Download Introduction to Information and Communication Technologies

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Software bug wikipedia , lookup

Software quality wikipedia , lookup

Transcript
Introduction to Information and Communication Technologies
Module 2
Computer Software
GMS-VU : Module 2
1
Scope






What is software?
What are the types of software?
How is software created?
What are some problems in using software?
How do you ensure security of the system
and data?
What are future trends in software
development?
2
Learning Outcomes
By the end of this lesson, you should be able to:
1. Define the functions of software in a
computer system
2. Identify the different types of software
3. List different types of operating systems and
application software
4. Identify steps in creating software
5. Identify problems in using software
6. Describe the ways to ensure security of the
system and data
7. Identify general trends in software development
3
What is software?




A computer system is generally composed
of hardware and software.
Hardware makes up the physical
components.
Software makes up the set of instructions
for the computer. Without software, the
computer will not be able to perform the
tasks required.
Sometimes software is called a computer
program.
GMS-VU : Module 2
4
What are the types of software?
There are two sets of instructions
that a computer must follow:
 System software such as DOS,
Windows, Linux, Unix, and Mac
OS
 Application software such as
those used for word processing,
spreadsheets, or library
management
5
System Software


An organized collection of system programs which
serve as the interface between the computer
hardware and the user application
CPU
It manages the hardware resources:
 Operating System
 CPU management to facilitate
sharing execution time of processes
 Memory management to allocate
Memory
memory resources dynamically
 I/O management to handle
reading and writing devices
 Compiler/Interpreter
I/O
 Utilities
6
Examples of Operating Systems
Disk Operating System (DOS)
Microsoft Windows
Mac OS
LINUX
UNIX
Other Proprietary OS
7
Disk Operating Systems (DOS)



A generic term describing any operating system
that is loaded from disk devices
It is not a user friendly OS since users need to
memorize commands and issue them by typing
line by line, known as command line interface.
Very few end users use DOS nowadays.
8
Microsoft Windows


A Graphical User Interface (GUI), which was
originally run on DOS (Windows 3.x), that
allows multitasking or the ability to run several
programs at the same time
Examples:
Microsoft Windows 95
 Microsoft Windows 98
 Microsoft Windows 2000
 Microsoft Windows XP

9
Application Software


A set of instructions designed to perform a
specific task such as word processing,
accounting, cataloguing, library management,
animation, etc.
The type of the software depends on the
application
 General purpose office software
 Business software
 Special purpose and other software
10
General Purpose Office Software





Word processing: e.g. MS Word
Spreadsheets: e.g. MS Excel
Database management
systems: e.g. MS Access, SQL
Presentation/Graphics: e.g. MS
PowerPoint, Adobe Photoshop
Software suite: e.g. MS Office
*MS stands for Microsoft
11
Business Software
A set of software used for
business application such as
software for banking,
e-Commerce, etc.
12
Special purpose software
and other software





Desktop publishing software: e.g. MS Publisher
Imaging and drawing: e.g. Corel Draw
File management: e.g. CDS/ISIS, INMAGIC
Library management software: e.g. Athena,
VTLS, INNOPAC, Library Solutions
Other Software: e.g. Statistics and
registration software, etc.
13
How is software created?
Software Development Process
1.0 Software Analysis
6.0 Implementing and
maintenance
5.0 Testing and
Debugging
4.0 Compiling
2.0 Software
Design
3.0 Programming/
Coding
14
1.0 Software Analysis
•To identify problems and user requirements
2.0 Software Design
•To illustrate what the software will do and
what output will be generated
15
3.0 Programming/Coding
•To create the software by translating
specifications and requirements into
program instructions
4.0 Compiling
•To translate program instructions into
machine language
16
5.0 Testing and Debugging
•To examine whether the software is error free
and produces the intended results
6.0 Implementing and Maintenance
•To install and operate the software efficiently
17
Programming Languages
Programming languages are used to write
software. Some of these are:

Low level languages


Assembly
High level languages
COBOL
 FORTRAN
 C++
 Pascal
 Visual Basic


Programming languages
for the Internet
Perl
 Java
 HTML
 XML

18
What are problems in
using software?



Programming languages
Character sets
Malicious Software
19
Problems caused by
programming languages



Programming languages are usually in English.
Applications usually use the English language
and the Roman alphabet.
Problems arise when the user is non-English
and/or is using non-Roman script.
20
Problems caused by different
characters sets



Computers use character sets
stored in binary codes.
Different scripts use different
character sets.
Computers must know which
writing system/character set they
are dealing with.
21
Problems caused by
malicious software
 Computer Virus
 Worm
 Trojan Horse
22
Computer Virus



A program or a code that gains access without
the users’ knowledge and/or perform actions
not intended by the user, often damaging data
and sometimes the whole system in the
process.
Viruses are activated once unknowing users
run, open, view or copy the file containing it.
The action that will trigger the virus to deliver its
“payload” depends on the type of virus that
infected the file.
23
Characteristics of a virus


A self-replicating program whose main purpose is
to propagate itself to as many places as possible
Self-propagating by modifying another program to
include itself by an act of a user, e.g. opening/
viewing files unknowing that they are infected
and/or copying/transferring files from one system
to another through diskettes, file transfer, e-mail,
the internet and other means…
24
Worm


A program that replicates and propagates itself
without any action from the user
This differentiates it from a virus that needs
user action in order to replicate.
25
Trojan Horse


A Trojan horse contains hidden functions
that, while running, may destroy files or
create a “back door” allowing an intruder to
access the system.
A Trojan horse, unlike a virus, does not
spread by itself but can be as destructive,
depending on the intentions of the intruder.
26
How do you ensure security of the
system and data?



Back-up your system and your data regularly by
using CD-R, CD-RW, diskettes, tapes, or
another hard disk.
Use firewalls, encryption and other security
measures to protect data, computer systems
and networks from intrusion and attacks done
through the Internet.
Protect yourself from malicious software:
Virus/Worm/Trojan Horse.
27
Protect yourself from viruses,
worms and Trojan horses






Refrain from running any program or opening any
file from untrusted sources.
Scan floppy diskettes and CD-ROMs before using.
Install a virus shield to automatically check
diskettes and CDs.
Get an updated version of a virus scan program.
Always check you hard disk for possible infection,
if you are connected to the Internet.
Use diskettes only after they have been scanned.
28
What are future trends in
software development?





More user friendly
More customized
More Web enabled
More flexible/compatible
More sophisticated
 programming
languages
 functions
29