SlideShare uma empresa Scribd logo
1 de 35
“OPERATING SYSTEM”
(Presented by: Group 1)
Composed by: Hamidah Rehman, 27
Group members:
Zuha Najeeb, 12
Fatima Ramzan, 21
Humaira Fatima, 13
Sana Nasir, 19
Mahnoor Javed, 42
Sumaiya, 25
SYSTEM SOFTWARE
System software consists of the programs that control or maintain the operations of a computer
and its devices.
It is a set of programs that manage the resources of a computer system. System software is a
collection of system programs that perform a variety of functions such as file editing, resource
accounting, storage, memory management etc.
System software is broadly classified into:
 operating systems
 utility programs
Our group will only discuss operating system.
OPERATING SYSTEM
An operating system is a set of programs containing instructions that coordinate all the
activities among computer hardware resources.
Operating system is an integrated set of specialized programs used to manage
overall resources and operations of the computer. It is a program that acts as an
interface between the software and the computer hardware.
Different sizes of computers typically use different operating systems. The
operating system that a computer uses sometimes is called the platform. A
cross-platform program is one that runs the same on multiple operating systems.
FUNCTIONS OF OPERATING
SYSTEM
Most operating systems perform similar functions that include:
• Starting a computer
• Providing a user interface
• Managing programs
• Managing memory
• Scheduling jobs
• Configuring devices
• Establishing an internet connection
• Monitoring performance
• Providing file management utilities
OPERATING SYSTEM
FUNCTIONS
Starting a computer:
Booting is the process of starting or restarting a computer.
There are 2 types of booting:
• Cold booting: when the computer is started after having been switched off.
• Warm booting: when the operating system alone is restarted (without being switched off)
after a crash or freeze.
Each time you boot a computer, the kernel and other frequently used operating
system instructions are loaded or copied from the hard disk into the computer’s
memory.
 STARTING A COMPUTER
The kernel is the core of an operating system that manages memory
and devices, maintains the computer’s clock, starts applications and
assigns the computer’s resources such as devices, programs, data and
information.
The boot process, however, is similar for large and small computers.
 PROVIDING A USER
INTERFACE
A user interface (UI) controls how you enter data and instructions and how information is
displayed on the screen.
It refers to the part of an operating system, program or device that allows a user to
enter and receive information.
Two types of user interfaces are:
• Command-line interface
• Graphical user interface
Operating system sometimes use a combination of these interfaces to define how a
user interacts with a computer.
1. COMMAND-LINE INTERFACE
In a command-line interface, a user types commands or presses special keys on the keyboard to
enter data and instructions.
Users work with command line interface to configure devices, manage system
resources and troubleshoot network connections. Command-line interfaces are
often difficult to use because they require exact spelling, grammar and
punctuation.
A program which handles the interface is called a command language interpreter
or shell (computing).
2. GRAPHICAL USER INTERFACE
With a graphical user interface(GUI), user interact with menus and visual images such
as buttons and other graphical objects to issue commands.
Window Vista offers two different GUI’s depending on your hardware
configuration.
• Computers with less than 1GB of RAM work with the Windows Vista Basic
interface.
• Computers with more than 1GB of RAM work with the Window Aero
interface.
 MANAGING PROGRAMS
Some operating systems support a single user and only one running program at a
time while others support thousands of users running multiple programs.
• A single tasking operating system allows only one user to run one program at
a time, e.g. PDAs, smart phones and other small computing devices.
• A multi tasking operating system allows a single user to work on two or more
programs that reside in memory at the same time, e.g. an e-mail and web browser
open at all times while working with word processing or graphics.
When a computer is running multiple programs concurrently, the active program is
in the foreground while the other programs that are not running, are in the
background.
You can easily switch between background and foreground programs.
 MANAGING MEMORY
The purpose of memory management is to optimize the use of RAM.
RAM consists of one or more chips on the motherboard that hold items such as data
and instructions while the processor interprets and execute them. The operating system
allocates or assigns data and instructions to an area of memory while they are being
processed.
Virtual memory is a concept in which the operating system allocates a portion of a storage medium,
usually hard disk, to function as additional RAM. It is slower than RAM.
The operating system uses an area of hard disk for virtual memory in which it swaps
data, information and instructions between memory and storage.
This technique of swapping items between memory and storage is called paging.
 SCHEDULING JOBS
Jobs include receiving data from an input device, processing instructions, sending information to an
output device and transferring items from storage to memory and from memory to storage. It is an
operation the processor manages.
Sometimes, a device already may be busy processing one job when it receives a
second job. This occurs because the processor operates at a much faster rate of
speed than peripheral devices.
For example,
If the processor sends five print jobs to a printer, the printer can print only one
document at a time and store as many documents as its memory can handle.
While waiting for devices to become idle, the operating system places items in
buffers.
 SCHEDULING JOBS
A buffer is a segment of memory or storage in which items are placed while waiting to be
transferred from an input device or to an output device.
The operating system commonly uses buffers with print jobs. This process, called
spooling, sends print jobs to a buffer instead of sending them immediately to the
printer. The buffer holds the information waiting to print while the printer prints
from the buffer at its own rate of speed. By spooling print jobs to a buffer, the
processor can continue interpreting and executing instructions while the printer
prints. This allows users to work on the computer for other tasks while a printer is
printing. Multiple print jobs line up in a queue in the buffer.
 CONFIGURING DEVICES
A driver is a program that tells the operating system how to communicate with a specific device.
A driver provides a software interface to hardware devices, enabling operating systems
and other computer programs to access hardware functions without needing to know
precise details about the hardware being used.
Every device, whether it be a printer, disk drive, or keyboard, must have a driver
program. Many drivers, such as the keyboard driver, come with the operating system.
When you boot a computer, the operating system loads each device’s driver.
For other devices, you may need to load a new driver when you connect the device to
your computer. Like if you attach a new device to a computer, such as a printer or
scanner, its driver must be installed before you can use the device.
You can even install the drivers from the CD provided with the purchased device.
 CONFIGURING DEVICES
Today, many devices and operating systems support Plug and Play.
Plug and Play gives users the ability to plug a device into a computer and have the computer
recognize that the device is there.
The user doesn't have to tell the computer.
For example,
A video card or hard drive may be a Plug and Play device, meaning the computer
will recognize it as soon as it is installed.
 ESTABLISHING AN INTERNET
CONNECTION
Operating systems typically provide a means to establish Internet connections.
For example,
Windows Vista includes a Connect to a network wizard that guides users through
the process of setting up a connection between a computer and an Internet
service provider.
The basic requirements for connecting to the Internet are a computer device, a
working Internet line and the right modem for that Internet line. In addition,
software programs such as Internet browsers, email clients, Usenet clients and
other special applications are needed in order to access the Internet.
 MONITORING PERFORMANCE
A performance monitor is a program that assesses and reports information about various
computer resources and devices.
Operating systems typically contain a performance monitor. The information in
performance reports helps users and administrators identify a problem with
resources so they can try to resolve any problems.
For example,
If a computer is running extremely slow, the performance monitor may determine
that the computer’s memory is being used to its maximum. Thus you might
consider installing additional memory in the computer.
 PROVIDING FILE MANAGEMENT
AND OTHER UTILITIES
Operating system often provide users with the capability of
managing files, searching for files, viewing images, securing
a computer from unauthorized access, uninstalling
programs, scanning disks, diagnosing problems, backing up
files and disks and setting up screen savers.
 CONTROLLING A NETWORK
A network operating system is an operating system that organizes and coordinates how
multiple users access and share resources on a network.
Some operating system have network features built into them while in other cases,
the network OS is a set of programs separate from the operating system on the
client computers that access the network.
When not connected to the network, the client computers use their own operating
system. When connected to the network, the network OS may assume some of
the operating system functions.
The network administrator uses the network OS to add and removes users,
computers and other devices to and from the network.
 ADMINISTERING SECURITY
The network administrator uses the network OS to establish permissions to
resources. These permissions define who can access certain resources and when
they can access those resources. For each user, the network administrator
establishes a user account, which enables a user to access or log on to a
computer or a network. Each user account typically consists of a user name and
password.
A user name or user ID is a unique combination of characters, such as letters
of the alphabet or numbers, that identifies one specific user.
 ADMINISTERING SECURITY
Some operating systems allow the network administrator to assign passwords to
file and commands, restricting access to only authorized users. To prevent
unauthorized users from accessing computer resources, the users use passwords.
A password is a private combination of characters associated with the user name that allows
access to certain computer resources.
To protect sensitive data and information as it travels over the network, a network
operating system may encrypt it.
Encryption is the process of encoding data and information into an unreadable form.
When an authorized user attempts to read the data, it automatically is decrypted,
or converted back into a readable form.
OPERATING SYSTEM
UTILITY PROGRAMS
A utility program, also called a utility, helps to manage, maintain and control computer resources.
It is a small program that provides an addition to the capabilities provided by the
operating system. In some usages, a utility is a special and nonessential part of the
operating system. It is used to support the computer infrastructure.
Examples of utility programs include:
• Antivirus software
• Backup software
• Disk tools etc.
Following slides will briefly discuss some of the utilities.
1. FILE MANAGER
A file manager is a software program that helps a user manage all the files on their computer.
For example, all file managers allow the user to view, organize, edit, rename,
copy, move and delete the files on their computer storage devices.
 With recent version of Microsoft Windows, Windows Explorer is
considered the default manager.
 With Apple computers, Finder is considered the default manager.
2. SEARCH UTILITY
A search utility is a program that attempts to locate a file on your computer .
Search utilities can look through documents, pictures, music and other
files.
Window vista has a built-in search utility. All the explorer windows, as
well as the start menu, contain a search box where you enter the
search criteria.
3. IMAGE VIEWER
An image viewer or image browser is a computer program that display stored graphical images.
With an image viewer, users can see images without having to open them in a paint or
image editing program. Image viewer of Window Vista is called Windows Photo
Gallery.
Typical features of image viewers are:
• Full screen display
• Zooming and rotation
• Slideshow
• Printing
• Photo editors etc.
4. PERSONAL FIREWALL
A personal firewall is a utility that detects and protects a personal computer from
unauthorized intrusions.
It constantly monitor all transmissions to and from a computer and protect your
computer from outside attempts to control or gain access to your computer.
Because when connected to an internet, your computer is vulnerable to attacks
from a hacker. A hacker is someone who tries to access a computer or network illegally.
Firewall of Window Vista is called Windows Firewall. It is easy to access and
configure. Moreover, you can also purchase a stand-alone personal firewall utility
or a hardware firewall for additional protection.
5.UNINSTALLER
An uninstaller is a utility that removes a program, as well as any associated entries in the
system files.
It allows a user to safely uninstall an application by running a program following
a series of prompts that warn users about the application’s removal. The
uninstaller deletes files and folders from the hard disk as well as removes
program entries from the system files.
Additionally, various uninstallers may be downloaded as separate applications.
6. DISK SCANNER
A disk scanner is a utility that searches for and removes unnecessary files.
It is able to scan any disk which you see in Windows. The utility first searches
and analyzes the hard drive for files that are no longer of any use and then
removes the unnecessary files.
Window Vista includes a disk scanner utility called Disk Cleanup. It is a
computer maintenance utility included in Microsoft Windows designed to free
up disk space on a computer’s hard drive.
7. DISK DEFRAGMENTER
A disk defragmenter is a utility that recognizes the file and unused space on a computer’s hard
disk so the operating system accesses data more quickly and programs run faster.
Disk defragmenter rearranges fragmented data so your disks and drives can work
more efficiently. Disk defragmenter runs on a schedule, but you can also analyze
and defragment your disks and drives manually.
Fragmentation slows down disk access and thus the performance of the entire
computer. Defragmenting the disk, or recognizing it so the files are stored in
contiguous (next to each other) sectors, solves this problem.
8. DIAGNOSTIC UTILITY
A diagnostic utility compiles technical information about your computer’s
hardware and certain system software programs and then prepares a report
outlining any identified problems.
Information in the report assists technical support staff in remedying
any problems.
9. BACKUP UTILITY
A backup utility allows a user to copy, or backup selected files or an entire hard disk to another
storage medium such as CD, DVD, external hard disk , tape or USB flash drive.
Many backup programs compress or shrink the size of files during the backup
process. By compressing the files, the backup program requires less storage space
for the backup files than for the original files. Because they are compressed, you
usually can’t use backup files in their backed up form. In the event you need to use
a restore program that reverses the process and returns backed up files to their
original form.
10. SCREEN SAVER
A screen saver is a utility that causes a display device’s screen to show a moving image or blank
screen if no keyboard or mouse activity occurs for a specified time.
When you press a key on the keyboard or move the mouse, the screen saver
disappears and the screen saver returns to the previous state.
Screen savers were originally developed to prevent a problem called ghosting, in
which images could be permanently etched on a monitor's screen.
Screensavers are also popular for security, business and entertainment purposes
“QUIZ”
1. What are the two types of a system software?
2. Define operating system.
3. What is a user name or user ID?
4. How you can define password?
5. What is a utility program?

Mais conteúdo relacionado

Mais procurados (20)

Computer Software & It's types.
Computer Software &  It's types.Computer Software &  It's types.
Computer Software & It's types.
 
Operating Systems & Applications
Operating Systems & ApplicationsOperating Systems & Applications
Operating Systems & Applications
 
SYSTEM SOFTWARE
SYSTEM SOFTWARE SYSTEM SOFTWARE
SYSTEM SOFTWARE
 
Operating system
Operating systemOperating system
Operating system
 
Operating system
Operating systemOperating system
Operating system
 
Operating System PPT
Operating System PPTOperating System PPT
Operating System PPT
 
6 multiprogramming & time sharing
6 multiprogramming & time sharing6 multiprogramming & time sharing
6 multiprogramming & time sharing
 
Operating system basics
Operating system basicsOperating system basics
Operating system basics
 
Computer Software introduction
Computer  Software introductionComputer  Software introduction
Computer Software introduction
 
Batch operating system
Batch operating system Batch operating system
Batch operating system
 
Software and hardware
Software and hardwareSoftware and hardware
Software and hardware
 
Operating System
Operating System Operating System
Operating System
 
Introduction to Computer Software
Introduction to Computer SoftwareIntroduction to Computer Software
Introduction to Computer Software
 
types of operating system
types of operating systemtypes of operating system
types of operating system
 
Functions Of Operating System
Functions Of Operating SystemFunctions Of Operating System
Functions Of Operating System
 
Basic CPU (Central Processing Unit)
Basic CPU (Central Processing Unit)Basic CPU (Central Processing Unit)
Basic CPU (Central Processing Unit)
 
Fundamental of computer
Fundamental of computerFundamental of computer
Fundamental of computer
 
Software (4).ppt
Software (4).pptSoftware (4).ppt
Software (4).ppt
 
Hardware software components
Hardware software componentsHardware software components
Hardware software components
 
Basic structure of computers
Basic structure of computersBasic structure of computers
Basic structure of computers
 

Semelhante a operating system

Semelhante a operating system (20)

Operating systems
Operating systemsOperating systems
Operating systems
 
The operating
The operatingThe operating
The operating
 
Application software and system software
Application software and system softwareApplication software and system software
Application software and system software
 
Operating systems
Operating systems Operating systems
Operating systems
 
Os by nishant raghav
Os by nishant raghavOs by nishant raghav
Os by nishant raghav
 
Computer Fundamental
Computer Fundamental Computer Fundamental
Computer Fundamental
 
Clifford sugerman
Clifford sugermanClifford sugerman
Clifford sugerman
 
operating systems By ZAK
operating systems By ZAKoperating systems By ZAK
operating systems By ZAK
 
Operating System - I.pptx
Operating System - I.pptxOperating System - I.pptx
Operating System - I.pptx
 
Software concepts
Software concepts Software concepts
Software concepts
 
Ch # 07 operating system
Ch # 07 operating systemCh # 07 operating system
Ch # 07 operating system
 
installing and optimizing operating system software
installing and optimizing operating system software   installing and optimizing operating system software
installing and optimizing operating system software
 
Operating system notes pdf
Operating system notes pdfOperating system notes pdf
Operating system notes pdf
 
Introduction to OS 1.ppt
Introduction to OS 1.pptIntroduction to OS 1.ppt
Introduction to OS 1.ppt
 
Fundamental concepts and_principles_of_operating_systems (2)
Fundamental concepts and_principles_of_operating_systems (2)Fundamental concepts and_principles_of_operating_systems (2)
Fundamental concepts and_principles_of_operating_systems (2)
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Computer softwre
Computer softwreComputer softwre
Computer softwre
 
Unit 1 q&a
Unit  1 q&aUnit  1 q&a
Unit 1 q&a
 
lecture_16.operating system CUI/GUI.pptx
lecture_16.operating system CUI/GUI.pptxlecture_16.operating system CUI/GUI.pptx
lecture_16.operating system CUI/GUI.pptx
 
System software vt
System software vtSystem software vt
System software vt
 

Último

FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 

Último (20)

FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 

operating system

  • 1. “OPERATING SYSTEM” (Presented by: Group 1) Composed by: Hamidah Rehman, 27 Group members: Zuha Najeeb, 12 Fatima Ramzan, 21 Humaira Fatima, 13 Sana Nasir, 19 Mahnoor Javed, 42 Sumaiya, 25
  • 2. SYSTEM SOFTWARE System software consists of the programs that control or maintain the operations of a computer and its devices. It is a set of programs that manage the resources of a computer system. System software is a collection of system programs that perform a variety of functions such as file editing, resource accounting, storage, memory management etc. System software is broadly classified into:  operating systems  utility programs Our group will only discuss operating system.
  • 3. OPERATING SYSTEM An operating system is a set of programs containing instructions that coordinate all the activities among computer hardware resources. Operating system is an integrated set of specialized programs used to manage overall resources and operations of the computer. It is a program that acts as an interface between the software and the computer hardware. Different sizes of computers typically use different operating systems. The operating system that a computer uses sometimes is called the platform. A cross-platform program is one that runs the same on multiple operating systems.
  • 4. FUNCTIONS OF OPERATING SYSTEM Most operating systems perform similar functions that include: • Starting a computer • Providing a user interface • Managing programs • Managing memory • Scheduling jobs • Configuring devices • Establishing an internet connection • Monitoring performance • Providing file management utilities
  • 5. OPERATING SYSTEM FUNCTIONS Starting a computer: Booting is the process of starting or restarting a computer. There are 2 types of booting: • Cold booting: when the computer is started after having been switched off. • Warm booting: when the operating system alone is restarted (without being switched off) after a crash or freeze. Each time you boot a computer, the kernel and other frequently used operating system instructions are loaded or copied from the hard disk into the computer’s memory.
  • 6.  STARTING A COMPUTER The kernel is the core of an operating system that manages memory and devices, maintains the computer’s clock, starts applications and assigns the computer’s resources such as devices, programs, data and information. The boot process, however, is similar for large and small computers.
  • 7.  PROVIDING A USER INTERFACE A user interface (UI) controls how you enter data and instructions and how information is displayed on the screen. It refers to the part of an operating system, program or device that allows a user to enter and receive information. Two types of user interfaces are: • Command-line interface • Graphical user interface Operating system sometimes use a combination of these interfaces to define how a user interacts with a computer.
  • 8. 1. COMMAND-LINE INTERFACE In a command-line interface, a user types commands or presses special keys on the keyboard to enter data and instructions. Users work with command line interface to configure devices, manage system resources and troubleshoot network connections. Command-line interfaces are often difficult to use because they require exact spelling, grammar and punctuation. A program which handles the interface is called a command language interpreter or shell (computing).
  • 9.
  • 10. 2. GRAPHICAL USER INTERFACE With a graphical user interface(GUI), user interact with menus and visual images such as buttons and other graphical objects to issue commands. Window Vista offers two different GUI’s depending on your hardware configuration. • Computers with less than 1GB of RAM work with the Windows Vista Basic interface. • Computers with more than 1GB of RAM work with the Window Aero interface.
  • 11.
  • 12.  MANAGING PROGRAMS Some operating systems support a single user and only one running program at a time while others support thousands of users running multiple programs. • A single tasking operating system allows only one user to run one program at a time, e.g. PDAs, smart phones and other small computing devices. • A multi tasking operating system allows a single user to work on two or more programs that reside in memory at the same time, e.g. an e-mail and web browser open at all times while working with word processing or graphics. When a computer is running multiple programs concurrently, the active program is in the foreground while the other programs that are not running, are in the background. You can easily switch between background and foreground programs.
  • 13.  MANAGING MEMORY The purpose of memory management is to optimize the use of RAM. RAM consists of one or more chips on the motherboard that hold items such as data and instructions while the processor interprets and execute them. The operating system allocates or assigns data and instructions to an area of memory while they are being processed. Virtual memory is a concept in which the operating system allocates a portion of a storage medium, usually hard disk, to function as additional RAM. It is slower than RAM. The operating system uses an area of hard disk for virtual memory in which it swaps data, information and instructions between memory and storage. This technique of swapping items between memory and storage is called paging.
  • 14.  SCHEDULING JOBS Jobs include receiving data from an input device, processing instructions, sending information to an output device and transferring items from storage to memory and from memory to storage. It is an operation the processor manages. Sometimes, a device already may be busy processing one job when it receives a second job. This occurs because the processor operates at a much faster rate of speed than peripheral devices. For example, If the processor sends five print jobs to a printer, the printer can print only one document at a time and store as many documents as its memory can handle. While waiting for devices to become idle, the operating system places items in buffers.
  • 15.  SCHEDULING JOBS A buffer is a segment of memory or storage in which items are placed while waiting to be transferred from an input device or to an output device. The operating system commonly uses buffers with print jobs. This process, called spooling, sends print jobs to a buffer instead of sending them immediately to the printer. The buffer holds the information waiting to print while the printer prints from the buffer at its own rate of speed. By spooling print jobs to a buffer, the processor can continue interpreting and executing instructions while the printer prints. This allows users to work on the computer for other tasks while a printer is printing. Multiple print jobs line up in a queue in the buffer.
  • 16.  CONFIGURING DEVICES A driver is a program that tells the operating system how to communicate with a specific device. A driver provides a software interface to hardware devices, enabling operating systems and other computer programs to access hardware functions without needing to know precise details about the hardware being used. Every device, whether it be a printer, disk drive, or keyboard, must have a driver program. Many drivers, such as the keyboard driver, come with the operating system. When you boot a computer, the operating system loads each device’s driver. For other devices, you may need to load a new driver when you connect the device to your computer. Like if you attach a new device to a computer, such as a printer or scanner, its driver must be installed before you can use the device. You can even install the drivers from the CD provided with the purchased device.
  • 17.  CONFIGURING DEVICES Today, many devices and operating systems support Plug and Play. Plug and Play gives users the ability to plug a device into a computer and have the computer recognize that the device is there. The user doesn't have to tell the computer. For example, A video card or hard drive may be a Plug and Play device, meaning the computer will recognize it as soon as it is installed.
  • 18.  ESTABLISHING AN INTERNET CONNECTION Operating systems typically provide a means to establish Internet connections. For example, Windows Vista includes a Connect to a network wizard that guides users through the process of setting up a connection between a computer and an Internet service provider. The basic requirements for connecting to the Internet are a computer device, a working Internet line and the right modem for that Internet line. In addition, software programs such as Internet browsers, email clients, Usenet clients and other special applications are needed in order to access the Internet.
  • 19.  MONITORING PERFORMANCE A performance monitor is a program that assesses and reports information about various computer resources and devices. Operating systems typically contain a performance monitor. The information in performance reports helps users and administrators identify a problem with resources so they can try to resolve any problems. For example, If a computer is running extremely slow, the performance monitor may determine that the computer’s memory is being used to its maximum. Thus you might consider installing additional memory in the computer.
  • 20.  PROVIDING FILE MANAGEMENT AND OTHER UTILITIES Operating system often provide users with the capability of managing files, searching for files, viewing images, securing a computer from unauthorized access, uninstalling programs, scanning disks, diagnosing problems, backing up files and disks and setting up screen savers.
  • 21.  CONTROLLING A NETWORK A network operating system is an operating system that organizes and coordinates how multiple users access and share resources on a network. Some operating system have network features built into them while in other cases, the network OS is a set of programs separate from the operating system on the client computers that access the network. When not connected to the network, the client computers use their own operating system. When connected to the network, the network OS may assume some of the operating system functions. The network administrator uses the network OS to add and removes users, computers and other devices to and from the network.
  • 22.  ADMINISTERING SECURITY The network administrator uses the network OS to establish permissions to resources. These permissions define who can access certain resources and when they can access those resources. For each user, the network administrator establishes a user account, which enables a user to access or log on to a computer or a network. Each user account typically consists of a user name and password. A user name or user ID is a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user.
  • 23.  ADMINISTERING SECURITY Some operating systems allow the network administrator to assign passwords to file and commands, restricting access to only authorized users. To prevent unauthorized users from accessing computer resources, the users use passwords. A password is a private combination of characters associated with the user name that allows access to certain computer resources. To protect sensitive data and information as it travels over the network, a network operating system may encrypt it. Encryption is the process of encoding data and information into an unreadable form. When an authorized user attempts to read the data, it automatically is decrypted, or converted back into a readable form.
  • 24. OPERATING SYSTEM UTILITY PROGRAMS A utility program, also called a utility, helps to manage, maintain and control computer resources. It is a small program that provides an addition to the capabilities provided by the operating system. In some usages, a utility is a special and nonessential part of the operating system. It is used to support the computer infrastructure. Examples of utility programs include: • Antivirus software • Backup software • Disk tools etc. Following slides will briefly discuss some of the utilities.
  • 25. 1. FILE MANAGER A file manager is a software program that helps a user manage all the files on their computer. For example, all file managers allow the user to view, organize, edit, rename, copy, move and delete the files on their computer storage devices.  With recent version of Microsoft Windows, Windows Explorer is considered the default manager.  With Apple computers, Finder is considered the default manager.
  • 26. 2. SEARCH UTILITY A search utility is a program that attempts to locate a file on your computer . Search utilities can look through documents, pictures, music and other files. Window vista has a built-in search utility. All the explorer windows, as well as the start menu, contain a search box where you enter the search criteria.
  • 27. 3. IMAGE VIEWER An image viewer or image browser is a computer program that display stored graphical images. With an image viewer, users can see images without having to open them in a paint or image editing program. Image viewer of Window Vista is called Windows Photo Gallery. Typical features of image viewers are: • Full screen display • Zooming and rotation • Slideshow • Printing • Photo editors etc.
  • 28. 4. PERSONAL FIREWALL A personal firewall is a utility that detects and protects a personal computer from unauthorized intrusions. It constantly monitor all transmissions to and from a computer and protect your computer from outside attempts to control or gain access to your computer. Because when connected to an internet, your computer is vulnerable to attacks from a hacker. A hacker is someone who tries to access a computer or network illegally. Firewall of Window Vista is called Windows Firewall. It is easy to access and configure. Moreover, you can also purchase a stand-alone personal firewall utility or a hardware firewall for additional protection.
  • 29. 5.UNINSTALLER An uninstaller is a utility that removes a program, as well as any associated entries in the system files. It allows a user to safely uninstall an application by running a program following a series of prompts that warn users about the application’s removal. The uninstaller deletes files and folders from the hard disk as well as removes program entries from the system files. Additionally, various uninstallers may be downloaded as separate applications.
  • 30. 6. DISK SCANNER A disk scanner is a utility that searches for and removes unnecessary files. It is able to scan any disk which you see in Windows. The utility first searches and analyzes the hard drive for files that are no longer of any use and then removes the unnecessary files. Window Vista includes a disk scanner utility called Disk Cleanup. It is a computer maintenance utility included in Microsoft Windows designed to free up disk space on a computer’s hard drive.
  • 31. 7. DISK DEFRAGMENTER A disk defragmenter is a utility that recognizes the file and unused space on a computer’s hard disk so the operating system accesses data more quickly and programs run faster. Disk defragmenter rearranges fragmented data so your disks and drives can work more efficiently. Disk defragmenter runs on a schedule, but you can also analyze and defragment your disks and drives manually. Fragmentation slows down disk access and thus the performance of the entire computer. Defragmenting the disk, or recognizing it so the files are stored in contiguous (next to each other) sectors, solves this problem.
  • 32. 8. DIAGNOSTIC UTILITY A diagnostic utility compiles technical information about your computer’s hardware and certain system software programs and then prepares a report outlining any identified problems. Information in the report assists technical support staff in remedying any problems.
  • 33. 9. BACKUP UTILITY A backup utility allows a user to copy, or backup selected files or an entire hard disk to another storage medium such as CD, DVD, external hard disk , tape or USB flash drive. Many backup programs compress or shrink the size of files during the backup process. By compressing the files, the backup program requires less storage space for the backup files than for the original files. Because they are compressed, you usually can’t use backup files in their backed up form. In the event you need to use a restore program that reverses the process and returns backed up files to their original form.
  • 34. 10. SCREEN SAVER A screen saver is a utility that causes a display device’s screen to show a moving image or blank screen if no keyboard or mouse activity occurs for a specified time. When you press a key on the keyboard or move the mouse, the screen saver disappears and the screen saver returns to the previous state. Screen savers were originally developed to prevent a problem called ghosting, in which images could be permanently etched on a monitor's screen. Screensavers are also popular for security, business and entertainment purposes
  • 35. “QUIZ” 1. What are the two types of a system software? 2. Define operating system. 3. What is a user name or user ID? 4. How you can define password? 5. What is a utility program?