0% found this document useful (0 votes)
123 views9 pages

ITE101 - Lesson 2

Uploaded by

Jabelle Mae Dote
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
123 views9 pages

ITE101 - Lesson 2

Uploaded by

Jabelle Mae Dote
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

PAMANTASAN NG CABUYAO

COLLEGE OF HEALTH AND ALLIED SCIENCES

COURSE CODE: ITE101


COURSE DESCRIPTION: LIVING IN THE IT ERA

COURSE INTENDED 1. Discuss the concepts, frameworks, and components of information and
LEARNING OUTCOMES: computing systems
2. Discuss social, legal and ethical issues in information technology era
3. Explain emerging technologies in information system

LEARNING MATERIAL
FOR WEEK NUMBER:
4-5
I. TITLE: COMPUTER SOFTWARE AND NETWORKS

II. OBJECTIVES: After this lesson, you are expected to:

1. Discuss the difference between system software and application software


2. Discuss the difference between software licenses
3. Discuss the difference between network topologies

III. INTRODUCTION: This lesson covers the different types of computer software and computer
networks.

IV. CONTENTS:

What is Software?

Software is a set of programs, which is designed to perform a well-defined function. A program is a sequence of
instructions written to solve a particular problem.

There are two types of software:

 System Software – It is software designed to provide a platform for other software. Common examples are
operating systems, computational science software, industrial automation and game engines.
o Microsoft Windows, macOS, and Android are examples of operating systems.
o RPG Maker and Unity are examples of game engines.

 Application Software – It is computing software designed to carry out a specific task other than one relating
to the operation of the computer itself, typically to be used by end-users. Common examples are word
processor, web browsers, spreadsheet application, media player and photo editor.
o Microsoft Word and Google Docs are examples of word processor.
o Mozilla Firefox and Google Chrome are examples of web browsers.

Basic Principle of an Operating System

 An operating system is a collection of software that coordinates the working of the different components of
the system and gets the user’s job done.

 The operating system provides the user with all the basic things necessary to do his job.

What does an Operating System do?

 A computer’s software acts similarly with the chain of command in an army


o Using application software, you issue a command
o Application software tells the operating system what to do
 The operating system instructs the device drivers, device drivers instruct the hardware and the hardware
actually does the work
 The operating system interacts with the application software, device drivers, and hardware to manage a
computer’s resources.
 While interacting with application software, operating system is busy behind the scenes with other tasks

LECTURE NOTES COMPILATION Page 1 of 9


2nd Semester A.Y. 2020-2021
PAMANTASAN NG CABUYAO
COLLEGE OF HEALTH AND ALLIED SCIENCES

When do I directly interact with the operating system?


 Launch programs
 Customize the user interface
 Manage files
 Configure equipment
 Get help

Where is the operating system?

 For handheld computers and video game consoles, the entire operating system is small enough to be stored
in read-only memory (ROM).
 For nearly all personal computers, servers, workstations, mainframes, and supercomputers, the operating
system program is quite large, so most of it is stored on a hard disk drive.
 The bootstrap program provides the instructions needed to load the core parts (kernel) into memory when
the system boots.
 Customization utilities and other parts of the operating system are loaded into memory as they are needed.

Basic Functions of an operating system

 Process Management – handles multi-programs that are simultaneously running.


 Memory Management – manage memory between processes and data according to priority.
 Storage Management – Managing the permanent Storage of data on disks or other media
 I/O Management – Manage and schedule the input and output operations
 Device / Resource Management – Managing devices and resources and allowing the users to share the
resources
 Security and Protection – Securing the system against possible unauthorized access to data or any other
entity. Protecting the parts of the system against damage.
 Booting the System and getting it ready to work.
 Data communications – Providing interface to connect to other computers or allowing others to connect.

Operating System Services

 Program Development – The operating system provides variety of services and utilities such as editors
and debuggers. These utilities are used by programmers in creating and finding errors in a program.
 Program Execution – The operating system involves a number of steps, such as loading instruction and
data in the main memory, initialization of I/O devices and files, and other resources to be allocated. It
handles the scheduling.
 Access to I/O devices – Each I/O device has its own set of instructions and control signals. The operating
system hides these details to provide a common interface to the user/programmer. For example, when we
type some characters using the keyboard, we can see these letters appear on the computer screen.
However, we cannot see the internal processes performed by the computer to accomplish that task.
 Controlled access to files- Operating systems control the file access by setting permissions for files and
directories. Permissions can be set to grant or deny access to specific files and directories. When
permission is granted, you can access and perform any function on the file or directory. When permission is
denied, you cannot access that file or directory. The most common permissions are read, write, delete, and
execute.

LECTURE NOTES COMPILATION Page 2 of 9


2nd Semester A.Y. 2020-2021
PAMANTASAN NG CABUYAO
COLLEGE OF HEALTH AND ALLIED SCIENCES

 System access- For shared or public systems, the operating system controls access to the system as a
whole and to specific system resources. System access provides protection of resources, and data from
unauthorized users, and resolves resource conflicts.
 Error detection and response – Variety of errors may occur in computer system. Responses may range
from program termination, retrial of the same operation, or reporting error to the application.
 Accounting – collecting usage statistics, CPU usages, monitor performance, etc.

Types of Operating System


 Single-user Operating System - Deals with one set of input devices, those that can be manipulated by one
user at a time.
 Multi-user Operating System - Deals with input, output, and processing requests from many users, all at the
same time
 Network Operating System - provides communications and routing services that allow computers to share
data, programs and peripheral devices
 Multitasking Operating System - provides process and memory management services that permit two or
more programs to run simultaneously
 Desktop Operating System- Designed for a personal computer, either a desktop or notebook computer.

Copyright Protection of Computer Software


 a form of legal protection that grants the author of an original ”work”
 an exclusive right to copy, distribute, sell, and edit that work, except under special circumstances described
by copyright laws

License Agreement
 It refers to a legal contract that defines the way in which a computer program may be used
 Here are some guide questions for Software License Agreement:
o When does the license go into effect?
o Can I sell the software?
o Can I rent the software?
o Am I buying the software or licensing it?
o Can I loan the software to a friend?
o Does the software publisher provide a warranty?
o Under what circumstances can I make copies?

LECTURE NOTES COMPILATION Page 3 of 9


2nd Semester A.Y. 2020-2021
PAMANTASAN NG CABUYAO
COLLEGE OF HEALTH AND ALLIED SCIENCES

Types of Software License

 Public Domain Software


o may be freely copied, distributed, and resold
o not protected by copyright

 Commercial Software
o sold in computer stores or at Web sites
o adheres closely to the limitations provided by copyright law

 Freeware
o a copyrighted software that is available for free
o allows you to use, copy, and distribute the software

 Shareware
o a copyrighted software marketed under a “try before you buy” policy
o allows you to copy and distribute the software
o provide a low-cost marketing and distribution channel

 Open Source Software


o may be sold or distributed free of charge
o uncompiled program instructions are available to programmers who want to alter and improve the
software

Principles of Networking

Networking is the process of delivering a message from a source to a destination.


Communication is the process of giving meaning to these messages received.

Computer Network
 It is a bunch of computers linked together.
 It is cost efficient and reliable.

LECTURE NOTES COMPILATION Page 4 of 9


2nd Semester A.Y. 2020-2021
PAMANTASAN NG CABUYAO
COLLEGE OF HEALTH AND ALLIED SCIENCES

 It serves as a good communication medium.


 The Internet is an example of a computer network

Uses of Network for People


 Access to remote information
 Person-to-person communication
 Interactive entertainment

Communication Channels
 a pathway over which information can be transferred
 information sent over a channel has a source (transmitter), from which the information originates,
and destination (receiver), to which the information is delivered

Type of Communication Transmission


 Simplex Channel – It is a communication channel whose direction of transmission is unchanging. For
example, a radio station usually sends signals to the audience but never receives signals from them,
thus a radio station is a simplex channel.
 Half–Duplex Channel – It is a channel in which the direction may be reversed, but the transmission
does not occur at the same time. An example of a half-duplex device is a walkie-talkie, a two-way radio
that has a push-to-talk button.
 Full–Duplex Channel - a channel that allows simultaneous exchange in both directions. A cell phone is
a full-duplex device. That means that you use one frequency for talking and a second, separate
frequency for listening. Both people on the call can talk at once.

Types of Transmission Technologies


 Point-to-point Networks - composed of many connections in individual pairs of machines
 Broadcast Networks - all the machines on the network share a single channel

LECTURE NOTES COMPILATION Page 5 of 9


2nd Semester A.Y. 2020-2021
PAMANTASAN NG CABUYAO
COLLEGE OF HEALTH AND ALLIED SCIENCES

Types of Network Topologies

1. Bus topology - each machine is connected to a single cable. Each computer or server is connected to the
single bus cable through some kind of connector. A terminator is required at each end of the bus cable to
prevent the signal from bouncing back and forth on the bus cable.

2. Star topology - each network host (PC) is connected to a central hub with a point-to-point connection. All
traffic on the network passes through the central hub.

3. Ring topology - A network topology that is set up in a circular fashion in which data travels around the
ring in one direction and each device incorporates a receiver for the incoming signal and a transmitter to
send the data on to the next device in the ring.

4. Tree topology - (a.k.a. hierarchical topology) can be viewed as a collection of star networks arranged in
a hierarchy. This tree has individual peripheral nodes (e.g. leaves) which are required to transmit to and
receive from one other node only and are not required to act as repeaters or regenerators. Unlike the star
network, the functionality of the central node may be distributed.

5. Mesh topology - The fully connected mesh topology is generally too costly and complex for practical
networks. It has been used on networks with only a small number of nodes. n most practical networks that
are based upon the partially connected mesh topology, all of the data that is transmitted between nodes in
the network takes the shortest path between nodes.

6. Hybrid networks use a combination of any two or more topologies in such a way that the resulting
network does not exhibit one of the standard topologies (e.g., bus, star, ring, etc.). For example, a tree
network connected to a tree network is still a tree network, but two star networks connected together
exhibit a hybrid network topology. A hybrid topology is always produced when two different basic network
topologies are connected.

LECTURE NOTES COMPILATION Page 6 of 9


2nd Semester A.Y. 2020-2021
PAMANTASAN NG CABUYAO
COLLEGE OF HEALTH AND ALLIED SCIENCES

Distributed Systems

A distributed system, also known as distributed computing, is a system with multiple components located on
different machines that communicate and coordinate actions in order to appear as a single coherent system to
the end-user.

 Centralized Data Processing (CDP) - The conventional way of doing all the processing and control on
centralized computers

 Distributed Data Processing (DDP) - refers to the manipulation of data using distributed systems

LECTURE NOTES COMPILATION Page 7 of 9


2nd Semester A.Y. 2020-2021
PAMANTASAN NG CABUYAO
COLLEGE OF HEALTH AND ALLIED SCIENCES

 Client/Server - an extension of distributed data processing wherein it provides the best of both
centralized and distributed data processing

Types of Network

1. Local Area Network (LAN)


 connects network devices over relatively short distances
 usually owned by an individual or corporation
 Connected computers in a computer shop is an example of LAN

2. Metropolitan Area Network (MAN)


 connects computers that are in specific geographical area like cable television
 Cable TV Network is an example of MAN

3. Wide Area Network (WAN)


 spans a large physical distance (geographically-dispersed collections of LANs)
 not owned by any one organization but rather exist under collective or distributed ownership and
management
 Internet connection is an example of WAN.

4. Personal Area Network (PAN)


 a network arranged within an individual person, typically within a range of 10 meters.
 The connection between your personal computer, Bluetooth devices and wireless devices is an
example of PAN

LECTURE NOTES COMPILATION Page 8 of 9


2nd Semester A.Y. 2020-2021
PAMANTASAN NG CABUYAO
COLLEGE OF HEALTH AND ALLIED SCIENCES

V. REFERENCES: [1] Javatpoint. 2018. Computer Network Types. Retrieved April 10, 2021 from
https://www.javatpoint.com/types-of-computer-network

[2] Squareboat. 2020. Different Types of Software with Examples. Retrieved April 10,
2021 from https://squareboat.com/blog/different-types-of-software-with-examples

[3] TutorialsPoint. 2021. Computer Software. Retrieved April 10, 2021 from
https://www.tutorialspoint.com/computer_fundamentals/computer_software.htm

DISCLAIMER

Every reasonable effort is made to ensure the accuracy of the information used in the creation of this
reference material, without prejudice to the existing copyrights of the authors. As an off-shoot of the innumerable
difficulties encountered during these trying times, the authors endeavored to ensure proper attribution of the
esteemed original works, by way of footnotes or bibliography, to their best abilities and based on available
resources, despite the limited access and mobility due to quarantine restrictions imposed by the duly constituted
authorities.

We make no warranties, guarantees or representations concerning the accuracy or suitability of the


information contained in this material or any references and links provided here. Links to other materials in our
CPOD and CAM was made in good faith, for non-commercial teaching purposes only to the extent justified for the
purpose, and consistent with fair use under Sec. 185 of Republic Act No. 8293, otherwise known as the Intellectual
Property Code of the Philippines.

LECTURE NOTES COMPILATION Page 9 of 9


2nd Semester A.Y. 2020-2021

You might also like