Chapter 1
Chapter 1
1.1.1 Understand
the features and
Digital Device
functions of It is a device that consists of a microprocessor (CPU) controlling its activities.
contemporary digital The microprocessor may be a simple one controlling a single activity to one that control and coordinate complex
devices. activities simultaneously
Features and Digital Device may be a single unit (device) or a unit that allows multiple devices to be attached to it
functions The input, output and storage units are referred to as peripheral devices. These are devices that are
portability externally connected to the processing unit
performance Most Digital device can make decision based on the data received and the program controlling it
storage
user Examples of digital devices include
interface
connectivity
COMPUTERS
media
◦ This is an electronic devices that is mainly used for data processing
support
energy ◦ It consists of input, processing and output devices
consumption ◦ It comes in various sizes with differing processing capabilities
expansion ◦ Increased technology has seen the size of the computer reduce and its processing and storage
capability capabilities increasing.
Security
features. EMBEDDED SYSTEM
◦ This is a microprocessor present in a device designed to specifically control the functions of that
Contemporary digital device.
devices:
◦ Most embedded system will have a special operating system installed in them to manage a specific
computers
activities
embedded
◦ These system can be found in washing machines, modern fridges, Smart TVs, Industrial equipment
systems
◦ They may offer an option of reprogramming or updating of the software to bring it to the present level
peripheral
devices or improve the function of the device
mobile
phones PERIPHERAL DEVICES
Storage ◦ This is any device that can be attached to the processing unit of a device
devices. ◦ Peripheral devices can be subdivided into three: Input, Output, and Storage devices.
◦ Some of the peripheral devices can operate on their own without the need of having to connect them
to a computer. For example a camera.
Chapter 1 1 of 22
capabilities
◦ Smartphones have WI-FI capabilities allowing users to connect to the internet
◦ Added features on a phone/smartphones include
▪ Camera
▪ Video /Audio Player and recorder
▪ Playing games
▪ Calendar
▪ Alarm clock
▪ WI-FI
▪ Bluetooth
▪ touchscreen
◦ There are software that can be installed on smartphones making it possible to type, edit and even
print a document from them e.g. WPS application
◦ Because of addition software and capabilities most smartphones require more power than the normal
mobile phones
◦ Most phones require a SIM(Subscriber Identity Module) card to work
◦ Tablets are bigger than the smartphones
STORAGE DEVICES
◦ Storage devices are used to store information permanently (i.e. until the user deletes the data)
◦ The most widely used storage device was the Hard disk
◦ It consists of circular plates mounted on a central shaft
◦ The disk plates are coated with magnetisable material and rotate where reading or writing the data on
them
◦ Data is written or read using the read write head
◦ Reading does not delete the data while writing deletes the data that was originally there
◦ Due the movement of the disk plates the Hard disk tend to be bigger and consume more power
◦ SSD (solid state storage devices) are taking over from the Hard disk
◦ The SSD lack moving parts and therefore consume less power, they are less bulky and are not
affected by the magnetic field.
◦ Television
◦ Displays both still and moving images
◦ Picture quality is influenced by its resolution
Chapter 1 2 of 22
◦ HD TVs screen have a larger number of pixels and inbuilt speakers
◦ Smart TVs use apps and can download and read content from the internet
◦ Sound system
◦ They produce loud rich sound using high quality speakers and amplifier
◦ They play music from optical media of the flash disk
◦ Can be connected to other digital devices to enhance sound such as computer and TV and
Smartphone
◦ Game console
◦ They are mainly used for playing games on TV screens
◦ They use motion sensors to allow players to control the game with gestures and body movement
◦ Other Smart home devices include: light bulbs, locks, climate control
Navigation Aids
◦ They are used to find routes or help people move from one are with ease
◦ They have replaced the maps
◦ The calculate the best route between two or more location
◦ They provide updates to the routs
◦ They are found in cars, delivery vans and ships
◦ They use information from the GPS satellites
Chapter 1 3 of 22
FEATURES OF DIGITAL DEVICES
Portability
◦ Ability to move around with the devices.
◦ Most digital devices are very small even being able to fit someone’s pockets
◦ Made possible with increase in technology and militarisation of components
Performance
◦ Does it carry out its task faster?
◦ This is influenced by the speed of the processor and the RAM
◦ The faster the processor the better. This is because it can process several data items within a short
time
◦ With increased technology a machine can have more than one processor
◦ Memory is used to store data when the computer is work
◦ It also assists in the transfer of data from the storage unit to the processor.
◦ The bigger the Memory the more data it can carry and therefore it reduces the fetch time and thus
makes the machine faster
◦ A bigger memory also means that you can run more than one program at the same time without
compromising on speed
Storage
◦ Digital devices require an area that they can store the information permanently
◦ Most devices come with inbuilt storage unit
◦ The common storage unit used to be the hard disk but it’s being replaced with the Solid state storage
devices
◦ Transfer speeds of data from solid state devices to the processor are very high and thus mores
computer manufacturers are replacing the hard disks with the SSD.
User interface
◦ Allows the user and the system to have a meaningful interactions
◦ Types
▪ Command line interface
▪ User has to type in command and press Enter to instruct the computer system
▪ User must be aware of all valid command of the system
▪ Voice interface
Chapter 1 4 of 22
▪ Requires a user to speak to the system to instruct it
▪ Requires a microphone attached to the system
▪ Gesture interface
▪ Requires the user to make gestures that are accepted by the system
▪ Mainly used by smart phones
Connectivity
◦ This is the ability of a devices to be linked with another device for the purpose of sharing data or
communication
◦ Can be done using cables or wireless
◦ Smart phones have a variety of ways of connecting to other devices and the internet.
Media support
◦ This is about the types of audio and video supported by a device
◦ There are different formats for both audio and video
◦ For some formats to be played a user must have CODEC for that format
Energy Consumption
◦ All digital devices require energy to work
◦ Devices with moving parts require a lot of energy
◦ Energy consumption will be influenced by the usage, hardware units attached and sometimes the
software being run
Expansion Compatibilities
◦ This is the ability to add extra hardware to the device
◦ Desktop computers have more space and expansion slots that allow extra devices to be easily added
Security features
◦ These are features which are meant to keep the device safe from hackers
◦ Security is of two types
◦ Software security- PIN, password lock, screen saver, biometrics
◦ Physical security – security slots which have locks attached to secure the hardware to furniture
Chapter 1 5 of 22
1.1.2 Understand GPS (Global Positioning system)
the technologies
◦ Global Positioning system was developed for military use by the US army, but later opened up to the
used by digital
civilian
devices:
Global ◦ It is a network of satellites orbiting the earth – around 27 satellite at a time
Positioning ◦ At any time at least 4 satellites are transmitting information and time at regular interval to the earth
System (GPS) ◦ Signals are intercepted by the GPS receiver which may be your smartphone
biometrics ◦ The receiver calculates how far away the satellites are, based on how long it takes for the message to
touchscreen arrive to determine its location
sensor ◦ This information is then fed to a map that is marked with the coordinates and displays the specific
memory location of an individual.
storage ◦ Application: Navigation systems
battery power
miniaturisation https://adventure.howstuffworks.com/outdoor-activities/hiking/compass-or-gps3.htm
processors
radio-frequency RFID (Radio Frequency Identification)
identification
(RFID) ◦ It consists of three parts
near-field Scanning antenna
communication Transceiver with decoder – to interpreted the data
(NFC) Transponder – (RFID tag) – that has been programmed with information
quick response ◦ The scanning antenna puts out radio-frequency signals in a relatively short range. The RF radiation
(QR) code does two things:
connectivity 1. It provides a means of communicating with the transponder (the RFID tag)
2. It provides the RFID tag with the energy to communicate (in the case of passive RFID tags).
◦ This is an absolutely key part of the technology; RFID tags do not need to contain batteries, and can
therefore remain usable for very long periods of time (maybe decades).
◦ The scanning antennas can be permanently affixed to a surface; handheld antennas are also available.
◦ When an RFID tag passes through the field of the scanning antenna, it detects the activation signal
from the antenna.
◦ That "wakes up" the RFID chip, and it transmits the information on its microchip to be picked up by
the scanning antenna.
◦ The RFID tag may be of one of two types.
▪ Active RFID tags have their own power source; the advantage of these tags is that the reader can
be much farther away and still get the signal.
▪ Passive RFID tags - they lack the battery and are dependent on the scanning antenna to provide it
with energy. They can therefore be much smaller and have a virtually unlimited life span.
◦ The tag need not be on the surface of the object (and is therefore not subject to wear)
◦ The read time is typically less than 100 milliseconds
◦ Areas of Application
Chapter 1 6 of 22
▪ Tracking stock
▪ Passport
▪ Automatic car number place recognition
Touch screens
◦ The most common type of input/output devices found on mobile phones
◦ Increased technology has seen touchscreen being present in many devices where individual need to
make selection replacing the keypad/keyboard.
◦ The two most commonly used technology to create a touchscreen systems are resistive and
capacitive
1. Resistive
◦ These are the most basic and common touch screens, the ones used at ATMs and supermarkets that
require an electronic signature with that small grey pen.
◦ These screens literally “resist” your touch; if you press hard enough you can feel the screen bend
slightly. This is what makes resistive screens work – two electrically conductive layers bending to
touch one another
◦ One of those thin yellow layers is resistive and the other is conductive, separated by a gap of tiny dots
called spacers to keep the two layers apart until you touch it. (A thin, scratch-resistant blue layer on
top completes the package.)
◦ An electrical current runs through those yellow layers at all times, but when your finger hits the screen
the two are pressed together and the electrical current changes at the point of contact.
◦ The software recognizes a change in the current at these coordinates and carries out the function that
Chapter 1 7 of 22
corresponds with that spot.
◦ Resistive touch screens are durable and consistent, but they’re harder to read because the multiple
layers reflect more ambient light.
◦ They also can only handle one touch at a time – ruling out, for example, the two-finger zoom on an
phones
2. Capacitive
◦ Capacitive screens work with anything that holds an electrical charge – including human skin.
◦ Capacitive touch screens are constructed from materials like copper or indium tin oxide that store
electrical charges in an electrostatic grid of tiny wires, each smaller than a human hair.
◦ There are two main types of capacitive touch screens – surface and projective.
◦ Surface capacitive uses sensors at the corners and a thin evenly distributed film across the surface (as
pictured above)
◦ Projective capacitive uses a grid of rows and columns with a separate chip for sensing,
◦ In both instances, when a finger hits the screen a tiny electrical charge is transferred to the finger to
complete the circuit, creating a voltage drop on that point of the screen. (This is why capacitive
screens don’t work when you wear gloves; cloth does not conduct electricity, unless it is fitted with
conductive thread.)
◦ The software processes the location of this voltage drop and orders the ensuing action.
Chapter 1 8 of 22
Biometrics
◦ This is the use of human physical characteristics to provide security of a system
◦ It requires scanning the body part and comparing it with the stored data
◦ The part is first scanned several times and analysed and then translated into a code or graph
◦ The next time when a person uses the system, it compares the trait you present to the information on
file.
◦ Then, it either accepts or rejects that you are who you claim to be.
◦ The traits used include
▪ Iris/Retina
▪ Fingerprint
▪ Facial
▪ Veins
◦ Behavioural characters that can be used include:
▪ voice
▪ handwriting
▪ typing rhythm
https://science.howstuffworks.com/biometrics.htm
Sensors
◦ These are input devices that measure physical properties
◦ They take readings of an environmental condition being measured. It may be temperature, presence
of individual, weight of a person or item etc.
◦ The data is then sent to the microprocessor
◦ The data signal is analogue in nature and must be converted to digital for the microprocessor to be
able to understand it.
◦ An Analogue to Digital Converter (ADC) is connected between the sensor and the microprocessor to
do this
◦ Types of sensors include
▪ Motion
▪ Infra-Red
▪ Moisture
▪ Pressure pad
Chapter 1 9 of 22
◦ A pair of NFC transmitters can communicate at a maximum of just a few centimetres.
◦ Some chips are designed so that the only way they send and receive information is if you've touched
the device you're carrying with the one with which you're going to communicate.
◦ In a shop that uses this technology, the system will let you purchase items just by holding your phone
close to a receiver at a cash register.
◦ This eliminates the need for credit cards.
◦ There are already applications that make this method of payment compelling. In 2011, Google
announced Google Wallet and Google Offers, a pair of products that take advantage of NFC
technology. The basic function of Google Wallet is what we just talked about -- replacing your physical
credit card. But it can also store other information like customer loyalty cards and special offers.
Memory
◦ All of the components in a computer, such as the Processor, the hard drive and the operating system,
work together as a team, and memory is one of the most essential parts of this team. From the
moment the computer is turned on until the time it is shut it down, the processor is constantly using
memory.
◦ This is how the process works
◦ The computer loads data from read-only memory (ROM) and performs a power-on self-test (POST) to
make sure all the major components are functioning properly. As part of this test, the memory
controller checks all of the memory addresses with a quick read/write operation to ensure that there
are no errors in the memory chips.
◦ The computer loads the basic input/output system (BIOS) from ROM. The BIOS provides the most
basic information about storage devices, boot sequence, security, Plug and Play (auto device
recognition) capability and a few other items.
◦ The computer loads the operating system (OS) from the hard drive into the system's RAM. Generally,
the critical parts of the operating system are maintained in RAM as long as the computer is on.
◦ When you open an application, it is loaded into RAM. To conserve RAM usage, many applications load
only the essential parts of the program initially and then load other pieces as needed.
◦ After an application is loaded, any files that are opened for use in that application are loaded into RAM.
◦ When you save a file and close the application, the file is written to the specified storage device, and
then it and the application are purged from RAM.
https://computer.howstuffworks.com/computer-memory4.htm
Storage
◦ Hard disks were invented in the 1950s. They started as large disks up to 20 inches in diameter holding
just a few megabytes. They were originally called "fixed disks" or "Winchesters
◦ Hard disks have a hard platter that holds the magnetic medium
◦ Data is stored onto the disk in the form of files. A file is simply a named collection of bytes.
◦ There are two ways to measure the performance of a hard disk:
Chapter 1 10 of 22
◦ Data rate - The data rate is the number of bytes per second that the drive can deliver to the CPU.
Rates between 5 and 40 megabytes per second are common.
◦ Seek time - The seek time is the amount of time between when the CPU requests a file and when the
first byte of the file is sent to the CPU. Times between 10 and 20 milliseconds are common.
◦ The other important parameter is the capacity of the drive, which is the number of bytes it can hold.
Battery power
◦ Digital devices run on electricity.
◦ Laptops and desktops have small batteries to maintain the real-time clock and, in some cases, CMOS
RAM.
◦ A laptop is portable and can run on batteries alone.
◦ Nickel-Cadmium (NiCad) batteries were the first type of battery commonly used in laptop
computers
◦ They have a life of roughly two hours between charges, but this life decreases with each charge based
on the memory effect.
◦ Gas bubbles form in the cell plates, reducing the total amount of available cell space for recharge. The
only way around this is to discharge the battery completely before recharging it.
◦ The other drawback of NiCad is that if the battery charges too long, it can explode.
◦ Nickel-Metal Hydride (NiMH) batteries last longer between charges than NiCad but overall have a
shorter total lifespan.
◦ They suffer from the memory effect, but to a lesser extent than NiCad batteries.
◦ LiIon batteries are the current standard for laptop computers and smartphones.
◦ They are light and have long life spans.
◦ They do not suffer from the memory effect, can be charged randomly, and won't overheat if
overcharged.
◦ They are also thinner than any other battery available for laptops, making them ideal for the new
ultra-thin notebooks.
◦ LiIon batteries can last for anything from about 950 up to 1200 charges.
◦ Even maintaining wireless Internet connectivity requires some battery power. Many laptop computer
models have power management software to extend the battery life or conserve battery power when
the battery is low.
Miniaturisation
◦ Miniaturization is the trend to manufacture ever smaller mechanical, optical and electronic products
and devices. Examples include miniaturization of mobile phones, computers and vehicle engine
downsizing.
◦ Miniaturization became a trend in the last fifty years
◦ Today, electronic companies are producing silicon integrated circuits or chips with switching transistors
that have feature size as small as 130 nanometres (nm)
Chapter 1 11 of 22
◦ Development is also underway for chips that are merely few nanometres in size through the
nanotechnology initiative
◦ The focus is to make components smaller to increase the number that can be integrated into a single
wafer and this required critical innovations, which include increasing wafer size, the development of
sophisticated metal connections between the chip's circuits, and improvement in the polymers used for
masks (photoresists) in the photolithography processes
◦ These last two are the areas where miniaturization has moved into the nanometre range
Processors
◦ The microprocessor is the heart of any normal computer and most digital devices
◦ A microprocessor - also known as a CPU or central processing unit - is a complete computation engine
that is fabricated on a single chip. The first microprocessor was the Intel 4004, introduced in 1971.
The 4004 was not very powerful -- all it could do was add and subtract, and it could only do that 4 bits
at a time. But it was amazing that everything was on one chip
◦ Things that one needs to consider when looking at the Microprocessor are
◦ Clock speed
◦ Data Width - is the width of the ALU
◦ The performance of the CPU is measured in MIPS (millions of instructions per second)
https://computer.howstuffworks.com/microprocessor.htm
Chapter 1 12 of 22
https://science.howstuffworks.com/innovation/repurposed-inventions/2d-barcodes.htm
EMBEDDED SYSTEMS
An embedded system is a computer controlled device designed to perform specific tasks.
The main part of an embedded system is the processor, which is a microcontroller and is programmed to
perform the specific tasks for which the integrated system has been designed.
It also contains the memory: RAM - to temporarily store the OS and data during execution of the system
and the ROM – to hold the input output routines that are needed for the system at boot time and the OS
The
Questions:
Describe in details factors to consider when purchasing a digital device such as a smartphone, Music player?
What is Firmware?
Chapter 1 13 of 22
1.1.7 Be able to Numbering System
calculate data file
A digit is a single place that can hold numerical values between 0 and 9 in decimal numbering system.
size and time
Digits are normally combined together in groups to create larger numbers. E.g. 6,357.
needed to transmit
a file. Each digit in a number has a place value. This gives the number its real value.
For example, in the number 6,357, the place value for 7 is “ONES," the place value for 5 is “TENS”, the
1.1.8 Be able to place value for 3 is “THOUSANDS” and the place value for 6 is “TEN THOUSANDS”. This could be express
use and convert explicitly as:
between binary and
denary as defined (6 * 1000) + (3 * 100) + (5 * 10) + (7 * 1) = 6000 + 300 + 50 + 7 = 6357
by the International
Electrotechnical
From the above expression, the place value of decimal numbers increases in powers of 10.
Commission (IEC).
Number 1 0 0 1
3 2 1 0
Place Value 2 (8) 2 (4) 2 (2) 2 (1)
Multiply each digit with the place value 8*1 4*0 2*0 1*1
Product(Place Value* Digit) 8 0 0 1
Add the sums 8 + 0 + 0 + 1 =910
Chapter 1 14 of 22
To convert a decimal Number to binary:
◦ Divide the Decimal Number by the Numbering system you want to concert to noting the reminder
◦ Continue dividing until the until the number becomes zero
◦ Write the remainder from bottom upward
The capacity of the storage unit or the size of a file is measured in bytes.
In the real word as the number becomes bigger it becomes easier to use a term to describe it to avoid writing so
many digits. For example 1000gms makes 1 Kilo and 1000 metres makes 1 Kilometre.
Computer engineers noticed that binary 210 (1024) was very nearly equal to the decimal 103 (1000) and,
purely as a matter of convenience, they began referring to 1024 bytes as a kilobyte, 1 048 576 byte as a
Megabyte and so on
As the measures were small the error could be accommodated.
But with bigger values the % error reached more than 10%.
International Electrotechnical Commission (IEC) has set up SI for use to minimise the errors
These are
Chapter 1 15 of 22
Factor Name Symbol Origin Derivation
210 kibi Ki kilobinary: (210)1 kilo: (103)1
220 mebi Mi megabinary: (210)2 mega: (103)2
230 gibi Gi gigabinary: (210)3 giga: (103)3
240 tebi Ti terabinary: (210)4 tera: (103)4
250 pebi Pi petabinary: (210)5 peta: (103)5
260 exbi Ei exabinary: (210)6 exa: (103)6
IEC standard
File size
The size of a file is measured in bytes.
A byte is made up 8 bits
To code a data, we use 8 bits. Therefore 8 bits represents 1 Character
Connection Speed/Bandwidth
Computer network performance — sometimes called internet speed — is commonly measured in units of bits
per second (bps). This quantity can represent either an actual data rate or a theoretical limit to available
network bandwidth.
Modern networks support enormous numbers of bits per second. Instead of quoting speeds of 10,000 or
100,000 bps, networks normally express per second performance in terms of kilobits (Kbps), megabits (Mbps),
and gigabits (Gbps), where:
1 Kbps = 1,000 bits per second
1 Mbps = 1,000 Kbps
1 Gbps = 1,000 Mbps
The higher the number of bits per second you have, the faster the online speed.
The maximum rate at which data can be received over an internet connection is known as the downstream
bandwidth.
The maximum rate at which data can be sent is known as the upstream bandwidth.
Chapter 1 16 of 22
Question
1. Convert the following to binary
a. 12710
b. 9910
c. 1BF16
2. Convert the following to Decimal
a. 10100010102
b. 010100012
c. BF16
3. Calculate the size of a file containing 1,000,000 characters. Express your answer in Kibibytes (KiB) and
Mebibytes (MiB)
4. A file contains 52,000,000,000 characters. What is the size of the file in
a. Gigabytes (GB)
b. Gibibytes (GiB)
5. The file in 2 above is to be transmitted using a link that has a speed of 2Mbps. Calculate the time taken to
transmit the file in hours.
Chapter 1 17 of 22
1.2.1 Understand SOFTWARE
the purpose of:
Each computer needs a software for it to be able to be used
a. systems software
A software is
b. applications
software. a collection of instructions that can be ‘run’ on a computer. These instructions tell the computer
what to do.
1.2.2 Understand A list of instructions that control the behaviour of the hardware units
the role of the A list of instructions that allow a computer to be used to solve a specific problem or do a task.
operating system in
managing: Software is not a physical thing (but it is stored on a physical medium such as a CD-ROM), it is just a ‘bunch of
a. devices codes’ or a list of instructions.
b. processes
c. users
Computer software are classified into two major groups
d. security.
1. System Software and
2. Application Software
System software
This is the main program that allows a computer to start and control various peripherals. System Software are of
two types:
1. Operating System (OS) - The OS control the working of the computer. It also provides resources to the
users.
Each computer must at least have Operating System software installed
2. Utility Program – are programs that add functionality to your computer or help your computer performs
better. These activities include locating and deleting viruses, formatting a storage media, copying of files
and renaming of files
Chapter 1 18 of 22
Questions
1. List five examples of utility software
2. For the item listed in 1 above describe what they do
Application Software
These are programs that enable a user to use a computer system to accomplish various activities such as typing
letters, calculations and manage data. Here are a few examples of application software and what they do
1. Word processing Software are used to produce letters, reports and memos. They provide a user with features
to manipulate characters
2. Database programs are used to store and retrieve information
3. Spreadsheet applications are used for tasks that involve calculation. They provide a user with formulas to
carry out these calculations
4. Presentation applications are used to create slideshows and presentation. These can be projected onto a wide
screen for the audience to view
5. Desktop Publishing package are used to produce posters, newsletter and magazine. They have features that
allow the user to combine both text and graphics with ease.
6. Graphic programs are used to produce artwork
7. Communication software are used sent and receive mails. They allow messages to be sent from one
computer to another
8. Web Browser – they are used to access the internet and
9. Web Editors are used to create and edit web pages.
Shareware software is distributed at low (or sometimes no) cost, but usually requires payment and registration
for full legal use. Copies are distributed on a trial basis. You are free to test the software, see if it matches your
needs, and decide whether it's a good value.
Shareware is not free software, since authors of shareware programs expect payment from those who intend to
use the programs regularly.
Chapter 1 19 of 22
Freeware software is distributed at minimal cost, but the authors do not expect payment for their work.
Typically, freeware programs are small utilities or incomplete programs that authors release for their potential
benefit to others, but without support. The author of a freeware program may still retain a copyright on its
contents and stipulate that others not modify the program or charge significant fees for its use or distribution.
1.2.4 Understand Software License Types
licensing options: A software is an intellectual property just like a book or music. It is protected by the law and a user is not
a. single user supposed to distribute, resale for monetary gain or share it with other people who are not authorised without
b. multiple user
the consent of the programmer. Software license allow the buyer of the software to use it as per stated
c. institutional
conditions. Types of software licenses are
d. fixed term
e. indefinite
f. network. Individual/Single User licenses
Individual (Single-user): This license type allows the program to be installed and used on one CPU which is
not accessed by other users over a network. Types of individual/Single user licenses are:
1. Perpetual license: allows the customer to install and use the software indefinitely. Technical
support is included for a limited term, usually 90 days.
2. Subscription license: Allows the user to use the software for a specified time period. This license
usually includes technical support and access to upgrades and patches released during the term of
the subscription. At the end of the term the user has several options: (1) renew the subscription; or
(2) purchase a perpetual license at a discounted cost; or (3) remove the software from the
computer. Most of the Anti-Virus software fall into this category
3. Freeware license: This license type is offered as freeware by the author and does not require
paying any fee for use.
4. Shareware license: This is a license to use software for a trial period and then, if you continue to
use the software, you must pay a shareware fee or cease using the software.
Individual/Multi-user licensing
Volume licenses: allows the Licensee to install the software on a certain number of computers. The
licensee usually has to satisfy a minimum purchase requirement and obtains reduced prices in exchange.
When purchasing the licenses, the licensee usually receives one copy of the media and documentation with
the option of purchasing more.
Site/Enterprise: This license provides access to software at a single location. Typically, these licenses are
individually negotiated with the publisher and vary widely in their provisions.
Network/Multi-user licenses
Server (Network): Licensed per server – This license type requires that you have a single copy of the
software residing on the file server. With Per Server licensing, a specified number of CALs are associated
with a particular server. The number of devices that can legally access that server simultaneously is limited
in Per Server licensing to the number of CALs purchased for that particular server.
Per Seat (Machine): Licensed per machine/seat – This license requires that you purchase a license for
each client computer and/or device where access to services is needed. This license is typically used in
conjunction with a network license.
Per Processor: Under the Per Processor model, you acquire a Processor License for each processor in the
Chapter 1 20 of 22
server on which the software is running. A Processor License usually includes access for an unlimited
number of users to connect. You do not need to purchase additional server licenses, CALs, or Internet
Connector Licenses.
1.2.5 Understand Anyone who uses software of any kind has encountered prompts to update or upgrade that software.
the purpose of and
how to manage
Software Update
software updates:
a. patch A software update, which is sometimes called a software patch, is a free download for an application,
b. automatic operating system, or software suite that provides fixes for features that aren't working as intended or adds
c. upgrade minor software enhancements and compatibility.
d. compatibility Software updates are issued to
issues. o address security issues when they occur
o address minor bugs discovered in the software
o improve the operation of hardware or peripherals,
o add support for new models of equipment.
These small, incremental updates improve the operation of your software.
Software updates may be done automatically or manually
It is done automatically by changing the settings of the software and will occur without the user
intervention
Software Upgrade
A software upgrade is a new version of the software that offers a significant change or major improvement over
your current version. In many cases, a software upgrade requires the purchase of the new version of the
software, sometimes at a discounted price if you own an older version of the software.
1.2.6 Be able to 1. Software price verses value - Purchasing more expensive software because it has a long list of extra features isn’t
select software to necessarily the correct move, as many of those features might not even apply to your business or be usable by your
meet the needs and
requirements of
particular system
individuals and 2. Is the software company prepared to fix bugs? Every software has bugs. Be aware of the software company’s
organisations. procedures for fixing those bugs when they arise. Understand how the issues you may potential run into will be
Chapter 1 21 of 22
addressed. Make sure that the company will address the problems that are unique to your company’s use of the
software, and not just the big problems that most of the software’s users run into.
3. Support hours? The question of support hours should include not only the timeframes during which you can get support,
but how you can do so. Can you get phone support, or is everything done by email or ticketing system? If you will be
using a ticketing system, what is the anticipated response time for a request? It is important that your software
company’s support department is available when you need them.
4. Current known bugs? A luxury for your company in dealing with software is knowing the current known bugs in the
software and the updates scheduled for fixing them. Knowing this information will help you stay on top of the state of
your software and use it more effectively.
Chapter 1 22 of 22