State and explain with examples four categories of software.

1 Answer

Answer :

Types / Categories of Software 

1. System Software 

1. System software is a collection of programs written to service other programs. 2. Few examples of system software are compilers, editors, and file management utilities, process complex, but determinate, information structures. 3. Other systems applications are operating system components, drivers, and telecommunications. 

Example : DOS, WINDOWS 

2. Real-time Software 

1. Software that monitors or analyses or controls real-world events as they occur is called real time. 2. Elements of real-time software include a data gathering component that collects and formats information from an external environment, an analysis component that transforms information as required by the application. 3. A control/output component that responds to the external environment and a monitoring component that coordinates all other components so that real-time response can be maintained. Example : airline reservation system, railway reservation system 

3. Business Software 

1. Business information processing is the largest single software application area. Discrete "systems”. 2. For example: payroll, accounts receivable/payable, inventory have evolved into management information system (MIS) software that accesses one or more large databases containing business information. 3. Applications in this area restructure existing data in a way that facilitates business operations or management decision making. 4. In addition to conventional data processing application, business software applications also encompass interactive computing. 

Example : Tally 

4. Engineering and Scientific Software 

1. Engineering and scientific software have been characterized by "number crunching" algorithms. 2. Applications range from astronomy to volcanology, from automotive stress analysis to space shuttle orbital dynamics, and from molecular biology to automated manufacturing. 3. However, modern applications within the engineering/scientific area are moving away from conventional numerical algorithms. 4. Computer-aided design, system simulation, and other interactive applications have begun to take on real-time and even system software characteristics. 

Example : CAD / CAM software 

5. Embedded Software 

1. Intelligent products have become commonplace in nearly every consumer and industrial market. 2. Embedded software resides in read-only memory and is used to control products and systems for the consumer and industrial markets. 3. Embedded software can perform very limited and esoteric functions, for example: keypad control for a microwave oven. 4. To provide significant function and control capability, for example: digital functions in an automobile such as fuel control, dashboard displays, and braking systems. 

Example : Microwave, Washing machine software 

6. Personal Computer Software 

1. The personal computer software market has burgeoned over the past two decades. 2.Word processing, spread sheets, computer graphics, multimedia, entertainment, database management, personal and business fi applications, external network, and database access are only a few of hundreds of applications. 

Example: Microsoft word, Excel.

Related questions

Description : Explain four basic principles of software project scheduling.

Last Answer : Basic principles software project scheduling:  Compartmentalization: The project must be compartmentalized into a number of manageable activities and tasks. To accomplish compartmentalization, both the product and ... or part of a work product - Work products are often combined in deliverables 

Description : Name four software quality assurance activities.

Last Answer : These activities are performed (or facilitated) by an independent SQA group that: i. Prepares an SQA plan for a project. ii. Participates in the development of the project's software ... handled according to a documented procedure. vi. Records any noncompliance and reports to senior management.

Description : State two characteristics of Software.

Last Answer : Characteristics of software : * Software is developed or engineered; it is not manufactured in the classical sense. * Software doesn’t “wear out.” But it does deteriorate! * Although the industry is moving toward component-based construction, most software continues to be custom built.

Description : State attributes of good software.

Last Answer : 1. Functionality: It refers to the degree of performance of the software against its intended purpose. 2. Reliability: It refers to the ability of the software to provide desired functionality ... degree to which the software can keep on functioning in spite of being provided with invalid data.

Description : Write two examples each of software in the following categories : -Technology

Last Answer : (i) Open Source Operating System-Google Chrome OS, Linux(ii) Open Source Web Browser – Google Chrome, Mozilla Firefox

Description : Compare CMMI and ISO for software w.r.to i)scope ii)Approach Iii) Implementation.

Last Answer : Difference between CMMI and ISO based on SCOPE: CMMI is rigid and extends only to businesses developing software intensive systems. ISO is flexible and applicable to all manufacturing industries. CMMI ... in-house teams, or rely on external auditors to see through the implementation process. 

Description : Enlist core principles of software engineering practice.

Last Answer : 1. Reason it all exists. Provide value to the user 2.Keep it simple stupid 3.Maintain the vision 4. What you reproduce, someone else will have to consume. (implement knowing someone else will have to ... are doing) 5.Be open to the future 6. Plan ahead for reuse Plan ahead for reuse Think!

Description : Define software quality.

Last Answer : 1.Quality means that a product satisfies the demands of its specifications  2. It also means achieving a high level of customer satisfaction with the product  3. In software systems ... (e.g. maintainability or reusability) * Software specifications are often incomplete, inconsistent, or ambiguous

Description : Define software requirement specification.

Last Answer : Concept: A software requirements specification (SRS) is a document that is created when a detailed description of all aspects of the software to be built that must be specified before the ... written by Business Analysts who interact with client and gather the requirements to build the software.

Description : Define software. Draw the failure curve for software.

Last Answer : Definition of Software  Software is: 1. Instructions (computer programs) that when executed provide desired features, function, and performance; 2. Data structures that enable the programs to adequately ... hard copy and virtual forms that describes the operation and use of the programs.

Description : Explain waterfall process model. State its advantages and disadvantages.

Last Answer : The waterfall model is a traditional method, sometimes called the classic life cycle. This is one of the initial models. As the figure implies stages are cascaded and shall be developed one ... 6. Not suitable for the projects where requirements are at a moderate to high risk of changing.

Description : Briefly explain the two broad categories of a newspaper format giving suitable examples. -Technology

Last Answer : The analysis of newspaper content suggests two broad categories of newspaper formatBroadsheet Press (quality or serious press)…. Explanation with examplesTabloid Press (Popular or sensational press)… Explanation with examples

Description : Explain the concept of black box testing and white box testing.

Last Answer : Black Box Testing: * It is a way of software testing in which the internal structure or the program or the code is hidden and nothing is known about it. * It also known as ... implementation. * White-box testing is time-consuming, bigger programming applications take the time to test fully.

Description : Explain six function of requirement engineering process.

Last Answer : Requirement Engineering: The broad spectrum of tasks and techniques that lead to an understanding of requirements is called requirements engineering. It starts during the communication activity and ... and track requirements and changes to requirements at any time as the project proceeds.

Description : Explain GANTT chart and its application for project tracking with an example. 

Last Answer : When creating software project schedule, we begin with a set of tasks. If automated tools are used, the work breakdown is input as a task network or task outline. Effort, duration and start date are then ... can also use Gantt charts to get an overview of how things are rolling on the work front. 

Description : With an example, explain Line of Code (LOC) based estimation.

Last Answer : LOC-Based Estimation: As an example of LOC and FP problem-based estimation techniques, let us consider a software package to be developed for a computer-aided design application for mechanical components. A ... guide, a preliminary statement of software scope can be developed: Example:

Description : Draw and explain Level 1 DFD for railway reservation system.

Last Answer : The passenger can initiate either Reservation process or Enquiry process; If a user opts for Reservation process then the system shall proceed with ticket generation process and same needs to ... enquiry module then appropriate request shall be entertain and result to be displayed to the user.

Description : Explain Process framework with a suitable diagram.

Last Answer : A process framework establishes the foundation for a complete software process by identifying a small number of framework activities that are applicable to all software projects; In addition, the ... the customer who evaluates the delivered product and provides feedback based on the evaluation.

Description : Explain the notations used for preparing a Data Flow diagram.

Last Answer : Circle: A circle (bubble) shows a process that transforms data inputs into data outputs. Data Flow: A curved line shows the flow of data into or out of a process or data store. Data Store: A ... Sink is an external entity and acts as a source of system inputs or sink of system outputs.

Description : Explain incremental process model using suitable diagram.

Last Answer : 1. Incremental model is also called as iterative enhancement model. 2. In this model the software is built in an incremental fashion. 3. Fig shows the project is divided into ... and it should be noted that the process flow for any increment can incorporate the prototyping paradigm. 

Description : Explain different tasks of regions of spiral model with diagram.

Last Answer : Traditional method or model of software development Also encompasses all the essential development phases: * Requirements analysis * Design * Code * Test * Maintenance  ... appear controllable to the customer, particularly if the customer is more accustomed to the waterfall model.

Description : Classify energy resources into two categories. Give two examples of each. -SST 10th

Last Answer : Classification of energy resources: 1. Conventional sources of energy have been used for a long period of time and are mostly non-renewable. Examples: Coal, Petroleum. 2. Nonconventional sources of energy are renewable sources which help in sustainable development. Examples: Solar, wind.

Description : Classify energy resources into two categories. Give two examples of each. -SST 10th

Last Answer : Energy resources can be classified into: 1. Conventional Sources of Energy- These are the energy sources that have been used for a long time. They are usually non-renewable sources of energy. ... renewable and not as widely used as conventional sources. For example, solar energy and wind energy.

Description : Mention the categories of instruction and give two examples for each category

Last Answer : The instructions of 8085 can be categorized into the following five • Data transfer MOV Rd,Rs STA 16-bit • Arithmetic ADD R DCR M • Logical XRI 8-bit RAR • Branching JNZ CALL 16-bit • Machine control HLT NOP

Description : List out the five categories of the 8085 instructions. Give examples of the instructions for each group.

Last Answer : • Data transfer group – MOV, MVI, LXI. • Arithmetic group – ADD, SUB, INR. • Logical group –ANA, XRA, CMP. • Branch group – JMP, JNZ, CALL. • Stack I/O and Machine control group – PUSH, POP, IN, HLT.

Description : Classify plastic materials into two categories, describe their important properties and give two examples of each.

Last Answer : Ans: Plastic materials can be classified into thermoplastic and thermosetting plastics. Thermoplastic materials:- The properties of these plastic materials do not change considerably if they are melted ... forming elastic threads and films. Examples are Phenol formaldehyde (Bakelite), Epoxy resins.

Description : Describe the Analytical method of project cost estimation with example.

Last Answer : Analytical estimation techniques derive the required results starting with basic assumptions regarding the project. Thus, unlike empirical and heuristic techniques, analytical techniques do have scientific basis. Halstead's ... the program, * N2 be the total number of operands used in the program.

Description : Describe RMMM Strategy.

Last Answer : Risk mitigation, monitoring, and management (RMMM) plan. A risk management strategy can be included in the software project plan or the risk management steps can be organized into a ... associated with implementing them. In essence, the project planner performs a classic cost/benefit analysis.

Description : Describe 4 P’s of management spectrum giving their significance.

Last Answer : The Management Spectrum - 4 Ps and their Significance Effective software project management focuses on these items (in this order) Deals with the cultivation of motivated, highly skilled people ... 1998 survey, 26% of software projects failed outright, 46% experienced cost and schedule overruns.

Description : Name two cost estimation approaches.

Last Answer : * Heuristic Estimation Approach * Analytical Estimation Approach * Empirical Estimation Approach

Description : Define proactive and reactive risk strategy.

Last Answer : Reactive risk strategies Reactive risk strategy follows that the risks have to be tackled at the time of their occurrence. No precautions are to be taken as per this strategy. They ... their probability of occurrence, their impact after occurrence, and steps to be followed for its precaution.

Description : What is requirement engg. ? What is its need? What are different subtasks included in it?

Last Answer : Requirement Engineering:- Software process perspective, requirements engineering is a major software engineering action that begins during the communication activity and continues into the modeling activity. ... * Elaboration * Negotiation * Specification * Validation * Requirements management

Description : Write difference between cardinality and modaling.

Last Answer : Cardinality Modality Cardinality defines the range of object-to object Relationships Modality indicates whether or not a relationship between objects is mandatory Expected ... maximum numbers occurrences in relationship It gives minimum numbers occurrences in relationship

Description : Write importance of analysis modeling.

Last Answer : * Designing gets easier to the designer * Better understanding of system can be accomplished * System feasibility can be determined * Defines data objects * Describes data attributes  ... * Refines data objects * Creates a functional hierarchy represent behavior at different levels of detail 

Description : Name one specific software/tool for each of the following categories: -Technology

Last Answer : 1. Antivirus software – Quick Heal2. Data recovery tool – NTFS Reader3. Online backup tool – Dropbox

Description : Broad Categories of Software are: a) System Software b) Application Software c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : 4. What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? A. Desktop, laptop, server B. Personal computer, Internet, mobile telephone C. Hardware, software, networks D. Open computer systems, communication systems, and embedded systems

Last Answer : D. Open computer systems, communication systems, and embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the two categories of sources of credit ? Mention four features of each. -SST 10th

Last Answer : The two sources of credit are: Formal Credit: 1. It's provided by banks and cooperatives. 2. Reserve Bank of India regulates the functioning of the formal sources of credit like the interest rate 3. ... get the money back. 4. Most of the times, lenders are poor farmers who fall into debt traps.

Description : Classify resources on the basis of ownership into four categories. Mention the main features of each. -SST 10th

Last Answer : On the basis of owership resources can be classified into the following categories : (i) Individual Resources. (ii) Community Owned Resources. (iii) National ... these without the concurrence of international insitutions, e.g. manganese nodules in bed of the Indian Ocean.

Description : What are the two categories of sources of credit? Mention four features of each. -SST 10th

Last Answer : The two sources of credit are: Formal Credit: 1. It's provided by banks and cooperatives. 2. Reserve Bank of India regulates the functioning of the formal sources of credit like the interest rate 3. ... get the money back. 4. Most of the times, lenders are poor farmers who fall into debt traps.

Description : What are the Four categories of books in the old testament?

Last Answer : The books can probably be categorized in a number of ways. One classification that will give four types, is:Torah (law) (Genesis, Exodus, Leviticus, Numbers, Deuteronomy)History books (Joshua, ... Job, Song of Songs, Ruth, Lamentations, Ecclesiastes, Esther, Daniel, Ezra & Nehemiah, Chronicles)

Description : What are the Four categories of books in the old testament?

Last Answer : The books can probably be categorized in a number of ways. One classification that will give four types, is:Torah (law) (Genesis, Exodus, Leviticus, Numbers, Deuteronomy)History books (Joshua, ... Job, Song of Songs, Ruth, Lamentations, Ecclesiastes, Esther, Daniel, Ezra & Nehemiah, Chronicles)

Description : Which Roosevelt separates the participants of the conflict into three main categories hero villain and victim. According to the Four Freedoms speech who is the victim?

Last Answer : Great britian

Description : According to accepting public deposits, NBFCs can be classified into ____ broad categories. A. Two B. Three C. Four D. All of the Above E. None of the Above

Last Answer : A. Two Explanation: According to accepting public deposits, NBFCs can be classified into two broad categories, viz., (i) NBFCs accepting public deposit (NBFCs-D) (ii) NBFCs not accepting/holding public deposit (NBFCs-ND).

Description : Polymers are classified into four categories namely thermosetting, thermoplastic, elastomer and fibre depending upon their (A) Molecular sizes (B) Magnitude of intermolecular forces (C) Resistance to heat (D) Polymerisation mechanism

Last Answer : (B) Magnitude of intermolecular forces