SlideShare uma empresa Scribd logo
1 de 50
System Software
• System software consists of the programs that
control or maintain the operations of the
computer and its devices
Discovering Computers 2012: Chapter 8 1Page 398
Operating
systems
Utility
Programs
Operating Systems
• An operating system (OS) is a set of programs containing
instructions that work together to coordinate all the
activities among computer hardware resources
Discovering Computers 2012: Chapter 8 2Pages 398 - 399
Start and shut
down a
computer
Provide a user
interface
Manage
programs
Manage
memory
Coordinate
tasks
Configure
devices
Establish an
Internet
connection
Monitor
performance
Provide
utilities
Automatically
update
Control a
network
Administer
security
Operating Systems
Discovering Computers 2012: Chapter 8 3Pages 398 – 399
Figure 8-1
Operating System Functions
• The process of starting or restarting a computer is
called booting
Discovering Computers 2012: Chapter 8 4Page 400
Figure 8-2
Cold boot
• Turning on
a computer
that has
been
powered off
completely
Warm boot
• Using the
operating
system to
restart a
computer
Operating System Functions
Discovering Computers 2012: Chapter 8 5Page 401
Figure 8-3
Operating System Functions
A boot drive is the drive from
which your computer starts
•You can boot from a boot disk
•A recovery disk contains a few system
files that will start the computer
Discovering Computers 2012: Chapter 8 6Page 402
Operating System Functions
• An operating system includes various shut down
options
Discovering Computers 2012: Chapter 8 7Page 402
Sleep mode saves any open
documents and programs to
RAM, turns off all unneeded
functions, and then places
the computer in a low-
power state
Hibernate saves any open
documents and programs to
a hard disk before removing
power from the computer
Operating System Functions
• A user interface
controls how you
enter data and
instructions and
how information is
displayed on the
screen
• With a graphical
user interface
(GUI), you interact
with menus and
visual images
Discovering Computers 2012: Chapter 8
8Pages 402 – 403
Figure 8-4
Operating System Functions
• With a command-line interface, a user uses the
keyboard to enter data and instructions
Discovering Computers 2012: Chapter 8 9Page 403
Figure 8-5
Operating System Functions
• How an operating system handles programs
directly affects your productivity
Discovering Computers 2012: Chapter 8 10Pages 404 - 405
Single user and
multiuser
Single tasking
and
multitasking
Foreground and
background
Preemptive
multitasking
Multiprocessing
Operating System Functions
Discovering Computers 2012: Chapter 8 11Page 404
Figure 8-6
Operating System Functions
• Memory management optimizes the use of RAM
• Virtual memory is a portion of a storage medium
functioning as additional RAM
Discovering Computers 2012: Chapter 8 12Page 406
Figure 8-8
Operating System Functions
• The operating system determines the order in
which tasks are processed
Discovering Computers 2012: Chapter 8 13Page 407
Figure 8-9
Operating System Functions
Discovering Computers 2012: Chapter 8 14Page 408
Operating System Functions
• Operating systems typically provide a means to
establish Internet connections
Discovering Computers 2012: Chapter 8 15Page 408
Figure 8-10
Operating System Functions
• A performance monitor is a program that
assesses and reports information about various
computer resources and devices
Discovering Computers 2012: Chapter 8 16Pages 408 – 409
Figure 8-11
Operating System Functions
• Operating systems often provide users with the
capability of:
Discovering Computers 2012: Chapter 8 17Page 409
Managing files
Searching for
files
Viewing
images
Securing a
computer
Uninstalling
programs
Cleaning up
disks
Defragmenting
disks
Diagnosing
problems
Backing up
files and disks
Setting up
screen savers
Operating System Functions
• Automatic update automatically provides updates
to the program
Discovering Computers 2012: Chapter 8 18Page 409
Figure 8-12
Operating System Functions
• Some operating systems
are designed to work
with a server on a
network
• A server operating
system organizes and
coordinates how
multiple users access
and share resources on
a network
• A network
administrator uses the
server operating system
to:
– Add and remove users,
computers, and other
devices
– Install software and
administer network
security
Discovering Computers 2012: Chapter 8
19Page 410
Operating System Functions
• Each user has a user
account
– A user name, or user ID,
identifies a specific user
– A password is a private
combination of
characters associated
with the user name
Discovering Computers 2012: Chapter 8
20Page 410
Figure 8-13
Types of Operating Systems
Discovering Computers 2012: Chapter 8 21Page 412
Figure 8-14
Stand-Alone Operating Systems
• A stand-alone operating system is a complete
operating system that works on a desktop
computer, notebook computer, or mobile
computing device
Discovering Computers 2012: Chapter 8 22Page 412
Windows
7
Mac OS X
UNIX Linux
Stand-Alone Operating Systems
• Windows 7 is Microsoft’s fastest, most efficient
operating system to date and is available in
multiple editions:
Discovering Computers 2012: Chapter 8 23Pages 413 - 414
Windows 7
Starter
Windows 7
Home
Premium
Windows 7
Ultimate
Windows 7
Professional
Stand-Alone Operating Systems
• Windows 7 provides programs such as:
Discovering Computers 2012: Chapter 8 24Page 414
Windows
Firewall
Windows DVD
Maker
Windows
Media Player
Desktop
Gadget Gallery
Stand-Alone Operating Systems
Discovering Computers 2012: Chapter 8
25Page 414
Figures 8-16 – 8-17
Stand-Alone Operating Systems
Discovering Computers 2012: Chapter 8 26Page 415
Figure 8-18
Stand-Alone Operating Systems
• The Macintosh operating system has set the
standard for operating system ease of use
• Latest version is Mac OS X
Discovering Computers 2012: Chapter 8 27Page 415
Figure 8-19
Stand-Alone Operating Systems
UNIX is a multitasking
operating system developed
in the early 1970s
Linux is an open-source,
popular, multitasking UNIX-
type operating system
Discovering Computers 2012: Chapter 8 28Pages 416 – 417
Figures 8-20 – 8-21
Server Operating Systems
Windows
Server 2008
UNIX Linux
Solaris NetWare
Discovering Computers 2012: Chapter 8 29Pages 417 - 418
Server Operating Systems
• Windows Server 2008 is an upgrade to Windows
Server 2003
– Part of the Windows Server 2008 family
– Multiple editions
• Most editions include Hyper-V, a virtualization
technology
– Virtualization is the practice of sharing or pooling computing
resources
Discovering Computers 2012: Chapter 8 30Pages 417 - 418
Embedded Operating Systems
• An embedded operating system resides on a ROM chip
on a mobile device or consumer electronic device
Discovering Computers 2012: Chapter 8 31Pages 418 - 420
Windows
Embedded CE
Windows
Phone 7
Palm OS iPhone OS
BlackBerry
Google
Android
Embedded
Linux
Symbian OS
Embedded Operating Systems
Discovering Computers 2012: Chapter 8 32Pages 419 – 420
Figures 8-22 – 8-26
Utility Programs
• A utility program is a type of system software that
allows a user to perform maintenance-type tasks
Discovering Computers 2012: Chapter 8 33Page 421
Figure 8-27
Utility Programs
• A file manager is a
utility that performs
functions related to file
management
– Displaying a list of files
– Organizing files in folders
– Copying, renaming,
deleting, moving, and
sorting files and folders
– Creating shortcuts
Discovering Computers 2012: Chapter 8
34Page 422
Figure 8-28
Utility Programs
• A search utility is a program that attempts to
locate a file on your computer based on criteria
you specify
Discovering Computers 2012: Chapter 8 35Page 422
Figure 8-29
Utility Programs
• An image viewer allows
users to display, copy,
and print the contents
of a graphics file
• An uninstaller removes
a program, as well as
any associated entries
in the system files
Discovering Computers 2012: Chapter 8
36Page 423
Figure 8-30
Utility Programs
• A disk cleanup utility searches for and removes
unnecessary files
– Downloaded program
files
– Temporary Internet
files
– Deleted files
– Unused program
files
Discovering Computers 2012: Chapter 8 37Page 423
Figure 8-31
Utility Programs
• A disk defragmenter reorganizes the files and
unused space on a computer’s hard disk so that the
operating system accesses data more quickly and
programs run faster
– Defragmenting
Discovering Computers 2012: Chapter 8
38Pages 423 – 424
Figure 8-32
Utility Programs
• A backup utility allows
users to copy files to
another storage
medium
• A restore utility
reverses the process
and returns backed up
files to their original
form
Discovering Computers 2012: Chapter 8
39Page 424
Figure 8-33
Utility Programs
• A screen saver causes a
display device’s screen
to show a moving image
or blank screen if no
activity occurs for a
specified time
• A personal firewall
detects and protects a
personal computer
from unauthorized
intrusions
Discovering Computers 2012: Chapter 8
40Page 425
Figures 8-34 – 8-35
Utility Programs
A virus describes a potentially damaging computer
program that affects a computer negatively
A worm copies
itself
repeatedly in
memory or
over a network
A Trojan horse
hides within or
looks like a
legitimate
program
An antivirus
program
protects a
computer
against viruses
Discovering Computers 2012: Chapter 8 41Pages 425 - 426
Utility Programs
Discovering Computers 2012: Chapter 8 42Pages 425 – 426
Figures 8-36 – 8-37
Utility Programs
Spyware is a program placed on
a computer without the user’s
knowledge that secretly collects
information about the user
• A spyware remover detects
and deletes spyware and
other similar programs
Adware displays an online
advertisement in a banner or
pop-up window
• An adware remover is a
program that detects and
deletes adware
Discovering Computers 2012: Chapter 8 43Page 426
Utility Programs
• Filters are programs that remove or block certain
items from being displayed
Discovering Computers 2012: Chapter 8 44Pages 426 - 427
Web filtering
software
Anti-spam
programs
Phishing
filters
Pop-up
blockers
Utility Programs
• A file compression utility shrinks the size of a file(s)
– Compressing files frees up room on the storage media
– Two types of compression
• Lossy
• Lossless
• Compressed files sometimes are called zipped files
– Can be uncompressed
Discovering Computers 2012: Chapter 8 45Page 427
Utility Programs
• A media player allows you to view images and
animation, listen to audio, and watch video files
on your computer
Discovering Computers 2012: Chapter 8 46Page 427
Figure 8-38
Utility Programs
• Disc burning software
writes text, graphics,
audio, and video files
on a recordable or
rewritable optical disc
Discovering Computers 2012: Chapter 8
47Page 428
Figure 8-39
Utility Programs
• A personal computer
maintenance utility
identifies and fixes
operating system
problems, detects and
repairs disk problems,
and includes the
capability of improving
a computer’s
performance
Discovering Computers 2012: Chapter 8
48Page 428
Figure 8-40
Summary
Definition of an
operating system
Functions common to
most operating systems
Variety of stand-alone
operating systems,
server operating
systems, and embedded
operating systems
Several utility programs
Discovering Computers 2012: Chapter 8 49Page 429
Your Interactive Guide
to the Digital World
Discovering
Computers 2012
Chapter 8 Complete

Mais conteúdo relacionado

Mais procurados

DTCC Chapter 1 - Introduction to Computers
DTCC Chapter 1 - Introduction to ComputersDTCC Chapter 1 - Introduction to Computers
DTCC Chapter 1 - Introduction to ComputersJan Fisher
 
Discovering Computers: Chapter 06
Discovering Computers: Chapter 06Discovering Computers: Chapter 06
Discovering Computers: Chapter 06Anna Stirling
 
Discovering Computers: Chapter 05
Discovering Computers: Chapter 05Discovering Computers: Chapter 05
Discovering Computers: Chapter 05Anna Stirling
 
Discovering Computers: Chapter 09
Discovering Computers: Chapter 09Discovering Computers: Chapter 09
Discovering Computers: Chapter 09Anna Stirling
 
Discovering Computers: Chapter 03
Discovering Computers: Chapter 03Discovering Computers: Chapter 03
Discovering Computers: Chapter 03Anna Stirling
 
Chapter 10 database management
Chapter 10   database managementChapter 10   database management
Chapter 10 database managementhaider ali
 
Operating Systems Basics
Operating Systems BasicsOperating Systems Basics
Operating Systems Basicsnishantsri
 
Discovering Computers: Chapter 08
Discovering Computers: Chapter 08Discovering Computers: Chapter 08
Discovering Computers: Chapter 08Anna Stirling
 
Beginning computer basics
Beginning computer basics Beginning computer basics
Beginning computer basics Vicente Antofina
 
Discovering Computers: Chapter 01
Discovering Computers: Chapter 01Discovering Computers: Chapter 01
Discovering Computers: Chapter 01Anna Stirling
 
Chapter 4 Programs and Apps
Chapter 4 Programs and AppsChapter 4 Programs and Apps
Chapter 4 Programs and Appsxtin101
 
CH08-Types of Utility programs and Operating System
CH08-Types of Utility programs and Operating SystemCH08-Types of Utility programs and Operating System
CH08-Types of Utility programs and Operating SystemSukanya Ben
 
hardware and software upgrade
hardware and software upgradehardware and software upgrade
hardware and software upgradeDana Popescu
 
Windows Operating System
Windows Operating SystemWindows Operating System
Windows Operating Systemzaibs7242
 
Chapter 2 the internet and world wide web
Chapter 2   the internet and world wide webChapter 2   the internet and world wide web
Chapter 2 the internet and world wide webhaider ali
 
Windows 2008 basics
Windows 2008 basicsWindows 2008 basics
Windows 2008 basicsanilinvns
 
Chapter 1 introduction to computers
Chapter 1   introduction to computersChapter 1   introduction to computers
Chapter 1 introduction to computershaider ali
 
Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)Tuan Yang
 

Mais procurados (20)

DTCC Chapter 1 - Introduction to Computers
DTCC Chapter 1 - Introduction to ComputersDTCC Chapter 1 - Introduction to Computers
DTCC Chapter 1 - Introduction to Computers
 
Discovering Computers: Chapter 06
Discovering Computers: Chapter 06Discovering Computers: Chapter 06
Discovering Computers: Chapter 06
 
Discovering Computers: Chapter 05
Discovering Computers: Chapter 05Discovering Computers: Chapter 05
Discovering Computers: Chapter 05
 
Chapter 04
Chapter 04Chapter 04
Chapter 04
 
Discovering Computers: Chapter 09
Discovering Computers: Chapter 09Discovering Computers: Chapter 09
Discovering Computers: Chapter 09
 
Discovering Computers: Chapter 03
Discovering Computers: Chapter 03Discovering Computers: Chapter 03
Discovering Computers: Chapter 03
 
Chapter 10 database management
Chapter 10   database managementChapter 10   database management
Chapter 10 database management
 
Operating Systems Basics
Operating Systems BasicsOperating Systems Basics
Operating Systems Basics
 
Discovering Computers: Chapter 08
Discovering Computers: Chapter 08Discovering Computers: Chapter 08
Discovering Computers: Chapter 08
 
Beginning computer basics
Beginning computer basics Beginning computer basics
Beginning computer basics
 
Discovering Computers: Chapter 01
Discovering Computers: Chapter 01Discovering Computers: Chapter 01
Discovering Computers: Chapter 01
 
Chapter 4 Programs and Apps
Chapter 4 Programs and AppsChapter 4 Programs and Apps
Chapter 4 Programs and Apps
 
CH08-Types of Utility programs and Operating System
CH08-Types of Utility programs and Operating SystemCH08-Types of Utility programs and Operating System
CH08-Types of Utility programs and Operating System
 
hardware and software upgrade
hardware and software upgradehardware and software upgrade
hardware and software upgrade
 
Windows Operating System
Windows Operating SystemWindows Operating System
Windows Operating System
 
Computer systems
Computer systemsComputer systems
Computer systems
 
Chapter 2 the internet and world wide web
Chapter 2   the internet and world wide webChapter 2   the internet and world wide web
Chapter 2 the internet and world wide web
 
Windows 2008 basics
Windows 2008 basicsWindows 2008 basics
Windows 2008 basics
 
Chapter 1 introduction to computers
Chapter 1   introduction to computersChapter 1   introduction to computers
Chapter 1 introduction to computers
 
Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)
 

Semelhante a Chapter 8 operating systems and utility programs

Operating systems
Operating systemsOperating systems
Operating systemsvicky vicky
 
Utility-Softwares.pptxgdgfgdgdfgdfggfgfd
Utility-Softwares.pptxgdgfgdgdfgdfggfgfdUtility-Softwares.pptxgdgfgdgdfgdfggfgfd
Utility-Softwares.pptxgdgfgdgdfgdfggfgfdghioredondo0
 
CH. 4 Operating Systems and Utility Programs
CH. 4 Operating Systems and Utility ProgramsCH. 4 Operating Systems and Utility Programs
CH. 4 Operating Systems and Utility Programsmalik1972
 
Week2 chapter 02_2.6.1.1_os_2015
Week2 chapter 02_2.6.1.1_os_2015Week2 chapter 02_2.6.1.1_os_2015
Week2 chapter 02_2.6.1.1_os_2015indranirishi
 
Week8 chapter 02_2.6.1.1_os_2016
Week8 chapter 02_2.6.1.1_os_2016Week8 chapter 02_2.6.1.1_os_2016
Week8 chapter 02_2.6.1.1_os_2016dilahkmpk
 
Operating System And Utility Program
Operating System And Utility ProgramOperating System And Utility Program
Operating System And Utility ProgramVicq Chibi'sLover
 
Chapter 05 os dan utility program csc & tts
Chapter 05 os dan utility program csc & ttsChapter 05 os dan utility program csc & tts
Chapter 05 os dan utility program csc & ttsHisyam Rosly
 
W2 q3-function-of-operating-system (2)
W2 q3-function-of-operating-system (2)W2 q3-function-of-operating-system (2)
W2 q3-function-of-operating-system (2)Sonnie Bars
 
Chapter 09 Operating Systems
Chapter 09 Operating SystemsChapter 09 Operating Systems
Chapter 09 Operating Systemsxtin101
 
Lecture-3: Operating System & Application Softwares
Lecture-3: Operating System & Application SoftwaresLecture-3: Operating System & Application Softwares
Lecture-3: Operating System & Application SoftwaresMubashir Ali
 
PDT DC015 Chapter 2 Computer System 2017/2018 (m)
PDT DC015 Chapter 2 Computer System 2017/2018 (m)PDT DC015 Chapter 2 Computer System 2017/2018 (m)
PDT DC015 Chapter 2 Computer System 2017/2018 (m)Fizaril Amzari Omar
 
PST SC015 Chapter 2 Computer System (IV) 2017/2018
PST SC015 Chapter 2 Computer System (IV) 2017/2018PST SC015 Chapter 2 Computer System (IV) 2017/2018
PST SC015 Chapter 2 Computer System (IV) 2017/2018Fizaril Amzari Omar
 
BAIT1003 Chapter 6
BAIT1003 Chapter 6BAIT1003 Chapter 6
BAIT1003 Chapter 6limsh
 
Operating System & Utility Programme
Operating System & Utility ProgrammeOperating System & Utility Programme
Operating System & Utility Programmebbp2067
 
Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)ella dimaiwat
 

Semelhante a Chapter 8 operating systems and utility programs (20)

Operating systems
Operating systemsOperating systems
Operating systems
 
Utility-Softwares.pptxgdgfgdgdfgdfggfgfd
Utility-Softwares.pptxgdgfgdgdfgdfggfgfdUtility-Softwares.pptxgdgfgdgdfgdfggfgfd
Utility-Softwares.pptxgdgfgdgdfgdfggfgfd
 
CH. 4 Operating Systems and Utility Programs
CH. 4 Operating Systems and Utility ProgramsCH. 4 Operating Systems and Utility Programs
CH. 4 Operating Systems and Utility Programs
 
Week2 chapter 02_2.6.1.1_os_2015
Week2 chapter 02_2.6.1.1_os_2015Week2 chapter 02_2.6.1.1_os_2015
Week2 chapter 02_2.6.1.1_os_2015
 
Week8 chapter 02_2.6.1.1_os_2016
Week8 chapter 02_2.6.1.1_os_2016Week8 chapter 02_2.6.1.1_os_2016
Week8 chapter 02_2.6.1.1_os_2016
 
Week 6
Week 6Week 6
Week 6
 
Operating System And Utility Program
Operating System And Utility ProgramOperating System And Utility Program
Operating System And Utility Program
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Chapter_09_OS.pdf
Chapter_09_OS.pdfChapter_09_OS.pdf
Chapter_09_OS.pdf
 
Chapter 05 os dan utility program csc & tts
Chapter 05 os dan utility program csc & ttsChapter 05 os dan utility program csc & tts
Chapter 05 os dan utility program csc & tts
 
W2 q3-function-of-operating-system (2)
W2 q3-function-of-operating-system (2)W2 q3-function-of-operating-system (2)
W2 q3-function-of-operating-system (2)
 
Chapter 09 Operating Systems
Chapter 09 Operating SystemsChapter 09 Operating Systems
Chapter 09 Operating Systems
 
Lecture-3: Operating System & Application Softwares
Lecture-3: Operating System & Application SoftwaresLecture-3: Operating System & Application Softwares
Lecture-3: Operating System & Application Softwares
 
PDT DC015 Chapter 2 Computer System 2017/2018 (m)
PDT DC015 Chapter 2 Computer System 2017/2018 (m)PDT DC015 Chapter 2 Computer System 2017/2018 (m)
PDT DC015 Chapter 2 Computer System 2017/2018 (m)
 
operating system
operating systemoperating system
operating system
 
PST SC015 Chapter 2 Computer System (IV) 2017/2018
PST SC015 Chapter 2 Computer System (IV) 2017/2018PST SC015 Chapter 2 Computer System (IV) 2017/2018
PST SC015 Chapter 2 Computer System (IV) 2017/2018
 
BAIT1003 Chapter 6
BAIT1003 Chapter 6BAIT1003 Chapter 6
BAIT1003 Chapter 6
 
Operating System & Utility Programme
Operating System & Utility ProgrammeOperating System & Utility Programme
Operating System & Utility Programme
 
Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)
 
Chapter08
Chapter08Chapter08
Chapter08
 

Mais de haider ali

Upwork freelancer guide
Upwork freelancer guideUpwork freelancer guide
Upwork freelancer guidehaider ali
 
Chapter 13 programming languages and program development
Chapter 13   programming languages and program developmentChapter 13   programming languages and program development
Chapter 13 programming languages and program developmenthaider ali
 
Chapter 12 information system development
Chapter 12   information system developmentChapter 12   information system development
Chapter 12 information system developmenthaider ali
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacyhaider ali
 
Chapter 9 communications and networks
Chapter 9   communications and networksChapter 9   communications and networks
Chapter 9 communications and networkshaider ali
 
Chapter 3 application software
Chapter 3   application softwareChapter 3   application software
Chapter 3 application softwarehaider ali
 
Modalauxiliaries 1
Modalauxiliaries 1Modalauxiliaries 1
Modalauxiliaries 1haider ali
 
Teaching tenses
Teaching tensesTeaching tenses
Teaching tenseshaider ali
 
English parts of speech
English parts of speech English parts of speech
English parts of speech haider ali
 
Parts of speech
Parts of speechParts of speech
Parts of speechhaider ali
 
Fundamentals of information technology
Fundamentals       of          information   technologyFundamentals       of          information   technology
Fundamentals of information technologyhaider ali
 
How to configure an operating system
How to configure an operating systemHow to configure an operating system
How to configure an operating systemhaider ali
 
Parts of-speech
Parts of-speech Parts of-speech
Parts of-speech haider ali
 
Communication devices
Communication devicesCommunication devices
Communication deviceshaider ali
 
Fundamental of Information Technology
Fundamental of Information Technology Fundamental of Information Technology
Fundamental of Information Technology haider ali
 
Business in education
Business in educationBusiness in education
Business in educationhaider ali
 
NETWORK Topologies
NETWORK TopologiesNETWORK Topologies
NETWORK Topologieshaider ali
 
Non – verbal communication (1)
Non – verbal communication (1)Non – verbal communication (1)
Non – verbal communication (1)haider ali
 

Mais de haider ali (20)

Upwork freelancer guide
Upwork freelancer guideUpwork freelancer guide
Upwork freelancer guide
 
Chapter 13 programming languages and program development
Chapter 13   programming languages and program developmentChapter 13   programming languages and program development
Chapter 13 programming languages and program development
 
Chapter 12 information system development
Chapter 12   information system developmentChapter 12   information system development
Chapter 12 information system development
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacy
 
Chapter 9 communications and networks
Chapter 9   communications and networksChapter 9   communications and networks
Chapter 9 communications and networks
 
Chapter 3 application software
Chapter 3   application softwareChapter 3   application software
Chapter 3 application software
 
Modalauxiliaries 1
Modalauxiliaries 1Modalauxiliaries 1
Modalauxiliaries 1
 
Teaching tenses
Teaching tensesTeaching tenses
Teaching tenses
 
Tenses
TensesTenses
Tenses
 
English parts of speech
English parts of speech English parts of speech
English parts of speech
 
Parts of speech
Parts of speechParts of speech
Parts of speech
 
Fundamentals of information technology
Fundamentals       of          information   technologyFundamentals       of          information   technology
Fundamentals of information technology
 
How to configure an operating system
How to configure an operating systemHow to configure an operating system
How to configure an operating system
 
Parts of-speech
Parts of-speech Parts of-speech
Parts of-speech
 
Communication devices
Communication devicesCommunication devices
Communication devices
 
Fundamental of Information Technology
Fundamental of Information Technology Fundamental of Information Technology
Fundamental of Information Technology
 
Business in education
Business in educationBusiness in education
Business in education
 
NETWORK Topologies
NETWORK TopologiesNETWORK Topologies
NETWORK Topologies
 
Non – verbal communication (1)
Non – verbal communication (1)Non – verbal communication (1)
Non – verbal communication (1)
 
Meeting
MeetingMeeting
Meeting
 

Último

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Chapter 8 operating systems and utility programs

  • 1. System Software • System software consists of the programs that control or maintain the operations of the computer and its devices Discovering Computers 2012: Chapter 8 1Page 398 Operating systems Utility Programs
  • 2. Operating Systems • An operating system (OS) is a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources Discovering Computers 2012: Chapter 8 2Pages 398 - 399 Start and shut down a computer Provide a user interface Manage programs Manage memory Coordinate tasks Configure devices Establish an Internet connection Monitor performance Provide utilities Automatically update Control a network Administer security
  • 3. Operating Systems Discovering Computers 2012: Chapter 8 3Pages 398 – 399 Figure 8-1
  • 4. Operating System Functions • The process of starting or restarting a computer is called booting Discovering Computers 2012: Chapter 8 4Page 400 Figure 8-2 Cold boot • Turning on a computer that has been powered off completely Warm boot • Using the operating system to restart a computer
  • 5. Operating System Functions Discovering Computers 2012: Chapter 8 5Page 401 Figure 8-3
  • 6. Operating System Functions A boot drive is the drive from which your computer starts •You can boot from a boot disk •A recovery disk contains a few system files that will start the computer Discovering Computers 2012: Chapter 8 6Page 402
  • 7. Operating System Functions • An operating system includes various shut down options Discovering Computers 2012: Chapter 8 7Page 402 Sleep mode saves any open documents and programs to RAM, turns off all unneeded functions, and then places the computer in a low- power state Hibernate saves any open documents and programs to a hard disk before removing power from the computer
  • 8. Operating System Functions • A user interface controls how you enter data and instructions and how information is displayed on the screen • With a graphical user interface (GUI), you interact with menus and visual images Discovering Computers 2012: Chapter 8 8Pages 402 – 403 Figure 8-4
  • 9. Operating System Functions • With a command-line interface, a user uses the keyboard to enter data and instructions Discovering Computers 2012: Chapter 8 9Page 403 Figure 8-5
  • 10. Operating System Functions • How an operating system handles programs directly affects your productivity Discovering Computers 2012: Chapter 8 10Pages 404 - 405 Single user and multiuser Single tasking and multitasking Foreground and background Preemptive multitasking Multiprocessing
  • 11. Operating System Functions Discovering Computers 2012: Chapter 8 11Page 404 Figure 8-6
  • 12. Operating System Functions • Memory management optimizes the use of RAM • Virtual memory is a portion of a storage medium functioning as additional RAM Discovering Computers 2012: Chapter 8 12Page 406 Figure 8-8
  • 13. Operating System Functions • The operating system determines the order in which tasks are processed Discovering Computers 2012: Chapter 8 13Page 407 Figure 8-9
  • 14. Operating System Functions Discovering Computers 2012: Chapter 8 14Page 408
  • 15. Operating System Functions • Operating systems typically provide a means to establish Internet connections Discovering Computers 2012: Chapter 8 15Page 408 Figure 8-10
  • 16. Operating System Functions • A performance monitor is a program that assesses and reports information about various computer resources and devices Discovering Computers 2012: Chapter 8 16Pages 408 – 409 Figure 8-11
  • 17. Operating System Functions • Operating systems often provide users with the capability of: Discovering Computers 2012: Chapter 8 17Page 409 Managing files Searching for files Viewing images Securing a computer Uninstalling programs Cleaning up disks Defragmenting disks Diagnosing problems Backing up files and disks Setting up screen savers
  • 18. Operating System Functions • Automatic update automatically provides updates to the program Discovering Computers 2012: Chapter 8 18Page 409 Figure 8-12
  • 19. Operating System Functions • Some operating systems are designed to work with a server on a network • A server operating system organizes and coordinates how multiple users access and share resources on a network • A network administrator uses the server operating system to: – Add and remove users, computers, and other devices – Install software and administer network security Discovering Computers 2012: Chapter 8 19Page 410
  • 20. Operating System Functions • Each user has a user account – A user name, or user ID, identifies a specific user – A password is a private combination of characters associated with the user name Discovering Computers 2012: Chapter 8 20Page 410 Figure 8-13
  • 21. Types of Operating Systems Discovering Computers 2012: Chapter 8 21Page 412 Figure 8-14
  • 22. Stand-Alone Operating Systems • A stand-alone operating system is a complete operating system that works on a desktop computer, notebook computer, or mobile computing device Discovering Computers 2012: Chapter 8 22Page 412 Windows 7 Mac OS X UNIX Linux
  • 23. Stand-Alone Operating Systems • Windows 7 is Microsoft’s fastest, most efficient operating system to date and is available in multiple editions: Discovering Computers 2012: Chapter 8 23Pages 413 - 414 Windows 7 Starter Windows 7 Home Premium Windows 7 Ultimate Windows 7 Professional
  • 24. Stand-Alone Operating Systems • Windows 7 provides programs such as: Discovering Computers 2012: Chapter 8 24Page 414 Windows Firewall Windows DVD Maker Windows Media Player Desktop Gadget Gallery
  • 25. Stand-Alone Operating Systems Discovering Computers 2012: Chapter 8 25Page 414 Figures 8-16 – 8-17
  • 26. Stand-Alone Operating Systems Discovering Computers 2012: Chapter 8 26Page 415 Figure 8-18
  • 27. Stand-Alone Operating Systems • The Macintosh operating system has set the standard for operating system ease of use • Latest version is Mac OS X Discovering Computers 2012: Chapter 8 27Page 415 Figure 8-19
  • 28. Stand-Alone Operating Systems UNIX is a multitasking operating system developed in the early 1970s Linux is an open-source, popular, multitasking UNIX- type operating system Discovering Computers 2012: Chapter 8 28Pages 416 – 417 Figures 8-20 – 8-21
  • 29. Server Operating Systems Windows Server 2008 UNIX Linux Solaris NetWare Discovering Computers 2012: Chapter 8 29Pages 417 - 418
  • 30. Server Operating Systems • Windows Server 2008 is an upgrade to Windows Server 2003 – Part of the Windows Server 2008 family – Multiple editions • Most editions include Hyper-V, a virtualization technology – Virtualization is the practice of sharing or pooling computing resources Discovering Computers 2012: Chapter 8 30Pages 417 - 418
  • 31. Embedded Operating Systems • An embedded operating system resides on a ROM chip on a mobile device or consumer electronic device Discovering Computers 2012: Chapter 8 31Pages 418 - 420 Windows Embedded CE Windows Phone 7 Palm OS iPhone OS BlackBerry Google Android Embedded Linux Symbian OS
  • 32. Embedded Operating Systems Discovering Computers 2012: Chapter 8 32Pages 419 – 420 Figures 8-22 – 8-26
  • 33. Utility Programs • A utility program is a type of system software that allows a user to perform maintenance-type tasks Discovering Computers 2012: Chapter 8 33Page 421 Figure 8-27
  • 34. Utility Programs • A file manager is a utility that performs functions related to file management – Displaying a list of files – Organizing files in folders – Copying, renaming, deleting, moving, and sorting files and folders – Creating shortcuts Discovering Computers 2012: Chapter 8 34Page 422 Figure 8-28
  • 35. Utility Programs • A search utility is a program that attempts to locate a file on your computer based on criteria you specify Discovering Computers 2012: Chapter 8 35Page 422 Figure 8-29
  • 36. Utility Programs • An image viewer allows users to display, copy, and print the contents of a graphics file • An uninstaller removes a program, as well as any associated entries in the system files Discovering Computers 2012: Chapter 8 36Page 423 Figure 8-30
  • 37. Utility Programs • A disk cleanup utility searches for and removes unnecessary files – Downloaded program files – Temporary Internet files – Deleted files – Unused program files Discovering Computers 2012: Chapter 8 37Page 423 Figure 8-31
  • 38. Utility Programs • A disk defragmenter reorganizes the files and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs run faster – Defragmenting Discovering Computers 2012: Chapter 8 38Pages 423 – 424 Figure 8-32
  • 39. Utility Programs • A backup utility allows users to copy files to another storage medium • A restore utility reverses the process and returns backed up files to their original form Discovering Computers 2012: Chapter 8 39Page 424 Figure 8-33
  • 40. Utility Programs • A screen saver causes a display device’s screen to show a moving image or blank screen if no activity occurs for a specified time • A personal firewall detects and protects a personal computer from unauthorized intrusions Discovering Computers 2012: Chapter 8 40Page 425 Figures 8-34 – 8-35
  • 41. Utility Programs A virus describes a potentially damaging computer program that affects a computer negatively A worm copies itself repeatedly in memory or over a network A Trojan horse hides within or looks like a legitimate program An antivirus program protects a computer against viruses Discovering Computers 2012: Chapter 8 41Pages 425 - 426
  • 42. Utility Programs Discovering Computers 2012: Chapter 8 42Pages 425 – 426 Figures 8-36 – 8-37
  • 43. Utility Programs Spyware is a program placed on a computer without the user’s knowledge that secretly collects information about the user • A spyware remover detects and deletes spyware and other similar programs Adware displays an online advertisement in a banner or pop-up window • An adware remover is a program that detects and deletes adware Discovering Computers 2012: Chapter 8 43Page 426
  • 44. Utility Programs • Filters are programs that remove or block certain items from being displayed Discovering Computers 2012: Chapter 8 44Pages 426 - 427 Web filtering software Anti-spam programs Phishing filters Pop-up blockers
  • 45. Utility Programs • A file compression utility shrinks the size of a file(s) – Compressing files frees up room on the storage media – Two types of compression • Lossy • Lossless • Compressed files sometimes are called zipped files – Can be uncompressed Discovering Computers 2012: Chapter 8 45Page 427
  • 46. Utility Programs • A media player allows you to view images and animation, listen to audio, and watch video files on your computer Discovering Computers 2012: Chapter 8 46Page 427 Figure 8-38
  • 47. Utility Programs • Disc burning software writes text, graphics, audio, and video files on a recordable or rewritable optical disc Discovering Computers 2012: Chapter 8 47Page 428 Figure 8-39
  • 48. Utility Programs • A personal computer maintenance utility identifies and fixes operating system problems, detects and repairs disk problems, and includes the capability of improving a computer’s performance Discovering Computers 2012: Chapter 8 48Page 428 Figure 8-40
  • 49. Summary Definition of an operating system Functions common to most operating systems Variety of stand-alone operating systems, server operating systems, and embedded operating systems Several utility programs Discovering Computers 2012: Chapter 8 49Page 429
  • 50. Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 8 Complete