2 Software
2 Software
TYPES OF
SOFTWARE
Types of software
• System software
• Utility software
• Application software-
3
Types of software
• System software
• System software is a program designed
to run a computer's hardware and
applications and manage its resources,
such as its memory, processors, and
devices. It also provides a platform for
running application software, and
system software is typically bundled
with a computer's operating system.
Example Operating System, Device
Driver, Firmware, and BIOS
4
Types of software
• Utility software
• Utilities are programs that help maintain
and optimize a computer's performance.
5
Types of software
• Application Software
• There are many application software, each
designed for a specific purpose. Some
common examples include word
processors, spreadsheet programs, and
presentation software. Each application
software type has unique features and
functions, making it better suited for
specific tasks than others.
6
Types of software
• Application Software
• There are many application software, each
designed for a specific purpose. Some
common examples include word
processors, spreadsheet programs, and
presentation software. Each application
software type has unique features and
functions, making it better suited for
specific tasks than others.
7
Types of software
• Application Software
• There are many application software, each
designed for a specific purpose. Some
common examples include word
processors, spreadsheet programs, and
presentation software. Each application
software type has unique features and
functions, making it better suited for
specific tasks than others.
8
SOFTWARE and
Its Forms
Software is available in
a variety of forms:
• Retail
• Custom
• Web App
• Mobile App
• Shareware
• Freeware
• Open Source
• Public Domain
10
Software is available in
a variety of forms:
• Retail
• Retail Software shall be defined
to mean any software sold as a
standalone product not
preinstalled or preloaded on a
Product. Terms and conditions
for sale of third party
11
Software is available in
a variety of forms:
• Custom
• Custom Software means
Software developed as a
Deliverable or in connection
with the Agreement.
12
Software is available in
a variety of forms:
• Web App
• A web application (web app) is
an application program that is
stored on a remote server and
delivered over the internet
through a browser interface.
13
Software is available in
a variety of forms:
• Mobile App
• A mobile app (or mobile
application) is a software
application developed specifically
for use on small, wireless computing
devices, such as smartphones and
tablets, rather than desktop or
laptop computers.
14
Software is available in
a variety of forms:
• Shareware
• Shareware is commercial software
that is distributed free to users,
eventually either requiring or
encouraging users to pay for the
continued support of the software.
15
Software is available in
a variety of forms:
• Freeware
• Freeware refers to software that
anyone can download from the
Internet and use for free.
16
Software is available in
a variety of forms:
• Open Source
• Open source software is code that is
designed to be publicly accessible—
anyone can see, modify, and
distribute the code as they see fit.
Open source software is developed
in a decentralized and collaborative
way, relying on peer review and
community production.
17
Software is available in
a variety of forms:
• Public Domain
• Public domain software is any software
that has no legal, copyright or editing
restrictions associated with it. It is free
and open-source software that can be
publicly modified, distributed or sold
without any restrictions. SQLite is a
popular examples of public domain
software.
18
Software is available in
a variety of forms:
• Public Domain
• Public domain software is any software
that has no legal, copyright or editing
restrictions associated with it. It is free
and open-source software that can be
publicly modified, distributed or sold
without any restrictions. SQLite is a
popular examples of public domain
software.
19
Productivity
Applications
Productivity Applications
• Public Domain
• Productivity applications can assist you in
becoming more effective and efficient
while performing daily activities at work,
school, and home
21
Productivity Applications
Word
Presentation Spreadsheet Database Note taking
processing
Calendar and
Project Personal
contact Accounting Legal
management finance
management
22
Communications Applications
Online
Blog Browsing Chat
Discussion
Mobile
Videoconference
Messaging
23
Security Tools
Security Tools
• Firewall
• A personal firewall is a security
tool that detects and protects a
personal computer and its data
from unauthorized intrusions
25
Security Tools
• Anti virus
• An antivirus program protects a
computer against viruses by
identifying and removing any
computer viruses found in
memory, on storage media, or
on incoming files
26
Security Tools
• Spyware is a type of program placed on a
computer or mobile device without the
user’s knowledge that secretly collects
information about the user and then
communicates the information it collects to
some outside source while the user is online
• Adware is a type of program that displays an
online advertisement in a banner or pop-up
or pop-under window on webpages, email
messages, or other Internet services
27
Security Tools
• Spyware is a type of program placed on a
computer or mobile device without the
user’s knowledge that secretly collects
information about the user and then
communicates the information it collects to
some outside source while the user is online
• Adware is a type of program that displays an
online advertisement in a banner or pop-up
or pop-under window on webpages, email
messages, or other Internet services
28
File, Disk, and
System Management
Tools
File, Disk, and System
Management Tools
• A file manager is a tool that
performs functions related to
file management
30
File, Disk, and System
Management Tools
• A search tool is a program,
usually included with an
operating system, that attempts
to locate a file, contact, calendar
event, app, or any other item
stored on your computer or
mobile device based on criteria
you specify
31
File, Disk, and System
Management Tools
• An image viewer is a tool that
allows users to display, copy, and
print the contents of a graphics
file, such as a photo
• An uninstaller is a tool that
removes a program, as well as any
associated entries in the system
files
32
File, Disk, and System
Management Tools
•A disk cleanup tool
searches for and removes
unnecessary files
33
File, Disk, and System
Management Tools
• A disk defragmenter is a tool
that reorganizes the files and
unused space on a computer’s
hard disk so that the
operating system accesses
data more quickly and
programs run faster
34
File, Disk, and System
Management Tools
• A screen saver is a tool that causes a
display device’s screen to show a
moving image or blank screen if no
keyboard or mouse activity occurs for a
specified time
35
File, Disk, and System
Management Tools
• A screen saver is a tool that causes a
display device’s screen to show a moving
image or blank screen if no keyboard or
mouse activity occurs for a specified time
• A file compression tool shrinks the size of a
file(s)
• A PC maintenance tool is a program that
identifies and fixes operating system
problems, detects and repairs drive
problems, and includes the capability of
improving a computer’s performance
36
File, Disk, and System
Management Tools
• A backup tool allows users to copy, or
back up, selected files or the contents of
an entire storage medium to another
storage location
• A restore tool reverses the process and
returns backed up files to their original
form
37
Sample Test
Questions
Question 1
MS-Word is an example of
a. An operating system
b. A processing device
c. Application software
d. An input device
39
Question 1
MS-Word is an example of
a. An operating system
b. A processing device
c. Application software
d. An input device
40
Question 2
What is a process of searching
bugs in software ?
a. Compiling
b. Testing
c. Running
d. Debugging
41
Question 2
What is a process of searching
bugs in software ?
a. Compiling
b. Testing
c. Running
d. Debugging
42
Question 3
Firewalls are used to protect
against
a. Virus Attacks
b. Unauthorized Access
c. Data Driven Attacks
d. Fire Attacks
43
Question 3
Firewalls are used to protect
against
a. Virus Attacks
b. Unauthorized Access
c. Data Driven Attacks
d. Fire Attacks
44
Question 4
Which of the following is not an
Operating System ?
a. Windows Vista
b. Linux
c. Microsoft Office
d. Apple's Mac OS
45
Question 4
Which of the following is not an
Operating System ?
a. Windows Vista
b. Linux
c. Microsoft Office
d. Apple's Mac OS
46
Question 5
Whose trademark is the operating
system UNIX ?
a. Ashton Tate
b. Microsoft
c. INTEL
d. BELL Laboratories
47
Question 5
Whose trademark is the operating
system UNIX ?
a. Ashton Tate (dbase)
b. Microsoft (Microsoft)
c. INTEL (processor)
d. BELL Laboratories
48
Question 6
Which computer language is used
for artificial intelligence ?
a. Java
b. Dot Net
c. C#
d. Python
49
Question 6
Which computer language is used
for artificial intelligence ?
a. Java
b. Dot Net
c. C#
d. Python
50
Question 7
Which of the following is not a
computer programming language ?
a. NULL
b. BASIC
c. PYTHON
d. JAVA
51
Question 7
Which of the following is not a
computer programming language ?
a. NULL
b. BASIC
c. PYTHON
d. JAVA
52
Question 8
"OS" in computer abbreviated as
a. Open Software
b. Order of significance
c. Optical Sensor
d. Operating System
53
Question 8
"OS" in computer abbreviated as
a. Open Software
b. Order of significance
c. Optical Sensor
d. Operating System
54
Question 9
Time during which a job is processed
by the computer is
a. Waiting Time
b. Real Time
c. Delay Time
d. Execution Time
55
Question 9
Time during which a job is processed
by the computer is
a. Waiting Time
b. Real Time
c. Delay Time
d. Execution Time
56
Question 10
Which one of the following is not an
application software package ?
a. Open Office
b. Adobe Pagemaker
c. Redhat Linux
d. Microsoft Office
57
Question 10
Which one of the following is not an
application software package ?
a. Open Office
b. Adobe Pagemaker
c. Redhat Linux
d. Microsoft Office
58
Question 11
Most applications have desktop icons for easy
access. Unfortunately, someone had hidden all
desktop icons. Which of the following actions will
show desktop icons?
a. Press Ctrl + V to show contextual menu
and select “show desktop icon
b. Press Ctrl + 0 to show the contextual menu
and select “show desktop icon”
c. Right click on the desktop to show
contextual menu and select show desktop
icon
d. Restart the computer
59
Question 11
Most applications have desktop icons for easy
access. Unfortunately, someone had hidden all
desktop icons. Which of the following actions will
show desktop icons?
a. Press Ctrl + V to show contextual menu
and select “show desktop icon
b. Press Ctrl + 0 to show the contextual menu
and select “show desktop icon”
c. Right click on the desktop to show
contextual menu and select show desktop
icon
d. Restart the computer
60
Question 12
In order to catch and automatically
replace spelling errors in MS Office
applications, which of the following
features should be enabled?
a. Autoformat
b. Autofill
c. Autocorrect
d. Autosave
61
Question 12
In order to catch and automatically
replace spelling errors in MS Office
applications, which of the following
features should be enabled?
a. Autoformat
b. Autofill
c. Autocorrect
d. Autosave
62
Question 13
Which of the following techniques should be
used in order to divide the picture elements
into visible and invisible portions?
a. Filtering
b. Compression
c. Enhancement
d. Clipping
63
Question 13
Which of the following techniques should be
used in order to divide the picture elements
into visible and invisible portions?
a. Filtering
b. Compression
c. Enhancement
d. Clipping
64
Question 14
Which of the following indicators may
cause a long continues beep, steady
short beep or no beep during system
startup?
a. hardware or software failure
b. missing keyboard
c. surge in electricity
d. damaged speaker
65
Question 14
Which of the following indicators may
cause a long continues beep, steady
short beep or no beep during system
startup?
a. hardware or software failure
b. missing keyboard
c. surge in electricity
d. damaged speaker
66
Question 15
In MS Word, to change the page
margin of the document, which among
the following must be selected from the
Ribbons and Tabs?
a. Insert
b. View
c. Page Layout
d. Review
67
Question 15
In MS Word, to change the page
margin of the document, which among
the following must be selected from the
Ribbons and Tabs?
a. Insert
b. View
c. Page Layout
d. Review
68
Question 16
In MS Excel, which of the following
key combination should be used to
sum up a column of numerical data?
a. Shift +
b. Ctrl +
c. ALT +
d. ALT S
69
Question 16
In MS Excel, which of the following
key combination should be used to
sum up a column of numerical data?
a. Shift +
b. Ctrl +
c. ALT +
d. ALT S
70
Question 17
Which of the following shortcut keys
should be used to duplicate the
Current Slide in MS PowerPoint?
a. Ctrl + D
b. Ctrl + C
c. Ctrl + V
d. Ctrl + Y
71
Question 17
Which of the following shortcut keys
should be used to duplicate the
Current Slide in MS PowerPoint?
a. Ctrl + D
b. Ctrl + C
c. Ctrl + V
d. Ctrl + Y
72
Question 18
In order to permanently delete selected
files and folders in Windows, which of
the following keys should be used?
a. Ctlt + Delete
b. Shift + Delete
c. Alt + Delete
d. Delete
73
Question 18
In order to permanently delete selected
files and folders in Windows, which of
the following keys should be used?
a. Ctlt + Delete
b. Shift + Delete
c. Alt + Delete
d. Delete
74
Question 19
In MS Word, which of the following actions will
remove or hide the border of the shapes as shown
below?
75
Question 19
In MS Word, which of the following actions will
remove or hide the border of the shapes as shown
below?
76
Question 20
If the user wants to move a picture
using Photoshop, which of the following
shortcut keys should be used?
a. Y
b. M
c. H
d. V
77
Question 20
If the user wants to move a picture
using Photoshop, which of the following
shortcut keys should be used?
a. Y
b. M
c. H
d. V
78
Question 21
Mike would want to filter the incoming and outgoing
data from his private network to the public internet
and vice versa. How could Mike perform this action
on his computer?
a. Mike should use the computers
defragmenter.
b. Mike should manage her browsing history.
c. Mike should perform disk clean up once a
week.
d. Mike should turn on her computer firewall.
79
Question 21
Mike would want to filter the incoming and outgoing
data from his private network to the public internet
and vice versa. How could Mike perform this action
on his computer?
a. Mike should use the computers
defragmenter.
b. Mike should manage her browsing history.
c. Mike should performed disk clean up once
a week.
d. Mike should turn on her computer firewall.
80
Question 22
You have noticed that your department’s printer is
currently at used by most of your colleague and you
want to print an important document immediately.
What will you do?
a. Cancel the document before you at the
queue and use the printer.
b. Pause the document before you at the
queue and use the printer.
c. Change the priority setting of the document
in the queue.
d. Schedule your document to be on top of the
queue.
81
Question 22
You have noticed that your department’s printer is
currently at used by most of your colleague and you
want to print an important document immediately.
What will you do?
a. Cancel the document before you at the
queue and use the printer.
b. Pause the document before you at the
queue and use the printer.
c. Change the priority setting of the document
in the queue.
d. Schedule your document to be on top of the
queue.
82
Question 23
This is the primary difference between Virtual Reality and
Augmented Reality.
a. Virtual Reality uses real world enviroment
while Augmented Reality uses the fictional reality.
b. Augmented Reality uses a real-world
environment while Virtual Reality uses completely
the fictional reality.
c. Augmented reality has the ability to alter
our perception of the world while Virtual Reality
transposes the user to a new environment.
d. Virtual Reality has the ability to alter our
perception of the world while Augmented reality
transposes the user to a new environment.
83
Question 23
This is the primary difference between Virtual Reality and
Augmented Reality.
a. Virtual Reality uses real world enviroment
while Augmented Reality uses the fictional reality.
b. Augmented Reality uses a real-world
environment while Virtual Reality uses completely
the fictional reality.
c. Augmented reality has the ability to alter
our perception of the world while Virtual Reality
transposes the user to a new environment.
d. Virtual Reality has the ability to alter our
perception of the world while Augmented reality
transposes the user to a new environment.
84
Question 24
Among are the violation of the single licensed
copy of a computer software EXCEPT.
a. Make one backup copy of the
computer software.
b. Sell a copy of the modified single
licensed computer software.
c. Put a single copy of the software to
be accessed by network users.
d. Install the computer to all your
personal computer.
85
Question 24
Among are the violation of the single licensed
copy of a computer software EXCEPT.
a. Make one backup copy of the
computer software.
b. Sell a copy of the modified single
licensed computer software.
c. Put a single copy of the software to
be accessed by network users.
d. Install the computer to all your
personal computer.
86
Question 25
Which of the following utilities will
you use in changing the boot
sequence of a computer?
a. BIOS Setup Utility
b. FDisk
c. Disk Defragmenter
d. File Manager
87
Question 25
Which of the following utilities will
you use in changing the boot
sequence of a computer?
a. BIOS Setup Utility
b. FDisk
c. Disk Defragmenter
d. File Manager
88
Question 26
Computer programs are written in the syntax of
the programming language that is compiled or
translated to machine-readable form. If the
program later misbehaves, which of the
following is the best source to determine its
logic?
a. program output
b. program flow
c. source code
d. error message
89
Question 26
Computer programs are written in the syntax of
the programming language that is compiled or
translated to machine-readable form. If the
program later misbehaves, which of the
following is the best source to determine its
logic?
a. program output
b. program flow
c. source code
d. error message
90
Question 27
In MS PowerPoint, which of the following
describes motion path?
a. It is a method of moving something Is
a specific way in a slide
b. It controls how object enters the slide
c. It controls how the audience’s eyes is
drawn to the animated object
d. It determines how animated slide
object exits from slide area
91
Question 27
In MS PowerPoint, which of the following
describes motion path?
a. It is a method of moving something Is
a specific way in a slide
b. It controls how object enters the slide
c. It controls how the audience’s eyes is
drawn to the animated object
d. It determines how animated slide
object exits from slide area
92
Question 28
Which of the following describes a worm?
a. It resides in the active memory of
the computer and duplicates itself
b. It disables the user’s device until
the victim pays for a ransom
c. It collects user activity data without
their knowledge
d. It erases user data without
possibility of recovery.
93
Question 28
Which of the following describes a worm?
a. It resides in the active memory of
the computer and duplicates itself
b. It disables the user’s device until
the victim pays for a ransom
c. It collects user activity data without
their knowledge
d. It erases user data without
possibility of recovery.
94
Question 29
Which of the following Excel function
would allow a user to limit the amount
of data to see in a worksheet?
a. Filter
b. Sort
c. Sum
d. Conditional Format
95
Question 29
Which of the following Excel function
would allow a user to limit the amount
of data to see in a worksheet?
a. Filter
b. Sort
c. Sum
d. Conditional Format
96
Question 30
Which of the following master slides in
PowerPoint should be used to
automatically add a logo in the same
position to all the slides?
a. Handout Master
b. Notes Master
c. Title Master
d. Slide Master
97
Question 30
Which of the following master slides in
PowerPoint should be used to
automatically add a logo in the same
position to all the slides?
a. Handout Master
b. Notes Master
c. Title Master
d. Slide Master
98
References
• https://www.simplilearn.com/tutorials/programming-tutorial/what-is-system-
software
• https://www.lawinsider.com/dictionary/retail-software
• https://www.lawinsider.com/dictionary/custom-software
• https://www.techtarget.com/searchsoftwarequality/definition/Web-
application-Web-app
• https://www.techtarget.com/whatis/definition/mobile-app
• https://www.diffen.com/difference/Freeware_vs_Shareware
• https://www.redhat.com/en/topics/open-source/what-is-open-source
• https://www.techopedia.com/definition/9019/public-domain-software
• Discovery Computer 2016
• https://codescracker.com/exam/quiz.php?testid=750&subid=14
99
Thank you
100