{"id":32855,"date":"2022-08-21T13:30:19","date_gmt":"2022-08-21T13:30:19","guid":{"rendered":"https:\/\/nursingstudybay.com\/?p=32855"},"modified":"2022-08-21T13:30:21","modified_gmt":"2022-08-21T13:30:21","slug":"software-review","status":"publish","type":"post","link":"https:\/\/www.essaybishops.com\/essays\/software-review\/","title":{"rendered":"Software Review"},"content":{"rendered":"<p>Computer Sciences and Information Technology Software Review<br \/>\nInstructions:<\/p>\n<p>Describe five separate software and submit the following information:<\/p>\n<p>Submission Instructions:<br \/>\nSoftware Name:<br \/>\nCategory (System, Utility, or Application)<br \/>\nPurpose: Describe what features the software provides, and why you would use or currently use the software. (Not all users take advantages of all software features.)<br \/>\nOpinion: Your opinion of the software.<br \/>\nYou may use any word format to document your assignment, i.e., text or tables.<\/p>\n<p>Please note: An application software improves users&#8217; productivity and supports the tasks. Utility software (also known as service program, service routine, tool, or utility routine) is a type of computer software; it is specifically designed to help manage and tune the computer hardware. The operating system, also known as system software, manages the computer\u2014I like to call it the &#8220;BOSS&#8221; of the computer system. I hope this explanation offers further level of distinctions among software programs.<br \/>\nCategory: Utility software<br \/>\nPurpose: Dia is a general purpose diagraming software. The app is open sourced and compatible with the Linux and Windows operating system. The app has immense features that place it in direct competition with Microsoft visio suite. It has an incredible and dynamic list of shapes that adequately complement its role as a cheaper option for network infrastructural design. Being primarily used for architecture and network design the software employs simple and unique functions that get the job delivered allowing easy creation of flow charts and network diagrams. It uses a controlled single document interface which allows one to easily grasp how to manage navigating around it.<br \/>\nOpinion: The software has been cheaper than its competitor gets a lot of credit and increasingly is becoming the alternative for network and database management. On the other hand, there are a variety of few elaborate function that the software lacks, the software has been not updated since 2009 with a very old user interface making some basic functions really hard to navigate through.<br \/>\nName: GIMP<br \/>\nCategory: Utility<br \/>\nPurpose: This is a photo editing tool which is open sourced and a direct competitor of Photoshop apps such as Adobe Lightroom editing tools. Gimp employs great pixel level editing that incorporates a variety of functions and remains easy to employ.<br \/>\nOpinion: It is incredibly important and easy to use for small local level editing day to day social media and work photos.<br \/>\nName: Avast antivirus software<br \/>\nCategory: Application software<br \/>\nPurpose: This is an elaborate software that started out as an antivirus software protecting the computer against malware and other threats but has evolved to become a more complex all inclusive application software. It has chrome browser plug-ins that also protect online browsing and download activity, it reviews computer productivity, identifies junk materials and suggests ways to maximize on storage and RAM use in order to bring up productivity.<br \/>\nOpinion: It is a great protector but they are incredibly heavy when it comes to scanning and do little to protect against hackers, the additionally find it hard to detect or control large or multiple malwares and will just detect and inform the user.<br \/>\nName: Windows Firewall<br \/>\nCategory: System<br \/>\nPurpose: Protection of the computer against internet and network based threats. Functions adequately in filtering the information that comes from the internet into your device and highlights of potential harmful interaction. It also blocks programs from establishing communication without user authorization.<br \/>\nOpinion: Adequate and is pre-installed into the system, adequately preventing most risky communication with a warning.<br \/>\nName: Light key<br \/>\nCategory: Application<br \/>\nPurpose: Works to improve user productivity by including the auto complete tool within the Microsoft word app. It has auto-correction features and immense predictive text feature since it studies and records one\u2019s writing patterns.<br \/>\nOpinion: Improves a person\u2019s productivity by increasing their typing speed and allowing them to get more work done.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Computer Sciences and Information Technology Software Review Instructions: Describe five separate software and submit the following information: Submission Instructions: Software Name: Category (System, Utility, or Application) Purpose: Describe what features\u2026<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1630,2459],"tags":[887,2509],"class_list":["post-32855","post","type-post","status-publish","format-standard","hentry","category-computer-sciences-and-information-technology","category-course-hero","tag-computer-sciences-and-information-technology","tag-software-review"],"_links":{"self":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts\/32855","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/comments?post=32855"}],"version-history":[{"count":1,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts\/32855\/revisions"}],"predecessor-version":[{"id":32859,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts\/32855\/revisions\/32859"}],"wp:attachment":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/media?parent=32855"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/categories?post=32855"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/tags?post=32855"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}