0% found this document useful (0 votes)
20 views84 pages

It A Level CHPT 2 Hardware and Software

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1/ 84

CHAPTER 2

HARDWARE AND SOFTWARE

1
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Learning Objectives
• By the end of this lesson, students will be able to:

 define hardware
 evaluate input, storage and output devices
 define software
 evaluate different types of software
 explain the purpose of system software
 evaluate application software
 describe utility soft ware
 compare custom-written and off -the-shelf software
 evaluate user interfaces 2
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
2.0 HARDWARE

• Hardware is a physical component of a computer


system that can be touched.
• An item of hardware is a physical component that
forms part of a computer system. Items of
hardware are often known as devices because
they comprise electronic components.

3
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Hardware devices can be internal to the
computer system (such as the central processing
unit, memory or motherboard) or they can be
external to the computer system (such as the
monitor, keyboard or mouse).

4
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Hardware is categorised into input, process,
output and storage devices.

• IPOS – Input, Process, Output, and Storage


diagram
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
5
• Input devices: allow data to be sent to a
computer (e.g. keyboard, mouse, touch pad,
scanner, etc. ).

6
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Processor/Central Processing Unit (CPU): It is
the part of the computer that carries out
calculations, executes instructions and
processes data.

7
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Output devices: allow the communication of
data/information from a computer (e.g. monitor,
printer, speaker, projector, etc.).

8
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Storage devices: store data onto a storage
medium so that it can be used at a later time
(e.g. Hard disk, USB/flash drive, CD/DVD, etc.).

9
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
Reasons why a user may want to save data to Secondary Storage

 when creating a document, a user is likely to


want to make changes to that document in the
future and therefore it is necessary to save it to
secondary storage
 the user may want somebody else to edit or
read the document and so it will be saved to
secondary storage to allow the person to do that
 users are likely to want to keep documents for
archive purposes so they can be referred to in
the future
10
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
Reasons why a user may want to save data to Secondary
Storage (Contd.)

 when using a database, each new record or


change to a record will be saved to the database
in secondary storage
 the user may want to back up the data so that a
spare copy is available.
 each program will be stored on secondary
storage ready to be loaded into RAM when the
program is opened

11
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
2.1 Mainframe Computers and Supercomputers

• Mainframe Computers
• A mainframe computer is larger and has more
processing power than some other classes of
computers, such as minicomputers, servers,
workstations, and personal computers

12
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Mainframe computer likes as a big centralized
machine that contains the large memory, huge
storage space, multiple high grade processors, so
it has ultra-processing power compare to
standard computer systems.

13
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Characteristics of Mainframe computers
 Modern mainframes can run multiple different
instances of operating systems at the same time.
Nearly all mainframes have the ability to run (or
host) multiple operating systems
 Mainframes can add or hot swap system capacity
without disrupting system function, with
specificity and granularity to a level of
sophistication not usually available with most
server solutions.
 Many mainframe customers run two machines:
one in their primary data center and one in their
backup data center—fully active, partially active,
or on standby—in case there is a catastrophe
14
affecting the first building.
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Characteristics of Mainframe computers(Contd.)
 Mainframes are designed to handle very high
volume input and output (I/O) and emphasize
throughput computing. Mainframe designs have
included subsidiary hardware (called channels
or peripheral processors) which manage the I/O
devices.
 It is common in mainframe shops to deal with
massive databases and files. Compared to a
typical PC, mainframes commonly have
hundreds to thousands of times as much data
storage online, and can access it reasonably
quickly.
 A single mainframe can replace dozens or even 15
hundreds of smaller servers.
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Uses of Mainframe Computers
 Census
 Transaction processing
 Industry statistics
 Consumer statistics
 E-Business
 Banking Sector and Finance Sector
 Stock exchange
 Research Center
 Ticket reservation in railway and airlines
 Credit card Verification Insurance Sector.
16
 Telecommunication
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Applications of Mainframe Computer
 Health Care Sector: Health care organizations contain the
personalized information of every patient, so they contact
them for their treatment. These companies maintain all
record of millions patients related to their disease,
medicine, and what appointment schedule they have.
Mainframe system allows privileging each single patient
for accessing his individual data along with privacy.
 Defense Sector : In the defense area, mainframe
computer system is used to pass massive information in
different areas with protect such as land, ship, planes,
and home base as well. Mainframe system helps to
provide weather condition, trace accurate data to target
location, and use the GPS for doing preparation to attack.
17
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Applications of Mainframe Computer (Contd.)
 Education Sector : Education is also very big sector, such
as international university where to need track lot of
persons such as employees, teachers, student, and
other. So mainframe helps to store and maintain all
information related to their employees and students,
and it allows to access information for top management.
 Retail Industry : Today, retail industry is growing rapidly.
Some large retail companies have massive customer
base, so mainframe computer system is best option for
monitoring their inventory with accurate level, and it is
able to execute of massive transaction (billions) in short
duration.
18
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Advantages of Mainframe computer
 Reliability, availability and serviceability: These computers are
better in performance and are reliable. As these computers are
also used for aeroplane guidance so they are 100% error free.
 High-end scalability: They are scalable in the sense that more
hardware i.e. processors and memory can be added if needed.
 Security: The security of these computers is very high. As these
computers are used in banks so the security is very important.
 Long-lasting performance: These computers have a minimum
time limit of 10 years. So they can perform well for 10 years and
after that period companies can upgrade the mainframe
computer or replace it.

19
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Advantages of Mainframe computer ( Contd.)
 Continuing compatibility: Mainframe computers have their
own operating system. These computers are highly compatible
with the processors and other hardware and software.
 Huge memory storage: Due to a high number of processors
these computers have huge memory that can store and process
large amount data at a time.
 Virtualization: These systems have a logical partition which can
help mainframe to overcome memory limitation.
 Can run multiple OS: In mainframe computer, more than one
operating system can be run at a time to boost the
performance of the system.
 Real-time monitoring and control: If any fault comes in the
system then the administrator of the system is notified
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
20
homastigbafe@gmail.com
• Disadvantages of Mainframe computer
 High cost: These computers have a very high price and
they cannot be used in homes. Mainframes are only used
by big organization, banks, large websites and government
agencies.
 Hardware/software is expensive: Windows and mac are
not run on mainframe computers. These computers have
custom software and hardware that are expensive for the
normal user.
 A lot of space required: Mainframe computers need a
large space and also the temperature of the place should
not be hot. 21
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Disadvantages of Mainframe computer (Contd.)
 High technical staff: For maintaining mainframe
computer specialized staff is needed. A normal
computer user cannot operate and debug the system.
 Command drove interface: The terminal connected
to the mainframe computer have the text and a
command-based interface that is difficult to
understand.
 Hardware crash: If any hardware crashed then the
whole system stops working.
22

COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Supercomputers
• Supercomputer is a class of extremely
powerful computers. The term is
commonly applied to the fastest high-
performance systems available at any
given time. Such computers have been
used primarily for scientific and
engineering work requiring exceedingly
high-speed computations.
• A supercomputer is a computer with a
high level of performance as compared
to a general-purpose computer.
23
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Distinguishing Features of Super
computers
 Supercomputers are the bodybuilders of
the computer world. They boast tens of
thousands of times the computing
power of a desktop and cost tens of
millions of dollars.
 They fill enormous rooms, which are
chilled to prevent their thousands of
microprocessor cores from overheating.
And they perform trillions, or even
thousands of trillions, of calculations per
second. 24
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Distinguishing Features of Super computers
(Contd.)
 Supercomputers have more than one CPU
(central processing unit). They use of several
CPUs to achieve high computational rates.
 Rapid retrieval of stored data and instructions
is required to support the extremely high
computational speed of CPUs.
 Supercomputers have a very large storage
capacity
 Supercomputers have a very fast input/output
capability.

25
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Uses of Super Computers
 Quantum mechanics
 Weather forecasting
 Climate research
 Oil and gas exploration
 Molecular modeling (computing the structures and
properties of chemical compounds, biological
macromolecules, polymers, and crystals)
 Physical simulations, such as simulations of the early
moments of the universe, airplane and spacecraft
aerodynamics, the detonation of nuclear weapons, and
nuclear fusion.
 National security, including nuclear weapons design, and
cryptography. 26
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Advantages of a Supercomputer
 This supercomputer can easily decrypt
your password for your security
purpose.
 High processing time
 Cost efficiency
 More organizations use this computer
part-time.
 The supercomputer has the superb
power of reading the animation in an
excellent result. 27
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Advantages of a Supercomputer
(Contd.)

 A Supercomputer solves bigger


problems.
 It runs more problems in a shorter
time.
 This allows for virtual testing.
 For protecting the environment.
 It has advance graphic capability.
28
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Disadvantages of a Supercomputer

 It can be expensive.
 It requires trained staff.
 Takes up a lot of space.
 May only be good for specific
applications.
 High power requirement. A
supercomputer requires a lot of
electricity to run.

COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
29
homastigbafe@gmail.com
• Disadvantages of a Supercomputer
(Contd.)
 They heat up quickly, due to a large
number of processors as well as the load
on devices.
 Supercomputers need water cooling in
addition to an A/C system, it produces
more heat during the processing time.
 It requires more maintenance.
 It is not useful for broad applications.
 Need massive external storage for huge
data.

COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
30
Measuring Computer’s Performance
• 1. Clock Speed: clock speed refers to the number
of pulses per second generated by an oscillator
that sets the tempo for the processor. Clock speed
is usually measured in MHz (megahertz, or
millions of pulses per second) or GHz (gigahertz,
or billions of pulses per second).

31
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• There once was a time when choosing the best
processor came down to two significant deciding
factors: clock speed frequency and core count.
• Processors were much simpler years ago, and it
made sense for manufacturers to only focus on
higher clock speeds and more cores. By increasing
both of those factors with every new generation,
we were able to get a boost in performance and
efficiency at the same time. Due to performance
needs and processor evolution, we can no longer
use these parameters as a means of
benchmarking. We need something more. 32
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• 2. MIPS: means Millions of Instructions Per
Second. MIPS measures the performance speed
of a mainframe computer’s CPU.
• MIPs (million instructions per second) is the
general measurement or benchmark of how
many instructions a processor can handle in a
single second. Despite how useful this idea might
seem, it is not commonly used anymore because
there is no proper way of measuring MIPs.

33
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• In general, a MIPs rating was only used as a basic
rule of thumb for computer performance, since a
higher number did not mean much for most real-
world situations. MIPs not take into account
input/output speeds so can be unreliable
• MIPs more often used when measuring
performance of computers involved in running
database queries, word processing or
spreadsheet software.

34
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• 3. FLOPS: means Floating Point Operations Per
Second. FLOPS is useful in measuring
performance of computers where scientific or
complex calculations need to be carried out.
• FLOPS does not take into account CPU’s clock
speed, bus speed, and the amount of RAM
available so can be unreliable.

35
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• A floating point number is a number that has
floating decimal points, such as 0.008. A FLOPs
benchmark only measures the floating point
operations and not the integers, which means it
too cannot solely gauge computer performance
either.

36
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• 4. Fault tolerance: Used to describe the ability of
a computer system to continue to operate when
there is a failure in one part of the system.
• This ability may be provided by software,
hardware or a combination of both .The greater
the fault tolerance the lower the degree of
reduction of throughput.
• The lower the fault tolerance the greater the
increase in response time.

37
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
2.2 SYSTEM SOFTWARE

• SOFTWARE: Programs, which give instructions to


the computer.

38
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
SYSTEM SOFTWARE

• Programs that are designed to maintain or


operate a computer system are known as system
software.
• The software that operates the computer
hardware is known as the operating system.

39
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• 1. Operating system : An operating
system manages the hardware within a
computer system. Operating system sits
between or serves as interface between
hardware and application software, and
manages the any communication
between the two.

40
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• When a computer is turned on and after the Basic
Input/Output System (BIOS) has loaded, the
operating system is the first piece of software that
will load. It sits between hardware and
applications software and manages any
communication between the two.

41
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Functions of Operation System
• Operating systems manage hardware by:
 Allocating memory to software
 Sending data and instructions to output devices.
 Responding to input devices such as when a key
is pressed.
 Opening and closing files on storage devices.
 Giving each running task a fair share of processor
time
 Sending error/status messages to apps or users.
 Dealing with user log-ins and security.
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
42
homastigbafe@gmail.com
• 2. Device drivers: software that comes with
external hardware components and sends
customized instructions to those specific
components. The operating system requires
the use of device drivers to deal with
specific makes and models of hardware.
• By using common device drivers, software
applications are able to issue generic
commands such as ‘print’ to the operating
system without having to know the
different instructions required for every
different make and model of external
hardware components.
43
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• 3. Utility system: Programs that are used to
maintain a computer system are known as
utility system.

44
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• 4. Compiler: translates a program (source code)
written in a high level programming language into
machine code (0,1) which computer understands.
• The original high-level programming language file
is known as the source file. The file containing the
machine code is known as an executable file
because it can be executed by the processor. It
can also be referred to as the object file

45
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• When a program is compiled, the whole
source code is translated into the
executable file at once and can then be
distributed to resellers, customers and
individual computers.
• As it is in an executable format, it can only
run on operating systems for which the
compiler has translated it. For example,
programs that have been compiled for
Windows will not work on Linux unless
they are compiled again for Linux. The
same situation exists with mobile phone
and tablet operating systems.
46
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• 5. Interpreter: Interpreters also translate a
program (source code) written in a high level
programming language into machine code (0s,and
1s), but use a different method, instead of
translating the whole source code at once, it is
translated one line at a time.
• This can be less efficient than a compiler because
it takes time to do the translating as the program
is being executed

47
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
Differences between a Compiler and an Interpreter

Compiler Interpreter

 Translates code all at once in advance  Translates code one line at a time
of execution
 Compiled code will only work on the  Source code can be translated into
operating system it has been compiled object code for more than one
for operating system

 Object code ready to be executed  Object code has to be generated, so


without delay additional time is added to the
execution time.
 Compiling takes a lot of time  Only the required code needs to be
interpreted

 Not for on-the-fly testing.  Efficient for on-the-fly testing

48
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• 6. Linkers: Computer programs often consist of several
modules (parts) of programming code. Each module carries
out a specified task within the program. Each module will
have been compiled into a separate object file.
• The function of a linker (also known as a link editor) is to
combine the object files together to form a single
executable file.

49
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
APPLICATION SOFTWARE

• Programs that are intended for productivity or to


carry out a task for the user are known as
application software.
• Examples include word processor, games, web
browser and graphics software. On a mobile
phone or tablet, this type of software is usually
referred to as an app.

50
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Examples of application software are : Word
processors, Spreadsheet software, Database
management software (DBMS), Graphics
manipulation software, Photo editing software,
Video editing software, Web authoring software

51
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
2.3 UTILITY SOFTWARE
• Utility software is system software that
performs some sort of maintenance on the
computer system. Utility software does not
include the operating system, but an operating
system may come pre-installed with some utility
software.

52
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
The Roles of different Utility Software

• 1. Anti-virus: Anti-virus software is sometimes


referred to as anti-malware software as it deals
with other threats such as adware and spyware as
well as viruses.

53
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• It has two main functions;
 The first is an anti-virus monitor that is continually
monitoring the system for viruses and malware. If the
anti-virus monitor detects any unusual behaviour or tell-
tale signs of viruses or malware then it will prevent them
from being executed so they cannot cause damage to files
or programs.
 The second function is to check for viruses or malware
that may already be on a system. This is usually known as
scanning the system. If anything is found then the user
will usually be given the option to disinfect the affected
area, put it into quarantine or ignore it. 54
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• 2. Backup utilities: Backup utilities create a
second copy of data and programs that are in
storage. A backup utility can be executed by the
user, in which case the backup takes place when
the user asks it to, or it can be scheduled to
execute at a predetermined time so that the
backup takes place automatically. The user is
usually able to select which folders and files will
be backed up and can usually decide where the
backup will be stored.

55
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• 3. Data compression: Data compression
utilities will reduce the original size of files so
that they use up less storage space. This can be
achieved on a file-by-file basis or for a set of
files or even a set of folders.
• It will be slower to open the compressed file,
but as it is smaller it will use up less storage and
can be transferred from one location to another
more quickly.

56
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• 4. Disc defragmentation: defragments and
reorganizes fragmented gaps of files left after
usage on a drive so that each file is contiguous. It
will do this by moving fragmented parts of files
and small files to free space on the disc and
creating space on whole cylinders or adjacent
cylinders. It will then move the defragmented
files to a place where the whole file is kept
together.
• This can significantly improve the performance
of a computer system.
57
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• 5. Formatting: When a disc is prepared
for first time use, it needs to be
formatted. Formatting is the process of
organising the tracks on the disc into
sectors. Each sector is where data will be
stored.
• A used disc can also be formatted, in
which case all data will be lost and the
tracks prepared again as if the disc was
being used for the first time.
• 6. File-copying utilities: allow users to
have more control over which files are
copied and how they are copied. 58
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• 7. Deleting utilities: Deleting utilities can delete files
and folders locked by the operating system. When
files are deleted using normal deletion methods, the
data is still on the disc although the user can’t see it.
Therefore another function of deleting utilities is
being able to delete files permanently so that they
cannot be restored or accessed.
• Some deletion utilities will remove temporary files
that are no longer needed by the computer system,
or files that are no longer used but haven’t been
deleted when a program has been uninstalled or a
user profile removed.
59
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
2.4 CUSTOM WRITTEN SOFTWARE AND OFF-THE- SHELF
SOFTWARE

• 1. Custom-Written Software: is software that


is written to meet the requirements of a client.
 Expensive because entire development cost is
covered by client
 Takes longer time to develop
 Requirements of the client can be met
precisely
 Developers will ensure compatibility with the
client’s hardware, software and data
 Bugs are likely since it is not used widely
 Client will have access support from the
developer company.
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
60
homastigbafe@gmail.com
• 2. Off-the-shelf Software: is general purpose
software available to a large market.
 Development cost spread between all the
customers who purchase it at a specific price,
reducing overall cost
 Immediately available
 User requirements may not be
precise/unnecessary features
 May have compatibility issues
 Large number of users means lesser bugs due
to patches released after identification of bugs
 Wide range of support both from the
developing company and externally.
61
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
CONCEPT OF PROPRIETARY AND OPEN SOURCE
SOFTWARE
• Proprietary Software
• Proprietary software (sometimes referred to as closed
source software) is software that legally remains the
property of the organisation, group, or individual who
created it.
• The organisation that owns the rights to the product usually
does not release the source code, and may insist that only
those who have purchased a special licence key can use it.

62
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Proprietary software refers to the software which
is solely owned by the individual or publisher who
developed it.
• The owner or publisher of the software holds
intellectual property rights of the source code
exclusively. We call this type of software
“proprietary software” because only the original
owner(s) of the software are legally allowed to
inspect and modify the source code.

63
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Examples of proprietary software include;
• Microsoft Windows, Adobe Flash Player, PS3 OS,
iTunes, Adobe Photoshop, Google Earth, macOS
(formerly Mac OS X and OS X), Skype, WinRAR,
Google earth, Microsoft Office , Internet Explorer,
Oracle's version of Java and some versions of
Unix.

64
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Open Source Software
• Open source software is free and openly
available to everyone. People who create open
source products publish the code and allow
others to use and modify it. Communities of
programmers often work together to develop
the software and to support users. Open source
products are usually tested in public by online
contributors.

65
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Open-source refers to the software whose
source code is available for anybody to access
and modify.
• Programmers with access to a program’s source
code are allowed to manipulate parts of code by
adding or modifying features that would not
have worked otherwise.

66
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Examples of open source software include;
• Android, Ubuntu , LibreOffice, FressBSD, Drupal,
GNOME , Firefox, Open Office, GIMP, VLC Media
player etc.

67
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Free Software
• Free software (also called freeware) is licensed at
no cost, or for an optional fee. It is usually closed
source.
• “Free software” means software that respects
users' freedom and community. Roughly, it means
that the users have the freedom to run, copy,
distribute, study, change and improve the
software. Thus, “free software” is a matter of
liberty, not price.

68
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Examples of Free software include;
 Linux kernel: The Linux kernel is protected by the GPL.As
the kernel, it is one of the most important components
of the GNU system.
 Apache: the most widely used web server in the world.
 Gimp: is a powerful bitmap mode digital creation
program.
 PostgreSQL: is an object-relational database.

69
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
Differences between Open source Software and
Proprietary Software

S/N Open Source Software Proprietary Software

1. Open source software is a Proprietary software is a computer


computer software whose source software where the source codes are
code is available openly in not publicly not available only the
internet and programmers can company which has created can modify
modify it to add new features and it.
capabilities without any cost.
2. Here the software is developed Here the software is developed and
and tested through open tested by the individual or organization
collaboration. by which it is owned not by public.
3. In open source software the In proprietary software the source code
source code is public. is protected.
4. Open source software can be Proprietary software can be installed
installed into any computer. into any computer without valid license.

70
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
Differences between Open source Software and Proprietary
Software

S/N Open Source Software Proprietary Software


5. Users do not need to have any Users need to have a valid and
authenticated license to use this authenticated license to use this
software. software.
6. Open source software is Proprietary software is managed by an
managed by an open source closed team of individuals or groups
community of developers. that developed it.
7. It is more flexible and provides It is not much flexible so here is very
more freedom which encourages limited innovation scope with the
innovation. restrictions.
8. Users can get open software for Users must have to pay to get the
free of charge. proprietary software.
9. In open source software faster In proprietary software the vendor is
fixes of bugs and better security completely responsible for fixing of
is availed due to the community. malfunctions.

71
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
2.5 USER INTERFACES

• An interface is the boundary between two


systems.
• A user interface is the boundary between the
user and the computer system.
• A user interface represents the communication
between a user and the computer system.

72
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• This communication can take many forms;
• 1. Command line interface (CLI): allows a user to enter
text commands to which the computer system will
respond. The computer system will respond by
producing results in a text format.
 use very little memory
 can carry out complex operations
 can be difficult to learn and use

73
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• 2. Graphical user interface (GUI): The most
common type of interface that we use is a
graphical user interface (GUI). GUIs are found on
desktop computers, tablet computers, mobile
phones, televisions, set-top boxes, photocopiers
and some in-car entertainment systems.

74
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• GUI includes Windows, Icons, Menus, Pointers
(abbreviated to WIMP)
 Uses more memory depending on complexity of
the GUI
 Intuitive, so easy to learn
 Restrictive for technical users

75
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• 3. Dialogue interface: A dialogue interface
refers to using the spoken word to
communicate with a computer system. A user
can give commands using their voice and the
computer system can respond by carrying out
an action or with further information using a
synthesised voice.

76
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
 It is hands-free. No hands are required, which makes
them suitable for use in cars or when holding a
telephone.
 Ability to recognize and understand spoken word will
vary and can be limited. Many things can make it difficult
for the computer to understand, including accents,
different voices, stammers and background noise
 Require users to know what commands are understood
by the interface.

77
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• 4. Gesture-based interface: Gesture-based
interfaces will recognise human motion.
• This could include tracking eyes and lips,
identifying hand signals or monitoring whole
body movement.
• There are many applications of gesture-based
interfaces, including gaming, which have led to
the development of other gesture-based
interfaces.

78
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• The original Nintendo will enabled gamers to move their
hands while holding a remote controller and that
movement would be mimicked in games such as ten pin
bowling and boxing.
 It recognizes human motion, which may include
eyeball/lips tracking, identifying hand signals or whole-
body movement.
 Provides more mobility but may be hard to control.
 There are accuracy problems.

79
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
Colour, layout, font size, quantity of information and
controls in User Interface Design

• When designing User Interface, it is important to


ensure that it is accessible and efficient for the
user. Important things to consider include:

 Colour: This means using a light font on a dark


background or a dark font on a light
background.

80
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
Colour, layout, font size, quantity of information and
controls in User Interface Design( Contd.).

 Layout: Careful consideration should be given to


the layout of information, icons and inputs on a
screen. Similar information, icons or inputs
should be grouped together.

81
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
Colour, layout, font size, quantity of information and
controls in User Interface Design (Contd.)

 Font size: Text must be legible. The standard


size of font for reading is11or 12 points which is
legible for most users. This should be used
wherever possible, with titles in slightly larger
fonts. It is important that the font size is
consistent throughout the interface so that it
does not confuse users. A larger font size should
be used for young children.

82
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
Colour, layout, font size, quantity of information and
controls in User Interface Design (Contd.)

 Quantity of information: If too much information


is provided to a user, then this can cause
information overload and may mean that much
of it is ignored. Try to keep this as a maximum
number of icons or inputs that are grouped
together. If necessary, more than one
page/screen of information should be used with
forward and backward buttons.

83
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
Colour, layout, font size, quantity of information and
controls in User Interface Design (Contd.)

 Controls: Controls are to be used on forms. E.g.


Navigation buttons, Option buttons, Drop-down
boxes, Tick boxes , Text boxes, Labels

84
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com

You might also like