Introduction to Software and Apps(Chapter 2)
Spyware
A form of malware installed on networked computers to track and transmit personal data
Public domain software
A program that is public property and is available at no cost
Software
A set of instructions that tells a computer what to do, how to do it. and where to send the output
Concurrent user license
Allows a specified number of copies of the software to be used anytime in an organization
Site license
Allows organization software on all computers at a site
Productivity software
Automates common or repetitive tasks
Antispam software
Blocks spam, or electronic junk mail, from your email inbox
Service pack
Collection of patches bundled into single use
Code libraries
Contains modules of customizable code for common functions such as accessing files or issuing the Print command
Shareware
Copyrighted software distributed free of charge on a trial basis
Open source software
Copyrighted software whose source code is available to the public
Firewall software
Creates a personal security zone around your computer by monitoring all incoming and outgoing traffic and blocking any suspicious activity
Custom software
Designed to meet the unique needs of an organization or business
Antivirus software
Finds and removes viruses, Trojan horses, worms, and bots from your computer and scans incoming and outgoing email messages
Predictive methodology
Focuses on planning and preparation to minimize changes later in the development process
Single user license
Grants one user the right to use the software end user license agreement (EULA)
Time limited licenses
Grants usage of software rights for a fixed period of time
Command line interface
Have to physically type in a command
Virus
Installs itself on your computer and alters its operations
Service patches
Larger fixes
Multiple user license
Lets multiple users use the software
Graphical user interface
Lets you manipulate objects to issue commands
Intellectual software
Ownership of tangible assets, ideas, art, music etc.
Antispyware
Prevents spyware from installing itself on your computer and removes any existing spyware
Vertical market software
Productivity software that is customized for specific industries
Horizontal market software
Productivity software that performs tasks that are common across industries
Low level languages
Programming languages designed to speak to hardware
High level languages
Programming languages designed to translate human language to bit/bytes
Adaptive methodology
Programming methodology focuses on flexibility; program designs and specifications change and evolve as a project moves forward
Software development methodology
Provides a framework for designing, writing, and testing software
Worm
Self-replicating program that eats up system resources
Patches
Small fixes
Freeware
Software distributed free of charge, typically via the Internet
Utility software
Software that performs maintenance related tasks on a computer
Application software
Software that performs specific tasks
System software
Software that provides user interface, controls a computer and its peripherals
Bot
Software that takes control of your computer so it can be used by hackers to carry out further attacks
Embedded software
Software typically stored on a computer chip inside the appliance
Trojan horses
Steal passwords to online accounts, disguise themselves as useful programs, such as utilities
Algorithms
Step by Step procedures for solving specific problems
Operating system software
System that manages hardware and software
Authentication
Technologies require users to log in with a valid user ID and password to access Web-based content
Rebooting
The process of restarting your computer, either from a powered-down state or with the power on
Piracy
Unauthorized use of copyrighted software
Software as a Service
When you can use Web apps or portable apps without installing them
Input
When you issue a command to a computer
Malware
Written by hackers to intentionally damage computers by deleting files, erasing hard drives, stealing information, or slowing computer performance