net WA2L/WinTools End User Tools for Windows End User Tools Manual Pages (c) Chr. Walther 2007 - 2021, 04.09.2021, Version 1.2.06 Letter-V1.0, 12.01.2015 WA2L/WinTools(1) Table of Contents WA2L/WinTools(1) TABLE OF CONTENTS Preface wintoolsintro (1) ................................................ 8 1 1by1 (1) ......................................................... 40 7 7-zip (1) ........................................................ 43 A activehotkeys (1m) ............................................... 45 anydesk (1) ...................................................... 47 appstart (1) ..................................................... 50 appstart.cfg (4) ................................................. 55 awk (3) .......................................................... 57 azw2epub (1) ..................................................... 61 azw2epub.cfg (4) ................................................. 64 azw2mobi (1) ..................................................... 66 azw2mobi.cfg (4) ................................................. 69 B banner (1) ....................................................... 71 bes (1) .......................................................... 73 bes.cfg (4) ...................................................... 76 bib2xml (3) ...................................................... 78 bib2xml.xml (4) .................................................. 81 C caffeine (1) ..................................................... 84 caffeine.cfg (4) ................................................
    [Show full text]
  • UNIT of COMPETENCY Install Computer System and Networks
    UNIT OF COMPETENCY Install Computer System and Networks Diagnose and Troubleshoot Computer System Configure Computer System and Networks Maintain Computer System and Networks Can I Yes or No o Plan and Prepare work to ensure occupational health and safety (OHS) policies and procedures are followed. Yes o Obtain materials, tools, equipment and testing devices needed to conform the job requirements. Yes o Interpret work instructions according to the job requirements. Yes o Obtain computer components/devices/systems and determines its location prior to installation. Yes o Install equipment/devices/systems in accordance with the job requirements. Yes o Check/test devices/systems and/ or installations to determine the conformity to the job requirements. Yes o Check computer systems and networks for configuration in accordance with the specification and requirements. Yes o Diagnose fault or problem in the computer systems and networks in line with the standard operating procedure. Yes o Configure the identified systems and networks based on the specifications and job requirements. Yes o Inspect and test configured computer systems and networks in conformity with manufacturer's instructions/manual. Yes o Correct/adjust components or parts of computer system and networks in accordance with job requirements. Yes o Test computer systems and networks to ensure safe operation. Yes o Performs scheduled/periodic maintenance in accordance with manufacturer's requirements. Yes o Make needed repairs/replacements in accordance with established procedures when necessary. Yes o Document tasks undertaken in the accordance with standard operation procedure (SOP). Yes o Clean and clear worksite of all surplus/excess materials in accordance with company standard operation procedure (SOP).
    [Show full text]
  • 23 Years of Freedos
    23 Years of FreeDOS FreeDOS - www.freedos.org Welcome to 23 years of FreeDOS. FreeDOS is a complete, free, DOS-compatible operating system that you can use to play classic DOS games, run legacy business software, or develop embedded systems. Any program that works on MS-DOS should also run on FreeDOS. Would you like to continue? Yes - Bring on the FreeDOS history! Contributions by: Jim Hall, Pat Villani, Fritz Mueller, Luca Ferrari, Imre Leber, Shane Coughlan, Marti Van Lin, Dr. Owain Kenway, Gregory Pietsch, Erwin Waterlander, Joel Graff, Nicolae Crefelean , Sparky4, Nick Gilbert, Catherinus van der Werf, Rugxulo, and Jerome Shidel Edited by: Jim Hall, Lauren Holly, Ben Norrman, and Shane Rose ` Contents Words from Pat Villani 12 ii Why an eBook? Fritz Mueller 13 Luca Ferrari 14 An Introduction 1 from Jim Hall Imre Leber 15 Shane Coughlan 16 Evolution of the 3 FreeDOS Website Marti Van Lin 17 Dr. Owain Kenway 18 History of the 8 FreeDOS Logo Gregory Pietsch 19 History of Joel Graff 20 the FreeDOS 10 Distributions Jerome Shidel 21 Catharinus van der Werf 22 FreeDOS Sparky4 23 Erwin Waterlander 23 Rugxulo 24 Nick Gilbert 25 Nicolae Crefelean 25 Contributors i Why an eBook? On June 29th, 2017, FreeDOS turned 23 years old. There’s nothing special about “23,” but I thought it would be great to celebrate the anniversary by having a bunch of past and current users share their stories about why they use FreeDOS. So, I made a call for users to write their own FreeDOS stories. These stories are written from different perspectives, such as: “How did you discover FreeDOS?” “What do you use FreeDOS for?” and “How do you contribute to FreeDOS?” In short, I requested users to answer the question: “Why FreeDOS?” This eBook contains the voices of many of the users who contributed their stories, as well as the history of FreeDOS.
    [Show full text]
  • Centralpoint Sof!L£Ri!E~ Copy II® PLUS SOFTWARE & DOCUMENTATION COPYRIGHT 1982-1988 Central Point Software, Inc
    CentralPoint Sof!l£rI!e~ COpy II® PLUS SOFTWARE & DOCUMENTATION COPYRIGHT 1982-1988 Central Point Software, Inc. 15220 NW Greenbrier Pkwy/Beaverton, OR 97006 PHONE 503/690-8090 Central Point Software License Statement! This soltware is protected by both United States copyright law and international treaty provisions. Therelore, you must treat this soltware just like a book, with the lollowing single exception. Central Point Soltware authorizes you to make archival copies 01 the soltware lor the sole purpose 01 backing up our software and protecting your investment Irom loss. By saying, "Just like a book," Central Point Software means, lor example that this solt­ ware may be used by any number 01 people and may be Ireely moved lrom one com­ puter location to another, so long as there Is no possibility 01 it being used at one location while it's being used at another. Just like a book that can't be read by two dillerent peo­ ple in two dillerent places at the same time, neither can the soltware be used by two dil­ lerent people in two dillerent places at the same time. WARRANTY With respect to the physical diskette and physical documentation enclosed herein, Central Point Software, Inc. warrants the same to be Iree 01 delects in materials and workmanship lor a period 0160 days Irom the date 01 purehase. In the event 01 notifica­ tion within the warranty period 01 dclects in material or workmanship, Central Point Software will replace the delective diskette or documentation. II you need to return a product, call the Central Point Soltware Service Department to obtain a return autho­ rization number.
    [Show full text]