SlideShare une entreprise Scribd logo
1  sur  9
Software
And
Hardware
Arranged by :
Singgih Diyah Harsanti
Siska Pratami Putri
Nur Anggraeni Putri Kusuma
Adi Irfani Amrullah
Definition of Software
• Software means computer instructions or data.
Anything that can be stored electronically is
software.
• Computer hardware refers to the physical parts
of a computer and related devices.
Definision of Hardware
• hardware is a component of computer that
serves to support the computer systems.
Categories of software
• System software
Systems software includes the operating system and all
the utilities that enable the computer to function
• Application software
Applications software includes programs that do real
work for users. For example, word
processors, and database management systems fall
under the category of applications software.
Categories of Hardware
• Internal hardware
The internal hardware parts of a computer are
often referred to as components such as
motherboards, hard drives, and RAM.
• External hardware
external hardware devices are usually
called peripherals such as monitors, keyboards,
mice, printers, and scanners.
The Function of Software
• Identifying program
• Setting up the application program so that all
work equipment system is well controlled
• organize and make the work more efficient
• As the interaction between the hardware and the
user
The Function of Hardware
• Input divice
• Process device
• Output device
• Backing Storage
• Periferal
Thank you

Contenu connexe

Tendances

Presentation K3 ( PPT Kesehatan Keselamatan Kerja )
Presentation K3 ( PPT Kesehatan Keselamatan Kerja )Presentation K3 ( PPT Kesehatan Keselamatan Kerja )
Presentation K3 ( PPT Kesehatan Keselamatan Kerja )Dzul Fiqri
 
Perangkat keras komputer (input-output-proses)
Perangkat keras komputer (input-output-proses)Perangkat keras komputer (input-output-proses)
Perangkat keras komputer (input-output-proses)rn firmansyah
 
Tulang ekstremitas atas
Tulang ekstremitas atasTulang ekstremitas atas
Tulang ekstremitas atasDanang Danang
 
Ergonomi Perkantoran - Office Ergonomic
Ergonomi Perkantoran - Office ErgonomicErgonomi Perkantoran - Office Ergonomic
Ergonomi Perkantoran - Office ErgonomicLelitasari Danukusumo
 
MATERI K3 & KEBAKARAN.ppt
MATERI K3 & KEBAKARAN.pptMATERI K3 & KEBAKARAN.ppt
MATERI K3 & KEBAKARAN.pptNurElyani2
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptmenghilang
 
K3 (Keselamatan dan Kesehatan Kerja)
K3 (Keselamatan dan Kesehatan Kerja)K3 (Keselamatan dan Kesehatan Kerja)
K3 (Keselamatan dan Kesehatan Kerja)Herry Prakoso
 
Ppt proses penggolahan teh firman ahyuda
Ppt proses penggolahan teh  firman ahyudaPpt proses penggolahan teh  firman ahyuda
Ppt proses penggolahan teh firman ahyudafirmanahyuda
 
Spesifikasi hardware
Spesifikasi hardwareSpesifikasi hardware
Spesifikasi hardwareCici Srianita
 
Laporan praktikum kerusakan b. pangan bu arin
Laporan praktikum kerusakan b. pangan bu arinLaporan praktikum kerusakan b. pangan bu arin
Laporan praktikum kerusakan b. pangan bu arinramdhanisari
 
Slide tentang Kecerdasan Buatan
Slide tentang Kecerdasan BuatanSlide tentang Kecerdasan Buatan
Slide tentang Kecerdasan Buatanyogiteddywardhana
 

Tendances (20)

Presentation K3 ( PPT Kesehatan Keselamatan Kerja )
Presentation K3 ( PPT Kesehatan Keselamatan Kerja )Presentation K3 ( PPT Kesehatan Keselamatan Kerja )
Presentation K3 ( PPT Kesehatan Keselamatan Kerja )
 
Ergonomi kesehatan
Ergonomi kesehatanErgonomi kesehatan
Ergonomi kesehatan
 
Perangkat keras komputer (input-output-proses)
Perangkat keras komputer (input-output-proses)Perangkat keras komputer (input-output-proses)
Perangkat keras komputer (input-output-proses)
 
Sistem digital 1
Sistem digital   1Sistem digital   1
Sistem digital 1
 
Tulang ekstremitas atas
Tulang ekstremitas atasTulang ekstremitas atas
Tulang ekstremitas atas
 
Ergonomi Perkantoran - Office Ergonomic
Ergonomi Perkantoran - Office ErgonomicErgonomi Perkantoran - Office Ergonomic
Ergonomi Perkantoran - Office Ergonomic
 
Toksikologi Industri
Toksikologi IndustriToksikologi Industri
Toksikologi Industri
 
Pengasaman
PengasamanPengasaman
Pengasaman
 
Hardware. ppt
Hardware. pptHardware. ppt
Hardware. ppt
 
MATERI K3 & KEBAKARAN.ppt
MATERI K3 & KEBAKARAN.pptMATERI K3 & KEBAKARAN.ppt
MATERI K3 & KEBAKARAN.ppt
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
K3 (Keselamatan dan Kesehatan Kerja)
K3 (Keselamatan dan Kesehatan Kerja)K3 (Keselamatan dan Kesehatan Kerja)
K3 (Keselamatan dan Kesehatan Kerja)
 
K3 - TOKSIKOLOGI
K3 - TOKSIKOLOGIK3 - TOKSIKOLOGI
K3 - TOKSIKOLOGI
 
Ppt proses penggolahan teh firman ahyuda
Ppt proses penggolahan teh  firman ahyudaPpt proses penggolahan teh  firman ahyuda
Ppt proses penggolahan teh firman ahyuda
 
Spesifikasi hardware
Spesifikasi hardwareSpesifikasi hardware
Spesifikasi hardware
 
Ppt. panca indra
Ppt. panca indraPpt. panca indra
Ppt. panca indra
 
Laporan praktikum kerusakan b. pangan bu arin
Laporan praktikum kerusakan b. pangan bu arinLaporan praktikum kerusakan b. pangan bu arin
Laporan praktikum kerusakan b. pangan bu arin
 
8 rempah-rempah dan bahan obat
8 rempah-rempah dan bahan obat8 rempah-rempah dan bahan obat
8 rempah-rempah dan bahan obat
 
Slide tentang Kecerdasan Buatan
Slide tentang Kecerdasan BuatanSlide tentang Kecerdasan Buatan
Slide tentang Kecerdasan Buatan
 
Sistem Operasi Komputer
Sistem Operasi KomputerSistem Operasi Komputer
Sistem Operasi Komputer
 

Similaire à Software and Hardware Functions

Concept of Hardware & Software.ppt
Concept of Hardware & Software.pptConcept of Hardware & Software.ppt
Concept of Hardware & Software.pptDibyenduBiswas31
 
COMPUTER BASICS
COMPUTER BASICSCOMPUTER BASICS
COMPUTER BASICSPramilaJH
 
UNIT I-Computer Operation-Fundamentals.ppt
UNIT I-Computer Operation-Fundamentals.pptUNIT I-Computer Operation-Fundamentals.ppt
UNIT I-Computer Operation-Fundamentals.pptJohnReyBoaquia2
 
Components of computer and software: Introduction
Components of computer and software: IntroductionComponents of computer and software: Introduction
Components of computer and software: IntroductionShivaraj Bhardwaj
 
Hardware and Software.pptx
Hardware and Software.pptxHardware and Software.pptx
Hardware and Software.pptxAhsanAliBaig
 
An overview of the computer system
An overview of the computer systemAn overview of the computer system
An overview of the computer systemMaryam Fida
 
Computer hardware presentation
Computer hardware presentationComputer hardware presentation
Computer hardware presentationZach Dodson
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Sehrish Rafiq
 
Difference between Hardware, Software, Firmware, Middleware
Difference between Hardware, Software, Firmware, MiddlewareDifference between Hardware, Software, Firmware, Middleware
Difference between Hardware, Software, Firmware, MiddlewareTinzo02
 
Software and hardware PPT1.pptx
Software and hardware PPT1.pptxSoftware and hardware PPT1.pptx
Software and hardware PPT1.pptxdevnamu
 
Software presentation
Software presentationSoftware presentation
Software presentationAfreenJunejo
 
computer networking
computer networking computer networking
computer networking Dhivya Kannan
 
Tpes of Softwares
Tpes of SoftwaresTpes of Softwares
Tpes of SoftwaresRespa Peter
 
Softwares and Operating System.pptx
Softwares and Operating System.pptxSoftwares and Operating System.pptx
Softwares and Operating System.pptxUsmanAhmed838004
 

Similaire à Software and Hardware Functions (20)

what is computer
what is computerwhat is computer
what is computer
 
Concept of Hardware & Software.ppt
Concept of Hardware & Software.pptConcept of Hardware & Software.ppt
Concept of Hardware & Software.ppt
 
COMPUTER BASICS
COMPUTER BASICSCOMPUTER BASICS
COMPUTER BASICS
 
COMPUTER PROGRAM.pptx
COMPUTER PROGRAM.pptxCOMPUTER PROGRAM.pptx
COMPUTER PROGRAM.pptx
 
UNIT I-Computer Operation-Fundamentals.ppt
UNIT I-Computer Operation-Fundamentals.pptUNIT I-Computer Operation-Fundamentals.ppt
UNIT I-Computer Operation-Fundamentals.ppt
 
Hardware and software
Hardware and softwareHardware and software
Hardware and software
 
Systems Technologies.pptx
Systems Technologies.pptxSystems Technologies.pptx
Systems Technologies.pptx
 
Components of computer and software: Introduction
Components of computer and software: IntroductionComponents of computer and software: Introduction
Components of computer and software: Introduction
 
Hardware and Software.pptx
Hardware and Software.pptxHardware and Software.pptx
Hardware and Software.pptx
 
An overview of the computer system
An overview of the computer systemAn overview of the computer system
An overview of the computer system
 
Computer hardware presentation
Computer hardware presentationComputer hardware presentation
Computer hardware presentation
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11
 
Difference between Hardware, Software, Firmware, Middleware
Difference between Hardware, Software, Firmware, MiddlewareDifference between Hardware, Software, Firmware, Middleware
Difference between Hardware, Software, Firmware, Middleware
 
Software and hardware PPT1.pptx
Software and hardware PPT1.pptxSoftware and hardware PPT1.pptx
Software and hardware PPT1.pptx
 
Note 3
Note 3Note 3
Note 3
 
Software presentation
Software presentationSoftware presentation
Software presentation
 
computer networking
computer networking computer networking
computer networking
 
Tpes of Softwares
Tpes of SoftwaresTpes of Softwares
Tpes of Softwares
 
Softwares and Operating System.pptx
Softwares and Operating System.pptxSoftwares and Operating System.pptx
Softwares and Operating System.pptx
 
Software
SoftwareSoftware
Software
 

Dernier

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Dernier (20)

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Software and Hardware Functions

  • 2. Arranged by : Singgih Diyah Harsanti Siska Pratami Putri Nur Anggraeni Putri Kusuma Adi Irfani Amrullah
  • 3. Definition of Software • Software means computer instructions or data. Anything that can be stored electronically is software. • Computer hardware refers to the physical parts of a computer and related devices.
  • 4. Definision of Hardware • hardware is a component of computer that serves to support the computer systems.
  • 5. Categories of software • System software Systems software includes the operating system and all the utilities that enable the computer to function • Application software Applications software includes programs that do real work for users. For example, word processors, and database management systems fall under the category of applications software.
  • 6. Categories of Hardware • Internal hardware The internal hardware parts of a computer are often referred to as components such as motherboards, hard drives, and RAM. • External hardware external hardware devices are usually called peripherals such as monitors, keyboards, mice, printers, and scanners.
  • 7. The Function of Software • Identifying program • Setting up the application program so that all work equipment system is well controlled • organize and make the work more efficient • As the interaction between the hardware and the user
  • 8. The Function of Hardware • Input divice • Process device • Output device • Backing Storage • Periferal