4.5 OTHER CRITERIA FOR CLASSIFICATION OF SOFTWARE
There are various methods to classify software into different categories. First method which is accepted by the computer researchers world wide which we have discussed in the section 4.2 of this unit.
However, on the basis of number of user’s, piracy policy and authority of use, software can also be classified into following categories:
1. Public Domain Software
Public domain software are widely used now days. Features of public domain software are:
- · Has no copyright no one owns the right to control it and any ones can make copies of the software.
- · Free to use or make copies by all.
- · Can be copied, used in other programs, or changed by anyone.
2. Freeware
If small applications are developed without charging any cost it is known as freeware.
Features of freeware are:
- · Has a copyright someone owns the right to determine who can make copies of the software.
- · Free to use and make copies.
- · Can only give away exact copies of the software.
- · Can‘t be changed or used in another program without the copyright holder’s permission.
3. Shareware
The softwares of this category are given for some period on trial basis and later on users are charged for using it.
Features of shareware software are:
- · Has a copyright.
- · Allowed to use the software before paying for it.
- · Can be a demo which limits some major features like the Save command.
- · Can set an amount of time you can use the software.
4. Commercial Software
These software are developed by professionals for organizations for business purpose.
Features of commercial software are:
- · Has the most resistive copyright.
- · Have to buy the software before you can use it.
- · Can usually make one copy of the software as a backup copy.
- · A backup copy is used in case something goes wrong with the original software.
- · Can not give away or sell the backup copy.
- · Can not copy look at the program’s code, change, or use the software in another program without the copyright holder’s permission.
- 1. Built into the computer’s circuits, the ROM chips.
- 2. Loaded into the computer from a secondary storage device, like a floppy disk or hard disk drive.
- 3. Typed in from the keyboard.
- 4. From the Bluetooth Technology, Infrared Ray Technology and WiFi Network Technology.
- 5. From the backup of LAN servers.
Comments
Post a Comment