SlideShare a Scribd company logo
1 of 14
Introduction to
Computer Software
Elike Ike
What is Software
Software are sets of computer-
readable codes compiled and design
to enable computer carry out specific
functions. They are also designed to
enable humans communicate
effectively with their computer by
passing simple instructions. The part
of a software that links us to pass
command to the computer is called the
user interface.
Types of Software
Broadly speaking, there are two types of software:
• System software
• Application software
System SoftwareOperating system, utilities and drivers
• Operating system: this software defines the functions of a computer. They are
designed specifically to coordinate the functions of the hardware, make hardware
accessible to one another and grant application software access to needed
hardware. There are three major operating systems today for computers, Windows
Operating System, Mac Operating System and Linus Operating System. Each one of
these has its own versions (history). For mobile devices, the list is more elaborate
but the most common ones are iOS (iPad and iphone operating system), Android,
windows mobile OS, Blackberry OS, Fire OS and Symbian OS.
• Utilities: these are software that are designed specifically to give the computer user
access to organize, customize and carry out maintenance functions in the computer.
They include things like Disk Manager and Control Panel Items.
• Drivers: these are software that are used to establish linkage between a computer
and connected hardware devices. They assist in describing the device to the
computer and provides information on its functions and available services which in
turn define how the device can be used by the operating and other applications.
These include printer drivers and modem software.
Application Software
These are software packages designed to enable computer users carry out
specific functions or have access to computer hardware functionality. Today, the
range of software and their functions is near-endless. Application software are
often designed by companies and groups to address specific computer user
needs. These needs can be to design, to communicate, entertain, educate, data
management, healthcare, security and so on.
The table below shows some common examples.
Developer Name Use
Adobes Photoshop Picture editing
VLC VLC Multimedia entertainment
Microsoft Ms Word Word processing
Mozilla Firefox Surfing the Internet
GNU project FileZilla FTP manager
MalwareViruses, Trojan horses, Worms
As the name implies, these are software designed
specifically to cause a computer system to
malfunction. They are programmed often by skilled
developers with malicious intentions. Sometimes also,
specialized agencies use these software as tool to
combat terrorism and disrupt harmful activities. They
often come in a clandestine manner- either within
another legitimate software, adware, within a file, or
through network activities. They are mostly autorun,
that is, they start working as soon as they enter the
desired destination (host machine).
SpywareSystem monitors, Keyloggers, Adware
These are software designed specifically to
infiltrate a computer in order to secretly steal
information. They penetrate the computer and
relay the desired information to the hacker
(someone who specialize in secretly gaining
access to computers to steal information).
The information got through spyware are
often administrator access, login details, bank
account Information, official secrets,
confidential materials and so on.
Software License Types
• Proprietary: These are software sold/distributed under a registered trademark.
A company develops and makes available these software either at a cost or as
a free to install package.
Commercial/Premium: these are software that are sold to users. The
developer markets the software either in form of cd/DVDs or online to users
who purchase, download and install in their local computers. However,
some offer Trial Version which can be used for a limited period of time or
limited functionality.
Freeware: these are software that are designed and shipped for free such
that one can download them and install without financial commitments.
However, it is expected that the user do not distribute these software to
other users.
• Open source: these are software that are designed primarily to meet user
needs and are offered free to install, distribute and modify. In this case, users
can get access to the raw codes that make up the software for modifications
(mod/tweaking). The Linux operating system is a typical example.
Software Installation and Distribution
Software often referred to as applications in this case can be got
and install through two major means:
• Software can come packaged in a CD/DVD drive or stored in a
USB flash from which it can be installed on the computer. This
is common for commercial applications where the seller also
supplies product key or serial number to enable the user
register and validate the installed software.
• Download/Over The Air (OTA): in this process users can
download the software package to their computer from the
developer's website to their computer for installation or install
it directly through the Internet from the developers' host site.
This is a common practice for freeware and open-source
applications.
Software Piracy
This is the illegal installation, copying and sharing of proprietary applications
between users. This is a very common practice in Nigeria were people are
wont to copy software from their friends' computer instead of purchasing the
applications. This is an infringement on developers' rights. There are two
common ways of pirating commercial applications. These are:
• Cracks: this is the use of reengineered files to replace the original file that
contains the license documentation of a software in order to confuse the
computer into accepting that the user has purchased the software.
• Keygen and Serial generators: this is the use of specially created
applications aimed at generating serial numbers for a software locally. So,
instead of using the supplied serial number that would have come with the
purchased version of the software, the pirates simply replicate a new serial
number.
Files
These are named containers of data/information. They
can hold instructions for the computer (software files)
or data for the user. A file can be the product of
computational process such as the designing of
picture or typed term paper. Files can be created
through the use of application software like Microsoft
Word and Pages.
File Types
Each application software has a
particular file type it can create
and those that it can work with.
The files created by an application
is given a unique name after the
user assigned file name known as
the file extension.
Some very common examples of file types and
application software that work with them are:
File Type Extension Application
Documents .doc, .docx, .ppt
MS Word and
PowerPoint
Music .mp3, .wma
Windows media
player
Videos .avi, .mp4, .wmv VLC
Note: note all application software generate user readable files. And
not all application can save files to the user directory. For example
Facebook application and Skype.
File Types
Nest Class…
Design Principles

More Related Content

What's hot (20)

What is Application Software?
What is Application Software?What is Application Software?
What is Application Software?
 
Primary and secondary storage devices
Primary and secondary storage devicesPrimary and secondary storage devices
Primary and secondary storage devices
 
Software (4).ppt
Software (4).pptSoftware (4).ppt
Software (4).ppt
 
Computer Software & its Types
Computer Software & its Types Computer Software & its Types
Computer Software & its Types
 
Types of software
Types of softwareTypes of software
Types of software
 
Presentation on computer software
Presentation on computer softwarePresentation on computer software
Presentation on computer software
 
Operating system
Operating system Operating system
Operating system
 
Software and its types
Software and its typesSoftware and its types
Software and its types
 
Application software
Application softwareApplication software
Application software
 
Types Of Software
Types Of SoftwareTypes Of Software
Types Of Software
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
Computer software
Computer softwareComputer software
Computer software
 
Computer Software
Computer SoftwareComputer Software
Computer Software
 
High level and Low level Language
High level and Low level Language High level and Low level Language
High level and Low level Language
 
Computer Software & It's types.
Computer Software &  It's types.Computer Software &  It's types.
Computer Software & It's types.
 
Operating systems
Operating systems Operating systems
Operating systems
 
Operating system and its types
Operating system and its types Operating system and its types
Operating system and its types
 
System software vs application software
System software vs application softwareSystem software vs application software
System software vs application software
 
Application software
Application softwareApplication software
Application software
 
Computer software
Computer softwareComputer software
Computer software
 

Similar to Introduction to Computer Software and File Types

Similar to Introduction to Computer Software and File Types (20)

COM 115.pdf
COM 115.pdfCOM 115.pdf
COM 115.pdf
 
Lesson 5 computer software
Lesson 5 computer softwareLesson 5 computer software
Lesson 5 computer software
 
computer software
computer softwarecomputer software
computer software
 
Other Systems & Application Software
Other Systems & Application SoftwareOther Systems & Application Software
Other Systems & Application Software
 
Comp App lect 3 (Software).ppt
Comp App lect 3 (Software).pptComp App lect 3 (Software).ppt
Comp App lect 3 (Software).ppt
 
itcpresentationnew-150929164902-lva1-app6891.pdf
itcpresentationnew-150929164902-lva1-app6891.pdfitcpresentationnew-150929164902-lva1-app6891.pdf
itcpresentationnew-150929164902-lva1-app6891.pdf
 
Software
SoftwareSoftware
Software
 
software4-150511081405-lva1-app6892 2.pdf
software4-150511081405-lva1-app6892 2.pdfsoftware4-150511081405-lva1-app6892 2.pdf
software4-150511081405-lva1-app6892 2.pdf
 
Class work 3_computer_network_317
Class work 3_computer_network_317Class work 3_computer_network_317
Class work 3_computer_network_317
 
system Security
system Security system Security
system Security
 
L 10 computer software
L 10 computer softwareL 10 computer software
L 10 computer software
 
Introduction To Computing.pptx
Introduction To Computing.pptxIntroduction To Computing.pptx
Introduction To Computing.pptx
 
Hardware , software and filmware
Hardware , software and filmwareHardware , software and filmware
Hardware , software and filmware
 
Ch03_Software.ppt
Ch03_Software.pptCh03_Software.ppt
Ch03_Software.ppt
 
COM 311 L -2.pptx
COM 311 L -2.pptxCOM 311 L -2.pptx
COM 311 L -2.pptx
 
Exam 1 in ITEP 132
Exam 1 in ITEP 132Exam 1 in ITEP 132
Exam 1 in ITEP 132
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
 
Software ppt
Software pptSoftware ppt
Software ppt
 
L 09 computer software
L 09 computer softwareL 09 computer software
L 09 computer software
 
Kinds of Computer software
Kinds of  Computer softwareKinds of  Computer software
Kinds of Computer software
 

Recently uploaded

How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 

Recently uploaded (20)

How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Advantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessAdvantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your Business
 

Introduction to Computer Software and File Types

  • 2. What is Software Software are sets of computer- readable codes compiled and design to enable computer carry out specific functions. They are also designed to enable humans communicate effectively with their computer by passing simple instructions. The part of a software that links us to pass command to the computer is called the user interface.
  • 3. Types of Software Broadly speaking, there are two types of software: • System software • Application software
  • 4. System SoftwareOperating system, utilities and drivers • Operating system: this software defines the functions of a computer. They are designed specifically to coordinate the functions of the hardware, make hardware accessible to one another and grant application software access to needed hardware. There are three major operating systems today for computers, Windows Operating System, Mac Operating System and Linus Operating System. Each one of these has its own versions (history). For mobile devices, the list is more elaborate but the most common ones are iOS (iPad and iphone operating system), Android, windows mobile OS, Blackberry OS, Fire OS and Symbian OS. • Utilities: these are software that are designed specifically to give the computer user access to organize, customize and carry out maintenance functions in the computer. They include things like Disk Manager and Control Panel Items. • Drivers: these are software that are used to establish linkage between a computer and connected hardware devices. They assist in describing the device to the computer and provides information on its functions and available services which in turn define how the device can be used by the operating and other applications. These include printer drivers and modem software.
  • 5. Application Software These are software packages designed to enable computer users carry out specific functions or have access to computer hardware functionality. Today, the range of software and their functions is near-endless. Application software are often designed by companies and groups to address specific computer user needs. These needs can be to design, to communicate, entertain, educate, data management, healthcare, security and so on. The table below shows some common examples. Developer Name Use Adobes Photoshop Picture editing VLC VLC Multimedia entertainment Microsoft Ms Word Word processing Mozilla Firefox Surfing the Internet GNU project FileZilla FTP manager
  • 6. MalwareViruses, Trojan horses, Worms As the name implies, these are software designed specifically to cause a computer system to malfunction. They are programmed often by skilled developers with malicious intentions. Sometimes also, specialized agencies use these software as tool to combat terrorism and disrupt harmful activities. They often come in a clandestine manner- either within another legitimate software, adware, within a file, or through network activities. They are mostly autorun, that is, they start working as soon as they enter the desired destination (host machine).
  • 7. SpywareSystem monitors, Keyloggers, Adware These are software designed specifically to infiltrate a computer in order to secretly steal information. They penetrate the computer and relay the desired information to the hacker (someone who specialize in secretly gaining access to computers to steal information). The information got through spyware are often administrator access, login details, bank account Information, official secrets, confidential materials and so on.
  • 8. Software License Types • Proprietary: These are software sold/distributed under a registered trademark. A company develops and makes available these software either at a cost or as a free to install package. Commercial/Premium: these are software that are sold to users. The developer markets the software either in form of cd/DVDs or online to users who purchase, download and install in their local computers. However, some offer Trial Version which can be used for a limited period of time or limited functionality. Freeware: these are software that are designed and shipped for free such that one can download them and install without financial commitments. However, it is expected that the user do not distribute these software to other users. • Open source: these are software that are designed primarily to meet user needs and are offered free to install, distribute and modify. In this case, users can get access to the raw codes that make up the software for modifications (mod/tweaking). The Linux operating system is a typical example.
  • 9. Software Installation and Distribution Software often referred to as applications in this case can be got and install through two major means: • Software can come packaged in a CD/DVD drive or stored in a USB flash from which it can be installed on the computer. This is common for commercial applications where the seller also supplies product key or serial number to enable the user register and validate the installed software. • Download/Over The Air (OTA): in this process users can download the software package to their computer from the developer's website to their computer for installation or install it directly through the Internet from the developers' host site. This is a common practice for freeware and open-source applications.
  • 10. Software Piracy This is the illegal installation, copying and sharing of proprietary applications between users. This is a very common practice in Nigeria were people are wont to copy software from their friends' computer instead of purchasing the applications. This is an infringement on developers' rights. There are two common ways of pirating commercial applications. These are: • Cracks: this is the use of reengineered files to replace the original file that contains the license documentation of a software in order to confuse the computer into accepting that the user has purchased the software. • Keygen and Serial generators: this is the use of specially created applications aimed at generating serial numbers for a software locally. So, instead of using the supplied serial number that would have come with the purchased version of the software, the pirates simply replicate a new serial number.
  • 11. Files These are named containers of data/information. They can hold instructions for the computer (software files) or data for the user. A file can be the product of computational process such as the designing of picture or typed term paper. Files can be created through the use of application software like Microsoft Word and Pages.
  • 12. File Types Each application software has a particular file type it can create and those that it can work with. The files created by an application is given a unique name after the user assigned file name known as the file extension.
  • 13. Some very common examples of file types and application software that work with them are: File Type Extension Application Documents .doc, .docx, .ppt MS Word and PowerPoint Music .mp3, .wma Windows media player Videos .avi, .mp4, .wmv VLC Note: note all application software generate user readable files. And not all application can save files to the user directory. For example Facebook application and Skype. File Types

Editor's Notes

  1. The part of a software that links us to pass command to the computer is called the user interface.