SlideShare a Scribd company logo
1 of 21
Download to read offline
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 1 / 21 File: lec9chap8f04.doc
General Items:
? Computer security
? Computer purchasing
Reading Materials:
?
Miscellaneous:
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 2 / 21 File: lec9chap8f04.doc
Type of software
- System Software
o programs controlling the operation of the computer and devices
?Operating system programs (platform)
?Utility programs
- Application (perform a specific task)
o Graphics, Multimedia, Web page designer, Communication
software
o Designed for a specific OS – some can be cross-platform
Operating system (OS)
- An OS is a set of programs that coordinate activities between computer
hardware resources
- Also called software platform
- It typically resides in the hardware or ROM
- Examples: Windows XP, Mac OS X
-
Operating
System
Starting
Computer
User
Interface
Managing
Programs
Configuring
Devices
Monitoring
performance
Controlling
NetworkOS Functions
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 3 / 21 File: lec9chap8f04.doc
Basic idea
- Not all computers need OS
o hardware is fixed, same program is run at all times
- Examples: Macintosh, Windows, Unix
- Functions:
o Manages hardware and software resources
o Applications to deal with hardware
- Four types:
o Real time (very little user-interface capability and no end-user
utilities)
o Single user-single task (Palm OS - DOS)
o Single user-multitask (Desktop)
o Multi user (Networking)
Computer booting (wakeup-call)
- This is one of the basic OS functions
- Bootstrap: a program that loads the OS into the RAM
- Booting: Computer startup or restarting process
o Cold booting or warm booting
o Upon booting -> OS instructions are loaded in the RAM
o
o Kernel: Instructions managing memory and devices, application
startups, maintains computer’s clock – Core or OS
Operating System Programs:
Memory resident (reside in RAM)
Example: Kernel
Nonresident (reside in hardware)
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 4 / 21 File: lec9chap8f04.doc
Starting a computer:
- Power up
- Processor reset, Finding the ROM BIOS chips
o Basic Input/Output System (contains startup instructions)
o Executes a series of tests to make sure all devices are operational
(keyboard, monitor, internal busses, RAM chips, etc.)
- BIOS performs the POST: Power-on self test
o The result is compared with the information recorded in the CMOS
chip
o CMOS chip maintains the information about system configuration,
memory, other devices
o Finds new devices
o Detects any device errors
- BIOS starts searching for “system files” (drive A, C, CD, etc.)
o .COM, .DRV, .DLL, .366, etc.
o System files are loaded in the RAM
- The KERNEL is loaded in the memory (the operating system takes over!)
- The operating system loads the system configuration
o System configuration information are in REGISTRY files
- Files in the Startup Folder are executed
User Interface
Interacting with software through user interface
- Command line (command language)
- Graphical (GUI) – menu, Icons
Managing programs
- Single user/single tasking
- Single user/multitasking
o Foreground and background processing
- Multi users
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 5 / 21 File: lec9chap8f04.doc
- Multi processing (supporting two or more processors)
o Fault-tolerant computer (duplicated components)
Memory Management
- Used to optimize the use of RAM
o How to distribute data, instructions, programs in different memory
locations
o Clearing unused memory locations
- Virtual memory
o Optimizing the RAM
o Using hardware disk as additional RAM (called swap file)
o Paging: technique of swapping items between memory and hard
drive: Swap out (of RAM), Swap in (the RAM)
o When paging time is too long -> more RAM is required
(Thrashing) – not much execution is going on!
Scheduling job
- The operating system performs operations (jobs) based on some order
- Serving disciplines: FCFS operations, Priority Operations
- Buffering: Waiting for available resources
- Spooling:
o Buffering PRINT jobs (advantage?)
o Jobs are QUEUED (stacked)
o Print spooler: a program that places jobs in the queue
Configuring devices
Device drivers are used to communicate with different devices
A device driver is a program: how the processor should communicate with a
device – Print drivers (*.drv)
Installing drivers
Plug and play (computer recognizes the device)
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 6 / 21 File: lec9chap8f04.doc
Monitoring performance
- Operating systems can monitor system performance
- Uses a performance monitor program (resident or nonresident program?)
- Includes: Disk usage, memory usage, processor activities, number of
reads and writes to a file – provides a good way to measure your system
resources (need more VM?)
File management services
- Include storage and file management functions
- Includes:
o Formatting and disk copying
?Formatting: Preparing a disk for reading and writing
?When a disk is formatted it looses all its information
o Checking the available storage
o Copy, renaming, deleting, moving, creating short cuts
Controlling a network
- Operating systems can be Network OS (NOS)
- Connecting a server and several clients
- Sharing resources / resource allocation
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 7 / 21 File: lec9chap8f04.doc
Types of operating systems
DOS:
- MS-DOS (Disk Operating System) 1980
- Used for personal computers
- IBM Compatibles
- Uses Command lines
Windows 3.x:
- DOS driven program with GUI interface (3.1, 3.11, etc.)
- DOS-based OS with GUI operating environment
- Not multitasking
- Based on 16-bit processors
Time
DOS
Win 3.x
Win 95
NT
Win 98
Win 2000
Millen
XP Home
XP Prof.
Power/
Integration
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 8 / 21 File: lec9chap8f04.doc
Windows 95
- Multi tasking OS (not based on DOS)
- Uses 32-bit processors
- Used for Windows NT
Windows Me
- Upgrade to 98
- For home users
- Optimized for digital photography and movies, audio, web design, home
networking
Windows XP
- Home and professional editions
- Movie Maker
- Better file sharing
- Fast startup
- Better security
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 9 / 21 File: lec9chap8f04.doc
-
Types of operating systems:
- Stand- alone: Complete OS working on a desktop, notebook,
etc. Examples: Window XP, Mac, Linux, UNIX
- Network: Designed to support networks, typically reside on the server,
- Embedded: Reside on a ROM chip – used for PDAs mobile
devices, Examples: Windows CE, .NET, Windows Mobile
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 10 / 21 File: lec9chap8f04.doc
Type of software
- Application (perform a specific task)
o Graphics, Multimedia, Web page designer, Communication
software
- System Software
o programs controlling the operation of the computer and devices
?Operating system programs
?Utility programs
Utility Programs
- A system software that typically manages a computer, its devices or its
programs
- Utility suites: collection of several utility programs
- Examples of utility programs: Norton Utilities, McAfee
- Basic utility files:
o File viewer: View or copy files
o File compression: Shrinks (Zips) the size of a file – PKZIP,
PKUNZIP
o Diagnostic utility: Compile information about the computer
performance and devices - memory usage, processor utilization,
etc.
o Uninstaller: Utility that removes all the related files, typically
embedded in the OS
o Scanning files: Moves all unnecessary files, finds some physical
and logical problems
?Physical problem: bad disk, scratched CD
?Logical problem: corrupted files
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 11 / 21 File: lec9chap8f04.doc
o Defragmenting: Organizing the files on the hard drive
?Fragmented file: a files scattered on different sectors on the
HD
?Defragmenting: place files on continuous sectors
o Backup utility: copy and backup your files
?Program restoration: accessing the backup files
?Using an Internet hard drive
o Screen savers:
?Used to be critical to avoid permanent image “etching” on
monitor’s screen
?Today mostly used for screen blocking
?Want some cool screen savers? http://www.free-search.com/
-
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 12 / 21 File: lec9chap8f04.doc
Who are computer hackers?
- A person who enjoys exploring the details of programmable systems and
how to stretch their capabilities, as opposed to most users, who prefer to
learn only the minimum necessary.
- One who programs enthusiastically (even obsessively)
- A person capable of appreciating hack value.
- A person who is good at programming quickly.
- An expert at a particular program, or one who frequently does work using
it or on it.
Basic hacking operations
- Piracy (copying and using commercial software purchased by someone
else)
- Sniffing gather information regarding the status of components of a
network system
- Attackers (forcing to teardown the system)
- And more…
Cute hacking
- Play with the hidden files
- Change system files (boot-up logos)
Hacking software
- Password stealer (AOL password, windows, etc.)
- Sniffers
- Cracking tools
- Spy tools (monitor all key strokes, and other computer activities)
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 13 / 21 File: lec9chap8f04.doc
Why do we need computer security?
- Thanks to Internet a huge amount of personal information are being
exchanged on the net
- Credit-card information
- Social Security numbers
- Private correspondence
- Personal details
- Sensitive company information
- Bank-account information
Basic security operations
- Encryption
- Authentication
Encryption
- Definition: Encoding the contents of the message in such a way that hides
its contents from outsiders
- Goes back to the Roman Empire.
- Without a computer it is easy to break (crack) the code!
- Check the LOCK in your web page!
- Also used in cell phones and cordless phones
- The encrypted message is called the ciphertext.
- The process of retrieving the plaintext from the ciphertext is called
decryption.
- Encryption and decryption usually make use of a key
- Cryptanalysis is the art of breaking ciphers, i.e. retrieving the plaintext
without knowing the proper key
- One popular way is to have a Public-key (PGP)
- The key is based on a HASH value
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 14 / 21 File: lec9chap8f04.doc
Authentication
- Password
- Password card
- Digital signature
- Biometric
o Face scan
o Retina check
o Finger print
o Voice identification
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 15 / 21 File: lec9chap8f04.doc
Purchasing a computer
- Computer category
o Desktop
o Laptop
o Supercomputer
o Internet application
- Basic Component
o CD/DVD – 24/48 X (150 KBps) / 650MB & 4.7 GB
o Modems – 56Kbps
o Network cards - Supporting DSL
o Printer – Ink jet; Laser
o Monitor – LCD, CRT; 17,19,21 inches;
o Processor – Intel; ADM 2.2 GHz
o RAM – 256; 516 MB
o Internet connection – Subscription to ISP, OSP
- Purchasing a laptop
o Screen size
o Processor
o Hard drive size
o Wireless card
o Available software
o Weight
o Memory – RAM
o Disk drive / CD-RW
o Warranty
o Built-in cam
o Backup hard drive
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 16 / 21 File: lec9chap8f04.doc
- Purchasing online
o http://www.dell.com
o Configure your own PC:
? http://www.mypcgoodies.com
?http://www.directpc.ca/index.jsp
o Search for "computer auction"
?http://www.dellauction.com/
o search through eBay: www.ebay.com
?Search for computer, laptop
?You can BID on different items!
o Always check the price online!
o Check your computer configuration:
http://www.pny.com/configurator/config.asp
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 17 / 21 File: lec9chap8f04.doc
Learn more about computers:
PC MAC Reviews/Guides
www.shopper.cnet.com www.store.apple.com www.shopper.cnet.com
www.hp.com www.clubmac.com www.pcworld.com
www.compusa.com www.macx.com www.byte.com
www.dartek.com www.apple.com www.zdnet.com/review
www.dell.com www.eshop.msn.com
www.gateway.com www.macworld.com
www.micron.com
www.global.acer.com
www.fujitsu.com
www.sony.com
- Warranty?
o How expensive is it?
o How many years?
o One time?
o Covers the screen
o Buy back programs! Nothing short of hoax!
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 18 / 21 File: lec9chap8f04.doc
- So what do you use the computer for?
o School (work processing and simple projects)
?Anything works!
o Mostly games
?Lots of memory and fast processor
?Good monitor
?Joysticks, etc.
o Internet / browsing / emailing
?Good connection
o Advance applications (programming)
?Lots of memory and fast processor
o Multimedia (digital photography)
?Lots of memory and fast processor
?Good Sound card - Creative Sound Blaster Audigy 2 ZS Good
?Video card - Quadro4 3000 FX, 256 MB, AGP 8x
? 3-D display capacity
- Processor types
o Pentium
o ADM Athlon XP
o Celeron
- Operating system
o Windows
o Mac
o Unix
- Capability
o RAM size
o Processor speed
o CD ROM/DVD/ CD Write (CDRW)
o Video Card
o Cache
o Modem / drivers
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 19 / 21 File: lec9chap8f04.doc
- Software
o Office
o Acrobat products
o Games
o Some are just free!
- Accessories
o Printer
o Scanner
o Digital camera
- Smart shoppers
o Return policies
o Hidden costs
Check several places and compare prices!
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 20 / 21 File: lec9chap8f04.doc
Quiz
Name two types of system software programs.
Name three examples of operating systems.
What is Virtual Memory? – Where is it?
What is booting? How many types of booting we have?
What is Plug and Play?
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 21 / 21 File: lec9chap8f04.doc
Quiz
Name two types of system software programs.
What is Encryption?
Why do we COMPRESS files?
Name three examples of operating systems.

More Related Content

What's hot

Operatig System Tutorial Level3
Operatig System Tutorial Level3Operatig System Tutorial Level3
Operatig System Tutorial Level3
willye83
 
booting steps of a computer
booting steps of a computerbooting steps of a computer
booting steps of a computer
Anusha Babooa
 

What's hot (20)

Unit1 four part basic computer organization
Unit1 four part basic computer organizationUnit1 four part basic computer organization
Unit1 four part basic computer organization
 
operating system
operating systemoperating system
operating system
 
Introduction To operating System:
Introduction To operating System:Introduction To operating System:
Introduction To operating System:
 
Operatig System Tutorial Level3
Operatig System Tutorial Level3Operatig System Tutorial Level3
Operatig System Tutorial Level3
 
System software vt
System software vtSystem software vt
System software vt
 
Operating system
Operating systemOperating system
Operating system
 
Ch11
Ch11Ch11
Ch11
 
Ch12
Ch12Ch12
Ch12
 
Computer Organisation
Computer OrganisationComputer Organisation
Computer Organisation
 
BASICS OF COMPUTER
BASICS OF COMPUTERBASICS OF COMPUTER
BASICS OF COMPUTER
 
1 5 system software and computer management
1 5 system software and computer management1 5 system software and computer management
1 5 system software and computer management
 
Operating System Case Study and I/O System
Operating System Case Study and I/O SystemOperating System Case Study and I/O System
Operating System Case Study and I/O System
 
Unit 20 brief 1 task 2_worksheet
Unit 20 brief 1 task 2_worksheetUnit 20 brief 1 task 2_worksheet
Unit 20 brief 1 task 2_worksheet
 
Computer softwre
Computer softwreComputer softwre
Computer softwre
 
Ch01 introducing operating systems
Ch01 introducing operating systemsCh01 introducing operating systems
Ch01 introducing operating systems
 
OPERATING SYSTEM
OPERATING SYSTEMOPERATING SYSTEM
OPERATING SYSTEM
 
Operating System Structure (documentation)
Operating System Structure (documentation)Operating System Structure (documentation)
Operating System Structure (documentation)
 
Computer Literacy Lesson Two
Computer Literacy Lesson TwoComputer Literacy Lesson Two
Computer Literacy Lesson Two
 
Operating System
Operating SystemOperating System
Operating System
 
booting steps of a computer
booting steps of a computerbooting steps of a computer
booting steps of a computer
 

Viewers also liked

Cps 189 cps ongoing supervisory case review guide
Cps 189 cps ongoing supervisory case review guideCps 189 cps ongoing supervisory case review guide
Cps 189 cps ongoing supervisory case review guide
screaminc
 
2 amicus brief for-grandmother-as-amicus-curiae-in-support-of-appellant
2 amicus brief for-grandmother-as-amicus-curiae-in-support-of-appellant2 amicus brief for-grandmother-as-amicus-curiae-in-support-of-appellant
2 amicus brief for-grandmother-as-amicus-curiae-in-support-of-appellant
screaminc
 
Williams v. state
Williams v. stateWilliams v. state
Williams v. state
screaminc
 
Grand families.org --14-state-of-grandfamilies-report-final
Grand families.org --14-state-of-grandfamilies-report-finalGrand families.org --14-state-of-grandfamilies-report-final
Grand families.org --14-state-of-grandfamilies-report-final
screaminc
 
Objections and corrections draft
Objections and corrections draftObjections and corrections draft
Objections and corrections draft
screaminc
 
Class action lawsuit --kenny-a-consent-decree-entered-102805-file-stamped
Class action lawsuit --kenny-a-consent-decree-entered-102805-file-stampedClass action lawsuit --kenny-a-consent-decree-entered-102805-file-stamped
Class action lawsuit --kenny-a-consent-decree-entered-102805-file-stamped
screaminc
 
Extending foster care_policy_toolkit_5
Extending foster care_policy_toolkit_5Extending foster care_policy_toolkit_5
Extending foster care_policy_toolkit_5
screaminc
 
Leslie stewart custody lawyer
Leslie stewart custody lawyerLeslie stewart custody lawyer
Leslie stewart custody lawyer
screaminc
 
3.9 court review of custodial orders
3.9 court review of custodial orders3.9 court review of custodial orders
3.9 court review of custodial orders
screaminc
 
Cps 455 a safety assessment
Cps 455 a safety assessmentCps 455 a safety assessment
Cps 455 a safety assessment
screaminc
 
Certori of lower court example of format bring rissler petitioned
Certori of lower court example of format bring rissler petitionedCertori of lower court example of format bring rissler petitioned
Certori of lower court example of format bring rissler petitioned
screaminc
 
Cps 32 child fatality serious injury report
Cps 32 child fatality serious injury reportCps 32 child fatality serious injury report
Cps 32 child fatality serious injury report
screaminc
 
Deprivation rules 2014
Deprivation rules 2014Deprivation rules 2014
Deprivation rules 2014
screaminc
 

Viewers also liked (18)

Cps 189 cps ongoing supervisory case review guide
Cps 189 cps ongoing supervisory case review guideCps 189 cps ongoing supervisory case review guide
Cps 189 cps ongoing supervisory case review guide
 
2 amicus brief for-grandmother-as-amicus-curiae-in-support-of-appellant
2 amicus brief for-grandmother-as-amicus-curiae-in-support-of-appellant2 amicus brief for-grandmother-as-amicus-curiae-in-support-of-appellant
2 amicus brief for-grandmother-as-amicus-curiae-in-support-of-appellant
 
Williams v. state
Williams v. stateWilliams v. state
Williams v. state
 
Man3000
Man3000Man3000
Man3000
 
Lec1chap1f04
Lec1chap1f04Lec1chap1f04
Lec1chap1f04
 
Lec3chap2f04
Lec3chap2f04Lec3chap2f04
Lec3chap2f04
 
Grand families.org --14-state-of-grandfamilies-report-final
Grand families.org --14-state-of-grandfamilies-report-finalGrand families.org --14-state-of-grandfamilies-report-final
Grand families.org --14-state-of-grandfamilies-report-final
 
Objections and corrections draft
Objections and corrections draftObjections and corrections draft
Objections and corrections draft
 
Class action lawsuit --kenny-a-consent-decree-entered-102805-file-stamped
Class action lawsuit --kenny-a-consent-decree-entered-102805-file-stampedClass action lawsuit --kenny-a-consent-decree-entered-102805-file-stamped
Class action lawsuit --kenny-a-consent-decree-entered-102805-file-stamped
 
Extending foster care_policy_toolkit_5
Extending foster care_policy_toolkit_5Extending foster care_policy_toolkit_5
Extending foster care_policy_toolkit_5
 
Leslie stewart custody lawyer
Leslie stewart custody lawyerLeslie stewart custody lawyer
Leslie stewart custody lawyer
 
3.9 court review of custodial orders
3.9 court review of custodial orders3.9 court review of custodial orders
3.9 court review of custodial orders
 
Lec45chap4f04
Lec45chap4f04Lec45chap4f04
Lec45chap4f04
 
Cps 455 a safety assessment
Cps 455 a safety assessmentCps 455 a safety assessment
Cps 455 a safety assessment
 
Certori of lower court example of format bring rissler petitioned
Certori of lower court example of format bring rissler petitionedCertori of lower court example of format bring rissler petitioned
Certori of lower court example of format bring rissler petitioned
 
Cps 32 child fatality serious injury report
Cps 32 child fatality serious injury reportCps 32 child fatality serious injury report
Cps 32 child fatality serious injury report
 
Deprivation rules 2014
Deprivation rules 2014Deprivation rules 2014
Deprivation rules 2014
 
Ch06 deprivation-dependency
Ch06 deprivation-dependencyCh06 deprivation-dependency
Ch06 deprivation-dependency
 

Similar to Lec9chap8f04

Operatingsystems
Operatingsystems Operatingsystems
Operatingsystems
kuldeepy60
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
GOKUL SREE
 
Itk rawa t____operatingsystems2
Itk rawa t____operatingsystems2Itk rawa t____operatingsystems2
Itk rawa t____operatingsystems2
KapiL RawaT
 
PT101-WEEK-8-9-Importance-functions-of-Input-output-in-OS-1.pptx
PT101-WEEK-8-9-Importance-functions-of-Input-output-in-OS-1.pptxPT101-WEEK-8-9-Importance-functions-of-Input-output-in-OS-1.pptx
PT101-WEEK-8-9-Importance-functions-of-Input-output-in-OS-1.pptx
AngelikaSolomon
 
Amr Chap 08 Operating Systems & Utility Programs
Amr Chap 08 Operating Systems & Utility ProgramsAmr Chap 08 Operating Systems & Utility Programs
Amr Chap 08 Operating Systems & Utility Programs
sharing notes123
 

Similar to Lec9chap8f04 (20)

Operatingsystems
Operatingsystems Operatingsystems
Operatingsystems
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Systems and Applications.pptx
Systems and Applications.pptxSystems and Applications.pptx
Systems and Applications.pptx
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
 
Itk rawa t____operatingsystems2
Itk rawa t____operatingsystems2Itk rawa t____operatingsystems2
Itk rawa t____operatingsystems2
 
PT101-WEEK-8-9-Importance-functions-of-Input-output-in-OS-1.pptx
PT101-WEEK-8-9-Importance-functions-of-Input-output-in-OS-1.pptxPT101-WEEK-8-9-Importance-functions-of-Input-output-in-OS-1.pptx
PT101-WEEK-8-9-Importance-functions-of-Input-output-in-OS-1.pptx
 
Software
SoftwareSoftware
Software
 
Operating system of computer
Operating system of computerOperating system of computer
Operating system of computer
 
Cs1 3-operating systems
Cs1 3-operating systemsCs1 3-operating systems
Cs1 3-operating systems
 
Notes
NotesNotes
Notes
 
Introduction to Embedded Linux
Introduction to Embedded LinuxIntroduction to Embedded Linux
Introduction to Embedded Linux
 
Amr Chap 08 Operating Systems & Utility Programs
Amr Chap 08 Operating Systems & Utility ProgramsAmr Chap 08 Operating Systems & Utility Programs
Amr Chap 08 Operating Systems & Utility Programs
 
Reformat PPT.pptx
Reformat PPT.pptxReformat PPT.pptx
Reformat PPT.pptx
 
os.ppt
os.pptos.ppt
os.ppt
 
Operating system
Operating systemOperating system
Operating system
 
Linux fundamentals Training
Linux fundamentals TrainingLinux fundamentals Training
Linux fundamentals Training
 
operating system
operating systemoperating system
operating system
 
Operating system,window
Operating system,windowOperating system,window
Operating system,window
 
Ict 5
Ict 5Ict 5
Ict 5
 
Principles of operating system
Principles of operating systemPrinciples of operating system
Principles of operating system
 

More from screaminc

07052015 when the empirical base crumbles- the myth that open dependency proc...
07052015 when the empirical base crumbles- the myth that open dependency proc...07052015 when the empirical base crumbles- the myth that open dependency proc...
07052015 when the empirical base crumbles- the myth that open dependency proc...
screaminc
 
Juvenile justice delinquency prevention and treatment programs rfp (3)
Juvenile justice delinquency prevention and treatment programs rfp (3)Juvenile justice delinquency prevention and treatment programs rfp (3)
Juvenile justice delinquency prevention and treatment programs rfp (3)
screaminc
 
Civil discovery (section 9 11-37)
Civil discovery (section 9 11-37)Civil discovery (section 9 11-37)
Civil discovery (section 9 11-37)
screaminc
 
Amended+motion+for+new+trial+(pdf)
Amended+motion+for+new+trial+(pdf)Amended+motion+for+new+trial+(pdf)
Amended+motion+for+new+trial+(pdf)
screaminc
 
Motion for new trial -clu 12-19_14_no_51_14
Motion for new trial -clu 12-19_14_no_51_14Motion for new trial -clu 12-19_14_no_51_14
Motion for new trial -clu 12-19_14_no_51_14
screaminc
 
Amicus brief-draft-two
Amicus brief-draft-twoAmicus brief-draft-two
Amicus brief-draft-two
screaminc
 
Appealpowerpoint by darice goode
Appealpowerpoint   by darice goodeAppealpowerpoint   by darice goode
Appealpowerpoint by darice goode
screaminc
 
Juvenile code revised ---hb 242
Juvenile code revised ---hb 242Juvenile code revised ---hb 242
Juvenile code revised ---hb 242
screaminc
 
Appealpowerpoint
AppealpowerpointAppealpowerpoint
Appealpowerpoint
screaminc
 
Uniform juvenile court rules 01 22-13
Uniform juvenile court rules   01 22-13Uniform juvenile court rules   01 22-13
Uniform juvenile court rules 01 22-13
screaminc
 
March 2015 appeal--s14a1703
March 2015 appeal--s14a1703March 2015 appeal--s14a1703
March 2015 appeal--s14a1703
screaminc
 
How to file motion for new trial 07142015
How to file motion for new trial 07142015How to file motion for new trial 07142015
How to file motion for new trial 07142015
screaminc
 
Narcissistic personality disorder and the dsm–v --miller widigercampbell20101
Narcissistic personality disorder and the dsm–v --miller widigercampbell20101Narcissistic personality disorder and the dsm–v --miller widigercampbell20101
Narcissistic personality disorder and the dsm–v --miller widigercampbell20101
screaminc
 
Np v state_of_georgia_usa_statement_of_interest
Np v state_of_georgia_usa_statement_of_interestNp v state_of_georgia_usa_statement_of_interest
Np v state_of_georgia_usa_statement_of_interest
screaminc
 
Changes from dsm iv-tr to dsm-5
Changes from dsm iv-tr to dsm-5Changes from dsm iv-tr to dsm-5
Changes from dsm iv-tr to dsm-5
screaminc
 
Cps 36 open records request
Cps 36 open records requestCps 36 open records request
Cps 36 open records request
screaminc
 
Cps 198 i-screen out form-
Cps 198 i-screen out form-Cps 198 i-screen out form-
Cps 198 i-screen out form-
screaminc
 
Appeal format
Appeal formatAppeal format
Appeal format
screaminc
 
A reference manual for department of family and children services case managers
A reference manual for department of family and children services case managersA reference manual for department of family and children services case managers
A reference manual for department of family and children services case managers
screaminc
 

More from screaminc (20)

07052015 when the empirical base crumbles- the myth that open dependency proc...
07052015 when the empirical base crumbles- the myth that open dependency proc...07052015 when the empirical base crumbles- the myth that open dependency proc...
07052015 when the empirical base crumbles- the myth that open dependency proc...
 
Georgia court improvement project (cip)
Georgia court improvement project (cip)Georgia court improvement project (cip)
Georgia court improvement project (cip)
 
Juvenile justice delinquency prevention and treatment programs rfp (3)
Juvenile justice delinquency prevention and treatment programs rfp (3)Juvenile justice delinquency prevention and treatment programs rfp (3)
Juvenile justice delinquency prevention and treatment programs rfp (3)
 
Civil discovery (section 9 11-37)
Civil discovery (section 9 11-37)Civil discovery (section 9 11-37)
Civil discovery (section 9 11-37)
 
Amended+motion+for+new+trial+(pdf)
Amended+motion+for+new+trial+(pdf)Amended+motion+for+new+trial+(pdf)
Amended+motion+for+new+trial+(pdf)
 
Motion for new trial -clu 12-19_14_no_51_14
Motion for new trial -clu 12-19_14_no_51_14Motion for new trial -clu 12-19_14_no_51_14
Motion for new trial -clu 12-19_14_no_51_14
 
Amicus brief-draft-two
Amicus brief-draft-twoAmicus brief-draft-two
Amicus brief-draft-two
 
Appealpowerpoint by darice goode
Appealpowerpoint   by darice goodeAppealpowerpoint   by darice goode
Appealpowerpoint by darice goode
 
Juvenile code revised ---hb 242
Juvenile code revised ---hb 242Juvenile code revised ---hb 242
Juvenile code revised ---hb 242
 
Appealpowerpoint
AppealpowerpointAppealpowerpoint
Appealpowerpoint
 
Uniform juvenile court rules 01 22-13
Uniform juvenile court rules   01 22-13Uniform juvenile court rules   01 22-13
Uniform juvenile court rules 01 22-13
 
March 2015 appeal--s14a1703
March 2015 appeal--s14a1703March 2015 appeal--s14a1703
March 2015 appeal--s14a1703
 
How to file motion for new trial 07142015
How to file motion for new trial 07142015How to file motion for new trial 07142015
How to file motion for new trial 07142015
 
Narcissistic personality disorder and the dsm–v --miller widigercampbell20101
Narcissistic personality disorder and the dsm–v --miller widigercampbell20101Narcissistic personality disorder and the dsm–v --miller widigercampbell20101
Narcissistic personality disorder and the dsm–v --miller widigercampbell20101
 
Np v state_of_georgia_usa_statement_of_interest
Np v state_of_georgia_usa_statement_of_interestNp v state_of_georgia_usa_statement_of_interest
Np v state_of_georgia_usa_statement_of_interest
 
Changes from dsm iv-tr to dsm-5
Changes from dsm iv-tr to dsm-5Changes from dsm iv-tr to dsm-5
Changes from dsm iv-tr to dsm-5
 
Cps 36 open records request
Cps 36 open records requestCps 36 open records request
Cps 36 open records request
 
Cps 198 i-screen out form-
Cps 198 i-screen out form-Cps 198 i-screen out form-
Cps 198 i-screen out form-
 
Appeal format
Appeal formatAppeal format
Appeal format
 
A reference manual for department of family and children services case managers
A reference manual for department of family and children services case managersA reference manual for department of family and children services case managers
A reference manual for department of family and children services case managers
 

Recently uploaded

Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
gajnagarg
 
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pillsIn Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
Abortion pills in Riyadh +966572737505 get cytotec
 
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
ehyxf
 
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
wpkuukw
 
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
tufbav
 
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
drmarathore
 
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证
ehyxf
 
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
ehyxf
 
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
wpkuukw
 
Abortion pills in Jeddah |+966572737505 | Get Cytotec
Abortion pills in Jeddah |+966572737505 | Get CytotecAbortion pills in Jeddah |+966572737505 | Get Cytotec
Abortion pills in Jeddah |+966572737505 | Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
怎样办理伍伦贡大学毕业证(UOW毕业证书)成绩单留信认证
怎样办理伍伦贡大学毕业证(UOW毕业证书)成绩单留信认证怎样办理伍伦贡大学毕业证(UOW毕业证书)成绩单留信认证
怎样办理伍伦贡大学毕业证(UOW毕业证书)成绩单留信认证
ehyxf
 
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptx
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptxCRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptx
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptx
Rishabh332761
 
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
wpkuukw
 
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一
uodye
 
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
uodye
 

Recently uploaded (20)

Critical Commentary Social Work Ethics.pptx
Critical Commentary Social Work Ethics.pptxCritical Commentary Social Work Ethics.pptx
Critical Commentary Social Work Ethics.pptx
 
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
 
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pillsIn Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
 
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
 
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
 
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
 
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
 
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证
 
Hilti's Latest Battery - Hire Depot.pptx
Hilti's Latest Battery - Hire Depot.pptxHilti's Latest Battery - Hire Depot.pptx
Hilti's Latest Battery - Hire Depot.pptx
 
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
 
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
 
Abortion pills in Jeddah |+966572737505 | Get Cytotec
Abortion pills in Jeddah |+966572737505 | Get CytotecAbortion pills in Jeddah |+966572737505 | Get Cytotec
Abortion pills in Jeddah |+966572737505 | Get Cytotec
 
怎样办理伍伦贡大学毕业证(UOW毕业证书)成绩单留信认证
怎样办理伍伦贡大学毕业证(UOW毕业证书)成绩单留信认证怎样办理伍伦贡大学毕业证(UOW毕业证书)成绩单留信认证
怎样办理伍伦贡大学毕业证(UOW毕业证书)成绩单留信认证
 
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptx
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptxCRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptx
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptx
 
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...
 
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
 
LANDSLIDE MONITORING AND ALERT SYSTEM FINAL YEAR PROJECT BROCHURE
LANDSLIDE MONITORING AND ALERT SYSTEM FINAL YEAR PROJECT BROCHURELANDSLIDE MONITORING AND ALERT SYSTEM FINAL YEAR PROJECT BROCHURE
LANDSLIDE MONITORING AND ALERT SYSTEM FINAL YEAR PROJECT BROCHURE
 
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一
 
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
 
Point of Care Testing in clinical laboratory
Point of Care Testing in clinical laboratoryPoint of Care Testing in clinical laboratory
Point of Care Testing in clinical laboratory
 

Lec9chap8f04

  • 1. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 1 / 21 File: lec9chap8f04.doc General Items: ? Computer security ? Computer purchasing Reading Materials: ? Miscellaneous:
  • 2. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 2 / 21 File: lec9chap8f04.doc Type of software - System Software o programs controlling the operation of the computer and devices ?Operating system programs (platform) ?Utility programs - Application (perform a specific task) o Graphics, Multimedia, Web page designer, Communication software o Designed for a specific OS – some can be cross-platform Operating system (OS) - An OS is a set of programs that coordinate activities between computer hardware resources - Also called software platform - It typically resides in the hardware or ROM - Examples: Windows XP, Mac OS X - Operating System Starting Computer User Interface Managing Programs Configuring Devices Monitoring performance Controlling NetworkOS Functions
  • 3. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 3 / 21 File: lec9chap8f04.doc Basic idea - Not all computers need OS o hardware is fixed, same program is run at all times - Examples: Macintosh, Windows, Unix - Functions: o Manages hardware and software resources o Applications to deal with hardware - Four types: o Real time (very little user-interface capability and no end-user utilities) o Single user-single task (Palm OS - DOS) o Single user-multitask (Desktop) o Multi user (Networking) Computer booting (wakeup-call) - This is one of the basic OS functions - Bootstrap: a program that loads the OS into the RAM - Booting: Computer startup or restarting process o Cold booting or warm booting o Upon booting -> OS instructions are loaded in the RAM o o Kernel: Instructions managing memory and devices, application startups, maintains computer’s clock – Core or OS Operating System Programs: Memory resident (reside in RAM) Example: Kernel Nonresident (reside in hardware)
  • 4. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 4 / 21 File: lec9chap8f04.doc Starting a computer: - Power up - Processor reset, Finding the ROM BIOS chips o Basic Input/Output System (contains startup instructions) o Executes a series of tests to make sure all devices are operational (keyboard, monitor, internal busses, RAM chips, etc.) - BIOS performs the POST: Power-on self test o The result is compared with the information recorded in the CMOS chip o CMOS chip maintains the information about system configuration, memory, other devices o Finds new devices o Detects any device errors - BIOS starts searching for “system files” (drive A, C, CD, etc.) o .COM, .DRV, .DLL, .366, etc. o System files are loaded in the RAM - The KERNEL is loaded in the memory (the operating system takes over!) - The operating system loads the system configuration o System configuration information are in REGISTRY files - Files in the Startup Folder are executed User Interface Interacting with software through user interface - Command line (command language) - Graphical (GUI) – menu, Icons Managing programs - Single user/single tasking - Single user/multitasking o Foreground and background processing - Multi users
  • 5. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 5 / 21 File: lec9chap8f04.doc - Multi processing (supporting two or more processors) o Fault-tolerant computer (duplicated components) Memory Management - Used to optimize the use of RAM o How to distribute data, instructions, programs in different memory locations o Clearing unused memory locations - Virtual memory o Optimizing the RAM o Using hardware disk as additional RAM (called swap file) o Paging: technique of swapping items between memory and hard drive: Swap out (of RAM), Swap in (the RAM) o When paging time is too long -> more RAM is required (Thrashing) – not much execution is going on! Scheduling job - The operating system performs operations (jobs) based on some order - Serving disciplines: FCFS operations, Priority Operations - Buffering: Waiting for available resources - Spooling: o Buffering PRINT jobs (advantage?) o Jobs are QUEUED (stacked) o Print spooler: a program that places jobs in the queue Configuring devices Device drivers are used to communicate with different devices A device driver is a program: how the processor should communicate with a device – Print drivers (*.drv) Installing drivers Plug and play (computer recognizes the device)
  • 6. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 6 / 21 File: lec9chap8f04.doc Monitoring performance - Operating systems can monitor system performance - Uses a performance monitor program (resident or nonresident program?) - Includes: Disk usage, memory usage, processor activities, number of reads and writes to a file – provides a good way to measure your system resources (need more VM?) File management services - Include storage and file management functions - Includes: o Formatting and disk copying ?Formatting: Preparing a disk for reading and writing ?When a disk is formatted it looses all its information o Checking the available storage o Copy, renaming, deleting, moving, creating short cuts Controlling a network - Operating systems can be Network OS (NOS) - Connecting a server and several clients - Sharing resources / resource allocation
  • 7. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 7 / 21 File: lec9chap8f04.doc Types of operating systems DOS: - MS-DOS (Disk Operating System) 1980 - Used for personal computers - IBM Compatibles - Uses Command lines Windows 3.x: - DOS driven program with GUI interface (3.1, 3.11, etc.) - DOS-based OS with GUI operating environment - Not multitasking - Based on 16-bit processors Time DOS Win 3.x Win 95 NT Win 98 Win 2000 Millen XP Home XP Prof. Power/ Integration
  • 8. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 8 / 21 File: lec9chap8f04.doc Windows 95 - Multi tasking OS (not based on DOS) - Uses 32-bit processors - Used for Windows NT Windows Me - Upgrade to 98 - For home users - Optimized for digital photography and movies, audio, web design, home networking Windows XP - Home and professional editions - Movie Maker - Better file sharing - Fast startup - Better security
  • 9. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 9 / 21 File: lec9chap8f04.doc - Types of operating systems: - Stand- alone: Complete OS working on a desktop, notebook, etc. Examples: Window XP, Mac, Linux, UNIX - Network: Designed to support networks, typically reside on the server, - Embedded: Reside on a ROM chip – used for PDAs mobile devices, Examples: Windows CE, .NET, Windows Mobile
  • 10. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 10 / 21 File: lec9chap8f04.doc Type of software - Application (perform a specific task) o Graphics, Multimedia, Web page designer, Communication software - System Software o programs controlling the operation of the computer and devices ?Operating system programs ?Utility programs Utility Programs - A system software that typically manages a computer, its devices or its programs - Utility suites: collection of several utility programs - Examples of utility programs: Norton Utilities, McAfee - Basic utility files: o File viewer: View or copy files o File compression: Shrinks (Zips) the size of a file – PKZIP, PKUNZIP o Diagnostic utility: Compile information about the computer performance and devices - memory usage, processor utilization, etc. o Uninstaller: Utility that removes all the related files, typically embedded in the OS o Scanning files: Moves all unnecessary files, finds some physical and logical problems ?Physical problem: bad disk, scratched CD ?Logical problem: corrupted files
  • 11. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 11 / 21 File: lec9chap8f04.doc o Defragmenting: Organizing the files on the hard drive ?Fragmented file: a files scattered on different sectors on the HD ?Defragmenting: place files on continuous sectors o Backup utility: copy and backup your files ?Program restoration: accessing the backup files ?Using an Internet hard drive o Screen savers: ?Used to be critical to avoid permanent image “etching” on monitor’s screen ?Today mostly used for screen blocking ?Want some cool screen savers? http://www.free-search.com/ -
  • 12. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 12 / 21 File: lec9chap8f04.doc Who are computer hackers? - A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. - One who programs enthusiastically (even obsessively) - A person capable of appreciating hack value. - A person who is good at programming quickly. - An expert at a particular program, or one who frequently does work using it or on it. Basic hacking operations - Piracy (copying and using commercial software purchased by someone else) - Sniffing gather information regarding the status of components of a network system - Attackers (forcing to teardown the system) - And more… Cute hacking - Play with the hidden files - Change system files (boot-up logos) Hacking software - Password stealer (AOL password, windows, etc.) - Sniffers - Cracking tools - Spy tools (monitor all key strokes, and other computer activities)
  • 13. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 13 / 21 File: lec9chap8f04.doc Why do we need computer security? - Thanks to Internet a huge amount of personal information are being exchanged on the net - Credit-card information - Social Security numbers - Private correspondence - Personal details - Sensitive company information - Bank-account information Basic security operations - Encryption - Authentication Encryption - Definition: Encoding the contents of the message in such a way that hides its contents from outsiders - Goes back to the Roman Empire. - Without a computer it is easy to break (crack) the code! - Check the LOCK in your web page! - Also used in cell phones and cordless phones - The encrypted message is called the ciphertext. - The process of retrieving the plaintext from the ciphertext is called decryption. - Encryption and decryption usually make use of a key - Cryptanalysis is the art of breaking ciphers, i.e. retrieving the plaintext without knowing the proper key - One popular way is to have a Public-key (PGP) - The key is based on a HASH value
  • 14. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 14 / 21 File: lec9chap8f04.doc Authentication - Password - Password card - Digital signature - Biometric o Face scan o Retina check o Finger print o Voice identification
  • 15. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 15 / 21 File: lec9chap8f04.doc Purchasing a computer - Computer category o Desktop o Laptop o Supercomputer o Internet application - Basic Component o CD/DVD – 24/48 X (150 KBps) / 650MB & 4.7 GB o Modems – 56Kbps o Network cards - Supporting DSL o Printer – Ink jet; Laser o Monitor – LCD, CRT; 17,19,21 inches; o Processor – Intel; ADM 2.2 GHz o RAM – 256; 516 MB o Internet connection – Subscription to ISP, OSP - Purchasing a laptop o Screen size o Processor o Hard drive size o Wireless card o Available software o Weight o Memory – RAM o Disk drive / CD-RW o Warranty o Built-in cam o Backup hard drive
  • 16. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 16 / 21 File: lec9chap8f04.doc - Purchasing online o http://www.dell.com o Configure your own PC: ? http://www.mypcgoodies.com ?http://www.directpc.ca/index.jsp o Search for "computer auction" ?http://www.dellauction.com/ o search through eBay: www.ebay.com ?Search for computer, laptop ?You can BID on different items! o Always check the price online! o Check your computer configuration: http://www.pny.com/configurator/config.asp
  • 17. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 17 / 21 File: lec9chap8f04.doc Learn more about computers: PC MAC Reviews/Guides www.shopper.cnet.com www.store.apple.com www.shopper.cnet.com www.hp.com www.clubmac.com www.pcworld.com www.compusa.com www.macx.com www.byte.com www.dartek.com www.apple.com www.zdnet.com/review www.dell.com www.eshop.msn.com www.gateway.com www.macworld.com www.micron.com www.global.acer.com www.fujitsu.com www.sony.com - Warranty? o How expensive is it? o How many years? o One time? o Covers the screen o Buy back programs! Nothing short of hoax!
  • 18. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 18 / 21 File: lec9chap8f04.doc - So what do you use the computer for? o School (work processing and simple projects) ?Anything works! o Mostly games ?Lots of memory and fast processor ?Good monitor ?Joysticks, etc. o Internet / browsing / emailing ?Good connection o Advance applications (programming) ?Lots of memory and fast processor o Multimedia (digital photography) ?Lots of memory and fast processor ?Good Sound card - Creative Sound Blaster Audigy 2 ZS Good ?Video card - Quadro4 3000 FX, 256 MB, AGP 8x ? 3-D display capacity - Processor types o Pentium o ADM Athlon XP o Celeron - Operating system o Windows o Mac o Unix - Capability o RAM size o Processor speed o CD ROM/DVD/ CD Write (CDRW) o Video Card o Cache o Modem / drivers
  • 19. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 19 / 21 File: lec9chap8f04.doc - Software o Office o Acrobat products o Games o Some are just free! - Accessories o Printer o Scanner o Digital camera - Smart shoppers o Return policies o Hidden costs Check several places and compare prices!
  • 20. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 20 / 21 File: lec9chap8f04.doc Quiz Name two types of system software programs. Name three examples of operating systems. What is Virtual Memory? – Where is it? What is booting? How many types of booting we have? What is Plug and Play?
  • 21. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 21 / 21 File: lec9chap8f04.doc Quiz Name two types of system software programs. What is Encryption? Why do we COMPRESS files? Name three examples of operating systems.