Software basics, Basic Computer Science

Assignment Help:

SOFTWARE BASICS:

Software is a generic term covering the concepts, procedures and instructions which cause the computer systems to accomplish the required job, Generally, software is thought of in terms of programs, discrete units of software which enable the computer to carry out a particular task, and or systems or package&7--integrated collections of programs.  

The importance of software lies in the fact that it is the software which applies power of the computer to solve the problems faced by the users. Most users require a detailed understanding of the capabilities of software than of hardware. It has been clear for some years now that the rapid advances in the capabilities of computer systems has not been matched by corresponding advances in the availability and quality of software. 

Software may conveniently be divided into two categories: systems software (i.e., programs designed to control the execution of other programs and to utilise hardware effectively), and applications software (i.e., programs which enable to solve users' problems). 

The methods by which software is produced have changed considerably in recent years with the emergence of the new discipline known as 'software engineering'. The traditional pattern of software development used to be a systems analysis to undertake a detailed study of user needs, leading to an elaborate specification for the software, which would then be converted into a programming language. This process is considered inadequate, and leading to backlogs. It is also felt that this procedure does not meet user needs effectively and is poorly maintained. 

Increased availability of packaged software and use of fourth generation languages, and flexible integrated software to produce rapidly modified 'prototypes' of programs to meet user needs, are suggested as remedies to the software backlog problem. However, for the average user they mean that there will be an increasing array of packages to meet his requirements.  


Related Discussions:- Software basics

Syntax of a Procedure in assembly language, There are two kinds of procedur...

There are two kinds of procedures, the intrasegments, which are found on the similar segment of instructions and the inter-segments which can be stored on dissimilar memory segment

Describe the protocol used by the mmu, Question 1: a) A distinction is...

Question 1: a) A distinction is often made between computer architecture and computer organisation. Describe, using examples, the meaning of computer architecture. b) Name

Project of interactive powerpoint in human computer , Hi There, can you h...

Hi There, can you help me with my small project please, i have sent it yesterday and you dont replay. can you please ethir lem me know you can do it or no Regrads Meshari

Describe any five requirements of clustering in data mining, Question 1...

Question 1 What is data mining? What are the major issues in data mining? Explain 2 What is meant by data reduction? Explain any three techniques of data reduction 3 Define a b

Audio/video applications on network, AUDIO/VIDEO APPLICATIONS ON NETWORK ...

AUDIO/VIDEO APPLICATIONS ON NETWORK Clinical applications of a computer include recording of slit lamp images on a computer. These still images or even videos can be recorde

What are the tasks of ALU and their subcomponents, ALU’s tasks and their s...

ALU’s tasks and their suitable subcomponents: Addition and subtraction these two tasks are carried out by constructs of logic gates, such as half adders and full adders. While they

Synchronous and asynchronous transmission, Synchronous and Asynchronous Tra...

Synchronous and Asynchronous Transmission: Another method of setting of terminals denotes synchronous or asynchronous transmission. Many terminals can only communicate in one

Disk output, Disk output : You will already have decided whether to u...

Disk output : You will already have decided whether to use a hard disk or floppies for storing data. An important point of disk management is to ensure a secure method of kee

Operating systems, Consider the state transition diagram of Figure 3.9b. Su...

Consider the state transition diagram of Figure 3.9b. Suppose that it is time for the OS to dispatch a process and that there are processes in both the Ready state and the Ready/Su

Wap and wml, what is charactersics of mobile computing

what is charactersics of mobile computing

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd