• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Categories of software.

Extracts from this document...

Introduction

Categories of Software Project To: Williams and Smith Accounting Services From: Adam Ashton Date: Friday, 06 January 2006 Re: Categories of Software Introduction In this report I will explain the different types of software that are available, show what their purpose is and their advantages and disadvantages. Hardware and Software Before I start, I will explain the difference between software and hardware as many people mix up these terms. Hardware refers to the parts of a computing system that you can actually touch or see. This means things like the monitor, the keyboard and mouse etc. The computer circuit boards, the printer and all the disc drives are part of the hardware of the system. All these are the things that are manufactured and assembled in a factory. The software of the system means the program's which have to be written by a computer programmer. These things may well be stored inside the computer, perhaps in magnetic form on a hard disc. You cannot actually see the software; it is stored in coded form, as a series of '1's and '0's which only the computer can understand. ...read more.

Middle

Utility programs help manage, maintain and control computer resources. These programs are available to help you with the day-to-day chores associated with personal computing and to keep your system running at peak performance. Some utility programs come together with certain operating system. Some examples of utility programs include: * Virus scanning software * Backup software * Scandisk * Disk defragmenter * Deleting, renaming and copying of files Compilers and Interpreters are types of software used to translate the statements from a programming language to machine language. Computers only understand one language, and that is a series of 1's and 0's. It is very difficult to program software in machine language so programming languages that are easier to understand and more like English we're introduced along with interpreters/compilers. Compilers differ from Interpreters in that once a program has been compiled, it is saved in the machine language and then that file can be run over and over without needing to be compiled again. Interpreters do the same job however; it does not save the file in its compiled format - if it ever needs to be run again it must be interpreted (compiled) ...read more.

Conclusion

Once the software has been designed and developed it is then sold to your business. This is called Bespoke Software. This is an application or utility that is designed or tailored for a business or person's specific needs. The benefits of this are that it is designed specifically for you, which should help improve efficiency in your business. However, it is expensive. The Second is to buy the product 'Off the Shelf' this is where the product has already been made and you just buy from a shop ready made. This is cheaper than bespoke software and you can be sure it has been tested by many people but it might not be what you are looking for in a software package. I hope you found my report on the 'Categories of Software' useful in explaining and choosing the right software for your business. There is, however, far more information on the internet on types of software, especially for operating systems. Resources used: 'Information and Communication Technology for AS level' by Julian Mott and Anne Leeming. 'A Level Computing' by P.M Heathcote www.webopedia.com www.getnetwise.org ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Management & Manipulation of Information section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Management & Manipulation of Information essays

  1. Marked by a teacher

    Hardware and Network issues in e-commerce

    5 star(s)

    The development of a Public Key Infrastructure (PKI) enables the four critical aspects of security- privacy, authentication, integrity and non-repudiation. For added security the PKI is facilitated by the provision of security certificates, registration and validation systems. The combination of these facilities help to ensure tight security for a majority of m-commerce transactions.

  2. Marked by a teacher

    STELLA Science Simulation Software.

    The example of the sample model that can be found in the STELLA website is pendulum story. A simple pendulum is one which can be considered to be a point mass suspended from a string or rod of negligible mass. It is a resonant system with a single resonant frequency.

  1. Analysis of market, environmental forces, competitors, marketing mix and consumer implementation.

    Sponsors such as men's magazine "Maxim", Smirnoff Vodka and Hollywood premiers are just a few of the high budget sponsorships supporting the company. Nintendo have been at the forefront of the handheld consoles sector since 1990, when it launched its GameBoy.

  2. Standard Operating Procedures (Sop) recruitment policies and procedures.

    As mentioned above, you need to know where the qualification requirements were inputted. When you locate the qualification requirements you must select the requirements that relate to the applicant by placing the cursor in the box where the requirement is inputted, then ACCEPT the information.

  1. Designing a booking system for an Estate Agent.

    Interview Transcript 1. How many other employees do you work with in this branch? I work with three other employees with different job titles but everyone has the same goal; to sell properties. 2. Does everyone use computers and which type of software does the company use?

  2. Planning a payroll system for a martial arts school.

    Identifying the users I was asked by Winston Newton to produce a payroll system which is effective and has high data storage capacity in order to manage with high demands and linked directly to the booking system which also should be upgraded.

  1. Background and investigation for designing a database for a DVD rental shop.

    If these files were linked relevant data and information could be retrieved. When Mr. Bradshaw wants to select 25 films to return to choices uk, he uses his own knowledge and judgement on whether a movie is not being rented or is unpopular.

  2. ICT Security Report

    Phishing Phishing is viewed as a form of social engineering. It is characterised by a persons attempt to fraudulently acquire sensitive information. This can include passwords and credit card details, and is done by a malicious person masking themselves as a trustworthy person or business that is seemed to be an official electronic communication.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work