Professional Documents
Culture Documents
o (n graphics software& the crop too is used for cropping or cutting pictures
down to si*e"
o ,he re-uired area is se ected using the crop too & then the crop is app ied to
ea!e .ust the se ected area" PHOTO ENHANCE
o #nhancing pictures a ows you to add new and e$citing effects to your
pictures to ma)e them better"
o 'dobe Photoshop and GN0 (mage %anipu ation Program 1G(%P2 are
e$amp es of graphics software which a ow users to enhance and retouch graphics"
73 3 P a g e
o Photoshop has an easy to use des)top and user interface" o ,he oo) of the G(%P is simi ar to Photoshop" o 4oth emp oy too bo$es with understandab e symbo s" o 'nd thus& the G(%P is as easy to use as Photoshop" o ,he G(%P is comparab e to Photoshop with actua photo editing and
image manipu ation too s"
o For e$amp e/
a" c" e" g" +rawing too s Co our correction too s Layers Gradient editor b" Cropping too s d" (mage enhancement too s f" Channe s
o 5owe!er& the G(%P does not ha!e a the features i)e 6path7 and
6actions7 that Photoshop has" SUMMARY
o %ost graphics software ha!e features to crop and enhance you images o Cropping is a process of cutting pictures down to si*e o #nhancing pictures a ows you to add new and e$citing effects to your
picture to ma)e them better
74 3 P a g e
o ,hey enhance e$isting functions or pro!ide ser!ices not supp ied by other
system software programs"
o %ost computers come with bui t9in uti ities as part of the system software" o 5owe!er they may a so be bought separate y as e$terna uti ity programs
such as Norton System:or)s and %c'fee 0ti ities"
o 0ti ity programs inc uded with most operating system pro!ide the
fo owing functions / managing fi es& !iewing images& securing a computer from unauthori*ed access& uninsta ing programs& scanning dis)& defragmenting dis)& diagnosing prob em& bac)ing up fi es and dis)& and setting up screen sa!er" FILE MANAGER
o Fi e manager is the software used to manage fi es on a dis)" o (t pro!ides functions to de ete& copy& mo!e& rename and !iew fi es as we
as create and manage fo ders 1directories2"
78 3 P a g e
DIS% DEFRAGMENTER
o :hen an operating system stores data on a dis)& it p aces the data in the
first a!ai ab e sector on the dis)"
o (t attempts to p ace data in sectors that are contiguous but this is not
a ways possib e"
o ' fragmented dis) has many fi es stored in non9contiguous sectors" o +efragmenting reorgani*es the fi es so they are ocated in contiguous
sectors& which speeds access time" SMALL UTILITY PROGRAMS
o 'n i$#"& 'i&(& disp ays& copies& and prints the contents of a graphics
fi e"
o ' p& )!*#l +i &(#ll detects and protects a computer form unauthori*ed
intrusions"
o ' ), &&* )#'& disp ays a mo!ing image or b an) screen if no )eyboard or
mouse acti!ity occurs for a specified time"
7< 3 P a g e
LESSON FIFTY-FIVE : MORE TYPES AND USAGES OF UTILITY PROGRAMS o ' uti ity program is a type of system software that a ows a user to
perform maintenance9type tas)s"
o :e wi
a" b" c" d" e" f"
BAC%UP UTILITY
o 4ac)up uti ity a ows users to copy or bac) up& se ected fi es or an entire
hard dis) to another storage medium"
o (t is important because the program a ows user to retrie!e data if the hard
dri!e fai s and there are no more programs or fi es that can function"
o ' data reco!ery uti ity is used to restore the data that has been physica y
damaged or corrupted"
o +ata can be damaged by !iruses& bad software& hardware fai ure& power
f uctuations that occur whi e data is being written or recorded" ANTIVIRUS PROTECTION
o Some uti ities destroy the !irus on the spot" =thers notify you of a possib e
!ira beha!iour"
77 3 P a g e
o 'nti!irus uti ities norma y oo) for !irus signatures to identify a !irus" o 0sers of anti!irus uti ities must update the !irus definition fi es as often as
possib e to ensure that such fi es contain patterns for new y disco!ered !iruses"
o (f an anti!irus uti ity cannot remo!e the !irus& it often -uarantines the
infected fi e in a separate area of a hard dis) unti the !irus can be remo!ed"
o %ost anti!irus uti ities can create a reco!ery dis) to remo!e or repair
infected programs and fi es"
o +ata compression uti ity is a uti ity that remo!es redundant e ements& gaps
and unnecessary data from a computer;s storage space so that ess space is re-uired to store or transmit data"
o :ith the increasing use of arge graphics& sound& and !ideo fi es& data
compression is necessary both to reduce the storage space re-uired and to reduce the time re-uired to transmit such arge fi es o!er a networ)"
o ,hese uti ities detect and correct certain types of common prob ems on
hard dis) and f oppies and search for and remo!e unnecessary fi es& such as temporary fi es or7 temp fi es7"
7> 3 P a g e
o 4oth windows and the app ications you run create temp fi es needed on y
for short tas)s and system restore after certain types of system prob ems" ,hese fi es are stored in the ,emp fo der"
7B 3 P a g e
LESSON FIFTY-SI- : PROPRIETARY AND OPEN SOURCE SOFTWARE o :hat is a Linu$D o :hat is an %S9+=SD o Linu$ and %S9+=S are operating systems but what is the difference
between themD PROPRIETARY SOFTWARE
o Proprietary software is a so ca ed c osed source software" o ,he c osed source software or proprietary software offers a stab e system
with support if the software fai s or ma function"
o =pen source software pro!ided is for use& modification and redistribution" o Software that any programmer can down oad from the (nternet for free and
modify with suggested impro!ements"
o ,he on y -ua ification is that changes can;t be copyrighted" o ,his software is !ery popu ar because this software is not c osed softwareF
any programmer can ma)e impro!ements which can resu t in better -ua ity software"
o #$amp es of open source software/ a" Linu$ is the popu ar mu ti9tas)ing 0N(E type operating system"
Some !ersions of Linu$ are command ine" =thers are G0("
b" Linu$ is a free !ersion of 0N(E and its continua impro!ements resu t
from the efforts of tens or thousands of !o unteer programmers" (t is origina y bui t for use on the (nternet"
>C 3 P a g e
c" ,he two most popu ar G0(s a!ai ab e for Linu$ are GN=%# and
A+#"
d" %any app ication programs& uti ities and p ugins ha!e Linu$ !ersions
inc uding =pen=ffice"org& P5P9Nu)e& %o*i a& ,he G(%P& C am'?& =penL+'P& 'udacity and Hed5at"
e" 0sers can obtain Linu$ in a !ariety of ways" Some down oad it for
free from the web" =thers purchase it from !endors" COMPARING THREE MA.OR OPERATING SYSTEMS
>G 3 P a g e
LESSON FIFTY-SEVEN : ADVANTAGES AND DISADVANTAGES OF PROPRIETARY SOFTWARE o ?endors of proprietary software say 6)eeping the source code c osed ma)e
their product more secured7"
o Aeeping the source code c osed might deter some hac)ers& but the arge
number of successfu attac)s against :indows and other proprietary software pro!es that it certain y does not pro!ide any )ind of high e!e security"
o ,he company can set imit to the icense of use" ,his wi a ow the
company to contro and monitor the insta ation and distribution of the software so d" ADVANTAGES OF USING PROPRIETARY SOFTWARE ,he ad!antages of using proprietary software are/
o ,he software is safe and guaranteed to be safe from dubious threats i)e
programming bugs and !iruses thus pro!iding ease of mind for the user"
o ,he software is easier to insta and used as the production is p anned and
e$tensi!e research is carried out to ensure users purchase on y the best"
o Free updates and atest information on the software are usua y pro!ided to
the users"
>2 3 P a g e
o 0sers need to spend a ong time down oading and insta ing security
patches to fi$ bugs announced by the manufacturer"
o 'ny impro!ements wou d usua y re-uire fees& which is often e$pensi!e" o 0sers are not a owed to distribute and share the software as they are
icensed"
>3 3 P a g e
LESSON FIFTY-EIGHT : ADVANTAGES AND DISADVANTAGES OF OPEN SOURCE SOFTWARE o 5a!e you heard about Linu$D o Linu$ is one of the fastest growing operating system" o Linu$ is an e$amp e of open source software& which means& its code is
pro!ided for use& modification and redistribution"
o ,here are other open source software& such as Firefo$ and G(%P" o (n addition to the basic operating system& Linu$ a so inc udes many free
uti ity programs"
>4 3 P a g e
o ,herefore& if bugs in the codes are found& they can be fi$ed by anyone
interested and capab e"
o Fi$es and patches to rectify the bugs are rapid y de!e oped" o ,he software can be used in any way and for any ega purposes" o ,here is no restriction in a uni atera way on how the software cou d be
used" DISADVANTAGES OF OPEN SOURCE SOFTWARE
o ,hus& users wi ha!e to use the prob ematic software unti someone
rectifies the prob em" MORE DISADVANTAGES OF OPEN SOURCE SOFTWARE =ther disad!antages of open source software are/
o ,he codes are too comp icated for no!ice users to understand" o ,here is no particu ar officia monitoring the wor)s of a programmer
impro!ing the codes"
o ,his is because anyone is free to use& modify or e!en distribute the codes" o =pen source software usua y comes without warranty and after sa es
support shou d the software fai or ma function"
>8 3 P a g e
>< 3 P a g e
LESSON SI-TY-SI- : PERVASIVE COMPUTING o ,here are many techno ogica y ad!anced
de!ices in!ented to he p in our dai y chores" o %any of these techno ogica y ad!anced de!ices ha!e begun to be a part of our dai y i!es" WHAT IS PERVASIVE COMPUTING o Per!asi!e computing means the techno ogy that is gracefu y integrated in our e!ery day ife" ,he user is no onger aware of this embedded techno ogy" o Per!asi!e computing uses web techno ogy& portab e de!ices& wire ess communications and nomadic or ubi-uitous computing systems" o =ther terms for per!asi!e computing are 0bi-uitous Computing& Ca m ,echno ogy& and ,hings that ,hin)" o Per!asi!e computing de!ices are not persona computers& but !ery tiny I e!en in!isib e9 de!ices& either mobi e or embedded in a most any type of ob.ect imaginab e& inc uding cars& too s& app iances& c othing and !arious consumer goods 9 a communicating through interconnected networ)s" o #$pert predict per!asi!e computing in year 2CGC wi become so natura i*ed within the en!ironment that peop e wi not e!en rea i*e
>7 3 P a g e
>> 3 P a g e
>B 3 P a g e
BC 3 P a g e