Types of Software

Total Page:16

File Type:pdf, Size:1020Kb

Types of Software IT (9626) Theory Notes Types of Software Application software: IT (9626) Theory Notes System software: IT (9626) Theory Notes Utility software: Disk compression utilities Disk compression tools do the job of compressing or decompressing data on the drive, so that there is more space for additional data to be stored. Disk checkers and cleaners These utilities check the hard drive for any damaged or unnecessary files and delete them for efficient hard disk functioning. These tools are good for increasing the speed of a slow computer. Antivirus software There are many different antivirus software available to purchase on the market and even some free versions for download. They protect your computer against any viruses which may attempt to get on your computer. Backup utilities As the name suggests, these data backup tools are used to copy all information and provide it, when required, such as in case of disk failure or file corruption. Operating systems: To enable computer systems to function and to allow users to communicate with computer systems, special software known as operating systems (OS) have been developed. The general tasks for a typical operating system include: control the operation of the input, output and backing storage devices supervise loading, running and storage of applications programs deal with errors that occur in application programs maintain security of the whole computer system maintain a computer log (which details computer usage) allow communication between the user and the computer system (user interface). .
Recommended publications
  • Computoredge 10/24/14: Programmer's Brain
    October 24, 2014 List of ComputorEdge Sponsors List of ComputorEdge Sponsors San Diego ComputorEdge Sponsors Colocation and Data Center redIT With approaches like smart security, customized colocation and an extensive range of managed services, redIT helps you intelligently leverage IT. Computer Store, Full Service Chips and Memory New Systems Starting At $299 Visit Our Website or Call for Hardware, Software, Systems, or Components Laptop*Desktop*Server IT Service * Upgrades * Service Everyday Low Prices Macintosh Specialists Maximizers Serving San Diego County Since 1988 * Onsite Macintosh Service for Home and Small Office Needs * ACSP: Apple Certified Support Professional ACTC: Apple Certified Technical Coordinator Apple Consultant's Network Repair General Hi-Tech Computers Notebooks, Monitors, Computers and Printers We Buy Memory, CPU Chips, Monitors and Hard Drives Windows 7 Upgrades Phone (858) 560-8547 Colorado ComputorEdge Sponsors 2 October 24, 2014 ComputorEdge™ Online — 10/24/14 ComputorEdge™ Online — 10/24/14 Click to Visit ComputorEdge™ Online on the Web! Programmer's Brain Very few people have it, but maybe more people should want it. Magazine Summary List of ComputorEdge Sponsors Digital Dave by Digital Dave Digital Dave answers your tech questions. Removing Insta Share Adware; Too Many Chrome Processes. Programming and the Brain by Jack Dunning In the Brain Programming Is More Like Language Than Math While there is controversy about how beneficial writing programs is to the human brain, there are good reasons for everyone to learn at least a little coding. A Beginner's Trick for Inserting Next Friday's Date and an Important Tip for Any AutoHotkey User by Jack Dunning A Novice AutoHotkey Trick for Next Friday and a Possible Solution for Failing Hotkeys Taking a break from Regular Expressions (no we are not done, yet), a simple script for adding next Friday's date (or any other day of the week) to any Windows document.
    [Show full text]
  • Hank Feinberg Webinar on Cloud Computing
    Photo: Charles Hildebrandt Vol 11 / Issue 4 Brookdale Computer Users Group • Lincroft, NJ April 2012 Hank Feinberg webinar on cloud computing By Joanne Grazide, VP - Programs delivery of computing as a service rather than We are proud to announce our second of three a product, which means that “shared resources, spring webinars will be given by Hank Feinberg, software, and information are provided to from the APCUG Speakers Bureau. Hank is computers and other devices as a utility (like familiar with the needs of user groups and has the electricity grid) over a network (typically the extensive experience speaking on various topics Internet)” (from Wikipedia). at all levels of expertise. The term “cloud” has been in use, originally Hank will clarify for us what the cloud is and in the context of schematics used by network how we can use it. He will talk about available administrators, and later to describe the Internet. applications, current providers and security. He Currently, the cloud is used to describe any type will also discuss differences between public and of virtual computing which involves the Internet private clouds, and more. Hank Feinberg rather than your local hard drive. This conceptual One definition of “Cloud Computing” is the Continued on page 2 When: 7 p.m. Friday, April 20 Future BCUG General Meeting Topics • May: Bruce Fowler of BCUG’s Linux workshop on Linux Basics Where: MAS 100, Brookdale CC, Lincroft, • June: Kathy Jacobs of APCUG – webinar on social media near west end of parking lot #6. • July: Johnny Corbett on creating and marketing applications CyberQuickies workshop series to debut soon At the March General Meeting, we talked about CyberQuickies, our President’s Message name for a series of workshops on the first Saturday each month at 10 By Sandy Rand n srand98[at]gmail.com am in ATeC 224.
    [Show full text]
  • User Guide to Power Management for Pcs and Monitors
    LBNL-39466 UC-1600 ERNEST ORLANDO LAWRENCE BERKELEY NATIONAL LABORATORY User Guide to Power Management for PCs and Monitors Bruce Nordman, Mary Ann Piette, Kris Kinney, and Carrie Webber Environmental Energy Technologies Division January 1997 I(') 0 !:ri ...... o m -sCD:o Olllrrt '......... s:: z (')z 1. 111 om , <+ <+ I CD (') ·- ~ ~ -< C.--- CQ ·.J'~Ill ,0" ' ' t:T Ill r-. 0 -s CD, , C< . z, Ill . I r+l (') r/ .. o o ·w ,"l :0 •"0· . ID c: CD 'C< .;.t l ~. 't-' '~) DISCLAIMER This document was prepared as an account of work sponsored by the United States Government. While this document is believed to contain correct information, neither the United States Government nor any agency thereof, nor the Regents of the University of California, nor any of their employees, makes any warranty, express or implied, or assumes any legal responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by its trade name, trademark, manufact). .lfer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government or any agency thereof, or the Regents of the University of California. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or any agency thereof or the Regents of the University of California. LBNL-39466 UC-1600 User Guide to Power Management for PCs and Monitors Bruce Nordman, Mary Ann Piette, Kris Kinney, and Carrie Webber Environmental Energy Technologies Division Lawrence Berkeley National Laboratory University of California Berkeley, CA 94720 January 1997 This work was supported by the Assistant Secretary for Energy Efficiency and Renewable Energy, Office of Building Technology State and Community Programs and the Federal Energy Management Program of the U.S.
    [Show full text]
  • Handydrive-5 Operations Manual
    HandyDrive-5 Operations Manual R.1 HandyDrive-5 - Operations Manual R.1 HandyDrive Key Product Features Capacity : 250/320/400/500GB (Using M250) Sleek & Slim Design 85mm x 135mm x 15mm Less than 170g Power Saving Firmware (M250+Handy) Backup Software Security Password Lock Tool Format & Partition Utility Bundled Software Supports 11 Languages: o English o French o Spanish o Portuguese o German o Italian o Russian o Traditional-Chinese o Simplified-Chinese o Korean o Japanese Warranty Period in Americas: 3 years (Asia:3yrs, EMEA:2yrs) Fujitsu Supported Diagnostics HandyDrive-5 - Operations Manual R.1 Table of Contents HandyDrive HDD Installation HandyDrive Hard Disk Format Tool Backup Utility Software Password Lock Tool HandyDrive Diagnostics Diagnostic Error Codes HandyDrive-5 - Operations Manual R.1 HandyDrive Installation Steps 1. Plug the USB Mini-B end of the cable into the HandyDrive, and place the USB Series “A” plug into the host computer. 2. MS Windows will detect the connection of a “USB Mass Storage Device”, and report that “USB2.0 HandyDrive500” is ready for use. Depending upon the capacity, you will see the new drive in the storage device list, e.g. Handy160 (D:) 3. Installation is complete, when the MS Windows Found New Hardware wizard reports that the drive is ready for use. Should the need arise to reset the partitions from the factory defaults; a Format & Partition Utility is included with the bundled software package. See the next section of the manual for the utility software operating procedure. HandyDrive-5 - Operations Manual R.1 HandyDrive Hard Disk Format Tool Purpose The Hard Disk Format Tool is the software utility for Windows which enables you to reset the HandyDrive partitions and the format to: o The factory default setting o To split drive into multiple partitions o To delete the partitions Caution: The data inside the hard disk will be lost if any alteration, deletion or formatting of the partition is executed.
    [Show full text]
  • Development Team
    Paper No: 05 ICTPrincipal for InvestigatorLlibraries Director & Dr. Jagdish Arora, INFLIBNET Centre, Gandhinagar Module : 04 ApplicationSubject Coordinator Software: System Software and Service Software Development Team PrincipalPaper Coordinator Investigator Dr. Jagdish Arora, Director & INFLIBNET Centre, Gandhinagar Subject Coordinator Content Writer Dr Usha Mujoo Munshi, Librarian, Paper Coordinator Indian Institute of Public Administration Content Reviewer Dr Charru Malhotra, Content Writer Associate Professor, Indian Institute of Public Administration Dr Usha Mujoo Munshi, Librarian, Content Reviewer Indian Institute of Public Administration PaperContent Coordinator Reviewer Application Software: System Software and Service Software I. Objectives The primary objectives of this module are to impart basic knowledge and understanding of: • Fundamental Definition of Software • Various kinds of software, including Systems-Software, Application-Software and related important sub-categories for each. • Relevant software related issues such as Software bugs, Open Source Software and Software Licensing. II. Learning Outcome After going through this lesson, learnerswould gain knowledge on basics of computer software and their two categories, namely system software and application software. You will particularly learn about application software including word processing software, spreadsheet applications and database management system. Learnerswould also attain knowledge about software, their types and categories, software licensing and open source software. III. Structure of the Module 1. Software: Definition 2. Categories of Software 3. Understanding System Software 3.1 Operating system 3.1.1 Functions of Operating System 3.1.2 Types of Operating Systems 3.1.3 Some Popular Operating Systems: Although different types of operating systems are listed above few of them are more popular on microcomputers and the following paragraphs explain the same.
    [Show full text]
  • COMPUTER SOFTWARE Software Is a Set of Programs That Instructs the Computer About the Tasks to Be Performed
    COMPUTER SOFTWARE Software is a set of programs that instructs the computer about the tasks to be performed. Software tells the computer how the tasks are to be performed or hardware carries out these tasks. Different sets of software can be loaded on the same hardware to perform different kinds of tasks. For example, a user can use the same computer hardware for writing a report or for running a payroll program. TYPES OF SOFTWARE Software can be broadly classified into two categories: Figure 1: Software Hierarchy 1. System Software, and 2. Application Software. System software provides the basic functions that are performed by the computer. It is necessary for the functioning of a computer. Application software is used by the users to perform specific tasks. The user may choose the appropriate application software, for performing a specific task, which provides the desired functionality. The system software interacts with hardware at one end and with application software at the other end. The application software interacts with the system software and the users of the computer. 1. SYSTEM SOFTWARE System software provides basic functionality to the computer. System software is required for the working of computer itself. The user of computer does not need to be aware about the functioning of system software, while using the computer. For example, when you buy a computer, the system software would also include different device drivers. When you request for using any of the devices, the corresponding device driver software interacts with the hardware device to perform the specified request. If the appropriate device driver for any device, say a particular model of a printer, is installed on the computer, the user does not need to know about the device driver, while printing on this printer.
    [Show full text]
  • IRM 5239-08A Computer Security Procedures.Pdf
    5239/08A CSBT-8 From: Commandant of the Marine Corps Subj: COMPUTER SECURITY PROCEDURES Ref: (a) DODD 5200.28 (b) SECNAVINST 5239 (c) MCO P5510.14 (d) MCO 5271.1 Encl: (1) IRM-5239-08 1. PURPOSE. To provide guidance and amplification on the requirements contained in references (a) through (c) for compliance with the computer security program. Detailed procedures and guidance relating to the accreditation process, contingency planning, small computer systems and data access security will be addressed in separate technical publications. 2. AUTHORITY. This publication is published under the authority of reference (d). 3. APPLICABILITY. The guidance contained in this publication is applicable to all contractors and Marine Corps personnel responsible for the use of equipment which is designed, built, operated and maintained to collect, record, process, store, retrieve, and display information. This standard is applicable to the Marine Corps Reserve. 4. SCOPE a. Compliance. Compliance with the provisions of this publication is required unless a specific waiver is authorized. b. Waivers. Waivers to the provisions of this publication will be authorized only by MCCDC (AS) on a case by case basis. 5. RECOMMENDATIONS. Recommendations concerning the contents of this technical publication should be forwarded to the Commanding General, Marine Corps Combat Development Command (via the appropriate chain of command) at the following address: CG MCCDC Director Architecture and Standards Division - C491 3255 Myers Avenue Quantico, VA 22134-5048 6. SPONSOR. The sponsor of this technical publication is MCCDC (AS). DISTRIBUTION: PCN 186 523908 00 Copy to: 8145001 UNITED STATES MARINE CORPS Information Resources Management (IRM) Standards and Guidelines Program COMPUTER SECURITY PROCEDURES IRM-5239-08A Encl (1) (This page intentionally left blank) RECORD OF CHANGES Log completed change action as indicated.
    [Show full text]
  • Computoredge 12/13/13: Windows 8 Fails!
    December 13, 2013 List of ComputorEdge Sponsors List of ComputorEdge Sponsors San Diego ComputorEdge Sponsors Colocation and Data Center redIT With approaches like smart security, customized colocation and an extensive range of managed services, redIT helps you intelligently leverage IT. Computer Books LOL Computer/Internet Humor Anecdotes and Jokes about Computers, the Internet, Users, and the People Who Work on Them. Windows 7 Secrets E-Books Four-Book Windows 7 E-Book Special at Amazon! Computer Store, Full Service Chips and Memory New Systems Starting At $299 Visit Our Website or Call for Hardware, Software, Systems, or Components Laptop*Desktop*Server IT Service * Upgrades * Service Everyday Low Prices Macintosh Specialists Maximizers Serving San Diego County Since 1988 * Onsite Macintosh Service for Home and Small Office Needs * ACSP: Apple Certified Support Professional ACTC: Apple Certified Technical Coordinator Apple Consultant's Network Repair General Hi-Tech Computers Notebooks, Monitors, Computers and Printers We Buy Memory, CPU Chips, Monitors and Hard Drives Windows 7 Upgrades Phone (858) 560-8547 2 December 13, 2013 Colorado ComputorEdge Sponsors Colorado ComputorEdge Sponsors Computer Books LOL Computer/Internet Humor Anecdotes and Jokes about Computers, the Internet, Users, and the People Who Work on Them Windows 7 Secrets E-Books Four-Book Windows 7 E-Book Special at Amazon! 3 December 13, 2013 ComputorEdge™ Online — 12/13/13 ComputorEdge™ Online — 12/13/13 Click to Visit ComputorEdge™ Online on the Web! Windows 8 Fails! While Windows 8 is not a bad operating system, users have given it a big thumbs down. Can Microsoft recover from this debacle? Magazine Summary List of ComputorEdge Sponsors Digital Dave by Digital Dave Digital Dave answers your tech questions.
    [Show full text]
  • Admin Utility.Book
    Administrator Utility Elzone II 5390 Confirm User’s Guide V1.00 539-42811-10 September 2007 Windows is a registered trademark of Microsoft Corporation. © Micromeritics Instrument Corporation 2003-2007. All rights reserved. The software described in this manual is furnished under a license agreement and may be used or copied only in accordance with the terms of the agreement. Elzone II 5390 Administrator Utility Table of Contents TABLE OF CONTENTS Introduction . .1 Manual Organization . .1 Conventions . .2 Installing the Software and Entering User Profiles . .2 Step 1. Recording User Information . .3 User Information Worksheet . .5 Step 2. Connecting the Computer to the Network . .7 Step 3. Determining File Locations. .7 Step 4. Installing the Micromeritics Software. .7 Step 5. Adding Users to Windows User Groups. .12 Step 6. Setting Up User Profiles in the Administrator Utility. .12 Starting the Administrator Utility. .12 Entering Password Configuration Parameters . .13 Entering Application User Profiles . .14 Setting Up a Service User Account . .16 Using the Administrator Utility . .17 Logging Onto the Administrator Utility. .17 Maintaining User Profiles . .18 Adding a User. .18 Modifying a User Profile . .18 Deleting a User Profile. .19 Setting a User’s Password . .19 Enabling or Disabling User Access . .21 Locking and Unlocking the Application . .21 Using the System Log . .22 Viewing the System Log . .23 Exporting the System Log . .24 Maintaining the System Log . .25 Exiting the Administrator Utility . .25 Updating the File List. .25 Changing the Application Setup . .26 Starting the Application Setup Program. .26 Installing New Software Versions . .28 Adding an Analyzer . .28 Hardware . .28 Software . .30 Moving an Analyzer from one Computer to another Computer .
    [Show full text]
  • Enhance.Txt 19 Tips for Enhancing CD-ROM Performance Peter
    enhance.txt 19 tips for enhancing CD-ROM performance Peter Brueggeman Scripps Institution of Oceanography Library University of California San Diego CD-ROM PROFESSIONAL, 6(1):17-22, January 1993 Finetuning CD-ROM performance can encompass a range of enhancements, delivering major to modest improvements. Performance can be enhanced for the workstation as well as the workstation manager. The following tips are offered from the author's experience with IBM-compatible CD- ROM workstations; many of the tips apply to Macintosh CD-ROM workstations. HARD DISK - OPTIMIZE FILES Disk optimization software like PC Tools' Compress or Norton Utilities' Speed Disk physically rearrange files on the hard disk so that each file's data resides in contiguous data sectors on disk. Unused disk space is placed at the end of the hard disk, on the inner tracks farthest from the read-write head. CD-ROM search software will load and execute more efficiently if its component data is written contiguously on hard disk. The hard disk head will read it quickly rather than search around the disk for scattered sectors. Optimize the hard disk after installing each new version of CD-ROM software. - PLACE CD-ROM SOFTWARE FILES AT FRONT OF DISK The files comprising the CD-ROM search software should be placed first on the hard disk so that the CD-ROM software loads and executes more quickly. The disk's read-write head performs fastest on the outer tracks and not the inner tracks; therefore CD-ROM search software should be placed on the outer disk tracks (those first on the disk).
    [Show full text]
  • NIELIT Gorakhpur
    NIELIT Gorakhpur Course Name: O Level (2nd Sem) Subject: ITTNB Topic: Utility software Date: 23-03-20 Utility Software:-Utility software, often referred as utility is a system software that is designed to help analyze, configure, optimize or maintain a computer and enhance the computer’s performance. It is a program that performs a specific task, which is usually related to managing the system resources. Utilities are sometimes also installed as memory-resident programs. Utility software usually focuses on how the computer infrastructure that includes computer hardware, application software, operating system and data storage programs operates. These utilities could range from the small and simple to the large and complex that can perform either a single task or a multiple tasks. Some of the functions performed by these utilities are data compression, disk defragmentation, data recovery, management of computer resources and files, system diagnosis, virus detection, and many more. Examples are disk defragmenters, System Profilers, Network Managers, Application Launchers, Antivirus software, Backup software, Disk repair, Disk Cleaners, Registry Cleaners, Disk Space analyzer, file manager, File Compression, Data Security and many more. Open Source Software:-Open source software is released through a specific kind of license that makes its source code legally available to end-users. There are many such licenses, but typically software is considered open source if: It is available in source code form without additional cost, meaning users can view the code that comprises the software and make any kind of changes to it they want. The source code can be repurposed into other new software, meaning anyone can take the source code and distribute their own program from it.
    [Show full text]
  • Open Source Software in the Vertical Market: an Open Niche?
    Conference for Information Systems Applied Research 2011 CONISAR Proceedings Wilmington North Carolina, USA v4 n1808 _________________________________________________ Open Source Software in the Vertical Market: An Open Niche? Michael P. Conlon [email protected] Computer Science Department Slippery Rock University of Pennsylvania Slippery Rock, Pennsylvania 16057, U.S.A. Abstract Much of the universe of open-source software is categorized; abundant open-source software is found for most categories. However, relatively few dual-licensed open-source software programs are found, and very little open-source software is found for vertical markets. Explanations are explored. Keywords: open source, vertical market, horizontal market, dual license 1. INTRODUCTION Since then, much application software has been The phrase open source has been in common either written from scratch or has been open- use since it was suggested in 1998 by Christine sourced from previously-proprietary software. Peterson as an alternative name for what many There has been substantial progress in call free software (Open Source Initiative, developing more and better system software as 2007). This paper is an attempt to categorize well. So what potential domains for open-source each package of a large sample of open source software remain unexplored? That is the software, so as to discover the domains in which question this paper attempts to answer. open source development has been occurring, and in which domains, if any, there has been 2. HYPOTHESES little or no open source development activity. The first hypothesis is that, in spite of the large Much of the earliest open source software variety of open-source software, very little of it consisted of systems software: programming- would be vertical market software, i.e., software language processors, utility programs, database designed to automate businesses of a particular management systems, and operating system type.
    [Show full text]