ICDL Module 1 Concepts - Information & Communication Technologies
1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer...
-
Upload
isabel-curtis -
Category
Documents
-
view
218 -
download
0
Transcript of 1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer...
![Page 1: 1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.](https://reader030.fdocuments.net/reader030/viewer/2022032802/56649de55503460f94add8ca/html5/thumbnails/1.jpg)
1GMS-VU : Module 2
Introduction to Information and Communication
Technologies
Module 2Module 2Computer Software Computer Software
![Page 2: 1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.](https://reader030.fdocuments.net/reader030/viewer/2022032802/56649de55503460f94add8ca/html5/thumbnails/2.jpg)
2
Scope What is software? What are the types of software? How is software created? What are some problems in using software? How do you ensure security of the system
and data? What are future trends in software
development?
![Page 3: 1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.](https://reader030.fdocuments.net/reader030/viewer/2022032802/56649de55503460f94add8ca/html5/thumbnails/3.jpg)
3
Learning OutcomesBy the end of this lesson, you should be able to:
1. Define the functions of software in a computer system
2. Identify the different types of software3. List different types of operating systems and
application software4. Identify steps in creating software5. Identify problems in using software6. Describe the ways to ensure security of the
system and data7. Identify general trends in software development
![Page 4: 1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.](https://reader030.fdocuments.net/reader030/viewer/2022032802/56649de55503460f94add8ca/html5/thumbnails/4.jpg)
4GMS-VU : Module 2
What is software? A computer system is generally composed
of hardware and software. Hardware makes up the physical
components. Software makes up the set of instructions
for the computer. Without software, the computer will not be able to perform the tasks required.
Sometimes software is called a computer program.
![Page 5: 1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.](https://reader030.fdocuments.net/reader030/viewer/2022032802/56649de55503460f94add8ca/html5/thumbnails/5.jpg)
5
What are the types of software?
There are two sets of instructions that a computer must follow:
System software such as DOS, Windows, Linux, Unix, and Mac OS
Application software such as those used for word processing, spreadsheets, or library management
![Page 6: 1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.](https://reader030.fdocuments.net/reader030/viewer/2022032802/56649de55503460f94add8ca/html5/thumbnails/6.jpg)
6
System Software An organized collection of system programs which
serve as the interface between the computer hardware and the user application
It manages the hardware resources: Operating System
CPU management to facilitate sharing execution time of processes
Memory management to allocate memory resources dynamically
I/O management to handle reading and writing devices
Compiler/Interpreter Utilities
CPU
Memory
I/O
![Page 7: 1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.](https://reader030.fdocuments.net/reader030/viewer/2022032802/56649de55503460f94add8ca/html5/thumbnails/7.jpg)
7
Examples of Operating Systems
Disk Operating System (DOS)Microsoft WindowsMac OSLINUXUNIXOther Proprietary OS
![Page 8: 1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.](https://reader030.fdocuments.net/reader030/viewer/2022032802/56649de55503460f94add8ca/html5/thumbnails/8.jpg)
8
A generic term describing any operating system that is loaded from disk devices
It is not a user friendly OS since users need to memorize commands and issue them by typing line by line, known as command line interface.
Very few end users use DOS nowadays.
Disk Operating Systems (DOS)
![Page 9: 1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.](https://reader030.fdocuments.net/reader030/viewer/2022032802/56649de55503460f94add8ca/html5/thumbnails/9.jpg)
9
Microsoft Windows A Graphical User Interface (GUI), which was
originally run on DOS (Windows 3.x), that allows multitasking or the ability to run several programs at the same time
Examples: Microsoft Windows 95 Microsoft Windows 98 Microsoft Windows 2000 Microsoft Windows XP
![Page 10: 1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.](https://reader030.fdocuments.net/reader030/viewer/2022032802/56649de55503460f94add8ca/html5/thumbnails/10.jpg)
10
Application Software A set of instructions designed to perform a
specific task such as word processing, accounting, cataloguing, library management, animation, etc.
The type of the software depends on the application
General purpose office softwareBusiness softwareSpecial purpose and other software
![Page 11: 1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.](https://reader030.fdocuments.net/reader030/viewer/2022032802/56649de55503460f94add8ca/html5/thumbnails/11.jpg)
11
General Purpose Office Software Word processing: e.g. MS Word Spreadsheets: e.g. MS Excel Database management
systems: e.g. MS Access, SQL Presentation/Graphics: e.g. MS
PowerPoint, Adobe Photoshop Software suite: e.g. MS Office
*MS stands for Microsoft
![Page 12: 1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.](https://reader030.fdocuments.net/reader030/viewer/2022032802/56649de55503460f94add8ca/html5/thumbnails/12.jpg)
12
Business Software A set of software used for
business application such as software for banking, e-Commerce, etc.
![Page 13: 1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.](https://reader030.fdocuments.net/reader030/viewer/2022032802/56649de55503460f94add8ca/html5/thumbnails/13.jpg)
13
Special purpose software and other software Desktop publishing software: e.g. MS Publisher Imaging and drawing: e.g. Corel Draw File management: e.g. CDS/ISIS, INMAGIC Library management software: e.g. Athena,
VTLS, INNOPAC, Library Solutions Other Software: e.g. Statistics and
registration software, etc.
![Page 14: 1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.](https://reader030.fdocuments.net/reader030/viewer/2022032802/56649de55503460f94add8ca/html5/thumbnails/14.jpg)
14
How is software created? Software Development Process
2.0 Software Design
1.0 Software Analysis
3.0 Programming/Coding4.0 Compiling
5.0 Testing and Debugging
6.0 Implementing and maintenance
![Page 15: 1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.](https://reader030.fdocuments.net/reader030/viewer/2022032802/56649de55503460f94add8ca/html5/thumbnails/15.jpg)
15
1.0 Software Analysis
•To identify problems and user requirements
2.0 Software Design
•To illustrate what the software will do and what output will be generated
![Page 16: 1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.](https://reader030.fdocuments.net/reader030/viewer/2022032802/56649de55503460f94add8ca/html5/thumbnails/16.jpg)
16
3.0 Programming/Coding
•To create the software by translating specifications and requirements into program instructions
4.0 Compiling
•To translate program instructions into machine language
![Page 17: 1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.](https://reader030.fdocuments.net/reader030/viewer/2022032802/56649de55503460f94add8ca/html5/thumbnails/17.jpg)
17
5.0 Testing and Debugging
•To examine whether the software is error free and produces the intended results
6.0 Implementing and Maintenance
•To install and operate the software efficiently
![Page 18: 1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.](https://reader030.fdocuments.net/reader030/viewer/2022032802/56649de55503460f94add8ca/html5/thumbnails/18.jpg)
18
Programming Languages
Programming languages are used to write software. Some of these are: Low level languages
Assembly High level languages
COBOL FORTRAN C++ Pascal Visual Basic
Programming languages for the Internet Perl Java HTML XML
![Page 19: 1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.](https://reader030.fdocuments.net/reader030/viewer/2022032802/56649de55503460f94add8ca/html5/thumbnails/19.jpg)
19
What are problems in using software?
Programming languages Character sets Malicious Software
![Page 20: 1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.](https://reader030.fdocuments.net/reader030/viewer/2022032802/56649de55503460f94add8ca/html5/thumbnails/20.jpg)
20
Problems caused by programming languages Programming languages are usually in English. Applications usually use the English language
and the Roman alphabet. Problems arise when the user is non-English
and/or is using non-Roman script.
![Page 21: 1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.](https://reader030.fdocuments.net/reader030/viewer/2022032802/56649de55503460f94add8ca/html5/thumbnails/21.jpg)
21
Problems caused by different characters sets
Computers use character sets stored in binary codes.
Different scripts use different character sets.
Computers must know which writing system/character set they are dealing with.
![Page 22: 1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.](https://reader030.fdocuments.net/reader030/viewer/2022032802/56649de55503460f94add8ca/html5/thumbnails/22.jpg)
22
Problems caused by malicious software
Computer Virus Worm Trojan Horse
![Page 23: 1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.](https://reader030.fdocuments.net/reader030/viewer/2022032802/56649de55503460f94add8ca/html5/thumbnails/23.jpg)
23
A program or a code that gains access without the users’ knowledge and/or perform actions not intended by the user, often damaging data and sometimes the whole system in the process.
Viruses are activated once unknowing users run, open, view or copy the file containing it.
The action that will trigger the virus to deliver its “payload” depends on the type of virus that infected the file.
Computer Virus
![Page 24: 1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.](https://reader030.fdocuments.net/reader030/viewer/2022032802/56649de55503460f94add8ca/html5/thumbnails/24.jpg)
24
Characteristics of a virus A self-replicating program whose main purpose is
to propagate itself to as many places as possible Self-propagating by modifying another program to
include itself by an act of a user, e.g. opening/ viewing files unknowing that they are infected and/or copying/transferring files from one system to another through diskettes, file transfer, e-mail, the internet and other means…
![Page 25: 1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.](https://reader030.fdocuments.net/reader030/viewer/2022032802/56649de55503460f94add8ca/html5/thumbnails/25.jpg)
25
Worm
A program that replicates and propagates itself without any action from the user
This differentiates it from a virus that needs user action in order to replicate.
![Page 26: 1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.](https://reader030.fdocuments.net/reader030/viewer/2022032802/56649de55503460f94add8ca/html5/thumbnails/26.jpg)
26
A Trojan horse contains hidden functions that, while running, may destroy files or create a “back door” allowing an intruder to access the system.
A Trojan horse, unlike a virus, does not spread by itself but can be as destructive, depending on the intentions of the intruder.
Trojan Horse
![Page 27: 1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.](https://reader030.fdocuments.net/reader030/viewer/2022032802/56649de55503460f94add8ca/html5/thumbnails/27.jpg)
27
How do you ensure security of the system and data? Back-up your system and your data regularly by
using CD-R, CD-RW, diskettes, tapes, or another hard disk.
Use firewalls, encryption and other security measures to protect data, computer systems and networks from intrusion and attacks done through the Internet.
Protect yourself from malicious software: Virus/Worm/Trojan Horse.
![Page 28: 1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.](https://reader030.fdocuments.net/reader030/viewer/2022032802/56649de55503460f94add8ca/html5/thumbnails/28.jpg)
28
Protect yourself from Protect yourself from viruses, worms and viruses, worms and Trojan horsesTrojan horses Refrain from running any program or opening any
file from untrusted sources. Scan floppy diskettes and CD-ROMs before using. Install a virus shield to automatically check
diskettes and CDs. Get an updated version of a virus scan program. Always check you hard disk for possible infection,
if you are connected to the Internet. Use diskettes only after they have been scanned.
![Page 29: 1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.](https://reader030.fdocuments.net/reader030/viewer/2022032802/56649de55503460f94add8ca/html5/thumbnails/29.jpg)
29
What are future trends in software development? More user friendly
More customized More Web enabled More flexible/compatible More sophisticated
programming languages functions