Get Started. It's Free
or sign up with your email address
SOFTWARE by Mind Map: SOFTWARE

1. Guidelines

1.1. Anything goes!

1.2. No criticism or flaming allowed

1.3. The Wilder The Better

1.4. Quantity is Quality

1.5. Set a Time Limit

2. `DEFINITION

2.1. A SERIES OF INSTRUCTION THAT TELL THE COMPUTER TO PERFORM TASK AND HOW TO PERFORM IT

3. TYPE

3.1. SYSTEM SOFTWARE

3.1.1. CONSIST OF THE PROGRAMS (SET OF INSTRUCTION) THAT CONTROL OR MAINTAIN THE OPERATION OF THE COMPUTER AND ITS DEVICES

3.2. APPLICATION SOFTWARE

3.2.1. CONSIST OF THE PROGRAMS (SET OF INSTRUCTIONS) DESIGNED TO MAKE USERS MORE PRODUCTIVE AND/OR ASIST THEM WITH PERSONAL TASK

4. SYSTEM SOFTWARE

4.1. OPERATING SYSTEM

4.1.1. DEFINITION

4.1.1.1. AN OPERATING SYSTEM LOST IS A SET OF PROGRAMS CONTAINING INSTRUCTIONS THAT WORK TOGETHER TO COORDINATE ALL THE ACTIVITIES AMONG COMPUTER HARDWARE RESOURCES

4.1.2. TYPES

4.1.2.1. TYPES OF

4.1.2.1.1. STAND ALONE OPERATING SYSTEM

4.1.2.1.2. SERVER OPERATING SYSTEM

4.1.2.1.3. EMBEDDED/MOBILE OPERATING SYSTEM

4.1.3. FUNCTIONS

4.1.3.1. START AND SHUTDOWN A COMPUTER

4.1.3.2. PROVIDE A USER INTERPHASE

4.1.3.3. MANAGE MEMORY

4.1.3.4. COORDINATE TASK

4.1.3.5. CONFIGURE TASK

4.1.3.6. ESTABLISH AN INTERNET CONNECTION

4.1.3.7. MONITOR PERFORMANCE

4.1.3.8. PROVIDE FILES MANAGEMENTS AND OTHER UTILITIES

4.1.3.9. AUTOMATICALLY UPDATE

4.1.3.10. CONTROL A NETWORK

4.1.3.11. ADMISNISTER SECURITY

4.2. UTILITY PROGRAMS

4.2.1. IS A TYPE OF SYSTEM SOFTWARE THAT ALLOW USER TO PERFORM MAINTENANCE TYPE TASK

4.2.2. TYPES OF UTILITY PROGRAM

4.2.2.1. FILE MANAGER

4.2.2.2. DISK CLEANUP

4.2.2.3. COMPRESSION TOOLS

4.2.2.4. ANTI-VIRUSES PROGRAM

4.2.2.5. SPYWARE REMOVER

4.2.2.6. DISK DEFRAGMENTER

4.2.2.7. BACKUP AND RESTORE

5. CATEGORIES SOFTWARE

5.1. OPEN SOURCE

5.1.1. SOFTWARE PROVIDE FOR USE MODIFICATION AND REDISTRIBUTION

5.1.2. ADVANTAGES

5.1.2.1. SOURCE CODE IS AVAILABLE TO USERS

5.1.2.2. CUSTOMER CAN PERSONALIZE THE SOFTWARE TO MEET THERE NEED

5.1.3. DISADVANTAGES

5.1.3.1. NO ONE IS RESPONSIBLE TO THE SOFTWARE

5.1.3.2. THE SOFTWARE IS NOT GUARNTEED TO BE SAVE FROM THREATS LIKE PROGRAMMING BUGS AND VIRUSES

5.2. PROPIETARY

5.2.1. IS A SOFTWARE THAT IS PRIVATELY OWNED AND LIMITED TO A SPECIFIC VENDOR OR COMPUITER DEVICE MODEL

5.2.2. LICENSEPAID

5.2.3. ADVANTAGES

5.2.3.1. FULL SUPPORT FROMVENDOR IF ANYTHING HAPPENED TO THE SUPPORT

5.2.3.2. THE SOFTWARE IS GUARANTEED TO BE SAFE FROM FROM THREATS LIKE PROGRAMMING BUGS AND VIRUSES

5.2.4. DISADVANTAGES

5.2.4.1. SOURCES CODES IS NOT AVAILABLE FOR USER

5.2.4.2. USER MUST PAY TO GET THE PROPRIETARY SOFTWARE

6. APPLICATION SOFTWARE

6.1. FUNCTION

6.1.1. MAKE BUSSINESS ACTIVITIES MORE EFFICIENT

6.1.2. TO ASISTS WITH GRAPHICS MULTIMEDIA PROJECT

6.1.3. TO FACILITATE COMMUNICATION

6.1.4. TO SUPPORT HOME, PERSONAL AND EDUCATIONAL TASK

6.2. TYPES

6.2.1. WEB BROWSER

6.2.1.1. INTERNET EXPLORER

6.2.1.2. CHROME

6.2.2. WORD PROCESSING

6.2.2.1. MICROSOFT OFFICE WORD

6.2.2.2. KWORD

6.2.3. SPREADSHEET

6.2.3.1. MICROSOFT OFFICE EXCEL

6.2.3.2. KCELLS

6.2.4. DATABASE

6.2.4.1. ORACLE DB

6.2.4.2. MARIA DB

6.2.5. PRESENTATION