Tuesday, 15 November 2011

Software

Systems software

Unlike hardware, software cannot be touched. Generally software can be split inot two groups known as systems software and application software. This type of software helps to run and organize the computers hardware. It includes a number of common features which are:


  • Operating system (OS)
  • Device drivers
  • File Managers
  • Graphical User Interface (GUI)
  • Command Line Interface (CLI)
  • System Utilities (eg dignostic tools)

Applications software

Is a program or a group of programs designed for end users. Application software includes database prgrams, word processors and spreadsheets. Application software sits on top of systems software because it is unable to run without the operating system and system utilities.




Communications software

This software allows you to interact and connect with people and exchange files which can either be media, audio or text formats between different computers or user ID's. The software can be either a social networking site such as Twitter or Facebook or using Email. Using this software can let you interact with people from all over the world.



Games application software

Games software can either be downloaded and installed when you have purchased a new game or the game can already be installed into your computer. A computer already has games application software installed into the hard drive so it saves you time instead of downloading games you might already have.






Software utilities

System software is designed to help analyze, configure, optimize, and mantain the computer. A single piece of utilitie software is usually called a utilitie or tool. It usually focuses on how the computer infrastructure operates which includes the computer hardware, operating system, application software and data storage.




Firewall 

Firewall is a system that is operated to prevent unauthorized access to or from a private network. Firewalls can be implented in both hardware and software, or a combination of both. They are frequently used to prevent unwanted Internet users from accessing private networks connected to the Internet especially Intranets. The messages that enter or leave the Intranet pass through the firewall, which then examines each message then blocks those that do not meet the specified security criteria.