Premium Essay

Computer Software

In:

Submitted By fieryoj
Words 3223
Pages 13
Computer software
From Wikipedia, the free encyclopedia
Jump to: navigation, search

"Software" redirects here. For other uses, see Software (disambiguation).
Computer software, or just software, is a collection of computer programs and related data that provide the instructions for telling a computer what to do and how to do it. In other words, software is a conceptual entity which is a set of computer programs, procedures, and associated documentation concerned with the operation of a data processing system. We can also say software refers to one or more computer programs and data held in the storage of the computer for some purposes. In other words software is a set of programs, procedures, algorithms and its documentation. Program software performs the function of the program it implements, either by directly providing instructions to the computer hardware or by serving as input to another piece of software. The term was coined to contrast to the old term hardware (meaning physical devices). In contrast to hardware, software is intangible, meaning it "cannot be touched".[1] Software is also sometimes used in a more narrow sense, meaning application software only. Sometimes the term includes data that has not traditionally been associated with computers, such as film, tapes, and records.[2]
Examples of computer software include: * Application software includes end-user applications of computers such as word processors or video games, and ERP software for groups of users. * Middleware controls and co-ordinates distributed systems. * Programming languages define the syntax and semantics of computer programs. For example, many mature banking applications were written in the COBOL language, originally invented in 1959. Newer applications are often written in more modern programming languages. * System software includes operating systems, which

Similar Documents

Premium Essay

Case Study: Bluember's Computers And Software

...BluEmber’s Computers and Software BluEmber’s Computers and Software (BCS) a fictitious technology company was engendered by Sarah Hurston April 8, 2015. Hurston used her skills to engender top of the line computers and with the assistance from her partner, Josh Smith engendered top of the line software and programs which were brand labeled. The mission and vision of the company were engendering consistent advanced computers and software to meet the ordinant dictations of their consumers. BCS’s mission verbal expression, “Providing our People with technologies of tomorrow.” The Internal partners of the company include CEO Hurston, Vice President Smith, and six members of the board. The company employees 430 workers, a marketing team of three,...

Words: 1144 - Pages: 5

Premium Essay

Computer Hardware and Software

...Identify hardware and software needed to secure your choice of networks against all electronic threats. Networking hardware is hardware that is used to help work stations connect to a server. Although there are many different kinds of hardware like bridges, network cards the networking hardware that I have chosen to use in within my company’s network are routers, firewalls and switches. Using both routers and firewalls will help protect not only wireless networks but also those networks that use Ethernet cabling. I chose this hardware because I felt that it’s the best hardware to use when keeping my company’s network safe. The software that I have chosen to use is McAfee Anti-virus security software. This software along with the firewall will keep my company’s network safe and secure. Routers along with firewalls are the top network security hardware needed when it comes to keeping a network almost if not all totally secure. The firewall blocks out any unwanted activity as well block hackers from possibly hacking into our networks and stealing important information that pertains to our company and its customers. Along with the router and firewall networking software also plays a major part. The software is what the firewall uses to create its security barrier over the network. McAfee is one of the top manufacturers when it comes to network security. This software enables the use of not only the internet’s firewall but also the ability to detect viruses, anti-spyware upon...

Words: 1488 - Pages: 6

Premium Essay

Business Computing Computer Hardware and Computer Software

...z FETAC LEVEL 5 L22142 By Declan Brady Date: 05/02/2013 Tutor: Val Coakley Table of Contents Introduction 3 Methodology 4 History of Computers 5 Computer Hardware and Computer Software 9 The Four Main Components of Computer Systems 10 Types of Computer Systems 12 Examples of Computer Input Devices 14 Examples of Computer Output Devices 15 Printers 17 Equipment of the Modern Office 19 Storage Devices 21 Computer Networks – LAN and WAN 22 Systems Software and Application Software……………………………………………24 Conclusion 24 Bibliography 25 Introduction This project is been carried out for the Business Computing module for the Computer and Network Technician FETAC Level 5 Certificate course. In completing this project I hope to acquire a greater understanding of computers and the technology that is commonly used with them in the modern workplace. The carrying out of this project itself will also hopefully leave me better equipped with the skills to carry out projects in the workplace if I am required to do so in the future. For this project I will use the internet to research for the information that this report requires. Once I feel confident I have enough sources for the topics that need to be covered I will start choosing relevant information from these websites and use them in my report where needed. If needed the information taken from websites will be rephrased so that the content is fully relevant to the project. For this report...

Words: 4963 - Pages: 20

Free Essay

Software Engineering for Computer Games

...LITERATURE REVIEW ON SOFTWARE ENGINEERING FOR COMPUTER GAMES Name: Course: Date Page 1 Abstract Games have often been very common in the past period of time, but with the discovery of computer games, they have penetrated. In spite of the third vista to computer games which is verifiable, it pertains to investigating what characteristics those who play such games anticipate from the gaming using the computer. Permit us state the meaning of a computer game as a play which is undertaken with an aid of a computer program. This meaning still leaves behind some flexibility because it does not imply that the whole game happens in the computer. For instance, Chess may be played on the computer screen and on a true-globe board, heedless to whether the one who objects to the play is a computer application. Huizinga in his classic work defined play as ``an activity which proceeds within certain limits of time and space, in a visible order, according to rules freely accepted, and outside the sphere of necessity or material utility. The play mood is one of rapture and enthusiasm, and is sacred or festive in accordance with the occasion. A feeling of exaltation and tension accompanies the action, mirth and relaxation follow``. A lexicon likewise states the meaning of game as `‘a universal form of recreation generally including any activity engaged in for diversion or amusement and often establishing a situation that involves a contest or rivalry’`. Besides, Elliot...

Words: 8674 - Pages: 35

Free Essay

Copyright Protection for Computer Software

...been the primary means for protecting utilitarian works. Computer software as a relatively new recipient of copyright protection, however, defies easy categorisation within the traditional framework of the intellectual property system. 1 With respect to computer software, courts have had to grapple with the vexatious issue of drawing a precise line between copyrightable expression of computer software and the uncopyrightable processes that they implement. The present paper seeks to study some of these themes and the principles enunciated in judicial decisions in clarifying the issue. Computer software as literary work It is a well-established proposition that computer programs2 are copyrightable subject-matter, just like any other literary work.3 Loading a program into computer memory, saving the program or running it without authority may infringe copyright. Making an arrangement or altered version of the program or converting it into or out of one computer language or code into a different computer language or code is also an infringement. It is a well-established proposition that computer programs are copyrightable subject-matter, just like any other literary work. Loading a program into computer memory, saving the program or running it without authority may infringe copyright. Making an arrangement or altered version of the program or converting it into or out of one computer language or code into a different computer language or code is also an infringement. Article 10...

Words: 4305 - Pages: 18

Premium Essay

Study Pn Evolution of Computer Software

...EVOLUTION OF COMPUTERS STUDY ON EVOLUTION OF SOFTWARE Introduction Computer software, or just software, is any set of machine-readable instructions that directs a computer's processor to perform specific operations. The term is used to contrast with computer hardware; the physical objects carry out the instructions. Hardware and software require each other and neither has any value without the other. The first theory about software was proposed by Alan Turing in his 1935 essay Computable numbers with an application to the Entscheidungsproblem (decision problem). Colloquially, the term is often used to mean application software. In computer science and software engineering, software is all information processed by computer system, programs and data. The academic fields studying software are computer science and software engineering. The types of software include web pages developed in languages and frameworks like PHP, Perl, JSP or ASP.NET and desktop applications like OpenOffice.org, Microsoft Word developed in languages like C, C++, Objective-C, Java, C#, or Smalltalk. Application software usually runs on underlying software operating systems such as Linux or Microsoft Windows. Software (or firmware) is also used in video games and for the configurable parts of the logic systems of automobiles, televisions, and other consumer electronics. Software evolution is the term used in software engineering (specifically software maintenance)...

Words: 1086 - Pages: 5

Premium Essay

Computer-Aided Software Development Process Design

...field of IT, more precisely Computer Software Development which is the process of writing and coding a software or application for a business or corporation. I chose to do some research on new topics and methods introduced to successfully finish a software project. Here is the outcome of my research on the “Computer-Aided Software Development Process Design”. To begin, the software development process faces many problems such as; the project manager providing insufficient time and resources, changes in the customers’ requirements for the software, and lower than expected productivity by the project staff. The objective is to develop a computerized intelligent tool that project managers can use in effective planning and management of the development process. This tool will provide day-to-day updates on the actual data generated for the project. Dr. Yau and Dr.Tsai presented this as an approach to facilitate the validity and integrity checking of the interconnection among software components during software development or modification. Afterwards, Dr. Matsumura proposed the CASDS, or computer-aided software design system, which uses three structural modeling methods to determine a software design from software requirements. Another system was introduced later in the article by Horowitz and Williamson, named SODOS, which supports the manipulation of documents used in developing software. This system permits traceability through all phases of the software life. I found this article...

Words: 326 - Pages: 2

Premium Essay

Computer Hardware and Software

...thankful that you have given us the opportunity to prepare this report under your supervision and hope that this report will meet the standards of your verdict. Sincerely yours, (Syed Shohan Shah) On the behalf of the group EXECUTIVE SUMMARY In this modern age computer is a very essential in our everyday life. It helps our every work. Without computer we can not live without a single day. It has many parts like hardware which are touchable and software which are untouchable. Computer users may use a scoring system of evaluation when there are several competing proposals for a hardware or software acquisition. They give each evaluation factor a certain number of maximum possible points. Then they assign each competing proposal points for each factor, depending on how well it meets the specifications of the computer user. Scoring each evaluation factor for several proposals helps organize and document the evaluation process. It also spotlights the strengths and weaknesses of each proposal. Computer Hardware 1.0 Monitor Multiple technologies have been used for computer monitors. Until the 21st century most used cathode ray tubes but they have largely...

Words: 5715 - Pages: 23

Premium Essay

D1 – Explain How Software Utilities Can Improve the Performance of Computer Systems.

...D1 – Explain how software utilities can improve the performance of computer systems. Software utility | How can it improve computer performance? | Improvements that can be made to the utility | Anti-virus | When viruses enter a computer the performance will significantly decrease because the viruses take over all the system files and change their information. Antiviruses help improve the performance because they stop the viruses from coming in the computer before they make the computer slow as antiviruses scan in real time and whenever a file is downloaded it is always scanned. | Anti-viruses should be constantly searching for new viruses being made and should have constant updates where it will always remove the viruses and stop them from entering your computer. Instead of having scheduled updates they should be constant so new viruses can be detected. There should also be constant virus scans which do not slow the PC down. | Firewalls | Firewalls help improve computer performance because it stops connections from outside of the local area network coming in through ports and controlling the PC or taking files with important credentials stored on it. It is basically a barrier to keep unauthorised elements out of a network or a computer. They are filters for your traffic incoming to your computer so it can block incoming packets that are unsafe. | Firewalls can only protect what they can. It is impossible to stop every single virus that a software might have coming into the...

Words: 835 - Pages: 4

Premium Essay

Importance of Securing Data and Software More Than Computer Hardware in an Organization

...IMPORTANCE OF SECURING DATA AND SOFTWARE MORE THAN COMPUTER HARDWARE IN AN ORGANIZATION BY DHUMISAN CHISI SUBMITTED TO MR MWEKHELA IN PARTIAL FULFILLMENT FOR THE COURSE FUNDAMENTALS OF INFORMATION SYSTEMS COURSE CODE CCC1073 THE MALAWI ASSEMBLIES OF GOD UNIVERSITY 23TH MARCH 2015 Information systems have long been at some risk from malicious actions or unplanned user errors and from natural and man-made disasters. In recent years, systems have become more at risk to these threats because computers have become more organized and, thus, more interdependent and accessible to a larger number of individuals. In addition, the number of individuals with computer skills is increasing, and intrusion, or “hacking,” techniques are becoming more widely known via the Internet and other media. In large organizations computers are kept in large scales and also store a lot of important data and information plus maybe softwares of the at most important. These softwares and information require to be kept safe and protected. It is the sole purpose of this paper to explain the reasons why it is important to secure the organizations data/information and computer softwares of an organization. Some of the information used in business organization requires special protection for confidentiality (to ensure that only those who need access to that information to do their jobs actually have access to it). Some of the information used in business organizations need protection...

Words: 782 - Pages: 4

Free Essay

Computer Ethics

...Computer Ethics Jason Hall CIS 324 Professor Pride December 4, 2010 Abstract As advancements in technology become more widespread, so do the ethical issues that come with these advancements. Computer ethics boils down to a “what is right and what is wrong” mentality. While one person’s view on computer ethics may differ from another person’s view, one basic idea should always be kept in mind when making ethical decisions, “Do unto others as you would have done to you.” If everyone obeyed this “golden rule” we would not have nearly as many issues with computer ethics. To better understand some of the computer ethics issues surrounding us today, I will explore the ethical issues dealing with software and social networking sites that have plagued the cyber world in recent years. Software Issues Ethical use of software is overlooked by many. Purchasing software does not mean that one owns the software and can use it anyway they want. You do not own the software. The only thing purchased in this case is a license to use the software. Upon using the purchased software, the purchaser accepts the terms and conditions that apply. By accepting the terms of the copyrighted material, one is agreeing not to use the software for anything other then the intended use and not to make and distribute copies to others who have not paid for the license. The only exception for making copies of software is for backup purposes. This type of exception is...

Words: 1697 - Pages: 7

Premium Essay

Ethical Problems

...Issue The computer is a great invention that is used in every field including corporate offices and private homes. Computers have made our day to day tasks easier to do and made a great impact in our society that is still evolving and changing each day. Workers are able to do their jobs more efficiently and allow interconnectivity between computer users all around the world through the Internet. Computers has made it very easy for people to copy and steal intellectual property like music, movies and computer software programs like Photoshop and Microsoft office. The scenario I will present below shows the effects of software piracy and explain why it is unethical to download and use anything you do not have the rights to especially if it was obtained by breaking the law. Software Piracy Scenario Emanuel is a freshman college student at the University of Maryland. He lives on campus and lives on a fixed income. One of his classes requires a lot research and time to complete his assignments. Emanuel has his own laptop and is able to do the research on his computer but unfortunately he does not have Microsoft Office Suite installed on his laptop so he can use Microsoft Word to type up his documents. Instead, he has to go to the college campus library and use their computers that do have Microsoft Word installed because the price of Microsoft Office is too expensive to purchase for Emanuel. Unfortunately, the college library has a limited amount of computers and sometimes...

Words: 1381 - Pages: 6

Premium Essay

Installing Microsoft Office Site

...My experience installing the Microsoft software was a little challenging, when I first purchased my new computer. I purchased all of the newest versions of Windows 8. According to Strayer University requirements I needed Windows 7 or better but with the new computers I was not able to purchase the older version because my computer would have to be downgraded in order to do so. Using the disc provided I downloaded the applications and installed to my computer. Once downloaded I moved the components to my desktop. Each component was launched and an icon appeared for each component onto my desktop. The components which were installed are as follows: Access 2013, Power Point 2013, Excel 2013, Publisher 2013, One Note 2013, Outlook 2013 and Word 2013. In addition, I did not have any issues installing the software, however my concern was the amount of storage I have on my new computer. I predict the least difficult Microsoft Office component that I feel will be the least difficult to learn would be Word 2013, because I have been using it for a few months and I also use it daily for work. Using it daily for work allows me to learn more about what the new program can do. Although it does more than 2010 it keeps me up to date with the newest version. I predict the most difficult Microsoft Office component will be Power Point 2013 and Excel 2013, because I have not worked with the software at all and I am eager to learn the Power Point and Excel. I feel it will be a little difficult...

Words: 537 - Pages: 3

Premium Essay

Pc for Poor

...Providing PC’s for the poor Our Mission Statement is to provide computers with upgraded software and hardware for the poor who cannot afford computers at home. They can use the computers for anything ranging from help for schoolwork to entertainment to creative purposes. The computers can not only add stimulation to their developing brains but can also create some fun for them. The computers could seriously help the kids with their homework and for upcoming tests. They can search up things on Google, write essays for their classes, and create study guides using various software programs. Also many times when kids are given major projects or assignments from school it usually requires some kind of work to be done on the computer whether it be a essay using Microsoft Word or it be using PowerPoint to create some slides to present in class. The computers can also provide entertainment for kids who are in serious need of a break from school. They can use the computer to play games, watch movies. And even use social sites like Facebook, twitter, and even e-mail. Many times the kids are overworked from so much school and need a serious break from the school life. The computers would also be perfect for that. This is our mission statement. Getting more into the software to help kids out with school; one of them would be Microsoft Word. Microsoft Word can be used to type up essays for school projects or assignments that were assigned in school. Microsoft PowerPoint can be used to...

Words: 572 - Pages: 3

Premium Essay

The Traditional Elements of the Marketing Mix Have Become Irrelevant in the Modern World

... This will be very beneficial for the students living expenses. However, there is a continuous inflow of students. The new student would not have accommodation available. There will be a shortage of apartments and the demand would be higher and eventually there will be very less apartments available for any new student. ------------------------------------------------- Hence we can conclude that some students will benefit from the regulation of rent and some students will not benefit and might end up without an accommodation. Question 2: Suppose you are the manager of a chain of computer stores. For obvious reasons you have been closely following developments in the computer industry, you have just learned that the government has passed a two-prong program designed to further enhance the computer industry position in the global economy. The legislation provides increased funding for computer education in primary and secondary schools, as well as tax breaks for firms...

Words: 984 - Pages: 4