chapter 5 computer software and systems
TRANSCRIPT
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
1/40
COMPUTERCOMPUTER
SOFTWARE ANDSOFTWARE AND
SYSTEMSSYSTEMS
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
2/40
A. Computer SoftwareA. Computer Software
Software is the general term applied to theSoftware is the general term applied to the
instructions that direct the computersinstructions that direct the computers
hardware to perform workhardware to perform work
Software consists of instruction communicatedSoftware consists of instruction communicated
electronically to the hardwareelectronically to the hardware
2 Purposes of the Software2 Purposes of the Software
1. It is needed to translate instructions created1. It is needed to translate instructions createdin human language to machine languagein human language to machine language
2. Packaged or stored software is needed to2. Packaged or stored software is needed to
make the computer an economical work toolmake the computer an economical work tool
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
3/40
ProgramsPrograms -organized instruction sets supplied to-organized instruction sets supplied to
the softwarethe software
PackagePackage a set of related programs a set of related programs
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
4/40
B. Brief History ofComputer Programming
& Software1800s1800s idea of having computer programs stored on a idea of having computer programs stored on a
hard drive and brought into memory at the usershard drive and brought into memory at the users
commandcommand
Augusta Ada ByronAugusta Ada Byron first described the concept of a stored first described the concept of a stored
computer programcomputer program
Charles BabbageCharles Babbage invented the analytical machine invented the analytical machine
Countess LovelaceCountess Lovelace she theorized the loop concept, it is she theorized the loop concept, it is
the use of automatic repetitious arithmetic steps to solve athe use of automatic repetitious arithmetic steps to solve a
problem; she is also the first programmerproblem; she is also the first programmer
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
5/40
Robert Von NewmannRobert Von Newmann proposed that both data and proposed that both data andinstructions could be automatically carried oninstructions could be automatically carried on
Joseph JacquardJoseph Jacquard invented the Jacquard Loom used to blocks invented the Jacquard Loom used to blocksof wood with holes drilled in such a way that the threads to beof wood with holes drilled in such a way that the threads to bewoven into cloth could form a programwoven into cloth could form a program
Herman Hollerith (1884)Herman Hollerith (1884) developed a machine that could developed a machine that couldread punch cards and tabulate the resultsread punch cards and tabulate the results
Punch Card MethodPunch Card Method existed until the late 19600s while inexisted until the late 19600s while inmany computer centers use the method until around 1980many computer centers use the method until around 1980
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
6/40
Rear Admiral Grace Murray HopperRear Admiral Grace Murray Hopper the mother of the mother ofcomputing because she developed many of the conceptscomputing because she developed many of the conceptsand mathematical foundations of computer programmingand mathematical foundations of computer programmingscience; worked with Mark I, the first digital Computer;science; worked with Mark I, the first digital Computer;also coined the term debuggingalso coined the term debugging
1950s1950s foundation of common business-oriented language foundation of common business-oriented language
(COBOL) which is the first universal programming(COBOL) which is the first universal programming
language and first truly English-like languagelanguage and first truly English-like language
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
7/40
BASIC INPUT OUTPUT SYSTEM (BIOS)BASIC INPUT OUTPUT SYSTEM (BIOS) the software on the software on
the BIOS chip is the first part of the computer to function whenthe BIOS chip is the first part of the computer to function when
the computer is turned onthe computer is turned on
OPERATING SYSTEMS (OS)OPERATING SYSTEMS (OS) are the actual software loaded are the actual software loaded
from the hard rive into RAM as soon as the computer is turnedfrom the hard rive into RAM as soon as the computer is turned
onon
C. Types ofSoftware
1.System Software boots up the computer system(starts up and initializes); controls input, output andstorage; and controls the operations of the application
software
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
8/40
USER INTERFACESUSER INTERFACES
a. Disk Operating System (DOS OS)a. Disk Operating System (DOS OS) designed for designed formainframe computers and replicated the proceduresmainframe computers and replicated the procedures
programmers used under manual OSsprogrammers used under manual OSs
b. Graphical User Interface (GUI)b. Graphical User Interface (GUI) the computer for the computer for
everybody, Macintosheverybody, Macintosh
2. Applications Software2. Applications Software support the actual wok of support the actual wok of
the user; includes the various programs people use tothe user; includes the various programs people use to
do work process data, play games, communicate withdo work process data, play games, communicate with
others, or watch multimedia programsothers, or watch multimedia programs
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
9/40
3. Utility Programs3. Utility Programs used to help maintain the system, used to help maintain the system,
clean up unwanted programs, protect the system againstclean up unwanted programs, protect the system against
various attacks, access the World Wide Web (WWW), andvarious attacks, access the World Wide Web (WWW), and
the likethe like
- designed to enhance the functions of the OS or perhaps to- designed to enhance the functions of the OS or perhaps to
add facilities that the basic OS does not offeradd facilities that the basic OS does not offer
Language Translation UtilitiesLanguage Translation Utilities translation programs translation programs
are needed to convert instructions written in an English-are needed to convert instructions written in an English-like language into binary. These types of translationlike language into binary. These types of translation
programs are calledprograms are called assemblers, compilers, orassemblers, compilers, or
interpretersinterpreters
The World Wide Web and Web BrowsersThe World Wide Web and Web Browsers WWWWWWprovides a protocol for document transfer across theprovides a protocol for document transfer across the
internet; ainternet; a Web BrowserWeb Browser is a utility program thatis a utility program that
allows the user to access the web and the materialsallows the user to access the web and the materials
available through the webavailable through the web
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
10/40
Programming LanguagesProgramming Languages means of communicating with means of communicating withthe computerthe computer
Generations and Levels of Programming LanguagesGenerations and Levels of Programming Languages
Divided into 5 generations, or in sometimes at 3 levelsDivided into 5 generations, or in sometimes at 3 levels
Level refers to how close the language is to the actualLevel refers to how close the language is to the actualmachinemachine
1. First Level (includes the first 2 generations of1. First Level (includes the first 2 generations ofprogramming: machine language and assembly language)programming: machine language and assembly language)
2. Second Level (includes high-level procedural and2. Second Level (includes high-level procedural and
nonprocedural languages)nonprocedural languages)
3. Third Level (includes natural language; also the 5th3. Third Level (includes natural language; also the 5thgeneration)generation)
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
11/40
Machine LanguageMachine Language true language of the true language of thecomputercomputer
Assembler LanguageAssembler Language far more English-like, but far more English-like, but
still very close to machine languagestill very close to machine language
Third Generation LanguagesThird Generation Languages include the include theprocedural and nonprocedural languages and wereprocedural and nonprocedural languages and werethe beginning of the second level in programmingthe beginning of the second level in programminglanguageslanguages;; the style and sequence of a languagethe style and sequence of a languageare called syntaxare called syntax
Fourth Generation Languages specialized applicationprograms that require more involvement of the user in directingthe program to do necessary work
Fifth Generation Languages or third level languages arealso called natural language; user tells the machine what to doin the users own natural language or through the use of a set of a
very English-like commands
Visual Programming LanguagesVisual Programming Languages facilitate program facilitate program
development in graphics-based environmentsdevelopment in graphics-based environments
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
12/40
D. Common Software
Packages forMicrocomputers
Standard Office PackageStandard Office Package - most common package sold- most common package soldwith computers; includes a word-processing program, awith computers; includes a word-processing program, a
spreadsheet, a presentation graphics program, and somespreadsheet, a presentation graphics program, and some
form of data-base management systemform of data-base management system
2 Most Commonly Used Programs2 Most Commonly Used Programs
1. E-mail Systems1. E-mail Systems
2. Word Processor2. Word Processor
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
13/40
E. Software PackageE. Software Package
Ownership RightsOwnership Rights The software industry has followed an ownership model moreThe software industry has followed an ownership model more
similar to that of the book publishing industry, in order to avertsimilar to that of the book publishing industry, in order to avertusers not to distribute the programsusers not to distribute the programs
When a commercial product is sold, the buyer can not use theWhen a commercial product is sold, the buyer can not use theproduct or resell it or loan it to a friend if so desiredproduct or resell it or loan it to a friend if so desired
Copying the product is not feasibleCopying the product is not feasible
Any other installations, apart from the original purchasers, wereAny other installations, apart from the original purchasers, wereconsidered illegalconsidered illegal
An exception can be made if the purchaser has both a desktop andAn exception can be made if the purchaser has both a desktop anda laptop, fair use allow him to install programs on all the machinesa laptop, fair use allow him to install programs on all the machineshe owns, so long as the computers are for his personal use onlyhe owns, so long as the computers are for his personal use only
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
14/40
Companies that have multiple computers that are used byCompanies that have multiple computers that are used bymany employees must purchase a separate copy for eachmany employees must purchase a separate copy for eachmachine, or purchase a site license (a way of buying inmachine, or purchase a site license (a way of buying inbulk or so to speak)bulk or so to speak)
What is not permitted, in fact a from of theft, is to installWhat is not permitted, in fact a from of theft, is to installmore copies of the software than were paid formore copies of the software than were paid for
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
15/40
F. Common SoftwareF. Common Software
Useful to NursesUseful to NursesSoftware used by nurses includesSoftware used by nurses includes admission, discharge,admission, discharge,and transfer (ADTand transfer (ADT) systems that help with patient) systems that help with patienttracking, andtracking, and medication administration record (MARmedication administration record (MAR))softwaresoftware
Computer Physician Order Entry (CPOE)Computer Physician Order Entry (CPOE) is alsois alsoconsidered, a system to be so important that they list it asconsidered, a system to be so important that they list it asa separate item on their quality checklista separate item on their quality checklist
Chat RoomsChat Rooms are like electronic conference calls are like electronic conference calls
Electronic Bulletin BoardsElectronic Bulletin Boards creates space where users creates space where userscan post a messagecan post a message
List ServersList Servers the least powerful version of an electronic the least powerful version of an electronicbulletin boardbulletin board
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
16/40
G. ComputerG. Computer
ProgrammingProgramming Refers to the process of writing a computer program,Refers to the process of writing a computer program,
which is a series of instructions written in properwhich is a series of instructions written in proper
sequence to solve a problemsequence to solve a problem
5 Major Steps
Problem Definition (functional specifications Program Design
Writing the Code and Program Documentation
Alpha Testing
Beta Testing and Program Documentation
Problem or Functions Specification requires that theproblem or task be very precisely defined and theprocedures to be performed by the program be perfectlymisunderstood into the programming language to be used
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
17/40
Program Design SpecificationsProgram Design Specifications
2 Types of specifications2 Types of specifications
1. Set of functional specifications that identifies all the1. Set of functional specifications that identifies all the
functions thefunctions the
program is to performprogram is to perform
2. (SPECS) Design specs instructions given to the2. (SPECS) Design specs instructions given to theprogrammerprogrammer
Program PreparationProgram Preparation - the actual writing (coding) of the program,- the actual writing (coding) of the program,entails translating the design specifications into the programmingentails translating the design specifications into the programminglanguage to be usedlanguage to be used
DocumentationDocumentation
2 Types of Documentation that Must be Produced2 Types of Documentation that Must be Produced
1. The program itself should be designed in a highly structured,1. The program itself should be designed in a highly structured,top-down manner, and the lines of the code should be liberallytop-down manner, and the lines of the code should be liberallysprinkled with explanatory statementssprinkled with explanatory statements
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
18/40
2. Users Manual provides clear directions and examples of2. Users Manual provides clear directions and examples ofhow to makehow to make
the program work as intendedthe program work as intended
Program TestingProgram Testing
Alpha TestingAlpha Testing also called desk checking, its purpose is also called desk checking, its purpose isto see if all the processes appear to be functioning asto see if all the processes appear to be functioning as
specified in the flow charts, functional specifications, andspecified in the flow charts, functional specifications, anddesign specsdesign specs Beta TestingBeta Testing the program is installed in the actual user the program is installed in the actual user
environment, and further programming of screen formatsenvironment, and further programming of screen formatsand other user interface functions is performedand other user interface functions is performed
Program ImplementationProgram Implementation the final step in programming; the final step in programming;the program is implemented throughout the beta sitethe program is implemented throughout the beta site
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
19/40
H. Computer SystemsH. Computer Systems
It is a complex entity, consisting of an organizedIt is a complex entity, consisting of an organizedset of interconnected components or factors thatset of interconnected components or factors that
function together as a unit to accomplish resultsfunction together as a unit to accomplish resultsthat one part alone could notthat one part alone could not
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
20/40
I. Systems TheoryI. Systems Theory
Provides the conceptual basis for understanding complexProvides the conceptual basis for understanding complexentities that consist of multiple interrelated parts workingentities that consist of multiple interrelated parts workingtogether to achieve a desired result. Such entities aretogether to achieve a desired result. Such entities arecalled called systemssystems
Primary Propositions of the TheoryPrimary Propositions of the Theory
1. A system takes in input on which to perform processes1. A system takes in input on which to perform processes
2. The processes performed by a system on input result in2. The processes performed by a system on input result insystem outputsystem output
3. The processes in a system are subject to control forces3. The processes in a system are subject to control forces
4. Feedback is the key mechanism of control in a system4. Feedback is the key mechanism of control in a system
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
21/40
5. A systems parts interact in such a way that the parts are5. A systems parts interact in such a way that the parts areinterdependent with the respect to the systems processesinterdependent with the respect to the systems processes
6. Impingement on one part in a system will produce effects on the6. Impingement on one part in a system will produce effects on thesystems processes and may produce distortions on the other partssystems processes and may produce distortions on the other partsof the system. A corollary to this proposition is the followingof the system. A corollary to this proposition is the following
7. Distortion in one part of a system may be a symptom of a problem7. Distortion in one part of a system may be a symptom of a problemin another component (Secondary Malfunction)in another component (Secondary Malfunction)
8. Thus, correction of a malfunctioning part will correct the system8. Thus, correction of a malfunctioning part will correct the systemfunctioning only if the malfunction was a primary malfunction andfunctioning only if the malfunction was a primary malfunction andnot a secondary malfunctionnot a secondary malfunction
9. Effects on the systems processing function will affect the systems9. Effects on the systems processing function will affect the systemsoutputoutput
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
22/40
10. A system is more than the sum of its parts. Thus, while a10. A system is more than the sum of its parts. Thus, while asystem can be broken down into its component parts, if thissystem can be broken down into its component parts, if thisis done, the system no longer exists. Corollaries to thisis done, the system no longer exists. Corollaries to thisproposition are the following:proposition are the following:
(a) The functioning of a system is different than the(a) The functioning of a system is different than thefunctioning of its partsfunctioning of its parts
(b) The output of each separate part, even if combined, does(b) The output of each separate part, even if combined, doesnot equal the output of the systemnot equal the output of the system
(c) When combined into a system, the component parts form(c) When combined into a system, the component parts forman entirely new entityan entirely new entity
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
23/40
J. System ElementsJ. System Elements
1. Interdependent Parts 1. Interdependent Parts the most defining attribute of athe most defining attribute of asystem is that its parts interact to conduct some processsystem is that its parts interact to conduct some process
2. Input 2. Input is any factor from the external environment that isis any factor from the external environment that istaken into the systemtaken into the system
3. Process 3. Process the activity of the systemthe activity of the system
4. Output 4. Output any product or waste produced as a result ofany product or waste produced as a result ofsystem processsystem process
5. Control 5. Control refers to any component or activity that serves torefers to any component or activity that serves toprevent or correct problems or errors in the systems input,prevent or correct problems or errors in the systems input,process, outputprocess, output
6. Feedback 6. Feedback is output from one part of a system process thatis output from one part of a system process thatserves as input to another part of a system processserves as input to another part of a system process
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
24/40
K. Classification ofK. Classification of
SystemsSystems
Closed Systems Closed Systems a system with the followinga system with the followingcharacteristics: differentiation, isolation, independence,characteristics: differentiation, isolation, independence,and self-sufficiency (self-containment or self-regulation)and self-sufficiency (self-containment or self-regulation)
Open Systems Open Systems systems that exhibit integration, fluidsystems that exhibit integration, fluidor fuzzy boundaries, and interaction with theiror fuzzy boundaries, and interaction with theirenvironments (Markas, 2002)environments (Markas, 2002)
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
25/40
Figure 5.8
Open System Interactions
CDCinfectious
disease
database
State healthoutcomes
database &
benchmark file
Post-surgical
infections in
hospital
database
CDC co-funded
university study of
incidence of infections in5-state region
Hospital
consortium
database
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
26/40
IV CPU
Measure blood
pressure every 30
minutes
Administer ordered
dose of
antihypertensive
BP too
high
No
Yes
Figure 5.7Closed system with feedback loop
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
27/40
L. Computer SystemsL. Computer Systems
Used to describe the set ofUsed to describe the set of
peripherals, computer box,peripherals, computer box,and software that togetherand software that together
perform computing functionsperform computing functions
for one or more usersfor one or more users
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
28/40
M. Information SystemsM. Information Systems
The collection and integration of various pieces of hardwareThe collection and integration of various pieces of hardwareand software and the human resources that meet the dataand software and the human resources that meet the datacollection, storage, processing, and report generation needs ofcollection, storage, processing, and report generation needs ofan organizationan organization
Information System TypesInformation System Types1. Management Information Systems 1. Management Information Systems an organizedan organizedsystem for managing the flow of information in an organizationsystem for managing the flow of information in an organizationin a timely mannerin a timely manner
2. Bibliographic Retrieval Systems2. Bibliographic Retrieval Systems a retrieval system that a retrieval system that
generally refers to bibliographic data, document information, orgenerally refers to bibliographic data, document information, orliteratureliterature
3. Stand-Alone, dedicated, or Turnkey Systems 3. Stand-Alone, dedicated, or Turnkey Systems developed for a single application or set of functionsdeveloped for a single application or set of functions
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
29/40
4. Transaction Systems4. Transaction Systems used to process predefined transactions used to process predefined transactionsand produce predefined reportsand produce predefined reports
55.. Physiologic Monitoring Systems Physiologic Monitoring Systems are being used moreare being used more
frequently to measure and monitor continuous automaticfrequently to measure and monitor continuous automaticphysiologic findings; provide alarms to detect significantphysiologic findings; provide alarms to detect significantabnormal findings when personnel are needed to provide patientabnormal findings when personnel are needed to provide patientcare and save livescare and save lives
66.. Decision Support Systems Decision Support Systems support some aspect of thesupport some aspect of thehuman decision-making processhuman decision-making process
77.. Expert Systems Expert Systems contain the information and decision-makingcontain the information and decision-makingstrategies of an expert to assist non-experts in decision-makingstrategies of an expert to assist non-experts in decision-making(Marakas, 2003); designed for users to stimulate the cause and(Marakas, 2003); designed for users to stimulate the cause andeffect reasoning that an expert would use if fronted with theeffect reasoning that an expert would use if fronted with thesame situation in a real live environmentsame situation in a real live environment
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
30/40
88.. Artificial Intelligence Systems Artificial Intelligence Systems (AI System) attempts(AI System) attempts
to model human reasoning processesto model human reasoning processes
99.. Natural Language Systems Natural Language Systems can understand andcan understand and
process commands given in the users own natural, spokenprocess commands given in the users own natural, spoken
languagelanguage
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
31/40
N. Hospital InformationN. Hospital Information
Systems (HIS)Systems (HIS)
Sometimes called aSometimes called a medicalmedical
information system (MIS)information system (MIS) oror
patient care system (PCSpatient care system (PCS),),
provides support for a wideprovides support for a widerange of both administrativerange of both administrative
and clinical functions; theand clinical functions; the
purpose of anpurpose of an HISHIS is tois to
manage information needed tomanage information needed to
facilitate daily hospitalfacilitate daily hospitaloperations by all health careoperations by all health care
personnelpersonnel
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
32/40
HIS Configurations HIS Configurations the most common configuration uses athe most common configuration uses amainframe computer with hardwired terminals or workstationsmainframe computer with hardwired terminals or workstations
Program Modules Available in HIS Program Modules Available in HIS include a wide variety ofinclude a wide variety of
administrative applications (modules) such as admission andadministrative applications (modules) such as admission anddischarge, patient tracking, finance, payroll, billing, budgetingdischarge, patient tracking, finance, payroll, billing, budgetingsupport, inventory, and management reporting programssupport, inventory, and management reporting programs
Semiclinical ModulesSemiclinical Modules
2 Modules2 Modules
1. ADT1. ADT -module monitors and sometimes controls the flow of-module monitors and sometimes controls the flow ofpatients in a hospital from admission to dischargepatients in a hospital from admission to discharge
2. OE2. OE the order-entry-results-reporting module; order entry the order-entry-results-reporting module; order entrymeans that staff can enter laboratory, pharmacy, and radiologymeans that staff can enter laboratory, pharmacy, and radiologyorders online; means that the lab, pharmacy, and radiology canorders online; means that the lab, pharmacy, and radiology canenter the results in a computer system and have those availableenter the results in a computer system and have those availableto the nursing unitto the nursing unit
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
33/40
Clinical Support ModulesClinical Support Modules Charting SystemsCharting Systems includes medical administration includes medical administration
reports, admission assessments, special assessments, atreports, admission assessments, special assessments, at
least some elements of nursing care plan, vital signs records,least some elements of nursing care plan, vital signs records,wound care, and hygienic care recordswound care, and hygienic care records
Point-of-Service Systems (POS)Point-of-Service Systems (POS) uses a hand-held or uses a hand-held orbedside PC to ensure that data are entered at the point atbedside PC to ensure that data are entered at the point atwhich they are collectedwhich they are collected
Laboratory, Pharmacy, and Radiology ModulesLaboratory, Pharmacy, and Radiology Modules tracks tracksthe specimen through various laboratory stages, generatesthe specimen through various laboratory stages, generatesthe results, and communicates the findings to patientsthe results, and communicates the findings to patientsmedical record; tracks medication orders and changes inmedical record; tracks medication orders and changes inorders; separate products developed by companies thatorders; separate products developed by companies thatspecialize in diagnostic computer imaging systemsspecialize in diagnostic computer imaging systems
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
34/40
O. Network SystemsO. Network Systems
A network is a set ofA network is a set of
interconnected computers that,interconnected computers that,
through hardware and softwarethrough hardware and software
technology, work cooperativelytechnology, work cooperatively
for the purpose of informationfor the purpose of information
and application programand application program
interchangeinterchange
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
35/40
2 Essential Factors for Any Network2 Essential Factors for Any Network
HardwareHardware
Network Communication SoftwareNetwork Communication Software
Advantages to CompaniesAdvantages to Companies
1. Efficiencies Related to Storage and Data Integrity1. Efficiencies Related to Storage and Data Integrity
2. Software Savings2. Software Savings
3. Savings in Human Time and Efficiency3. Savings in Human Time and Efficiency
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
36/40
Network FunctionsNetwork Functions
1. File transfer1. File transfer
2. Information availability2. Information availability
3. Resource sharing3. Resource sharing
4. Online transaction4. Online transaction5. Provision of a powerful communication medium5. Provision of a powerful communication medium
6. Interactive environment6. Interactive environment
7. Education and Entertainment7. Education and Entertainment
8. E-mail8. E-mail
Network Security
Vacuum Tubes were vulnerable to heat and dirt. Therefore,mainframe computer systems required a closed, air-
conditioned environment
Electronic security is even more important
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
37/40
Password protectionPassword protection can be enough security for mostcan be enough security for mostsystems, provided that people give their passwords thesystems, provided that people give their passwords theproper handling and respectproper handling and respect
FirewallsFirewalls are specialized routers that carefully inspectare specialized routers that carefully inspecteach incoming packets of informationeach incoming packets of information
EncryptionEncryption, another layer of protection,, another layer of protection,means that themeans that thedata are converted into a cipher, or a code of some kinddata are converted into a cipher, or a code of some kind
Types of NetworksTypes of Networks
1. Local Area Network (LAN)1. Local Area Network (LAN) a data network a data networkintended to serve a single building or a group of buildingsintended to serve a single building or a group of buildingsin close proximity to each otherin close proximity to each other
2. Wide Area Network (WAN)2. Wide Area Network (WAN) system of connected system of connectedcomputers spanning a large geographical area, often acomputers spanning a large geographical area, often acontinent or countrycontinent or country
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
38/40
Popular Search EnginesPopular Search Engines 1. Altavista1. Altavista
2. Yahoo!2. Yahoo!
3. Google3. Google
4. 37.com4. 37.com
5. Go2net5. Go2net
Navigating the Internet:Navigating the Internet: In order to enterIn order to enterthe Internet, the user must have an Internetthe Internet, the user must have an Internet
Service Provider (ISP) and a Web BrowserService Provider (ISP) and a Web Browser
3. The Internet3. The Internet is a network of networks is a network of networks
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
39/40
Web BrowserWeb Browser is a program that is used to visit Web is a program that is used to visit Webpages; it works by using a special protocol calledpages; it works by using a special protocol called HTTPHTTP
World Wide WebWorld Wide Web is a hypertext-based, subset of the is a hypertext-based, subset of theInternet that uses a combination of text, graphics, audio,Internet that uses a combination of text, graphics, audio,and video to provide information on almost every subjectand video to provide information on almost every subject
imaginableimaginable
Hypertext Markup LanguageHypertext Markup Language the language used to the language used tocreate hypertext documentscreate hypertext documents
Hypertext and HyperlinksHypertext and Hyperlinks hypertext is a document, hypertext is a document,written inwritten in HTMLHTML, which contains automated links, which contains automated links(hyperlinks) to other documents, which may or may not also(hyperlinks) to other documents, which may or may not alsobe hypertext documentsbe hypertext documents
-
8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS
40/40
THE ENDTHE ENDPRESENTED BY:PRESENTED BY:RALPH P. LLANES JR., S.NRALPH P. LLANES JR., S.NBSN II-1BSN II-1
SUMMER 2009-2010SUMMER 2009-2010