Want to create interactive content? It’s easy in Genially!
mapa conceptual en ingles
Ducan
Created on November 9, 2024
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Akihabara Connectors Infographic
View
Essential Infographic
View
Practical Infographic
View
Akihabara Infographic
View
The Power of Roadmap
View
Artificial Intelligence in Corporate Environments
View
Interactive QR Code Generator
Transcript
Unit 2
Installation of utility and general-purpose software for a computer system
Operating Environments
Application Requirements
Types of Applications
Comparison of Applications. Evaluation and Performance.
Utilities
General-purpose software
Needs of exploration environments
1. Operating Environments
An operating environment refers to the software that encompasses the operating system, its associated user interface, and some of the applications that typically come with it.
The operating environment may include:
- Operating system
- Database management systems (DBMS)
- Communication systems
- Transaction monitors
- CASE tools and development environments in general
2.1 Installation and Installation Testing
With this system, we manage to encapsulate the application within a controlled environment
We can install both general-purpose and specific applications, depending on the needs of each user. Additionally, it is necessary to have a database that includes a series of specific tests
2. Types of Applications
Application software is that which enables the computer to cooperate with the user in performing tasks typically human, such as managing accounting or writing a text
The difference between system programs and application programs lies in that the former help the user interact with the computer and use it in a general way, while application programs collaborate directly with the user to perform specific tasks
Some examples of application software are:
- Word processors (Notepad).
- Editors (Photoshop for Graphic Design).
- Spreadsheets (MS Excel).
- Database management systems (MySQL).
- Communication programs (MSN Messenger).
- Integrated packages (Office: Word, Excel, PowerPoint...).
- Computer-aided design programs (AutoCAD).
- Specific programs like accounting, invoicing.
- Utilities like compressors, diagnostics.
3. Needs of Exploration Environments
Computer exploitation is responsible for producing all kinds of computer results: printed listings, magnetically stored files for other IT professionals, automated orders to launch or modify industrial processes, etc
To carry out computer exploitation, there is a raw material: data, which needs to be transformed and is subjected to integrity and quality controls beforehand
Computer exploitation is divided into three main areas: Planning, Production, and Technical Support, each of which has several groups
1. Data Input Control
5. Network Control Center and Diagnosis Center
3. Control Center and Job Monitoring
2. Planning and Reception of Applications
4. Operation. Computer Rooms
4. Application Requirements
When an application is being developed, a tracking model is followed
Computer applications require physical requirements, hardware, and logical requirements, base software
Regarding hardware, the product manufacturer usually specifies the minimum requirements for the application to achieve optimal minimum performance. Some examples are RAM and the processor. The same manufacturer will also indicate the base software requirements installed on the machine.
5. Comparison of Applications. Evaluation and Performance
We can distinguish between different types of benchmarks:
Internal Benchmarking
Functional Benchmarking
Competitive Benchmarking
Generic Benchmarking
6. General-purpose software
Application software, in general, is software that allows users to carry out specific tasks
- Applications for System Control and Industrial Automation
- Office Applications
- Educational Software
- Business Software
- Databases
- Telecommunications (e.g., the internet and its logical structure)
- Video Games
- Medical Software
- Numerical and Symbolic Calculation Software
- Computer-Aided Design (CAD) Software
- Computer-Aided Manufacturing (CAM) Software
6.1. Office Automation and Electronic Documentation
An office application is software designed to perform tasks related to the administrative and management environment. Office applications have become widely used in both the workplace and at home.
An office application is software designed to perform tasks related to the administrative and management environment. Office applications have become widely used in both the workplace and at home
Known examples include:
Office
OpenOffice
6.2. Image, Design, and Multimedia I
This group of software includes all programs that are directly related to viewing, playing, and/or editing images, video, and sound
IMAGE:
For image editing, we must distinguish between bitmap editors and vector image editors
These are the 6 best applications for viewing photos on Windows 10
FocusOn Imagen Viewer
IrfanView
XnViewClassic
Honey View
ApowersoftPhotoViewer
AshampooPhotoCommander Free
6.3 Image, Design, and Multimedia II
Vector images are made up of independent geometric objects
Notable examples of software that use vector formats are:
- Corel Draw
- Macromedia
- Inkscape
- QuarkXpress
- Editor Vml
6.4 Image, Design, and Multimedia III
SOUND:
We can distinguish between: players, editors, and specific utilities
Players allow the playback of sounds stored in files, as long as they are in a "readable" format. Some of the most well-known formats are: MP3, WMA, RealAudio, Vorbis, AC3
As for examples of applications that use these formats: Winamp, Sonique, Windows Media Player, VLC Media Player
VIDEO:
Regarding players, we can distinguish between file playback and CD or DVD playback. Generally, CD and/or DVD players can play files in different formats
Examples of DVD players include: PowerDVD, WinDVD, etc
The most widely used video editors are: Adobe Premiere, Pinnacle Video Studio
6.5 Programming
It refers to the creation of a set of instructions, a human or source language, that must be converted into machine language or object code so that the computer can understand it. This is achieved through specific software or a utility that converts the source language into object code
This type of software can be: a translator or a compiler
6.6. Clients for Services
This group of specific software includes all applications that allow us to communicate over the Internet. It’s important to note that any software used on the Internet can also be used in local area networks or even in extranets
Among the most common applications are:
Firewalls
Web Browsers
P2P Applications
Email Clients
Internet Multimedia Players
FTP Clients
Chat Programs
VoIP Telephony
6.6 Custom Software
Custom software refers to all applications developed according to the specific requirements of an institution or company. The main characteristics are:
- It requires a development time.
- It adapts to the specific needs of the company.
- During implementation, it typically contains errors that need to be corrected.
- The application is tailored to the company, rather than the company having to adapt to it, as is the case with "off-the-shelf" software.
- It is more expensive than standard or "off-the-shelf" software
7. Utilities
Computing has evolved in aspects such as globalization. A computer is understood as a source of information that is constantly growing in terms of data quantity, volume, and size.
7.1 Compressors
Compressors were created to meet a goal: to make files smaller and easier to transport. This transportation can be done using mobile devices such as USB drives or by transferring them over the network to other computers or servers using tools or utilities (ftp, ssh, etc.).
Although they are called compressors, they actually serve the dual function of compressing files and decompressing them.
The space occupied by encoded information without compression is the quotient of the sampling frequency and the resolution.
7.2 Monitoring and Optimization of the System
Users of Monitoring
System monitoring is the process of detecting and preventing failures in processes, meaning a well-monitored application or program should be designed to timely identify the precursors or indicators of a failure. This process is also responsible for tracking the status of the system.
This tool is primarily used by operations teams, who will employ this strategy to detect failures and try to resolve them before they occur.
Key Concepts in Monitoring
Uses of Monitoring
Advantages of System Monitoring
a) Measurement
a) Visualization
Monitoring and its strategy of early notification of errors that may occur in the program represent a significant advantage for the operating system, as it saves time and costs, as well as increases customer satisfaction.
b) Metric
b) Trends
c) Measurement Frequency
c) Alerts
d) Monitoring Perspective
7.3. File Management and Data Recovery. Windows and Linux
We must understand what an operating system does to delete a file so quickly. We call it a file system, and depending on the operating system, it will use one or another. The most well-known are: Fat, Fat32, and Ntfs for Windows, ext2, ext3, ReiserFS, XFS, JFS, and ISO9660 for Linux. The most widespread are ext2 and ext3.
Command Line Tools
ddrescue: Ideal for recovering data from disks with damaged sectors.
testdisk: Powerful tool for recovering lost partitions and repairing partition tables.
photorec: Specialized in recovering photos, videos, and documents from formatted or damaged storage media.
Graphical Tools
R-Linux: Graphical user interface to facilitate file recovery on EXT4, NTFS, and other file systems.
Extundelete: Specific for EXT3 and EXT4 file systems.
7.4. Disk Tools. Fragmentation
One of the most used utilities is the deletion of temporary files that leave a trail or junk from the software that interacts with mass storage devices.
The basic parameters are: -a automatically confirm. -c check blocks on the disk. -f force verification even if everything seems normal. -v display more information. -r Interactive mode. Waits for our response. -y assumes and is a response.
There are utilities for defragmenting disks in Windows. The operating system itself has a utility for defragmenting mass storage devices. To defragment the disk, we can use a free distribution tool, Smart defrag.
In Windows, the chkdsk command is well known. This command checks the integrity of a mass storage drive and repairs logical errors in the file system.
In Linux, we have a similar command, fsck. It usually auto-executes when, during the initial check of mass storage systems, it detects any irregularities.
Steps: Its use is very simple, you just have to open a terminal window and type the following:
1 sudo e4defrag -c /path
1 sudo e4defrag /dev/sda*
7.5. Security. Updates. Windows
In a Windows operating system, we can encrypt the folders we need. This process will ensure that a user of the system who is not the one who created it can see the file but will not be able to open or copy it.
The procedure to perform the encryption is as follows:
- Click on Start/Documents / select a folder.
- Find and right-click on the folder you want, then click on Properties.
- In the General tab, click on Advanced.
- In Compression and Encryption Attributes, check the box Encrypt contents to protect data, and then click OK.
- Click OK.
- In the Confirm attribute changes dialog that appears, follow one of the following procedures:
- If you want to encrypt the folder exclusively, click Apply changes to this folder only and then click OK.
- If you want to encrypt the existing content in the folder along with it, click Apply changes to this folder, subfolders, and files, and then click OK.
- I can change the icon.
¿Tienes una idea?
Usa este espacio para añadir una interactividad genial. Incluye texto, imágenes, vídeos, tablas, PDFs… ¡incluso preguntas interactivas! Tip premium: Obten información de cómo interacciona tu audiencia:
- Visita las preferencias de Analytics;
- Activa el seguimiento de usuarios;
- ¡Que fluya la comunicación!
The preparation, launch, and monitoring of daily production will be analyzed
- Batch: Batch applications are those that load large amounts of information throughout the day, and during the night, a massive process runs that organizes all the information, performs calculations, and outputs results, such as reports.
- Real-Time: Real-time or online applications are those that, after entering the corresponding information, immediately process it and return a result.