Professional Documents
Culture Documents
Graphics and Multimedia Software
Graphics and Multimedia Software
Graphics and Multimedia Software
- in addition to productive applications, many people work with software design specifically
for their field of work
- our users such as engineers, architects, desktop publishers, and graphic artists often
use sophisticated software that allows them to work with graphics and media
- many of these applications, incorporate user-friendly interfaces or scale down versions
making it possible for home and small businesses or business users, also to create
projects using this types of programs
7. Media player
- allows you to view images,and animations, listen to audio, and watch video files
on your computer or mobile device
- may enable you to organize media files by genre, artist, or other category, create
playlist, convert files to different formats, connect to and purchase media from an
online media store or marketplace, stream radio stations broadcasting over the
internet, download podcasts, burn audio CD's and transfer media to portable
media players
8. Burning Software
- writes texts, graphics, audio, and video files on a recordable or rewrittable disk
- enables home users easily to back up contents of their hard-drive on an optical
disk, either a CD or a DVD, and make duplicates of music of movies without
copyright restrictions
- also includes photo editing, audio editing, and video editing capabilities
PERSONAL INTEREST APPLICATIONS
(most programs in this category are relatively inexpensive, many are free)
1. Lifestyle Applications
- access the latest news or sports course, check the weather forecast, compose
music, find recipes or locate nearby restaurants, gas stations or points of interest
2. Medical Applications
- research symptoms, established fitness or health programs, track exercise
activities, refill prescriptions, count calories or monitor sleep patters
3. Entertainment Applications
- use to listen to music or the radio, view photos, watch videos or shows,read a
book or other publication, organize and track fantasies sports teams, and play
games individually or with others
4. Convenience Applications
- use to obtain driving directions or your current location, remote to start your
vehicle or unlock or lock doors, set am alarm or timer, check the time, use your
phone as a flashlight or use a personal assistant that acts on your voice
commands
5. Education Application
- use to access how-to guides, learn or find tune a particular skill, follow a tutorial,
run a simulation, assist children with reading elementary skips and/or support
academics
COMMUNICATIONS
1. Blogs
2. Video Conferencing
3. Chat
4. Browsing
5. Online Discussion
6. Internet Messaging
7. Web Feeds
8. Mobile Messaging
9. Email
SECURITY TOOLS
(to protect your computers and mobile devices, you can use one or more security tools)
1. Firewall
- security tool that detects and protects a personal computer and its data from
unauthorized intrusions
- consently monitors all transmissions to and from a compute or mobile device and
may inform a user of attempted intrusions
- when connected to the internet, your computer or mobile device is vulnerable to
attacks
- attackers can include hackers try to access computer or network ilegally
- this attacks may destroy your data, steal informaton, damage your computer, of
carry out some other malicious actions
2. Antivirus
- protects computers against virus by identifying and removing any computer virus
found in memory, on storage media or on incoming files
- to protect computers from various attacks, users can install an antivirus program
and keep it updated by purchasing revisions or upgrades to software
- Computer Virus is a damaging program that affects a computer or device
negatively by altering the way it works.
- virus is a program
- virus do not generate by chance, it is intentionally develop to harm hardware,
data, of software
- virus program is written by skilled programmer called virus author. they took the
course of computer programming simply because they want to create virus
- virus can replicate itself. when you run an antivirus, observe the number of virus
being cleaned are numerous
- virus has the capability to conceal itself
- some virus are event driven. example is friday the 13th virus that is activated
when the computer calendar date is 13 and the day is friday
- payload. it is the term used to indicate the delivery or execution of the
destruction brought about by virus. once a virus is in a computer or device, it can
spread and may damage your files, programs and apps and operating system
INTERNET FILTERS
(filters are programs that removes or blocks certain items from being displayed; four widely used
internet filters are anti spam programs, web filters, phishing filters, and pop up and under
blockers)
1. Anti-spam Programs
- spam is an unsolicited email message sent to many recipients at once
- spam is considered as internet junk mail
- the content of spam ranges from selling a product or service to promoting
business opportunity, to advertisng offensive materials, and many more
- spam may also contains links or attachments that contain malware
- anti-spam program is filtering program that attempts to remove spam before it
reaches your inbox or forum. If your email program does not filter spam, many
anti spam programs are available at no cost on the web
- Internet Service Providers (ISP) often filters spam as a service for their
subscribers
2. Web Filters
- program that restricts access to certain material on the web, some restrict access
from specific website, other filter websites that use certain words or phrases
- many businesses use web filtering software to limit employees web access
especially during office hours. There are companies that restricts the use of
social media in the office. Some schools, libraries, and parents use this software
to restrict access to websites that are not educational.
3. Phishing Filters
- phishing is a scam in which a perpetrator sends an official looking email
message that attempts to obtain your personal and/or financial information
- some phishing messages ask you to reply with your information. Others direct
you to a phony website or pop up or pop under window that looks like a
legitimate website which then collects your information
- phishing filter is a program that warns or blocks you from potentially fraudulent or
suspicious websites
- some browsers include phishing filters
4. Pop Up and Pop Under Blockers
- pop up ad is an internet advertisement that suddenly appears in a new window
on top of a webpage.
- Similarly, a pop under ad is an internet advertisement that is hidden under the
window so that it will be viewed when users close their browser windows
- pop up or pop under blocker is a filtering program that stops a pop up or pop
under ad from displaying only web pages. many browsers include this blockers
- you also can download pop up and pop under blockers from the web at no cost
7. Screen Saver
- displays moving image or blank screen if no keyboard or mouse activity occurs
for a specified time
- when you press a key on the keyboard, tap the screen or move the mouse,
screen saver disappears and a screen returns to the previous state
- security is one of the purpose of screen saver. if the user is working on
something that is private or confidential and need to leave for a short while, the
screen saver will hide whatever is on the display screen
8. File Compression
- shrinks the size of the file or files
- a compressed file takes up less storage than the original file
- compressing file freeze up or roam on storage media
- you may need to compress a file so that it will fit on a smaller storage medium
such as USB flash drive
- attaching compressed file to an email message, for example, reduces the time
needed for file transmission
- uploading and downloading compress files to and from the internet reduces the
file transmission time
- compress files sometimes are called zip files. when you receive or download a
compress file, you must uncompress it. to unzip a file, you restore it to its original
form
- some operating system include file compression and decompression capabilities
9. PC Maintenance Tool
- identifies and fixes system problems, detects and prepares drive problems and
includes the capability of improving a computers performance
- additionally some PC maintenance utilities continously monitor a computer while
you use it to identify and repair problems before they occur
10. Back-up and Restore
- back up tools allows users to copy or back up selected file or the contents of an
entire storage medium to another storage location
- this can be from one drive to another, one harddrive to another, drive to optical
disk, USB flash drive or cloud storage
- during the back up process, the back up tool monitors progress and alerts you if
it need additional media such as another disk
- many back up program compress files during the back up process
- by compressing the files, the back up program requires less storage space for
the back up files than for the original files
- because they are compressed, you usually cannot use back up files in their back
up form. in the event, you need to use back up file a restore tool, reverse the
process and returns back up files to their original form
- back up tools work with a restore tool. You should back up files and disk regularly
in the event your originals are lost, damaged or destroyed.