Computer Software

¡Supera tus tareas y exámenes ahora con Quizwiz!

Multimedia software

You can use multimedia software to play, create, and modify audio and video files. Graphics software, audio- and video-editing software, and media players are all examples of multimedia software.

Application+System Software

they interact with the computer hardware.

Booting

Booting (or booting up) refers to the process of starting a computer. During this process, the operating system runs self-diagnostic checks to test the computer's components. Then, it loads the relevant programs to start the computer.

Cyber Attacks

Cyber attacks include unauthorized access, virus attacks, illegal access to personal information, and so on. Here are some of these laws.

Linux operating system:

Linux is a UNIX-like, open-source operating system. Various free and distinct Linux distributions exist for desktop computers and servers that allow anyone to use, modify, and distribute Linux, both commercially and for not-for-profit service.

MS-DOS:

was the first widely installed operating system for personal computers. It was a single-user/single-tasking operating system designed by Microsoft, and it used a command-line interface. MS-DOS became obsolete with the arrival of more advanced operating systems that used GUIs.

Microsoft Windows

Microsoft is the developer of the Windows series of operating systems. These are single-user/multitasking operating systems with a GUI for user commands. Windows operating systems allow users to share documents on a computer network. In large enterprises, Windows provides a useful tool for teams to network and collaborate on projects. It is the most widely used operating system for personal computers.

Common File Types

(:

Ethical and Security Issues of Software Usage

(:

Functions of an Operating System

(:

Memory management

The memory management function allocates computer memory and central processing unit (CPU) time to various applications and peripheral devices.

User interface:

The operating system acts as an interface or bridge between the user and the computer's hardware. It translates the user's instructions into machine language, which the computer executes to produce the desired output. Examples of user interfaces are command lines and GUIs.

Many people obtain computer software illegally. Software piracy is the unauthorized and illegal duplication or sale of software. Such an act is a violation of the copyright law of the United States. Copyright law allows only the creators of software to produce and sell copies of their software. Penalties for committing software piracy include hefty fines, and/or imprisonment that may vary from five to ten years. Software piracy is a criminal offense, as well as an ethically wrong act. Software developers put in a lot of hard work and money to create useful software. The sales revenue that they earn from software helps them invest in further research and development. Therefore, we need to respect their hard work and effort by buying genuine software from authorized sources.

(:

Operating system software

A computer's operating system software is the master program that controls the system hardware. It acts as an interface between the user, the application software, and the system hardware.

Spreadsheet Software

A spreadsheet is a computer application for organization, analysis, and storage of data in tabular form. Spreadsheets were developed as computerized analogs of paper accounting worksheets. The program operates on data entered in cells of a table. In form of graphs

Internet Spyware Prevention Act (I-SPY):

According to I-SPY, it is a criminal offense to use illegal means to obtain sensitive information without the user's knowledge or consent. Criminals typically use spyware to obtain personal details such as passwords, user names, credits card details, and so on. The government can impose fines and imprison individuals and organizations that use spyware. The House of Representatives passed the bill in 2005.

System:. Systems software acts as a platform for application software to execute specific tasks.

Application software: performs operations specific to the application. It does not handle primary functions of systems software.

Data Integrity Steps

Limit access to authorized personnel only. People with malicious intentions can delete or modify your data. Restrict access to trustworthy people. This is a good step to ensure the authenticity and accuracy of data. Maintain a version history of all data. Version histories allow you to track changes in the data and keep a record of those changes. This practice helps you in case there are accidental deletions in data records. Create backups of data. Store a copy of data somewhere else on the system or any other platform. In case you lose the original data for some reason, you can use the backup copies.

Digital Millennium Act:

Passed on October 12, 1998, this law criminalizes the production and distribution of technology, devices, services, and software that intend to evade antipiracy laws.

Presentation software:

Presentation software helps in presenting information alongside images or presentation graphics, in the form of slides. For example, managers use presentation software to discuss financial performance with the help of slideshows and charts.

Opening a file:To open a saved file, first locate it on the computer and double-click on it. You can also open the file by selecting the Open option on the File menu that pops up when you start the application to create the file. This action prompts you to specify the location of the saved file. Specify the location, and click the Open button.

Renaming a file:To rename a file, right-click the file and choose the Rename option. Alternatively, you can select the file and click the file name once. This action will highlight the name. Type in the new name and press Enter.

Stop Online Piracy Act (SOPA):

SOPA enables the US Attorney General to seek a court order and ask major service providers (such as Google and Yahoo!) to curb or block access to sites that sell illegal and counterfeited materials outside the United States. It allows owners of intellectual property to ask search engines to remove those sites that they feel are illegally using their property. SOPA was passed in 2011.

Creating a file:A new file opens when you start an application such as Microsoft Word, Microsoft PowerPoint, or Microsoft Excel. To create a new file, open the application and select the File menu. From this menu, choose the New option.

Saving a file: To save a file, select the Save option on the File menu. When you save the file for the first time, the Save As dialog box enables you to specify a location for the file. This location is a specific drive or folder of your choice

Different Types of Operating Systems

Single-user/single-tasking operating system: A single-user/single-tasking operating system allows only a single user to perform one task at a time. Therefore, a user cannot perform two (or more) tasks at the same time. Single-user/multi-tasking operating system: Personal computers (PCs) run on a single-user/multitasking operating system. This allows a user to perform multiple tasks simultaneously. Only a single user can access this operating system at any given time. Multiuser/multitasking operating system: With a multiuser/multitasking operating system, multiple users can work with the computer's resources simultaneously. The computer executes programs that each user assigns in specific sessions on the server, independent from those of the other users. Real-time operating system: A real-time operating system is a multitasking operating system designed for applications that generate output within a specific time duration. These applications are suitable for operations where the data needs to be stored in real time, without any delays. Such operations require quick and precise program execution.

Software Piracy

Software piracy is the unauthorized and illegal duplication or sale of software.

Components of System Software

System software enables a computer's hardware to perform tasks, and functions as a platform for application software. It also acts an interface between the computer's hardware and software. System software consists of various files and programs such as libraries, system services, and drivers. Many of these programs need user to start them. However, some of them even run in the background without user involvement. Let us look at two major components of system software.

Computer Fraud and Abuse Act (CFAA):

The CFAA, passed in 1986, declares the act of unauthorized access of any computer as a federal crime. This act was originally passed to safeguard computer systems operated by the United States government. Its scope has been widened with many amendments.

Mac OS

The Mac OS (now called OS X), developed by Apple Inc., is used only on Macintosh computers. This was the first operating system to use a GUI for personal computers.

Device management:

The device management function involves basic computer tasks to manage peripheral devices such as a mouse or a keyboard.

When you logically organize files, folders, and subfolders, you'll get a file hierarchy, resembling a tree.

The trunk of the tree represents the main system drive, the various branches represent different folders, and the leaves represent the files. This visual representation helps you understand the links between files and folders. Effective file management helps reduce the stress of looking for files, and saves you a lot of time. It also improves your productivity and efficiency at work. To hone your file management skills, make logical groups of related files and folders, and give them appropriate names.

Word-processing software

These computer programs are digital versions of the manual typewriter. You can use a word processor to write, edit, print, and perform a variety of modifications to a document. You can also include images and videos in a document. Newer versions of word-processing programs provide file security and tools to protect documents against copyright violations.

Database software:

Think of a database as rows of shelves containing alphabetically arranged data files of the employees of an organization. You can access these files over a computer network and update them using a database software. This software allows you to store data in tables, rows, and fields.

PROTECT IP Act (PIPA):

This act was passed by the Senate in 2012 to prevent access to websites (particularly those outside the United States) that sell pirated and counterfeited materials. PIPA authorizes the Justice Department to take down sites that it feels are involved in "infringing

Common Operating Systems

a graphical user interface (GUI), and a command-line interface. A GUI enables you to work with an external input device on graphical objects such as icons and buttons. A command-line interface enables you to enter typewritten commands as inputs, and executes them. The GUI is an attractive, convenient, and faster alternative than a command-line interface. The most popular operating systems include the Microsoft disk operating system (MS-DOS), UNIX, Microsoft Windows, and OS X from Apple Inc.

UNIX operating system:

is a multiuser/multitasking operating system. It consists of a file system called the kernel and a shell, which has a command-line interface. The file system is the central component of the operating system. Newer versions of UNIX use a GUI, however.

Confidentiality

is a virtue by which you need to secure information by limiting computer access to authorized personnel only. In the United States, there are laws to prevent the unauthorized use of people's computers and information.

The file manager

is an interface between the user and the file system of a computer. Windows Explorer is an example

file type

is the standard used to code data and information in a computer. It determines the format in which the computer encodes data bits in a file. Some file types are suitable for specific type of data. For example, graphic files store images and pictures.

Utility software

offers various tools to help you analyze and maintain the performance of a computer. Examples of utility software are antivirus software, disk cleaners, data compression programs, and backup and archiving programs.


Conjuntos de estudio relacionados

S.S. Chapter #1: What does a Historian do?

View Set

Anatomy & Physiology Exam Review - Tests 1-15

View Set

BONES OF THE APPENDICULAR SKELETON

View Set

Zoology - Chapter 19 - Amphibian

View Set