3 Section C: Installing Software and Upgrades  Web Apps  Mobile Apps  Local Applications  Portable Software  Software Upgrades and Updates  Uninstalling.

Slides:



Advertisements
Similar presentations
The Web Wizards Guide to Freeware/Shareware Chapter Two Downloading and Installing Software.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Computer Software 3 Section A Software Basics CHAPTER PARSONS/OJA
© Vera Castleman Software Grade 10. What is software? A program is a collection of instructions to do a job. Programs are collectively known as SOFTWARE.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Application Software Chapter 6.
Computer Concepts Chapter3 & 4 Summary Dr. John P. Abraham Professor.
Chapter 3 Software.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 3 Computer Software.
Computer Software.
Chapter 3 Computer Software.
A Quick Review of Unit 1 – Recognizing Computers Computing Fundamentals © CCI Learning Solutions.
HOMEWORK PAGE STAND ALONE PROGRAMS FUNCTION ON THEIR OWN AND SOMETIMES CANNOT SHARE DATA WITH OTHER PROGRAMS. INTEGRATED SOFTWARE COMBINES.
Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition Lesson 7 Software Management 1 Morrison / Wells / Ruffolo.
No.24 Prerawat Denvutivorkarn M.2/2. Definition: "antivirus" is protective software designed to defend your computer against malicious software. Malicious.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Chapter Nine Maintaining a Computer Part III: Malware.
Practical PC, 7th Edition Chapter 3: Getting Started with Software
Computer Software Chapter 3. 3 Chapter 3: Computer Software2 Chapter Contents  Section A: Software Basics  Section B: Popular Applications  Section.
Computer Concepts 2013 Chapter 3 Software. 3 Software Categories Chapter 3: Software 2  Software is categorized in two main categories:  Application.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Chapter 3 Computer Software.
Computer Concepts 2013 Chapter 3 Software. 3 Chapter Contents  Section A: Software Basics  Section B: Office Suites  Section C: Installing Software.
Lecture 4: Software Tonga Institute of Higher Education IT 141: Information Systems.
Security Software Basics
TC2-Computer Literacy Mr. Sencer February 8, 2010.
Microsoft Office 2010 Introduction to Computers and How to Purchase Computers and Mobile Devices.
Computer Concepts & Careers Exam 1 Study Guide. Hardware What is RAM? – Random Access Memory – A temporary holding area for data, application instructions,
Computer Concepts – Illustrated 8 th edition Unit C: Computer Software.
Introducing, Installing, and Upgrading Windows 7 Lesson 7.
Introduction to Computing Chapter 2 – Part 2 Industry of Computing William Johnson Julia Benson-Slaughter
Operating Systems Concepts 1/e Ruth Watson Chapter 4 Chapter 4 Windows Utilities Ruth Watson.
Computer Software CSCI N207 Data Analysis Using Spreadsheet Department of Computer and Information Science, IUPUI.
Lesson 14: Installing and Uninstalling Programs how to install a new program what to do if the new program doesn’t work how to uninstall a program © CCI.
Application Software Performs a specific job or task. Helps people use their computers to perform their work more effectively. Categorized in two ways.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Types of Electronic Infection
信息处理技术 Technology of Information Processing 潘晟旻 Instructor: Pan Shengmin 潘晟旻 Computer Center. Kun Ming University of Science & Technology.
Software Categories Figure 3-1.
Chapter Six Maintaining a Computer Part II: Installing, Repairing, and Removing Applications.
XP Practical PC, 3e Chapter 3 1 Installing and Learning Software.
Chapter 3 Installing and Learning Software. 2Practical PC 5 th Edition Chapter 3 Getting Started In this Chapter, you will learn: − What is in an application.
Computer security By Isabelle Cooper.
Security and Ethics Safeguards and Codes of Conduct.
1 Computer Technician Computer Software: Types, Setup, and Ethical Boundaries Copyright © Texas Education Agency, All rights reserved.
Software Installation and Copyrights Basic Computer Concepts Installation Basics  Installation Process  Copy files from distribution disks.
Any criminal action perpetrated primarily through the use of a computer.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information.
Sniper Corporation. Sniper Corporation is an IT security solution company that has introduced security products for the comprehensive protection related.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Computers Tools for an Information Age Software Systems and Applications.
Managing Windows Security
Chapter 3 Installing and Learning Software
Chapter 3 Software.
Chapter 3 Installing and Using Software
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Computers Tools for an Information Age
Computer Concepts Module 3
Presentation transcript:

3 Section C: Installing Software and Upgrades  Web Apps  Mobile Apps  Local Applications  Portable Software  Software Upgrades and Updates  Uninstalling Software Chapter 3: Software1

3 Question  Suppose that you’re looking for software to convert a YouTube video into a format you can use with Windows Media Player or iMovie. You don’t want to bother downloading or installing any software on your computer. What should you look for?  A. A Web app  B. Open source software  C. A.zip file  D. A portable app Chapter 3: Software2

3 Web Apps  Software installation is a process that places a program into a computer so that it can be run or executed  A Web application, or Web App, is software that is accessed with a Web browser  Example of cloud computing  Many are associated with consumer sites  Most require no installation at all on your local computer or handheld device Chapter 3: Software3

3 Web Apps Chapter 3: Software4

3 Mobile Apps  A mobile app is designed for a handheld device, such as a smartphone, tablet computer, or enhanced media player  Most handheld devices can use both Web apps and mobile apps  Mobile apps can be purchased from an app store  Apple App Store  Android Market  Apps are available from other sources, but using them requires an unauthorized change to the device’s software called a jailbreak Chapter 3: Software5

3 Mobile Apps Chapter 3: Software6

3 Local Applications Chapter 3: Software7

3 Local Applications  Most local applications contain a setup program that guides you through the installation process  At least one of the files included in a software package is an executable file designed to be started by users or automatically launched by the operating system Chapter 3: Software8

3 Local Applications Chapter 3: Software9

3 Local Applications Chapter 3: Software10

3 Portable Software  Portable software is designed to run from removable storage, such as a CD or USB flash drive  Installation is simply a matter of getting program files to the media on which they are supposed to run Chapter 3: Software11

3 Portable Software Chapter 3: Software12

3 Software Upgrades and Updates  Periodically, software publishers replace older versions of a software product with a new version that’s sometimes referred to as a software upgrade  A software update is a small section of program code that replaces part of the software you currently have installed  Service packs Chapter 3: Software13

3 Software Upgrades and Updates  Updates are usually available online for registered software  Automatic Update option  Always install updates and service packs when they become available  Many software publishers require users to type in a validation code to complete an upgrade Chapter 3: Software14

3 Uninstalling Software  Uninstall routines delete the software’s files from the various folders on your computer’s hard disk Chapter 3: Software15

3 Section D: Buying Software  Consumer Basics  Software Copyrights and Licenses Chapter 3: Software16

3 Question  Suppose you purchase a new computer and it comes with Microsoft Office installed. After using this software for 30 days, it displays a message indicating that to keep using it, you will have to pay. This software is an example of all of the following EXCEPT:  A. Proprietary software  B. Open source software  C. Commercial software  D. Demoware Chapter 3: Software17

3 Consumer Basics  Most operating systems include a handful of small applications and a good variety of useful utility software Chapter 3: Software18

3 Consumer Basics  System requirements specify the operating system and minimum hardware capacities necessary for a software product to work correctly Chapter 3: Software19

3 Software Copyrights and Licenses  A copyright is a form of legal protection that grants the author of an original “work” exclusive rights  Copyright notice  Software licenses, also called license agreements, define the ways in which you may use a computer program  Single-user license  Site license  Multiple-user  Concurrent-use license  Shrink-wrap license Chapter 3: Software20

3 Software Copyrights and Licenses  EULA (End-User License Agreement)  Different types of software licenses  Public domain  Proprietary  Commercial software  Demoware  Shareware  Open source  BSD  GPL Chapter 3: Software21

3 Software Copyrights and Licenses Chapter 3: Software22

3 Software Copyrights and Licenses  Freeware is copyrighted software that is available for free  Product activation is a means of protecting software from illegal copying by requiring users to enter a product key or activation code before the software can be used  A hash value is a unique number derived from encoding one or more data sets, such as names, serial numbers, and validation codes Chapter 3: Software23

3 Section E: Security Software  Security Software Basics  Security Suites  Antivirus Modules Chapter 3: Software24

3 Question  Let’s assume that you have antivirus software installed on your computer and it is up to date. You can trust it to do a pretty good job of protecting your computer from viruses and:  A. Bots, worms, Trojans, keyloggers, and rootkits  B. RATs, spoofs, and defective Web apps  C. Operating system security holes  D. Fake e-commerce sites Chapter 3: Software25

3 Security Software Basics  Security software is designed to protect computers from various forms of destructive software and unauthorized intrusions  The terms malicious software and malware refer to any computer program designed to surreptitiously enter a computer, gain unauthorized access to data, or disrupt normal processing operations Chapter 3: Software26

3 Security Software Basics  Computer virus  Computer worm  Mass-mailing worm  Trojan horse  Remote Access Trojan (RAT)  Bot  Spider  Botnet  Spyware Chapter 3: Software27

3 Security Software Basics Chapter 3: Software28

3 Security Software Basics  The term rootkit refers to software tools used to conceal malware and backdoors that have been installed on a victim’s computer  A virus hoax usually arrives as an message containing dire warnings about a supposedly new virus on the loose Chapter 3: Software29

3 Security Suites  A security suite integrates several security modules to protect against the most common types of malware, unauthorized access, and spam  A security suite costs less than purchasing standalone security modules Chapter 3: Software30

3 Security Suites Chapter 3: Software31

3 Antivirus Modules Chapter 3: Software32

3 Antivirus Modules  Antivirus software is a type of utility software that looks for and eradicates viruses, Trojan horses, worms, and bots  A virus signature is a section of program code, such as a unique series of instructions, that can be used to identify a known malicious program, much as a fingerprint is used to identify an individual  Virus signatures and other information that antivirus software uses to identify and eradicate malware is stored in one or more files usually referred to as virus definitions Chapter 3: Software33

3 What Do You Think?  Do you believe that software piracy is a serious issue?  A. YesB. NoC. Not sure  Do you know of any instances of software piracy?  A. YesB. NoC. Not sure  Do you think that most software pirates understand that they are doing something illegal?  A. YesB. NoC. Not sure  Should software publishers try to adjust software pricing for local markets?  A. YesB. NoC. Not sure Chapter 3: Software34

Computer Concepts 2013 Chapter 3 Complete