• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Application Software

Extracts from this document...

Introduction

´╗┐My Chapter 7 ? Application Software Word Processors Examples include Microsoft Word, Corel Word Perfect and OpenOffice.org Writer. Word processors have many features such as 1. Inserting and moving text. 2. Spelling and Grammar checking. 3. Graphics Manipulation ? allows graphics to be inserted into a document. Database Management Systems (DBMS) Examples include Filemaker and Microsoft Access. A database is a collection of related data. While simple databases can be built using a spreadsheet, purpose built database management systems exist to manage more complicated set of data. Spreadsheets Examples include 1-2-3, Open Office.org Calc and Microsoft Excel. Spreadsheets are ideally suited for the manipulation of numerical data and are heavily used in finance and engineering. 1. Easily see what could happen to a persons finances. Spreadsheets can be used in: 1. Managing household budgeting and finances. 2. Recording marks in a school 3. A petrol station performing ?What If? analysis. 4. Analysing and predicting statistical trends such as population. Desktop Publishing (DTP) Examples include Adobe Pagemaker, Scribus and Microsoft Publisher. DTP packages were capable of graphics and manipulation and varying page layouts compared to Word Processing packages. However, the most obvious difference between both is that DTP can only function on one page at a time whereas Word Processing Packages can run on to another page. ...read more.

Middle

This does, of course, depend on the user having a copy of internet explorer. Similar tools, allowing access to features of certain web-servers exist in other browsers. Functions of a Web Browser At a minimum, a web browser should display HTML pages and any linked graphics or audio. It should also allow the user to enter data from submission to a website. However, modern browsers incorporate a large number of additional features. At the time of writing, these include the following: 1. Bookmarks ? called favourites in some browsers. Allow a user to store a list of their favourite sites for easy access, rather than having to write out a list of web addresses. They can usually be sorted into folders. 2. Plug Ins ? extra programs that display data that is not in standard HTML format. Popular plug ins include adobe flash player and adobe acrobat rader. 3rd party plug ins, often known as widgets, are also available for some browsers. 3. Tabbed browsing ? if a user if working between several websites, the screen can become very cluttered with windows. Allow the user to open several pages inside the one main browser window. This was developed by Opera and late included include in Firefox and internet explorer 7. ...read more.

Conclusion

2. News sites such as Google news. Present a summary of news headlines from a number of sources. This site can be customized by the user, allowing control over what sort of stories are shown and what sources are used. It can even be instructed to email relevant stories to register users. 1. Shopping Comparison Sites ? such as kelkoo allow users to search many shopping sites for a given product. The results are presented on a single page listing many vendors and their price for the product. Sae principals have been applied to travel (e.g. expedia) and financial loans (e.g. money supermarket) 1. Sites that restrict content ? sites that restrict content to a particular subject area. Torrent spy, for example only searches for BIT TORRENT files while blogscope only searches blogs. Northernirelandprepertynews.com restricts results to local house for sale, allowing users to specify criteria such as area, price and number of bedrooms. 1. Emailed based search engines ? such as TEK (Time Equals Knowledge) which was developed by MIT for use in countries with low bandwidth. A user can email a request to the TEK server, which carries out a search while the user is offline and emails data from the most relevant pages back to the user server at a non-peak usage time for the user to access at a time convenient to them. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a teacher thought of this essay


This is a well structured and set out piece of work. the notes are relevant and some of them are very detailed, particularly the sections related to the Internet.

Examination questions often ask for specific examples of features within software that are unique to that type of application and it is accepted that this is becoming increasingly difficult to do because so many pieces of software overlap in terms of their functionality. This is something that students need to be mindful of. It is really important that they stick to a rigorous example for each type of application that they can use in an exam. This is relevant to these notes as the first part of the document which reviews general purpose software such as word processors is a little limited on this detail.

Overall this is a four star piece of work that would be improved by more detail in the reviewing of office type applications mentioned at the beginning.

Marked by teacher Ad Son 03/01/2013

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    E-Commerce Laws and Legislation - The Data Protection Act

    4 star(s)

    If cookies are disabled you cannot stay logged in, which would mean you could not make any purchases. E-commerce can lose money if users do not consent to cookies being used and as a result cannot log in to

  2. Marked by a teacher

    Compare the effectiveness of different transmission methods.

    Copper Core 2. Outer Plastic Sheath 3. Braided Copper Shielding 4. White Polythene Inner Insulator (dielectric) On the other cables the recent braided copper shield surrounds the insulator for fault protection and etc, this shield which is also known or also is or as a screen blocks electromagnetic interference.

  1. Unit 21: Working with ICT Hardware and Equipment

    As new viruses are created everyday it is important to keep virus software up to date if it is not kept up to date the virus software may not be able to detect new viruses. This will increase the risk of a virus infecting a computer.

  2. Threats to Data

    Threats from outside the Organisation Threats from outside the organisation tend to be mainly from hackers. These are people who try to get into someone else's computer. There are four major types of hackers: The first type of hacker do it mainly to show people that they can and do

  1. The Impact of Mobile Phones on social Interaction

    Bell Labs proposed a cellular system to the FCC of many small, low-powered, broadcast towers, each covering a 'cell' a few miles in radius and collectively covering a larger area. The system proposed that each tower would use only a few of the total frequencies allocated to the system and

  2. Using examples, discuss the advantages/disadvantages of proportional representation systems compared to the ‘first past ...

    (Smyth 1992). It's not unusual for nearly 70% of all votes (those for losing candidates) to be effectively wasted, as they do not count towards the election of the MP. Moreover, votes for winning candidates in safe seats tend to accumulate into huge majorities (The Guardian 1991).

  1. Identify, possible future developments in ICT and explain the impacts they might have on ...

    What we have now in the supermarkets is an in place set barcode scanner under a till, with a red transparent layer. What the sales do normally is physically scan the products on the till. For possible future development on this, we can have an automatic scanner on the till

  2. During my coursework I will be inventing an Ict system for Mr Robert black ...

    they go on my Ict system and enter the code if that item is in store then the costumer can buy that item. Moreover, the stock keeper will also need to use the Ict system due to he will have to track the order which can be done in the system because the order was sent using the Ict system.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work