0% found this document useful (0 votes)
56 views22 pages

4 - Computer-Software

Uploaded by

saad.ahm.salama
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views22 pages

4 - Computer-Software

Uploaded by

saad.ahm.salama
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Computer Software

Introduction ..
• There are two types of software:
–System Software;
–Application Software.
Introduction ..
• System software:
– makes efficient use of the
computing resources;
– provides a uniform base for
different applications;
– operate, control and extend
the processing capabilities
of computers.
• The Operating System comes
under the System Soft-ware
category
Introduction ..
• Application software:
– helps the user to do his/her work.
– Like Microsoft Office
System Software
System software includes programs designed to
coordinate the operations of the computer system. It
manages the hardware, software and data resources of
the computer system. It includes three types of programs:
1- System management programs. These programs
manage the hardware, software and data resources of
the computer system. It includes operating system,
DBMS & communication monitors.
2- System support programs. (Utility Programs) like
programs for transferring data from one medium to
another, formatting disk, backing up and sorting of files
3- System development programs. These include
language translators, and programming tools.
5 14/08/1441
Operating System
Operating system establishes a link between
application programs and the computer itself. It also
provides an interface for the user with the machine.
Assemblers
Programs called assemblers were written to automate
the translation of assembly language into machine
language. The input to the assembler program is called
source program and the output in machine language is
called the object code.
The assembler occupies less space in the memory of a
computer and it will operate faster than interpreters or
compilers.
6 14/08/1441
Compiler
Compiler is a type of system software that translates
source code into object code and thus renders
translator's job between the machine and the user.
The compiler can detect only the syntax errors
and cannot detect logical type of errors, which the
programmer has to detect and correct.
Interpreter
Interpreter is another type of system software used to
translate the source code in high level language into
machine code. This translator program takes one
instruction in high level language and translates it into
machine instruction for immediate execution.
7 14/08/1441
Compiler vs Interpreter
Interpreters differs from a compiler, which converts the
entire source code into machine code and is not involved
in its execution.
The advantage of an interpreter over compiler is fast
response to changes in source program.
Moreover, a compiler is a complex program compared to
an interpreter. Interpreters are easy to write and they do
not require large memory space in the computer.
The Interpreter is a time consuming translation method
because each statement must be translated every time it
is executed from the source program.
Thus, a compiled machine language program runs
faster than an interpreted program.
8 14/08/1441
Loaders and Linkers
Once the assembler produces an object program, it
must be placed into memory and executed. This loading
of the object code into the memory of a computer is
done by a loader.
Structured programs are designed in modules. Each
module represents a small program for a particular
processing. The translator program converts these
modules into object codes. These object modules must
be combined to form a load module for execution. The
software that links these object modules into a load
module is called linker.
Editors are system software to facilitate editing of text
and data. Editors are also required for coding and
debugging.
9 14/08/1441
Operating system is an integrated system of programs
that manages the resources of a computer, controls the
various activities of the computer and provides support
services to users.
The two major purposes of operating system are to
enhance productivity of computer resources and provide
user-friendly interface. It consists of a set of programs
that enables a computer to manage its resources
efficiently. It manages the computer resources (such as
input and output devices, memory and processor) far
more efficiently and effectively than a human operator.
A single-user system environment is provided by
operating systems like MS DOS, 05/2, MAC for Apple
Macintosh computers, and windows.
A multi-user system environment is provided by
10 14/08/1441
operating systems like UNIX, Windows NT or Linux.
Functions of Operating System
1. Resource management The operating system offers
various facilities like:
2. Data management
• Job control language
3. Job management • Failure and recovery
4. Input/output management • File security
• Logging
5. Maintaining Security etc. • Scheduling, and,
6. Conflict resolution • Communication with the
operator

11 14/08/1441
Multiprogramming and Multiprocessing
The multiprogramming operating system runs one
program at a time. When that program requires some I/O
operation, which is a slow process, the CPU switches to
another job for execution when the first program
execution waits for I/O operation to complete. If the
second job also requires I/O operation, the CPU is
allotted a third job and so on.
Always a program will be in one of the three states:
ready, running and blocked.
Multiprocessing systems have two or more CPUs, which
have the ability to execute two or more jobs
simultaneously. Instructions from several and
independent programs are carried out by different CPUs
at the
12
same time. 14/08/1441
Multiprocessing vs Multiprogramming
Multiprogramming is the interleaved execution of
different jobs by a single CPU in turn whereas
multiprocessing is the simultaneous execution of
different jobs by different CPUs at the same time.
Multiprogramming involves execution of different jobs
segment by segment in the time slice allotted to each
job until each job is complete. Here, the CPU is busy all
the time.
Multiprocessing enables the multiple CPUs to work on
several program segments of one or more programs at
the same time. Here, the task gets done quickly.

13 14/08/1441
Advantages of Multiprocessing
1. Parallel processing improves systems efficiency by
increasing throughput and lowering turnaround time of the
system.
2. It also results in more efficient use of hardware resources
other than the CPU.
3. High reliability of the system is ensured by the provision of
automatic take-over of complete work by other CPUs in case
of breakdown of one of the CPUs.
Limitations
1. Large memory is required for multiprocessing as it requires
many programs and data to reside in memory at any time.
2. The multiprocessing systems are expensive. It requires
not only high initial outlay but also high operation and
maintenance expenses to be incurred.
3. The system needs a highly sophisticated operating
system
14
and highly skilled computer professionals to 14/08/1441
design it.
Time-sharing or multitasking
Time-sharing system is a logical extension of
multiprogramming. It refers to the simultaneous use of a single
computer by many users. Time-sharing is done in a multi-user
environment. Each user has a terminal connected to the cpu.
Advantages of time-sharing
1. It utilizes the CPU more efficiently by reducing CPU idle time
2. It provides computing facility to many users simultaneously.
3. It provides quick response.
Limitations
1. Since many users work with the same system simultaneously,
security and integrity of user programs and data become a problem
2. It requires data communication facilities, as the timeshared
system will have remote terminals using it.
3. The time-shared system supports several users at the same time
operating even from remote terminals. Therefore, its reliability must
be ensured by back up facilities as a safety measure which can be
used15 in the event of any system problem. 14/08/1441
Application software can be developed in-house by
computer personnel or by hired staff (custom-built) or it
can be acquired from software vendors (off-the-shelf).
Off-the-shelf packages are available for general
processing needs like word processing, spreadsheet,
database management, accounting and inventory
management. These application programs can be
classified into two: general purpose-programs and
special-purpose programs.

16 14/08/1441
The general-purpose packages provide certain
generalized facilities. They provide a general framework
and a set of tools to manipulate data. The user can adapt
these to suit his requirements. Spreadsheet application
packages like MS Excel and database application
packages like Oracle are examples of general-purpose
application programs. They can be used for any purpose.
Special purpose application programs are specific to
certain applications such as project planning and
monitoring, production planning and control, inventory
management etc.
Characteristics of Software Packages
Modularity
User-friendliness
17 14/08/1441
Computer virus is a hostile program that generally
replicates itself and infests other files. These malicious
programs are developed by computer hackers.
They are usually written in assembly language or high-level
languages like 'C'.
most of the viruses are highly harmful to computer
systems. The harm done to the computer system depends
on the type of virus and frequency of its strike. Viruses are
quite common in Windows environments.
A worm is a program that copies itself repetitively into
computer memory or disk drives until the memory or disk
space is exhausted. It can cause the computer to stop
functioning as it runs out of memory to load and run
applications.
Some worms can install viruses that can cause destruction
of data or damage to systems.
18 14/08/1441
Data security
The steps to be taken to improve data security include:
• Ensure fool proof transaction acceptance for online or interactive
transaction processing systems
• Prevent loss during data transmission
• Keep the relevant old master file and transaction file so that it is
possible to reconstruct the current master file anytime if it is
destroyed by fire, flood, earth quake etc.
• Take proper care of archived data. Some times, data are kept
archived for months without reading the tapes etc. It is a good
practice to read the data from tapes etc. once every few months.
• Conduct proper audit of hardware every year
• Keep track of software changes so that there will not be software
version conflict etc.
• Never use pirated software, particularly application software, that
is most vulnerable to attacks.
• Have planned monitoring of access to systems to detect
unauthorised
19
access and prevent them. 14/08/1441
SECURITY MEASURES
Organizations need to put in place certain safeguards for
protecting their computer and information resources against
unauthorized access, disasters and system failure.
Firewall is a combination of software and hardware that
prevents hackers and others from infiltrating a computer or
internal network from an outside network. Firewalls check
incoming and outgoing packets of data and block or let them
flow in according to a set of rules defined by the
administrator.

20 14/08/1441
Password
Each user is identified by the login name and password.
When the user turns on the machine, the system asks for
typing in his or her login name and password.
Encryption
It is the altering of data so that it is not usable unless the
changes are undone, that is, de-encrypted. It is particularly
useful when sensitive data are transmitted over a public
network. A pair of keys (public key and private key) is used
to encrypt and decrypt the message. The sender encrypts
the message with the public key of the recipient. Only the
recipient's private key can decrypt the encrypted message.
A digital signature is the equivalent of an ink signature
for physical documents. It is used to verify authenticity of
the sender of the message.
21 14/08/1441
The Desirable characters of OS..
• The desirable characters of the Operating System are:
1. User Interface
2. Memory management
3. Process management
4. File management
5. Networking Capabilities management
6. Security Management
7. Fault tolerance
8. Application Base
9. Distributed Operating System.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy