SlideShare ist ein Scribd-Unternehmen logo
1 von 24
INFORMATION & COMMUNICATION TECHNOLOGY LEARNING AREA  2 : COMPUTER SYSTEM SOFTWARE Prepared by : Norhasimah Mohamed – Head of Information & Communication Technology Panel, SMK Sungai Pusu, Gombak  2007 Monday : 16072007
SOFTWARE OPERATING SYSTEM UTILITY PROGRAM SOFTWARE SYSTEM  SOFTWARE APPLICATION  SOFTWARE
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
System Software VS Application Software Provides the environment to enable users to accomplish specific tasks Function Provide the environment in which the applications run Dependent – cannot work without system software Dependency Independent – system software can function without an application software Each computer can have more than one application software Number of software Each computer only need one system software Optional – depends on usage and needs. Without an application software, computer still able to function Need Compulsory – each computer must have a system software to function Enables users to work efficiently with documentation such as letters, accounting reports and presentations Usage Enables the computer to function properly Application software System Software
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SYSTEM  SOFTWARE OPERATING SYSTEM UTILITY PROGRAM
OPERATING  SYSTEM
Operating System for Server
Operating System for Server
Operating System for Workstation
Operating System for Workstation
UTILITY  PROGRAM
ANTIVIRUS 129 TREND MICRO A/VIRUS + I.SECURITY 2006 380 NORTON SYSTEM WORKS 2005 PREMIUM 250 NORTON SYSTEM WORKS 2005  250 NORTON INTERNET SECURITY 2006 115 SYMANTEC NORTON ANTIVIRUS 2006   ANTI-VIRUS
DIAGNOSTIC UTILITY
 
 
Differences between  Operating System  and  Utility Program Antivirus, diagnotic utility, file manager, screen saver, image viewer, personal firewall, uninstaller, disk scanner, disk defragmenter and backup utility. Linux, Mac OSX, Unix, Windows XP, MS Dos Helps managing a computer easier, computers can still be used or started without it Very important, computes cannot be used or started without an operating system Perform maintenances-type tasks, usually related to managing a computer, its device or its programs Contains instructions that coordinate all the activities among computer hardware resources Utility Program Operating System
APPLICATION SOFTWARE
1099 OFFICE 2003 Professional 799 OFFICE 2003 Small Business Edition 570 OFFICE 2003 Basic Edition 990 OFFICE XP Professional 629 OFFICE XP Small Business Edition   SOFTWARE (0EM)
Word Processing
Spreadsheet
Presentation
Database
Graphic Editing ,[object Object],[object Object],[object Object]
SEKIAN  TERIMA  KASIH

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Lesson 2.2
Lesson 2.2Lesson 2.2
Lesson 2.2
 
Operating system
Operating systemOperating system
Operating system
 
Introduction To Operating System
Introduction To Operating SystemIntroduction To Operating System
Introduction To Operating System
 
Operating system (os)
Operating system (os)Operating system (os)
Operating system (os)
 
Lesson 3 Operating System Functions
Lesson 3 Operating System FunctionsLesson 3 Operating System Functions
Lesson 3 Operating System Functions
 
System software os system and utility ggood
System software os system and utility ggoodSystem software os system and utility ggood
System software os system and utility ggood
 
p3 unit 2
p3 unit 2p3 unit 2
p3 unit 2
 
Softwares
SoftwaresSoftwares
Softwares
 
Defensive measure of virus
Defensive  measure of virusDefensive  measure of virus
Defensive measure of virus
 
Insider operating system
Insider   operating systemInsider   operating system
Insider operating system
 
Operating system structures
Operating system structuresOperating system structures
Operating system structures
 
Computer Software - 7th Grade
Computer Software - 7th GradeComputer Software - 7th Grade
Computer Software - 7th Grade
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Role and function of operating system
Role and function of operating systemRole and function of operating system
Role and function of operating system
 
Types of Software
Types of SoftwareTypes of Software
Types of Software
 
Ch13 (1)
Ch13 (1)Ch13 (1)
Ch13 (1)
 
lesson 14 Software- paupautoniikent
lesson 14 Software- paupautoniikentlesson 14 Software- paupautoniikent
lesson 14 Software- paupautoniikent
 
Os support
Os supportOs support
Os support
 
N5 ISDD Software Requirements
N5 ISDD Software RequirementsN5 ISDD Software Requirements
N5 ISDD Software Requirements
 
operating system
operating systemoperating system
operating system
 

Andere mochten auch

Foss For Media Makers
Foss For Media MakersFoss For Media Makers
Foss For Media MakersEngageMedia
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachJon Gatrell
 
Automated Alphabet Reduction Method with Evolutionary Algorithms for Protein ...
Automated Alphabet Reduction Method with Evolutionary Algorithms for Protein ...Automated Alphabet Reduction Method with Evolutionary Algorithms for Protein ...
Automated Alphabet Reduction Method with Evolutionary Algorithms for Protein ...jaumebp
 
Oop2012 keynote Design Driven Development
Oop2012 keynote Design Driven DevelopmentOop2012 keynote Design Driven Development
Oop2012 keynote Design Driven DevelopmentMichael Chaize
 
Adobe et la stratégie multi-écrans
Adobe et la stratégie multi-écransAdobe et la stratégie multi-écrans
Adobe et la stratégie multi-écransMichael Chaize
 
我行·你行·大家行01
我行·你行·大家行01我行·你行·大家行01
我行·你行·大家行01liuruifeng
 
Jens And Levi
Jens And LeviJens And Levi
Jens And Levieka
 
Ppt For Symp - test
Ppt For Symp - testPpt For Symp - test
Ppt For Symp - testkatoreena_7
 
Nina
NinaNina
Ninaeka
 
Social Media: Where Brand is Tags
Social Media: Where Brand is TagsSocial Media: Where Brand is Tags
Social Media: Where Brand is TagsJon Gatrell
 
Charges of the Corruption in Brazil - Senator Renan Calheiros
Charges of the Corruption in Brazil - Senator Renan CalheirosCharges of the Corruption in Brazil - Senator Renan Calheiros
Charges of the Corruption in Brazil - Senator Renan CalheirosRobson Silva Espig
 
Shadow Fighter The Movie
Shadow Fighter The MovieShadow Fighter The Movie
Shadow Fighter The Movieguest337e86
 
Listen to the Market
Listen to the MarketListen to the Market
Listen to the MarketJon Gatrell
 
Ерехинская диктум извлечение мнений
Ерехинская диктум извлечение мненийЕрехинская диктум извлечение мнений
Ерехинская диктум извлечение мненийLidia Pivovarova
 
Graphics Of The 509
Graphics Of The 509Graphics Of The 509
Graphics Of The 509guestd37bca
 
What is your product's social strategy?
What is your product's social strategy?What is your product's social strategy?
What is your product's social strategy?Jon Gatrell
 
Evidence Of Bimodal Crystallite Size Distribution In Microcrystalline Silico...
Evidence Of Bimodal Crystallite Size Distribution In  Microcrystalline Silico...Evidence Of Bimodal Crystallite Size Distribution In  Microcrystalline Silico...
Evidence Of Bimodal Crystallite Size Distribution In Microcrystalline Silico...Sanjay Ram
 

Andere mochten auch (20)

Prdata
PrdataPrdata
Prdata
 
Foss For Media Makers
Foss For Media MakersFoss For Media Makers
Foss For Media Makers
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
 
Automated Alphabet Reduction Method with Evolutionary Algorithms for Protein ...
Automated Alphabet Reduction Method with Evolutionary Algorithms for Protein ...Automated Alphabet Reduction Method with Evolutionary Algorithms for Protein ...
Automated Alphabet Reduction Method with Evolutionary Algorithms for Protein ...
 
I M S Bocharov
I M S BocharovI M S Bocharov
I M S Bocharov
 
Oop2012 keynote Design Driven Development
Oop2012 keynote Design Driven DevelopmentOop2012 keynote Design Driven Development
Oop2012 keynote Design Driven Development
 
Adobe et la stratégie multi-écrans
Adobe et la stratégie multi-écransAdobe et la stratégie multi-écrans
Adobe et la stratégie multi-écrans
 
我行·你行·大家行01
我行·你行·大家行01我行·你行·大家行01
我行·你行·大家行01
 
Jens And Levi
Jens And LeviJens And Levi
Jens And Levi
 
Ppt For Symp - test
Ppt For Symp - testPpt For Symp - test
Ppt For Symp - test
 
Nina
NinaNina
Nina
 
Social Media: Where Brand is Tags
Social Media: Where Brand is TagsSocial Media: Where Brand is Tags
Social Media: Where Brand is Tags
 
Charges of the Corruption in Brazil - Senator Renan Calheiros
Charges of the Corruption in Brazil - Senator Renan CalheirosCharges of the Corruption in Brazil - Senator Renan Calheiros
Charges of the Corruption in Brazil - Senator Renan Calheiros
 
Shadow Fighter The Movie
Shadow Fighter The MovieShadow Fighter The Movie
Shadow Fighter The Movie
 
Listen to the Market
Listen to the MarketListen to the Market
Listen to the Market
 
Ерехинская диктум извлечение мнений
Ерехинская диктум извлечение мненийЕрехинская диктум извлечение мнений
Ерехинская диктум извлечение мнений
 
Graphics Of The 509
Graphics Of The 509Graphics Of The 509
Graphics Of The 509
 
3. open innov organization
3. open innov organization3. open innov organization
3. open innov organization
 
What is your product's social strategy?
What is your product's social strategy?What is your product's social strategy?
What is your product's social strategy?
 
Evidence Of Bimodal Crystallite Size Distribution In Microcrystalline Silico...
Evidence Of Bimodal Crystallite Size Distribution In  Microcrystalline Silico...Evidence Of Bimodal Crystallite Size Distribution In  Microcrystalline Silico...
Evidence Of Bimodal Crystallite Size Distribution In Microcrystalline Silico...
 

Ähnlich wie ICT Learning Area 2: Software for Computer Systems

Ähnlich wie ICT Learning Area 2: Software for Computer Systems (20)

As media studies software and systems presentation
As media studies software and systems presentationAs media studies software and systems presentation
As media studies software and systems presentation
 
Software for educators and students
Software for educators and studentsSoftware for educators and students
Software for educators and students
 
Operating system by hm
Operating system by hmOperating system by hm
Operating system by hm
 
Lecture 2.6 software
Lecture 2.6 softwareLecture 2.6 software
Lecture 2.6 software
 
Computer software (Introduction to OS)
Computer software (Introduction to OS)Computer software (Introduction to OS)
Computer software (Introduction to OS)
 
Operating system education. technology.
Operating system education.  technology.Operating system education.  technology.
Operating system education. technology.
 
Software
SoftwareSoftware
Software
 
Software
SoftwareSoftware
Software
 
Ch03_Software.ppt
Ch03_Software.pptCh03_Software.ppt
Ch03_Software.ppt
 
Modern operating system.......
Modern operating system.......Modern operating system.......
Modern operating system.......
 
System Software
System SoftwareSystem Software
System Software
 
Software
SoftwareSoftware
Software
 
What is software?
What is software?What is software?
What is software?
 
Software
SoftwareSoftware
Software
 
Unit III - Basics of Computer Science
Unit III - Basics of Computer ScienceUnit III - Basics of Computer Science
Unit III - Basics of Computer Science
 
what is Operating system
what is Operating systemwhat is Operating system
what is Operating system
 
Single ppt
Single pptSingle ppt
Single ppt
 
Unit 4 software
Unit 4  softwareUnit 4  software
Unit 4 software
 
Utility Programs
Utility ProgramsUtility Programs
Utility Programs
 
OS
OSOS
OS
 

Mehr von Cma Mohd

La 5 Programming2
La 5   Programming2La 5   Programming2
La 5 Programming2Cma Mohd
 
La 5 Programming1
La 5   Programming1La 5   Programming1
La 5 Programming1Cma Mohd
 
La5 Programming688
La5 Programming688La5 Programming688
La5 Programming688Cma Mohd
 
La5 Program Phases
La5 Program PhasesLa5 Program Phases
La5 Program PhasesCma Mohd
 
La5 Basicelement
La5 BasicelementLa5 Basicelement
La5 BasicelementCma Mohd
 
La 5 Pl Translator
La 5   Pl TranslatorLa 5   Pl Translator
La 5 Pl TranslatorCma Mohd
 
LA5_PL Approach
LA5_PL ApproachLA5_PL Approach
LA5_PL ApproachCma Mohd
 
LA5_Generation of Programming Languages
LA5_Generation of Programming LanguagesLA5_Generation of Programming Languages
LA5_Generation of Programming LanguagesCma Mohd
 
Summary of LA5
Summary of LA5Summary of LA5
Summary of LA5Cma Mohd
 
Basic Programming Concept
Basic Programming ConceptBasic Programming Concept
Basic Programming ConceptCma Mohd
 
hardware, editing software, authoring tools
hardware, editing software, authoring toolshardware, editing software, authoring tools
hardware, editing software, authoring toolsCma Mohd
 
introduction of ict
introduction of ictintroduction of ict
introduction of ictCma Mohd
 
La4 Multimedia Elements
La4 Multimedia ElementsLa4 Multimedia Elements
La4 Multimedia ElementsCma Mohd
 
La4 Multimedia Elements
La4 Multimedia ElementsLa4 Multimedia Elements
La4 Multimedia ElementsCma Mohd
 
Multimedia01
Multimedia01Multimedia01
Multimedia01Cma Mohd
 
La3 Mediumnetwork
La3 MediumnetworkLa3 Mediumnetwork
La3 MediumnetworkCma Mohd
 
La3 Hardware
La3 HardwareLa3 Hardware
La3 HardwareCma Mohd
 
Wireless Transmission
Wireless TransmissionWireless Transmission
Wireless TransmissionCma Mohd
 

Mehr von Cma Mohd (20)

La 5 Programming2
La 5   Programming2La 5   Programming2
La 5 Programming2
 
La 5 Programming1
La 5   Programming1La 5   Programming1
La 5 Programming1
 
La5 Quiz
La5 QuizLa5 Quiz
La5 Quiz
 
La5 Programming688
La5 Programming688La5 Programming688
La5 Programming688
 
La5 Program Phases
La5 Program PhasesLa5 Program Phases
La5 Program Phases
 
La5 Basicelement
La5 BasicelementLa5 Basicelement
La5 Basicelement
 
La 5 Pl Translator
La 5   Pl TranslatorLa 5   Pl Translator
La 5 Pl Translator
 
LA5_PL Approach
LA5_PL ApproachLA5_PL Approach
LA5_PL Approach
 
LA5_Generation of Programming Languages
LA5_Generation of Programming LanguagesLA5_Generation of Programming Languages
LA5_Generation of Programming Languages
 
Summary of LA5
Summary of LA5Summary of LA5
Summary of LA5
 
Basic Programming Concept
Basic Programming ConceptBasic Programming Concept
Basic Programming Concept
 
hardware, editing software, authoring tools
hardware, editing software, authoring toolshardware, editing software, authoring tools
hardware, editing software, authoring tools
 
introduction of ict
introduction of ictintroduction of ict
introduction of ict
 
La4 Multimedia Elements
La4 Multimedia ElementsLa4 Multimedia Elements
La4 Multimedia Elements
 
La4 Multimedia Elements
La4 Multimedia ElementsLa4 Multimedia Elements
La4 Multimedia Elements
 
Multimedia01
Multimedia01Multimedia01
Multimedia01
 
La3 Mediumnetwork
La3 MediumnetworkLa3 Mediumnetwork
La3 Mediumnetwork
 
Nos
NosNos
Nos
 
La3 Hardware
La3 HardwareLa3 Hardware
La3 Hardware
 
Wireless Transmission
Wireless TransmissionWireless Transmission
Wireless Transmission
 

Kürzlich hochgeladen

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Kürzlich hochgeladen (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

ICT Learning Area 2: Software for Computer Systems

  • 1. INFORMATION & COMMUNICATION TECHNOLOGY LEARNING AREA 2 : COMPUTER SYSTEM SOFTWARE Prepared by : Norhasimah Mohamed – Head of Information & Communication Technology Panel, SMK Sungai Pusu, Gombak 2007 Monday : 16072007
  • 2. SOFTWARE OPERATING SYSTEM UTILITY PROGRAM SOFTWARE SYSTEM SOFTWARE APPLICATION SOFTWARE
  • 3.
  • 4. System Software VS Application Software Provides the environment to enable users to accomplish specific tasks Function Provide the environment in which the applications run Dependent – cannot work without system software Dependency Independent – system software can function without an application software Each computer can have more than one application software Number of software Each computer only need one system software Optional – depends on usage and needs. Without an application software, computer still able to function Need Compulsory – each computer must have a system software to function Enables users to work efficiently with documentation such as letters, accounting reports and presentations Usage Enables the computer to function properly Application software System Software
  • 5.
  • 9. Operating System for Workstation
  • 10. Operating System for Workstation
  • 12. ANTIVIRUS 129 TREND MICRO A/VIRUS + I.SECURITY 2006 380 NORTON SYSTEM WORKS 2005 PREMIUM 250 NORTON SYSTEM WORKS 2005 250 NORTON INTERNET SECURITY 2006 115 SYMANTEC NORTON ANTIVIRUS 2006   ANTI-VIRUS
  • 14.  
  • 15.  
  • 16. Differences between Operating System and Utility Program Antivirus, diagnotic utility, file manager, screen saver, image viewer, personal firewall, uninstaller, disk scanner, disk defragmenter and backup utility. Linux, Mac OSX, Unix, Windows XP, MS Dos Helps managing a computer easier, computers can still be used or started without it Very important, computes cannot be used or started without an operating system Perform maintenances-type tasks, usually related to managing a computer, its device or its programs Contains instructions that coordinate all the activities among computer hardware resources Utility Program Operating System
  • 18. 1099 OFFICE 2003 Professional 799 OFFICE 2003 Small Business Edition 570 OFFICE 2003 Basic Edition 990 OFFICE XP Professional 629 OFFICE XP Small Business Edition   SOFTWARE (0EM)
  • 23.
  • 24. SEKIAN TERIMA KASIH