Skip to main content

Application Softwares (types of softwares)

 Application Software:


  An application software always works under a system software. These softwares are generally a set of one or more programmes, designed to solve a specific problem, or do a specific task e.g. An application software for payroll processing produces pay slips as the major output, and an application software for processing examination results produces mark sheets as the major output along with some other statistical reports.

   And also if a person is writing a program to solve his/her personal and particular problems is also comes under the application software. These programs included in an application software package are called application programmes and who made these programs are also known as application programmers.

The most commonly known application software are

1. Word Processing Software: A word processing software enables us to make use of a computer system for creating editing, viewing, formatting, storing retrieving and painting documents (written material, such as letters exports, book, etc).
software is a numerica data analysis tool, which allows us to create a kind of computerised ledger A manual ledger is a book having rows and columns, which accountants use for keeping a record of financial transactions, and for preparing financial statements. story of C

2. Spreadsheet Software A

3. Database Software A database is a collection of related data stored and treated as unit for information retrieval purpose. A data base software is a set of one or more programmes, which enable us to crea a database maintai (old, delete and update its records) organise its data in desired fashion.

4. Graphices Software A graphic software enables us to use a computers system for creating editing, viewing, storing, retrieving and printing designs, drawings pictures, graph and anything * else that can be drawn in the traditional manners.

14

5. Personal Assistance Software A personal assistance software allows us to use personal computers for storing and retrieving our personal information, and planning and managing our schedules, contacts, financial and inventory of important items.

6. Education Software Education software allows as computers system to be used as a teaching and learing tool. A few examples of such applications are those that teach young children to do (a) mathematics, (b) recognize alphabets

and (c) read whole words and sentences. Software Entertainment

7. Entertainment

software allows a computer system to be used as an entertainment tool. A good example of such an application is computer video games.

Comments

Popular Posts

Man in the middle attack types

Types Of Man-In-The-Middle Attacks : Today internet is one of the most essential thing in our normal life and it plays a vital role in every industries. Our demand of internet is growing day by day and it is not going to stop until now.  Man in the middle attack is one of the most common cyber-attack. In this attack an attacker act as a medium between the user and the server when a user send a request to a website for a particular data it can be in any form like login credentials, bank details etc. then server send data to user but when a person is interacting between user & server he/she can see all data. So today i will tell you how an attacker can perform a man in the middle attack ,so just read this blog careful................... 1⃣ IP spoofing:   Every device capable of connecting to the web has an online protocol (IP) address, which is analogous to the road address for your home.  By spoofing an IP address, an attacker can trick you into thinking you’re intera...

A Digital Computer

 A digital computer is a digital system that performs various computational tasks. The word "Digital" implies that the information in the computer is represented by variables that take a limited number of discrete values. These values are processed internally by components that can maintain a limited number of discrete states. These discrete values are taken by the decimal digits 0 to 9.  The first electronic digital systems was developed at 1940s late, it was primarily only used for some numerical computations.  As we all know a digital computer uses binary number system & it can only understand a binary number. And a binary number has only 2 digits 0 & 1 . Let me tell you one more interesting thing is that a binary digit is called "bit" here. That means if we use 0 it means its a bit, and vise versa.  In a digital computer all information is only represented in group of bits. After using various programming techniques & some algorithms, these grou...

How to Hack Your Friends Screen Lock

Password Hacked:        Hello, friends, today we will discuss on a phishing page tool which can capture a device passcode. This is just a github tool and we will tell you how to use this, you can impress your friends using this tool and it is really not hard to use it.  You should only have an android device with termux app installed, or you can do this thing with your computer system also. Today i am only showing you how to do these things only with your android device. Please follow each steps carefully to get perfect run of this tool : First , open your play store on your android mobile phone and then search  TERMUX  and you have to download it. then it need approx 1 min for installation in your android phone and then you have to write some keywords which help to execute you have to on your network connection. type pkg update  then hit enter. Now type pkg upgrade  then it will automatically upgrade your envoirment. Then you have to ...

How to become a successful hacker

T he whole world is going to transform in Internet and internet related things, & still privacy is one of the most issued topic in market till now. So basically market needs a perfect hacker. As we all know nothing is safe on internet millions TB of data is also growing on internet day by day but along with this the efficient Cyber Security Experts (WHITE HAT HACKERS) counts are very few. So the market needs perfect Cyber Security Specialist to make company data safe from any unauthorized access and to be ready for any cyber attack, so demand are too increasing day by day.         If we talk about Hackers then we both know that hackers are also growing in the world day by day as we all know, it does not matter here what kind of hackers because where is god, devil is also there. And if we talk clearly then we know that Black Hat & White Hat both growing day by day. So if you want to become a successful hacker you should apply at least these p...

Types of operating systems

Today there are lot of operating systems in the internet but actually they are only based on these main operating systems. What we see on internet is that windows is an OS, Linux is an OS but actually it is not really true. These are true only in simple understanding but when we explore computers more then we see there are lot of types of operating systems available in the market. These are written below...... Batch Operating System Multi-programming OS. Time-sharing or multitasking operating systems Distributed operating System Network operating System Real Time operating System Hard real--time systems Soft real--time systems Batch operating system: These operating system can not interact directly with the computer. Batch processing is a technique in which an Operating System collects the programs and data together in a batch before processing starts.   Multi-programming OS: These type of OS are able to run multiple jobs simultaneously in the memory. For it, memory is considered a...