[Webinar] Streamline your web hosting managementRegister Today

x

Software

38K

Solutions

38K

Contributors

Software is any set of instructions that directs a computer to perform specific tasks or operations. Computer software consists of programs, libraries and related non-executable data (such as documentation). Computer software is non-tangible, contrasted with computer hardware, which is the physical component of computers. Software written in a machine language is known as "machine code". However, in practice, software is usually written in high-level programming languages than machine language. High-level languages are translated into machine language using a compiler or interpreter or a combination of the two.

Share tech news, updates, or what's on your mind.

Sign up to Post

gSuite help is still terrible.

I have several comments about how using paid support for Office 365 is far superior to the experience using gSuite including my comment on this article from 2015.

Yesterday's call to gSuite support reconfirms.  Problem is a user wants to have access to Android apps on his new Google Pixelbook. Going to settings on the Pixelbook to enable the feature is grayed out.  A call to Pixelbook support confirmed the issue is the user is a member of a business gSuite account and there is a feature that has to be turned on.  I was directed to call into gSuite. Calling gSuite support is about as helpful as talking to my 2 year old niece. The gSuite tech acted as if he had no knowledge of a Pixelbook. I had to explain several times it was a product of his own company. Even going down the Chromebook route didn't help. He could simply point to turning on a feature that was already set. Otherwise, I would have to call the Pixelbook Support.

I have called into office 365 support for many issues. Sometimes the issue went beyond the scope of what the tech should have helped for their own silo, but they still were able to spend 30 to 60 minutes on the phone to solve the issue with great patience and product knowledge.

After the sale support many times goes unnoticed or untested.  When evaluating a service or software, I will call in…
1
 
LVL 54

Author Comment

by:Scott Fell, EE MVE
Thanks for the nudge Andrew.  Perhaps I will do just that.
0
 
LVL 13

Expert Comment

by:Andrew Leniart
Please do Scott. I'll be more than happy to edit and get it published for you.

I think a lot of people may benefit from your experiences, and it may just be the push Google needs to provide some decent support.
0
Free Tool: Port Scanner
LVL 11
Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

More on the two "villians" too. It has a nice description, not overly technical (though inevitable at times) for understanding. Crux of it is remediation is really for CPU vendors to issue firmware updates to protect against these attacks. The OS and affected vendor will "support" with their release to reduce the attack surface or make it harder to exploit.

Unfortunately, there are no software patches or operating system mitigations that can fully mitigate the impacts of the Spectre attacks and the flaws being abused. Only saving grace is browser vendors have begun updating their browsers to disable certain features which make the Spectre attack feasible via JavaScript. If really paranoid, back to basic to disable active scripting like Javascript.

https://research.kudelskisecurity.com/2018/01/04/meltdown-spectre-attacks-on-cpu-flaws/
1
 
LVL 50

Expert Comment

by:dbrunton
I think the microcode patches will come through the system vendor, Dell, HP etc etc.  Intel will probably supply them with the patches to distribute.

As for the lawsuits that will be interesting.  Unless it can be proven that there is a significant slowdown those lawsuits will go nowhere.  And at this stage there is no real evidence of that.  The most likely candidates will be those who run VM instances in the cloud and we'll need to wait for those to occur.

It will be a pity if the lawsuits don't succeed because I'd love a new Core 2 Quad processor replacement ...
0
 
LVL 66

Author Comment

by:btan
Agree. Nice.
0
Hi all
I have a win2000 server running bespoke software that obviously needs to be retired, so I am hoping to create a vhd file of this machine & run it on a 2008R2 server.
Not having done this before I need advice on firstly, can this be done? & secondly how to step through what is required to do this. The Microsoft website is confusing, to say the least.
What software would I need etc. Disk2VHD won't work on 200 as there is no VSS.

Hoping some kind person might be able to enlighten me.

Regards

Brian P.
0
 
LVL 26

Expert Comment

by:Brian B
Yes, but you have entered this as a post. It looks like you are asking for help. To get the best response from the Experts, you should probably re-submit this as a question using the "ask a question" button at the top of the page, or this link: https://www.experts-exchange.com/askQuestion.jsp

If you do ask a question, please post the link to it back here so others can find your question and help you more quickly.

Please see here for further details: http://support.experts-exchange.com/customer/portal/articles/756544-how-to-succeed-at-ee-as-an-asker
1
Immutable Class Builders
 
The other day I showed 1 way to make a Class #Builder more meaningful, #semantically, leveraging the #programming language's type system. Today, I'm going to address how to make them immutable, its benefits, and its drawbacks.
 
Why?
 
Class Builders typically use mutable architectures where the programming language allows. In #Java we often see the following model:
 
@Immutable  
final Class Person {  
 
public final Name name;  
public final Address address;  
 
Person(final Builder builder) {  
  this.name = builder.name:  
  this.address = builder.getAddress();  
}  
 
}  
   
@Mutable
final class Builder {  
 
public final Name name;
@Nullable private Address address;
 
private Builder(final Name name) {
  this.name = name:  
  this.address = Address.empty();  
}  
 
public static Builder named (final Name name) {  
  return new Builder(name);  
}  
 
public Builder with (@Nullable final Address address) {
  this.address = (null == address) ? Address.empty() : address;
}  
 
public Address getAddress () {
  return (null == this.address) ? Address.empty() : this.address;
}  
 
public Person build () {  
  return new Person(this);
}  
 
}  
 
Whatever Person field is required, we find in the Builder's constructor. In the above example, that's Name.
 
Other fields are optional, and their value is added to a Person instance by using one if the Builder.with() instance methods.
 
Note how the Builder also features a …
0
 

Author Comment

by:A.E. Veltstra
Thank you, Brian! I'll look into that.
0
 

Author Comment

by:A.E. Veltstra
Anton Shipilev showed in 2014 that using all final fields and setting them in the class constructor did in fact slow down initialization when using Oracle's HotSpot Java compiler on ARM and PowerPC. I have yet to see whether his recommendations have been committed. https://shipilev.net/blog/2014/all-fields-are-final/
0

TeamViewer hacked: Here’s how to protect your systems


Hi there,

TeamViewer can be exploited using a vulnerability allowing users to switch between viewer and presenter side, or remotely control the server. If you are using TeamViewer in your enterprise, do act now.

Read more: https://goo.gl/2E65yX
1
Type-safe class builders
 
The Builder design pattern for software architecture has found quite some traction among people who read the design patterns book by the Gang of 4, as well as those who seek a more fluent, clean-code approach. Oddly enough, these 2 approaches conflict. In this article I'll focus on the latter approach.
 
Uses for the Fluent Builder pattern include reduction of nullable constructor parameters of the target class, reduction of the number of constructors of the target class, reduction of the amount of parameters for constructors of the target class, and providing semantically meaningful method names to specify parameter values for the constructors of the target class.
 
And I find that in the latter use, implementations tend to be lacking.
 
For instance, a typical example is shown in Lokesh Gupta's Builder article over on HowToDoInJava. Read it.
 
Using that Builder reads like this (I have altered it slightly):
 
final User lokesh = new User.UserBuilder("Lokesh", "Gupta").mice(1).desk(14).monitors(3).build();
 
All the hallmarks of a fluent API are there, aren't they?
 
Well. Not really.
 
See, its method mice(int) doesn't signal what its effect will be. "Mice" is just a noun. Not a verb. This is common in Java POJO design, but it shouldn't be here. For self-describing code, I also expect that a setter method signals its effect. Something like setMice(int).
 
But what does that number signify? A type? An amount? Something else? Let's …
1
The future of ergonomics! Probably.

To nerd it up for us: Imagine a keyboard made to exactly match the way your hand moves.

https://weartesters.com/brooks-superfeet-true-running-shoe-customization-running-event/
0
This is my school project / assignment scenario - I have to draw a Logical Network Design...NEED HELP

The rollout of the wireless network has been suspended for now, but the stock analysis tool is being implemented. It is to be called My Stock Analysis Tool (MSAT). MSAT is going to use a three-tier client-server architecture. The tiers will be a web browser at the client end, a separate web server tier, and the MSAT server that performs application logic and all the data storage and access logic. In this way, there is no issue with installing/supporting a software client on end-user computers. Both customers and DRUB staff will use MSAT through a web-based interface, although staff may see extra options. Apart from accessing MSAT, staff also use Microsoft spreadsheet and word processing software on their computers (Windows XP PCs and laptops) for preparing reports, with work-in-progress files stored on staff computers.
0
 
LVL 34

Expert Comment

by:Rob Henson
Snowbella, well done for being honest and up-front that this is a school project; that will help experts guide you rather than propose answers as they would for normal questions.

However, to get better assistance you need to raise this as a question using the big blue button at the top of the page or this link:

https://www.experts-exchange.com/askQuestion.jsp
0
Is there any downloadable software for Windows or for other devices connected to our network (such as cell phones)that would detect devices that are sending out SPAM.  Our internet provider has suspended our outbound email services until they know that we've fixed the problem.  I'd like to test all devices on the network to find out the source of the spamming.  Any ideas?  
0
 
LVL 15

Expert Comment

by:Ben Personick (Previously QCubed)
Setup an SMTP server (such as the free one included in windows under IIS) to act as a relay.

Point all of your actual applications that sdnd mail to this relay.

block all devices (except the IP pf the mail relay) from having port 25 ourbound.

Now you can be pretty muxh assured that anything else which is sending email is blocked, and you can review the smtp logs of all devices which de relay through your local smtp relay server, allowing tou to troubleshoot connectivity and locate any abusive systems.
0
 
LVL 26

Expert Comment

by:Brian B
You have entered this as a post, but it looks like it is a question. To get the best response from the Experts, you should probably re-submit this as a question using the "ask a question" button at the top of the page, or this link: https://www.experts-exchange.com/askQuestion.jsp

Please see here for further details: http://support.experts-exchange.com/customer/portal/articles/756544-how-to-succeed-at-ee-as-an-asker
1
Open source cloud
Foss is a very good open source cloud support software like other software openstack,cloudstack,euckaly plus,synnefo,openqrm,openshift,cloudfoundry, docker.FOSS is more realiable and easy to install.
0
Free Tool: SSL Checker
LVL 11
Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

I see this over and over and over in here:  "Windows 10 forces me to update and my decade old legacy software won't work with the newest updates"

I wonder if these poor souls can connect the dots.

They turned off Windows 7 Updates to keep their legacy software running, and then they complained to Microsoft that their machine was hacked. It was hacked because security updates were turned off.

Microsoft's response:  "We have had enough!  New systems will update like it or not"

Is this any surprise to anyone?
1
 
LVL 53

Expert Comment

by:Jackie Man
Pull off the access to the Internet is the only way to keep legacy application working...
0
Cyber News Rundown: Edition 11/10/17

CyberNewsRundown.jpg
UK-Based Cryptocurrency Hit By Cyberattack

Prior to the official launch of Electroneum, a UK-based cryptocurrency that uses smartphones for its mining process, was targeted by a DDoS attack that shut down both the website and the app for several days. The attack effectively blocked all users from accessing their accounts, as the entire network was forced offline, to ensure the safety of investors’ funds.

Canadian University Held for Ransom

In the past week, officials have been working with affected students to secure their personal information after hackers breached the university’s systems and gained access to student records. The university has since taken its email system offline, as the hackers were spreading the leaked information throughout the email lists. Along with the data circulation, the hackers also demanded the university pay a large ransom of roughly 23,000 USD within 48 hours, though officials are still uncertain when the breach itself occurred.

WaterMiner Cryptocurrency Mod for GTA 5

As more cryptocurrency miners are embedded in software, one Russian hacker has gone a step further by exploiting a mod for the popular game Grand Theft Auto 5. The exploit silently uses a computer’s power to mine digital currency and, with the help of a modified version of the XMRig miner, can hide itself if it suspects monitoring software is active.

More on the Webroot blog here.
0
3
What can you benefit from moving Program files from C drive to D drive?

Can you simply move a program file from C: to D: ? In Windows, programs aren’t single files. Often, they’re not even found in a single folder, but rather in dozens of places on the hard drive. The file locations are referenced troughout Windows, which means that moving any of them would cause the program to fail. A simple file-move operation will be unsuccessful. Or will you manually uninstalling them and reinstalling to the D drive? Obviously, it’s not a good way especailly when there are a lot of applications installed on C drive.

Then, what is the best way? I think a third-party data migration software can make things much easier. Such programs are usually capable of dragging and dropping the program files from C drive to D drive safely and quickly. Here, EaseUS Todo PCTrans is recommended for its easy-to-use feature. It can help you transfer data and application to new PC/OS in simple steps in Windows XP/Vista/ 7/8/8.1/10 & Server 2003/2008/2012. All programs files like Facebook, Photoshop, Movie Maker, installed games, etc. that you downloaded from website and regarded as third-party software are supported.

Capture.JPG
ToDo PCTrans
0
 

Expert Comment

by:lpii
I would uninstall and reinstall the programs.  As you said, files are stored in different locations on the C drive, but there are registry entries that are created in every program's installation as well that point to those files and directories.  There maybe software that analyzes the software completely to move it, but if you have the software, I would uninstall and reinstall and pick your D drive and you won't have to worry about the software missing anything.

The advantage of installing on a different drive is if you are running out of room on your C drive, which can cause a slow down in your PCs operation.  If you have the room on the C, I would leave them on C, unless you are trying to organize your drives by having an app drive.

Most transfer software that I have used has been to transfer a complete drive to a new drive, not selected programs.  The transfer software images the disk and transfers it to the new drive (usually done because I've purchased a larger drive for my C drive).
0
 
LVL 15

Expert Comment

by:William Fulks
This reads more like an article than a question. Did you post it in the wrong category?
0
Looking for some feedback regarding whether or not to upgrade to the iPhone 8.
Pro: Financially, under Verizon's new billing system, it's only ~$2 more/month for the iPhone 8 compared to the iPhone 7 and as fast as they release new phones, it makes sense to get a newer version, if possible, so that the machine will work well with software releases.
Con: The new charging method of the iPhone 8 worries me. Wonder if the glass backing will make this phone more susceptible to breaks.

I've done some research (like this article) but curious for opinions one way or another to help me in this purchase conundrum.
0
 
LVL 1

Administrative Comment

by:Erin Wooddell
iPhone 6, Verizon. I'm about 9 months overdue for my 2-year upgrade.
0
 
LVL 3

Expert Comment

by:famousnametaken
Verizon's 'upgrades' are not what they used to be.  All you're being enticed to do is to is get a new phone and pay them monthly on their Edge plan.  That's fine.  I don't like two year agreements anyway.  And the phone trade in can be lucrative if you don't mind having an added monthly payment to your bill.
Go to Verizon's website and login to your account.  You should be able to get a nice trade in value for that phone towards an 8.  

I watched the Apple keynote a while back about the iPhone 8.

Start at 55:55
https://www.apple.com/apple-events/september-2017/

'Most durable glass phone in a smart phone ever'
'water and dust resistant'
'better retina display'
'new speakers'
and on and on.

Sounds like a great phone to have and I would be interested in getting one when I have enough money haha.

iPhone X imo won't be worth getting unless you're adamant about using their facial recognition AR heh.  Its so weird to me they went from 8 to 10.  *shrug*
0
Let’s learn something new is the term known Error Database. What is this KEDB? And how it is connected to software testing world?

The key to progress lies in climbing the stairs step by step, instead of a single jump skyward. Approaching slowly and carefully expects knowledge to be stored, utilized and enhanced. In Information Technology Infrastructure Library one such tool that enables associations to make this progress is the Known Error Database.

What is a Known Error Database Tool?

A known error database is a database that portrays the majority of the known issues inside the general frameworks. It depicts the circumstances in which these issues show up, and when conceivable, it offers a workaround that will get the client around the issue and back to profitable work. The configuration management system is part of known error database.

This database also turns out to be a part of the general Problem Management Database, where IT can go to distinguish and organize issues that need perpetual resolutions. Workarounds are just impermanent fixes with the goal that work can precede until the point when issues are definitely settled.

The ITIL known error database must incorporate screenshots of the issues, and additionally the content of error messages, and portrays the issue from the perspective of the client.

Advantages of a Known Error Database

IT groups inside undertakings build up a known error database format as it offers …
0
A weird Windows 10 issue I have not seen before.

Yesterday morning I started as normal but there was no internet. Bah Humbug!  I use my Rocket Stick to get morning email and head to a client. 4:00 pm there was still no internet.

I got home, reset the modem and internet came back. That was about 7:00 pm. I restarted everything: Modem again, router, wireless, printer and both computers.

The printer worked on my Desktop but my laptop said "out of paper" No, it was not. Standard troubleshooting steps did not resolve the issue. So I did a Driver Repair (Programs and Features). I have done this before.

Now here is the weird issue:  Restart (have to) and the display turned upside down!. No tablet controls would fix this. The only fix I could beyond what I did was to restore to the prior point. I did this (20 minutes) and that fixed the display. I spent some time updating software that got lost in the restore and all is well.

But I have not seen anything like this before. New territory.
0
 
LVL 15

Expert Comment

by:William Fulks
I'd check to see if your tablet installed any new Windows Update or vendor updates overnight. Might have picked up something buggy that screwed with your drivers.
0
 
LVL 101

Author Comment

by:John Hurst
I think the Printer repair step went wrong.

The laptop was fine; repair printer - weird problem; roll back and fine.

I don't know why the repair went bad but all was well before and all is well now.  

Thanks.
0
Today is the last day you'll be able to download Office 2007 SP's, Access 2007 Database Engine, Access 2007 Run time, and other software related to Office 2007 from Microsoft.

Make sure you download what you need to support your software.   Original post with some Microsoft Access links is here:

https://www.experts-exchange.com/posts/3107/MS-Access-2007-Users-Developers-IMPORTANT-NOTE.html

  You'll also want to download the Service Packs (SP's).
2
Does anyone have a recommendation for dashboard software.  I need to be able to switch between active IE windows preferably not tabs. I tried Dashboard rotator but it stops the plugin from working.
0
Free Tool: IP Lookup
LVL 11
Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Hi,
Every week, I need to run 7-8 reports from external software for same week period for almost 8 branches, is there any VBA codes which can help me to automate the process, where it saves all reports automatically from external software on network directory just by adjusting dates? Your help will be appreciated.
0
 
LVL 26

Expert Comment

by:Brian B
You have entered this as a post, but it looks like it is a question. To get the best response from the Experts, you should probably re-submit this as a question using the "ask a question" button at the top of the screen, or this link: https://www.experts-exchange.com/askQuestion.jsp

Please see here for further details: http://support.experts-exchange.com/customer/portal/articles/756544-how-to-succeed-at-ee-as-an-asker
0
 
LVL 26

Expert Comment

by:Brian B
0
Cyber News Rundown: 10/13/17

CyberNewsRundown.jpg
Rigzone Founder Caught Stealing Data

Over the last few months, officials have been piecing together the case against Rigzone founder, David Kent. After selling the Rigzone domain several years ago, Kent used several backdoors he’d implemented to access account information for over 700,000 customers, which he then attempted to sell back to Rigzone. By setting up several dummy accounts, Rigzone staff determined the specific IP address Kent used and apprehend him.

Criminals Hack Eastern Europe Bank for Millions

In the last year, banks in several Eastern European countries have seen a drastic rise in fraudulent charges at ATMs that have allowed hackers to make off with nearly $40 million dollars. Attackers start by manipulating the banks overdraft protection and setting up proxies to allow accomplices in other countries withdraw massive quantities of money from separate accounts. In addition to spoofing the overdraft system, the attackers also installed remote access software on bank computers to enable further intrusion to the institution’s systems.

More on our blog here.
2
MS Access 2007 Users/Developers - *** IMPORTANT NOTE ***

  This is a heads up that the following Access components available as standalone downloads are moving past extended support in the near future and along with other Office 2007 products, will not be available for download after that time.

  If you have any software that depends on the 2007 (32bit) database engine or the 2007 run time, you'll want to download these as soon as possible so you have them.  

•      Access 2007 runtime  - https://www.microsoft.com/en-us/download/details.aspx?id=4438
•      Office Data Connectivity Components (ACE) - https://www.microsoft.com/en-us/download/details.aspx?id=23734&40ddd5bd-f9e7-49a6-3526-f86656931a02=True&a03ffa40-ca8b-4f73-0358-c191d75a7468=True&751be11f-ede8-5a0c-058c-2ee190a24fa6=True
•      ADE - https://www.microsoft.com/en-us/download/details.aspx?id=24569 (includes the packaging wizard, source code control, and the save as template functionality)
 
4
What’s the first thing you install—or uninstall—on a new system?
Install - Chrome
Uninstall - Nothing.  I don't buy pre-loaded software machines; I install my own OS.
5
 
LVL 101

Expert Comment

by:John Hurst
I do not have any issue at all with Windows 10 Pro preinstalled OEM by Lenovo. BIG HUGE waste of time to blow it away and spend a day redoing it for nothing.

Latterly only one piece of Lenovo software bit the dust (Lenovo Solution Center) which was replaced with a better piece of software. Voluntary (optional) Lenovo software need not be installed and I do not.
1
 
LVL 12

Expert Comment

by:Maclean
It is a personal preference really in the end. It does not bug some as much as others,
One might have plenty of resources and decide that it has little to no impact on their experience.
So whether it is a waste of time depends on what one wants from their system.
Personally I prefer max performance and security. The fewer 3rd party apps or vendor apps, the better.

Lenovo is not as bad as some other firms with their own apps but has also been tapped by for example Duo due to big security vulnerabilities in software allowing hackers to bypass protection software and take over control.
Being security focused this translates into my person preferences.

In the end a full system rebuild takes me between 1.5-2 hours average including patches & configuring things plus transferring data where applicable. (Talking SSD. SATA takes more time indeed)
e.g. if I buy HP, Dell, Lenovo OEM I would first need to upgrade to Creator update, then remove optional SW, Trials, Games and more.
That update process itself takes me as long as simply having the ISO already and doing it from scratch.
That was where my point of view comes from :)
1
Just a heads-up for you Sage Users who still have an SBS.

The latest version of Sage (v24) will no longer install onto SBS2008 or SBS2011.  This is because Sage have used .Net version 4.6.1 which is not compatible with Exchange Server 2007 / 2010.

In the past, Sage has said that installing previous versions of Sage onto SBS have been unsupported but the way around this was to install the software using the InstallV.exe installer.  Sage has now removed this installed from the installer files.
2
 

Expert Comment

by:juleswilko
Sounds like a B.S. excuse from Sage.
I can only imagine the number of businesses they have shafted.
Roll on other products not Sage based I guess...
0
 
LVL 22

Author Comment

by:David Atkin
Sage won't really care.  

Clients will be more angry at us IT Engineers than Sage themselves. It will raise questions like 'Our server is only a couple of years old, why isn't it compatible?'

Sage itself is a great piece of Software so they probably won't lose many people over it.  The worst part of it is that they've made clients Sage data more liable to risk because they won't be stored on a server that's getting backed up.  Yes, I know that you should do Sage Backups via the Sage Software but in reality, a hell of a lot of customers just don't bother.
0
Subject of the week | What sparked your initial interest in the tech industry?
My interest in tech is easily traced back to computer games. My dad brought home an Atari 800 one day and it was the coolest thing ever! Even though I was no doubt terrible at the games I played on it, the whole thing was so much fun that it instilled a life-long love of computers. I remember things like some sort of Frogger knock-off called Preppie (was about a golfer trying to cross the street to retrieve his golf ball), the racing game Pole Position, trying to race through Oregon Trail during my elementary school's 50 minute computer class (we didn't have any drives to save our game to, so the time crunch became the real challenge!) and then adventure games like King's Quest and Space Quest.

Later on, when I got a TI-82 graphing calculator, my initial love of computer games carried through and I'd make simple little programs for things like dice rolling, a text adventure game with a rudimentary combat system, and yes, even useful things for class like a quadratic equation solver.

But it was really those early video game experiences that made me want to work with computers.
4
 
LVL 50

Expert Comment

by:dbrunton
Genealogy.  I needed something to record the family history, data etc so I needed a computer.

Was at university so did the computing course and all they had were Macintosh 512K and Macintosh Pluses.  At the same time a friend worked in the computer business and sold me a clone XT 10 MHz 640K RAM 20 Mb hard drive that was um accidentally loaded with all sorts of software.  Turned on this XT and this C:\ > stared back at me.  And I stared back at that.

Next day at university bought a big thick book on DOS.  During lectures and note taking I read that book.  Went home and started typing in commands.  And found Leisure Suit Larry (I knew it was there).  18 hours later ...
2

Software

38K

Solutions

38K

Contributors

Software is any set of instructions that directs a computer to perform specific tasks or operations. Computer software consists of programs, libraries and related non-executable data (such as documentation). Computer software is non-tangible, contrasted with computer hardware, which is the physical component of computers. Software written in a machine language is known as "machine code". However, in practice, software is usually written in high-level programming languages than machine language. High-level languages are translated into machine language using a compiler or interpreter or a combination of the two.