SlideShare a Scribd company logo
1 of 42
Topic 5 -  Software Computer hardware would be useless without  software , the lists of instructions which tell the hardware what to do.  Computers require various types of software to make them useful.  These can be classified as follows: 1. Operating System 3. Applications software 2. Utility software
Operating System The operating system(OS) is the piece of software required by the computer to make sure that it works correctly and efficiently.  It  manages the computer  and  allows the user to communicate with the hardware . Storing the OS on disk means that it can be  easily updated .  Windows Vista and XP are updated on a daily basis.  Modern operating systems are typically  stored on Hard disk  and  loaded into RAM  when the computer is switched on. 1. Operating system 3. Applications software 2. Utility software
The bootstrap loader The bootstrap loader is a  small  but very important part of the OS which is  permanently stored in ROM .  When the computer is  first switched on  the bootstrap loader starts to run. It  checks the RAM and input/output devices  to make sure that they are working and then  locates the OS on backing storage , usually on Hard disk but could be on CD or even a memory stick. It then  loads the OS into RAM  and the OS takes over control. 1. Operating system 3. Applications software 2. Utility software
The main part of the operating system in RAM  manages the computer  and  allows the user to communicate with the hardware   It has  6  main functions: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1. Operating system 3. Applications software 2. Utility software
[object Object],This part of the operating system  accepts commands  (from a keyboard, mouse, etc) and  passes them to the appropriate parts of the operating system .  If the  syntax of the command is not correct  then an  error message  should be displayed for the user  or the command  should be  ignored .   e.g. clicking the left mouse button on a blank area of the desktop. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],This part of the OS  manages file operations  and  backing storage allocation . It  allocates blocks of data  to  particular areas on the backing storage medium .  It  maintains an index  of where all the user's applications and data are stored so that they can be found when requested. If you give a command to load a file from disk, the  Command Interpreter  will pass this instruction to  File Management .  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],File Management  uses its  index to work out exactly where on the disk  the file is stored. e.g. Track 10, Sector 4.  File Management  also  maintains the security of the files .  Included with the file information are the access rights for users. e.g. read only. When a file is to be loaded,  File Management  will pass the information about the  physical location  (e.g. Track 10, Sector 4) to  Input/Output Management . ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],Memory Management  decides  where programs and data are to be placed in RAM.   It allocates  an area of RAM to store the program .  It allocates an  area of RAM to store the data  which the program is processing.    e.g. when you work with Word then you will have a Word document which also requires RAM space It checks to make sure that there is  enough free space  to store the new program and data. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],It makes sure that  programs do not access RAM space allocated to other programs It  frees RAM space  when programs are exited.  It works with  Input/Output Management  to organise a Hard Disk for  virtual memory use . ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],It is the task of  Input/Output Management  to do all the  actual data transfers  and  issue the appropriate control signals  to the peripheral devices.  When a file is to be loaded,  File Management  will pass the information about the  physical location  (e.g. Track 10, Sector 4) to  Input/Output Management . Input/Output Management  has to  send the correct signals  to the Hard Disk to tell it to access Track 10, sector 4, read the data and send it to RAM. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],Different types of  peripheral devices work in different ways . Input/Output Management  has to  know how to communicate with each device  to allow data transfer to take place. Hard Disk Drives, CD Drives, DVD drives, solid state storage devices, inkjet printers, laser printers, CRT monitors, LCD monitors are all very different. Device manufacturers provide  drivers (small programs) which are installed and become part of Input/Output Management.  These allow communication to take place .  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],A process is defined as being “  an instance of a sequence of code in execution ” A modern OS will typically have  several processes on the go at the same time .   e.g. Operating system, Microsoft Word, printing, virus checker. Processes have to  share processor time .  The OS has to  manage the processes  so that they can be carried out  efficiently and effectively . ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],At any give time, the OS has to decide: ,[object Object],The OS keeps a  note of the state of each process  and makes sure that each processor is getting its  fair share of processor time . ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],The  competing processes  require access to resources. Resources include the  processor ,  RAM  and  Input/Output devices . If one process is in the middle of sending data to the hard disk then another process cannot be allowed to start sending its data there too until the first process has completed its task. The OS has to manage the resources by  controlling how and when the processes are to be allowed to use them . ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Utility Software Utility software consists of programs which are designed to  help with the maintenance of the computer  and to ensure sure that it works correctly and efficiently.  The distinction between utility software and functions of the operating system is rather blurred as  modern operating systems are often bundled with utility software . e.g. disk defragmenter, anti-spyware tools, firewall. 1. Operating system 3. Applications software 2. Utility software
Utility Software There are many types of utility software with three examples to be looked at in the Higher course. ,[object Object],[object Object],[object Object],1. Operating system 3. Applications software 2. Utility software
[object Object],A  disk editor  is a utility program that  lets the user read, edit, and write the low-level raw data on a disk . It can be used to  repair/reconstruct damaged files and directories. This type of utility gives a user  complete power over the contents of every block on the disk  and so it requires considerable knowledge and care to use it effectively. It would be very  easy for an inexperienced user to cause serious damage  to the contents of a disk by altering bytes of data on the disk.  ,[object Object],[object Object],[object Object]
[object Object],Magnetic disks are organised so that they store data in  blocks of a fixed size .  Depending on its size,  a file will typically occupy several blocks .  Normally data is stored in  consecutive blocks  on the disk. This makes sense as the Read/Write head moves to the required track and starts to read the consecutive blocks. After a time, the  disk starts to fill up  and files are edited and deleted.  The remaining  free blocks are not necessarily next to each other .  ,[object Object],[object Object],[object Object]
[object Object],When new files are saved the  blocks may be on different parts of the disk .  It then  takes longer to access these files .  This is called  file fragmentation . A defragmenter program is a utility which  reorganises the data on the disk  so that all  blocks for a file are stored together  to improve access times.  This should be done regularly to maintain hard disk performance. ,[object Object],[object Object],[object Object]
[object Object],A virus checker  examines a computer system  to find virus software. A  virus  is a  program  or programming code that  replicates  by being copied or initiating its copying to another program, computer boot sector or document. It can be set to examine any type of  backing storage media , check  email attachments  and  files downloaded  from the internet. A good virus checker will  constantly  work  in the background  checking for signs of virus activity. ,[object Object],[object Object],[object Object]
Viruses Viruses can be classified by the  type of file which they infect . ,[object Object],[object Object],[object Object],[object Object],A  file virus  attaches itself to an  executable file  (program which you can run).  e.g. Word, Photoshop, FIFA09. ,[object Object],A boot sector virus  infects the system files  that your computer uses when the bootstrap loader begins to load in the operating system from disk.
[object Object],[object Object],Viruses A macro is a  saved sequence of commands  or keyboard strokes that can be stored and then recalled.  It  makes use of the programming language  which is contained in some applications. e.g. Visual Basic for Applications (VBA)  ,[object Object],These applications allow you to  embed a macro in a document  and have the macro  execute each time the document is opened .  What is a macro ?
It causes a sequence of actions to be performed automatically when the application is started or something else triggers it.  A macro virus contains instructions which may  damage a document or other software . Once a macro virus gets onto your machine, it can  embed itself in all future documents  you create with the application.  This is how a macro virus  spreads . Viruses ,[object Object],[object Object],[object Object],[object Object]
[object Object],A virus  makes copies of itself  into other program files. Virus program writers can have  fake code within the program   to prevent virus checkers from spotting the patterns  of instructions which are commonly used in virus programs. Virus Code Actions ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],Some virus programs  remain dormant in a computer   until a particular event triggers them  into action.  This can be a certain date, time or the running of a specific application.  This is the term used for when the  virus executes and carries out its intended actions . Virus Code Actions ,[object Object],[object Object],[object Object],[object Object],[object Object]
A  virus  is a program or programming code that  replicates itself  into another program or document.  Virus, Worm & Trojan Horse Are viruses, worms and trojan horses all the same? A  virus cannot be spread without a human action , (such as running an infected program) to keep it going.   NO
A  worm does not alter files  but resides in active memory and replicates. Worms use parts of an operating system that are automatic and usually invisible to the user.  Virus, Worm & Trojan Horse Are viruses, worms and trojan horses all the same? Worms   spread from computer to computer  and, unlike a virus,  have the ability to travel without any help from a person   NO
Due to the copying nature of a worm and its  ability to travel across networks  the end result in most cases is that the worm  consumes too much system memory  (or network bandwidth).  Virus, Worm & Trojan Horse Are viruses, worms and trojan horses all the same? NO This  causes  Web  servers , network servers, and individual computers  to stop responding  and  networks grind to a halt.
At first glance they will  appear to be useful software  but will actually  do damage once installed  or run on your computer.  Virus, Worm & Trojan Horse Are viruses, worms and trojan horses all the same? NO Trojan horses do not reproduce by infecting other files nor do they self-replicate .  The user is  tricked into opening them  because they appear to be receiving legitimate software or files from a legitimate source. 
Some  Trojans  are  designed to be more annoying than malicious  (like changing your desktop, adding silly active desktop icons)  or they can cause serious damage  by deleting files and destroying information on your system.  Trojans can also create a backdoor on your computer  that gives malicious users access to your system, allowing confidential or personal information to be compromised.  Virus, Worm & Trojan Horse Are viruses, worms and trojan horses all the same? NO
Anti-virus software Detection techniques Anti-virus software use  various techniques to detect viruses . ,[object Object],[object Object],[object Object],Four  techniques are covered in the Higher course: ,[object Object]
The anti-virus software scans an uninfected file and  calculates a checksum by adding up all the binary codes  in the file. ,[object Object],[object Object],[object Object],Whenever the file is to be used, the anti-virus software adds up all the binary codes again and the  checksum should match the earlier checksum.  ,[object Object],[object Object],If the checksums don’t match  then it may be that the  file now contains some virus code .
A known virus will contain a  sequence of particular lines of code .  ,[object Object],[object Object],[object Object],Anti-virus software keeps a  database of known virus signatures  and refers to this when looking for viruses. ,[object Object],[object Object],The virus signature database has to be  updated regularly  to make this effective. This sequence is known as its  virus signature . When it finds a macro, program or boot sector file with  code matching one of the known virus signatures  then it has found a virus.
The term  heuristics  comes from a Greek word  meaning ” to find ”.  ,[object Object],[object Object],[object Object],It will  look for certain “behaviour ” in code e.g. ,[object Object],[object Object],This technique involves using knowledge gained from what existing viruses are like and how they act and  using this past knowledge when looking for new viruses . Code triggered by date or time events, code that searches for .exe files(programs), code that tries to write to disk in an unusual way. Heuristic detection makes  intelligent guesses  about what files contain viruses.
This type of anti-virus software is  loaded into RAM on start up  and remains in operation constantly for as long as the computer is left on.  ,[object Object],[object Object],[object Object],[object Object],[object Object],It  monitors all computer activity  and checks programs for infection when they are about to run.  It checks all programs and files being loaded, modified, copied or decompressed to  look for suspicious signs or activity . This  slows down system performance  but  can be very effective  at preventing the spread of viruses.
There are  many standard file formats  for graphic files.  Each has its own advantages and disadvantages and users should  choose formats carefully depending on the purpose  for the graphic file. Graphics file formats Compression Graphics files, particularly bit-mapped graphics, can generate  very large file sizes . It is possible to analyse the data in the file and  cut down on the data which needs to be stored .  This is known as  compression .
Lossless Compression Graphics file formats This technique manages to cut down on the amount of data which needs to be stored but  does not actually lose any of the data .  This means that the  quality of the image  is not  affected .  Compression saves disk space but affects system performance  as saving and loading takes longer due to the extra processing involved. Lossy Compression This technique cuts down on the amount of data which needs to be stored by  discarding some of the data .  This means that the  quality of the image  is  affected .
(Joint Picture Experts Group) Graphics file formats It allows you to save graphics using  24 bit depth  allowing  16 million colours . jpeg It uses  lossy compression  and the user can decide between quality and file size depending on the intended use. ,[object Object],[object Object],[object Object],JPEG is designed for compressing either full-colour or grey-scale images of natural, real-world scenes.   It works well on photographs , naturalistic artwork, and similar material; not so well on lettering, simple cartoons, or line drawings
Graphics file formats ,[object Object],[object Object],[object Object],[object Object],[object Object],Advantages of using JPEG ,[object Object],Disadvantage of using JPEG ,[object Object]
(graphics interchange format) Graphics file formats It only allows you to save graphics using  8 bit depth  allowing  256 colours . gif It uses  lossless compression  and so retains quality but it  cannot achieve as big a reduction  in file size as jpeg can. ,[object Object],[object Object],[object Object],GIF is normally used for  diagrams, buttons , etc. which have a small number of colours.  It can also be used for  simple animations .
(Tagged Image File Format) Graphics file formats It allows you to save graphics using up to  32 bit depth  allowing  4  thousand million colours . TIFF It can use either  lossy or lossless or no compression  and is often used with lossless or no compression when file quality is to be maintained.  This, of course, leads to large file sizes.  ,[object Object],[object Object],[object Object],TIFF is  is an industry standard file format developed for the purpose of storing high-resolution bit-mapped, grey-scale, and colour images.
When choosing software it is important to examine the  system requirements  to make sure that the software will run on the hardware. System requirements will typically include details on: Storage Requirements Memory OS compatibility i.e.  how much RAM  is required for the software. i.e.  how much Hard Disk space  is required for the software. i.e.  which operating system  it requires. Software Compatibility

More Related Content

What's hot

OS - Ch1
OS - Ch1OS - Ch1
OS - Ch1sphs
 
Operating system
Operating systemOperating system
Operating systemsathish sak
 
Operating systems
Operating systemsOperating systems
Operating systemsJoshuaIgo
 
Mca ii os u-1 introduction to os
Mca  ii  os u-1 introduction to osMca  ii  os u-1 introduction to os
Mca ii os u-1 introduction to osRai University
 
What is Operating System, Utility program,virus and anti_virus
What is Operating System, Utility program,virus and anti_virusWhat is Operating System, Utility program,virus and anti_virus
What is Operating System, Utility program,virus and anti_virusmudasserakram
 
Operating system 2
Operating system 2Operating system 2
Operating system 2matsapit
 
Operating system Concepts
Operating system Concepts Operating system Concepts
Operating system Concepts RANVIJAY GAUR
 
Operating System Concepts Presentation
Operating System Concepts PresentationOperating System Concepts Presentation
Operating System Concepts PresentationNitish Jadia
 
Operating system structures
Operating system structuresOperating system structures
Operating system structuresRahul Nagda
 
Operating System a Case Study
Operating System a Case StudyOperating System a Case Study
Operating System a Case Studyijtsrd
 
OS Functions and Services
OS Functions and ServicesOS Functions and Services
OS Functions and Servicessgpraju
 
Some topics of Computer
Some topics of ComputerSome topics of Computer
Some topics of ComputerNazish Jamali
 
MODERN OPERATING SYSTEM
MODERN OPERATING SYSTEMMODERN OPERATING SYSTEM
MODERN OPERATING SYSTEMkhanz2012
 

What's hot (20)

Computer Systems Hardware
Computer Systems   HardwareComputer Systems   Hardware
Computer Systems Hardware
 
Perfect Papers Software
Perfect Papers   SoftwarePerfect Papers   Software
Perfect Papers Software
 
OS - Ch1
OS - Ch1OS - Ch1
OS - Ch1
 
Operating system
Operating systemOperating system
Operating system
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Mca ii os u-1 introduction to os
Mca  ii  os u-1 introduction to osMca  ii  os u-1 introduction to os
Mca ii os u-1 introduction to os
 
02.Os Structure
02.Os Structure02.Os Structure
02.Os Structure
 
What is Operating System, Utility program,virus and anti_virus
What is Operating System, Utility program,virus and anti_virusWhat is Operating System, Utility program,virus and anti_virus
What is Operating System, Utility program,virus and anti_virus
 
Operating system 2
Operating system 2Operating system 2
Operating system 2
 
Operating system Concepts
Operating system Concepts Operating system Concepts
Operating system Concepts
 
Operating System Concepts Presentation
Operating System Concepts PresentationOperating System Concepts Presentation
Operating System Concepts Presentation
 
OPERATING SYSTEM
OPERATING SYSTEMOPERATING SYSTEM
OPERATING SYSTEM
 
Software concepts
Software conceptsSoftware concepts
Software concepts
 
Introduction of operating system
Introduction of operating systemIntroduction of operating system
Introduction of operating system
 
Operating system structures
Operating system structuresOperating system structures
Operating system structures
 
Operating System a Case Study
Operating System a Case StudyOperating System a Case Study
Operating System a Case Study
 
Pankaj kumar
Pankaj kumar Pankaj kumar
Pankaj kumar
 
OS Functions and Services
OS Functions and ServicesOS Functions and Services
OS Functions and Services
 
Some topics of Computer
Some topics of ComputerSome topics of Computer
Some topics of Computer
 
MODERN OPERATING SYSTEM
MODERN OPERATING SYSTEMMODERN OPERATING SYSTEM
MODERN OPERATING SYSTEM
 

Viewers also liked

Learning&Teaching Systems Ppt
Learning&Teaching Systems PptLearning&Teaching Systems Ppt
Learning&Teaching Systems PptKyle
 
Hcs Topic 5 Software V2
Hcs Topic 5 Software V2Hcs Topic 5 Software V2
Hcs Topic 5 Software V2ekul
 
Application software and system software
Application software and system softwareApplication software and system software
Application software and system softwareshujra
 
System software 1ppt(udated)
System software 1ppt(udated)System software 1ppt(udated)
System software 1ppt(udated)uraj007
 
Application Software
Application SoftwareApplication Software
Application SoftwareDasun Hegoda
 
Cmp104 lec 3 component of computer
Cmp104 lec 3 component of computerCmp104 lec 3 component of computer
Cmp104 lec 3 component of computerkapil078
 

Viewers also liked (8)

SYSTEM SOFTWARE
SYSTEM SOFTWARESYSTEM SOFTWARE
SYSTEM SOFTWARE
 
Learning&Teaching Systems Ppt
Learning&Teaching Systems PptLearning&Teaching Systems Ppt
Learning&Teaching Systems Ppt
 
Hcs Topic 5 Software V2
Hcs Topic 5 Software V2Hcs Topic 5 Software V2
Hcs Topic 5 Software V2
 
COMPONENTS OF COMPUTER
COMPONENTS OF COMPUTERCOMPONENTS OF COMPUTER
COMPONENTS OF COMPUTER
 
Application software and system software
Application software and system softwareApplication software and system software
Application software and system software
 
System software 1ppt(udated)
System software 1ppt(udated)System software 1ppt(udated)
System software 1ppt(udated)
 
Application Software
Application SoftwareApplication Software
Application Software
 
Cmp104 lec 3 component of computer
Cmp104 lec 3 component of computerCmp104 lec 3 component of computer
Cmp104 lec 3 component of computer
 

Similar to OS Functions

installing and optimizing operating system software
installing and optimizing operating system software   installing and optimizing operating system software
installing and optimizing operating system software Jaleto Sunkemo
 
L-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.pptL-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.pptKirti Verma
 
The purpose of an operating system
The purpose of an operating systemThe purpose of an operating system
The purpose of an operating system11southongeorgeb
 
The purpose of an operating system
The purpose of an operating systemThe purpose of an operating system
The purpose of an operating system11southongeorgeb
 
The purpose of an operating system
The purpose of an operating systemThe purpose of an operating system
The purpose of an operating system11southongeorgeb
 
Chp 03 - Software PTI - (Shared).pdf
Chp 03 - Software PTI - (Shared).pdfChp 03 - Software PTI - (Shared).pdf
Chp 03 - Software PTI - (Shared).pdfYUSRA FERNANDO
 
Vskills c developer sample material
Vskills c developer sample materialVskills c developer sample material
Vskills c developer sample materialVskills
 
Basics of Operating System
Basics of Operating SystemBasics of Operating System
Basics of Operating SystemSoumit Ghosh
 
Vskills c++ developer sample material
Vskills c++ developer sample materialVskills c++ developer sample material
Vskills c++ developer sample materialVskills
 
Basic operating systems in computer and it's uses
Basic operating systems in computer and it's usesBasic operating systems in computer and it's uses
Basic operating systems in computer and it's usesSurya Vishnuram
 

Similar to OS Functions (20)

unit 3.pptx
unit 3.pptxunit 3.pptx
unit 3.pptx
 
installing and optimizing operating system software
installing and optimizing operating system software   installing and optimizing operating system software
installing and optimizing operating system software
 
SOFTWARE PARADIGM
SOFTWARE PARADIGMSOFTWARE PARADIGM
SOFTWARE PARADIGM
 
unit 3.ppt
unit 3.pptunit 3.ppt
unit 3.ppt
 
L-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.pptL-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.ppt
 
System software vt
System software vtSystem software vt
System software vt
 
Technical Implementation: Software
Technical Implementation: SoftwareTechnical Implementation: Software
Technical Implementation: Software
 
The purpose of an operating system
The purpose of an operating systemThe purpose of an operating system
The purpose of an operating system
 
The purpose of an operating system
The purpose of an operating systemThe purpose of an operating system
The purpose of an operating system
 
operating system structure
operating system structureoperating system structure
operating system structure
 
Operating system notes pdf
Operating system notes pdfOperating system notes pdf
Operating system notes pdf
 
The purpose of an operating system
The purpose of an operating systemThe purpose of an operating system
The purpose of an operating system
 
Software
SoftwareSoftware
Software
 
Software
SoftwareSoftware
Software
 
Chp 03 - Software PTI - (Shared).pdf
Chp 03 - Software PTI - (Shared).pdfChp 03 - Software PTI - (Shared).pdf
Chp 03 - Software PTI - (Shared).pdf
 
Vskills c developer sample material
Vskills c developer sample materialVskills c developer sample material
Vskills c developer sample material
 
Basics of Operating System
Basics of Operating SystemBasics of Operating System
Basics of Operating System
 
Os by nishant raghav
Os by nishant raghavOs by nishant raghav
Os by nishant raghav
 
Vskills c++ developer sample material
Vskills c++ developer sample materialVskills c++ developer sample material
Vskills c++ developer sample material
 
Basic operating systems in computer and it's uses
Basic operating systems in computer and it's usesBasic operating systems in computer and it's uses
Basic operating systems in computer and it's uses
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

OS Functions

  • 1. Topic 5 - Software Computer hardware would be useless without software , the lists of instructions which tell the hardware what to do. Computers require various types of software to make them useful. These can be classified as follows: 1. Operating System 3. Applications software 2. Utility software
  • 2. Operating System The operating system(OS) is the piece of software required by the computer to make sure that it works correctly and efficiently. It manages the computer and allows the user to communicate with the hardware . Storing the OS on disk means that it can be easily updated . Windows Vista and XP are updated on a daily basis. Modern operating systems are typically stored on Hard disk and loaded into RAM when the computer is switched on. 1. Operating system 3. Applications software 2. Utility software
  • 3. The bootstrap loader The bootstrap loader is a small but very important part of the OS which is permanently stored in ROM . When the computer is first switched on the bootstrap loader starts to run. It checks the RAM and input/output devices to make sure that they are working and then locates the OS on backing storage , usually on Hard disk but could be on CD or even a memory stick. It then loads the OS into RAM and the OS takes over control. 1. Operating system 3. Applications software 2. Utility software
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Utility Software Utility software consists of programs which are designed to help with the maintenance of the computer and to ensure sure that it works correctly and efficiently. The distinction between utility software and functions of the operating system is rather blurred as modern operating systems are often bundled with utility software . e.g. disk defragmenter, anti-spyware tools, firewall. 1. Operating system 3. Applications software 2. Utility software
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. A virus is a program or programming code that replicates itself into another program or document. Virus, Worm & Trojan Horse Are viruses, worms and trojan horses all the same? A virus cannot be spread without a human action , (such as running an infected program) to keep it going.  NO
  • 27. A worm does not alter files but resides in active memory and replicates. Worms use parts of an operating system that are automatic and usually invisible to the user. Virus, Worm & Trojan Horse Are viruses, worms and trojan horses all the same? Worms spread from computer to computer and, unlike a virus, have the ability to travel without any help from a person NO
  • 28. Due to the copying nature of a worm and its ability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth). Virus, Worm & Trojan Horse Are viruses, worms and trojan horses all the same? NO This causes Web servers , network servers, and individual computers to stop responding and networks grind to a halt.
  • 29. At first glance they will appear to be useful software but will actually do damage once installed or run on your computer.  Virus, Worm & Trojan Horse Are viruses, worms and trojan horses all the same? NO Trojan horses do not reproduce by infecting other files nor do they self-replicate . The user is tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. 
  • 30. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans can also create a backdoor on your computer that gives malicious users access to your system, allowing confidential or personal information to be compromised. Virus, Worm & Trojan Horse Are viruses, worms and trojan horses all the same? NO
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36. There are many standard file formats for graphic files. Each has its own advantages and disadvantages and users should choose formats carefully depending on the purpose for the graphic file. Graphics file formats Compression Graphics files, particularly bit-mapped graphics, can generate very large file sizes . It is possible to analyse the data in the file and cut down on the data which needs to be stored . This is known as compression .
  • 37. Lossless Compression Graphics file formats This technique manages to cut down on the amount of data which needs to be stored but does not actually lose any of the data . This means that the quality of the image is not affected . Compression saves disk space but affects system performance as saving and loading takes longer due to the extra processing involved. Lossy Compression This technique cuts down on the amount of data which needs to be stored by discarding some of the data . This means that the quality of the image is affected .
  • 38.
  • 39.
  • 40.
  • 41.
  • 42. When choosing software it is important to examine the system requirements to make sure that the software will run on the hardware. System requirements will typically include details on: Storage Requirements Memory OS compatibility i.e. how much RAM is required for the software. i.e. how much Hard Disk space is required for the software. i.e. which operating system it requires. Software Compatibility