ITE101 - Lesson 2
ITE101 - Lesson 2
COURSE INTENDED 1. Discuss the concepts, frameworks, and components of information and
LEARNING OUTCOMES: computing systems
2. Discuss social, legal and ethical issues in information technology era
3. Explain emerging technologies in information system
LEARNING MATERIAL
FOR WEEK NUMBER:
4-5
I. TITLE: COMPUTER SOFTWARE AND NETWORKS
III. INTRODUCTION: This lesson covers the different types of computer software and computer
networks.
IV. CONTENTS:
What is Software?
Software is a set of programs, which is designed to perform a well-defined function. A program is a sequence of
instructions written to solve a particular problem.
System Software – It is software designed to provide a platform for other software. Common examples are
operating systems, computational science software, industrial automation and game engines.
o Microsoft Windows, macOS, and Android are examples of operating systems.
o RPG Maker and Unity are examples of game engines.
Application Software – It is computing software designed to carry out a specific task other than one relating
to the operation of the computer itself, typically to be used by end-users. Common examples are word
processor, web browsers, spreadsheet application, media player and photo editor.
o Microsoft Word and Google Docs are examples of word processor.
o Mozilla Firefox and Google Chrome are examples of web browsers.
An operating system is a collection of software that coordinates the working of the different components of
the system and gets the user’s job done.
The operating system provides the user with all the basic things necessary to do his job.
For handheld computers and video game consoles, the entire operating system is small enough to be stored
in read-only memory (ROM).
For nearly all personal computers, servers, workstations, mainframes, and supercomputers, the operating
system program is quite large, so most of it is stored on a hard disk drive.
The bootstrap program provides the instructions needed to load the core parts (kernel) into memory when
the system boots.
Customization utilities and other parts of the operating system are loaded into memory as they are needed.
Program Development – The operating system provides variety of services and utilities such as editors
and debuggers. These utilities are used by programmers in creating and finding errors in a program.
Program Execution – The operating system involves a number of steps, such as loading instruction and
data in the main memory, initialization of I/O devices and files, and other resources to be allocated. It
handles the scheduling.
Access to I/O devices – Each I/O device has its own set of instructions and control signals. The operating
system hides these details to provide a common interface to the user/programmer. For example, when we
type some characters using the keyboard, we can see these letters appear on the computer screen.
However, we cannot see the internal processes performed by the computer to accomplish that task.
Controlled access to files- Operating systems control the file access by setting permissions for files and
directories. Permissions can be set to grant or deny access to specific files and directories. When
permission is granted, you can access and perform any function on the file or directory. When permission is
denied, you cannot access that file or directory. The most common permissions are read, write, delete, and
execute.
System access- For shared or public systems, the operating system controls access to the system as a
whole and to specific system resources. System access provides protection of resources, and data from
unauthorized users, and resolves resource conflicts.
Error detection and response – Variety of errors may occur in computer system. Responses may range
from program termination, retrial of the same operation, or reporting error to the application.
Accounting – collecting usage statistics, CPU usages, monitor performance, etc.
License Agreement
It refers to a legal contract that defines the way in which a computer program may be used
Here are some guide questions for Software License Agreement:
o When does the license go into effect?
o Can I sell the software?
o Can I rent the software?
o Am I buying the software or licensing it?
o Can I loan the software to a friend?
o Does the software publisher provide a warranty?
o Under what circumstances can I make copies?
Commercial Software
o sold in computer stores or at Web sites
o adheres closely to the limitations provided by copyright law
Freeware
o a copyrighted software that is available for free
o allows you to use, copy, and distribute the software
Shareware
o a copyrighted software marketed under a “try before you buy” policy
o allows you to copy and distribute the software
o provide a low-cost marketing and distribution channel
Principles of Networking
Computer Network
It is a bunch of computers linked together.
It is cost efficient and reliable.
Communication Channels
a pathway over which information can be transferred
information sent over a channel has a source (transmitter), from which the information originates,
and destination (receiver), to which the information is delivered
1. Bus topology - each machine is connected to a single cable. Each computer or server is connected to the
single bus cable through some kind of connector. A terminator is required at each end of the bus cable to
prevent the signal from bouncing back and forth on the bus cable.
2. Star topology - each network host (PC) is connected to a central hub with a point-to-point connection. All
traffic on the network passes through the central hub.
3. Ring topology - A network topology that is set up in a circular fashion in which data travels around the
ring in one direction and each device incorporates a receiver for the incoming signal and a transmitter to
send the data on to the next device in the ring.
4. Tree topology - (a.k.a. hierarchical topology) can be viewed as a collection of star networks arranged in
a hierarchy. This tree has individual peripheral nodes (e.g. leaves) which are required to transmit to and
receive from one other node only and are not required to act as repeaters or regenerators. Unlike the star
network, the functionality of the central node may be distributed.
5. Mesh topology - The fully connected mesh topology is generally too costly and complex for practical
networks. It has been used on networks with only a small number of nodes. n most practical networks that
are based upon the partially connected mesh topology, all of the data that is transmitted between nodes in
the network takes the shortest path between nodes.
6. Hybrid networks use a combination of any two or more topologies in such a way that the resulting
network does not exhibit one of the standard topologies (e.g., bus, star, ring, etc.). For example, a tree
network connected to a tree network is still a tree network, but two star networks connected together
exhibit a hybrid network topology. A hybrid topology is always produced when two different basic network
topologies are connected.
Distributed Systems
A distributed system, also known as distributed computing, is a system with multiple components located on
different machines that communicate and coordinate actions in order to appear as a single coherent system to
the end-user.
Centralized Data Processing (CDP) - The conventional way of doing all the processing and control on
centralized computers
Distributed Data Processing (DDP) - refers to the manipulation of data using distributed systems
Client/Server - an extension of distributed data processing wherein it provides the best of both
centralized and distributed data processing
Types of Network
V. REFERENCES: [1] Javatpoint. 2018. Computer Network Types. Retrieved April 10, 2021 from
https://www.javatpoint.com/types-of-computer-network
[2] Squareboat. 2020. Different Types of Software with Examples. Retrieved April 10,
2021 from https://squareboat.com/blog/different-types-of-software-with-examples
[3] TutorialsPoint. 2021. Computer Software. Retrieved April 10, 2021 from
https://www.tutorialspoint.com/computer_fundamentals/computer_software.htm
DISCLAIMER
Every reasonable effort is made to ensure the accuracy of the information used in the creation of this
reference material, without prejudice to the existing copyrights of the authors. As an off-shoot of the innumerable
difficulties encountered during these trying times, the authors endeavored to ensure proper attribution of the
esteemed original works, by way of footnotes or bibliography, to their best abilities and based on available
resources, despite the limited access and mobility due to quarantine restrictions imposed by the duly constituted
authorities.