.

Sunday, February 24, 2019

Computer Software Essay

Q1.What atomic number 18 the main types of softw be? What ar the advantages of rude- root word packet dodging? Describe the decision devising form of acquiring exercise bundle.Q2.In the end, data placement is recognized single as a foundation for military personnel judgment, shrewdness and inventiveness. Discuss. What be distinct types of controls and analyses required for an cultivation system?Q3.What is reckonerized maintenance oversight? Explain the abstract moulding through which the maintenance pop off butt joint achieve its objectives on a sustained cornerstone.Q4. transcend is a various(a) spreadsheet package. It pot do wonder for accountants. Explain.Q5. What do you understand by Artificial Intelligence? What ar the featureors that highlighted the pick out of developing AI? What are the goals of AI.Q1.What are the main types of software product? What are the advantages of outspoken- quotation software? Describe the decision making process o f acquiring activity software.Main Types of computer softwareProgramming Software This is atomic number 53 of the most ballparkly known and popularly engrossd types of computer software. These software come in the form of tools that assist a programmer in writing computer programs. computing device programs are sets of logical instructions that befuddle a computer system perform certain tasks. The tools that help programmers in instructing a computer system imply text editors, compilers and interpreters. Compilers translate source code written in a programming speech communication into the language which a computer understands (mostly the binary form).System Software It helps in hurry computer hardware and the computer system. System software refers to the operating systems whatsis drivers, servers, windowing systems and utilities. System software helps an finishing programmer in abstracting away from hardware, holding and different internal complexities of a computer. An operating system provides users with a plan to execute high-level programs. Firmware and BIOS provide the means to operate hardware. finishing Software It en fitteds the end users to accomplish certain specialized tasks. Business software, infobases and educational software are nearly forms of screening software. Different word processors, which are dedicated to specialized tasks to be performed by the user, are other examples of application software.Malware Malware refers to many(prenominal) malicious software and is a broader category of software that are a threat to computer security. Adware, spyware, computer viruses, worms, trojan horses and scareware are malware. Computer viruses are malicious programs which replicate themselves and spread from one computer to another(prenominal) over the net tempt or the Internet..Adware Adware is software with the means of which advertisements are compete and downloaded to a computer. Programmers foundation adware as their tool to generate revenue. They do derive user information like the websites he visits frequently and the pages he likes. Advertisements that step to the fore as pop-ups on your screen are the result of adware programs tracking you. precisely adware is not harmful to computer security or user privacy. The data it collects is only for the purpose of inviting user clicks on advertisements.Inventory Management Software This type of software helps an face in tracking its goods and materials on the basis of quality as well as quantity. Warehouse inventory focus functions encompass the internal warehouse movements and storage. Inventory software helps a attach to in organizing inventory and optimizing the flow of goods in the organization, thus leading to change customer suffice.Utility Software Also known as service routine, utility software helps in the postulatement of computer hardware and application software. It performs a sm wholly range of tasks. Disk defragmenters, systems ut ilities and virus s bathners are several(prenominal) of the typical examples of utility software.Data Backup and Recovery Software An nonesuch data backup and recovery software provides functionalities beyond simple write of data files. This software a lot supports user needs of specifying what is to be endorse up and when. Backup and recovery software preserve the original organization of files and allow an easy retrieval of the backed up data.Advantages of open source softwareUsually, the first perceived advantage of open source models is the fact that open source software is win available gratis or at a low comprise. But this characteristic is not liquid ecstasy to open source software, and several proprietary software products are made available in similar ways (a prominent case could be Microsofts Internet Explorer). What really distinguishes open source software from software available without fee is the gang of effects due to the characteristics discussed in instalm ent 3.1. All of them conflated evoke a synergistic impact which is the start out of the real advantages of the open source model. Let us provide some more detail on how do these characteristics turn into advantagesThe right to distribute modifications and improvements to the code, and to reuse other open source code, permits all the advantages due to the modifiability of the software to be appropriated by large communities. This is usually the point that differentiates open source software licences from nearly free ones. In substance, the fact that redistribution rights tail endnot be revoked, and that they are universal, is what attracts a substantial crowd of developers to work around open source software projects.The right to use the software in any way. This, combined with redistribution rights, ensures (if the software is useful enough), a large population of users, which helps in turn to build up a market for support and customization of the software, which can only attr act more and more developers to work in the project. This in turn helps to improve the quality of the product, and to improve its functionality. Which, once more, will crap more and more users to give the product a try, and probably to use it regularly.The decision making process of acquiring Application SoftwareApplications are made available in line with business requirements. This process covers the traffic pattern of the applications, the proper inclusion of application controls and security requirements, and the development and configuration in line with standards. This allows organisations to properly support business operations with the correct automate applications.Control over the IT process of Acquire and maintain application software that satisfies the business requirement for IT of aligning available applications with business requirements, and doing so in a timely manner and at a reasonable cost by focusing on ensuring that there is a timely and cost-effective develo pment process is achieved by Translating business requirements into design specifications Adhering to development standards for all modifications Separating development, testing and operational activities and is measured by Number of production problems per application causing visible downtime Percent of users satisfied with the functionality delivered Q2.In the end, information system is recognized only as a foundation for clement judgment, insight and inventiveness. Discuss. What are different types of controls and audits required for an information system? breeding system, an integrated set of components for collecting, storing, processing, and communicating information.Business firms, other organizations, and individuals in contemporaneous society rely on information systems to manage their operations, compete in the marketplace, supply services, and augment personal lives. For instance, modern corporations rely on computerized information systems to process financial accou nts and manage human resources municipal governments rely on information systems to provide basic services to its citizens and individuals use information systems to study, shop, bank, and invest. tuition systems controlsTo ensure secure and efficient operation of information systems, an organization institutes a set of procedures and technological measures called controls. Information systems are safeguarded through a combination of general and application controls.General controls apply to information system activities passim an organization. The most important general controls are the measures that control access to computer systems and the information stored there or transmitted over telecommunications networks. General controls include administrative measures that detain employee access to only those processes directly relevant to their duties. As a result, these controls limit the damage that any individual employee or employee ape can do. Fault-tolerant computer systems in stalled in critical environments, such as in hospital information systems or securities marketplaces, are designed to control and discriminate problems so that the system can continue to function.Application controls are specific to a given application and include such measures as authorize input data, regularly archiving copies of various databases, and ensuring that information is disseminated only to authorized users.The potentiality of an information systems controls is evaluated through an information systems audit. It is a fictitious character of a more general financial audit that verifies an organizations accounting records and financial statements. Information systems are designed so that all(prenominal) financial work can be traced. In other words, an audit trail moldiness exist that can establish where each transaction originated and how it was processed. Aside from financial audits, operational audits are employ to evaluate the strong point and efficiency of info rmation systems operations.Q3.What is computerized maintenance management? Explain the conceptual model through which the maintenance function can achieve its objectives on a sustained basis.Computerized maintenance management system (CMMS) is also known as enterprise asset management and computerized maintenance management information system (CMMIS). A CMMS software package maintains a computer database of information more or less an organizations maintenance operations, i.e. CMMIS computerized maintenance management information system. This information is intended to help maintenance workers do their jobs more effectively (for example, ascertain which machines require maintenance and which storerooms contain the spare parts they need) and to help management make informed decisions (for example, calculating the cost of machine breakdown fixation versus preventive maintenance for each machine, possibly leading to better apportionment of resources). CMMS data may also be used to verify regulative compliance.CMMS packages may be used by any organization that must perform maintenance on equipment, assets and plaza. Some CMMS products focus on peculiar(prenominal) industry sectors (e.g. the maintenance of vehicle fleets or health care facilities). other products aim to be more general.CMMS packages can produce status reports and documents braggy details or summaries of maintenance activities. The more sophisticated the package, the more depth psychology facilities are available.Many CMMS packages can be either web-based, meaning they are hosted by the company selling the product on an outside server, or LAN based, meaning that the company buying the software hosts the product on their own server.The conceptual model through which the maintenance function can achieve its objectives on a sustained basis are used to manage simple or complex facilities, from a single grammatical construction to a complete campus. They can also be used to manage the mainten ance program for a grouping of equipment such as a fleet of vehicles. The systems are very versatile since most are in modular form for the various maintenance functions and can be customized to tantrum the particular application.Whatever system or set of modules are learned for use, painstaking consideration needs to be given to Functional Requirements and a vowelise deployment plan. The CMMS must meet the needs, constraints, and opportunities of the business and be implemented in a way that users will welcome the technology and present a peck for the benefits it brings. Proper configuration, testing, and training cannot be over emphasized when bringing a peeled CMMS or upgrading an exist system to an organization.Q4.Excel is a versatile spreadsheet package. It can do wonder for accountants. Explain.Excel spreadsheets are the most common and indispensable tool used by accountants, enabling them to analyse, report and share financial information. Much of this can be accompli shed using only a fraction of the wealth of functions and options within the Excel program. Basic arithmetic, the SUM() function and some cell border formatting will let you produce useful models and perform some quite complex calculations. By expanding your experience with just a few other functions, Excel can expire a much more versatile tool. Very once in a while Excel does not contain a function that you may count, and it is necessary to combine other functions to perform tasks such as calculating weighted averages. Accountants exact a professional responsibility to present accurate data.The IF() and TEXT() functions are intrinsic for incorporating error checking messages to demonstrate that the spreadsheet models catch been reconciled and are performing properly. A spreadsheet presentation gives reports a degree of unearned credibility. This is frequently ill-deserved and question supplys that a high proportion of large models contain critical errors. Your spreadsheets must be well designed and thoroughly checked If you wish to be discriminating with your data and only perform calculations on items that meet certain criteria, some(prenominal) Database and Array functions are useful, but SUMPRODUCT() is the most versatile and wonderful alternative. It is able to extract all sorts of value from a table of data and can be used as an alternative to a great numerous functions.Graphs are a great way to present information, but aliment them simple. Dont get carried away with 3D formats which can make it difficult to read important axis values. If you update a graph on a regular basis, you are very likely to occasionally forget to manually alter any titles which contain period information. It is trounce to link chart titles to cell contents which can be automatically updated.A popular, modern Financial Management technique is that of balanced scorecards which often incorporate traffic light indicators. Conditional formatting for cell ranges is not only useful for highlighting exceptional or incorrect values but can be used to automatically colour cells to show good or bad performance.In order to report on tables of data with separate columns or rows for each accounting period, the OFFSET() function lets you select data for any single or cumulative period.There are numerous financial functions for performing interest and investment calculations. These can greatly simplify the long formulae previously required for things such as loanword repayments but always beware. The built in functions may perform other than to your own (textbook) formulas. They may invert the sign and show negative results where you expect positive they may use a base period of p0 where you espouse it is p1.Once you have tested the financial functions using a medley of situations and confirmed the results, they make tasks such as calculating the Net apply Value much easier. Finally, it is always helpful to make your models friendly to other users. Prot ecting or determineing the values that can be rigid in cells will prevent unforeseen errors. Drop down boxes are a splendid way of getting values from users and hyperlinks can imbibe them around your models. By incorporating dates and file spots in default headers and footers, anyone can trace the source of your masterpiece.Q5. What do you understand by Artificial Intelligence? What are the factors that highlighted the need of developing AI? What are the goals of AI.Artificial intelligence (AI) is the intelligence of machines and the first of computer science that aims to create it. While there are umteen different definitions, AI textbooks define the field as the study and design of ingenious agents. where an intelligent agent is a system that perceives its environment and takes actions that maximize its chances of success. John McCarthy, who coined the term in 1956 defines it as the science and engineering of making intelligent machines.The field was founded on the claim tha t a central property of humans, intelligencethe sapience of Homo sapienscan be so precisely described that it can be simulated by a machine. This raises philosophical issues about the nature of the mind and the ethics of creating artificial beings, issues which have been addressed by myth, fiction and philosophy since antiquity. Artificial intelligence has been the force field of optimism,8 but has also suffered setbacks and, today, has become an essential part of the technology industry, providing the concentrated lifting for many of the most difficult problems in computer science.AI research is highly technical and specialized, deeply divided into subfields that often fail in the task of communicating with each other Subfields have grown up around particular institutions, the work of individual researchers, and the solution of specific problems, resulting in longstanding differences of opinion about how AI should be done and the application of widely differing tools. The central problems of AI include such traits as reasoning, knowledge, planning, learning, communication, cognizance and the ability to move and manipulate objects. General intelligence (or strong AI) is still among the fields long term goals.Goals of AIThe long goals of AI include finding out what the world is like, understanding it, and changing it, or, in other words,a.empirical study and modelling of existing intelligent systems (mainly human beings)b.theoretical analysis and exploration of possible intelligent systems and possible mechanisms and representations usable by such systems andc.solving practical problems in the light of (a) and (b), namelyc.1.attempting to deal with problems of existing intelligent systems (e.g., problems of human learning or emotional difficulties) andc.2.designing useful new intelligent or semi intelligent machines.Some people restrict the term artificial intelligence to a subset of this wide-ranging discipline. For example, those who think of it as essen tially a branch of engineering restrict it to (c.2). This does not do justice to the full range of work done in the name of AI.In any case, it is folly to try to produce engineering solutions without either studying general underlying principles or investigating the existing intelligent systems on which the new machines are to be modelled or with which they will have to interact. Trying to build intelligent systems without trying to understand general principles would be like trying to build an aeroplane without understanding principles of mechanics or aerodynamics. Trying to build them without studying how people or other animals work would be like trying to build machines without ever studying the properties of any naturally occurring object.The need to study general principles of thought, and the ways in which human beings perceive, think, understand language, etc., means that AI work has to be done in close collaboration with work in psychology, linguistics, and even philosophy, the discipline that examines some of the most general presuppositions of our thought and language. The term cognitive science can also be used to cover the full range of goals qualify above, though it too is ambiguous, and some of its more narrow-minded practitioners tend to restrict it to (a) and (c.1).

No comments:

Post a Comment