Chapter 3: Software Flashcards

1
Q

Software, and Programs

A

An algorithm that is coded for a computer to use in order to perform tasks. (Generally known as software. Software also includes the associated data the program needs).
Software is written using programming languages, a type of software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The three main categories of software:

A

1) Systems software (controls hardware/operating system)
2) Development/Utility software (programming languages, and utilities)
3) Application software (real-world jobs, apps e.g. Microsoft Word)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Dedicated system

A

Have software installed on a chip of some sort. This software is specific to the job, and is only changes when updated. For example, a washing machine embedded system is only ever going to run software to control a washing machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Multi-purpose system

A

Computers such as laptops, tablets, PCs, and phones regularly run different prgrams according to the wishes of the user. They store their software on a secondary storage medium such as a hard disk, memory stick, SD card, or optical disk (CD, or DVD).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

System software

A

The software that controls the hardware, and operating system.
Acts as an intermediary between the application, and the hardware:
- Hides the complexities of the hardware from the user, and application programmers.
- Allows the user to operate the computer without having to wire programs.

At the heart of the operating system is the kernel, this is the part that actually makes the hardware do things.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

User interface software

A

The user interface is the boundary between the human user, and the machine. It

  • Lets the user give commands
  • Asks questions
  • Displays a response

See Command line interface, Graphical User Interface (GUI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

User Interface Software: Command line interface

A
  • Requires the user to type commands that are then translated by a command interpreter into signals that the computer can understand.
  • You can completely control a computer with these commands which is why technicians, and programmers like using them.
  • They also find it useful to group commands in shell scripts to carry out maintenance jobs automatically. A shell is a software that the user needs to communicate with the kernel.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

User Interface Software: Graphical User Interface (GUI)

A
  • Uses images, known as icons, to represent resources, files, programs, and actions.
  • The user either clicks on areas of the screen with the mouse, or touches, or pinches them to make things happen.
  • GUIs are useful to interact with the computer as they are intuitive, you don’t need any training, keyboard use is limited, and no commands need to be learned.
  • This interface sits on top of the operating system kernel, and allows easy access to many everyday features such as selecting software, selecting files, sending messages, controlling sound volume, connecting to Wi-Fi, and updating software.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

User Interface Software: Touch screens

A

Some interfaces are designed for phones, or tablets. These are not designed for mouse input, but various actions of the fingers such as pinch, drag, or tap.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

User Interface Software: Natural language, and speech

A

Some interfaces accept normal speech as input, This is difficult as speech can vary (accent, pace, dialect, clarity of diction).

Speech input is useful for selecting options on telephone menus, giving commands to a computer, and dictating text.

The production on television programmes involves speech recognition software, but mistakes can be made.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Memory Management

A

Operating systems have to decide what goes where in memory. They must ensure that memory is used efficiently, and important data is not overwritten during the running of a program.

To do this memory is divided into pages.
A program, when it is being executed, is called a process.

When a job needs to be done, a process is loaded into a vacant page. The operating system keeps track of this, and protects it from being overwritten by other processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Memory Management: Virtual Memory

A

Sometimes there are more jobs than space in memory. The OS then swaps jobs in, and out of memory, using a technique called virtual memory.

Virtual memory (‘not real’ memory) uses secondary storage/the disk to hold parts of the program that are not currently needed. It is slower to access than main memory.

A large program may take up too much space so it is divided into modules.

  • The modules are stored separatly on secondary storage.
  • When a module is needed it is loaded into memory, and run as a process.
  • When a different module is needed, it can overwrite an unused module.

The OS must keep track of which pages are vacant, and which processes are currently being swapped in, and out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Memory Management: Peripheral Management

A

Files can be:

  • Data files e.g. a word processed document, a database
  • Program files e.g. OS components, applications
  • Configuration data e.g. the parts of the Windows registry

The OS is responsible for keeping track fo all of the files in a system, and must know exactly where each file is stored on the storage medium.

When you save a file the OS looks up where there is free space on the medium, writes the data to the medium, and makes a record of where it is located. Next time that you want the file the OS looks up where it is, finds it, and retrieves it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

File

A

A named store of data on a secondary storage medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Memory Management: Fragmentation, and Defragmentation

A

Secondary storage is divided into segments. Files are often larger than the size of a segment, so they are split into blocks across many segments. These segments could be anywhere on a storage medium.

If a file is split across many locations it takes longer to read, and write it. Each blocks contain pointers (informations) about the location of the next block, so the OS can follow the pointers to retrieve the whole file.

After a while, access to the file slows down. Defragmentation can be used to tidy up the disk, or other medium so that each of the parts of the files are moved to be stored next to each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Memory Management: Device Drivers

A

The OS has to control all the input, and output from a system. New input, and output devices must be accomodated.

The manufacturers proved device drivers. This software:

  • Creates an interface so programmers don’t need to be concerned with the peculiarities of the device.
  • Allows the OS to communicate with the device.
  • Allows devices to operate indepentantly of each other.
17
Q

Memory Management: Multitasking

A

Most all-purpose systems have several programs loaded into memory at the same time. This is called multiprogramming.

It seems to the user like processes are running at the same time, but the OS shifts its attention between processes so quickly that we don’t notice. This called multitasking.

A multiprogramming OS must:

  • Make sure the CPU is in use as much as possible
  • Try to speed up the operation of all tasks.
  • Share resources fairly between tasks.

When there are several processes sharinga single processor the OS uses a scheduler to allocate time according to a policy such as:

  • Shortest job first.
  • All jobs get equal time.
  • First task first.
  • More important jobs first
18
Q

Files, and Directories: File Systems

A

OS organise files on secondary storage. Mst use hierarchical systems:

  • Files are stored in directories.
  • Directories can have subdirectories.

A directory is a logical grouping of files (in Windows systems directories are called files), and are useful as they:

  • Make it easier for the user to locate related files.
  • Allow the repeated use of the same file name in different locations.
19
Q

Directory

A

A logical grouping of files.

20
Q

Files, and Directories: File extensions

A

Some file systems use file extensions. These are parts of the file name that indicate what type of file it is (in Windows systems the file extension is given after a dot).

Extension: Meaning:
doc Word document
pdf Portable Document Format- useful for storing documents in an exactly designed format.
html Hyper text markup language -web pages
xls Microsoft Excel spreadsheet
mdb Microsoft Access database
exe Executable - a program that can be run
jpg Compressed image file format
mp3 Common music file format

21
Q

Files, and Directories: Attributes

A

Files can be given different attributes which provide extra information about a file e.g. the creator, who can view or edit it, whether it is read-only, whether it is hidden, last access date, date it was last changed, file size, archive flag (whther it has beem backed up).

22
Q

Security: Viruses

A

Viruses are programs that replicate themselves. They attach themselves to legitimate programs. They often have a payload which is designed to do things such as:

  • Damage files
  • Take control of the computer
  • Retrieve confidential data

Some viruses have no payload, but can still cause damage.
Some OSs, such as Windows, allow users, and viruses high levels of privilage. Unix, and Linux systems are more tightly controlled so viruses are much less of a problem.

23
Q

Security: Authentication

A

OS usually allow the authenticaton of users. This means that they can be set up to check that the user is who they say they are. This normally involves:

  • User IDs: checks who they are, and their privileges
  • Passwords: confirms that they are who they say they are.
24
Q

Security: Privileges

A

Privileges are the rights assigned to users, and groups. They may include features such as whether for a particular file the user can:

  • Read (view it)
  • Write (change it)
  • Execute (run it- if it is a program)
25
Q

Security: Encryption

A

Some files are encrypted, they are transformed in such a way that an unauthorised person cannot understand them. It is common for user passwords to be stored in an encrypted state.

26
Q

Programming Software: Editors

A

Editors (or text editors) are cut-down word processors. They allow text files to be created, saved, read, and changed.

They do not save extra characters such as formatting information.

They are partially useful for writing the source code of programs, and editing configuration files.

All OSs come with a variety of editors as standard e.g. Notepad (Windows), Notepad (Yahoo), vi (Unix), nano (Unix equivalents).

27
Q

Programming Software: Linkers

A

These combine modules of object code (compiled program code) into a single executable program.

28
Q

Programming Software: Interpreters

A

These convert typed commands into the machine instructions that the processor understands.

29
Q

Applications

A

Applications are the programs that people use to do real world jobs

e.g. Word processors, autopilots, traffic light controls, payroll processing, hotel booking systems, engine management systems

30
Q

Utilities

A

Software tools that help make maintaining the system easier. Most OSs come with lots fo utilities.

e.g. Antivirus utilities (detect, and remove viruses- self-replicating programs), Spyware protection (check for, and removes programs that record your website uses, and passwords), Firewalls (monitor traffic entering, and exiting a system)

Disk organisation utilities include:

  • Formatting: prepares new media for recieving data.
  • File transfer: copies files from one location to another.
  • Defragmentation: reorganises files that have been split on secondary storage to be closer together, and therefore faster to access.

System maintenance utilities: clear redundant files, update registry entries, and check for missing information.

System information, and diagnosis utilities: check for problems on secondary storage, or report disk, and memory usage.

System clean up tools: search for unused files, and clear them out. They can also be used to clear internet cache files, cookies, and history files.

Automatic updatig utilities: check online for updates at intervals. Some systems do this automatically, and some ask first. Virus checkers often update regulary.

31
Q

Software Procurement

A

Software can be obtained from various sources. System managers must make choices so that their system gets software that is required, that the users want to use, on time, at a reasonable cost, and of an acceptable quality.

32
Q

Software Procurement: Custom written software

A

Software specially commisioned for a particular customer.

+ ives:

  • Exactly right features
  • Doesn’t need special adaptations after installation
  • Maintenance contract arranged with developer
  • Developer can be contracted to solve issues
  • Developer may provide training
  • ives:
  • May not be extensively tested
  • May be expensive (developer needs proftit from just one customer)
  • May take a long time
33
Q

Software Procurement: Off the shelf software

A

‘Shrink wrapped’ software. Can be bought from a supplier already boxed up, and ready to install e.g. Microsoft Office, Windows, Norton security software

+ ives:

  • Ready immediately
  • Probrably been extensively tested
  • Other users will already have reported any problems
  • Lots of forums online for help
  • Low cost (developer’s costs are shared among many)
  • ives:
  • May not be exactly what user needs
  • May need extensive customisation
  • Customer may have to find training providers
34
Q

Software Procurement: Open source software

A

Software that has been placed in the public domain by the programmers e.g. Firefox, Libre office, Linux

+ ives:

  • May be free of charge
  • Can altered as source code is available
  • May be extremely reliable, and efficient as many people may work to improve it
  • ives:
  • No maintenance contracts
  • No one to contact if there are any problems
  • Irregular, or no updates
  • Software may be for a different platform than the one the company currently owns
35
Q

Software Procurement: Proprietary software

A

Software that is developed for profit by a company. The source code is retained as a valuble trade secret, and only the complied code is released. Users buy a licence to use it.

+ ives:

  • Someone to go to if there is a problem
  • Extensively tested
  • Regulary scheduled updates
  • ives:
  • Can be expensive
  • Deliberate incompatibilities may be introduced so users get locked in
  • May be inflexible to user’s needs