SlideShare a Scribd company logo
1 of 16
FUNDAMENTAL ELEMENTS OF THE COMPUTER The Software
Computer software may be defined as: computer programs, procedures, rules, associated documentation and data pertaining to the operation of a computer system
A single program or a collection of programs which performs many task and/or system related functions Software is the detailed instructions that control the operation of hardware. Without software, hardware can not extend its capabilities or utilities
Software Programming Language Application  Operating System
PROGRAMMING LANGUAGES ARE USED TO CREATE ALL OTHER PROGRAMS WHETHER IT IS AN OPERATING SYSTEM OR APPLICATION SOFTWARE.
OPERATING SYSTEM CONTROLS THE COMPUTER APPLICATIONS AND KEEP ALL THE HARDWARE RUNS SMOOTHLY.
APPLICATION SOFTWARE THIS ARE PROGRAM THAT PEOPLE USE TO GET THEIR WORK DONE.
CATEGORY OF SOFTWARE PROPRIETARY-  THIS IS PROTECTED BY LAWS, IT WAS OWNED BY A PARTICULAR PERSON OR GROUPS OF PERSON. OPEN SYSTEM OR OPEN SOURCE- THIS CAN BE MODIFIED, NOT EXCLUSIVE PROPERTY OR PARTICULAR VENDOR.
Freeware  Freeware is also downloadable in the Internet and free of charge. Often freeware is only free for personal use, while commercial use requires a paid license.
SHAREWARE THIS SOFTWARE IS DOWNLOADABLE FROM THE INTERNET. LICENSES DIFFER, BUT COMMONLY THE USER IS ALLOWED TO TRY THE PROGRAM FOR FREE, FOR A PERIOD STIPULATED IN THE LICENSE, USUALLY THIRTY DAYS. AT THE END OF THE TRIAL PERIOD, THE SOFTWARE MUST BE PURCHASED OR UNINSTALLED.
CRIPPLEWARE	 THIS SOFTWARE IS SIMILAR TO SHAREWARE EXCEPT THAT KEY FEATURES WILL CEASE TO WORK AFTER THE TRIAL PERIOD HAS ENDED. FOR EXAMPLE, THE "SAVE" FUNCTION, THE PRINT FUNCTION, OR SOME OTHER VITAL FEATURE NECESSARY TO USE THE PROGRAM EFFECTIVELY MAY BECOME UNUSABLE.
Adware	  This is free software that is supported by advertisements built into the program itself. Some adware requires a live Internet feed and uses constant bandwidth to upload new advertisements.
MALWARE short for malicious software, consists of programming designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior
SPYWARE ,[object Object]

More Related Content

What's hot

Five ways to Securing and Hardening your Windows 10 system
Five ways to Securing and Hardening your Windows 10 systemFive ways to Securing and Hardening your Windows 10 system
Five ways to Securing and Hardening your Windows 10 systemFemi Baiyekusi
 
Dronesafe™ Flyer - Simply connect, stream and comply
Dronesafe™ Flyer  - Simply connect, stream and complyDronesafe™ Flyer  - Simply connect, stream and comply
Dronesafe™ Flyer - Simply connect, stream and complyPaul New
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacyVikas Patel
 
The Remote Manage App for Configuration Manager Webinar!
The Remote Manage App for Configuration Manager Webinar!The Remote Manage App for Configuration Manager Webinar!
The Remote Manage App for Configuration Manager Webinar!Cireson
 
Publicidad de los programas (1)
Publicidad de los programas (1)Publicidad de los programas (1)
Publicidad de los programas (1)GABO
 
Quick Heal
Quick HealQuick Heal
Quick Healdheva B
 
Publicidad de los programas
Publicidad de los programasPublicidad de los programas
Publicidad de los programasGABO
 
Sa No Scan Paper
Sa No Scan PaperSa No Scan Paper
Sa No Scan Papertafinley
 
A14 esenovsh
A14 esenovshA14 esenovsh
A14 esenovsh7474646s
 
Software Failure Air Traffic Control System
Software Failure Air Traffic Control SystemSoftware Failure Air Traffic Control System
Software Failure Air Traffic Control SystemShakeel Ahmed
 
POC-Netsparker
POC-NetsparkerPOC-Netsparker
POC-NetsparkerRaj Sawant
 
O P Manager
O P  ManagerO P  Manager
O P Managerblakka
 
Vulnerability , Malware and Risk
Vulnerability , Malware and RiskVulnerability , Malware and Risk
Vulnerability , Malware and RiskSecPod Technologies
 
A Brief Overview of Adware
A Brief Overview of Adware A Brief Overview of Adware
A Brief Overview of Adware SpeedMaxPC
 

What's hot (20)

Malware
MalwareMalware
Malware
 
Five ways to Securing and Hardening your Windows 10 system
Five ways to Securing and Hardening your Windows 10 systemFive ways to Securing and Hardening your Windows 10 system
Five ways to Securing and Hardening your Windows 10 system
 
Dronesafe™ Flyer - Simply connect, stream and comply
Dronesafe™ Flyer  - Simply connect, stream and complyDronesafe™ Flyer  - Simply connect, stream and comply
Dronesafe™ Flyer - Simply connect, stream and comply
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
The Remote Manage App for Configuration Manager Webinar!
The Remote Manage App for Configuration Manager Webinar!The Remote Manage App for Configuration Manager Webinar!
The Remote Manage App for Configuration Manager Webinar!
 
Reflexion rtc
Reflexion rtcReflexion rtc
Reflexion rtc
 
Publicidad de los programas (1)
Publicidad de los programas (1)Publicidad de los programas (1)
Publicidad de los programas (1)
 
Quick Heal
Quick HealQuick Heal
Quick Heal
 
Publicidad de los programas
Publicidad de los programasPublicidad de los programas
Publicidad de los programas
 
QuickHeal Anti-Virus
QuickHeal Anti-VirusQuickHeal Anti-Virus
QuickHeal Anti-Virus
 
Sa No Scan Paper
Sa No Scan PaperSa No Scan Paper
Sa No Scan Paper
 
Swascan
Swascan Swascan
Swascan
 
A14 esenovsh
A14 esenovshA14 esenovsh
A14 esenovsh
 
Software Failure Air Traffic Control System
Software Failure Air Traffic Control SystemSoftware Failure Air Traffic Control System
Software Failure Air Traffic Control System
 
POC-Netsparker
POC-NetsparkerPOC-Netsparker
POC-Netsparker
 
Ch. 3 computer virus
Ch. 3 computer virusCh. 3 computer virus
Ch. 3 computer virus
 
Ninja tune up
Ninja tune upNinja tune up
Ninja tune up
 
O P Manager
O P  ManagerO P  Manager
O P Manager
 
Vulnerability , Malware and Risk
Vulnerability , Malware and RiskVulnerability , Malware and Risk
Vulnerability , Malware and Risk
 
A Brief Overview of Adware
A Brief Overview of Adware A Brief Overview of Adware
A Brief Overview of Adware
 

Viewers also liked

Fundamental elements of computer
Fundamental elements of computerFundamental elements of computer
Fundamental elements of computerJesus Obenita Jr.
 
M4 Computing - Lesson 3 - How A Computer Works
M4 Computing - Lesson 3 - How A Computer WorksM4 Computing - Lesson 3 - How A Computer Works
M4 Computing - Lesson 3 - How A Computer WorksJamie Hutt
 
Computer Hardware and Software Elements
Computer Hardware and Software ElementsComputer Hardware and Software Elements
Computer Hardware and Software ElementsAdetula Bunmi
 
Elements of Computer
Elements  of ComputerElements  of Computer
Elements of ComputerLUZ PINGOL
 
The elements of a computer system
The elements of a computer systemThe elements of a computer system
The elements of a computer systemMary Zharina
 
Lesson 3.0 basic parts and functions of computer
Lesson 3.0   basic parts and functions of computerLesson 3.0   basic parts and functions of computer
Lesson 3.0 basic parts and functions of computerJoshua Hernandez
 
Parts and Function of Computer
Parts and Function of ComputerParts and Function of Computer
Parts and Function of ComputerRhenan Belisario
 
COMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONSCOMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONSAngel Mary George
 

Viewers also liked (9)

Fundamental elements of computer
Fundamental elements of computerFundamental elements of computer
Fundamental elements of computer
 
M4 Computing - Lesson 3 - How A Computer Works
M4 Computing - Lesson 3 - How A Computer WorksM4 Computing - Lesson 3 - How A Computer Works
M4 Computing - Lesson 3 - How A Computer Works
 
Types of Computer Memory
Types of Computer MemoryTypes of Computer Memory
Types of Computer Memory
 
Computer Hardware and Software Elements
Computer Hardware and Software ElementsComputer Hardware and Software Elements
Computer Hardware and Software Elements
 
Elements of Computer
Elements  of ComputerElements  of Computer
Elements of Computer
 
The elements of a computer system
The elements of a computer systemThe elements of a computer system
The elements of a computer system
 
Lesson 3.0 basic parts and functions of computer
Lesson 3.0   basic parts and functions of computerLesson 3.0   basic parts and functions of computer
Lesson 3.0 basic parts and functions of computer
 
Parts and Function of Computer
Parts and Function of ComputerParts and Function of Computer
Parts and Function of Computer
 
COMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONSCOMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONS
 

Similar to Fundamental elements of the computer software

Types of software, advantages and disadvantages
Types of software, advantages and disadvantagesTypes of software, advantages and disadvantages
Types of software, advantages and disadvantagesRocket11986
 
software4-150511081405-lva1-app6892 2.pdf
software4-150511081405-lva1-app6892 2.pdfsoftware4-150511081405-lva1-app6892 2.pdf
software4-150511081405-lva1-app6892 2.pdfsachin325314
 
Opeating system programs
Opeating system programsOpeating system programs
Opeating system programsJotham Gadot
 
Software licences
Software licencesSoftware licences
Software licencesOriginalGSM
 
Class work 3_computer_network_317
Class work 3_computer_network_317Class work 3_computer_network_317
Class work 3_computer_network_317Khondoker Sadia
 
How to Identify Potentially Unwanted Applications
How to Identify Potentially Unwanted ApplicationsHow to Identify Potentially Unwanted Applications
How to Identify Potentially Unwanted ApplicationsOPSWAT
 

Similar to Fundamental elements of the computer software (20)

Types Of Software
Types Of SoftwareTypes Of Software
Types Of Software
 
Software tpyes
Software tpyesSoftware tpyes
Software tpyes
 
Types of software, advantages and disadvantages
Types of software, advantages and disadvantagesTypes of software, advantages and disadvantages
Types of software, advantages and disadvantages
 
Software (4).ppt
Software (4).pptSoftware (4).ppt
Software (4).ppt
 
Software
SoftwareSoftware
Software
 
software4-150511081405-lva1-app6892 2.pdf
software4-150511081405-lva1-app6892 2.pdfsoftware4-150511081405-lva1-app6892 2.pdf
software4-150511081405-lva1-app6892 2.pdf
 
Playrlic
PlayrlicPlayrlic
Playrlic
 
License
LicenseLicense
License
 
Opeating system programs
Opeating system programsOpeating system programs
Opeating system programs
 
License
LicenseLicense
License
 
Software licences
Software licencesSoftware licences
Software licences
 
Class work 3_computer_network_317
Class work 3_computer_network_317Class work 3_computer_network_317
Class work 3_computer_network_317
 
LicenseFs 4
LicenseFs 4LicenseFs 4
LicenseFs 4
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
Computer software
Computer softwareComputer software
Computer software
 
How to Identify Potentially Unwanted Applications
How to Identify Potentially Unwanted ApplicationsHow to Identify Potentially Unwanted Applications
How to Identify Potentially Unwanted Applications
 
Dtl 2012 kl-app_ctl1.2
Dtl 2012 kl-app_ctl1.2Dtl 2012 kl-app_ctl1.2
Dtl 2012 kl-app_ctl1.2
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 

More from Jesus Obenita Jr.

More from Jesus Obenita Jr. (20)

Organization and management 3 a Evolution of Management Theory
Organization and management 3 a Evolution of Management TheoryOrganization and management 3 a Evolution of Management Theory
Organization and management 3 a Evolution of Management Theory
 
Organization and management 2 Management Function
Organization and management 2 Management FunctionOrganization and management 2 Management Function
Organization and management 2 Management Function
 
Organization and management 1
Organization and management 1Organization and management 1
Organization and management 1
 
Designing web page marquee and img tag
Designing web page  marquee and img tagDesigning web page  marquee and img tag
Designing web page marquee and img tag
 
Ms excel 2013 formatting worksheets
Ms excel 2013 formatting worksheetsMs excel 2013 formatting worksheets
Ms excel 2013 formatting worksheets
 
Ms excel 2013 data management
Ms excel 2013 data managementMs excel 2013 data management
Ms excel 2013 data management
 
Microsoft Excel introduction
Microsoft Excel introductionMicrosoft Excel introduction
Microsoft Excel introduction
 
Word 2013 working with pictures
Word 2013 working with picturesWord 2013 working with pictures
Word 2013 working with pictures
 
Word 2013 Formatting Page
Word 2013 Formatting PageWord 2013 Formatting Page
Word 2013 Formatting Page
 
Word 2013 8
Word 2013 8Word 2013 8
Word 2013 8
 
Ms word 2013 7
Ms word 2013 7Ms word 2013 7
Ms word 2013 7
 
Ms word 2013 6
Ms word 2013 6Ms word 2013 6
Ms word 2013 6
 
Ms word 2013 4
Ms word 2013 4Ms word 2013 4
Ms word 2013 4
 
Ms word 2013 2
Ms word 2013 2Ms word 2013 2
Ms word 2013 2
 
Ms word 2013
Ms word 2013Ms word 2013
Ms word 2013
 
Parts of the ms word 2013 screen and
Parts of the ms word 2013 screen andParts of the ms word 2013 screen and
Parts of the ms word 2013 screen and
 
Word processor
Word processorWord processor
Word processor
 
Session 2 test construction.mt's
Session 2   test construction.mt'sSession 2   test construction.mt's
Session 2 test construction.mt's
 
Cooking ingredients
Cooking ingredientsCooking ingredients
Cooking ingredients
 
Color theory
Color theoryColor theory
Color theory
 

Recently uploaded

Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 

Recently uploaded (20)

Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

Fundamental elements of the computer software

  • 1. FUNDAMENTAL ELEMENTS OF THE COMPUTER The Software
  • 2.
  • 3. Computer software may be defined as: computer programs, procedures, rules, associated documentation and data pertaining to the operation of a computer system
  • 4. A single program or a collection of programs which performs many task and/or system related functions Software is the detailed instructions that control the operation of hardware. Without software, hardware can not extend its capabilities or utilities
  • 5. Software Programming Language Application Operating System
  • 6. PROGRAMMING LANGUAGES ARE USED TO CREATE ALL OTHER PROGRAMS WHETHER IT IS AN OPERATING SYSTEM OR APPLICATION SOFTWARE.
  • 7.
  • 8. OPERATING SYSTEM CONTROLS THE COMPUTER APPLICATIONS AND KEEP ALL THE HARDWARE RUNS SMOOTHLY.
  • 9. APPLICATION SOFTWARE THIS ARE PROGRAM THAT PEOPLE USE TO GET THEIR WORK DONE.
  • 10. CATEGORY OF SOFTWARE PROPRIETARY- THIS IS PROTECTED BY LAWS, IT WAS OWNED BY A PARTICULAR PERSON OR GROUPS OF PERSON. OPEN SYSTEM OR OPEN SOURCE- THIS CAN BE MODIFIED, NOT EXCLUSIVE PROPERTY OR PARTICULAR VENDOR.
  • 11. Freeware Freeware is also downloadable in the Internet and free of charge. Often freeware is only free for personal use, while commercial use requires a paid license.
  • 12. SHAREWARE THIS SOFTWARE IS DOWNLOADABLE FROM THE INTERNET. LICENSES DIFFER, BUT COMMONLY THE USER IS ALLOWED TO TRY THE PROGRAM FOR FREE, FOR A PERIOD STIPULATED IN THE LICENSE, USUALLY THIRTY DAYS. AT THE END OF THE TRIAL PERIOD, THE SOFTWARE MUST BE PURCHASED OR UNINSTALLED.
  • 13. CRIPPLEWARE THIS SOFTWARE IS SIMILAR TO SHAREWARE EXCEPT THAT KEY FEATURES WILL CEASE TO WORK AFTER THE TRIAL PERIOD HAS ENDED. FOR EXAMPLE, THE "SAVE" FUNCTION, THE PRINT FUNCTION, OR SOME OTHER VITAL FEATURE NECESSARY TO USE THE PROGRAM EFFECTIVELY MAY BECOME UNUSABLE.
  • 14. Adware This is free software that is supported by advertisements built into the program itself. Some adware requires a live Internet feed and uses constant bandwidth to upload new advertisements.
  • 15. MALWARE short for malicious software, consists of programming designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior
  • 16.