You are on page 1of 47

Computer Software

 What is Software?
 Software is a collection of instructions that can be ‘run’ on a computer. These
instructions tell the computer what to do.
 Software is not a physical thing (but it can of course be stored on a physical
medium such as a CD-ROM), it is just a bunch of codes.
 For a computer system to be useful it has to consist of both hardware and
software.
 Two types of software
 Applications Software
 System Software
Applications Software
Application software are designed to allow users to  Application Software Examples
complete specific tasks. This may be to:  Word Processor
 Write a letter/Present information  Spreadsheet
 Browse the internet  Databases
 Manipulate data in a spreadsheet or database
 Manipulate graphics, sound or video.
System Software

 System software are normally involved in the running of the computer:


 System software is a set of programs that act together to allow the hardware
and the application programs to work.
 Examples
1. Operating systems: to provide a user interface
2. Device drivers: which allow hardware components to work.
3. Utility software: which maintain the computer performance.
Application Software Examples

 Word Processing: Used to prepare reports,  Spreadsheet: Use to create, organise and
school essays etc. manipulate numeric data.
 Create New or edit existing text documents. Use of various formulas to:
 Formatting tools  carry out set tasks:
 Create font styles Sum, Max, Min, Average
 Importing tables/images Count, CountA
 Spell Check CountIf & SumIF
 Copy/Paste Lookups

 Find/Replace IF and Nested Ifs


 Page layout  Apply various formatting to cells/
 Create graphs (Ba/Pie charts)
Application Software Examples

Database: is used to insert and Photo Editing


organize data using fields and  Used to edit digital images to either touch up or
records.
to apply various formatting techniques.
 Contrast/Brightness
 Create a table so that records can  Use of layers
be inserted.
 Filter tools
 Run queries using search criteria to
find specific data.  Lighting effects
 Create reports including labels  Liquify (change features of a face)
from the search criteria.  Brush tools
 Clone/Stamp tool
Application Software Examples

Graphics Manipulation: Used to create Video Editing: Used to edit and format
and edit bitmap and vector graphics video using various tools and
Pixels in bitmap images can be techniques.
changed to produce a different image.
Vector images use: Splitand Trim videos
Lines
Create split screens
Curves
Rearranging order of clips.
Text
Transitions between clips (Fade)
Inserting Audio
Applying filters and using video
enhancement techniques
Application Software Examples
Apps (Phone Applications) Apps are the Measuring and Control Software which are
software which runs on mobile phones. responsible for changing physical conditions in an
They usually come with the phone or environment.
can be downloaded and updated.
 Measuring
 Sensors take readings which are processed by the
 Games (Angry Birds)
computer or microprocessor.
 Video/Music Streaming (YouTube)  Control Software
 Social Media (Facebook, Twitter,
Instagram)
 By comparing sensor readings to a pre-set level
the control software will decide on an output (For
 Communication (Whats App, Viber) example to increase or decrease the heat in a
 Camera (Editing images) green house).
 GPS (Satellite navigation)
 Health/ Fitness
Application Software Examples

 Project management software,  Presentation software, e.g.


e.g. Microsoft Project, is used to Microsoft PowerPoint, helps you
track the timelines of all the tasks prepare and give a multimedia
that have to be done to complete a presentation to an audience. This
project, could include:
 e.g. when constructing a building.  slides with text, graphics,
Timelines are displayed in a Gantt hyperlinks and notes for the
chart. speaker.
Software licensing

Software licensing
 Software is copyrighted. It is illegal to use it without a software license.
 Types of license are:
1. Licensed software. Purchasers buy the right to use it.
2. Public domain software is free and has no restrictions on its use but you might not be given
the source code.
3. Open source. Licenses are free and you have access to the source code and are allowed to
modify it.
4. Shareware is licensed software that is initially free to try out. However, you must pay for a
license if you decide to make regular use of it.
5. Creative Commons licenses help software producers communicate the rights they keep for
themselves and the rights they give to others.
Software updates
 Software updates are a way for software developers to fine-tune a product to make it the best
it can be. They offer small, frequent improvements rather than major changes.
 Unlike a software upgrade, updates need the existing software program you're using to
work. Updates sometimes run automatically in the background.
 Software updates are important because they often include critical patches to security holes.
 They can also improve the stability of your software, and remove outdated features.
 they can improve your experience in the long run and ensure that you get the most from your
technology.
System Software Examples

Operating Systems Device Drivers


 Manages computers functions including  Allows hardware devices to run on
hardware devices (input/output). Also the computer including printers,
provides users with a GUI interface. sound, graphics and network cards.

 Examples: Windows, macOS, and


Linux
System Software Examples
 Utilities
 Compiler
 Help to manage and maintain
 Translates a program written in a specific
computer resources and performance language which can be understood by the
by running specific tasks. computer.

 Linkers: Combines object files produced by a


complier into a single program.
Role of an Operating System

 An operating system is a system software that manages the general operation of a computer
system:
 Role of an operating System
 Helps the user interact with the computer through a user interface.
 Provides security and prevents unauthorized access to a system
 Allows users to load, run and store applications. Also resolve errors occurring applications
 Decided what should be loaded and deleted from memory
 Manages input, output and backing devices.
 Helping save, organize, find and delete files
Graphical User Interface (GUI)
 GUI (Graphical User Interface) is an user interface built around graphics.
 WIMP
 Windows – areas for displaying information
 Icons -small images used to represent files/folders or applications
 Menus - lists of options or applications users can select from
 Pointers –Mouse pointer can be used to select and open files/applications
 GUIs are quite easy to use due to the visual nature of the interface
 The user has lots of visual clues as to what things do.
Post GUI (GUI) Touch Screen Technology
 Post GUI allows the use of pinching, scrolling, expanding
 Post GUI allows the use of touch screen
Command Line Interface (CLI)
 CLI requires the user to enter  Examples: MS-DOS operating system and the
command prompts to interact command shell in the Windows operating system
with the computer.  Example Command Prompts
 CLI are normally used by expert  ATTRIB: Displays or changes file attributes.
users as it is complicated to use.
 CD: Displays the name of current directory
 CLI and is not restricted to a
number of predetermined options.  CHKDSK: Checks a disk and displays a status
report
 Copy: Copies one or more files to another location
 DIR: Displays a list of files and sub directories
Main Differences between CLI and GUI
 Graphical User Interface (GUI)  Command Line Interface (CLI)
 Advantages:  Advantages:
 The user does not need to learn any commands.  The user has more freedom to use specific
 The interface is easier to use. command in interacting with the computer.
 Can use a pointing device to clicks and select  It is possible to alter computer settings.
icons or menu options.  Disadvantages:
 Disadvantages:  User needs to learn commands
 Takes up more memory than a CLI interface.  Commands must be typed in without errors.
 Requires an operating system to operate.  No visual aids.
TYPES OF PERIPHERAL DEVICES

 Peripheral devices are devices that can be connected to a computer, such as


a PC or tablet device. Peripherals can be connected inside or outside a
computer and can be grouped into three types
 input
 output
 storage.
Input Peripherals Devices
Input peripherals are devices that send data to the computer. They allow the user to control the
computer or store data captured from sources outside the system.

 KEYBOARDS Numeric Key Pad

Uses
 Inputting numeric data into:

 Inputting data into applications


 ATM

 Typing commands into a CLI Interface


 POS Terminals

 Easy and familiar to use


 Chip and Pin

 Fast entry of Text into a document


 Mobile Phones etc.

 Slower method compared to direct data entry.


 Straight forward to enter numeric data like
pins or prices at a POS.
 Keys can be too small.
 Difficult to type letters (older Mobiles to
text)
POINTING DEVICES
A pointer is used on a screen to select displayed objects. There are several types of device that allow you to control a pointer.

Mouse Touch Pad


 Mouse To control the pointer on the  Used as a pointing device on a
screen to:
laptop.
 Selecting Windows
 Is part of the keyboard so no need
 Clicking Icons
for separate device.
 Menu Options
 More difficult to use compared to a
 Positioning Pointer
normal mouse.
 Easy to navigate through menu options
 Quicker to select an option compared to
using a keyboard.
 Easily damaged
 Flat surface required.
POINTING DEVICES
Tracker Ball: Used by users who tend
to have limited motility in their wrist
(RSI) Joystick: Used in computer games and
simulators.
 Easier to use compared to mouse
 Easier to used compared to a
 More accurate positing of the keyboard.
pointer.
 More difficult to use compared to a
 Tend to be more expensive. normal mouse.
 Not familiar to users.
POINTING DEVICES
Graphics Tablet Light Pens: Used in CAD applications for drawing
onscreen
 Used with a stylus to draw free hand
drawings which can be stored on a  More accurate than touch screens
computer.  Small in size
 Very accurate method of drawing compared  Only used with CRT Monitors
to a pointer device.
 Dated Technology
 Longer to produce drawings
 Cost of tablet
Direct Data Entry and Associated Devices
Scanners

 BARCODE SCANNER: Barcode Scanners are used USE:


to scan bar codes which contains unique  Barcode readers are typically used at point-of-sale (POS)
information about a product including price. in shops when customers are purchased goods.
 There are two types of barcode:  Advantages:
 Linear 1D  Far quicker and more accurate than typing in codes using a
keypad.
 matrix. 2D
 Stock database can easily be updated with new prices –
barcodes would not need to be replaced.
 Disadvantages
 Barcode could be unreadable or missing.
 Barcode could be swapped.
 Can be an expensive system.
Direct Data Entry and Associated
Devices
 Optical Mark Reader
 OMR is able to read marks written in pen or pencil. The position of the mark is stored in the
computers memory.
 USE:
 Used to scan in marks from multiple choice exams, surveys, and lottery tickets.
 Advantages:
 Very fast method of inputting data as no user has to manually enter results.
 More accurate than OCR
 Less chance of errors
 Disadvantages
 Forms have to be completed correctly to avoid manual checks which would waste time.
Optical Character Reader:

OCR scans text from hardcopies and converts it into an editable form which can be used and
edited in a range of software including word processors.
USE:
 Used in Self-Immigration System at Airports.
 Identity Cards
 Students scanning text from books which can be edited.
 Advantages:
 Faster method of data entry compared to manually typing the data.
 Less chance of errors.
Disadvantages
 Not as accurate as the OMR reader
 Unable to read handwriting.
WEBCAM

 Web Cams • Used by users who want to have a web conference (Skype Call)
 Allows for face to face video chat.
 Can contact people without the need to travel.
 Quality is dependent on internet connection
MICROPHONE

 Microphone • Used to input sound into a computer.


 Used in voice recognition applications.
 Voice overs can be added to presentations.
 Recorded audio can be typed directly into Word Processor applications.
 Voice recognition is not as accurate as typing text into a computer.
TOUCH SCREEN
 Touch screens are used in many devices, including smartphones, tablet devices, laptops and desktop
computers.
 There are two types of touch screen:
1. resistive
2. capacitive.
Touch Screen
 Used on:
 Mobile/Tablets
 Point of Sale (POS)
 Interactive White Boards
 Very easy to use and select options.
 Options could be selected accidently.
 Screen can get dirty.
BIOMETRIC SCANNER

 A biometric scanner reads a person’s unique physical characteristics to


identify them, e.g. face recognition.
 Biometric scanners can be used to control entry to buildings and used in place
of car keys. Although identification is not entirely accurate, the use of
biometric scanners minimises the risk of fraud and theft.
 Examples:
 Fingerprint recognition:
 Facial recognition:
 Voice recognition:
 Iris recognition
CARD READERS
 Magnetic strip: This is the least secure method as the data on the
 magnetic strip can easily be stolen by criminals who put the card through a card reader without
the card owner’s knowledge.
 Programmable chip: Data on a programmable chip is only readable when a correct PIN is entered
into the reader.
 Chip and PIN system, which reduced certain types of fraud by 67%.
 Radio Frequency Identification (RFID): is a short-range wireless communication method.
 Near Field Communication (NFC) is a branch of RFID.
CARD READERS
 Magnetic Strip Readers are
used to read data found on  Advantages:
magnetic stripes found on the  Fast data entry compared to keyboard
back of cards.  Secure/Error Free –No Typing
 USE:  Not effected by water and robust if dropped
 Easily Updated
 Bank Cards: Contains Account
 Disadvantages
details
 Stripe could become unreadable -scratched
 Arcade: Contains balance  Does not work at a distance
 Security/Hotel Rooms: Allows  Easily Lost/misplaced
entry to specific room.
 Gift Cards (Vouchers) –amount
of vouchers
CARD READERS
 Chip and Pin Readers are used POS terminals to make a secure payment using a debit or credit
card.
 Advantages:
 Secure method of payment compared to swipe and contactless method.
 Chip is less likely to be damaged compared to a magnetic swipe.
 Disadvantages
 The pin could be read by some one watching or use of mirrors.
 Fraudulent machines can copy card details.

Contactless Cards
 Contactless Cards Readers are used by customers to pay for products at the POS without the
need to enter a PIN Number using RFID technology.
 Transactions are normally restricted to a small amount (up to £20)
 How it works: The payment terminal picks up a signal from the chip to process and complete
the transaction when the card is within a few centimeters distance.
 Advantages:
 Quicker Transaction meaning less time spent at POS.
 Don’t have to use PIN
 Transaction data (account details) is encrypted.
 Disadvantages
 Less secure than chip and pin method.
 Anyone could use card if lost.
 It is easer for thieves to copy details of the card.
 Only small payments can be made
Radio Frequency Identification

RFID reads information stored on tags (small silicon chip that can be placed on a
sticker) using radio waves. RFID tags can be attached to objects or animals/people.
USE:
Track movement of animals(livestock) or people
Stock Control: Scan stock items for quantity
Airports: Track Luggage to make sure nothing is lost
Contactless cards to make a payment
Advantages:
Can read objects from a distance.
Can read in bulk
Very fast reading –quick response
Allows read/write operations to take place
Can read biometric readings
Disadvantages
Radio symbols can be jammed or hacked.
More expensive than a barcode
Tags could interfere with each other.
SENSORS
 Sensors are used to input data
about the physical environment.
They can automatically input
data without the need for
human action.
 Their output is then processed
by a computer.
 Sensors are one of the main
features of smart devices such
as smartphones and smart
environments such as smart
homes.
SENSORS
 A sensor is a device that converts a real world
property into data that a computer can process.
 Sensor Example and its Use
 Temperature Used in green houses to measure
temperature
 Light Umpires check light conditions in cricket match
 Moisture To check the moisture in the soil in a green
house
 Water-Level Used in washing machine to measure
water level
 Proximity Used when parking cars to judge distance.
 Movement Detects movement which could trigger an
alarm
 Pressure Used in burglar alarms
SENSORS
 Input Devices : Sensors
 Real world measurements are
collected as an analogue signal from
the sensor.
 A computer only understands digital
signals.
 An ADC (Analogue-to-digital
converter) is needed to convert the
signal so a computer understands the
signal.
Discuss the difference between a CLI and GUI interface?
Key Words: Windows, Icons, Menus, Pointers, visuals aids,
learn, command prompts, pre-determined options, expert user

 The GUI (Graphical user interface) allows the users to interact with the
interface by using a pointer to select windows, icons and menu options.
The GUI will have visual aids which it make it easier for users to learn how
to use the interface. On the other hand users are required to enter
command prompts to interact with the CLI(Command Line Interface). The
command prompts have to be learned by the user and entered correctly.
This would make the CLI interface more challenging to for the user to
learn. However the advantage of using the CLI for expert users is that you
are not restricted to pre-determined options which would be the case in
the GUI. This would allow for greater freedom when using the CLI.
Discuss why different user interfaces require the use of different types of
input devices.

 With a GUI (graphical user interface) a mouse enables users to easily manoeuvre a
 pointer around a screen to select Icons representing applications, menu options and
 windows. The mouse can also be used to drag windows and icons across the screen.
 People with disabilities may prefer to use a tracker ball as a pointing device as they may
 have limited motility in their wrists. In addition a joystick or gamepad could be used to
 mimic the behavior of a mouse when playing games. On the other hand a keyboard will
 be required to enter command prompts into a CLI (Command Line Interface). Touch
 screens can be used to directly select options on a screen normally found on portable
 devices such as smart phones, tablets or even at a POS (Point of Sale).
Compare the use of Contactless and Chip and Pin cards at the POS terminal?
Key Words: Secure, PIN, Replicate details, limited payments, speed of
transaction, Overseen

 The Chip and Pin is a more secure method of payment as the user would
be required to enter a 4 digit pinto proceed with the transaction. The
advantage of using the contactless method of payment is that it reduces
the time taken by retailers to deal with each customer which increases
the speed of the transaction. This will help reduce the queuing time at the
POS. However only small/limited payment scan be made on the contactless
method which would restrict your purchase limit. Also it is easier for
thieves to copy/replicate details of the contactless card by using a scanner
at a short distance. On the hand the PIN could be over seen by other
people once it has been entered into chip and pin reader. In conclusion
the contactless method maybe a suitable method of payments if the
customer is only purchasing items within the limit of the card.
Compare and contrast the use of Mouse, Touchpad and Tracker ball as
a pointing device?
Key Words: familiar, flat surface, damage, difficult/easier use, fixed
device, limited motility, expensive

 The mouse is normally used with a desktop computer and is the most
familiar pointing device used. However the mouse requires a flat surface
to be used and is more likely to be damaged. The touch pad is a fixed
device commonly found on laptops. It is more difficult to use compared to
a mouse. The tracker ball pointing device is used by users who have
limited motility in their wrist. User would move the ball at the top of the
device using their fingers to control the pointer on the screen.
 The tracker ball however tends to be more expensive than the other
pointing devices.
An automatic washing machine contains a device to read RFID chips sewn into
clothing. When an item of clothing is placed in the washing machine it is
scanned. Describe how the data is read from the RFID chip.

 The washing machine sends out (interrogation waves) radio signal to read
the data from the RFID. They act as a passive transponder.
Explain the benefits of using RFID technology in a washing machine.

 The benefit of using RFID technology is that it stops material being


incorrectly washed. Also it stops coloured items of clothing being in the
wrong wash. In addition it stops clothing of different material being
washed with others. Furthermore it allows the wash cycle to be set
automatically. RFID technology will know the amount of water to use so
less water will be wasted.
A student exam answer sheet consists of boxes or lozenges which the
student shades in to indicate their choice of answer. Describe the
drawbacks of using Optical Mark Recognition

 The drawbacks of using OMR are that if the marks don't fill the space
completely or not in a dark enough pencil then they may not be read
correctly. OMR is only suitable for recording one out of a selection of
answers, not suitable for text input. Answer forms have to be prepared
which may be expensive. The format of the question could be restricted to
formats like multiple choice.
Describe the difference between Application and System
Software?
Key Words: specific tasks (Word Processor), manage and maintain
(Operating System)

 Application software are designed to allow users to complete specific


tasks. For example a Word Processor is used to write a letter. System
software is used to manage and maintain the computer system. An
operating system such as Windows 10 is used to manage the functions of
the computer system.
Describe the main functions of the operating system?
Key Words: User Interface, Security, Files, memory,
applications, input/output/storages devices

 The operating system provides the user interface which allows the user to
interact with the system. In addition the operating system provides
security and prevents unauthorised access to a system. Files and folders
can be created and organised.
 Furthermore the operating system allows users to load, run and store
applications also decides what should be loaded into the computer
memory (RAM). The operating system also manages the
input/output/storages devices.
Compare the use of MICR, OCR, OMR, Barcode scanner and a keyboard
to enter data.

 MICR (Magnetic Ink Character Reader) is used when processing cheques in a


bank. The characters at the bottom of the check are written in a special
ink. These characters are scanned by the MICR to identify the check to the
account holder. OCR (optical character reader) is used to scan text into an
editable form and is commonly used as immigration terminals to scan
passports. Keyboards are used to enter data manually. However if a
passport number had to be typed then it would take longer and perhaps
there is also the chance of human error. OMR (Optical mark reader) is used
when scanning in pencil marks on exam paper or school registers. However
if pencil marks are not clear then again there is a chance of errors.
Specialised equipment is required for OCR and OMR which could also be
more expensive than a keyboard. A barcode scanner is used to scan items
at the POS. The bar code is unique to each product and if the barcode
scanner was not available then the code would have be typed manually
again which would take more time and could lead to human error.
Recently mobile phones have been used to pay for goods in stores and
supermarkets. One method of payment involves holding the phone close to a
reader in the store. Discuss the advantages and disadvantages of this method
of payment compared with other methods of credit/debit card transactions.

 Mobile phones would be easier to use a method of payment because you would
only be required to hold the phone next to the reader. As the credit card does
not have to be physically present it cannot be stolen and will be less prone to
damage as there is no need to swipe the card. In addition as there will be no
need to remember a PIN code or use a signature. On the other hand a
compatible phone would be required which could be expensive and stores would
have to invest in new equipment. The mobile phone could run out of battery or
there may be issues with signal and connectivity. In addition some users may not
be familiar with using their phone as a payment option. Furthermore users will
be restricted on how much can be paid. The phone signal may be intercepted by
hackers or phones could be stolen and used as methods of payment with no
authentication. Nevertheless many users now carry mobile phones and it doesn’t
matter if they forget their credit/debit cards. Consequently the credit/debit card
number is not used in the transaction.

You might also like