Systems Software includes the operating system and utility software which and are designed to interact with the computers hardware to carry out tasks to help keep the computer system running.
Systems Software is essential to the running of the computer as it allows the user to access the computer through the interface.
The Operating System part of Systems Software is definitely needed as it is what allows the computer to operate, however, the utility software is not as essential but provides the user with a better computing experience. Application software such as Word processors and Internet browsers need system software to run on.
Without Systems Software the processor would not be able to multitask and there would be no interface for the user to interact with the computer. Also, without utility software, files would have a much larger size and files would load slowly due to the fragmentation. Virus would also not be removed and if anything happened to the computer the files may not be recoverable.
OS software is what allows the computer to run but is now bundled with utility software to help the user easily use the OS. Application software runs on the OS allowing the user to carry out functions.
Application Software
•Used from apps on phones to stock controls in businesses.
•Sold in Applications packages to preform a set of instructions.
•Integrated packages preform common tasks such as MS Office including a word and spreadsheet application.
Bespoke software
• It is created for a certain purpose.
•Made for users needs
•Very expensive
•May not always get updates
Proprietary software
•Made by large companies for different markets.
•Only the compiled code is releases, no source code so that it can’t be replicated
•When software is bought it does not give rights to the source code. It is more of a license
•Usually paid for
•E.g. Microsoft and Adobe
•Has customer support, documentation, warranties
•Well tested and reliable
•Cheaper than custom-build but expensive
•May not fit needs entirely
•May not get updates after warranty expires
Licences
•Usually Off-the-shelf that is for individual users or small businesses
•Can be bought from a physical or online shop
•Single-user licenses is for one device but for any amount of users. Normally allow a back-up copy.
•Multi-user licenses allows 5-10 of devices to use the software which works out cheaper per user.
•Network licenses allow all devices on a network to use the software.
•Site licenses allow all devices on a site to use the software.
•Concurrent user licenses allow a set number of users to use the software.
•Freeware is free but cannot be edited.
•Shareware is free for a certain period of time.
Open source
•The software is freely available for anybody to edit the source code
•E.g. Apache, Firefox, VLC
•Linux OS: Ubuntu, Desbian, Android
•Strong online community to improve it
•Free and can be adapted
•May not be updated
•May contain bugs and viruses
•No customer support, documentation, warranties
•Allows competitors to see code
Utility Software
•Helps maintain or configure the computer
•System Software also includes Utility software which is commonly integrated into the OS and is not essential but useful.
•File Repair – Repairs corrupt files
•Disk Formatting – Removing all files off the hard drive
Disk Defragmentation
•Removes spaces in the storage and rearrange files
•Files should be kept together but modifying creates gaps and then files are split up to fill the gaps
•Fragmentation causes slowness as the head has to move around
•All the gaps get put together to create better free space to stop fragmentation
Disk Backup / Restore
•Saving all the files in case of a loss of data
•Schedules backups, creates rescue discs and disc images
•Full backup – all files and settings, slow and large
•Incremental backup- only modifications, quicker and smaller, takes a long time for full system restore
Security utility software includes:
•Anti-virus
•Anti-spyware
•Firewall
•Password protection
•Automatic and remote deletion of data
Specialised utility software includes:
•System maintenance, info and diagnostics
•Updates the software and date and times automatically
•Producing compilers, assemblers and translators
Compression software
•File Compression – reduces the size of the file
•May use internet to get parts of the file
•Normally .zip and needs extracting
Encryption software
•Scrambles data to stop people accessing it, so it needs a key to be decrypted
Operating Systems (OS) Software
•Essential to the running of the computer
•Manage Hardware and Software
•Communicate with internal and external hardware using device drivers
•Provide a UI (User Interface)
•Allow applications to run
•Allows computer to multi-task using RAM and CPU
•Carry out file and disk management
•E.g: Windows, MacOS, Android, iOS, WatchOS, Linux, (Unix)
•Updates can downloaded from the internet
•Wrote in a low level language, meaning each hardware needs a driver
User Interface
•Allows user to interact with computer
GUIs (Graphical User Interfaces)
•Visual and Interactive
•WIMP (Windows,Icons,Menus,Pointers)
•Touchscreen (Finger Gestures)
Command Line Interfacestrong>
•Efficient and Powerful
•Used for Scripts (simple programs)
Device Drivers
•Allows OS to talk to hardware and peripherals
•Drivers translate the signals
•The computer will choose the correct driver for the system
•New peripherals will require new drivers to be installed
•Manufacturers will release updates to fix bugs, add features or improve performance.
•The updates may be installed automatically from the internet
Multitasking
•Called multi-tasking OSs
•Manages memory and CPU processing time
•Moves necessary parts to memory along with additional parts. Any parts not needed are kept in the storage
•Memory manager allocates memory addresses to stop overwriting and interference
•OS divides CPU time as only one application is processed at a time. Prioritises to be efficient and uses Virtual Memory.
File and Disk Management
•File Extensions (.pptx, .mp3, .gif, .mpeg) tell the OS what application to use
•Creates a hierarchal structure
•Moves data and edits and deletes it
•Splits physical disk into virtual storage sectors.
•Decides which sector to place the data
•Keeps a track of free space
•Tries to keep one file’s data adjacent
•When printing, the files will be sent to the printer rather than stay on the computer so that you can continue to use the application, as data transfer is quick but printing is time consuming, this is spooling.
User Accounts
•Computers are single-user as only one account can be used at a time.
•Servers are multi0user as multiple accounts can be used at any time as they run on mainframes/super-computers.
•E.g ATMs can be used by multiple people at the same time despite being part of the same mainframe.
•Allows user access levels
•May have authentication
ETHICAL/MORAL
These are the principles and social standards of how we should behave.
e.g: Is creating software which will make a lot of people lose their jobs ok?
e.g: Is hacking into a computer ok?
e.g: Should outsourcing be allowed?
e.g: Cyberbullying Trolling
e.g: Health problems - RSI, EyestrainThese are the principles and social standards of how we should behave.
e.g: Is creating software which will make a lot of people lose their jobs ok?
e.g: Is hacking into a computer ok?
e.g: Should outsourcing be allowed?
e.g: Cyberbullying Trolling
e.g: Health problems - RSI, Eyestrain
CULTURAL
These are about how computers can be used differently around the world.
e.g: Is the same Character set used?
e.g: Could this information be censored?
e.g: When translated, does this mean the same thing?
ENVIRONMENTAL
These are about how computers impact the natural world.
e.g: Are we using up too many natural resources?
e.g: Are we using too much electricity.
e.g: What happens to technology when we chuck it away?
LEGAL
These are about whether the computer usage is lawful.
The Data Protection Act 1998 Personal data is fairly processed and must be obtained only for lawful purposes.
The 8 Principles of this act:
–Data must be processed fairly and lawfully.
–Data should be obtained for a specific purpose.
–Data should be adequate, relevant and not excessive.
–Data should be accurate and kept up to data.
–Data should only be kept while needed.
–Data should be kept adhering to this act.
–Data should not be lost, damaged or stolen.
–Data should not be taken out of the European Economic area.
Computer Misuse Act 1990
–It is illegal to store personal data without permission.
–It is illegal to access data to commit fraud or blackmail.
–It is illegal to change data on a computer without permission which also includes virus's and malware.
Creative Commons Licensing Allows copyright owners to share their work while continuing to own it
–Attribution- Can be copied, modified, distributed, displayed and performed but credit must be given.
–Non-commercial- Can be copied, modified, distributed and displayed but as a not-for-profit.
–No derivative works- Can be copied, distributed, displayed and performed but not changed.
–Share-alike- Can be modified and distributed with an identical licence.
e.g: Freedom of Information Act 2000
–Allows the general public to request information held by public authorities or publicly owned companies.
FACTORS
Outsourcing
Moving services to a cheaper country. e.g: Moving call centres to India. Privacy
Not being monitored. CCTV, Cookies, Websites requesting personal data. Stakeholders
These are people effected by the technology. e.g: Customers, Owners, Employees, Suppliers and community. Censorship
Limiting the access to internet. e.g: China