The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.

Principles of Information Systems 13th Edition 2018

Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by Pusat Sumber Al-Fairuz KVSP2, 2021-08-04 01:16:24

Principles of Information Systems 13th Edition 2018

Principles of Information Systems 13th Edition 2018

Keywords: Principles of Information Systems 13th Edition 2018

128 PART 2 • Information Technology Concepts

computing resources across an entire organiza- c. nettop computer

tion is called a(n) . d. workstation

a. network-attached storage 14. Servers offer great , the ability to

b. storage area network increase the processing capability of a computer

c. storage as a service system so it can handle more users, more data, or

d. enterprise data storage solution more transactions in a given period.

9. involves capturing and editing data The computer industry and users are implementing
green computer designs and products.
where it is originally created and in a form that

can be directly entered into a computer to ensure 15. is an approach to improving hard-
ware utilization by logically dividing the
accuracy and timeliness. resources of a single physical server to create
multiple logical servers each with its own dedi-
10. After October 1, 2015, merchants who accept cated machine.
a. Server farm
payments made via a chip card’s magnetic stripe b. Multiprocessing
c. Virtual server
can continue to do so; however, they must accept d. Hypervisor

responsibility for any fraudulent purchases. True 16. Which of the following is not a goal of green
computing?
or False? a. Enable the safe disposal or recycling of com-
puters and computer-related equipment.
11. is a process that uses 3D printers to b. Allow companies to lower their power-related
costs.
build human body parts and organs from actual c. Reduce the use of hazardous material.
d. Reduce the cutting down of trees and other
human cells. foliage.

Computer hardware must be carefully selected to 17. Green computing is about saving the environ-
meet the evolving needs of the organization and ment; there are no real business benefits associ-
its supporting information systems. ated with this program. True or False?

12. A combination chipset called a

includes processor cores, RAM and ROM mem-

ory, interface controllers, and voltage regulators.

13. A is a low-cost, centrally managed

computer with no internal or external attached

drives for data storage.

a. tablet

b. thin client

Chapter 3: Self-Assessment Test Answers

1. a 10. True
2. c 11. Bioprinting
3. a 12. system on a chip
4. d 13. b
5. Extreme ultraviolet lithography or EUVL 14. scalability
6. True 15. c
7. b 16. d
8. b 17. False
9. Source data automation

Review Questions 5. What is a multicore processor?
6. What is the difference between a foundry
1. Identify four fundamental components of every
computer. company and a fabless manufacturer?
7. How does the role of main memory differ from
2. What is the purpose of the computer
bus? the role of secondary storage?
8. Which is the largest amount of memory—a
3. How does clock speed govern the execution of
instructions by a computer? gigabyte, petabyte, or terabyte?

4. What is the x86 instruction set?

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

CHAPTER 3 • Hardware and Mobile Devices 129

9. Identify and briefly discuss the fundamental 14. How is a blade server different from a regular
characteristic that distinguishes RAM from ROM server?
memory.
15. Identify and briefly describe the various classes of
10. What is cache memory and how is it used? single-user, portable computers.
11. What is a solid state storage device?
12. What is RFID technology? Identify three practical 16. Identify three reasons for increased spending on
data centers.
uses for this technology.
13. When speaking of computers, what is meant by 17. Define the term “green computing,” and state its
primary goals.
scalability?
18. What is the EPEAT? How is it used?

Discussion Questions devices compared with magnetic secondary stor-
age devices.
1. Discuss the role a business manager should take 9. Briefly discuss the advantages and disadvantages
in helping determine the computer hardware to of attached storage, network-attached storage,
be used by the organization. and storage area networks in meeting enterprise
data storage challenges.
2. Identify the similarities and differences between 10. If cost were not an issue, describe the
massively parallel processing systems and grid characteristics of your ideal computer. What
computing. would you use it for? Would you choose a
tablet, laptop, desktop, or workstation
3. Briefly describe the concept of multiprocessing. computer? Why?
How does parallel processing differ from 11. Briefly explain the differences between the mag-
multiprocessing? netic stripe card, chip card, and the smart card.
Which do you believe is safest for the consumer?
4. Discuss some of the technical and nontechnical Why?
issues that might come up in trying to establish a 12. Fully discuss why some organizations are
large grid computing project such as the Large consolidating many data centers into a few.
Hadron Collider. Are there any potential drawbacks to this
strategy?
5. What is 3D printing? Discuss what you think the 13. Discuss potential issues that can arise if an orga-
future is for 3D printing. nization is not careful in selecting a reputable
service organization to recycle or dispose of its
6. What is a multicore processor? What advantages IS equipment.
does it offer users over a single-core processor?
Are there any potential disadvantages?

7. Outline how the Electronic Product Environment
Assessment Tool (EPEAT) can be used for rating
computers.

8. Identify and briefly discuss the advantages and
disadvantages of solid state secondary storage

Problem-Solving Exercises

1. Do research to find the total worldwide sales for you would choose and why. Develop a second

hard disk drives and solid state storage devices spreadsheet for the same printers, but this time

over a five-year or more period. Try to get figures assume that you will print 250 color pages and

for the number of units sold as well as total stor- 500 black-and-white pages per month. Now

age capacity in some unit, such as gigabytes. Use which of the printers would you buy and why?

graphing software to develop a chart showing 3. Use word-processing software to document what

these sales figures. Write a few paragraphs stating your needs are as a computer user and your jus-

your conclusions about the future of the hard tification for selecting either a desktop or some

disk drive market versus solid state storage. form of a portable computer. Find a Web site that

2. Develop a spreadsheet that compares the fea- allows you to order and customize a computer

tures, initial purchase price, and a two-year esti- and select those options that will best meet your

mate of operating costs (paper, cartridges, and needs in a cost-effective manner. Assume that you

toner) for three different color laser printers. have a budget of $850. Enter the computer spe-

Assume that you will print 50 color pages and cifications you selected along with the associated

100 black-and-white pages each month. Now do costs from the Web site into an Excel spread-

the same comparison for three inkjet printers. sheet. Insert that spreadsheet into the document

Write a brief memo on which of the six printers defining your needs.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

130 PART 2 • Information Technology Concepts

Team Activities different watches using a spreadsheet program.
Analyze your data, and write a recommendation
1. Have you and your team do research on the Web to on which one you would buy. Be sure to clearly
identify three large grid computing projects of explain your decision.
interest to the team. Visit the home page for each of 3. With the members of your team, visit a data cen-
these projects to learn more about the goals of the ter or server farm, perhaps at your university or a
project, results to date, and what is required if you nearby computer services firm. (Be sure to obtain
wish to volunteer to help this project. Choose one of permission from the appropriate company
the projects, and volunteer to have your computer resources prior to your visit). As you tour the
added to the grid. Write a brief paper summarizing facility, draw a simple diagram showing the
why your team chose this particular grid computing locations of various pieces of hardware equip-
project, what was required for your computer to ment. Label each piece of equipment. Document
join the grid, and how being a member of the grid what has been done in terms of access control,
affected your use of your computer. power backup, surge protection, and HVAC.
Discuss use of virtualization and containers at
2. With one or two of your classmates, visit three the site.
different retail stores or Web sites in search of
your ideal smart watch. Document the costs, fea-
tures, advantages, and disadvantages of three

Web Exercises

1. Do research on the Web to find a description of 3. Do research on the Web to learn more about
Moore’s Law. What are the implications of this law? Apple’s decision to withdraw from the EPEAT
Are there any practical limitations to Moore’s Law? program and why it later reversed that decision.
Write a one-page report summarizing your
2. Do research on the Web to learn more about findings.
bioprinting—both current and potential future
applications.

Career Exercises 3. Examine the possibility of a career in computer
hardware sales. Which area of sales do you
1. A friend of yours texted you that he is consider- believe holds the brightest prospects for young
ing changing his major to computer engineering. college graduates—servers, mainframe compu-
He wants to meet with you and get your input on ters, supercomputers, or high-volume storage
this move. Do some research to find out just what devices? Why? What would be some of the
is a computer engineer and what do they do. advantages and disadvantages of a career in
What are the career prospects, and what sort of computer hardware sales?
education and experience is required to become a
computer engineer?

2. How might supercomputers be employed in your
current or future career field?

Case Studies

Case One Computer and Apple after the two companies began
collaborating on the ARM processor for the Newton
ARM computer system—Apple’s ill-fated attempt at a handheld
computer.
The Acorn Computer Group developed the world’s first
commercial Reduced Instruction Set Computer (RISC) The ARM business model involves the design and license
processor in the 1980s. The simpler commands employed in of intellectual property rather than the manufacture and sales
RISC computers enables the computer to operate faster, use of actual semiconductor chips. ARM licenses the rights to
less power, and take up less space—major advances over the build chips based on its design to the world’s leading
early complex instruction set computer systems (CISC), semiconductor and systems companies. These companies pay
which tried to pack as many actions into each command as ARM a license fee for the original design along with a royalty
possible.ARM was founded in 1990 as a spin-off of Acorn on every chip or wafer produced. ARM has signed over 1,100

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

CHAPTER 3 • Hardware and Mobile Devices 131

licenses with more than 300 companies. Some companies bigger role in the microchip industry and have made
elect to license the ARM instruction set to design their own ownership of semiconductor intellectual property a priority.
processors. See Table 3.9. The issue of protecting intellectual property rights is a major
concern for ARM and its customers entering or doing
T A B L E 3.9 Partial list of ARM licensees business and China.

Companies That Companies That Critical Thinking Questions
License the ARM Chip License The ARM
Design to Incorporate Instruction Set to 1. What are some of the challenges and opportunities
It into Their Own Design Their Own facing the processor chip industry in general and ARM
System on a Chip Processor in particular?

ApliedMicro Apple 2. Some chip industry observers and financial analysts
Broadcom believe that because of its licensing business model,
HiSilico Broadcom ARM missed an opportunity to capture billions of dol-
Rockchip lars in sales of microprocessor chips it could have
Intel manufacturered. Compare sales, profits, and stock
Samsung prices over a three-year period for ARM to two of its
STMMicroelectronics Marvell Technology customers who do have fab plants and manufacture
Group their own chips such as Samsung Electronics and Intel
or AMD, a competitor. Do you believe that the ARM
Microsoft licensing rather than manufacturing business model
has hurt the firm? Why or why not?
Nvdia
3. Do research to learn more about how China came to be
Qualcomm the lead assembler of the world’s smartphones and
computers. What are some of the pros and cons of
Over 60 billion ARM chips have been shipped since the outsoucring this work to China?
company was founded. Chips based on ARM designs are found
in 99 percent of the world’s smartphones and tablets. In SOURCES: “Company Profile,” www.arm.com/about/company-profile/,
addition, processors based on designs licensed from ARM accessed July 15, 2015; Vance, Ashlee, “ARM Designs One of the World’s
are used in all sorts of computing devices, including Most-Used Products. So Where’s the Money?,” Bloomberg Business,
microcontrollers in embedded systems such as antilock February 4, 2014, http://www.bloomberg.com/bw/articles/2014-02-04
braking systems (ABS) systems for autos, smartTVs, and /arm-chips-are-the-most-used-consumer-product-dot-where-s-the-
smartwatches. The number of ARM-designed chips sold is money; Hackman, Mark, “ARM Launches Cortex A-72 Platform,
estimated to be 25 times that of Intel-designed chips. Powering Flagship Smartphones in 2016,” PC World, February 3, 2015,
www.pcworld.com/article/2879037/arm-launches-cortex-a-72-plat
Personal computer vendors upgrade their products form-powering-flagship-smartphones-in-2016.html; Hamblen, Matt,
every 12 to 18 months. The smartphone industry is “The Rise of China’s Smartphone Makers,” Computerworld, December
demanding an upgrade every six months to a year. ARM 30, 2014, www.computerworld.com/article/2859707/the-rise-of-chinas-
is constantly striving to keep pace with these demands. smartphone-makers.html and “Intel Plans to Increase CPU Performance
The Cortex-A57 is a processor design by ARM that was with New Atom Chips,” Alvareztg Technology Group, www.alvareztg
announced in October 2012 and appeared in handsets two .com/intel-plans-to-increase-cpu-performance-with-new-atom-chips
years later. The Cortex-A72, its successor, was announced in .html/, accessed July 16, 2015,
February 2015 and began to appear in mobile devices by
the end of 2015.The Cortex A72 processor represents a Case Two
50 times increase in processing power compared with
smartphone chips used just five years ago. Development of Vivobarefoot Upgrades Technology Infrastructure
the Cortex A-72 continues the trend of smartphones getting
more and more powerful and becoming our primary Vivobarefoot is an innovative shoe company that recently
computing device, replacing the personal computer for undertook a major review of its technology infrastructure
many uses. to determine what changes needed to be made to support
and accelerate the company’s already rapid growth.
Meanwhile, Intel is now shipping chips code-named Vivobarefoot’s success is connected to the growing
Sofia for inexpensive smartphones. These chips were made popularity of barefoot or “miminalist” running. In fact, the
in conjunction with the Chinese company Rockchip, which company lays claim to the first minimalist shoe, originally
has experience in turning around processor designs in a produced in 2004, offering an ultrathin, puncture-resistant
matter of months. Intel will soon begin to ship a high-end sole that provides “maximum sensory feedback and
Atom chip called Broxton, which has a modular design that maximum protection.”
allows Intel to modify the chip and deliver updates at a faster
pace. Broxton supports Intel’s strategy of delivering products The specialist shoe company is headquartered in the
that can be easily customized—similar to the chip designs United Kingdom, but also has a team based in China, where
of ARM. all of its manufacturing takes place. Vivobarefoot sells it
shoes online, through a variety of partnerships around the
China assembles most of the world’s smartphones and world, and in its store in Covent Garden, a popular shopping
computers, but currently must import most of the technology district in London. According to founder Galahad Clark, the
that underlies them. Chinese authorities hope to gain a company went from selling 30,000 pairs of shoes per month

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

132 PART 2 • Information Technology Concepts

to over 300,000 per month—over the course of just five As part of its efforts to streamline its IT infrastructure
years. at all levels, Vivobarefoot has also moved away from tape
backups to a remote hosted backup service, and the
As with many companies that experience rapid growth, upgraded server technology means that many other system
over the years, Vivobarefoot had acquired a hodgepodge of management tasks have been simplified, as well. Data
hardware and software that was no longer meeting its needs. security has been improved, and IT staff have gained the
According to Damian Peat, global operations director for the ability to manage the company’s servers remotely. While
company, “We were working with some pretty archaic Vivobarefoot still has work to do to migrate all of its
systems. We had three servers in our basement all running technology to the same platform, the company’s efforts have
Windows Server 2003 and backed up to tape, and I would gone a long way toward providing the company with an
worry a lot about the chance of something not working.” updated and more rational arrangement of hardware,
Vivobarefoot employees were also using multiple versions software, and cloud computing.
of Microsoft Office, and staff in China were forced to use
personal Gmail accounts because they could not reliably Critical Thinking Questions
access the company’s Microsoft Exchange email server in
London. 1. What are some of the competitive advantages Vivo-
barefoot gained through its infrastructure update?
Managing the variety of hardware and software systems
was becoming time consuming and costly. And, like 2. One ongoing concern for Vivobarefoot is the quality
thousands of other companies, Vivobarefoot was also faced and speed of the Internet service available to its office
with the reality that it would soon be forced to migrate away in central London. Given that, do you think it made
from Windows Server 2003, as Microsoft was ending its sense for the company to move more of its IT services
support of the outdated server operating system. According to the cloud? Go online and do some research about
to Peat, “Upcoming end of support for Windows Server Microsoft’s Office 365 product. What options does it
2003 gave us concerns around security patching and offer for working offline if Internet service is not
mounting management costs, and we already had significant available? Does that change your opinion about Vivo-
risk around data security. …My priority became to get barefoot’s shift to the cloud?
everything onto one safe, reliable platform as soon as
possible.” 3. Estimates for the number of computers still running
Windows Server 2003 range from hundreds of thou-
After a review of available technologies, Vivobarefoot sands to several million—even though Microsoft has
chose to replace Windows Server 2003 with Windows Server stopped supporting the product. What are the risks for
2012 R2 and Hyper-V hypervisor software, giving the companies that continue to use software or hardware
company both physical and virtual server capabilities, technology after a vendor ends support for it?
including the capacity the company needs to host file servers
and business-critical applications, such as accounting SOURCES: “Frequently Asked Questions,” Vivobarefoot, www.vivobare
software and stock management systems. The company also foot.com/us/customer-services/frequently-asked-questions#FAQST1,
migrated to Office 365 in both its London and China offices. accessed December 11, 2015; Ho, Geoff, “Shoe Manufacturer Vivobare-
Office 365 had particular appeal for the company because, as foot to Step It Up to Fund Expansion Plans,” Express, May 3, 2015, www
a global cloud service, it is easily accessible in China, where .express.co.uk/finance/city/574639/Shoe-manufacturer-Vivobarefoot
staff are now more easily able to communicate—using -raise-money-fund-expansion-plans; Worth, Dan, “Windows Server
Vivobarefoot email addresses rather than Gmail accounts. 2003 Migration Helps Shoe Seller Vivobarefoot Put One Foot in the
Vivobarefoot staff are also making use of Microsoft’s Cloud,” V3.co.uk, April 17, 2015, www.v3.co.uk/v3-uk/news/2404420
OneDrive for Business, where they can store, share, and sync /windows-server-2003-migration-helps-shoe-seller-vivobarefoot-put-one
files. According to Peat, with these cloud-based upgrades, the -foot-in-the-cloud; “Pioneering Footwear Brand Unites Teams for Secure,
company “can ensure everyone can see the same documents Remote Working,” Microsoft, www.microsoft.com/en-gb/smb/customer
and access them whenever they need, which is really -success-stories/vivobarefoot-unites-global-teams, accessed December
beneficial.” As part of a phased process, the company is also 11, 2015; Curtis, Joe, “How Vivobarefoot Escaped Windows Server 2003
moving many employees to Windows 8.1 laptops and Surface in IT Upgrade,” IT Pro, July 8, 2015, www.itpro.co.uk/server/24948/how
Pro tablets. -vivobarefoot-escaped-windows-server-2003-in-it-upgrade.

Notes 4. “Israel Approves Intel’s $6 Billion Investment in Chip
Plant,” Reuters, September 22, 2014, www.reuters.com
1. “Top 10 Sites for November 2015,” Top500 Project /article/2014/09/22/us-israel-intel-plant-idUSKCN0HH1
Committee, www.top500.org/lists/2015/11, accessed F720140922.
December 11, 2015.
5. Clark, Don, “IBM Reports Advances in Shrinking Future
2. “Courant’s Stadler and Colleagues Win 2015 Bell Prize,” Chips, Wall Street Journal, July 9, 2015, www.wsj.com
New York University, November 25, 2015, www.nyu /articles/ibm-reports-advances-in-shrinking-future-
.edu/about/news-publications/news/2015/11/24/cour chips-1436414814.
ants-stadler-and-colleagues-win-2015-bell-prize-.html.
6. Seubert, Curtis, “How Many Bytes Is an Exabyte,” eHow,
3. Mearian, Lucas, “CERN’s Data Soars to 530M Gigabytes,” www.ehow.com/about_6370860_many-bytes-exabyte_
Computerworld, August 14, 2015, www.computerworld .html, accessed August 8, 2013.
.com/article/2960642/cloud-storage/cerns-data-stores
-soar-to-530m-gigabytes.html.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

CHAPTER 3 • Hardware and Mobile Devices 133

7. Patrizio, Andy, “All about DDR4, the Next-Gen Memory 23. “Panasas ActiveStor Storage Speeds Modeling
Coming Soon for PCs and Mobile Devices,” PC World, Computation at CD-adapco,” Panasas, November 17,
June 24, 2014, www.pcworld.com/article/2365823/next 2015, www.panasas.com/news/press-releases/panasas
-gen-memory-is-coming-fast-here-s-what-you-need-to -activestor-storage-speeds-modeling-computation-cd
-know-about-ddr4.html. -adapco.

8. Malle, Jean-Pierre, “Big Data: Farewell to Cartesian 24. “City of Riverside: Building the Connected Community of
Thinking?” Paris Tech Review, March 15, 2013, the Future,” NetApp, December 2, 2015, www.netapp.
www.paristechreview.com/2013/03/15/big-data-carte com/us/media/cs-city-of-riverside.pdf.
sian-thinking.
25. Patel, Raj, “Discover Pinterest: Cloud Engineering,” Pin-
9. “Media Alert: New IBM Cloud Service Enables Develo- terest, November 20, 2015, https://engineering.pinterest.
pers to Create Apps That Tap into Vast Amounts of com/blog/discover-pinterest-cloud-engineering.
Unstructured Data,” IBM, December 7, 2015,
www-03.ibm.com/press/us/en/pressrelease/48257.wss. 26. Murphy, Margi, “Pinterest Nails down More Users after
Building Apache HBase Analytics Tool,” TechWorld,
10. Mims, Christopher, “And the Longest Running Digital April 16, 2015, www.techworld.com/news/big-data/pin
Storage Medium Is …,” MIT Technology Review, July 13, terests-pinalytics-using-hadoop-get-grips-with-its-data
2011,www.technologyreview.com/view/424669/and-the -3608139.
-longest-running-digital-storage-medium-is.
27. Shahangian, Mohammad “Powering Big Data at Pinter-
11. “IBM Research Sets New Record for Tape Storage,” IBM, est,” Pinterest, July 24, 2014, https://engineering.pinter
April 9, 2015, www-03.ibm.com/press/us/en/pressrelease/ est.com/blog/powering-big-data-pinterest.
46554.wss.
28. “AWS Case Study: Pinterest,” Amazon Web Services,
12. “High-End Computing Capability: Archival Storage Sys- https://aws.amazon.com/solutions/case-studies/pinterest,
tem,” NASA, www.nas.nasa.gov/hecc/resources/storage accessed December 13, 2015.
_systems.html, accessed December 11, 2015.
29. Conn, Joseph, “Nurses Turn to Speech-Recognition Soft-
13. “HGST Ultrastar HDD Is a 10TB Helium Monster, Aims ware to Speed Documentation,” Modern Healthcare,
to Cope with Data Overload,” TechRadar, December 1, December 12, 2015, www.modernhealthcare.com/arti
2015, www.techradar.com/us/news/computing-compo cle/20151212/MAGAZINE/312129980.
nents/storage/hgst-ultrastar-hdd-is-a-10tb-helium-mon
ster-aims-to-cope-with-data-overload-1310236. 30. “Overview,” Neat, www.neat.com, accessed October 16,
2015.
14. “Western Digital Welcomes Big Data with 10 TB Helium
HDDs,” Infostor, December 2, 2015, www.infostor.com 31. “Everything You Need to Know about the Switch to Chip
/storage-management/western-digital-welcomes-big Cards,” https://squareup.com/townsquare/emv, accessed
-data-with-10-tb-helium-hdds.html. October 16, 2015.

15. “Welcome to the NFLC,” National Foreign Language Cen- 32. Vaas, Lisa, “The $1 Million Apple iTunes Gift Card
ter, www.nflc.umd.edu, accessed December 12, 2015. Scam,” Naked Security, October 23, 2015, https://naked
security.sophos.com/2015/10/23/the-1m-apple-itunes-
16. “Research Institute at the University of Maryland Off- gift-card-scam.
loads Large Library of Files to RAID Storage,” RADirect,
www.rad-direct.com/Success_Story_NFLC.htm, accessed 33. “US Credit Cards with Smart Chip Technology, The
December 12, 2015. Points Guy, May 30, 2013, http://thepointsguy.com/2013
/05/us-credit-cards-with-smart-chips.
17. Inglis, Blair, “Sony Working on Blue-Ray Successor—Are
PS4 Discs Soon to Be Outdated?” The Six Axis, July 30, 34. “Summary Figures (2014),” UK Cards Association, www
2013, www.thesixthaxis.com/2013/07/30/sony-working .theukcardsassociation.org.uk/2014-facts-figures/sum
-on-blu-ray-successor-are-ps4-discs-soon-to-be-out- mary_figures_2014.asp, accessed October 17, 2015.
dated.
35. “Square Helps More Sellers Grow Their Business Faster,”
18. Shadbolt, Peter, “The Eternity Drive: Why DNA Could Be Square, https://squareup.com/?pcrid=3330880435&
the Future of Data Storage,” CNN, February 25, 2015, pdv=c&pkw=square+stand&pm=true&pmt=e, accessed
www.cnn.com/2015/02/25/tech/make-create-innovate- October 17, 2015.
fossil-dna-data-storage.
36. Gagliordi, Natalie, “Target Will Roll Out RFID Price Tags
19. MacDonald, Glenn, “DNA Data Storage Lasts Thousands to Improve Inventory Management,” ZDNet, May 19,
of Years,” Discovery, August 7, 2015, http://news.discov 2015, www.zdnet.com/article/target-will-roll-out-rfid
ery.com/tech/biotechnology/dna-data-storage-lasts-thou -price-tags-to-improve-inventory-management.
sands-of-years-150817.htm.
37. Swedberg, Claire, Target Announces Nationwide RFID
20. Keith, Jonathan, “DNA Data Storage: 100 Million Hours Rollout,” RFID Journal, May 20, 2015, www.rfidjournal.
of HD Video in Every Cup,” Phys.Org, January 25, 2013, com/articles/view?13060.
http://phys.org/news/2013-01-dna-storage-million
-hours-hd.html. 38. Schuman, Evan, “Target Prepping Stores with ‘No Shop-
ping Cart, No Bag’,” Computerworld, www.computer
21. Mearian, Lucas, “Samsung Unveils 15 TB SSD Based on world.com/article/3013962/retail-it/target-prepping
Densest Flash Memory,” Computerworld, August 17, -stores-with-no-shopping-cart-no-bag.html.
2015, www.computerworld.com/article/2971482/cloud
-security/samsung-unveils-15tb-ssd-based-on-densest 39. “3D Touch,” Apple, www.apple.com/iphone-6s/3d-touch,
-flash-memory.html. accessed December 13, 2015,

22. “About,” CD-adapco, www.cd-adapco.com/about#, 40. Andrzejewski, Alexa, “OpenTable for iOS 9: The Shortest
accessed December 12, 2015. Path between You + Dining,” OpenTable, December 25,
2015, http://blog.opentable.com/2015/opentable-for-ios-
9-the-shortest-path-between-you-dining.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

134 PART 2 • Information Technology Concepts

41. Tyson, Jeff, Wilson, Terry V., “How Graphics Cards 57. “Chromebooks in Healthcare: Good for Patients and for
Work, How Stuff Works,” http://computer.howstuff Bottom Lines,” Samsung, December 7, 2015, https://
works.com/graphics-card.html, accessed October 17, insights.samsung.com/2015/12/07/chromebooks-in
2015. -healthcare-good-for-patients-and-for-bottom-lines-2/.

42. “LG Unveils Its New Flexible, Paper-Thin TV,” Science 58. “Case Study: Larson & Darby Group,” HP,
Alert, August 11, 2015, www.sciencealert.com/lg-unveils- www8.hp.com/us/en/pdf/larson-darby-group-hi-
its-new-flexible-paper-thin-tv. res_tcm_245_1814936.pdf, accessed November 2, 2015.

43. Hill, Simon, “LG Display Talks Flexible, Transparent, 59. “About ADP,” ADP, www.adp.com/who-we-are.aspx,
Double-Sided OLEDs in IFA Keynote,” Digital Trends, accessed October 18, 2015.
September 4, 2015, www.digitaltrends.com/home-the
ater/lg-display-envisions-a-future-of-flexible-wafer-thin 60. “About Mastercard,” Mastercard, www.mastercard.us
-oled-displays. /en-us/about-mastercard/what-we-do/payment-proces
sing.html, accessed October 18, 2015.
44. Seppala, Timothy J., “LG’s Spending Billions to Make
More OLED Things,” Engadget, November 26, 2015, 61. “About UPS,” UPS, www.ups.com/content/us/en/about
www.engadget.com/2015/11/26/lg-oled-manufacturing- /index.html?WT.svl=SubNav, accessed October 18, 2015.
plant.
62. Dignan, Larry, “IBM Rolls Out Z13, Repositions Main-
45. “PrinterOn”, PrinterOn, www.printeron.com/images frame for Mobile Transactions,” ZD Net, January 13,
/docs/PrinterOnAirportPrintingSolutions.pdf, accessed 2015, www.zdnet.com/article/ibm-rolls-out-z13-reposi
August 19, 2013. tions-mainframe-for-mobile-transactions.

46. Saker, Anne, “Printing a 3D Heart to Save a Heart,” 63. Green, Timothy, “Here’s Why IBM Is Still Building
Cincinnati.com, February 22, 2015, www.cincinnati Mainframes,” The Motley Fool, accessed October 18,
.com/story/news/2015/02/21/printing-heart-save-heart 2015, www.fool.com/investing/general/2015/01/24
/23825279/. /heres-why-ibm-is-still-building-mainframes.aspx.

47. Ibid. 64. Chen, Stephen, “World’s Fastest Computer, Tianhe-2,
48. “3D Printing in the Automotive Industry,” FunTech, Jan- Might Get Very Little Use,” South China Morning Post,
June 20, 2013, www.scmp.com/news/china/article
uary 7, 2015, http://blog.funtech.com/2015/01/3d-print /1264529/worlds-fastest-computer-tianhe-2-might-get-
ing-in-automotive-industry.html. very-little-use.
49. Sher, Davide, “World’s Fastest RC Car 3D Printed on
Ultimaker 2 Extended,” October 12, 2015, http://3dprin 65. “A Rare Look inside Apple’s Maiden, North Carolina Data
tingindustry.com/2015/10/12/worlds-fastest-rc-car-3d Center [Video],” iClarified, posted April 25, 2014, www
-printed-on-ultimaker-2-extended/. .iclarified.com/40226/a-rare-look-inside-apples-maiden-
50. Gilpin, Lyndsey, “10 Industries 3D Printing Will Disrupt north-carolina-data-center-video.
or Decimate,” Republic, February 25, 2014, www.techre
public.com/article/10-industries-3d-printing-will-dis 66. “Guide to Virtualization Hypervisors,” Network Comput-
rupt-or-decimate. ing, February 9, 2015, www.networkcomputing.com
51. Benvin, Rich, “Biotech Startup Uses 3D Bioprinting to /data-centers/guide-to-virtualization-hypervisors/d/d-id/
Create Custom Breast Implants and Grafts,” Bioprinting 1318945.
World, July 27, 2015, http://bioprintingworld.com/bio
tech-startup-uses-3d-bioprinting-to-create-custom- 67. “VMWare Case Study: Cognizant,” VMWare, October 27,
breast-implants-and-grafts. 2015, www.vmware.com/files/pdf/customers/vmware
52. Benvin, Rich, “3D Organ Bioprinting—Who Wants to -cognizant-15q1-cs-en.pdf?src=WWW_customers_vm
Live Forever?,” Bioprinting World, March 24, 2015, ware-cognizant-15q1-cs-en.pdf.
http://bioprintingworld.com/3d-organ-bioprinting-who
-wants-to-live-forever. 68. Crosman, Penny, “Why Tech-Savvy Banks Are Gung Ho
53. Hamblen, Matt, “Wearables and Company Wellness Pro- about ‘Container’ Software,” American Banker, Decem-
grams Go Hand-in-Hand,” Computerworld, June 18, ber 3, 2015, www.americanbanker.com/news/bank-tech
2015, www.computerworld.com/article/2937333/wear nology/why-tech-savvy-banks-are-gung-ho-about-con
ables/wearables-and-company-wellness-programs-go- tainer-software-1078145-1.html.
hand-in-hand.html.
54. Fogarty, Kevin, “Card-Sized Diagnostics, e-Skin Are 69. Ovide, Shira, “Software Firms Scramble to Jump into
Future of Wearable Medicine,” Computerworld, May 13, Containers,” Wall Street Journal, November 4, 2015,
2015, www.computerworld.com/article/2922118/health www.wsj.com/articles/software-firms-scramble-to-jump
care-it/health-sensing-e-skin-card-sized-diagnostics-are- -into-containers-1415149692.
future-of-wearable-medicine.html.
55. Broder, Kevin, MD, “Glove from Imogen Heap Will 70. Morgan, Timothy Prickett, “Inside the Rackspace Open-
Change the Way You Make Music,” Wearable Devices, Power Megaserver,” The Platform, March 23, 2015,
June 24, 2014, www.wearabledevices.com/2014/06/24/ www.theplatform.net/2015/03/23/inside-the-rackspace
glove-from-imogen-heap. -openpower-megaserver.
56. Arthur, Rachel, “Google and Levi’s Want to Put Compu-
ters in Your Clothing,” Forbes, June 16, 2015, www.for 71. Arthur, Charles, “Technology Firms to Spend $150bn on
bes.com/sites/rachelarthur/2015/06/16/google-and-levis- Building New Data Centres,” Guardian, August 23,
want-to-put-computers-in-your-clothing. 2013, www.theguardian.com/business/2013/aug/23/
spending-on-data-centres-reaches-150-billion-dollars.

72. Colt, Sam, “Apple is Building a $2 Billion Data Center in
Arizona,” Business Insider, February 2, 2015, www.busi
nessinsider.com/apple-is-building-a-2-billion-data-cen
ter-in-arizona-2015-2.

73. “GM’s Latest Michigan Data Center Gets LEED Gold,”
Data Center Dynamics, September 13, 2013, www.data

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

CHAPTER 3 • Hardware and Mobile Devices 135

centerdynamics.com/focus/archive/2013/09/gms-latest 79. Wells, Brad, “What Truly Makes a Computer ‘Green’?”
-michigan-data-center-gets-leed-gold. OnEarth (blog), September 8, 2008, www.onearth.org
74. Boyd, Aaron, “Data Center Consolidation Biggest /node/658.
Money Saver among IT Reforms,” Federal Times, Sep-
tember 15, 2015, www.federaltimes.com/story/govern 80. “Electronics Waste Management in the United States
ment/it/data-center/2015/09/15/data-center-biggest through 2009,” U.S. EPA, May 2011, EPA 530-R-11-002
-saver/72325764. www.epa.gov/wastes/conserve/materials/ecycling/docs
75. “Modular Data Center Expansion Planned for Red /fullbaselinereport2011.pdf.
Cloud,” Wired Real Estate Group, http://wiredre.com
/modular-data-center-expansion-planned-for-red-cloud, 81. “EPEAT Environmental Criteria,” EPEAT, www.epeat.
accessed October 18, 2015. net/resources/criteria, accessed August 19, 2013.
76. Babcock, Charles, “5 Data Center Trends for 2013,”
InformationWeek, January 2, 2013, www.information 82. “Electronic Environmental Assessment Tool,” EPEAT,
week.com/hardware/data-centers/5-data-center-trends- www.zerowaste.org/epeat_devel/faq.htm, accessed Octo-
for-2013/240145349?printer_friendly=this-page. ber 18, 2015.
77. Thibodeau, P., “Rural N.C. Becomes Popular IT Loca-
tion,” Computerworld, June 20, 2011, p. 2. 83. “Asset Resale and Recycling,” Dell, www.dell.com/learn
78. “IBM Opens New Cloud Data Center in Peru to Meet /us/en/uscorp1/services/asset-resale-and-recycling?
Demand for Big Data Analytics,” IBM, August 22, 2013, c=us&l=en&s=corp&cs=uscorp1, accessed October 18,
www-03.ibm.com/press/us/en/pressrelease/41809.wss. 2015.

84. “Product Return and Recycling,” www8.hp.com/us/en
/hp-information/environment/product-recycling.html#.
ViOsZo2FP4g, accessed October 18, 2015.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

4CHAPTER Software and Mobile
Applications

Georgejmclittle/Shutterstock.com
Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

Did YouKnow?

• Know how you’re constantly updating and upgrading operating system every few years. Instead, Microsoft
will be providing continual, incremental updates and
programs on your computer and devices? You can improvements, rolled out automatically, perhaps as
thank IBM for that. They birthed the software industry in often as monthly for individual consumers. Windows 10
1969 when they decided to charge customers sepa- is here to stay!
rately for software and services. Although business
computers had been in use since the mid-1950s, hard- • As of July 2015, Apple’s App Store had over 1.5 million
ware manufacturers had bundled software with their
hardware without charging for it. apps available for iOS device users, and Android users
could choose from over 1.6 million mobile apps on
• If you move to the Microsoft Windows 10 operating Google’s Play Store.

system, you will no longer have to upgrade to a new

Principles Learning Objectives

• Software is valuable in helping individuals, work- • Identify and briefly describe the functions of two
groups, and entire enterprises achieve their basic kinds of software.
goals.
• Define the term “sphere of influence,” and
• The operating system is called the “soul of the describe how it can be used to classify software.
computer” because it controls how you enter data
into your computer, perform meaningful work, and • Define the basic functions performed by the
display results. operating system.

• Organizations typically use off-the-shelf applica- • Identify current operating systems that are used for
tion software to meet common business needs personal, workgroup, and enterprise computing.
and proprietary application software to meet
unique business needs and provide a competitive • Discuss the role of the operating system in
advantage. embedded systems.

• The software industry continues to undergo • Discuss how application software can
constant change; computer users need to be support personal, workgroup, and enterprise
aware of recent trends and issues in the software business objectives.
industry to be effective in their business and
personal life. • Identify three basic approaches to developing
application software and discuss the pros
and cons of each.

• Identify programming languages commonly in
use today.

• Identify several key software issues and trends
that have an impact on organizations and
individuals.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

138 PART 2 • Information Technology Concepts

Why Learn about Software and Mobile Applications?

Software is indispensable for any computer system and the people using it. In this chapter, you will
learn about system software—which includes operating systems, utilities, and middleware—and
application software. The operating system is sometimes called the “soul of the computer,” and
without it, you would be unable to enter data into your computer, perform meaningful work, or
display results. You use application software to help you accomplish tasks that enable you to
accomplish tasks efficiently and effectively. Sales representatives use software on their smartphones
and tablet computers to enter sales orders and help their customers get what they want. Stock and
bond traders use software to make split-second decisions involving millions of dollars. Scientists use
software to analyze the threat of climate change. Regardless of your job, you will likely use software
to help you advance in your career and earn higher wages. You can also use software to help you
prepare your personal income taxes, keep a budget, and stay in contact with friends and family
online. Software can truly advance your career and enrich your life. We begin with an overview of
software.

As you read this chapter, consider the following:

• How is application software tied to or limited by advances in hardware and operating systems?
• How can organizations ensure that their employees use appropriate software to support their work

tasks and meet the goals of the enterprise?

An Overview of Software

system software: Software that Software consists of computer programs that control the workings of computer
includes operating systems, utilities, hardware. Software can be divided into two types: systems software and
and middleware that coordinate the application software. System software includes operating systems, utilities,
activities and functions of the hardware and middleware that coordinate the activities and functions of the hardware
and other programs throughout the and other programs throughout the computer system. Application software
computer system. consists of programs that help users solve particular computing problems.
Examples include a spreadsheet program or a program that captures and dis-
application software: Programs plays data that enables monitoring of a manufacturing process.
that help users solve particular com-
puting problems. The effective use of software can have a profound impact on individuals
and organizations. It can make the difference between profits and losses and
between financial health and bankruptcy. As Figure 4.1 shows, companies
recognize this impact; globally, spending on software now exceeds other IT

15% 26% Software
19% 20%
Outsourcing
20%
Hardware
FIGURE 4.1
Consulting
Software expenditures exceed Communications
spending on hardware equipment

Since the 1950s, businesses have
substantially increased their expen-
ditures on software compared with
hardware.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

CHAPTER 4 • Software and Mobile Applications 139

expenditures, including spending on computer hardware. This is far different

from when computers first were available; software was given away and cus-
tomers paid only for the hardware.1 Indeed, the software industry was born
in 1969 when IBM decided to unbundle—and charge customers separately
for—its software and services. Although business computers had been in use
since the mid-1950s, hardware manufacturers had previously bundled soft-

ware with their hardware without charging separately for it.

sphere of influence: The scope of Software Sphere of Influence
the problems and opportunities that the
software addresses. Every organization relies on the contributions of individuals and groups
across the enterprise to achieve its business objectives. One useful way of
classifying the many potential uses of information systems is to identify the
scope of the problems and opportunities that the software addresses. This
scope is called the sphere of influence. For most companies, the spheres of
influence are personal, workgroup, and enterprise. Table 4.1 shows how
various kinds of software support these three spheres.

T A B L E 4.1 Software supporting individuals, workgroups, and enterprises

Software Type Personal Workgroup Enterprise
Systems software Network operating systems
Smartphone, tablet, personal Server and mainframe
Application computer, and workstation Email, group-scheduling, operating systems
software operating systems shared-work, and collabo-
ration applications General-ledger, order-
Word-processing, spreadsheet, entry, payroll, and human-
database, and graphics resources applications
programs

personal sphere of influence: Information systems that operate within the personal sphere of influence
The sphere of influence that serves the serve the needs of individual users. These information systems help users
needs of an individual user. improve their personal effectiveness, increasing the amount and quality of
personal productivity software: work they can do. Such software is often called personal productivity soft-
Software that enables users to ware. For example, VIP Organizer is personal productivity software designed
improve their personal effectiveness, to help users develop to do lists, categorize tasks, keep notes and records in a
increasing the amount of work and single database, report on performance, and set deadlines and priorities.2
quality of work they can do.
When two or more people work together to achieve a common goal, they
workgroup: Two or more people who form a workgroup. Workgroups include large, formal, permanent organiza-
work together to achieve a common goal. tional entities, such as sections or departments, as well as temporary groups
formed to complete a specific project. An information system in the work-
workgroup sphere of influence: group sphere of influence helps workgroup members attain their common
The sphere of influence that helps goals. Microsoft Outlook is an example of an application in the workgroup
workgroup members attain their sphere of influence; see Figure 4.2. IBM Notes, another application in the
common goals. workgroup sphere of influence, provides collaboration features such as team
calendars, email, to-do lists, contact management, discussion forums, file shar-
enterprise sphere of influence: ing, microblogging, instant messaging, blogs, and user directories.3 JGC Cor-
The sphere of influence that serves the poration is an engineering construction company with operations in more
needs of an organization in its interac- than 70 different countries. Many of its projects cost over $15 billion, last for
tions with its environment. 10 years or more, and involve hundreds of partner companies. JGC employs
Lotus Notes to coordinate the work of project teams and relay information
about project status, changes in work plans, and other critical information.4

Information systems that operate within the enterprise sphere of influ-
ence support an organization in its interactions with its environment, includ-
ing customers, suppliers, shareholders, competitors, special-interest groups,
the financial community, and government agencies. The enterprise sphere of
influence for a company might include business partners such as suppliers
that provide raw materials, retail companies that store and sell a company’s

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

140 PART 2 • Information Technology Concepts

FIGURE 4.2 Microsoft product screenshots used with permission from Microsoft Corporation

Microsoft Outlook

Outlook is an application that work-
groups can use to schedule meet-
ings and coordinate activities.

products, and shipping companies that transport raw materials to the plant
and finished goods to retail outlets. Many organizations use SAP enterprise
resource planning software to capture customer orders, manage inventory,
plan and ship customer orders, bill customers, and manage accounts payable
and accounts receivable.

Critical Establishing a Corporate App Store
Thinking
Exercise You are a new hire in the finance organization of a large retail firm. You are
amazed to see the number of different software applications (apps) employed by
your coworkers, who use them for everything from maintaining personal calen-
dars to calculating the rate of return on projects to forecasting sales and financial
data. It seems that everyone has a favorite app for doing each of these tasks. For
example, in the few weeks you have been here, you identified over half a dozen
different apps that are being used to calculate the rate of return on projects and
investments. Your coworkers download these apps from the Internet or build
them using spreadsheet software. You previously worked as an intern at another
large retailer that had established a corporate app store, which employees
accessed to download corporate-approved apps that had been vetted and recom-
mended for use for specific tasks. You wonder if such an approach should be
implemented at your current employer.

Review Questions

1. Give an example of two tasks that an employee in the finance organization of
this retail firm might perform that would have an impact restricted to their
own personal sphere of influence.

2. Identify two tasks that an employee might perform that would have an impact
on the workgroup and two that would have an impact on the enterprise
sphere of influence.

Critical Thinking Questions

1. What risks are associated with letting employees use their favorite app to per-
form various tasks? Are these risks associated with tasks in the personal,
workgroup, or enterprise sphere of influence?

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

CHAPTER 4 • Software and Mobile Applications 141

2. Can you identify some advantages and disadvantages of establishing a corpo-
rate app store?
We will now discuss systems software including operating systems, utili-
ties, and middleware.

Systems Software The primary role of system software is to control the operations of computer
hardware. System software also supports the problem-solving capabilities of
operating system (OS): A set of application programs. System software can be divided into three types: oper-
computer programs that controls the ating systems, utility programs, and middleware.
computer hardware and acts as an
interface to application software. Operating Systems

An operating system (OS) is a set of programs that controls a computer’s
hardware and acts as an interface with application software; see Figure 4.3.
An operating system can control one or more computers, or it can allow mul-
tiple users to interact with one computer. The various combinations of OSs,
computers, and users include the following:

● Single computer with a single user. This system is commonly used in
personal computers, tablets, and smartphones that support one user at a
time. Examples of OSs for this setup include Microsoft Windows, Mac OS
X, and Google Android.

● Single computer with multiple simultaneous users. This type of system
is used in larger server or mainframe computers that support hundreds or
thousands of people, all using the computer at the same time. Examples of
OSs that support this kind of system include UNIX, z/OS, and HP-UX.

● Multiple computers with multiple users. This type of system is used in
computer networks, including home networks with several computers
attached as well as large computer networks with hundreds of computers
attached, supporting many users, who may be located around the world.
Network server OSs include Red Hat Enterprise Linux Server, Windows
Server, and Mac OS X Server.

● Special-purpose computers. This type of system is typical of a number
of computers with specialized functions, such as those that control

User interface

Application program interface

Operating system kernel and utilities

FIGURE 4.3 Hardware drivers
Hardware
Role of operating systems

The role of the operating system is to
act as an interface between appli-
cation software and hardware.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

142 PART 2 • Information Technology Concepts

kernel: The heart of the operating sophisticated military aircraft, digital cameras, or home appliances. Exam-
system that controls the most critical ples of OSs designed for these purposes include Windows Embedded,
processes of the OS. Symbian, and some distributions of Linux.

The OS, which plays a central role in the functioning of a computer sys-
tem, is usually stored on a hard drive in general-purpose computers and in
solid state memory on mobile computers such as tablets and smartphones.
After you start, or boot up, a computer system, the kernel of the OS is loaded
into primary storage and remains there for as long as the computer is pow-
ered on. The kernel, as its name suggests, is the heart of the OS and controls
its most critical processes. The kernel ties all of the OS components together
and regulates other programs.

Other portions of the OS are transferred to memory as the system needs
them. OS developers are continually working to shorten the time required to
boot devices after they are shut down and to wake devices from sleep mode.

You can also boot a computer from a CD, a DVD, or even a USB flash
drive. A storage device that contains some or all of the OS is often called a
rescue disk because you can use it to start the computer if you have problems
with the primary hard disk.

Functions Performed by the Operating System
The programs that make up the OS perform a variety of activities, including
the following:

● Control common computer hardware functions
● Provide a user interface and manage input/output management
● Provide a degree of hardware independence
● Manage system memory
● Manage processing tasks
● Provide networking capability
● Control access to system resources
● Manage files

Common Hardware Functions The OS enables applications to perform a variety
of hardware-related tasks, such as the following:

● Get input from the keyboard or another input device
● Retrieve data from disks
● Store data on disks
● Display information on a monitor or printer

Each of these tasks requires a detailed set of instructions. The OS converts
a basic request into instructions that the hardware can process. In effect, the
OS acts as an intermediary between the application and the hardware. The
OS uses special software (called hardware drivers) provided by device manu-
facturers to communicate with and control a device. Hardware drivers are typ-
ically downloaded from the device manufacturer’s Web site or read from an
installation DVD and installed when the hardware is first connected to the
computer system.

user interface: The element of the User Interface and Input/Output Management One of the most important func-
operating system that allows people to tions of any OS is providing a user interface, which allows people to access
access and interact with the computer and interact with the computer system. The first user interfaces for mainframe
system. and personal computer systems were command based. A command-based
user interface requires you to give text commands to the computer to per-
command-based user form basic activities. For example, the command ERASE 00TAXRTN would
interface: A user interface that cause the computer to erase a file named 00TAXRTN. RENAME and COPY are
requires you to give text commands to other examples of commands used to rename files and copy files from one
the computer to perform basic location to another. Today’s systems engineers and administrators often use a
activities.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

CHAPTER 4 • Software and Mobile Applications 143

command-based user interface to control the low-level functioning of com-
puter systems. Most modern OSs (including those with graphical user inter-
faces, such as Windows) provide a way to interact with the system through a
command line. See Figure 4.4.

(a) Microsoft product screenshots used with permission from Microsoft Corporation

FIGURE 4.4 (b)

Command-based and
graphical user interfaces

A Windows file system viewed with a
GUI (a) and from the command
prompt (b).

graphical user interface (GUI): A graphical user interface (GUI) displays pictures (called icons) and
An interface that displays pictures menus that people use to send commands to the computer system. GUIs are
(icons) and menus that people use to more intuitive to use than command-based interfaces because they try to
send commands to the computer anticipate the user’s needs and they provide easy-to-recognize options. Micro-
system. soft Windows is one popular operating system with a GUI. As the name sug-
gests, Windows is based on the use of a window, or a portion of the display
screen dedicated to a specific application. The screen can display several win-
dows at once.

Although GUIs have traditionally been accessed using a keyboard and
mouse, more recent technologies allow people to use touch screens and spoken
commands. Today’s mobile devices and some PCs, for example, use a touch user
interface—also called a natural user interface (NUI) or multitouch interface.

Speech recognition is also available with some operating systems. Microsoft
and other operating system manufacturers have developed voice-command
computer control software. Microsoft employs a special programming language
called Speech Application Program Interface (SAPI) to associate your voice
commands with specific actions performed by the computer. Apple’s OpenEars
makes it simple for you to add speech recognition and text to speech to your
iPhone, iPad, or iPod. Siri, the personal assistant that acts as an app on the
Apple iOS operating system, uses a natural language user interface to answer
questions. Adacel is a company that develops advanced simulation and control
systems for aviation and defense. It is working on a voice-activated control sys-
tem to operate the display system on aircrafts.

Some operating systems provide sight interfaces that enable a computer
to perform different commands or operations depending on where a person
is looking on the screen. Some companies are also experimenting with sen-
sors attached to the human brain (brain interfaces) that can detect brain
waves and control a computer as a result. Sight and brain interfaces can be
very helpful to disabled individuals.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

144 PART 2 • Information Technology Concepts

application programming inter- Operating system developers must be extremely careful in making
face (API): A set of programming changes to their user interface. The Windows 8 touch interface represented
instructions and standards that enables a major change from its traditional mouse-driven point-and-click user inter-
one software program to access and face. Initial user reaction was lukewarm at best, with many users complain-
use the services of another software ing about the loss of the Start button to display a pop-up menu of
program. programs, folders, and icons. For Windows 10 (there is no Windows 9),
Microsoft responded to consumers’ feedback by bringing back the tradi-
hardware independence: The tional Start screen. Microsoft also tried to appease users accustomed to the
ability of a software program to run on tile-based interface of Windows 8 by adding a few tiles to the right side of
any platform, without concern for the the Start menu.
specific underlying hardware.
Hardware Independence An application programming interface (API) is a
set of programming instructions and standards that enable one software
program to access and use the services of another software program. An API
provides a software-to-software interface, not a user interface. The API also
provides software developers tools that allow them to build application soft-
ware without needing to understand the inner workings of the OS and hard-
ware. Software applications are designed to run on a particular OS by using
the operating system’s application program interface.

APIs also provide a degree of hardware independence so that the under-
lying hardware can change without necessarily requiring a rewrite of the soft-
ware applications. Hardware independence refers to the ability of a software
program to run on any platform, without concern for the specific underlying
hardware. When new hardware technologies are introduced, the operating
system, not the application software, is required to adjust to enable use of
those changes.

A software manufacturing company or service provider will often
release its API to the public so that other software developers can design
products that employ its service. For example, Amazon.com released its
API to other Web site developers so they could use it to access Amazon’s
product information; thus, allowing third-party Web sites to post direct
links to Amazon products with updated prices and a “buy now” option.5

Memory Management The OS also controls how memory is accessed, maxi-
mizing the use of available memory and storage to provide optimum effi-
ciency. The memory-management feature of many OSs allows the computer
to execute program instructions effectively and to speed processing. One way
to increase the performance of an old computer is to upgrade to a newer OS
and increase the amount of memory.

Most OSs support virtual memory, which allocates space on the hard
disk to supplement the immediate, functional memory capacity of RAM. Vir-
tual memory works by swapping programs or parts of programs between
memory and one or more disk devices—a concept called paging. This proce-
dure reduces CPU idle time and increases the number of jobs that can run in
a given time span.

Processing Tasks Operating systems use the following five basic approaches
to task management to increase the amount of processing that can be accom-
plished in a given amount of time:

● Multiuser. Allows two or more users to run programs at the same time
on the same computer. Some operating systems permit hundreds or
even thousands of concurrent users. The ability of the computer to han-
dle an increasing number of concurrent users smoothly is called
scalability.

● Multiprocessing. Supports running a program on more than one CPU.
● Multitasking. Allows more than one program to run concurrently.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

CHAPTER 4 • Software and Mobile Applications 145

● Multithreading. Allows different threads of a single program to run
concurrently. A thread is a set of instructions within an application that
is independent of other threads. For example, in a spreadsheet program,
the thread to open the workbook is separate from the thread to sum a
column of figures.

● Real time. Responds to input instantly. To do this, the operating system
task scheduler can stop any task at any point in its execution if it deter-
mines that another higher priority task needs to run immediately. Real-
time operating systems are used to control the operation of jet engines,
the deployment of air bags, and the operation of antilock braking
systems—among other uses.

Not all operating systems employ all these approaches to task manage-
ment. For example, the general-purpose operating systems with which we are
most familiar (e.g., Windows, Mac OS, and Linux) cannot support real-time
processing.

Networking Capability Most operating systems include networking capabilities
so that computers can join together in a network to send and receive data
and share computing resources. Operating systems for larger server compu-
ters are designed specifically for computer networking environments.

Access to System Resources and Security Because computers often handle sensi-
tive data that can be accessed over networks, the OS needs to provide a high
level of security against unauthorized access to the users’ data and programs.
Typically, the OS establishes a logon procedure that requires users to enter an
identification code, such as a user name, and a password. Operating systems
may also control what system resources a user may access. When a user success-
fully logs on to the system, the OS permits access to only the portions of the sys-
tem for which the user has been authorized access. The OS records who is using
the system and for how long, and it reports any attempted breaches of security.

File Management The OS manages files to ensure that files in secondary stor-
age are available when needed and that they are protected from access by
unauthorized users. Many computers support multiple users who store files
on centrally located disks or tape drives. The OS keeps track of where each
file is stored and who is cleared to access them.

Current Operating Systems
Today’s operating systems incorporate sophisticated features and impressive
graphic effects. Table 4.2 classifies a few current operating systems by sphere
of influence.

T A B L E 4.2 Operating systems by sphere of influence

Personal Workgroup Enterprise
Microsoft Windows Microsoft Windows Server Microsoft Windows
Server
Mac OS X, iOS Mac OS X Server
Linux Linux Linux
Google Android, Chrome UNIX UNIX
OS
HP webOS IBM i and z/OS IBM i and z/OS
HP-UX HP-UX

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

146 PART 2 • Information Technology Concepts omihay/Shutterstock.com

From time to time, software manufacturers drop support for older operating
systems—meaning that although computers and software running under these
operating system will continue to run, the operating system manufacturer will no
longer provide security fixes and updates. Without such patches, the users’ com-
puters are more susceptible to being infected by viruses and other malware. For
example, Google announced that in 2016 it would be ending its support for its
Chrome browser on Windows XP and Vista as well as on Mac OS X 10.6, 10.7,
and 10.8. Google chose to drop support for these operating systems because
they are no longer actively supported by Microsoft and Apple, respectively.6

Discontinuance of support is a strong reason to upgrade to new software.
However, many organizations take the approach that “if it ain’t broke, don’t
fix it.” In their view, other projects take priority over updating software that
is still functioning. However, this approach can lead to interruptions in key
systems. For example, on November 7, 2015, planes were grounded for sev-
eral hours at Paris’ busy Orly airport when a computer that links air traffic
control systems with France’s main weather bureau stopped working. The
computer was running on Windows 3.1, a 23-year-old operating system
dropped from support by Microsoft over a decade ago.7

Personal Computing Operating Systems
This section summarizes information about several operating systems that are
found on personal computers, portable computers, and mobile devices.

Microsoft PC Operating Systems In 1980, executives from IBM approached
Microsoft’s Bill Gates regarding the creation of an operating system for IBM’s
first personal computer. That operating system, which was ultimately called
Microsoft Disk Operating System (MS-DOS), was based on Microsoft’s pur-
chase of the Quick and Dirty Operating System (QDOS) written by Tim Pater-
son of Seattle Computer Products. Microsoft bought the rights to QDOS for
$50,000. QDOS, in turn, was based on Gary Kildall’s Control Program for
Microcomputers (CP/M). As part of its agreement with Microsoft, IBM allowed
Microsoft to retain the rights to MS-DOS and to market MS-DOS separately
from the IBM personal computer. The rest is history, with Gates and Microsoft
earning a fortune from the licensing of MS-DOS and its descendants.8 MS-
DOS, which had a command-based interface that was difficult to learn and
use, eventually gave way to the more user-friendly Windows operating sys-
tem, which opened the PC market to everyday users. See Figure 4.5.

FIGURE 4.5

Microsoft Windows 10

Windows 10 brings back the familiar
Start menu, replaces the Explorer
browser with the Edge browser, and
provides the Cortana personal
assistant.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

CHAPTER 4 • Software and Mobile Applications 147

With its launch of Windows 10, Microsoft announced that it is moving
away from its usual practice of releasing major new versions of its Windows
operating system every few years (see Table 4.3 for an overview of the
current and previous versions of Windows). Instead, the company will be

T A B L E 4.3 Summary of Microsoft Windows operating systems

Year Version Highlights
1985 Windows 1.0
1987 Windows 2.0 Ran as a graphical, 16-bit multitasking shell on top of an existing MS-DOS installation,
1988 Windows 2.03 providing an environment that could run graphical programs designed for Windows
1990 Windows 3.0 as well as existing MS-DOS software
1992 Windows 3.1
1995 Windows 95 Introduced more sophisticated keyboard shortcuts as well as the ability to minimize
1998 Windows 98 and maximize Windows

1999 Windows 98 Second Allowed application Windows to overlap each other
2000 Edition
2000 Windows 2000 Introduced a multitasking capability with a protected/enhanced mode, which allowed
Windows ME Windows applications to use more memory; first widely successful version of Windows
2001
2007 Windows XP Introduced improved system stability and expanded support for multimedia, TrueType
Windows Vista fonts, and workgroup networking
2009
2012 Windows 7 Introduced numerous important features and functions, such as the taskbar, the Start
Windows 8 button, and a new approach to user navigation; moved from a 16-bit architecture to a
2013 32-bit architecture
2015 Windows 8.1
Windows 10 Introduced many features, such as the Quick Launch toolbar, the Active Desktop,
single-click launching, Back and Forward navigation buttons, favorites, and the
address bar in Windows Explorer, and image thumbnails; heavily criticized operating
system, with major compatibility issues

Included fixes for many Windows 98 problems and replaced Internet Explorer 4.0
with Internet Explorer 5.0; improved audio, modem, and USB support

An operating system for use on both client and server computers; marketed as the
most secure Windows version ever, but it became the target of a number of high-
profile virus attacks, such as Code Red and Nimda

Rated Microsoft’s worst OS by many industry observers; exhibited stability and com-
patibility issues; included Internet Explorer 5.5, Windows Media Player 7, and Win-
dows Movie Maker software, which provided basic video editing functions that were
designed to be easy for consumers to use

Offered a major advance from the MS-DOS–based versions of Windows in terms of secu-
rity, stability, and efficiency; introduced a significantly redesigned graphical user interface

Focused primarily on improving security; offered an updated graphical user interface
and visual style dubbed “Aero” and a new search component called Windows Search;
provided redesigned networking, audio, print, and display subsystems, as well as new
multimedia capabilities, including Windows DVD Maker

Provided an incremental upgrade to the operating system; intended to address Win-
dows Vista’s performance issues, while maintaining hardware and software compati-
bility; provided support for touch displays and 64-bit processors

Introduced major changes to the operating system’s platform and user interface to
improve user experience on tablets; included a touch-optimized Windows shell, a Start
screen that displays programs and dynamically updated content on a grid of tiles, the
ability to sync apps and settings between devices, and the Windows Store for down-
loading and purchasing new software

Included an improved Start screen, additional bundled apps, tighter OneDrive inte-
gration, Internet Explorer 11, a Bing-powered unified search system, and restoration
of a visible Start button on the taskbar

Brought back the familiar Start menu and desktop; introduced the Edge browser and
the Cortana assistant, which responds to natural language and can perform a variety of
organizational tasks for the end user, including setting reminders, scheduling calendar
events, calculating math problems, and converting measurements and money

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

148 PART 2 • Information Technology Concepts

providing ongoing, incremental upgrades and improvements, rolled out auto-
matically, perhaps as often as monthly for individual consumers. Organiza-
tions, whose information systems professionals desire minimal change in
order to ensure reliable operations of corporate applications, may elect to opt
out of such frequent updates. Microsoft hopes that the automatic, rapid
update cycle will force users to stay current and discontinue use of older
operating systems. One benefit of this approach is that it will allow Microsoft
to gradually shift some of its resources away from updating and maintaining
earlier versions of Windows. Ideally, those resources will instead be refocused
on efforts to improve Windows 10. Microsoft also plans to make Windows 10
a common platform with a single app store for any machine—smartphone,
laptop, desktop, xBox game station, etc. (with variations to allow for differing
screen sizes and uses).9

Apple Computer Operating Systems In July 2001, Mac OS X was released as an
entirely new operating system for the Mac. Based on the UNIX operating
system, Mac OS X included a new user interface with luminous and semitrans-
parent elements, such as buttons, scroll bars, and windows along with fluid
animation to enhance the user’s experience.

Since its first release, Apple has upgraded OS X multiple times, as shown
in Table 4.4. The first eight versions of the OS were named after big cats, the
latest are named after places in California. OS X 10.11 El Capitan is Apple’s
latest operating system. See Figure 4.6. It offers enhanced security features as
well as the ability to launch the iBooks app, and books you’ve already down-
loaded to your iPad, iPhone, or iPod Touch will appear in your library. Direc-
tions, bookmarks, and recent searches are automatically passed on to all your
iOS devices, and you can now use natural language when using the Spotlight
search feature (e.g., “spreadsheet I worked on yesterday”). The new Split
View feature automatically positions two app windows side by side in full
screen so you can work with both apps at the same time. Power-saving
technology enables you to browse longer, and upgraded graphics-rendering
technology has improved overall system performance compared to previous
versions.10

Because Mac OS X runs on Intel processors, Mac users can set up their
computers to run both Windows and Mac OS X and select the platform they
want to work with when they boot their computers. Such an arrangement is
called dual booting. While Macs can dual boot into Windows, the opposite is

T A B L E 4.4 Summary of recent Mac operating systems

OS X Version Name Date Released

10.0 Cheetah 2001
10.1 Puma 2001
10.2 Jaguar 2002
10.3 Panther 2003
10.4 Tiger 2005
10.5 Leopard 2007
10.6 Snow Leopard 2009
10.7 Lion 2011
10.8 Mountain Lion 2012
10.9 Mavericks 2013
10.10 Yosemite 2014
10.11 El Capitan 2015

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

CHAPTER 4 • Software and Mobile Applications 149 © Apple, Inc

FIGURE 4.6

Mac OS X El Capitan

El Capitan incorporates many fea-
tures of Apple’s mobile devices into
its desktop operating system.

Source: Apple, Inc.

not true. OS X cannot be run on any machine other than an Apple device.
However, Windows PCs can dual boot with Linux and other OSs.

Linux Linux is an OS developed in 1991 by Linus Torvalds as a student in
Finland. The OS is distributed under the GNU General Public License, and its
source code is freely available to everyone. It is, therefore, called an open-
source operating system.

Individuals and organizations can use the open-source Linux code to
create their own distribution (flavor) of Linux. A distribution consists of
the Linux kernel (the core of the operating system)—which controls the
hardware, manages files, separates processes, and performs other basic
functions—along with other software. This other software defines the termi-
nal interface and available commands, produces the graphical user interface,
and provides other useful utility programs. A Linux distributor takes all the
code for these programs and combines it into a single operating system that
can be installed on a computer. The distributor may also add finishing
touches that determine how the desktop looks like, what color schemes and
character sets are displayed, and what browser and other optional software
are included with the operating system. Typically, the distribution is “opti-
mized” to perform in a particular environment, such as for a desktop com-
puter, server, or TV cable box controller.

More than 100 distributions of Linux have been created.11 Many distribu-
tions are available as free downloads. Three of the most widely used distribu-
tions come from software companies Red Hat, SUSE, and Canonical. Although
the Linux kernel is free software, both Red Hat and SUSE produce retail ver-
sions of the operating system that earn them revenues through distribution
and service of the software. openSUSE is the distribution sponsored by SUSE.
See Figure 4.7.

Red Hat, an open-source software developer based in Raleigh, North
Carolina, offers a range of Linux-based solutions. Its Red Hat Enterprise
Linux distribution, first released in 2000, is an enterprise-grade operating
system that can be deployed on desktops as well as servers.12 Cerner Corpo-
ration is a Kansas-based provider of healthcare IT solutions whose software
solutions are in use in over 18,000 healthcare facilities around the world.13
When Cerner was looking to standardize the hosting environment for its
flagship Cerner Millennium application suite, it chose to implement the Red
Hat Enterprise Linux operating system. Millennium applications provide
healthcare providers real-time access to a variety of data, including patient

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

150 PART 2 • Information Technology Concepts Courtesy of openSUSE.org

FIGURE 4.7

openSUSE operating system

openSUSE is a distribution of Linux
available as a free download.

information, diagnoses, lab results, and medication lists. When deciding on
an operating system for its hosting environment for high-priority applica-
tions, an important consideration for Cerner was the fact that over 70 per-
cent of its Millennium customers opt to host their applications using
Cerner’s hosting services. It was a priority for Cerner and its customers that
the company implement a dependable and scalable solution. With its imple-
mentation of Red Hat’s Linux distribution, Cerner found that it gained per-
formance improvements and a lower total cost of ownership in addition to a
more stable and scalable system.14

Google: Android and Chrome Over the years, Google has extended its reach
beyond its popular search engine (Google) to offer application software (Goo-
gle Docs), email services (Gmail), a mobile operating system (Android), Web
browser (Chrome), and, more recently, a PC operating system—Chrome OS.
The various releases of the Android operating system have been given tasty
names such as Gingerbread, Jelly Bean, and Ice Cream Sandwich. Android
has surpassed 1 billion users across all devices—with 80 percent of mobile
phones worldwide operating on Android.15

Chrome OS is a Linux-based operating system for notebooks and desktop
PCs primarily used to access Web-based information and services such as
email, Web browsing, social networks, and Google online applications. The
OS is designed to run on inexpensive low-power computers. Chrome OS for
personal computers is designed to start fast and provide quick access to appli-
cations through the Internet. An open-source version of Chrome OS, named
Chromium OS, was made available at the end of 2009. Because it is open-
source software, developers can customize the source code to run on different
platforms, incorporating unique features.

Workgroup Operating Systems
To keep pace with user demands, business technology must be able to sup-
port an environment in which network usage, data storage requirements, and
data-processing speeds are increasing at a dramatic rate. Powerful and sophis-
ticated operating systems are needed to run the servers that meet these
business needs for workgroups.

Windows Server Microsoft designed Windows Server to perform a host of
tasks that are vital for Web sites and corporate Web applications. For exam-
ple, Microsoft Windows Server can be used to coordinate and manage large

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

CHAPTER 4 • Software and Mobile Applications 151

data centers. Windows Server delivers benefits such as a powerful Web server
management system, virtualization tools that allow various operating systems
to run on a single server, advanced security features, and robust administra-
tive support. Windows Server 2016 provides further enhancements for
containerization—with individual containers having their own Windows
Server kernel that is not shared with the host machine. This ensures that
users can run jobs without worrying that workloads running on one container
will reach outside their bounds and interfere with either the host machine or
other applications running on it. Windows Home Server allows individuals to
connect multiple PCs, storage devices, printers, and other devices into a
home network. Windows Home Servers provides a convenient way for home
users to store and manage photos, video, music, and other digital content. It
also provides backup and data recovery functions.

UNIX UNIX is a powerful OS originally developed by AT&T for minicomputers—
the predecessors of servers, which were larger than PCs and smaller than main-
frames. UNIX can be used on many computer system types and platforms, includ-
ing workstations, servers, and mainframe computers. UNIX also makes it easy to
move programs and data among computers or to connect mainframes and work-
stations to share resources. There are many variants of UNIX, including HP-UX
from Hewlett-Packard, AIX from IBM, and Solaris from Oracle. The UNIX platform
(a computer capable of running the UNIX operating system plus the operating
system itself) is considered a high-cost platform compared to Linux and Windows
Server.

The Solaris operating system is a UNIX-based operating system originally
developed by Sun Microsystems. Oracle, known primarily as a database man-
agement software firm, acquired Sun in 2010. Sun products included server
hardware, the Solaris operating system, and the Java programming language.
Oracle now offers so-called general-purpose engineered systems that include
a combination of Oracle and Sun software running on powerful Sun servers,
dubbed SPARC.16 Office Depot is one of the largest retail office supply com-
panies in the world, with some 1,400 stores in the United States, Europe, and
the Middle East. The company upgraded the information system infrastructure
used to run its ERP application to SPARC servers and the Solaris operating
system to gain a 20 percent increase in performance.17

Red Hat Linux Red Hat Software offers Red Hat Enterprise Linux Server, an
operating system that is very efficient at serving Web pages and can manage
a cluster of several servers. Distributions such as Red Hat have proven Linux
to be a very stable and efficient OS. Red Hat Enterprise Virtualization (RHEV)
software provides virtualization capabilities for servers and desktop compu-
ters to enable the hardware to run more than one operating system. See
Figure 4.8.

Casio is a multinational electronics manufacturing company headquar-
tered in Japan. Its products include calculators, mobile phones, cameras,
musical instruments, and watches. Casio migrated to RHEV, and its virtual
servers now use only 60 percent of the resources used by physical servers.
The firm has also been able to ensure that in the event of a server failure,
other servers will have the capacity to pick up the load without a serious
effect on the entire system.18

Mac OS X Server The Mac OS X Server is the first modern server OS from
Apple Computer, and it is based on the UNIX OS. Designed for OS X and
iOS, OS X Server makes it easy to collaborate, develop software, host Web
sites and wikis, configure Mac and iOS devices, and remotely access a net-
work. Smartphone users running iOS can now open, edit, and save docu-
ments on OS X Server.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

152 PART 2 • Information Technology Concepts

FIGURE 4.8

Red Hat Linux

Red Hat Enterprise Virtualization
(RHEV) software provides virtualiza-
tion capabilities for servers and
desktop computers.

Source: www.redhat.com

Enterprise Operating Systems
Mainframe computers, often referred to as “Big Iron,” provide the computing
and storage capacity required for massive data-processing environments, and
they provide systems that can support many users while delivering high per-
formance and excellent system availability, strong security, and scalability. A
wide range of application software has been developed to run in the main-
frame environment, making it possible to purchase software to address almost
any business problem. Examples of mainframe OSs include z/OS from IBM,
HP-UX from Hewlett-Packard, and Linux. The z/OS is IBM’s first 64-bit enter-
prise OS and is capable of handling very heavy workloads, including serving
thousands of concurrent users and running an organization’s critical applica-
tions. (The z stands for zero downtime.)
Mobile Operating Systems
Smartphones now employ full-fledged personal computer operating systems
such as the Google Android, Apple iOS, and Microsoft Windows Phone that
determine the functionality of your phone and the applications that you can
run. These operating systems have software development kits that allow devel-
opers to design thousands of apps providing a myriad of mobile services.

Table 4.5 lists the top four mobile operating systems for smartphones
and tablets based on worldwide market share as of the second quarter (2Q)
of 2015. Table 4.6 lists the top tablet operating systems based on sales in
1Q 2015.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

CHAPTER 4 • Software and Mobile Applications 153

T A B L E 4.5 Comparison of smartphone operating systems

Smartphone Operating Worldwide Market Share Estimated Total Number Estimated Rate of
System of Sales during 2Q 2015 of Applications Increase in Number of
New Applications

Google Android 82.8% 1,824,500 (Nov 2015) 980/day
13.9% 1,500,000 (July 2015) 667/day
Apple iPhone OS (iOS) 300,000 (June 2014) 550/day
2.6%
Microsoft Windows Mobile Not available Not available
(to be replaced by 0.3%
Windows 10 Mobile)

Blackberry OS

Sources: “Smartphone OS Market Share, 2015 Q2,” International Data Corporation, August 2015, www.idc.com/prodserv/smartphone-os-market-share.jsp; Costello,
Sam, “How Many Apps Are in the App Store?,” About Tech, September 15, 2015, http://ipod.about.com/od/iphonesoftwareterms/qt/apps-in-app-store.htm; Whitney.
Lance, “Windows Phone Store Hits More than 300,000 Apps,” CNET, August 8, 2015, www.cnet.com/news/windows-phone-store-hits-more-than-300000-apps.

T A B L E 4.6 Worldwide market share of tablet computer operating systems

Table Computer Operating System Worldwide Market Share

Android 67%
iOS 28%
Windows 5%

Source: Shah, Agam, “Windows Forecast to Gradually Grab Tablet Market Share From iOS and Android,”
PCWorld, March 12, 2015, www.pcworld.com/article/2896196/windows-forecast-to-gradually-grab-tablet
-market-share-from-ios-and-android.html.

embedded system: A computer Embedded Operating Systems
system (including some sort of proces-
sor) that is implanted in and dedicated An embedded system is a computer system (including some sort of processor)
to the control of another device. that is implanted in and dedicated to the control of another device. Embedded
systems control many devices in common use today, including TV cable boxes,
smartphones, digital watches, digital cameras, MP3 players, calculators, micro-
wave ovens, washing machines, and traffic lights. The typical car contains many
embedded systems, including those that control antilock brakes, air bag deploy-
ment, fuel injection, active suspension devices, transmission control, and cruise
control. A global positioning system (GPS) device uses an embedded system to
help people find their way around town or more remote areas. See Figure 4.9.

FIGURE 4.9 iStockphoto.com/Stephen Morris

GPS devices use embedded
operating systems

A GPS device uses an embedded
system to acquire information from
satellites, display your current loca-
tion on a map, and direct you to your
destination.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

154 PART 2 • Information Technology Concepts

Some embedded systems include specialized operating systems. For exam-
ple, Palm, an early smartphone manufacturer, developed its well-regarded
Palm webOS operating system to run its Pre and Pixi smartphones. Although
webOS was considered innovative, Palm’s smartphones were a market failure,
and in 2010, HP bought the company along with webOS, hoping to use it to
develop its mobile platform. HP’s efforts were also unsuccessful, and in early
2013, LG bought all the assets associated with webOS from HP. LG now uses
the specialized software in its smart TVs to enable users to watch streaming
movies and television shows and YouTube videos, connect to social networks,
play games, get news, and download apps.19

Some of the more popular OSs for embedded systems are described in
the following section.

Windows Embedded Windows Embedded is a family of Microsoft operating
systems included with or embedded into small computer devices. For exam-
ple, Windows Embedded Compact includes several versions that provide
computing power for TV set-top boxes, automated industrial machines,
media players, medical devices, digital cameras, PDAs, GPS receivers, ATMs,
gaming devices, and business devices such as cash registers. Microsoft Win-
dows Embedded Automotive helps manufacturers provide drivers with
everything they need to stay in touch with others, be entertained, and be
informed. Drivers can also monitor vehicle performance, screen for mainte-
nance issues, and allow remote tracking of the car’s location. Speech recog-
nition, touch interface, and hands-free technologies enable drivers to stay
focused on the road and in control of their surroundings. The Ford Sync sys-
tem uses an in-dashboard display, an industrial-strength operating system
owned by BlackBerry called QNX, and wireless networking technologies to
link automotive systems with smartphones and portable media players. See
Figure 4.10.

FIGURE 4.10

Ford Sync 3 user interface

The Ford Sync 3 system allows
drivers to wirelessly connect
smartphones and media devices
to automotive systems.

Source: McCracken, Henry, “Why Ford
Dumping Microsoft’s Automotive Software
Was Inevitable—And Probably Long
Overdue,” Fast Company, http://www.fast
company.com/3039760/why-ford-dumping
-microsofts-automotive-software-was
-inevitable-and-probably-long-overdue.

Syndicat Mixte Autolib’ is an electric car-sharing program implemented
by the city of Paris and surrounding municipalities. The goals of the pro-
gram are to relieve traffic congestion, reduce noise and air pollution, and

provide people with flexible transit options. Various components of the Win-

dows Embedded operating system provide connectivity between the in-car
system, rental kiosks, charging stations, and a central control system. Syndi-
cat Mixte Autolib’ has reduced carbon dioxide emissions by 1.5 metric tons
annually and replaced 25,000 privately owned gas vehicles. Autolib’ subscri-
bers enjoy additional benefits including GPS navigation and free parking.20

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

CHAPTER 4 • Software and Mobile Applications 155

Proprietary Linux-Based Systems Because embedded systems are usually
designed for a specific purpose in a specific device, they are usually proprie-
tary or custom-created and owned by the manufacturer. Sony’s Wii, for exam-
ple, uses a custom-designed OS based on the Linux kernel. Linux is a popular
choice for embedded systems because it is free and highly configurable. It has
been used in many embedded systems, including e-book readers, ATMs,
smartphones, networking devices, and media players.

utility program: A program that Utility Programs
helps to perform maintenance or cor-
rect problems with a computer system. Utility programs perform a variety of tasks typically related to system main-
tenance or problem correction. For example, there are utility programs
designed to merge and sort sets of data, keep track of computer jobs being
run, compress data files before they are stored or transmitted over a network
(thus saving space and time), and perform other important tasks.

Just as your car engine runs best if it has regular tune-ups, computers also
need regular maintenance to ensure optimal performance. Over time, your
computer’s performance can start to diminish as system errors occur, files
clutter your hard drive, and security vulnerabilities materialize. Sysinternals
Suite is a collection of Windows utilities that can be downloaded for free
from the Microsoft Technet Web site. These utilities can be used to boost the
performance of a slow PC, repair errors in the registry and on a hard drive,
remove unnecessary files, improve system security and privacy, and optimize
sluggish system processes as shown in Figure 4.11.21

FIGURE 4.11 Microsoft product screenshots used with permission from Microsoft Corporation

Sysinternals Suite

Sysinternals Suite is a collection of
utilities for troubleshooting and
maintaining a Windows system.

Although many PC utility programs come installed on computers, you can
also purchase utility programs separately. The following sections examine
some common types of utilities.

Hardware Utilities
Hardware utilities can be used to check the status of all parts of the PC,
including hard disks, memory, modems, speakers, and printers. Disk utilities
check the hard disk’s boot sector, file allocation tables, and directories and
analyze them to ensure that the hard disk is not damaged. Disk utilities can

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

156 PART 2 • Information Technology Concepts

also optimize the placement of files on a crowded disk. Hardware manufac-
turers often provide utilities that can be used for their specific devices.
Other companies such as Symantec, which produces Norton Utilities, offer
hardware utilities that can be used to repair, maintain, and optimize a range
of system types.

Security Utilities
Computer viruses and malware from the Internet and other sources can be a
nuisance and worse—sometimes completely disabling a computer. Antivirus
and anti-malware utilities can be used to constantly monitor and protect a
computer. If a virus or other malware is found, it can often be removed. Fire-
wall software is another important security utility for protecting a computer
system. Firewall software filters incoming and outgoing packets, making sure
that neither hackers nor their tools are attacking the system. Symantec, McA-
fee, and Microsoft are the most popular providers of security software.

File-Compression Utilities
File-compression programs can reduce the amount of disk space required to
store a file or reduce the time it takes to transfer a file over the Internet. Both
Windows and Mac operating systems let you compress or decompress files and
folders. A Zip file has a .zip extension, and its contents can be easily unzipped
to the original size. MP3 (Motion Pictures Experts Group-Layer 3) is a popular
file-compression format used to store, transfer, and play music and audio files,
such as podcasts—audio programs that can be downloaded from the Internet.

Spam-Filtering Utilities
Receiving unwanted email (spam) can be a frustrating waste of time. Email soft-
ware and services include spam-filtering utilities to assist users with these
annoyances. Email filters identify spam by learning what the user considers
spam and routing it to a junk mail folder. In addition, many security utilities—
such as Symantec’s Norton Security and Kaspersky’s Internet Security—include
spam-filtering utilities. Businesses often invest in additional software to ensure
better protection for enterprise-level email systems where spam containing
viruses is a serious threat. A variety of companies, including Cisco, Barracuda
Networks, and Google, offer spam-filtering software that can intercept danger-
ous spam as it enters the corporate email system.

Being able to block spam efficiently and accurately is a priority for organi-
zations such as the Long Island Rail Road Company (LIRR), a commuter rail
system serving over 300,000 passengers weekly in southeastern New York.22
The LIRR uses enterprise-level messaging security software from GWAVA to
protect more than 2,000 email accounts. Using GWAVA’s software, which is
integrated into the LIRR’s overall communication infrastructure, the railroad’s
IT team is able to block more than 34,000 spam emails each month.23

Network and Internet Utilities
A broad range of network- and systems-management utility software is avail-
able to monitor hardware and network performance and trigger an alert
when a server is crashing or a network problem occurs. IBM’s Tivoli Netcool
Network Management, Hewlett-Packard’s Automated Network Management
Suite, and Paessler’s PRTG Network Monitor can be used to solve computer-
network problems and help save money. As shown in Figure 4.12, PRTG Net-
work Monitor creates a sensor for each network device and then monitors the
device to make sure it is connected and working properly. If a device encoun-
ters a problem, the network manager is alerted via email or text message.

The University of Kentucky community includes more than 26,000 students
and almost 11,000 employees on its campus in Lexington.24 The university’s
computing infrastructure is made up of multiple local area networks (LANs)

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

CHAPTER 4 • Software and Mobile Applications 157 © Paessler AG

FIGURE 4.12

PRTG Network Monitor

PRTG Network Monitor and other
network utility software can help you
to keep track of network compo-
nents, traffic flows, and network
performance.

Source: www.paessler.com/prtg

that connect to the school’s wide area network (WAN). One of those LANs
includes over 1,000 desktop computers, 50 switches, 6 servers, and 2 routers.
The university’s network administrators use AdRem’s NetCrunch network moni-
toring software to ensure uninterrupted service on the network, which serves
17 different on-campus labs. NetCrunch allows the school’s IT personnel to
monitor the network and track connectivity problems with minimum human
attention, by providing early warnings regarding failures in device, server, and
desktop performance. In particular, the utility has helped the network team cut
down on connectivity problems related to port settings at switches and routers,
thus improving network performance for the students and faculty who rely on
it for a variety of learning, teaching, and research activities.25
Server and Mainframe Utilities
Some utilities enhance the performance of servers and mainframe computers.
Blue Cross and Blue Shield of Kansas provides medical, dental, and life insur-
ance coverage to 800,000 customers. As part of its service, it offers online
access to health information stored in an IBM DB2 database running on an
IBM z/OS mainframe. The company employs IBM mainframe utility programs
to manage this operation effectively. The IBM z/OS Data Facility System Man-
aged Storage utility applies the appropriate retention policies to data stored
on direct access storage devices, and the IBM Tivoli Workload Scheduler is
used to preform automated job scheduling to ensure critical jobs are com-
pleted on time.26

The main enabling technology for cloud computing is software that allows
the creation of virtual servers, which separate a physical computing device into
one or more “virtual” servers, each of which can be easily used and managed to
perform computing tasks (see Figure 4.13). A server administrator uses software
to divide one physical server into perhaps as many as a dozen virtual
machines—with each virtual machine capable of processing a set of data for
users from a given organization. In a typical cloud computing data center

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

158 PART 2 • Information Technology Concepts

Application
Operating system

Hardware—CPU,
memory, etc.

Application Application

Operating Operating
system system

Without virtualization Virtual Virtual
hardware hardware

FIGURE 4.13 VMWare Virtualization Layer Julia Ivantsova/Shutterstock.com

Virtualization Actual hardware

Virtual servers that separate a phys- With virtualization
ical computing device into one or
more “virtual” servers, each of which
can be easily used and managed to
perform computing tasks.

deployment of several hundred servers, companies using virtual servers can save
millions of dollars in capital and operating expenses (including energy costs) per
year by dramatically reducing the number of actual physical servers in use.

Other Utilities

Utility programs are available for almost every conceivable task or function.
Managing the vast array of operating systems for smartphones and mobile
devices, for example, has been difficult for many companies. Many organiza-
tions unwisely allow employees to connect to corporate databases using
smartphones and mobile devices with little or no guidance. Utility programs
called mobile device management (MDM) software can help a company man-
age security, enforce corporate strategies, and control downloads and content
streaming from corporate databases into smartphones and mobile devices.
Columbia Sportswear Company uses VMWare’s AirWatch MDM package to
deliver mobile applications and manage hundreds of mobile devices in its
retail stores and distribution centers. AirWatch allows the retailer’s IT staff to
manage the mobile devices from a central location, ensuring secure and con-
sistent deployment of mobile devices and applications, including those used
for tracking sales and monitoring staff scheduling.27

In addition, a number of companies, such as CNET, offer utilities that can
be downloaded for most popular operating systems. CNET offers hundreds of
utilities for Windows operating systems, including defraggers (fixes the prob-
lem of fragmentation, which occurs when data is broken up into discontinu-
ous pieces that waste space on your hard drive), system cleaners (cleans
tracks on your hard drive, deletes temporary files, and cleans your registry),
uninstallers (safely removes unwanted software), and replacements for Note-
pad and Task Manager.

middleware: Software that allows Middleware
various systems to communicate and
exchange data. Middleware is software that provides messaging services that allow different
applications to communicate and exchange data. This systematic tying
enterprise application integra- together of disparate applications, often through the use of middleware, is
tion (EAI): The systematic tying known as enterprise application integration (EAI). It is implemented to
together of disparate applications so address situations in which a company acquires different types of informa-
that they can communicate. tion systems—often through mergers, acquisitions, or expansion—that need

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

CHAPTER 4 • Software and Mobile Applications 159

service-oriented architecture to share data and interact. Middleware can also serve as an interface between
(SOA): A software design approach the Internet and private corporate systems. For example, it can be used to
based on the use of discrete pieces of transfer a request for information from a corporate customer on the company
software (modules) to provide specific Web site to a traditional database on a mainframe computer and to return the
functions as services to other results of that information request to the customer on the Internet.
applications.
The use of middleware to connect disparate systems has evolved into an
approach for developing software and systems called SOA. Service-oriented
architecture (SOA) is a software design approach based on the use of
discrete pieces of software (modules) to provide specific functions (such as
displaying a customer’s bill statement) as services to other applications. Each
module is built in such a way that ensures that the service it provides can
exchange information with any other service without human interaction and
without the need to make changes to the underlying program itself. In this
manner, multiple modules can be combined to provide the complete function-
ality of a large, complex software application. Systems developed with SOA
are highly flexible, as they allow for the addition of new modules that provide
new services required to meet the needs of the business as they evolve and
change over time.

SOA itself has evolved over time. One potential downside to SOA is that
it can lead to expensive and challenging implementations of individual ser-
vices that are too complex. In response, some organizations have shifted
their SOA approach—starting with microservices at the department level,
rather than at the enterprise level, and building from there. Microservices
are designed to quickly solve tactical problems by doing one thing very
well, and they offer organizations the opportunity to implement SOA using
simplified components.28

Netflix, which describes itself as the world’s leading Internet television
network, has 70 million members in 60 countries watching more than 100
million hours of streaming TV shows and movies each day.29 Recently, the
company shifted its development approach to a microservices architecture
approach, with many small engineering teams responsible for the develop-
ment of hundreds of microservices that work together to stream content to
customers. Each microservice represents a single-product feature that can
be updated independently. This architecture, along with Netflix’s continu-
ous delivery approach to development, means that microservices can be
upgraded and debugged on their own schedules, improving performance
and reliability for the company’s millions of customers.30,31

Critical Migration to New Operating System
Thinking
Exercise The information systems support organization of your firm is keen to migrate all
employees from whatever operating system they have now (mostly Windows 8)
to Microsoft Windows 10. Making such a change can be a big deal for employees
and can require them to get comfortable with a new user interface and ways of
accomplishing their work.

Review Questions

1. What are some of the advantages of such a move?
2. What are some potential issues that could arise from this change?

Critical Thinking Questions

1. What are some of the negative forces that will cause employees to resist this
change?

2. What are some creative things the IS team could do to overcome these resis-
tance forces?

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

160 PART 2 • Information Technology Concepts

Application Software

The primary function of application software is to apply the power of a com-
puter system to enable people, workgroups, and entire enterprises to solve
problems and perform specific tasks. Millions of software applications have
been created to perform a variety of functions on a wide range of operating
systems and device types. The following are some of the dozens of categories
of applications:

Business Genealogy Personal information manager
Communications
Computer-aided design Language Photography
Desktop publishing Legal Science
Educational Library Simulation
Entertainment Multimedia Video
Music Video games

rich Internet application (RIA): In almost any category of software, you will find many options from
A Web-delivered application combines which to choose. For example, Microsoft Edge, Mozilla Firefox, Google
hardware resources of the Web server Chrome, Apple Safari, and Opera are all Web browsers that enable users to
and the PC to deliver valuable software surf the Web. The availability of many software options enables users to select
services through a Web browser the software that best meets the needs of the individual, workgroup, or enter-
interface. prise. For example, Procter & Gamble Company (P&G), a large, multinational
organization, chose the SAP Enterprise Resource Planning software with its
vast array of options, features, and functionality to meet its complex global
accounting needs. However, a small, neighborhood bakery might decide that
Intuit’s QuickBooks, an accounting software package designed for small busi-
nesses, meets its simple accounting needs.

In most cases, application software resides on the computer’s hard disk
before it is brought into the computer’s memory and then run. Application
software can also be stored on CDs, DVDs, and USB flash drives. An
increasing amount of application software is available on the Web. Some-
times referred to as a rich Internet application (RIA), a Web-delivered
application combines hardware resources of the Web server and the PC to
deliver valuable software services through a browser interface. Before a
person, a group, or an enterprise decides on the best approach for acquir-
ing application software, they should carefully analyze computing goals,
needs, and budget.

proprietary software: One- Overview of Application Software
of-a-kind software designed for a spe-
cific application and owned by the Proprietary software and off-the-shelf software are two important types of
company, organization, or person that application software. Proprietary software is one-of-a-kind software
uses it. designed for a specific application and owned by the company, organization,
or person that uses it. Proprietary software can give a company a competitive
off-the-shelf software: Software advantage by providing services or solving problems in a unique manner—
produced by software vendors to better than methods used by a competitor. Off-the-shelf software is pro-
address needs that are common across duced by software vendors to address needs that are common across busi-
businesses, organizations, or nesses, organizations, or individuals. For example, Amazon.com uses the
individuals. same off-the-shelf payroll software as many businesses, but on its Web site,
the company uses custom-designed proprietary software, which allows visi-
tors to more easily find items to purchase. The relative advantages and disad-
vantages of proprietary software and off-the-shelf software are summarized in
Table 4.7.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

CHAPTER 4 • Software and Mobile Applications 161

T A B L E 4.7 Comparison of proprietary and off-the-shelf software

Proprietary Software Off-the-Shelf Software

Advantages Disadvantages Advantages Disadvantages

You can get exactly what It can take a long time and The initial cost is lower An organization might
you need in terms of fea- a significant amount of because the software firm have to pay for features
tures, reports, and so on. resources to develop can spread the develop- that it does not require
required features. ment costs across many and never uses.
customers.
Being involved in the In-house system develop- The software might lack
development offers more ment staff may be hard- The software is likely to important features, thus
control over the results. pressed to provide the meet the basic business requiring future modifica-
required level of ongoing needs. Users have the tion or customization,
support and maintenance opportunity to more fully which can be very expen-
because of pressure to analyze existing features sive, and because users will
move on to other new and the performance of the eventually be required to
projects. package before adopt future releases of the
purchasing. software, the customiza-
You can more easily mod- The features and perfor- tion work might need to be
ify the software and add mance of the delivered The software is likely to be repeated.
features that you might software may fail to meet of high quality because
need to counteract an ini- evolving business and end many customer firms have The software might not
tiative by competitors or to user needs. tested the software and match current work pro-
meet new supplier or cus- helped identify its bugs. cesses and data standards.
tomer demands.

Many companies use off-the-shelf software to support business processes.
Key questions for selecting off-the-shelf software include the following:

● Will the software run on the OS and hardware you have selected?
● Does the software meet the essential business requirements that have

been defined?
● Is the software manufacturer financially solvent and reliable?
● Does the total cost of purchasing, installing, and maintaining the software

compare favorably to the expected business benefits?

Founded in 1955, H&R Block is the world’s largest tax services provider, with
80,000 employees in 12,000 offices across the United States. In 2014, more than
24 million tax returns were prepared by H&R Block tax professionals and by cli-
ents using the company’s digital tax solutions.32 H&R Block places a priority on
providing accurate and easily accessible information about the company—as
well as tax preparation information and tips—through its online newsroom.
When the tax preparer was building the newsroom for its corporate Web site, it
opted to use an off-the-shelf software package called PressPage. By using a
proven, off-the-shelf option, H&R Block was able to quickly deploy an online
newsroom that included all of the features it needed, while taking advantage of
PressPage’s best practice expertise. The result was a user-friendly newsroom that
complements the company’s “brand journalism” approach to public relations.33

As mentioned in Chapter 1, workers in many organizations operate in a
cloud-computing environment in which software, data storage, and other ser-
vices are provided by the Internet (“the cloud”); the services are run on another
organization’s computer hardware, and both software and data are easily
accessed. Examples of public cloud service providers, which make their services
available to the general public, include Amazon Elastic Compute Cloud (EC2),
IBM’s Blue Cloud, Sun Cloud, Google Cloud Platform, Rackspace’s Managed

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

162 PART 2 • Information Technology Concepts

Software as a Service (SaaS): A Cloud, and Windows Azure Services Platform. Public cloud users can realize a
service that allows businesses to sub- considerable cost savings because the very high initial hardware, application,
scribe to Web-delivered application and bandwidth costs are paid for by the service provider and passed along to
software. users as a relatively small monthly fee or per-use fee. Furthermore, companies
can easily scale up or down the amount of services used, depending on user
demand for services. Cloud computing also provides the benefit of being able to
easily collaborate with others by sharing documents on the Internet.

Cloud services are often given popular acronyms such as SaaS (software as a
service), PaaS (platform as a service), IaaS (infrastructure as a service), and HaaS
(hardware as a service). Software as a service (SaaS) allows organizations to
subscribe to Web-delivered application software. In most cases, the company
pays a monthly service charge or a per-use fee. Many business activities are sup-
ported by SaaS. SaaS vendors include Oracle, SAP, NetSuite, Salesforce, and
Google. Each year, The Container Store sells over $200 million worth of storage
and organization products through its 70 retail stores.34 The retail chain has
grown rapidly, and it is committed to maintaining satisfaction for its 4,000
employees—a goal that was becoming more difficult to achieve given the limited
resources of the company’s IT, benefits, and payroll departments. In order to
free up some of those internal resources, The Container Store migrated its pay-
roll and benefit processes to UltiPro HCM, a SaaS provided by Ultimate Software.
The SaaS solution helped the company streamline its payroll and benefits admin-
istration while increasing employee satisfaction by providing them real-time,
online access to up-to-date salary and benefits information.35

Tableau software allows users to import databases or spreadsheet data
to create powerful visualizations that provide useful information. Figure 4.14
shows a Tableau visualization that tracks the unemployment rate across
the country over time. Orange indicates an unemployment rate exceeding the
national average, whereas blue indicates rates below the national average.

FIGURE 4.14 © Tableau Software

Tableau software

Tableau is available in desktop and
cloud versions and helps users
visualize data, such as how the
unemployment rate changes over a
20-year period.

Amazon is considered one of the leading public cloud service providers
because of the variety of services that it provides through its Amazon Web Ser-
vices (AWS) platform. Amazon delivers one of the most reliable public cloud
platforms available, and it is also rapidly adding new services, including tools
for software developers and services to support version control and collabora-
tion.36 Airbnb is an online marketplace that connects travelers and property
owners who are looking to rent out their properties to vacationers. Airbnb sup-
ports its business using cloud-based Web site, storage, and database-hosting

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

CHAPTER 4 • Software and Mobile Applications 163

services from Amazon Web Services. The company chose AWS because it
offered the reliability and flexibility Airbnb requires to continue to grow its
business—at a relatively low cost and with no minimum usage commitments.37

Google’s Chromebook line of personal computers is an example of a
consumer-focused implementation of the SaaS model. Built by Samsung and
Acer, Chromebooks include only an Internet browser—with all software applica-
tions accessed through an Internet connection. Rather than installing, storing,
and running software on the Chromebook, users access software that is stored
on and delivered from a Web server. Typically the data generated by the software
is also stored on the Web server.

While SaaS and cloud computing offer many benefits, these software
delivery models also involve some risks. For example, sensitive information
could be compromised by unauthorized access by employees or computer
hackers. In addition, the company providing the hosting services might not
keep its computers and network up and running as consistently as necessary,
or a disaster could disable the host’s data center, temporarily putting an orga-
nization out of business. Some companies also find it is difficult to integrate
the SaaS approach with some of its existing software.

Personal Application Software

Hundreds of thousands personal software applications are available to meet
the needs of individuals at school, home, and work—with new applications
released on a daily basis. New computer software under development,
along with existing GPS technology, for example, will enable people to see
3D views of where they are, along with directions and 3D maps to where
they would like to go. The features of some popular types of personal
application software are summarized in Table 4.8. In addition to these
general-purpose programs, thousands of other personal computer applica-
tions perform specialized tasks that help users prepare their taxes, get in
shape, lose weight, get medical advice, write wills and other legal docu-
ments, repair their computers, fix their cars, write music, and edit pictures
and videos. This type of software, often called user software or personal
productivity software, includes the general-purpose tools and programs
that support individual needs.

The following sections discuss some of the most popular types of personal
application software currently available.

Word Processing
Word-processing applications are installed on most PCs today. These applica-
tions come with a vast array of features, including those for checking spelling,
creating tables, inserting formulas, and creating graphics. See Figure 4.15.
Much of the work required to create this book involved the use of the popular
word-processing software, Microsoft Word.

A team of people can use a word-processing program to collaborate on a
project. The authors and editors who developed this book, for example, used
the Track Changes and Review features of Microsoft Word to track and make
changes to chapter files. With these features, you can add comments or make
revisions to a document that a coworker can review and either accept or
reject. Some cloud-based word-processing applications, such as Google Docs,
allow multiple authors to collaborate in real time.

Spreadsheet Analysis
Many individuals and organizations use spreadsheet applications that offer
powerful tools for manipulating and analyzing numbers and alphanumeric
data. Common spreadsheet features include statistical analysis tools,
built-in formulas, chart- and graphics-creation tools, and limited database

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

164 PART 2 • Information Technology Concepts

T A B L E 4.8 Examples of personal application software

Type of Software Use Example
Word processing Create, edit, and print text documents
Apache OpenOffice
Spreadsheet Perform statistical, financial, logical, database, graphics, Writer
and date and time calculations using a wide range of built-
Database in functions Apple Pages
Graphics Corel Write
Store, manipulate, and retrieve data Google Docs
Microsoft Word
Develop graphs, illustrations, drawings, and presentations WordPerfect

Personal information Helps people, groups, and organizations store useful Apache OpenOffice Calc
management information, such as a list of tasks to complete or a set of Apple Numbers
names and addresses Google Sheets
Project management IBM Lotus 1-2-3
Plan, schedule, allocate, and control people and resources Microsoft Excel
Financial management (money, time, and technology) needed to complete a proj-
ect according to schedule Apache OpenOffice Base
Microsoft Access
Track income and expenses and create reports to create IBM Lotus Approach
and monitor budgets (some programs also have investment
portfolio management features) Adobe FreeHand
Adobe Illustrator
Desktop publishing (DTP) Use with personal computers and high-resolution printers Apache OpenOffice
to create high-quality printed output, including text and
graphics; various styles of pages can be laid out; art and Impress
text files from other programs can also be integrated into Microsoft PowerPoint
published pages
Google Calendar
Microsoft Calendar
Microsoft Outlook
One Note

Microsoft Project
Scitor Project Scheduler

GnuCash
Intuit Mint
Intuit Quicken
Moneydance
You Need a Budget

(YNAB)

Adobe InDesign
Apple Pages
Corel Ventura Publisher
Microsoft Publisher
QuarkXpress

capabilities. See Figure 4.16. Business functions include those that calculate
depreciation, present value, internal rate of return, and the monthly pay-
ment on a loan. Optimization is another powerful feature of many spread-
sheet programs that allows the spreadsheet to maximize or minimize a
quantity subject to certain constraints. For example, a small furniture manu-
facturer that produces chairs and tables might want to maximize its profits.
The constraints could be a limited supply of lumber, a limited number of
workers who can assemble the chairs and tables, or a limited amount of
available hardware fasteners. Using an optimization feature, such as Solver
in Microsoft Excel, the spreadsheet can determine the number of chairs and
tables that should be produced—given the labor and material constraints—
to maximize profits.

While the built-in formulas available in many spreadsheet applications
are powerful tools, they are not foolproof, as can be seen in the example of
Carmen Reinhart and Kenneth Rogoff’s famous 2010 study “Growth in a

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

CHAPTER 4 • Software and Mobile Applications 165 Used with permission from Microsoft Corporation

FIGURE 4.15 Used with permission from Microsoft Corporation

Word-processing program

Word-processing applications, such
as Microsoft Word, can be used to
write letters, professional docu-
ments, work reports, and term
papers.

FIGURE 4.16

Spreadsheet program

Consider using a spreadsheet pro-
gram, such as Microsoft Excel, when
calculations are required.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

166 PART 2 • Information Technology Concepts Microsoft product screenshot used with permission from Microsoft Corporation

Time of Debt,” which concluded that a country’s economic growth is
reduced when its public debt level reaches 90 percent of GDP. In recent
years, this finding has been used as a justification to push countries to
reduce their deficits. However, a more recent study by Thomas Herndon,
Michael Ash, and Robert Pollin uncovered that the original study has three
major flaws. First, it excluded three occurrences of high-debt, high-growth
nations. Second, it made some questionable assumptions about weighting
different historical episodes. Third, it had an error in Excel spreadsheet for-
mulas that excluded Belgium from their analysis. Correcting for these prob-
lem leads to an entirely different conclusion—“The average real GDP
growth rate for countries carrying a public debt-to-GDP ratio of over 90 per-
cent is actually 2.2 percent, not −0.1 percent as published in Reinhart and
Rogoff.”38

Database Applications
Database applications are ideal for storing, organizing, and retrieving data.
These applications are particularly useful when you need to manipulate a large
amount of data and produce reports and documents. Database manipulations
include merging, editing, and sorting data, and database applications can be
used in a variety of ways. You could use a database application to keep track
of a CD collection, the items in your apartment, tax records, and expenses. A
student club could use a database to store names, addresses, phone numbers,
and dues paid. In business, a database application could be used to help pro-
cess sales orders, control inventory, order new supplies, send letters to custo-
mers, and pay employees. Database management systems can be used to track
orders, products, and customers; analyze weather data to make forecasts; and
summarize medical research results. A database can also be a front end to
another application. For example, you can use a database application to enter
and store income tax information and then export the stored results to other
applications, such as a spreadsheet or tax-preparation application.

Presentation Graphics Program
It is often said that a picture is worth a thousand words. With today’s available
graphics programs, it is easy to develop attractive graphs, illustrations, and
drawings that help communicate important information. See Figure 4.17. The

FIGURE 4.17

Presentation graphics
program

Presentation graphics programs,
such as Microsoft PowerPoint, can
help you make a presentation for
school or work.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

CHAPTER 4 • Software and Mobile Applications 167 Evernote

category of presentation graphics applications includes programs that can be
used to perform a variety of tasks, including creating advertising brochures,
event announcements, and full-color presentations; some presentation graphics
programs can also be used to organize and edit photographic images. And if
you need to make a presentation at school or work, you can use a special type
of graphics program called a presentation application—–such as Microsoft
PowerPoint—to develop slides and then display them while you are speaking.
Because of their popularity, many colleges and departments require students to
become proficient at using presentation graphics programs.

Many graphics and presentation programs, including Microsoft PowerPoint,
consist of a series of slides. Each slide can be displayed on a computer screen,
printed as a handout, or (more commonly) projected onto a large viewing screen
for audiences. In PowerPoint, you can select a template designed for a specific
type of presentation, such as recommending a strategy for managers, communicat-
ing news to a salesforce, giving a training presentation, or facilitating a brainstorm-
ing session. PowerPoint includes powerful built-in features that let you create a
presentation step-by-step, including applying color and attractive formatting. You
can also design a custom presentation using the many types of charts, drawings,
and formatting available. Most presentation graphics programs also provide access
to online clip art, such as drawings and photos of people meeting, medical equip-
ment, telecommunications equipment, entertainment, and much more.

Personal Information Managers
Personal information management (PIM) software helps people, groups, and
organizations store useful information, such as a list of tasks to complete or a
set of names and addresses. PIM software usually provides an appointment
calendar, an address book or contacts list, and a place to take notes. In addi-
tion, information in a PIM can typically be linked. For example, you can link
an appointment with a sales manager in the calendar to information on the
sales manager in the address book. When you click the appointment in the
calendar, a window opens displaying information on the sales manager from
the address book. Microsoft Outlook is an example of very popular PIM soft-
ware. Increasingly, PIM software is moving online, where it can be accessed
from any Internet-connected device. See Figure 4.18.

FIGURE 4.18

Personal information
management software

Evernote lets you take notes, sync
files across devices, save Web
pages, and share your ideas with
friends and colleagues. It runs on
computers and on smartphones.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

168 PART 2 • Information Technology Concepts

software suite: A collection of pro- Some PIMs allow you to schedule and coordinate group meetings. If a
grams packaged together and sold in a computer or handheld device is connected to a network, you can upload the
bundle. PIM data and coordinate it with the calendar and schedule of others who are
using the same PIM software on the network. You can also use some PIMs to
coordinate emails inviting others to meetings. As users receive their invita-
tions, they click a link or button to be automatically added to the guest list.

Software Suites and Integrated Software Packages

A software suite is a collection of programs packaged together and sold in
a bundle. A software suite might include a word processor, a spreadsheet pro-
gram, a database management system, a graphics program, communications
and note-taking tools, and organizers. Some suites support the development
of Web pages, and some offer a speech-recognition feature—so that applica-
tions in the suite can accept voice commands and record dictation. Software
suites offer many advantages. The software programs within a suite have
been designed to work similarly so that after you learn the basics for one
application, the other applications are easy to learn and use. Buying software
in a bundled suite is cost effective; the programs usually sell for a fraction of
what they would cost individually.

Table 4.9 lists several popular general-purpose software suites for per-
sonal computer users. Microsoft Office has the largest market share. Most of
these software suites include a spreadsheet program, a word processor, a
database program, and graphics presentation software. All can exchange
documents, data, and diagrams. In other words, you can create a spreadsheet
and then cut and paste that spreadsheet into a document created using the
word-processing application.

T A B L E 4.9 Major components of leading software suites

Personal Microsoft Corel Apache Apple iWork Google Apps
Productivity Office WordPerfect OpenOffice
Function Word Office Pages Docs
Excel Writer Numbers Spreadsheet
Word processing PowerPoint WordPerfect Calc Keynote Presentation
Quattro Pro Impress and
Spreadsheet Access Presentations Draw
Base
Presentation
graphics

Database

Some companies offer Web-based productivity software suites that do not
require the installation of any software on your device—only a Web browser.
Google, Thinkfree, and Zoho offer free online word processors, spreadsheet
programs, presentation applications, and other software that can be accessed
via the Internet.

After observing this trend, Microsoft responded with an online version of
its popular Office applications. Microsoft Office 365 is available in a range of
configurations designed for home or office use, for a monthly subscription fee.
See Figure 4.19. Depending on the plan purchased, subscribers can access
Microsoft Office applications such as Word, Outlook, Excel, Exchange for mes-
saging, SharePoint for collaboration, and Skype for Business for conferencing.
These cloud-based applications cost on the order of $10 per user per month
depending on the features used. Microsoft offers plans for individuals, small
businesses, enterprises, and education institutions. For example, any institution
worldwide that licenses Office 365 ProPlus or Office Professional Plus for staff
and faculty can provide access to Office 365 ProPlus for students at no

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

CHAPTER 4 • Software and Mobile Applications 169 Microsoft screenshot used with permission from Microsoft Corporation

FIGURE 4.19

Web-based application suite

Microsoft Office 365 is a Web-based
application suite that offers basic
software suite features over the
Internet using cloud computing.

additional cost. The online versions of Word, Excel, PowerPoint, and OneNote
are tightly integrated with Microsoft’s desktop Office suite for easy sharing of
documents among computers and collaborators.

The H.J. Heinz Company, now part of Kraft Heinz Company, sells baby
food, frozen entrees, ketchup, mustard, sauces, and other products in more
than 200 countries. The firm wanted to help employees spend less time travel-
ing and make it easier for them to share best practices, solve business pro-
blems, and come up with new ideas, regardless of their geographical
locations. This led Heinz to adopt Microsoft Office 365 for its more than
20,000 employees who will use Exchange Online for email and calendaring,
Sync for Business for conferencing and instant messaging, and Yammer (an
enterprise social network) to share ideas and collaborate on projects. Heinz is
also making the Office desktop suite available to its employees through Office
365 ProPlus.39

Other Personal Application Software
In addition to the software already discussed, many other interesting and
powerful application software tools are available for personal and business
use. In some cases, the features and capabilities of these applications more
than justify the cost of an entire computer system. TurboTax, for example, is
a popular tax-preparation program that annually saves millions of people
many hours and even dollars in preparing their taxes. With just a quick online
search, you can find software for creating Web sites, composing music, and
editing photos and videos. Many people use educational and reference soft-
ware and software for entertainment, games, and leisure activities. Game-
playing software is popular and can be very profitable for companies that
develop games and various game accessories, including virtual avatars such
as colorful animals, fish, and people. Some organizations have launched pro-
grams designed to promote physical activity by incorporating the use of active
video games (e.g., Wii Boxing and DanceDance Revolution) into broader
physical education programs. Retirement communities also use video games
to keep seniors physically active.40 Engineers, architects, and designers often
use computer-assisted design (CAD) software to design and develop build-
ings, electrical systems, plumbing systems, and more. Autosketch, CorelCAD,

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

170 PART 2 • Information Technology Concepts

and AutoCad are examples of CAD software. Other programs perform a wide
array of statistical tests. Colleges and universities often have a number of
courses in statistics that use this type of application software. Two popular
statistical analytics applications in the social sciences are SPSS and SAS.

Mobile Application Software

The number of applications (apps) for smartphones and other mobile devices
has exploded in recent years. Besides the proprietary apps that come with
these devices, hundreds of thousands of mobile apps have been developed
by third parties. As of July 2015, Apple’s App Store had over 1.5 million apps
available for iOS device users, and Android users could choose from over
1.6 million mobile apps on Google’s Play Store.41 Microsoft and other soft-
ware companies are also investing in mobile applications for devices that run
on their software. For example, SceneTap, an application for iPhones and
Android devices, can determine the number of people at participating bars,
pubs, or similar establishments and the ratio of males to females. The applica-
tion uses video cameras and facial-recognition software to identify males and
females. SocialCamera, an application for Android phones, allows people to
take a picture of someone and then search their Facebook friends for a
match. However, many people consider facial-recognition software a potential
invasion to privacy.

Table 4.10 lists a few mobile application categories. Many apps are free,
whereas others range in price from 99 cents to hundreds of dollars.

T A B L E 4.10 Categories of mobile applications

Category Description
Books and reference
Access e-books, subscribe to journals, or look up information on the Merriam-Webster or
Business and finance Wikipedia Web sites
Entertainment
Track expenses, trade stocks, and access corporate information systems
Games
Access all forms of entertainment, including movies, television programs, music videos, and
Health and fitness information about local night life

Lifestyle Play a variety of games, from 2D games such as Pacman and Tetris to 3D games such as Need
Music for Speed, Call of Duty, and Minecraft
News and weather
Track workout and fitness progress, calculate calories, and even monitor your speed and
Photography progress from your wirelessly connected Nike shoes
Productivity and
utilities Find good restaurants, make a dinner reservation, select wine for a meal, and more
Social networking
Sports Find, listen to, and create music
Travel and navigation
Access major news and weather providers, including Reuters, AP, the New York Times, and
the Weather Channel
Organize, edit, view, and share photos taken on your phone’s camera
Create grocery lists, practice PowerPoint presentations, work on spreadsheets, synchronize
with PC files, and more

Connect with others via major social networks, including Facebook, Twitter, and Instagram

Keep up with your favorite team or track your own golf scores

Use the GPS in your smartphone to get turn-by-turn directions, find interesting places to visit,
access travel itineraries, and more

workgroup application Workgroup Application Software
software: Software that supports
teamwork, whether team members are Workgroup application software is designed to support teamwork, whether
in the same location or dispersed team members are in the same location or dispersed around the world. This
around the world. support can be accomplished with software known as groupware, which

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

CHAPTER 4 • Software and Mobile Applications 171 Courtesy of IBM Corporation

helps groups of people work together effectively. Microsoft Exchange Server,
for example, has groupware and email features. Also called collaborative soft-
ware, workgroup software allows a team to work together remotely, sharing
ideas and work via connected computer systems.

Examples of workgroup software include group-scheduling software,
electronic mail, and other software that enables people to share ideas. IBM
Notes and Domino are examples of workgroup software from IBM. See
Figure 4.20. (Notes runs on the end user’s computing device, while Domino
runs on a server and supports the end user.) Web-based software is ideal for
group use. Because documents are stored on an Internet server, anyone with
an Internet connection can access them easily. Google provides workgroup
options in its online applications, which allow users to share documents,
spreadsheets, presentations, calendars, and notes with other specified users
or everyone on the Web. This sharing makes it convenient for several people
to contribute to a document without concern for software compatibility or
storage. Google also provides a tool for creating Web-based forms and sur-
veys. When invited parties fill out the form, the data is stored in a Google
spreadsheet.

FIGURE 4.20

IBM Notes Social Edition

IBM Notes Social Edition is a work-
group software.

Clark Realty Capital (CRC) is a national real estate firm with nine
offices across the United States. Its agents are constantly on the move, and
in the past, they had difficulty staying connected to the latest version of
important documents. This created problems because the firm’s agents are
constantly working to close deals on tight deadlines, which requires the ability
to frequently and quickly update documents related to a transaction. The firm
began sharing files via Google Drive to provide employees real-time access to
the current version of each document, thus eliminating the need for email
attachments and managing multiple versions of a file. Employees use Google
Apps to create, access, and update these documents.42

Enterprise Application Software

Software that benefits an entire organization—enterprise application
software—can be developed specifically for the business or purchased off the

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

172 PART 2 • Information Technology Concepts

shelf. There are many categories of enterprise software, including the
following:

Accounts payable Invoicing
Accounts receivable Manufacturing control
Airline industry operations Order entry
Automatic teller systems Payroll
Cash-flow analysis Receiving
Check processing Restaurant management
Credit and charge card administration Retail operations
Distribution control Sales ordering
Fixed asset accounting Savings and time deposits
General ledger Shipping
Human resource management Stock and bond management
Inventory control Tax planning and preparation

The total cost, ease of installation, ease of management, and the ability to

integrate the software with other enterprise applications are the major consid-

erations of organizations when selecting enterprise software. The ability to
extend enterprise applications so that they can run on smartphones and other

mobile devices is increasingly becoming a priority for many organizations.

Advantage Sign & Graphic Solutions, based in Grand Rapids, Michigan,
sells equipment and supplies to businesses in the sign and graphics industry.

The company operates 10 regional facilities that allow it to provide next-day
delivery of most supplies to customers around the country.43 In order to
improve its profitability and attract more customers, the company implemen-

ted several NetSuite enterprise applications, including NetSuite ERP, CRM+,

E-commerce, and Advanced Shipping. With the NetSuite software, Advantage
was able to launch a new e-commerce site, reduce order-processing time by

65 percent, and decrease its on-hand inventory by 15 percent. Implementing
an integrated set of enterprise applications simplified the company’s opera-
tions and helped it better connect with customers.44

Enterprise software also helps managers and workers stay connected. At

one time, managers and workers relied on email to stay in touch with each
other, but business collaboration and enterprise social networking tools—
such as Asana, blueKiwi, Yammer, and Jive—are replacing traditional email
and text messaging.

Worldwide spending on enterprise software was estimated to be about
$310 billion in 2015.45 Most software spending goes to application software,
as shown in Figure 4.21.46

7% 43% Application
26% Custom built
Middleware
24% Operating systems

FIGURE 4.21

Spending by type of software

Of all software types, businesses
spend the most on application
software.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

CHAPTER 4 • Software and Mobile Applications 173

Application Software for Transaction Processing, Business
Analytics, and Competitive Advantage

Specialized application software for learning enhancement and manage-
ment, business analytics, information, decision support, and competitive
advantage is available in every industry. For example, many schools and
colleges use Blackboard or other learning management software to organize
class materials and grades. Genetic researchers, as another example,
are using software to visualize and analyze the human genome. Music
executives use business analytics software to help them pick the next hit
song.

Pima County Regional Wastewater Reclamation Department (RWRD) man-
ages and maintains the Arizona county’s sanitary sewer system, which serves
1 million people and treats 60 million gallons of wastewater each day.47 The
department recently implemented Wonderware’s IntelaTrac mobile workforce
and decision support software. The software, which is integrated with the
automated SCADA (supervisory control and data acquisition) system that
runs the sewer system, provides plant personnel with a range of reporting
and analytics tools that have helped them to improve efficiency and reduce
costs in RWRD’s two wastewater treatment plants and seven regional sub-
facilities. RWRD has been able to reduce energy consumption by 10 percent
and double its plant capacity, while operating with the same number of
people.48

But how are all these systems actually developed and built? The answer
is through the use of programming languages, some of which are discussed
in the next section.

programming languages: Sets of Programming Languages
keywords, commands, symbols, and
rules for constructing statements by Both system and application software are written in coding schemes called
which humans can communicate programming languages. The primary function of a programming language
instructions to a computer. is to provide instructions to the computer system so that it can perform a
processing activity. Information systems professionals work with different
syntax: A set of rules associated with programming languages, which are sets of keywords, commands, symbols,
a programming language. and rules for constructing statements that people can use to communicate
instructions to a computer. Programming involves translating what a user
wants to accomplish into a code that the computer can understand and exe-
cute. Program code is the set of instructions that signal the CPU to perform
circuit-switching operations. In the simplest coding schemes, a line of code
typically contains a single instruction such as, “Retrieve the data in memory
address X.” The instruction is then decoded during the instruction phase of
the machine cycle.

Like writing a report or a paper in English, writing a computer program
in a programming language requires the programmer to follow a set of
rules. Each programming language uses symbols, keywords, and commands
that have special meanings and usage. Each language also has its own set of
rules, called the syntax of the language. The language syntax dictates how
the symbols, keywords, and commands should be combined into statements
capable of conveying meaningful instructions to the CPU. Rules such as
“statements must terminate with a semicolon,” and “variable names must
begin with a letter,” are examples of a language’s syntax. A variable is a
quantity that can take on different values. Program variable names such as
SALES, PAYRATE, and TOTAL follow the sample rule shown above because
they start with a letter, whereas variables such as %INTEREST, $TOTAL, and
#POUNDS do not.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

174 PART 2 • Information Technology Concepts

compiler: A special software pro- With higher-level programming languages, each statement in the lan-
gram that converts the programmer’s guage translates into several instructions in machine language. A special soft-
source code into the machine-language ware program called a compiler translates the programmer’s source code
instructions, which consist of binary into the machine-language instructions, which consist of binary digits, as
digits. shown in Figure 4.22. A compiler creates a two-stage process for program
execution. First, the compiler translates the program into a machine language;
second, the CPU executes that program. Another programming approach is to
use an interpreter, which is a language translator that carries out the opera-
tions called for by the source code. An interpreter does not produce a com-
plete machine-language program. After the statement executes, the machine-
language statement is discarded, the process continues for the next statement,
and so on.

Stage 1: Convert program

Computer Compiler Machine-
program language
program

Stage 2: Execute program

FIGURE 4.22 Machine-
language
How a compiler works program

A compiler translates a complete Program execution
program into a complete set of
binary instructions (Stage 1). After
this is done, the CPU can execute
the converted program in its entirety
(Stage 2).

The majority of software used today is created using an integrated
development environment. An integrated development environment (IDE)
combines all the tools required for software engineering into one package.
For example, the popular IDE Microsoft Visual Studio includes an editor
that supports several visual programming interfaces and languages (visual
programming uses a graphical or “visual” interface combined with text-
based commands), a compiler and an interpreter, programming automation
tools, a debugger (a tool for finding errors in the code), and other tools
that provide convenience to the developer.

Software development kits (SDKs) often serve the purpose of an IDE for a
particular platform. For example, software developers for Google’s Android
smartphone platform use the Java programming language along with the
Android Studio with built-in Android Developer Tools to streamline their
Android app development. They can also use special code libraries provided
by Google for Android functionality, and they test out their applications in an
Android Emulator.49 See Figure 4.23.

IDEs and SDKs have made software development easier than ever. Many
novice coders, including some who might have never considered developing
software, are publishing applications for popular platforms such as Facebook
and the iPhone.

Table 4.11 lists some of the most commonly used programming languages.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

CHAPTER 4 • Software and Mobile Applications 175

FIGURE 4.23 Courtesy of Google

Emulator for Android
smartphones

To develop for the Android, you use
an SDK with a mobile device emu-
lator so you can prototype, develop,
and test Android applications with-
out having to transfer them to a
physical device.

T A B L E 4.11 Commonly used programming languages for new software development

Language Description

COBOL An English language-like programming language designed for business use, COBOL has been in use
since 1959. Billions of lines of COBOL code are still in use in systems around the world, including
credit card systems, ATMs, retail/POS systems, banking and payroll systems, healthcare systems,
government systems, reservation systems, and traffic signal systems. Due to its declining popularity
and the retirement of experienced COBOL programmers, COBOL programs are gradually being
migrated to new platforms, rewritten in modern languages, or replaced with software packages.

C Developed in the early 1970s, C is the base for other popular languages, such as C#, Java, JavaScript,
and Python. C is mostly used for implementing operating systems and embedded applications.
Because it provides the foundation for many other languages, it is advisable to learn C (and C++)
before moving onto other languages.

C ++ Originally designed to enhance the C language, C++ is used to develop systems software, application
software, high-performance server and client applications, and video games.

Java Java is a programming language developed by Sun Microsystems in the 1990s, and it is still widely
used in the development of enterprise software, Web-based content, and games. Java is also used for
mobile apps that run on the Android operating system.

JavaScript A scripting language developed by Netscape, JavaScript derives much of its syntax from C. JavaScript
can be used across multiple Web browsers and is considered essential for developing interactive or
animated Web functions. It is also used in game development and for writing desktop applications.

PHP (Hypertext A popular programming language for Web developers, PHP is used to create dynamic Web sites and to
Preprocessor) develop apps. PHP is used in more than 200 million Web sites, including WordPress, Digg, and Facebook.

Python Python is another scripting language used to develop Web sites and mobile apps. Python is consid-
ered a fairly easy language for beginners to learn due to its readability and compact syntax, and it is
used in Web apps for Google, Instagram, NASA, Pinterest, and Yahoo!

Ruby Ruby is a scripting language designed to be simple and easy to use for developing Web sites and
mobile apps. It powers the Ruby on Rails (or Rails) framework, which is used on Scribd, GitHub,
Groupon, and Shopify.

SQL A language for accessing data in relational database management systems, SQL is most commonly
used for its “Query” function, which searches relational databases. SQL was standardized in the
1980s by the American National Standards Institute (ANSI) and the International Organization for
Standardization (ISO).

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

176 PART 2 • Information Technology Concepts

Critical Walmart’s VMI System
Thinking
Exercise Walmart employs a special kind of enterprise system called an interorganizational
information system it calls vendor-managed inventory (VMI) to improve product
flow and lower its store inventories. Under this program, suppliers are responsi-
ble for managing the inventory of their products in Walmart’s warehouses. Suppli-
ers are granted access to a Walmart database that contains item-level sales and
inventory data for their products only, which help the vendors develop product
demand projections using a collaborative planning, forecasting, replenishment
process. Each link in the supply chain is interconnected using information tech-
nology that includes a central database, store-level-point-of-sale systems, and a
satellite network for fast and reliable communications.

Review Questions

1. Do you think that the VMI software is off-the-shelf or proprietary software? Why?
2. Should Walmart allow the suppliers to take a major role in defining and cus-

tomizing the features and capabilities of this system or should they insist on a
“one size fits all” approach?

Critical Thinking Questions

1. What special issues and considerations are likely to arise in the operation and
support of an interorganizational system?

2. Given the business criticality of this system, would it make sense for Walmart
to consider moving this system into a public cloud environment? What would
be the advantages and disadvantage of such a move?

Software Issues and Trends

Because software is such an important part of today’s computer systems, issues
such as software bugs, copyrights and licensing, freeware and open-source soft-
ware, upgrades, and global software support are receiving increased attention.
These topics are covered in the following sections.

Software Bugs

A software bug is a defect in a computer program that keeps it from performing as
its users expect it to perform. While some bugs are subtle—allowing errors to creep
into your work undetected—other bugs are very obvious, causing programs to ter-
minate unexpectedly. For example, not all goes smoothly when users upgrade to a
new operating system. Applications that used to run without a problem under the
old operating system may begin to experience difficulty. Users of Microsoft’s Office
for MAC 2016 who upgraded to Apple’s El Capitan OS initially experienced applica-
tion crashes for Outlook, Excel, PowerPoint, and Word. Although the bugs were
eventually fixed, many users spent weeks dealing with the crashes.50

Most computer and software vendors say that as long as people design
and program hardware and software, bugs are inevitable. The following list
summarizes tips for reducing the impact of software bugs:

● Register all software so that you receive bug alerts, fixes, and patches.
● Check the manual or read-me files for solutions to known problems.
● Access the support area of the manufacturer’s Web site for patches.
● Install the latest software updates.
● Before reporting a bug, make sure that you can recreate the circum-

stances under which it occurs.
● After you can recreate the bug, call the manufacturer’s tech support line.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

single-user license: A software CHAPTER 4 • Software and Mobile Applications 177
license that permits you to install the
software on one or more computers, ● Consider waiting before buying the latest release of software to give the ven-
used by one person. dor a chance to discover and remove bugs. Many schools and businesses
don’t purchase software until the first major revision with patches is released.

Copyrights and Licenses

Most companies aggressively guard and protect the source code of their soft-
ware from competitors as well as customers. As a result, most software pro-
ducts are protected by law using copyright or licensing provisions. Those
provisions can vary, however. In some cases, users are given unlimited use
of software on one or two computers. This stipulation is typical for applica-
tions developed for personal computers. In other cases, users pay based on
usage: If you use the software more, you pay more. This approach is becom-
ing popular, with software placed on networks or larger computers. Most of
these protections prevent you from copying software and giving it to others.
Some software now requires that you register or activate it before it can
be fully used. This requirement is another way software companies prevent
illegal distribution of their products.

In a recent survey of 50 companies with more than 10,000 employees,
10 percent of the respondents indicated that their firm had been fined,
assessed additional fees, or required to purchase backdated maintenance as a
result of license compliance issues uncovered in a software audit. The costs
ranged from less than $100,000 to more than $1 million.51

When people purchase software, they don’t actually own the software, but
rather they are licensed to use the software on a computer. This is called a
single-user license. A single-user license permits you to install the software
on one or more computers, used by one person. A single-user license does not
allow you to copy and share the software with others. Table 4.12 describes dif-
ferent types of software licenses.52 Licenses that accommodate multiple users
are usually provided at a discounted price.

Freeware and Open-Source Software

Some software developers are not concerned about profiting from their
intellectual property, which has given rise to alternative copyrights and
licensing agreements. Freeware is software that is made available to the
public for free. Software developers might give away their product for
several reasons. Some want to build customer interest and name recogni-
tion. Others simply don’t need the money and want to make a valuable
donation to society. Still others, such as those associated with the Free Soft-
ware Foundation (www.fsf.org), believe that all software should be free.
Freeware is placed in the public domain where anyone can use the software
free of charge. (All creative works that reach the end of their term of copy-
right revert to the public domain.) Table 4.13 shows some examples of
freeware.

Freeware differs slightly from free software. Freeware simply implies that
the software is distributed for free. The term “free software” was coined by
Richard Stallman and the Free Software Foundation, and it implies that the
software is not only freeware, but also open source. Open-source software is
distributed, typically for free, with the source code also available so that it
can be studied, changed, and improved by its users. Over time, open-source
software evolves in response to the combined contributions of its users. The
Code For America (CFA) organization, for example, used open-source soft-
ware to develop a map-based app for the city of Boston that allows indivi-
duals, small businesses, and community organizations to volunteer to shovel
out specific hydrants that might be completely covered with snow in the win-
ter. After creating the app for Boston, CFA made its efforts available for free

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203


Click to View FlipBook Version