0% found this document useful (0 votes)
20 views7 pages

Chapter 5 Summary IT

Uploaded by

mhmddy959
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views7 pages

Chapter 5 Summary IT

Uploaded by

mhmddy959
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Chapter 5

• System software: programs that control a computer system and allow you to use your
computer and they are operating system and utility programs

• Usage of system software: 1) Enables the boot process 2) launches applications

3) transfers files 4) controls hardware configuration 5) manages hard drive

6) protects from unauthorized use

• Application software: Programs that allow a user to perform specific tasks on a


computer

• Usage of Application software: 1) Word processing 2) playing a game 3) preparing


taxes 4) browsing the Web

• Operating system: A collection of programs that manage and coordinate the activities
taking place within a computer system.

• Functions of an Operating System:

1) Acts as an intermediary between the user and the computer

2) Interfacing with users (typically via a GUI)

3) Booting the computer

4) Configuring devices

5) Managing resources and jobs

6) File management

7) Security

• How booting works? : 1) Kernel is loaded into memory 2) Processes are started

• 3) Msconfig Msconfig: used to control startup of processes

• Configuring devices by: - Device drivers are often needed; can be reinstalled if needed

- Plug and Play devices are recognized


automatically

• Managing resources and jobs:

1) Makes resources available to devices

2) Monitors for problems

3) Scheduling routines
• File management:

1) Keeps track of files stored


on computer

2) Hierarchical format

• Security:

1) Passwords
2) Biometric characteristics
3) Firewalls

(Utility Programs)
• Utility program: Software that performs a specific task
• Usage: (for finding files, viewing images, backing up files, etc.)
• The main programs usage and what exactly used for:
1) File management programs:
- Looking at the contents of a storage medium
- Copying, moving, and renaming files and folders
- Deleting files and folders
- File management program in Windows
2) Search tools (Windows includes search tools)
3) Diagnostic programs (make recommendations for fixing any errors found)
4) Disk management programs (repair problems related to your hard drive)
5) Uninstall utilities (Remove programs completely)
6) Clean up utilities (Delete temporary files)
7) Backup and recovery utilities
- Backup: Duplicate copy of data or other computer content
8) Security programs (Protect computers and users)
- Antivirus programs
- Antispyware programs
- Firewalls
(Processing Techniques for Increased Efficiency)
• Multitasking: The ability of an operating system to have more than one
program (task) open at one time
Usage of Multitasking:

1) CPU rotates between tasks


2) Switching is done quickly
3) Appears as though all programs executing at the same time

• Multithreading: The ability to rotate between multiple threads so that


processing is completed faster and more efficiently
Thread: Sequence of instructions within a program that is independent of other threads.

▪ Multiprocessing: Each CPU (or core) typically works on a different job


Usage: 1) Used with personal computers with multi-core processors 2) used in one computer
system to perform work more efficiently

▪ Parallel processing: CPUs or cores typically works together to complete one job
more quickly.
Usage: 1) Used with servers and mainframes

o Memory management: Optimizing the use of main memory (RAM)


Virtual memory: Memory-management technique that uses hard drive space as additional RAM

o Buffering and spooling: Used with printers and other peripheral devices
Buffer: area in RAM or on the hard drive designated to hold input and output on their way in or
out of the system

Spooling: placing items in a buffer so they can be retrieved by the appropriate device when
needed

(Differences Among Operating Systems)


• Command line
• graphical user interface: (GUI) Most operating systems use
GUI today
• DOS: Disk Operating System
Usage: 1) DOS traditionally used a command-line interface 2) Can enter DOS commands in
Windows

Types of DOS:
1) PC-DOS: Created originally for IBM microcomputers
2) MS-DOS: used with IBM-compatible computers

▪ Personal operating system: designed to be installed on a single computer


▪ Server operating system: designed to be installed on a network server
Usage: 1) Client computers still use a personal operating system 2) Server operating system
controls access to network resources

• Some other information:


o Many operating systems come in both versions

o Mobile and embedded operating systems also exist

o Types of processors supported: Desktop, mobile, server, etc.

o Number of processors: 32-bit or 64-bit CPUs

o Support for other technologies: 1) New types of buses 2) Virtualization


3) Power-saving features 4) Touch input

(WINDOWS)
Windows: The predominate personal operating system developed by Microsoft Corporation

Some versions of windows:

1) Windows 1.0 through Windows 3.x (DOS)


2) Windows 95 and Windows 98 (GUI)
3) Windows NT (New Technology): first 32-bit version
4) Windows Me (Millennium Edition): home computers and shared Internet
connection
5) Windows 2000 (high-end business): support for wireless devices

6) Windows XP:
o Improved photo, video, and music
o Improved networking capabilities
o Support for handwriting and voice input
o Large user base, MS will support until 2014

7) Windows 7:
o 32-bit and 64-bit versions (Home Premium – Professional)
o Starts up and responds faster
o Will run well on netbooks
o Device Stage for all connected devices
o Improved home networking (HomeGroup, etc.)

8) Windows Server 2008:


o Web platform
o Support for virtualization
o New security tools
o Streamlined management tools

9) Windows Home Server:


o Provides services for a home network
o Can back up all devices on the network automatically

(Mac OS)

Mac OS: Proprietary operating system for computers made by Apple Corporation

Based on: the UNIX (GUI)

Includes: Safari Web browser, New features like Time Machine, Stacks, Quick Look, Boot Camp,
etc.

(UNIX)

UNIX: Operating system developed in the late 1960s for midrange servers

Is open-source software: has been collaboratively modified by volunteer programmers all over
the world

- Increasingly being used with personal computers, servers, mainframes,


and supercomputers
– Strong support from mainstream companies, such as Sun, IBM, HP, and Novell

– Much less expensive than Windows or Mac OS

Some information about UNIX:

– Multiuser, multitasking operating system

– More expensive, requires a higher level of technical knowledge; tends to be


harder to install, maintain, and upgrade
– Single UNIX Specification: A standardized UNIX environment

– Version (flavor) of UNIX available without charge over the Internet

– Originally used a command line interface, most recent versions use a GUI

(Operating Systems for Mobile Phones and Other Devices)


• Windows Mobile
• Windows Embedded: Cash register, GPS devices, ATMs, medical devices and
robots.
• Embedded Linux: Used with mobile phones, GPS devices, and other mobile devices
• Android: Linux based OS
• iPhone OS
• BlackBerry Operating System
• Palm OS and Palm webOS
• Symbian OS

(Operating Systems for Larger Computers)

• Larger computers sometimes use operating systems designed solely for that type of
system
• Often a group of Linux computers are linked together to form what is
referred to as a Linux supercomputing cluster
• Some examples : IBM’s z/OS and i/5OS, Windows, UNIX, and Linux

(The Future of Operating Systems)

• Will continue to become more user-friendly


• Will eventually be driven primarily by a voice interface
• Likely to continue to become more stable and self-healing
• Will likely continue to include improved security features
• May be used primarily to access software available through the Internet or
other networks

You might also like