Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
Transcript of ITGS- Software
Automatically part of the software or are distributed separately by the companies.
Examples: enterprise software, accounting software, office suites, graphics software, and media players.
Can be used with different platforms, others are specifically created for it. Operating Software Is necessary for computer to operate.
The operating system is loaded from the hard disk into the computers memory (RAM)
Give the computer the basic functionality for other software to run, allows disk access, for controlling and managing Input and Output
Includes Linux, Windows etc. Interfaces In command-line interface (CLI) user issues commands to the program in the form of successive lines of text (command lines). May refer to the means of communication between the computer and the user by a monitor or a keyboard, via, and any other point of communication involving a computer. Tool that refers to a point of interaction between components, and is applicable at the level of both hardware and software graphical user interface (GUI) allows users to interact with electronic devices using images rather than text commands. Licensing Licensing Authorities The Business Software Alliance (BSA) is a trade group established in 1988
Representing a number of the world's largest software makers
Member of the International Intellectual Property Alliance
Its principal activity is trying to stop copyright infringement of software produced by its members. Web-based Software Software you use over the Internet with a web browser or applications that are accessed by users over a network.
You don’t have to install any CDs, download any software, or upgrade.
Online bank or web-based email program like Gmail, Hotmail, or Yahoo Mail are web-based software. A rule or pattern that specifies how a certain input sequence (often a sequence of characters) should be mapped to a replacement input sequence according to a defined procedure.
Can be used to make tasks using the application less repetitive or work as a tool that allows a programmer to enable code reuse or even to design domain-specific languages. Shareware Freeware Public domain Proprietary Open source Proprietary software that is provided to users without payment on a trial basis
Often limited by any combination of functionality, availability or convenience.
Offered as a download from an Internet website or as a compact disc.
"Free trial" or "trial version" are indicative of shareware. Software, or intellectual property, that was never protected by patent or copyright, it expired, or has been declared by its creator to be released unconditionally for public use, including distribution and modification, in any manner and under any circumstances.
It is entirely free of any copyright restrictions or any other property protections. Software given away free of charge over the Internet or through a user group.
Some developers never charge for its use and forbid others to do so.
Some freeware is available in commercial versions, with charges for support, but not for licensing.
Freeware is generally not public domain software, as there usually are restrictions on its use and modification. Software distributed under a license that makes the source code freely available to the user.
Encourages the user to modify the source code as long as the modifications are made freely available to other users.
Open source software generally is available at no charge. Privately owned or controlled.
Technology that has been developed by an individual, corporation, or other legal entity that considers the specifications to be a trade secret of value and that retains the exclusive right to exploit it.
Proprietary technologies generally are patented, which prevents others from copying or otherwise duplicating them. Commercial software Custom-built software Also known as bespoke software or tailor made softwares
Specially developed for some specific organization or other user.
It can accommodate that customer's particular preferences and expectations Computer software that is produced for sale or that serves commercial purposes.
Most often proprietary software, but free software packages may also be commercial software. User support Manual: guidebook that tells the user how to operate a system and how to use it correctly, also any other information that the user should be aware of. Tutorial: An instructional program that takes the user through a prescribed sequence of steps in order to learn a product. Help system: Software that provides assistance with a hardware device or with software. Help systems can follow standard formats or be step-by-step. Data transfer American Standard Code for Information Interchange (ASCII): a character-encoding scheme originally based on the English alphabet. Codes represent text in computers, communications equipment, and other devices that use text. Zip file: file format used for data compression and archiving. Contains one or more files that have been compressed, to reduce file size, or stored as is. Tab delimited text file: simple text format for a database table. Each record in the table is one line of the text file. Each field value of a record is separated from the next by a tab stop character – it is a form of the more general delimiter-separated values format. Registration Serial Number Warranty Copyright agreement A unique number assigned by the vendor to each unit of hardware or software. Written agreement entered into by the owner of a property or system giving permission to another to use that property or engage in an activity in relation to that property. Assurance that the seller of the property being purchased is representing it truthfully and that the seller will repair or replace any additional defects which are found Identifying oneself online. As a result, the publisher of the site is able to make demographics about its audience. It also makes logging into the site faster for visits and enables the site to tailor its results to the user. TXT- Text files are a type of computer file
structured as a sequence of
lines of electronic text. It refers to
a type of container rather than a type
of content. RTF- a proprietary document style format developed by Microsoft for its products and for cross-platform\ documents interchange. The rich text format is supported by most word processors. File formats PDF- The portable document format is a file format, which represents the files independently from their operating systems, application software, or hardware. Each PDF file encapsulates a complete description of a fixed-layout flat document, including the text, fonts, graphics, and other information needed to display it. SWF- The small web format is
a file format used for action scripts,
vector graphics, and multimedia.
These files are characterized by
their content of animations. ZIP- Zipped files are a file format used for archiving and compressing data. The zip files permits to store a document while compressing it. PNG- portable network graphics bitmap is a bitmapped
image format that employs lossless data compression.
It was created to improve or even replace GIF. JPEG- Joint Photographic Experts Group bitmap is a method of compressing
digital photography. The degree of compression can
be adjusted, allowing a selectable
tradeoff between storage size and image quality. HTML- hypertext markup language is the main markup language for displaying web pages and other information that can be displayed in a web browser. system utilities System utilities Defragmentation/optimization
and disk utility software Backup, file management,
account and accessibility
management Monitor and keyboard settings,
for example, international settings,
disability settings Antivirus or anti-virus software is software used to prevent, detect and remove malware
(of all descriptions), such as: computer viruses, adware, backdoors, malicious hijackers, keyloggers, malicious LSPs, rootkits, spyware, trojan horses and worms. Computer security, including protection from social engineering techniques, is commonly offered in products and services of antivirus software companies. This page discusses the software used for the prevention and removal of malware threats, rather than computer security implemented by software methods. Virus scan, malware detectors
and removers Lossless data compression is a class of data compression
algorithms that allows the exact original data to be reconstructed
from the compressed data. The term
lossless is in contrast to lossy data compression,
which only allows an
approximation of the original data t
o be reconstructed, in exchange for better
compression rates. Compression/decompression (lossless, lossy) is computer software or
an operating system designed
to operate and control the
computer hardware and to
provide a platform for running
application software. a process that reduces the
amount of fragmentation. It
does this by physically organizing
the contents of the mass
storage device used to store
files into the smallest number
of contiguous regions (fragments).
It also attempts to create larger
regions of free space using
compaction to impede the return of fragmentation. a backup or the process of backing
up refers to making copies of data
so that these additional copies may
be used to restore the original after a data loss event A user may have a user account
that identifies the user by a
username also user name, screen
name or handle. To log in to an
account, a user is typically required
to produce a password or other
credentials for the purposes of accounting, security, logging, and resource management The monitor comprises the display device, circuitry, and an enclosure. The display device in modern monitors is typically a thin film transistor liquid crystal display (TFT-LCD) thin panel, while older monitors use a cathode ray tube (CRT) about as deep as the screen size. A computer keyboard distinguishes each physical key from every other and reports all key presses to the controlling software. Keyboards are also used for computer gaming, either with regular keyboards or by using keyboards with special gaming features, which can expedite frequently used keystroke combinations. A keyboard is also used to give commands to the operating system of a computer, such as Windows' Control-Alt-Delete combination, which brings up a task window or shuts down the machine. Keyboards are the only way to enter commands on a command-line interface. lossy compression is a data encoding method that compresses
data by discarding (losing) some of it. The procedure aims to minimize the amount of data that needs to be held, handled, and/or transmitted by a computer. Three categories
Operating System software
Utilities Software Fundamentals Operating System An operating system is a computer program which controls everything the computer does handling communication between software and hardware allocating computer memory and CPU time organizing how data is stored Task 1: Create a Prezi presentation title Software answers for the following: What is integrated Software? Give examples?
What is Dynamic Data Exchange? Give Examples?
What are some of the basic functions of software? Give Examples
What is Groupware?
What does an Operating system do?
What are some common operating systems and how are they designed? Task 2: Add to your Prezi presentation Sub Title: Interfaces- the answers to following: What are some of the features of GUI's? Give Examples
What are command line interfaces?
Are command line Interfaces dependent on the English Language? If so HOW?
What is Speech Recognition?
How is text to speech easier than speech/voice recognition?
What is the main requirement for users using Menu Driven Interfaces? The advantage of this type of interface is? The disadvantage is? Common features of Licensing:- Preventing Software Piracy Use of activation Keys: these are long strings of numbers and letters. The user has to type in when installing a program Use of Dongle: dongle must be connected to the computer to use the software for it to work. The dongle has an integrated chip so cannot be copied. Original CD - Rom DVDs: these are long strings of numbers and letters. The user has to type in when installing a program Wizards A user interface type that presents a user with a sequence of dialog boxes that lead the user through a series of well-defined steps.
Tasks that are complex, infrequently performed, or unfamiliar may be easier to perform using a wizard.
Some are called "assistants" or "Setup Assistant" Serves as a starting point for a new document.
When you open a template, it is pre-formatted in some way.
Tool for enforcing a standard layout and look and feel across multiple pages or within content regions.
Templates provide additional standardization controls, depending on the type you use. Templates Macros Ms. Isabella Ethical and Social Issues in Computing Fundamentals Questions 3:Question
The hardware needed to run the business is already in place, but they need to replace the software currently being used. Describe three items of software that they will need to buy to run the business effectively and for what purpose each item will be used.
Do not name brands.. example Microsoft Read page 76 for further reading
Question 2: Imagine you are John..
Devise a backup strategy for your data. Which data do you back up where and how often? Question 4:
Identify three social factors that they will need to discuss before changing to a business exclusively on the Internet. Discuss the implications of each and weigh up the importance of your arguments Task 3 Answers the following questions
Describe what is a Trojan horse?
Identify ways in which the user can be protected from Trojans? Briefly explain each precautions
Explain what spy ware is?
Describe how a computer worm effects a computer?
Explain what a logic bomb is and how it affects a computer