Classification of Computer Software
Classification of Computer Software
System software performs a variety of fundamental operations that avails computer resources to
the user. These functions include:
i. Booting the computer and making sure that all the hardware elements are working properly.
ii. Performing operations such as retrieving, loading, executing and storing application programs.
iii. Storing and retrieving files.
iv. Performing a variety of system utility functions.
System software is further divided into:
a. Operating system.
b. Firmware.
c. Utility software.
d. Networking software.
d. Networking software
This type of software is mostly used to establish communication between two or more computers
by linking them using a communication channel like cables to create a computer network.
Networking software enables the exchange of data in a network as well as providing data security.
Network software may come as independent software or integrated in an operating system. An
example of networking software is Cisco’s iOS, Microsoft Windows Server
2003/2008/2012/2016, UNIX, Linux, Mac OS X and Novell NetWare.
ii. Application Software
Application software, also called application packages, are programs that are designed to help
the user accomplish specific tasks.
Examples and uses of common application packages are listed in Table 3 below:
Software Uses Examples
1. Word Processors Typing documents like letters. Ms Word, Lotus, WordPro,
WordStar.
2. Desktop publishing Designing publications like Adobe PageMaker,
newspapers, books. Ms publisher
3. Computer aided design Technical drawing. AutoCAD, ArchiCAD, MAYA
3D etc
4. Databases Keeping records and files. Ms Access, dBase.
5. Graphics software Creating and manipulating pictures. Corel Draw, Adobe
Photoshop/Illustrator/ Sketchup
etc
Table 1 common application package
f) Cost
The cost of software is perhaps one of the most controversial issues that must be considered
carefully. One cannot just go for software because it is cheap. Many other factors may force a
person to buy far much more expensive software even with cheaper alternatives available.
However, it is illogical to buy expensive software if there is a reliable cheaper alternative that will
meet one’s needs.
g) Compatibility and System Configuration
Software compatibility refers to the ability of the computer to run the software depending on the
system setup. For example, some software may only run on a computer that has 4GB of RAM and
above so that they will be held temporarily as they are being executed.
h) Portability
Portability in this aspect refers to whether a program can be copied or installed in more than one
computer.
All data and instructions must be temporarily held in the main memory before and after processing.
The operating system may organize the main memory into blocks of sizes called partitions. It
constantly assigns main memory storage partitions to data and instructions. To access a piece of
data or instruction, the operating system knows where to find each piece of data if the correct
address of the partition is used.
The OS ensures that each program and the data it requires are allocated adequate space in memory.
b. Process Control/ Job scheduling
The processor can only handle one task at a time. Therefore, the operating system has to determine
which task will be processed first and makes sure that the one that is currently being processed is
closely monitored to avoid wasting time in the processor. The criteria for selecting which task will
come before the other depends on many factors. For example, the operating system may decide to
process smaller tasks before larger ones.
c. Security Management
It helps in implementing mechanisms that secure and protect the computer system internally as
well as externally. Therefore an operating system is responsible for securing the system at two
different levels which are internal security and external security.
i. Internal security
Internal security refers to the protection of activities of one process from the activities of another
process. The term internal security may also be regarded as system protection. The internal security
of the computer system also ensures the reliability of the computer system. There may be several
process running in the computer systems use the concept of least privilege to implement internal
security.
ii. External security
External security refers to the implementation of a mechanism for securing the data and programs
stored in the computer system as well as the various resources of the computer system against
unauthorized access. The term external security may also be regarded as system security. External
security is particularly required when a computer system is either on a network or connected to the
internet.
The user interacts with a computer by typing a command at the prompt found on a command line.
A computer reads instructions from the command line and executes them. For a command to be
more user friendly, the words used should be descriptive verbs e.g., print, copy etc. Unique
abbreviations can also be used e.g., Del, Ren, Chkdsk etc. For example, if you are using MS DOS
operating system, you can copy a file called Kimathi.Dat from a hard disk C to partition D as
follows: COPY C:\Kimathi.Dat D:\
Examples of command line interface are the early versions of MS DOS, PC DOS, Linux Bash,
OS/2, and UNIX.
NB: The user must press the enter key for the command to be executed.
Follow the link to learn more about DOS Commands:
https://youtu.be/syrb1Fk3m2A
The figure below shows the MS DOS command line interface.
This type of interface provides the user with a list of options to choose from. The interface therefore
is suitable for beginners who may have difficulties recalling commands. The figure below shows
the Menu driven interface.
Figure 2:Menu Driven Interface
c) The Graphical User Interface (GUI)
This type of interface represents commands as small pictures on the screen called icons. Icons can
be selected to issue a command using a pointing device like a mouse. It is user friendliness.
Examples of GUI based operating systems are OS/2 s Presentation Manager, Microsoft Windows,
Linux and Apple Macintosh. A typical Windows QUI interface is shown in Figure 5 below:
Figure 3:Windows Graphical User Interface
Follow the link below to learn more on Graphical User Interface
https://www.youtube.com/watch?v=N52jNC8Mt_s&t=2s