Question 1
There are different operating systems in the world today. This paper will focus on Windows Operating Systems and Linux Operating Systems. One feature of Linux Operating System is that it is portable. This means that Linux will work in the same way in any hardware. Another feature is that it is open source. This means that the code that was used to develop the program is available to any person to use. Another feature is that it is multiprogramming which is that it allows many programs to run in the operating system. One problem with Linux Operating System is that it is hard to learn. It also has hardware problems because most hardware does not support Linux Operating System.
Some features of Windows Operating Systems, example being Windows 7 is that it is its graphical user interface. This is a feature where users are able to interact with the system using windows which are user-friendly. Windows also has control panel which is a feature which enables users to interact with the system. Modern Windows Operating Systems have features which support touch screen capabilities. It also has jump lists which enables the users to access the most used functionalities.
One problem with Windows Operating system is that it is not secure. Windows 7 is not as reliable as Linux because of how it has been developed. Windows is vulnerable to virus attacks and other types of vulnerabilities. This is an important aspect that needs to be undertaken. With the increased security vulnerabilities of most operating systems, it is important to have systems which are secure and will not fail when they are attacked. This is an important consideration when talking about operating systems.
Question 2
One software that can be purchased online is Bitdefender. It is new security software that is used to protect computers from attacks. It comes in three types, Bitdefender Total Security, Bitdefender, Internet, and Bitdefender Antivirus. This type of software is system software. It is a utilities software that used to protect computers from virus attacks. The sphere of influence is both personal, enterprise and Group. This is because the software can be purchased for all the spheres of influence. This is shareware software. The license that is given for this software will depend on the pay that has been made. There are copies that have to be bought for all the versions of software. It is important to specify the number of computers that the software will be used (Lacity, & Hirschheim, 2012).
One other software that can be purchased from the internet is Gentoo Linux. This is an operating system that was released in 2013. It is a system operating system. It is used to manage computers and how they manage their files. Gentoo Linux is freeware software because it is free and can be downloaded at any time from the internet. There is a no payment that is made and the use often software on any computer is unlimited. It is installed on individual computers. The software is Open Source; it is therefore free. The sphere of influence of the software is personal. It is installed on individual computers. Linux is purchased to be used on individual computers (Laudon, & Laudon, 2011).
Question 3
Software comes in different flavors and use. With the different functionalities and the wide adoption of systems in organizations, there has been an increase with the use of utilities and application software. With the insecurity that has been seen with the use of the internet, there has been the need to have utilities to protect computers from damage that is from these attacks.
Software can now be found and sold online. Applications that are sold online can either be used for group or individual uses. The software can also be used either as application software or they can be used as systems software. The application software is designed keeping in mind the need to consider the platform where they will run. The platform is the operating system which they have been designed to work. There is other systems software which will be installed in the operating system. These are the utilities which are used in the operating systems to protect the systems from attacks. With more developers and collaboration projects, there are now open source projects in use.
References
Lacity, M. C., & Hirschheim, R. (2012). The information systems outsourcing bandwagon. Sloan management review, 34.
Laudon, K. C., & Laudon, J. P. (2011). Essentials of management information systems. Upper Saddle River: Pearson.
Stair, R., & Reynolds, G. (2011). Principles of information systems. Cengage Learning.