SlideShare une entreprise Scribd logo
1  sur  69
Télécharger pour lire hors ligne
Thiti Theerathean
Center for Teaching Excellence
University of the Thai Chamber of Commerce
E-mail : thiti_the@utcc.ac.th
2
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
•
•
•
3
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
The System Software consists of the programs that control or maintain the
operations of the computer and its devices. It serves as the interface between
user, the application software and the computer’s device.
There are two types of system software :
 Operating system.
 Utilities programs.
4
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
Operating system
An operating system (OS) is a set of programs containing instructions that work
together to coordinate all the activities among computer hardware resources
Start the computer Provide a user interface Manage programs
Manage memory
Schedule jobs and
Configure devices
Establish an internet
connectionMonitoring
Performance
File management
Control a network
Administer security
5
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
The process of starting or restarting a computer is called boot
Cold boot
• Turning on
a computer
that has
been
powered off
completely
Warm boot
• Using the
operating
system to
restart a
computer
6
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
Power ON
7
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
A User Interface controls How you enter data and instructions and How
information is displayed on the screen.
Two types of user interfaces are
With a graphical user interface (GUI),
you interact with menus and visual
images
With a command-line interface, a user
uses the keyboard to enter data and
instructions
8
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
Single user
and
Multiuser
Single tasking
and
multitasking
Foreground
and
background
How an operating system handles programs directly affects your
productivity
A computer with separate processors also can serve as a
Fault-tolerant computer.
9
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
The memory management is to optimizes the use of RAM.
 allocates or assigns data and instructions to area of memory.
 while they are being processed.
 monitor contents of memory.
 clears items from memory when processor no longer
requires them.
10
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
What is Virtual memory ?
The Virtual memory (VM) is a concept in which the OS allocates a
portion of a storage medium.
 Uses an area of the hard disk for virtual memory, called
swap file.
 Swaps data and information between memory and storage.
 Swapping Technique is called Paging
11
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
A job is ….  Receiving data from input device.
 Sending information to output device.
 Processing instructions.
 Transferring items between storage and
memory.
The Operation System determines the order in which
jobs are processed.
12
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
Sometimes, a device already may be busy processing one job when
it receives a second job. While waiting for devices to become idle,
the OS places items in Buffer.
13
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
A driver is a small program that tells the
operating system how to communicate
with a specific device
Plug and Play automatically configures
new devices as you install them
Today, many devices and operating system
support Plug and Play.
If you attach a new device to a computer. Its driver must be installed
before you can use the device.
14
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
The OS provide a Connect to a
network wizard that guides users
through the process of setting up
a connection between a computer
and ISP .
15
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
A Performance monitor is a program that assesses and reports
information about various computer resources and devices.
16
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
 Searching for files
 Viewing images
 Sorting
 Formatting
 Copying
 Renaming
 Deleting
 Moving files
17
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
 Some operating systems are designed to work with a server
on a network
 A server operating system organizes and coordinates how
multiple users access and share resources on a network
 Server is computer that controls
access to network and provides
centralized storage area.
 Other computers on network are
called Clients.
18
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
Each user has a user account
 A user name, or user ID, identifies a
specific user
 A password is a private combination
of characters associated with the
user name
The network administrator use network OS to establish permissions to
resource. These permissions define who can access certain resources and
when they can access those resources.
19
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
Types of Operating Systems
A stand-alone operating system is a
complete operating system that works
on a desktop computer, notebook or
mobile computing device
A network operating system typically
resides on the server and is designed
specifically to support all sizes of
networks
An embedded operating system resides
on a ROM chip on a mobile device or
consumer electronic device
20
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
A Utility program, also called a Utility, is a type of system
software that allows a user to perform maintenance-type tasks.
 File manager
 Search Utility
 Image Viewer
 Uninstaller
 Disk Cleanup
 Disk Defragmenter
 Backup / Restore Utility
 Personal Firewall
Windows Utility
 Antivirus
 Spyware Remover
 Internet Filters
 File Compression
 Disc Burning
 System Tweak
Utility Programs
21
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
A file manager is a utility that performs functions
related to file management
 Displaying a list of files
 Organizing files in folders
 Copying, renaming, deleting, moving, and
sorting files and folders
 Creating shortcuts
A search utility is a program that attempts
to locate a file on your computer based on
criteria you specify
22
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
An image viewer allows users to display, copy,
and print the contents of a graphics file
An uninstaller removes a program, as well as
any associated entries in the system files
23
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
A disk cleanup utility searches for and removes
unnecessary files
 Downloaded program files
 Temporary Internet files
 Deleted files
 Unused program files
A disk defragmenter reorganizes the files
and unused space on a computer’s hard disk
so that the operating system accesses data
more quickly and programs run faster
24
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
 A backup utility allows users to copy files
to another storage medium
 A restore utility reverses the process and
returns backed up files to their original form
A personal firewall detects and protects
a personal computer from unauthorized
intrusions
25
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
 Antivirus
 Spyware Remover
 Internet Filters
A virus describes a potentially damaging computer
program that affects a computer negatively
A worm copies
itself
repeatedly in
memory or
over a network
A Trojan horse
hides within or
looks like a
legitimate
program
An antivirus
program
protects a
computer
against viruses
26
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
 Antivirus
 Spyware Remover
 Internet Filters
27
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
 Antivirus
 Spyware Remover
 Internet Filters
 An unusual message or image is displayed on the screen.
 An unusual sound or music plays randomly
 The available memory is less than what should be available.
 A program or file suddenly is missing.
 An unknown program or file mysteriously appears.
 The size of a file changes without explanation.
 A file becomes corrupted.
 A program or file dose not work properly.
 System properties change.
 The operating system runs much slower than usual.
28
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
 Antivirus
 Spyware Remover
 Internet Filters
Spyware is a program placed on
a computer without the user’s
knowledge that secretly collects
information about the user
• A spyware remover detects
and deletes spyware and other
similar programs
Adware displays an online
advertisement in a banner or
pop-up window
• An adware remover is a
program that detects and
deletes adware
29
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
 Antivirus
 Spyware Remover
 Internet Filters
 Filters are programs that remove or block certain items from
being displayed
Web filters
Anti-spam
programs
Phishing
filters
Pop-up
blockers
30
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
A file compression utility shrinks the size of a file(s)
 Compressing files frees up room on the storage media
 Two types of compression :
Lossy
Lossless
When Lossy data compression is applied to a file,
the quality of the file will decrease slightly each
time you compress the file.
You will be unable to restore the file to its exact
original state.
Lossless data compression is used when you must
compress a file, but also must be able to return
that file to its exact original state
31
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
Disc burning software writes text, graphics,
audio, and video files on a recordable or
rewritable optical disc
A computer maintenance utility
identifies and fixes operating system
problems, detects and repairs disk
problems, and includes the capability of
improving a computer’s performance
32
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
An Application Software consists of programs designed to make users more
productive and assist them with personal tasks. It has a variety of uses :
 To make business activities more efficient.
 To assist with graphics and multimedia projects.
 To support home, personal, and educational tasks.
To facilitate communications.
33
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
34
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
 Packaged software, mass-produced
 Custom software, performs functions specific to a business or
industry
 Web-based software, hosted by a Web site
 Open source software, provided for use, modification, and
redistribution
 Shareware, copyrighted software that is distributed free for trial
period
 Freeware, copyrighted software provided at no cost
 Public-domain software, freeware with no copyright restrictions
Available in a variety of forms:
35
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
Business Software
A Business Software is application software that assists people in becoming
more effective and efficient while performing their daily business activities.
36
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
37
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
Multimedia Software
Power users often use sophisticated software that allows them
to work with graphics and multimedia.
38
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
39
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
Home and Personal Software
The application software is designed specifically for home, personal and
education use. Most of programs in this category are relatively inexpensive.
 Software Suite for personal use
 Personal Finance software
 Image Editing software
 Clip art / Image Gallery
 Video and Audio Editing software
 Travel and Mapping software
 Educational and Reference software
40
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
Communication Software
Web Browser E-Mail Instant Messaging Chat Room
Text, Picture, Video
Messaging
RSS Aggregator Blogging
Newsgroup/Message
Board
FTP Video Conferencing
41
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
Web Applications
A Web application is a Web site that
allows users to access and interact
with software from any computer or
device that is connected to the
Internet
42
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
Learning Tools for Application Software
 Web-based training is a type of CBT
that uses Internet technology and
consists of application software on
the Web
 Distance learning (DL) is the delivery
of education at one location while
the learning takes place at other
locations
43
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .



44
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
A computer program is a series of instructions that
directs a computer to perform tasks.
 The source of a program may be
used to describe an algorithm to
a human reader.
 These modules are stored as a collection
of files.
 It is often written by computer
programmers.
 Source code is written in a
programming language.
45
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
 Executable file (.exe / .com) is a part of a program that
actually sends commands to the processor.
 Dynamic Link Library File (.dll) is a partial .exe file. It will
not run on its own, its commands are accessed by another
running program.
 Initialization File (.ini) contains information that programs
can use as they run.
 Help file (.hlp / .chm) contains an indexed and cross-linked
format of help information.
The common extensions for program files
46
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
Source code or Source program
 Code refers to statements that are written in any programming language.
 Programming language enable the programmer to describe a program
using a variation of basic English. The results are saved in a file and called
Source Code.
 Source codes are compiled or interpreted to Machine language or
Machine code.
Source Code Translator
1 1 0 1 0 0 1
1 0 1 0 0 0 1 1 0 1 0
0 1 0 0 0 1 1 1 0 1 0 1 1
0 0 0 1 1 0 1 1 1 1 0 1 1 1 0
1 0 0 1 0 0 1 0 0 1 0 1 0 0
1 1 1 0 0 1 1 1 0 0 0 1 1 0
0 1 1 0 1 1 0 1 1 0 0 1 1
0 1 1 0 1 0 0 1 1 1 0
0 0 1 1 0 1
Machine Code
47
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
Programming Languages : Low-Level Languages

– The first generation of programming languages.
– The only language the computer directly recognize.
– Instructions use a series of binary digits.
– Coding is tedious and time-consuming.

– The second generation of programming languages.
– Use Symbolic instruction code.
– Source code is converted to machine code by Assembler.
– Used to control hardware.
48
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
Programming Languages : Procedural Languages
 The third-generation language (3G) that uses a series of English-like words and
arithmetic symbols to write instruction.
 The programmer writes instructions that tell the computer what to accomplish
and how to do.
 Short for COmmon Business-Oriented Language
 designed for business application.
 Useful for processing transactions on mainframe.
 COBOL
 C language  Originally designed for writing system software.
 Used most often with the UNIX.
 BASIC  short for Beginner's All-purpose Symbolic Instruction Code
 easy-to-understand and used to help for teaching the
fundamentals of programming
49
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
Compiler  A Compiler converts the entire source program
into machine language.
 The output of the compiler is called object code.
 You can copy the object code onto any similar
platform and run the program.
 An Interpreter translates and executes each statement
of source code at the time.
 Programmer can correct any errors before it translates
the next line of code.
 It runs slower than compiled code.
Interpreter
Before executing the program, you must use either a compiler or an
interpreter to convert the source program into machine language.
50
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
Programming Languages : OOP Languages
 An Object-Oriented Programming (OOP) language allows programmers
the ability to reuse and modify existing objects.
 An Object is an item that can contain both data and the procedures that
read or manipulate that data.
 Each data element is called an Attribute or Property.
 The procedure in the object is called an Operation or Method.
Other advantages include:
Objects can be
reused
Programmers create
applications faster
Work well in a RAD
environment
Most program
development tools
are IDEs
51
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
 Java  Developed by Sun Microsystems.
 Object code is called Bytecode which is machine independence.
 Uses a Just-In-Time (JIT) compiler to convert bytecode into
machine dependence code.
 C++  An extension of the C programming language.
 Additional features for working with objects, classes, events
and other object-oriented concepts.
 C#  based on C++ and was developed by Microsoft.
 Like JAVA , it uses a JIT compiler but it resulting code is called
Microsoft Intermediate Language (MSIL)
52
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
Programming Languages : Markup Languages
Tags
 Designed for the definition and
presentation of text.
 Used to specify the formatting
are called tags.
53
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
 HTML  Short for Hyper Text Markup Language.
 Uses to format documents for display on the Web.
 User for display data.
 xHTML  Short for eXtensible HTML.
 Includes features of HTML and XML.
 Short for eXtensible Markup Language.
 Allows to create customized tags and use predefined tags to
display content appropriately on various devices
 Used for sharing data.
 XML
 WML  Short for Wireless Markup Language.
 subset of XML and is used to design pages for micro-browsers.
54
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
Programming Languages : Script Languages
 An interpreted language is used to develop a small program
that run inside of another program.
 "Scripts" are distinct from the core code of the application that
written in a different language.
 Designed for gluing software components together.
 Referred to as glue languages or system integration languages.
 Popular script languages include PHP , JavaScript , VBScript
55
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
Programming Development
The Program development consists of a series of steps programmers use to build
computer programs
Step 1 – Analyze Requirements
• To initiate program development, programmer:
– Reviews the requirements
– Meets with the systems analyst and users
– Identifies input, processing, and output
56
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
Step 2 – Design Solution (con.)
• In structured design, the programmer typically begins with a
general design and moves toward a more detailed design
• Programmers use a hierarchy chart to show program modules.
57
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
Step 2 – Design Solution (con.)
• A program flowchart graphically
shows the logic in a solution
algorithm 58
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
Step 2 – Design Solution (con.)
• The sequence control structure
shows one or more actions
following each other in order
59
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
• The selection control structure tells the program which action
to take, based on a certain condition
Step 2 – Design Solution (con.)
60
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
• The repetition control structure enables a program to perform one
or more actions repeatedly as long as a certain condition is met
Step 2 – Design Solution (con.)
61
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
• Flowcharting software makes it easy to modify and
update flowcharts
– SmartDraw
– Visio
Step 2 – Design Solution (con.)
62
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
• Pseudocode uses a
condensed form of
English to convey
program logic
Step 2 – Design Solution (con.)
63
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
Step 3 – Validate Design
• Check for logic errors using test data
Develop
various
sets of test
data
Determine
the
expected
result
Step
through
the
algorithm
Compare
the results
Repeat
steps for
each set of
test data
64
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
Step 4 – Implement Design
• Implementation of the design includes using a program
development tool that assists the programmer by:
• Generating or providing some or all code
• Writing the code that translates the design into a computer program
• Creating the user interface
• Extreme programming is a strategy where programmers
immediately begin coding and testing solutions as soon
as requirements are defined
65
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
Step 4 – Implement Design
• Program development tools
66
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
Step 5 – Test Solution
The goal of program testing is to ensure the
program runs correctly and is error free
• Errors include syntax errors and logic errors
• Debugging the program involves removing the bugs
• A beta is a program that has most or all of its features and
functionality implemented
67
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
Step 6 – Document Solution
• In documenting the solution, the programmer
performs two activities:
Review the
program code
Review all the
documentation
68
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
69
T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .

Contenu connexe

Tendances

Computing for Engineering - Lecture 02
Computing for Engineering - Lecture 02Computing for Engineering - Lecture 02
Computing for Engineering - Lecture 02Sarchia Khursheed
 
Recover Deleted Trash Files From Mac!
Recover Deleted Trash Files From Mac!Recover Deleted Trash Files From Mac!
Recover Deleted Trash Files From Mac!Recover Trash Mac
 
Software utilities p3 - unit 2
Software utilities   p3 - unit 2Software utilities   p3 - unit 2
Software utilities p3 - unit 2Jack Bishop
 
How to clean windows 8 or 8.1 hard drive
How to clean windows 8 or 8.1 hard driveHow to clean windows 8 or 8.1 hard drive
How to clean windows 8 or 8.1 hard drivescarlet christer
 
WEBQUEST ALSOANKA
WEBQUEST ALSOANKAWEBQUEST ALSOANKA
WEBQUEST ALSOANKAALSOANKA
 
Basic computer for small business
Basic computer for small businessBasic computer for small business
Basic computer for small businessAjo Alex
 
Cis presentation group 'g'
Cis presentation group 'g'Cis presentation group 'g'
Cis presentation group 'g'padamlimbu04
 
Pc maintenance
Pc maintenancePc maintenance
Pc maintenanceFitaAyalew
 
PC Maintenance Security and Troubleshooting
PC Maintenance Security and TroubleshootingPC Maintenance Security and Troubleshooting
PC Maintenance Security and TroubleshootingThe Toolbox, Inc.
 
Pc Preventative Maintenance Checklist
Pc Preventative Maintenance ChecklistPc Preventative Maintenance Checklist
Pc Preventative Maintenance ChecklistMiss Cheska
 

Tendances (19)

Computing for Engineering - Lecture 02
Computing for Engineering - Lecture 02Computing for Engineering - Lecture 02
Computing for Engineering - Lecture 02
 
Recover Deleted Trash Files From Mac!
Recover Deleted Trash Files From Mac!Recover Deleted Trash Files From Mac!
Recover Deleted Trash Files From Mac!
 
Diagnostic software tools
Diagnostic software toolsDiagnostic software tools
Diagnostic software tools
 
Scan disk
Scan diskScan disk
Scan disk
 
Software utilities p3 - unit 2
Software utilities   p3 - unit 2Software utilities   p3 - unit 2
Software utilities p3 - unit 2
 
How to clean windows 8 or 8.1 hard drive
How to clean windows 8 or 8.1 hard driveHow to clean windows 8 or 8.1 hard drive
How to clean windows 8 or 8.1 hard drive
 
WEBQUEST ALSOANKA
WEBQUEST ALSOANKAWEBQUEST ALSOANKA
WEBQUEST ALSOANKA
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
Basic computer for small business
Basic computer for small businessBasic computer for small business
Basic computer for small business
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
Cis presentation group 'g'
Cis presentation group 'g'Cis presentation group 'g'
Cis presentation group 'g'
 
Pc maintenance
Pc maintenancePc maintenance
Pc maintenance
 
PC Maintenance Security and Troubleshooting
PC Maintenance Security and TroubleshootingPC Maintenance Security and Troubleshooting
PC Maintenance Security and Troubleshooting
 
Pc Preventative Maintenance Checklist
Pc Preventative Maintenance ChecklistPc Preventative Maintenance Checklist
Pc Preventative Maintenance Checklist
 
p3 unit 2
p3 unit 2p3 unit 2
p3 unit 2
 
System unit
System unitSystem unit
System unit
 
Mcqs cs101
Mcqs cs101Mcqs cs101
Mcqs cs101
 
computer quiz
computer quizcomputer quiz
computer quiz
 
Introduction to Computers
Introduction to ComputersIntroduction to Computers
Introduction to Computers
 

En vedette

Презентация ПромРезерв 2016 (Москва)
Презентация ПромРезерв 2016 (Москва)Презентация ПромРезерв 2016 (Москва)
Презентация ПромРезерв 2016 (Москва)abzalova
 
проспект Hm 13 rus web
проспект Hm 13 rus webпроспект Hm 13 rus web
проспект Hm 13 rus webabzalova
 
First class teaching techniques
First class teaching techniquesFirst class teaching techniques
First class teaching techniquesThiti Theerathean
 
Презентация ПромРезерв (Москва)
Презентация ПромРезерв (Москва)Презентация ПромРезерв (Москва)
Презентация ПромРезерв (Москва)abzalova
 
презентация для партнеров
презентация для партнеровпрезентация для партнеров
презентация для партнеровabzalova
 

En vedette (13)

Презентация ПромРезерв 2016 (Москва)
Презентация ПромРезерв 2016 (Москва)Презентация ПромРезерв 2016 (Москва)
Презентация ПромРезерв 2016 (Москва)
 
проспект Hm 13 rus web
проспект Hm 13 rus webпроспект Hm 13 rus web
проспект Hm 13 rus web
 
GBI uniminuto
GBI uniminutoGBI uniminuto
GBI uniminuto
 
SC161-Lecture2
SC161-Lecture2SC161-Lecture2
SC161-Lecture2
 
Procediment eso febrer 2010
Procediment eso febrer 2010Procediment eso febrer 2010
Procediment eso febrer 2010
 
First class teaching techniques
First class teaching techniquesFirst class teaching techniques
First class teaching techniques
 
Презентация ПромРезерв (Москва)
Презентация ПромРезерв (Москва)Презентация ПромРезерв (Москва)
Презентация ПромРезерв (Москва)
 
La programació
La programacióLa programació
La programació
 
презентация для партнеров
презентация для партнеровпрезентация для партнеров
презентация для партнеров
 
SC161-Lecture4-1
SC161-Lecture4-1SC161-Lecture4-1
SC161-Lecture4-1
 
Org. btx def octubre 2011
Org. btx def octubre 2011Org. btx def octubre 2011
Org. btx def octubre 2011
 
SC161-Lecture4Part2
SC161-Lecture4Part2 SC161-Lecture4Part2
SC161-Lecture4Part2
 
SC161 Lecture 6
SC161 Lecture 6SC161 Lecture 6
SC161 Lecture 6
 

Similaire à SC161-Lecture3

Bussines management marketing.Software.pptx
Bussines management marketing.Software.pptxBussines management marketing.Software.pptx
Bussines management marketing.Software.pptxFlorinFlorin36
 
lesson_1_Introduction_to_computers_pptx.pptx
lesson_1_Introduction_to_computers_pptx.pptxlesson_1_Introduction_to_computers_pptx.pptx
lesson_1_Introduction_to_computers_pptx.pptxnoveriustelaumbanua
 
lesson_1_Introduction_to_computers_pptx.pptx
lesson_1_Introduction_to_computers_pptx.pptxlesson_1_Introduction_to_computers_pptx.pptx
lesson_1_Introduction_to_computers_pptx.pptxJunaidRamzan4
 
Computer system and it class 1
Computer system and it class 1Computer system and it class 1
Computer system and it class 1Sajib Mahmood
 
Lesson 1 introduction to computers
Lesson 1 introduction to computersLesson 1 introduction to computers
Lesson 1 introduction to computersVishal Patyal
 
Basic computer fundamentals
Basic computer fundamentalsBasic computer fundamentals
Basic computer fundamentalsJames Macalalad
 
Lecture-4 FIT Introduction To Software (1).pptx
Lecture-4 FIT Introduction To Software (1).pptxLecture-4 FIT Introduction To Software (1).pptx
Lecture-4 FIT Introduction To Software (1).pptxSiddiquiSid1
 
Computer System
Computer SystemComputer System
Computer Systemhajjaz
 
Ceh v8 labs module 05 system hacking
Ceh v8 labs module 05 system hackingCeh v8 labs module 05 system hacking
Ceh v8 labs module 05 system hackingMehrdad Jingoism
 
Lecture 1.pptx
Lecture 1.pptxLecture 1.pptx
Lecture 1.pptxSalarAzam1
 
Chap2-Computer Software.pdf
Chap2-Computer Software.pdfChap2-Computer Software.pdf
Chap2-Computer Software.pdfAFANJIPHILL
 
lesson_1_Introduction_to_computers_pptx.pptx
lesson_1_Introduction_to_computers_pptx.pptxlesson_1_Introduction_to_computers_pptx.pptx
lesson_1_Introduction_to_computers_pptx.pptxUmmeAmmaraTariq
 
Computer
ComputerComputer
ComputerCAFE91
 
Computer_Programming_Fundamentals in cpp
Computer_Programming_Fundamentals in cppComputer_Programming_Fundamentals in cpp
Computer_Programming_Fundamentals in cppmeharikiros2
 
Hardware & software
Hardware & softwareHardware & software
Hardware & software13023901-016
 
Chapter 3 Software.ppt
Chapter 3 Software.pptChapter 3 Software.ppt
Chapter 3 Software.pptAmanuelZewdie4
 
Computer system software
Computer system softwareComputer system software
Computer system softwareMozaSaid
 
Computer Hardware and Software Elements
Computer Hardware and Software ElementsComputer Hardware and Software Elements
Computer Hardware and Software ElementsAdetula Bunmi
 

Similaire à SC161-Lecture3 (20)

Bussines management marketing.Software.pptx
Bussines management marketing.Software.pptxBussines management marketing.Software.pptx
Bussines management marketing.Software.pptx
 
lesson_1_Introduction_to_computers_pptx.pptx
lesson_1_Introduction_to_computers_pptx.pptxlesson_1_Introduction_to_computers_pptx.pptx
lesson_1_Introduction_to_computers_pptx.pptx
 
lesson_1_Introduction_to_computers_pptx.pptx
lesson_1_Introduction_to_computers_pptx.pptxlesson_1_Introduction_to_computers_pptx.pptx
lesson_1_Introduction_to_computers_pptx.pptx
 
Computer system and it class 1
Computer system and it class 1Computer system and it class 1
Computer system and it class 1
 
Lesson 1 introduction to computers
Lesson 1 introduction to computersLesson 1 introduction to computers
Lesson 1 introduction to computers
 
Basic computer fundamentals
Basic computer fundamentalsBasic computer fundamentals
Basic computer fundamentals
 
Lecture-4 FIT Introduction To Software (1).pptx
Lecture-4 FIT Introduction To Software (1).pptxLecture-4 FIT Introduction To Software (1).pptx
Lecture-4 FIT Introduction To Software (1).pptx
 
System Software
System SoftwareSystem Software
System Software
 
Computer System
Computer SystemComputer System
Computer System
 
Ceh v8 labs module 05 system hacking
Ceh v8 labs module 05 system hackingCeh v8 labs module 05 system hacking
Ceh v8 labs module 05 system hacking
 
Fundamentals of Computer
Fundamentals of ComputerFundamentals of Computer
Fundamentals of Computer
 
Lecture 1.pptx
Lecture 1.pptxLecture 1.pptx
Lecture 1.pptx
 
Chap2-Computer Software.pdf
Chap2-Computer Software.pdfChap2-Computer Software.pdf
Chap2-Computer Software.pdf
 
lesson_1_Introduction_to_computers_pptx.pptx
lesson_1_Introduction_to_computers_pptx.pptxlesson_1_Introduction_to_computers_pptx.pptx
lesson_1_Introduction_to_computers_pptx.pptx
 
Computer
ComputerComputer
Computer
 
Computer_Programming_Fundamentals in cpp
Computer_Programming_Fundamentals in cppComputer_Programming_Fundamentals in cpp
Computer_Programming_Fundamentals in cpp
 
Hardware & software
Hardware & softwareHardware & software
Hardware & software
 
Chapter 3 Software.ppt
Chapter 3 Software.pptChapter 3 Software.ppt
Chapter 3 Software.ppt
 
Computer system software
Computer system softwareComputer system software
Computer system software
 
Computer Hardware and Software Elements
Computer Hardware and Software ElementsComputer Hardware and Software Elements
Computer Hardware and Software Elements
 

Dernier

All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 

Dernier (20)

All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 

SC161-Lecture3

  • 1. Thiti Theerathean Center for Teaching Excellence University of the Thai Chamber of Commerce E-mail : thiti_the@utcc.ac.th
  • 2. 2 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . • • •
  • 3. 3 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . The System Software consists of the programs that control or maintain the operations of the computer and its devices. It serves as the interface between user, the application software and the computer’s device. There are two types of system software :  Operating system.  Utilities programs.
  • 4. 4 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . Operating system An operating system (OS) is a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources Start the computer Provide a user interface Manage programs Manage memory Schedule jobs and Configure devices Establish an internet connectionMonitoring Performance File management Control a network Administer security
  • 5. 5 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . The process of starting or restarting a computer is called boot Cold boot • Turning on a computer that has been powered off completely Warm boot • Using the operating system to restart a computer
  • 6. 6 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . Power ON
  • 7. 7 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . A User Interface controls How you enter data and instructions and How information is displayed on the screen. Two types of user interfaces are With a graphical user interface (GUI), you interact with menus and visual images With a command-line interface, a user uses the keyboard to enter data and instructions
  • 8. 8 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . Single user and Multiuser Single tasking and multitasking Foreground and background How an operating system handles programs directly affects your productivity A computer with separate processors also can serve as a Fault-tolerant computer.
  • 9. 9 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . The memory management is to optimizes the use of RAM.  allocates or assigns data and instructions to area of memory.  while they are being processed.  monitor contents of memory.  clears items from memory when processor no longer requires them.
  • 10. 10 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . What is Virtual memory ? The Virtual memory (VM) is a concept in which the OS allocates a portion of a storage medium.  Uses an area of the hard disk for virtual memory, called swap file.  Swaps data and information between memory and storage.  Swapping Technique is called Paging
  • 11. 11 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . A job is ….  Receiving data from input device.  Sending information to output device.  Processing instructions.  Transferring items between storage and memory. The Operation System determines the order in which jobs are processed.
  • 12. 12 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . Sometimes, a device already may be busy processing one job when it receives a second job. While waiting for devices to become idle, the OS places items in Buffer.
  • 13. 13 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . A driver is a small program that tells the operating system how to communicate with a specific device Plug and Play automatically configures new devices as you install them Today, many devices and operating system support Plug and Play. If you attach a new device to a computer. Its driver must be installed before you can use the device.
  • 14. 14 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . The OS provide a Connect to a network wizard that guides users through the process of setting up a connection between a computer and ISP .
  • 15. 15 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . A Performance monitor is a program that assesses and reports information about various computer resources and devices.
  • 16. 16 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .  Searching for files  Viewing images  Sorting  Formatting  Copying  Renaming  Deleting  Moving files
  • 17. 17 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .  Some operating systems are designed to work with a server on a network  A server operating system organizes and coordinates how multiple users access and share resources on a network  Server is computer that controls access to network and provides centralized storage area.  Other computers on network are called Clients.
  • 18. 18 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . Each user has a user account  A user name, or user ID, identifies a specific user  A password is a private combination of characters associated with the user name The network administrator use network OS to establish permissions to resource. These permissions define who can access certain resources and when they can access those resources.
  • 19. 19 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . Types of Operating Systems A stand-alone operating system is a complete operating system that works on a desktop computer, notebook or mobile computing device A network operating system typically resides on the server and is designed specifically to support all sizes of networks An embedded operating system resides on a ROM chip on a mobile device or consumer electronic device
  • 20. 20 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . A Utility program, also called a Utility, is a type of system software that allows a user to perform maintenance-type tasks.  File manager  Search Utility  Image Viewer  Uninstaller  Disk Cleanup  Disk Defragmenter  Backup / Restore Utility  Personal Firewall Windows Utility  Antivirus  Spyware Remover  Internet Filters  File Compression  Disc Burning  System Tweak Utility Programs
  • 21. 21 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . A file manager is a utility that performs functions related to file management  Displaying a list of files  Organizing files in folders  Copying, renaming, deleting, moving, and sorting files and folders  Creating shortcuts A search utility is a program that attempts to locate a file on your computer based on criteria you specify
  • 22. 22 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . An image viewer allows users to display, copy, and print the contents of a graphics file An uninstaller removes a program, as well as any associated entries in the system files
  • 23. 23 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . A disk cleanup utility searches for and removes unnecessary files  Downloaded program files  Temporary Internet files  Deleted files  Unused program files A disk defragmenter reorganizes the files and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs run faster
  • 24. 24 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .  A backup utility allows users to copy files to another storage medium  A restore utility reverses the process and returns backed up files to their original form A personal firewall detects and protects a personal computer from unauthorized intrusions
  • 25. 25 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .  Antivirus  Spyware Remover  Internet Filters A virus describes a potentially damaging computer program that affects a computer negatively A worm copies itself repeatedly in memory or over a network A Trojan horse hides within or looks like a legitimate program An antivirus program protects a computer against viruses
  • 26. 26 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .  Antivirus  Spyware Remover  Internet Filters
  • 27. 27 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .  Antivirus  Spyware Remover  Internet Filters  An unusual message or image is displayed on the screen.  An unusual sound or music plays randomly  The available memory is less than what should be available.  A program or file suddenly is missing.  An unknown program or file mysteriously appears.  The size of a file changes without explanation.  A file becomes corrupted.  A program or file dose not work properly.  System properties change.  The operating system runs much slower than usual.
  • 28. 28 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .  Antivirus  Spyware Remover  Internet Filters Spyware is a program placed on a computer without the user’s knowledge that secretly collects information about the user • A spyware remover detects and deletes spyware and other similar programs Adware displays an online advertisement in a banner or pop-up window • An adware remover is a program that detects and deletes adware
  • 29. 29 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .  Antivirus  Spyware Remover  Internet Filters  Filters are programs that remove or block certain items from being displayed Web filters Anti-spam programs Phishing filters Pop-up blockers
  • 30. 30 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . A file compression utility shrinks the size of a file(s)  Compressing files frees up room on the storage media  Two types of compression : Lossy Lossless When Lossy data compression is applied to a file, the quality of the file will decrease slightly each time you compress the file. You will be unable to restore the file to its exact original state. Lossless data compression is used when you must compress a file, but also must be able to return that file to its exact original state
  • 31. 31 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . Disc burning software writes text, graphics, audio, and video files on a recordable or rewritable optical disc A computer maintenance utility identifies and fixes operating system problems, detects and repairs disk problems, and includes the capability of improving a computer’s performance
  • 32. 32 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . An Application Software consists of programs designed to make users more productive and assist them with personal tasks. It has a variety of uses :  To make business activities more efficient.  To assist with graphics and multimedia projects.  To support home, personal, and educational tasks. To facilitate communications.
  • 33. 33 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
  • 34. 34 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .  Packaged software, mass-produced  Custom software, performs functions specific to a business or industry  Web-based software, hosted by a Web site  Open source software, provided for use, modification, and redistribution  Shareware, copyrighted software that is distributed free for trial period  Freeware, copyrighted software provided at no cost  Public-domain software, freeware with no copyright restrictions Available in a variety of forms:
  • 35. 35 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . Business Software A Business Software is application software that assists people in becoming more effective and efficient while performing their daily business activities.
  • 36. 36 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
  • 37. 37 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . Multimedia Software Power users often use sophisticated software that allows them to work with graphics and multimedia.
  • 38. 38 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
  • 39. 39 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . Home and Personal Software The application software is designed specifically for home, personal and education use. Most of programs in this category are relatively inexpensive.  Software Suite for personal use  Personal Finance software  Image Editing software  Clip art / Image Gallery  Video and Audio Editing software  Travel and Mapping software  Educational and Reference software
  • 40. 40 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . Communication Software Web Browser E-Mail Instant Messaging Chat Room Text, Picture, Video Messaging RSS Aggregator Blogging Newsgroup/Message Board FTP Video Conferencing
  • 41. 41 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . Web Applications A Web application is a Web site that allows users to access and interact with software from any computer or device that is connected to the Internet
  • 42. 42 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . Learning Tools for Application Software  Web-based training is a type of CBT that uses Internet technology and consists of application software on the Web  Distance learning (DL) is the delivery of education at one location while the learning takes place at other locations
  • 43. 43 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .   
  • 44. 44 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . A computer program is a series of instructions that directs a computer to perform tasks.  The source of a program may be used to describe an algorithm to a human reader.  These modules are stored as a collection of files.  It is often written by computer programmers.  Source code is written in a programming language.
  • 45. 45 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .  Executable file (.exe / .com) is a part of a program that actually sends commands to the processor.  Dynamic Link Library File (.dll) is a partial .exe file. It will not run on its own, its commands are accessed by another running program.  Initialization File (.ini) contains information that programs can use as they run.  Help file (.hlp / .chm) contains an indexed and cross-linked format of help information. The common extensions for program files
  • 46. 46 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . Source code or Source program  Code refers to statements that are written in any programming language.  Programming language enable the programmer to describe a program using a variation of basic English. The results are saved in a file and called Source Code.  Source codes are compiled or interpreted to Machine language or Machine code. Source Code Translator 1 1 0 1 0 0 1 1 0 1 0 0 0 1 1 0 1 0 0 1 0 0 0 1 1 1 0 1 0 1 1 0 0 0 1 1 0 1 1 1 1 0 1 1 1 0 1 0 0 1 0 0 1 0 0 1 0 1 0 0 1 1 1 0 0 1 1 1 0 0 0 1 1 0 0 1 1 0 1 1 0 1 1 0 0 1 1 0 1 1 0 1 0 0 1 1 1 0 0 0 1 1 0 1 Machine Code
  • 47. 47 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . Programming Languages : Low-Level Languages  – The first generation of programming languages. – The only language the computer directly recognize. – Instructions use a series of binary digits. – Coding is tedious and time-consuming.  – The second generation of programming languages. – Use Symbolic instruction code. – Source code is converted to machine code by Assembler. – Used to control hardware.
  • 48. 48 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . Programming Languages : Procedural Languages  The third-generation language (3G) that uses a series of English-like words and arithmetic symbols to write instruction.  The programmer writes instructions that tell the computer what to accomplish and how to do.  Short for COmmon Business-Oriented Language  designed for business application.  Useful for processing transactions on mainframe.  COBOL  C language  Originally designed for writing system software.  Used most often with the UNIX.  BASIC  short for Beginner's All-purpose Symbolic Instruction Code  easy-to-understand and used to help for teaching the fundamentals of programming
  • 49. 49 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . Compiler  A Compiler converts the entire source program into machine language.  The output of the compiler is called object code.  You can copy the object code onto any similar platform and run the program.  An Interpreter translates and executes each statement of source code at the time.  Programmer can correct any errors before it translates the next line of code.  It runs slower than compiled code. Interpreter Before executing the program, you must use either a compiler or an interpreter to convert the source program into machine language.
  • 50. 50 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . Programming Languages : OOP Languages  An Object-Oriented Programming (OOP) language allows programmers the ability to reuse and modify existing objects.  An Object is an item that can contain both data and the procedures that read or manipulate that data.  Each data element is called an Attribute or Property.  The procedure in the object is called an Operation or Method. Other advantages include: Objects can be reused Programmers create applications faster Work well in a RAD environment Most program development tools are IDEs
  • 51. 51 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .  Java  Developed by Sun Microsystems.  Object code is called Bytecode which is machine independence.  Uses a Just-In-Time (JIT) compiler to convert bytecode into machine dependence code.  C++  An extension of the C programming language.  Additional features for working with objects, classes, events and other object-oriented concepts.  C#  based on C++ and was developed by Microsoft.  Like JAVA , it uses a JIT compiler but it resulting code is called Microsoft Intermediate Language (MSIL)
  • 52. 52 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . Programming Languages : Markup Languages Tags  Designed for the definition and presentation of text.  Used to specify the formatting are called tags.
  • 53. 53 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .  HTML  Short for Hyper Text Markup Language.  Uses to format documents for display on the Web.  User for display data.  xHTML  Short for eXtensible HTML.  Includes features of HTML and XML.  Short for eXtensible Markup Language.  Allows to create customized tags and use predefined tags to display content appropriately on various devices  Used for sharing data.  XML  WML  Short for Wireless Markup Language.  subset of XML and is used to design pages for micro-browsers.
  • 54. 54 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . Programming Languages : Script Languages  An interpreted language is used to develop a small program that run inside of another program.  "Scripts" are distinct from the core code of the application that written in a different language.  Designed for gluing software components together.  Referred to as glue languages or system integration languages.  Popular script languages include PHP , JavaScript , VBScript
  • 55. 55 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y . Programming Development The Program development consists of a series of steps programmers use to build computer programs
  • 56. Step 1 – Analyze Requirements • To initiate program development, programmer: – Reviews the requirements – Meets with the systems analyst and users – Identifies input, processing, and output 56 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
  • 57. Step 2 – Design Solution (con.) • In structured design, the programmer typically begins with a general design and moves toward a more detailed design • Programmers use a hierarchy chart to show program modules. 57 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
  • 58. Step 2 – Design Solution (con.) • A program flowchart graphically shows the logic in a solution algorithm 58 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
  • 59. Step 2 – Design Solution (con.) • The sequence control structure shows one or more actions following each other in order 59 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
  • 60. • The selection control structure tells the program which action to take, based on a certain condition Step 2 – Design Solution (con.) 60 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
  • 61. • The repetition control structure enables a program to perform one or more actions repeatedly as long as a certain condition is met Step 2 – Design Solution (con.) 61 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
  • 62. • Flowcharting software makes it easy to modify and update flowcharts – SmartDraw – Visio Step 2 – Design Solution (con.) 62 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
  • 63. • Pseudocode uses a condensed form of English to convey program logic Step 2 – Design Solution (con.) 63 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
  • 64. Step 3 – Validate Design • Check for logic errors using test data Develop various sets of test data Determine the expected result Step through the algorithm Compare the results Repeat steps for each set of test data 64 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
  • 65. Step 4 – Implement Design • Implementation of the design includes using a program development tool that assists the programmer by: • Generating or providing some or all code • Writing the code that translates the design into a computer program • Creating the user interface • Extreme programming is a strategy where programmers immediately begin coding and testing solutions as soon as requirements are defined 65 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
  • 66. Step 4 – Implement Design • Program development tools 66 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
  • 67. Step 5 – Test Solution The goal of program testing is to ensure the program runs correctly and is error free • Errors include syntax errors and logic errors • Debugging the program involves removing the bugs • A beta is a program that has most or all of its features and functionality implemented 67 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
  • 68. Step 6 – Document Solution • In documenting the solution, the programmer performs two activities: Review the program code Review all the documentation 68 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .
  • 69. 69 T h e P r i n c i p l e s o f I n f o r m a t i o n Te c h n o l o g y .