• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Application Software

Extracts from this document...

Introduction

´╗┐My Chapter 7 ? Application Software Word Processors Examples include Microsoft Word, Corel Word Perfect and OpenOffice.org Writer. Word processors have many features such as 1. Inserting and moving text. 2. Spelling and Grammar checking. 3. Graphics Manipulation ? allows graphics to be inserted into a document. Database Management Systems (DBMS) Examples include Filemaker and Microsoft Access. A database is a collection of related data. While simple databases can be built using a spreadsheet, purpose built database management systems exist to manage more complicated set of data. Spreadsheets Examples include 1-2-3, Open Office.org Calc and Microsoft Excel. Spreadsheets are ideally suited for the manipulation of numerical data and are heavily used in finance and engineering. 1. Easily see what could happen to a persons finances. Spreadsheets can be used in: 1. Managing household budgeting and finances. 2. Recording marks in a school 3. A petrol station performing ?What If? analysis. 4. Analysing and predicting statistical trends such as population. Desktop Publishing (DTP) Examples include Adobe Pagemaker, Scribus and Microsoft Publisher. DTP packages were capable of graphics and manipulation and varying page layouts compared to Word Processing packages. However, the most obvious difference between both is that DTP can only function on one page at a time whereas Word Processing Packages can run on to another page. ...read more.

Middle

This does, of course, depend on the user having a copy of internet explorer. Similar tools, allowing access to features of certain web-servers exist in other browsers. Functions of a Web Browser At a minimum, a web browser should display HTML pages and any linked graphics or audio. It should also allow the user to enter data from submission to a website. However, modern browsers incorporate a large number of additional features. At the time of writing, these include the following: 1. Bookmarks ? called favourites in some browsers. Allow a user to store a list of their favourite sites for easy access, rather than having to write out a list of web addresses. They can usually be sorted into folders. 2. Plug Ins ? extra programs that display data that is not in standard HTML format. Popular plug ins include adobe flash player and adobe acrobat rader. 3rd party plug ins, often known as widgets, are also available for some browsers. 3. Tabbed browsing ? if a user if working between several websites, the screen can become very cluttered with windows. Allow the user to open several pages inside the one main browser window. This was developed by Opera and late included include in Firefox and internet explorer 7. ...read more.

Conclusion

2. News sites such as Google news. Present a summary of news headlines from a number of sources. This site can be customized by the user, allowing control over what sort of stories are shown and what sources are used. It can even be instructed to email relevant stories to register users. 1. Shopping Comparison Sites ? such as kelkoo allow users to search many shopping sites for a given product. The results are presented on a single page listing many vendors and their price for the product. Sae principals have been applied to travel (e.g. expedia) and financial loans (e.g. money supermarket) 1. Sites that restrict content ? sites that restrict content to a particular subject area. Torrent spy, for example only searches for BIT TORRENT files while blogscope only searches blogs. Northernirelandprepertynews.com restricts results to local house for sale, allowing users to specify criteria such as area, price and number of bedrooms. 1. Emailed based search engines ? such as TEK (Time Equals Knowledge) which was developed by MIT for use in countries with low bandwidth. A user can email a request to the TEK server, which carries out a search while the user is offline and emails data from the most relevant pages back to the user server at a non-peak usage time for the user to access at a time convenient to them. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a teacher thought of this essay


This is a well structured and set out piece of work. the notes are relevant and some of them are very detailed, particularly the sections related to the Internet.

Examination questions often ask for specific examples of features within software that are unique to that type of application and it is accepted that this is becoming increasingly difficult to do because so many pieces of software overlap in terms of their functionality. This is something that students need to be mindful of. It is really important that they stick to a rigorous example for each type of application that they can use in an exam. This is relevant to these notes as the first part of the document which reviews general purpose software such as word processors is a little limited on this detail.

Overall this is a four star piece of work that would be improved by more detail in the reviewing of office type applications mentioned at the beginning.

Marked by teacher Ad Son 03/01/2013

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Compare the effectiveness of different transmission methods.

    Copper Core 2. Outer Plastic Sheath 3. Braided Copper Shielding 4. White Polythene Inner Insulator (dielectric) On the other cables the recent braided copper shield surrounds the insulator for fault protection and etc, this shield which is also known or also is or as a screen blocks electromagnetic interference.

  2. Unit 21: Working with ICT Hardware and Equipment

    As new viruses are created everyday it is important to keep virus software up to date if it is not kept up to date the virus software may not be able to detect new viruses. This will increase the risk of a virus infecting a computer.

  1. Consider five models of communication – Linear, Circular, Argyles, Hargies and Hartleys

    Argyles social skills model of communication is a method of passing information from one individual to another.

  2. Life in the information age

    makes a huge impact on most of the areas in our lives. It also gives a little support to the criminals and gives them more options or recources so it does concern many people if they live in a secure computing environment for e.g.

  1. Threats to Data

    to make some money on the side and the company will have to protect itself from the inside as well as the outside. Often overlooked is the threat to data from accidental damage and acts of God. The organisation cannot function without this data so it is important that it is not lost or damaged.

  2. Identify, possible future developments in ICT and explain the impacts they might have on ...

    What we have now in the supermarkets is an in place set barcode scanner under a till, with a red transparent layer. What the sales do normally is physically scan the products on the till. For possible future development on this, we can have an automatic scanner on the till

  1. During my coursework I will be inventing an Ict system for Mr Robert black ...

    given the role to take care of the company?s day to day finance. Under the manager there are four people, firstly it is the employees the people who stock the shelf and assist and help the customer?s. Secondly, it is the cashier who works at the till and scans the

  2. Discuss the Causes and Effects of the Digital Divide

    extract explains that the rich will always be one step ahead of the poor because the rich have the sufficient funds to invest in computers and software?s that will benefit them but the poor will stay poor because they do not have the money required to invest in thing that will benefit them and boost their income.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work