Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computers Tools for an Information Age

Similar presentations


Presentation on theme: "Computers Tools for an Information Age"— Presentation transcript:

1 Computers Tools for an Information Age
Chapter 2 Applications Software: Getting the Work Done Copyright (c) 2003 by Prentice Hall

2 Copyright (c) 2003 by Prentice Hall
Objectives Distinguish between operating systems and applications software List the various methods by which individuals and businesses acquire software List and briefly describe various types of task-oriented software Identify the kinds of software that are available for both large and small businesses Discuss ethical issues associated with software Describe the functions of various computer professionals Copyright (c) 2003 by Prentice Hall

3 Applications Software
Software used to solve a particular problem or perform a particular task Copyright (c) 2003 by Prentice Hall

4 Acquiring Software: Traditional Ways
Custom software Written by programmers hired by organization Packaged (commercial) software Purchased from a store, catalog, or Web site Copyright (c) 2003 by Prentice Hall

5 Acquiring Software: New Ways
Freeware Public Domain Open-Source software Shareware Copyright (c) 2003 by Prentice Hall

6 Buying Commercial Software
Individual copies for each computer Site license Electronic software distribution Application Service Provider Copyright (c) 2003 by Prentice Hall

7 Task-Oriented Software
Often called productivity software Common categories Word processing/Desktop publishing Electronic spreadsheets Database management Graphics Communications Others Copyright (c) 2003 by Prentice Hall

8 Copyright (c) 2003 by Prentice Hall
Business Software Vertical Market software Software for Workgroups Small Business software Copyright (c) 2003 by Prentice Hall

9 Ethics and Application Software
Piracy: the acquisition and use of illegal copies of software Counterfeiting: copying large numbers of CD-ROMs or DVD-ROMs and packaging them to look like the real thing Unauthorized copying of software is stealing Copyright (c) 2003 by Prentice Hall

10 Copyright (c) 2003 by Prentice Hall
Software Piracy Examples of piracy Copying software from a lab or from a friend Buying 2 or 3 copies of software and distributing it to dozens or hundreds of employees Buying 1 copy of software and installing it on several computers at home Copyright (c) 2003 by Prentice Hall

11 Copyright (c) 2003 by Prentice Hall
Computers and People Most organizations have some sort of information technology department Made up of people who are responsible for the organization’s computer resources Maintain data and provide services to end users Copyright (c) 2003 by Prentice Hall

12 Copyright (c) 2003 by Prentice Hall
Computer People Data entry operators prepare data for processing Computer operators monitor systems, keep peripherals running, and make backups Librarians catalog processed disks and tapes Programmers design, write, test, implement, and maintain computer programs Copyright (c) 2003 by Prentice Hall

13 Copyright (c) 2003 by Prentice Hall
Computer People Systems analysts plan and design entire systems Must have knowledge in programming, as well as knowledge of the business Network managers implement and maintain organization’s network(s) Chief Information Officer (CIO) makes key technology decisions A key member of the organization’s strategic decision-making team Copyright (c) 2003 by Prentice Hall


Download ppt "Computers Tools for an Information Age"

Similar presentations


Ads by Google