SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
I.T. for Management



   Chapter 7

Other Systems & Application Software
Other Systems & Application
Networking
              Software
Most current operating systems are capable of using
the TCP/IP networking protocols. This means that
one system can appear on a network of the other and
share resources such as files, printers, and scanners
using either wired or wireless connections.
Many operating systems also support one or more
vendor-specific legacy networking protocols as well,
for example, SNA on IBM systems, DECnet on
systems from Digital Equipment Corporation, and
Microsoft-specific protocols on Windows. Specific
protocols for specific tasks may also be supported
such as NFS for file access.
Other Systems & Application
            Software

Security Software


Many operating systems include some level of
security. Security is based on the two ideas that:
•The operating system provides access to a
number of resources, directly or indirectly, such
as files on a local disk, privileged system calls,
personal information about users, and the services
offered by the programs running on the system
Other Systems & Application
                Software

Security Software
Many operating systems include some level of security.
Security is based on the two ideas that:
The operating system provides access to a number of
resources, directly or indirectly, such as files on a local
disk, privileged system calls, personal information about
users, and the services offered by the programs running on
the system;
The operating system is capable of distinguishing between
some requesters of these resources who are authorized
(allowed) to access the resource, and others who are not
authorized (forbidden).
Other Systems & Application
                 Software

Security Software
While some systems may simply distinguish between
"privileged" and "non-privileged", systems commonly have a
form of requester identity, such as a user name. Requesters, in
turn, divide into two categories:
Internal security: an already running program. On some
systems, a program once it is running has no limitations,
but commonly the program has an identity which it keeps
and is used to check all of its requests for resources.
Other Systems & Application
              Software

Security Software
  Security software assists in implementing some
security controls and safeguards against certain
type of risk . Some of these areas includes :
  Software based Firewalls: These help in filtering
out unwanted packets of information thereby
protecting the information within the server
  Anti -Virus Solutions Scan every data file which
comes in to the organization for possible virus

       C
Other Systems & Application
              Software

Security Software
Intrusion Detection System :
IDS are special security monitoring software which
inspects all traffic on the network to detect any
pattern.This helps in early identification of attacks
by hackers
Proxy Server:
This software acts as intermediary.With various
uses On the network on one hand and the servers
and other external services on other.
Other Systems & Application
              Software

Security Software
Network operating system:
 NOS controls the functioning of the network
At a very basic level it manages uses by a way of formal
log in
It would define the privileges which the user may enjoy
on the network
Other Software:
Citrix helps create a server based computing
environment You can have desktops without any local
drive
Infrastructure management Software


Most organizations have very huge infrastructure
Managing such huge infrastructure needs support
from IT itself
Infrastructure management software such as HP
open view or IBM’s Tivoli are proven softwares
can scale to any size of organization
These software help in effectively and efficiently
Managing IT infrastructures in large enterprise
Other types of System Software

Some of these include the following:
Web Server requires for Web application
Application server: required for running applications
Transaction monitor: Support large transaction
processing system
Varity of software components for specific purposes
Application Software

Application software is a software which helps to perform a
specific business function
It makes computer useful to the end user
Application software is a subclass of computer software
that employs the capabilities of a computer directly to a task
that the user wishes to perform. This should be contrasted
with system software which is involved in integrating a
computer's various capabilities, but typically does not
directly apply them in the performance of tasks that benefit
the user. In this context the term application refers to both the
application software and its implementation.
Application Software

The exact delineation between the operating system
and application software is not precise, however, and
is occasionally subject to controversy. For example,
one of the key questions in the United States v.
Microsoft antitrust trial was whether Microsoft's Internet
Explorer web browser was part of its Windows
operating system or a separable piece of application
software. As another example, the GNU/Linux naming
controversy is, in part, due to disagreement about the
relationship between the Linux kernel and the Linux
operating system.
Typical examples of software applications are word
processors, spreadsheets, and media players.
Application Software
There are many subtypes of Application Software:
   •Enterprise software addresses the needs of organization
   processes and data flow, often in a large distributed
   ecosystem. (Examples include Financial, Customer
   Relationship Management, and Supply Chain
   Management). Note that Departmental Software is a sub-
   type of Enterprise Software with a focus on smaller
   organizations or groups within a large organization.
   (Examples include Travel Expense Management, and IT
   Helpdesk)
Enterprise infrastructure software provides common
capabilities needed to create Enterprise Software systems.
(Examples include Databases, Email servers, and Network
and Security Management)
Application Software

Information worker software addresses the needs of
individuals to create and manage information, often for
individual projects within a department, in contrast to
enterprise management. Examples include time management,
resource management, documentation tools, analytical, and
collaborative. Word processors, spreadsheets, email and blog
clients, personal information system, and individual media
editors may aid in multiple information worker tasks
Media and entertainment software addresses the needs of
individuals and groups to consume digital entertainment and
published digital content. (Examples include Media Players,
Web Browsers, Help browsers, and Games)
Application Software


Educational software is related to Media and Entertainment
Software, but has distinct requirements for delivering
evaluations (tests) and tracking progress through material. It
is also related to collaboration software in that many
Educational Software systems include collaborative
capabilities.
Product engineering software is used in developing
hardware and software products. This includes computer
aided design (CAD), computer aided engineering (CAE),
computer language editing and compiling tools, Integrated
Development Environments, and Application Programmer
Interfaces.
I.T. for Management




 End of Chapter 7

Weitere ähnliche Inhalte

Was ist angesagt?

Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepointpabatan
 
Foundations of Information System in Business - Mark John Lado
Foundations of Information System in Business - Mark John LadoFoundations of Information System in Business - Mark John Lado
Foundations of Information System in Business - Mark John LadoMark John Lado, MIT
 
Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)pabatan
 
Chapter 5 database security
Chapter 5   database securityChapter 5   database security
Chapter 5 database securitySyaiful Ahdan
 
Decision support systems
Decision support systemsDecision support systems
Decision support systemsjatin Sareen
 
Fasoo Company And Product Information
Fasoo Company And Product InformationFasoo Company And Product Information
Fasoo Company And Product Informationpabatan
 
Sysctr Track: Unified Device Management: It’s all about the experience
Sysctr Track: Unified Device Management: It’s all about the experienceSysctr Track: Unified Device Management: It’s all about the experience
Sysctr Track: Unified Device Management: It’s all about the experienceITProceed
 
Embedded systems software
Embedded systems softwareEmbedded systems software
Embedded systems softwarealanradley
 
Chapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systemsChapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systemsjayussuryawan
 
20110428 ARMA Amarillo IT for Records Managers
20110428 ARMA Amarillo IT for Records Managers20110428 ARMA Amarillo IT for Records Managers
20110428 ARMA Amarillo IT for Records ManagersJesse Wilkins
 
Data base security
Data base securityData base security
Data base securitySara Nazir
 
Electronic document management system
Electronic document management systemElectronic document management system
Electronic document management systemBiodor Bonifacio
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalQuek Lilian
 
University electronic management system
University electronic management systemUniversity electronic management system
University electronic management systemAleksey Lashin
 
Database security
Database securityDatabase security
Database securityArpana shree
 
01 database security ent-db
01  database security ent-db01  database security ent-db
01 database security ent-dbuncleRhyme
 
Distributed systems-analysis-and-design
Distributed systems-analysis-and-designDistributed systems-analysis-and-design
Distributed systems-analysis-and-designEstiak Khan
 

Was ist angesagt? (20)

Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepoint
 
Foundations of Information System in Business - Mark John Lado
Foundations of Information System in Business - Mark John LadoFoundations of Information System in Business - Mark John Lado
Foundations of Information System in Business - Mark John Lado
 
Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)
 
Chapter 5 database security
Chapter 5   database securityChapter 5   database security
Chapter 5 database security
 
Decision support systems
Decision support systemsDecision support systems
Decision support systems
 
Fasoo Company And Product Information
Fasoo Company And Product InformationFasoo Company And Product Information
Fasoo Company And Product Information
 
Sysctr Track: Unified Device Management: It’s all about the experience
Sysctr Track: Unified Device Management: It’s all about the experienceSysctr Track: Unified Device Management: It’s all about the experience
Sysctr Track: Unified Device Management: It’s all about the experience
 
SoftAge eDMS
SoftAge eDMSSoftAge eDMS
SoftAge eDMS
 
Embedded systems software
Embedded systems softwareEmbedded systems software
Embedded systems software
 
Chapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systemsChapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systems
 
20110428 ARMA Amarillo IT for Records Managers
20110428 ARMA Amarillo IT for Records Managers20110428 ARMA Amarillo IT for Records Managers
20110428 ARMA Amarillo IT for Records Managers
 
Data base security
Data base securityData base security
Data base security
 
Electronic document management system
Electronic document management systemElectronic document management system
Electronic document management system
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
 
Database security
Database securityDatabase security
Database security
 
University electronic management system
University electronic management systemUniversity electronic management system
University electronic management system
 
Database security
Database securityDatabase security
Database security
 
01 database security ent-db
01  database security ent-db01  database security ent-db
01 database security ent-db
 
Database Design
Database DesignDatabase Design
Database Design
 
Distributed systems-analysis-and-design
Distributed systems-analysis-and-designDistributed systems-analysis-and-design
Distributed systems-analysis-and-design
 

Andere mochten auch

Business and Revenue Models in E-Commerce
Business and Revenue Models in E-CommerceBusiness and Revenue Models in E-Commerce
Business and Revenue Models in E-CommercePranay Panday
 
The e-commerce models
The e-commerce modelsThe e-commerce models
The e-commerce modelsVanina Delobelle
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commercem8817
 
Overview of Key Performance Indicators
Overview of Key Performance IndicatorsOverview of Key Performance Indicators
Overview of Key Performance IndicatorsMicheal Axelsen
 
E commerce ppt
E commerce pptE commerce ppt
E commerce pptMunish Singla
 
E commerce
E commerceE commerce
E commerceGBC
 

Andere mochten auch (7)

Business and Revenue Models in E-Commerce
Business and Revenue Models in E-CommerceBusiness and Revenue Models in E-Commerce
Business and Revenue Models in E-Commerce
 
The e-commerce models
The e-commerce modelsThe e-commerce models
The e-commerce models
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
Overview of Key Performance Indicators
Overview of Key Performance IndicatorsOverview of Key Performance Indicators
Overview of Key Performance Indicators
 
E commerce ppt
E commerce pptE commerce ppt
E commerce ppt
 
E commerce
E commerceE commerce
E commerce
 
E commerce
E commerceE commerce
E commerce
 

Ă„hnlich wie Other Systems & Application Software

Lesson 5 computer software
Lesson 5 computer softwareLesson 5 computer software
Lesson 5 computer softwareVishal Patyal
 
Introduction to computer software
Introduction to computer softwareIntroduction to computer software
Introduction to computer softwareElike Ikechukwu
 
What Is Software and Exploring Its Types A Comprehensive Guide
What Is Software and Exploring Its Types A Comprehensive GuideWhat Is Software and Exploring Its Types A Comprehensive Guide
What Is Software and Exploring Its Types A Comprehensive GuidePolyxer Systems
 
computer software
computer softwarecomputer software
computer softwareAhsan Khan
 
Hardware , software and filmware
Hardware , software and filmwareHardware , software and filmware
Hardware , software and filmwareMH Shihab
 
system Security
system Security system Security
system Security Gaurav Mishra
 
Thing to understand about software
Thing to understand about softwareThing to understand about software
Thing to understand about softwaredfghjrtyuj
 
itcpresentationnew-150929164902-lva1-app6891.pdf
itcpresentationnew-150929164902-lva1-app6891.pdfitcpresentationnew-150929164902-lva1-app6891.pdf
itcpresentationnew-150929164902-lva1-app6891.pdfSaddamAliBehana
 
computer software
computer softwarecomputer software
computer softwareRiya Gupta
 
Software and its Types All About Computer Software
Software and its Types All About Computer SoftwareSoftware and its Types All About Computer Software
Software and its Types All About Computer Softwarekhang950262
 
software engineering
software engineeringsoftware engineering
software engineeringSandhyaTatekalva
 
Computer notes
Computer notesComputer notes
Computer notesshahzaib111
 
Management information systems
Management information systemsManagement information systems
Management information systemsaz00z
 
As media studies software and systems presentation
As media studies software and systems presentationAs media studies software and systems presentation
As media studies software and systems presentationpaddy249
 
It kamus virus security glossary
It kamus virus   security glossaryIt kamus virus   security glossary
It kamus virus security glossaryFathoni Mahardika II
 
Chapter 3 Software.ppt
Chapter 3 Software.pptChapter 3 Software.ppt
Chapter 3 Software.pptAmanuelZewdie4
 

Ă„hnlich wie Other Systems & Application Software (20)

Lesson 5 computer software
Lesson 5 computer softwareLesson 5 computer software
Lesson 5 computer software
 
Introduction to computer software
Introduction to computer softwareIntroduction to computer software
Introduction to computer software
 
What Is Software and Exploring Its Types A Comprehensive Guide
What Is Software and Exploring Its Types A Comprehensive GuideWhat Is Software and Exploring Its Types A Comprehensive Guide
What Is Software and Exploring Its Types A Comprehensive Guide
 
Fg b
Fg bFg b
Fg b
 
computer software
computer softwarecomputer software
computer software
 
Hardware , software and filmware
Hardware , software and filmwareHardware , software and filmware
Hardware , software and filmware
 
system Security
system Security system Security
system Security
 
Exam 1 in ITEP 132
Exam 1 in ITEP 132Exam 1 in ITEP 132
Exam 1 in ITEP 132
 
Thing to understand about software
Thing to understand about softwareThing to understand about software
Thing to understand about software
 
itcpresentationnew-150929164902-lva1-app6891.pdf
itcpresentationnew-150929164902-lva1-app6891.pdfitcpresentationnew-150929164902-lva1-app6891.pdf
itcpresentationnew-150929164902-lva1-app6891.pdf
 
computer software
computer softwarecomputer software
computer software
 
Software and its Types All About Computer Software
Software and its Types All About Computer SoftwareSoftware and its Types All About Computer Software
Software and its Types All About Computer Software
 
B) Computer Basics
B) Computer BasicsB) Computer Basics
B) Computer Basics
 
software engineering
software engineeringsoftware engineering
software engineering
 
MCA-5 unit1
MCA-5 unit1MCA-5 unit1
MCA-5 unit1
 
Computer notes
Computer notesComputer notes
Computer notes
 
Management information systems
Management information systemsManagement information systems
Management information systems
 
As media studies software and systems presentation
As media studies software and systems presentationAs media studies software and systems presentation
As media studies software and systems presentation
 
It kamus virus security glossary
It kamus virus   security glossaryIt kamus virus   security glossary
It kamus virus security glossary
 
Chapter 3 Software.ppt
Chapter 3 Software.pptChapter 3 Software.ppt
Chapter 3 Software.ppt
 

Mehr von We Learn - A Continuous Learning Forum from Welingkar's Distance Learning Program.

Mehr von We Learn - A Continuous Learning Forum from Welingkar's Distance Learning Program. (20)

PGDM in Supply Chain Management
PGDM in Supply Chain ManagementPGDM in Supply Chain Management
PGDM in Supply Chain Management
 
PGDM in Rural & Agribusiness Management
PGDM in Rural & Agribusiness ManagementPGDM in Rural & Agribusiness Management
PGDM in Rural & Agribusiness Management
 
PGDM in E-Commerce Management
PGDM in E-Commerce ManagementPGDM in E-Commerce Management
PGDM in E-Commerce Management
 
PGDM in Service Excellence
PGDM in Service ExcellencePGDM in Service Excellence
PGDM in Service Excellence
 
PGDM in International Management
PGDM in International ManagementPGDM in International Management
PGDM in International Management
 
PGDM in IT Project Management
PGDM in IT Project ManagementPGDM in IT Project Management
PGDM in IT Project Management
 
Distance Learning PGDM in E-Business Management
Distance Learning PGDM in E-Business ManagementDistance Learning PGDM in E-Business Management
Distance Learning PGDM in E-Business Management
 
Distance Learning PGDM in Business Administration
Distance Learning PGDM in Business AdministrationDistance Learning PGDM in Business Administration
Distance Learning PGDM in Business Administration
 
PGDM in Finance Management
PGDM in Finance ManagementPGDM in Finance Management
PGDM in Finance Management
 
PGDM in Marketing Management
PGDM in Marketing ManagementPGDM in Marketing Management
PGDM in Marketing Management
 
PGDM in Operation Management
PGDM in Operation ManagementPGDM in Operation Management
PGDM in Operation Management
 
Marketing Management
Marketing ManagementMarketing Management
Marketing Management
 
PGDM in Media & Advertising
PGDM in Media & AdvertisingPGDM in Media & Advertising
PGDM in Media & Advertising
 
We School HR Management
We School HR ManagementWe School HR Management
We School HR Management
 
WE SCHOOL TRAVEL & TOURISM MANAGEMENT
WE SCHOOL TRAVEL & TOURISM MANAGEMENTWE SCHOOL TRAVEL & TOURISM MANAGEMENT
WE SCHOOL TRAVEL & TOURISM MANAGEMENT
 
Personal budgeting
Personal budgetingPersonal budgeting
Personal budgeting
 
Maintaining the financial health of businesses through financial accounting
Maintaining the financial health of businesses through financial accountingMaintaining the financial health of businesses through financial accounting
Maintaining the financial health of businesses through financial accounting
 
Asset Management Case Sstudy
Asset Management  Case SstudyAsset Management  Case Sstudy
Asset Management Case Sstudy
 
Team management’ scored on the football
Team management’ scored on the footballTeam management’ scored on the football
Team management’ scored on the football
 
Mc donalds Recruitment Case Study
Mc donalds Recruitment Case StudyMc donalds Recruitment Case Study
Mc donalds Recruitment Case Study
 

KĂĽrzlich hochgeladen

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Dr. Mazin Mohamed alkathiri
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 đź’ž Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 đź’ž Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 đź’ž Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 đź’ž Full Nigh...Pooja Nehwal
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

KĂĽrzlich hochgeladen (20)

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 đź’ž Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 đź’ž Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 đź’ž Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 đź’ž Full Nigh...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
CĂłdigo Creativo y Arte de Software | Unidad 1
CĂłdigo Creativo y Arte de Software | Unidad 1CĂłdigo Creativo y Arte de Software | Unidad 1
CĂłdigo Creativo y Arte de Software | Unidad 1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 

Other Systems & Application Software

  • 1. I.T. for Management Chapter 7 Other Systems & Application Software
  • 2. Other Systems & Application Networking Software Most current operating systems are capable of using the TCP/IP networking protocols. This means that one system can appear on a network of the other and share resources such as files, printers, and scanners using either wired or wireless connections. Many operating systems also support one or more vendor-specific legacy networking protocols as well, for example, SNA on IBM systems, DECnet on systems from Digital Equipment Corporation, and Microsoft-specific protocols on Windows. Specific protocols for specific tasks may also be supported such as NFS for file access.
  • 3. Other Systems & Application Software Security Software Many operating systems include some level of security. Security is based on the two ideas that: •The operating system provides access to a number of resources, directly or indirectly, such as files on a local disk, privileged system calls, personal information about users, and the services offered by the programs running on the system
  • 4. Other Systems & Application Software Security Software Many operating systems include some level of security. Security is based on the two ideas that: The operating system provides access to a number of resources, directly or indirectly, such as files on a local disk, privileged system calls, personal information about users, and the services offered by the programs running on the system; The operating system is capable of distinguishing between some requesters of these resources who are authorized (allowed) to access the resource, and others who are not authorized (forbidden).
  • 5. Other Systems & Application Software Security Software While some systems may simply distinguish between "privileged" and "non-privileged", systems commonly have a form of requester identity, such as a user name. Requesters, in turn, divide into two categories: Internal security: an already running program. On some systems, a program once it is running has no limitations, but commonly the program has an identity which it keeps and is used to check all of its requests for resources.
  • 6. Other Systems & Application Software Security Software Security software assists in implementing some security controls and safeguards against certain type of risk . Some of these areas includes : Software based Firewalls: These help in filtering out unwanted packets of information thereby protecting the information within the server Anti -Virus Solutions Scan every data file which comes in to the organization for possible virus C
  • 7. Other Systems & Application Software Security Software Intrusion Detection System : IDS are special security monitoring software which inspects all traffic on the network to detect any pattern.This helps in early identification of attacks by hackers Proxy Server: This software acts as intermediary.With various uses On the network on one hand and the servers and other external services on other.
  • 8. Other Systems & Application Software Security Software Network operating system: NOS controls the functioning of the network At a very basic level it manages uses by a way of formal log in It would define the privileges which the user may enjoy on the network Other Software: Citrix helps create a server based computing environment You can have desktops without any local drive
  • 9. Infrastructure management Software Most organizations have very huge infrastructure Managing such huge infrastructure needs support from IT itself Infrastructure management software such as HP open view or IBM’s Tivoli are proven softwares can scale to any size of organization These software help in effectively and efficiently Managing IT infrastructures in large enterprise
  • 10. Other types of System Software Some of these include the following: Web Server requires for Web application Application server: required for running applications Transaction monitor: Support large transaction processing system Varity of software components for specific purposes
  • 11. Application Software Application software is a software which helps to perform a specific business function It makes computer useful to the end user Application software is a subclass of computer software that employs the capabilities of a computer directly to a task that the user wishes to perform. This should be contrasted with system software which is involved in integrating a computer's various capabilities, but typically does not directly apply them in the performance of tasks that benefit the user. In this context the term application refers to both the application software and its implementation.
  • 12. Application Software The exact delineation between the operating system and application software is not precise, however, and is occasionally subject to controversy. For example, one of the key questions in the United States v. Microsoft antitrust trial was whether Microsoft's Internet Explorer web browser was part of its Windows operating system or a separable piece of application software. As another example, the GNU/Linux naming controversy is, in part, due to disagreement about the relationship between the Linux kernel and the Linux operating system. Typical examples of software applications are word processors, spreadsheets, and media players.
  • 13. Application Software There are many subtypes of Application Software: •Enterprise software addresses the needs of organization processes and data flow, often in a large distributed ecosystem. (Examples include Financial, Customer Relationship Management, and Supply Chain Management). Note that Departmental Software is a sub- type of Enterprise Software with a focus on smaller organizations or groups within a large organization. (Examples include Travel Expense Management, and IT Helpdesk) Enterprise infrastructure software provides common capabilities needed to create Enterprise Software systems. (Examples include Databases, Email servers, and Network and Security Management)
  • 14. Application Software Information worker software addresses the needs of individuals to create and manage information, often for individual projects within a department, in contrast to enterprise management. Examples include time management, resource management, documentation tools, analytical, and collaborative. Word processors, spreadsheets, email and blog clients, personal information system, and individual media editors may aid in multiple information worker tasks Media and entertainment software addresses the needs of individuals and groups to consume digital entertainment and published digital content. (Examples include Media Players, Web Browsers, Help browsers, and Games)
  • 15. Application Software Educational software is related to Media and Entertainment Software, but has distinct requirements for delivering evaluations (tests) and tracking progress through material. It is also related to collaboration software in that many Educational Software systems include collaborative capabilities. Product engineering software is used in developing hardware and software products. This includes computer aided design (CAD), computer aided engineering (CAE), computer language editing and compiling tools, Integrated Development Environments, and Application Programmer Interfaces.
  • 16. I.T. for Management End of Chapter 7