Skip to main content

Types of Softwares

Software generally categorized into two types, which are as follows :

  1. System Softwares

  2. Application Softwares.    

 System Softwares:

    A system software is a set of programs which is designed to control different-different operations and more extend processing capabilities of a computer system. It can perform these functions one or more depending on program requirements on a given task.

  • Supports the development of other application software.
  • Supports the execution of other application software.
  • Handles the effective & efficient use of various hardware resources, such as CPU, memory peripherals etc. 
  • Controls and communicate with the operation of peripheral devices such as printer disk, tape etc.

    And system software makes the operation of a computer system more effective and efficient as we can see in its functions. It help the hardware components work together. These programme which are included in a system software package are called system programmes, and the programmers who prepare system software are referred to as system programmers. The most commonly known examples of system software are.............................

  1. Operating System: Every computer has an operating system software, which takes care of the effective and efficient utilization of all the hardware and software components of the computer system.
  2. Programming Language Translators: Programming language translators or we can say compilers or interpreters are also a system software, which transform the instructions prepared by programmers in a programming language in to the form which can be understand and executed by a computer system.
  3. Communication Software: In a network environment (where multiple computers are inter-connected together by communication
    network topologies). These software enables transfer of data and programms from one computer system to another over a network.
  4. Utility Programmes: Utility programmes are also set of some programs or it can be a single program, which help users in system maintenance tasks and in performing tasks of routine nature. These are some of the tasks which are commonly performed by utility programmes include formatting of hard disks or floppy disks, taking backup of files, stored on hard disk on to a tape or floppy disk, sorting of the files and data stored in a file a particular order based on some key field(s), etc.

    These programs are generally written in low level or middle level languages  like C, Ada, Nim etc. Here lot of functions and lot of classes used to develop each work processing these programs having lot of exception handlers to handle as possible as problems.They use lot of complex data structures to make a simple prorgram.


    Application Softwares continued....................................

Comments

  1. can you make some blogs on networking concepts?

    ReplyDelete

Post a Comment

Popular Posts

Man in the middle attack types

Types Of Man-In-The-Middle Attacks : Today internet is one of the most essential thing in our normal life and it plays a vital role in every industries. Our demand of internet is growing day by day and it is not going to stop until now.  Man in the middle attack is one of the most common cyber-attack. In this attack an attacker act as a medium between the user and the server when a user send a request to a website for a particular data it can be in any form like login credentials, bank details etc. then server send data to user but when a person is interacting between user & server he/she can see all data. So today i will tell you how an attacker can perform a man in the middle attack ,so just read this blog careful................... 1⃣ IP spoofing:   Every device capable of connecting to the web has an online protocol (IP) address, which is analogous to the road address for your home.  By spoofing an IP address, an attacker can trick you into thinking you’re intera...

A Digital Computer

 A digital computer is a digital system that performs various computational tasks. The word "Digital" implies that the information in the computer is represented by variables that take a limited number of discrete values. These values are processed internally by components that can maintain a limited number of discrete states. These discrete values are taken by the decimal digits 0 to 9.  The first electronic digital systems was developed at 1940s late, it was primarily only used for some numerical computations.  As we all know a digital computer uses binary number system & it can only understand a binary number. And a binary number has only 2 digits 0 & 1 . Let me tell you one more interesting thing is that a binary digit is called "bit" here. That means if we use 0 it means its a bit, and vise versa.  In a digital computer all information is only represented in group of bits. After using various programming techniques & some algorithms, these grou...

How to Hack Your Friends Screen Lock

Password Hacked:        Hello, friends, today we will discuss on a phishing page tool which can capture a device passcode. This is just a github tool and we will tell you how to use this, you can impress your friends using this tool and it is really not hard to use it.  You should only have an android device with termux app installed, or you can do this thing with your computer system also. Today i am only showing you how to do these things only with your android device. Please follow each steps carefully to get perfect run of this tool : First , open your play store on your android mobile phone and then search  TERMUX  and you have to download it. then it need approx 1 min for installation in your android phone and then you have to write some keywords which help to execute you have to on your network connection. type pkg update  then hit enter. Now type pkg upgrade  then it will automatically upgrade your envoirment. Then you have to ...

How to become a successful hacker

T he whole world is going to transform in Internet and internet related things, & still privacy is one of the most issued topic in market till now. So basically market needs a perfect hacker. As we all know nothing is safe on internet millions TB of data is also growing on internet day by day but along with this the efficient Cyber Security Experts (WHITE HAT HACKERS) counts are very few. So the market needs perfect Cyber Security Specialist to make company data safe from any unauthorized access and to be ready for any cyber attack, so demand are too increasing day by day.         If we talk about Hackers then we both know that hackers are also growing in the world day by day as we all know, it does not matter here what kind of hackers because where is god, devil is also there. And if we talk clearly then we know that Black Hat & White Hat both growing day by day. So if you want to become a successful hacker you should apply at least these p...

Types of operating systems

Today there are lot of operating systems in the internet but actually they are only based on these main operating systems. What we see on internet is that windows is an OS, Linux is an OS but actually it is not really true. These are true only in simple understanding but when we explore computers more then we see there are lot of types of operating systems available in the market. These are written below...... Batch Operating System Multi-programming OS. Time-sharing or multitasking operating systems Distributed operating System Network operating System Real Time operating System Hard real--time systems Soft real--time systems Batch operating system: These operating system can not interact directly with the computer. Batch processing is a technique in which an Operating System collects the programs and data together in a batch before processing starts.   Multi-programming OS: These type of OS are able to run multiple jobs simultaneously in the memory. For it, memory is considered a...