Want to create interactive content? It’s easy in Genially!

Get started free

mapa conceptual en ingles

Ducan

Created on November 9, 2024

Start designing with a free template

Discover more than 1500 professional designs like these:

Akihabara Connectors Infographic

Essential Infographic

Practical Infographic

Akihabara Infographic

The Power of Roadmap

Artificial Intelligence in Corporate Environments

Interactive QR Code Generator

Transcript

Unit 2

Installation of utility and general-purpose software for a computer system

Operating Environments

Application Requirements

Types of Applications

Comparison of Applications. Evaluation and Performance.

Utilities

General-purpose software

Needs of exploration environments

1. Operating Environments

An operating environment refers to the software that encompasses the operating system, its associated user interface, and some of the applications that typically come with it.

The operating environment may include:

  • Operating system
  • Database management systems (DBMS)
  • Communication systems
  • Transaction monitors
  • CASE tools and development environments in general

2.1 Installation and Installation Testing

With this system, we manage to encapsulate the application within a controlled environment

We can install both general-purpose and specific applications, depending on the needs of each user. Additionally, it is necessary to have a database that includes a series of specific tests

2. Types of Applications

Application software is that which enables the computer to cooperate with the user in performing tasks typically human, such as managing accounting or writing a text

The difference between system programs and application programs lies in that the former help the user interact with the computer and use it in a general way, while application programs collaborate directly with the user to perform specific tasks

Some examples of application software are:

  • Word processors (Notepad).
  • Editors (Photoshop for Graphic Design).
  • Spreadsheets (MS Excel).
  • Database management systems (MySQL).
  • Communication programs (MSN Messenger).
  • Integrated packages (Office: Word, Excel, PowerPoint...).
  • Computer-aided design programs (AutoCAD).
  • Specific programs like accounting, invoicing.
  • Utilities like compressors, diagnostics.

3. Needs of Exploration Environments

Computer exploitation is responsible for producing all kinds of computer results: printed listings, magnetically stored files for other IT professionals, automated orders to launch or modify industrial processes, etc

To carry out computer exploitation, there is a raw material: data, which needs to be transformed and is subjected to integrity and quality controls beforehand

Computer exploitation is divided into three main areas: Planning, Production, and Technical Support, each of which has several groups

1. Data Input Control

5. Network Control Center and Diagnosis Center

3. Control Center and Job Monitoring

2. Planning and Reception of Applications

4. Operation. Computer Rooms

4. Application Requirements

When an application is being developed, a tracking model is followed

Computer applications require physical requirements, hardware, and logical requirements, base software

Regarding hardware, the product manufacturer usually specifies the minimum requirements for the application to achieve optimal minimum performance. Some examples are RAM and the processor. The same manufacturer will also indicate the base software requirements installed on the machine.

5. Comparison of Applications. Evaluation and Performance

We can distinguish between different types of benchmarks:

Internal Benchmarking

Functional Benchmarking

Competitive Benchmarking

Generic Benchmarking

6. General-purpose software

Application software, in general, is software that allows users to carry out specific tasks

  • Applications for System Control and Industrial Automation
  • Office Applications
  • Educational Software
  • Business Software
  • Databases
  • Telecommunications (e.g., the internet and its logical structure)
  • Video Games
  • Medical Software
  • Numerical and Symbolic Calculation Software
  • Computer-Aided Design (CAD) Software
  • Computer-Aided Manufacturing (CAM) Software

6.1. Office Automation and Electronic Documentation

An office application is software designed to perform tasks related to the administrative and management environment. Office applications have become widely used in both the workplace and at home.

An office application is software designed to perform tasks related to the administrative and management environment. Office applications have become widely used in both the workplace and at home

Known examples include:

Office

OpenOffice

6.2. Image, Design, and Multimedia I

This group of software includes all programs that are directly related to viewing, playing, and/or editing images, video, and sound

IMAGE:

For image editing, we must distinguish between bitmap editors and vector image editors

These are the 6 best applications for viewing photos on Windows 10

FocusOn Imagen Viewer

IrfanView

XnViewClassic

Honey View

ApowersoftPhotoViewer

AshampooPhotoCommander Free

6.3 Image, Design, and Multimedia II

Vector images are made up of independent geometric objects

Notable examples of software that use vector formats are:

  • Corel Draw
  • Macromedia
  • Inkscape
  • QuarkXpress
  • Editor Vml

6.4 Image, Design, and Multimedia III

SOUND:

We can distinguish between: players, editors, and specific utilities

Players allow the playback of sounds stored in files, as long as they are in a "readable" format. Some of the most well-known formats are: MP3, WMA, RealAudio, Vorbis, AC3

As for examples of applications that use these formats: Winamp, Sonique, Windows Media Player, VLC Media Player

VIDEO:

Regarding players, we can distinguish between file playback and CD or DVD playback. Generally, CD and/or DVD players can play files in different formats

Examples of DVD players include: PowerDVD, WinDVD, etc

The most widely used video editors are: Adobe Premiere, Pinnacle Video Studio

6.5 Programming

It refers to the creation of a set of instructions, a human or source language, that must be converted into machine language or object code so that the computer can understand it. This is achieved through specific software or a utility that converts the source language into object code

This type of software can be: a translator or a compiler

6.6. Clients for Services

This group of specific software includes all applications that allow us to communicate over the Internet. It’s important to note that any software used on the Internet can also be used in local area networks or even in extranets

Among the most common applications are:

Firewalls

Web Browsers

P2P Applications

Email Clients

Internet Multimedia Players

FTP Clients

Chat Programs

VoIP Telephony

6.6 Custom Software

Custom software refers to all applications developed according to the specific requirements of an institution or company. The main characteristics are:

  • It requires a development time.
  • It adapts to the specific needs of the company.
  • During implementation, it typically contains errors that need to be corrected.
  • The application is tailored to the company, rather than the company having to adapt to it, as is the case with "off-the-shelf" software.
  • It is more expensive than standard or "off-the-shelf" software

7. Utilities

Computing has evolved in aspects such as globalization. A computer is understood as a source of information that is constantly growing in terms of data quantity, volume, and size.

7.1 Compressors

Compressors were created to meet a goal: to make files smaller and easier to transport. This transportation can be done using mobile devices such as USB drives or by transferring them over the network to other computers or servers using tools or utilities (ftp, ssh, etc.).

Although they are called compressors, they actually serve the dual function of compressing files and decompressing them.

The space occupied by encoded information without compression is the quotient of the sampling frequency and the resolution.

7.2 Monitoring and Optimization of the System

Users of Monitoring

System monitoring is the process of detecting and preventing failures in processes, meaning a well-monitored application or program should be designed to timely identify the precursors or indicators of a failure. This process is also responsible for tracking the status of the system.

This tool is primarily used by operations teams, who will employ this strategy to detect failures and try to resolve them before they occur.

Key Concepts in Monitoring

Uses of Monitoring

Advantages of System Monitoring

a) Measurement

a) Visualization

Monitoring and its strategy of early notification of errors that may occur in the program represent a significant advantage for the operating system, as it saves time and costs, as well as increases customer satisfaction.

b) Metric

b) Trends

c) Measurement Frequency

c) Alerts

d) Monitoring Perspective

7.3. File Management and Data Recovery. Windows and Linux

We must understand what an operating system does to delete a file so quickly. We call it a file system, and depending on the operating system, it will use one or another. The most well-known are: Fat, Fat32, and Ntfs for Windows, ext2, ext3, ReiserFS, XFS, JFS, and ISO9660 for Linux. The most widespread are ext2 and ext3.

Command Line Tools

ddrescue: Ideal for recovering data from disks with damaged sectors.

testdisk: Powerful tool for recovering lost partitions and repairing partition tables.

photorec: Specialized in recovering photos, videos, and documents from formatted or damaged storage media.

Graphical Tools

R-Linux: Graphical user interface to facilitate file recovery on EXT4, NTFS, and other file systems.

Extundelete: Specific for EXT3 and EXT4 file systems.

7.4. Disk Tools. Fragmentation

One of the most used utilities is the deletion of temporary files that leave a trail or junk from the software that interacts with mass storage devices.

The basic parameters are: -a automatically confirm. -c check blocks on the disk. -f force verification even if everything seems normal. -v display more information. -r Interactive mode. Waits for our response. -y assumes and is a response.

There are utilities for defragmenting disks in Windows. The operating system itself has a utility for defragmenting mass storage devices. To defragment the disk, we can use a free distribution tool, Smart defrag.

In Windows, the chkdsk command is well known. This command checks the integrity of a mass storage drive and repairs logical errors in the file system.

In Linux, we have a similar command, fsck. It usually auto-executes when, during the initial check of mass storage systems, it detects any irregularities.

Steps: Its use is very simple, you just have to open a terminal window and type the following:

1 sudo e4defrag -c /path

1 sudo e4defrag /dev/sda*

7.5. Security. Updates. Windows

In a Windows operating system, we can encrypt the folders we need. This process will ensure that a user of the system who is not the one who created it can see the file but will not be able to open or copy it.

The procedure to perform the encryption is as follows:

  1. Click on Start/Documents / select a folder.
  2. Find and right-click on the folder you want, then click on Properties.
  3. In the General tab, click on Advanced.
  4. In Compression and Encryption Attributes, check the box Encrypt contents to protect data, and then click OK.
  5. Click OK.
  6. In the Confirm attribute changes dialog that appears, follow one of the following procedures:
  7. If you want to encrypt the folder exclusively, click Apply changes to this folder only and then click OK.
  8. If you want to encrypt the existing content in the folder along with it, click Apply changes to this folder, subfolders, and files, and then click OK.
  9. I can change the icon.

¿Tienes una idea?

Usa este espacio para añadir una interactividad genial. Incluye texto, imágenes, vídeos, tablas, PDFs… ¡incluso preguntas interactivas! Tip premium: Obten información de cómo interacciona tu audiencia:

  • Visita las preferencias de Analytics;
  • Activa el seguimiento de usuarios;
  • ¡Que fluya la comunicación!

The preparation, launch, and monitoring of daily production will be analyzed

  • Batch: Batch applications are those that load large amounts of information throughout the day, and during the night, a massive process runs that organizes all the information, performs calculations, and outputs results, such as reports.
  • Real-Time: Real-time or online applications are those that, after entering the corresponding information, immediately process it and return a result.