SlideShare une entreprise Scribd logo
1  sur  50
System Software
• System software consists of the programs that
control or maintain the operations of the
computer and its devices
Discovering Computers 2012: Chapter 8 1Page 398
Operating
systems
Utility
Programs
Operating Systems
• An operating system (OS) is a set of programs containing
instructions that work together to coordinate all the
activities among computer hardware resources
Discovering Computers 2012: Chapter 8 2Pages 398 - 399
Start and shut
down a
computer
Provide a user
interface
Manage
programs
Manage
memory
Coordinate
tasks
Configure
devices
Establish an
Internet
connection
Monitor
performance
Provide
utilities
Automatically
update
Control a
network
Administer
security
Operating Systems
Discovering Computers 2012: Chapter 8 3Pages 398 – 399
Figure 8-1
Operating System Functions
• The process of starting or restarting a computer is
called booting
Discovering Computers 2012: Chapter 8 4Page 400
Figure 8-2
Cold boot
• Turning on
a computer
that has
been
powered off
completely
Warm boot
• Using the
operating
system to
restart a
computer
Operating System Functions
Discovering Computers 2012: Chapter 8 5Page 401
Figure 8-3
Operating System Functions
A boot drive is the drive from
which your computer starts
•You can boot from a boot disk
•A recovery disk contains a few system
files that will start the computer
Discovering Computers 2012: Chapter 8 6Page 402
Operating System Functions
• An operating system includes various shut down
options
Discovering Computers 2012: Chapter 8 7Page 402
Sleep mode saves any open
documents and programs to
RAM, turns off all unneeded
functions, and then places
the computer in a low-
power state
Hibernate saves any open
documents and programs to
a hard disk before removing
power from the computer
Operating System Functions
• A user interface
controls how you
enter data and
instructions and
how information is
displayed on the
screen
• With a graphical
user interface
(GUI), you interact
with menus and
visual images
Discovering Computers 2012: Chapter 8
8Pages 402 – 403
Figure 8-4
Operating System Functions
• With a command-line interface, a user uses the
keyboard to enter data and instructions
Discovering Computers 2012: Chapter 8 9Page 403
Figure 8-5
Operating System Functions
• How an operating system handles programs
directly affects your productivity
Discovering Computers 2012: Chapter 8 10Pages 404 - 405
Single user and
multiuser
Single tasking
and
multitasking
Foreground and
background
Preemptive
multitasking
Multiprocessing
Operating System Functions
Discovering Computers 2012: Chapter 8 11Page 404
Figure 8-6
Operating System Functions
• Memory management optimizes the use of RAM
• Virtual memory is a portion of a storage medium
functioning as additional RAM
Discovering Computers 2012: Chapter 8 12Page 406
Figure 8-8
Operating System Functions
• The operating system determines the order in
which tasks are processed
Discovering Computers 2012: Chapter 8 13Page 407
Figure 8-9
Operating System Functions
Discovering Computers 2012: Chapter 8 14Page 408
Operating System Functions
• Operating systems typically provide a means to
establish Internet connections
Discovering Computers 2012: Chapter 8 15Page 408
Figure 8-10
Operating System Functions
• A performance monitor is a program that
assesses and reports information about various
computer resources and devices
Discovering Computers 2012: Chapter 8 16Pages 408 – 409
Figure 8-11
Operating System Functions
• Operating systems often provide users with the
capability of:
Discovering Computers 2012: Chapter 8 17Page 409
Managing files
Searching for
files
Viewing
images
Securing a
computer
Uninstalling
programs
Cleaning up
disks
Defragmenting
disks
Diagnosing
problems
Backing up
files and disks
Setting up
screen savers
Operating System Functions
• Automatic update automatically provides updates
to the program
Discovering Computers 2012: Chapter 8 18Page 409
Figure 8-12
Operating System Functions
• Some operating systems
are designed to work
with a server on a
network
• A server operating
system organizes and
coordinates how
multiple users access
and share resources on
a network
• A network
administrator uses the
server operating system
to:
– Add and remove users,
computers, and other
devices
– Install software and
administer network
security
Discovering Computers 2012: Chapter 8
19Page 410
Operating System Functions
• Each user has a user
account
– A user name, or user ID,
identifies a specific user
– A password is a private
combination of
characters associated
with the user name
Discovering Computers 2012: Chapter 8
20Page 410
Figure 8-13
Types of Operating Systems
Discovering Computers 2012: Chapter 8 21Page 412
Figure 8-14
Stand-Alone Operating Systems
• A stand-alone operating system is a complete
operating system that works on a desktop
computer, notebook computer, or mobile
computing device
Discovering Computers 2012: Chapter 8 22Page 412
Windows
7
Mac OS X
UNIX Linux
Stand-Alone Operating Systems
• Windows 7 is Microsoft’s fastest, most efficient
operating system to date and is available in
multiple editions:
Discovering Computers 2012: Chapter 8 23Pages 413 - 414
Windows 7
Starter
Windows 7
Home
Premium
Windows 7
Ultimate
Windows 7
Professional
Stand-Alone Operating Systems
• Windows 7 provides programs such as:
Discovering Computers 2012: Chapter 8 24Page 414
Windows
Firewall
Windows DVD
Maker
Windows
Media Player
Desktop
Gadget Gallery
Stand-Alone Operating Systems
Discovering Computers 2012: Chapter 8
25Page 414
Figures 8-16 – 8-17
Stand-Alone Operating Systems
Discovering Computers 2012: Chapter 8 26Page 415
Figure 8-18
Stand-Alone Operating Systems
• The Macintosh operating system has set the
standard for operating system ease of use
• Latest version is Mac OS X
Discovering Computers 2012: Chapter 8 27Page 415
Figure 8-19
Stand-Alone Operating Systems
UNIX is a multitasking
operating system developed
in the early 1970s
Linux is an open-source,
popular, multitasking UNIX-
type operating system
Discovering Computers 2012: Chapter 8 28Pages 416 – 417
Figures 8-20 – 8-21
Server Operating Systems
Windows
Server 2008
UNIX Linux
Solaris NetWare
Discovering Computers 2012: Chapter 8 29Pages 417 - 418
Server Operating Systems
• Windows Server 2008 is an upgrade to Windows
Server 2003
– Part of the Windows Server 2008 family
– Multiple editions
• Most editions include Hyper-V, a virtualization
technology
– Virtualization is the practice of sharing or pooling computing
resources
Discovering Computers 2012: Chapter 8 30Pages 417 - 418
Embedded Operating Systems
• An embedded operating system resides on a ROM chip
on a mobile device or consumer electronic device
Discovering Computers 2012: Chapter 8 31Pages 418 - 420
Windows
Embedded CE
Windows
Phone 7
Palm OS iPhone OS
BlackBerry
Google
Android
Embedded
Linux
Symbian OS
Embedded Operating Systems
Discovering Computers 2012: Chapter 8 32Pages 419 – 420
Figures 8-22 – 8-26
Utility Programs
• A utility program is a type of system software that
allows a user to perform maintenance-type tasks
Discovering Computers 2012: Chapter 8 33Page 421
Figure 8-27
Utility Programs
• A file manager is a
utility that performs
functions related to file
management
– Displaying a list of files
– Organizing files in folders
– Copying, renaming,
deleting, moving, and
sorting files and folders
– Creating shortcuts
Discovering Computers 2012: Chapter 8
34Page 422
Figure 8-28
Utility Programs
• A search utility is a program that attempts to
locate a file on your computer based on criteria
you specify
Discovering Computers 2012: Chapter 8 35Page 422
Figure 8-29
Utility Programs
• An image viewer allows
users to display, copy,
and print the contents
of a graphics file
• An uninstaller removes
a program, as well as
any associated entries
in the system files
Discovering Computers 2012: Chapter 8
36Page 423
Figure 8-30
Utility Programs
• A disk cleanup utility searches for and removes
unnecessary files
– Downloaded program
files
– Temporary Internet
files
– Deleted files
– Unused program
files
Discovering Computers 2012: Chapter 8 37Page 423
Figure 8-31
Utility Programs
• A disk defragmenter reorganizes the files and
unused space on a computer’s hard disk so that the
operating system accesses data more quickly and
programs run faster
– Defragmenting
Discovering Computers 2012: Chapter 8
38Pages 423 – 424
Figure 8-32
Utility Programs
• A backup utility allows
users to copy files to
another storage
medium
• A restore utility
reverses the process
and returns backed up
files to their original
form
Discovering Computers 2012: Chapter 8
39Page 424
Figure 8-33
Utility Programs
• A screen saver causes a
display device’s screen
to show a moving image
or blank screen if no
activity occurs for a
specified time
• A personal firewall
detects and protects a
personal computer
from unauthorized
intrusions
Discovering Computers 2012: Chapter 8
40Page 425
Figures 8-34 – 8-35
Utility Programs
A virus describes a potentially damaging computer
program that affects a computer negatively
A worm copies
itself
repeatedly in
memory or
over a network
A Trojan horse
hides within or
looks like a
legitimate
program
An antivirus
program
protects a
computer
against viruses
Discovering Computers 2012: Chapter 8 41Pages 425 - 426
Utility Programs
Discovering Computers 2012: Chapter 8 42Pages 425 – 426
Figures 8-36 – 8-37
Utility Programs
Spyware is a program placed on
a computer without the user’s
knowledge that secretly collects
information about the user
• A spyware remover detects
and deletes spyware and
other similar programs
Adware displays an online
advertisement in a banner or
pop-up window
• An adware remover is a
program that detects and
deletes adware
Discovering Computers 2012: Chapter 8 43Page 426
Utility Programs
• Filters are programs that remove or block certain
items from being displayed
Discovering Computers 2012: Chapter 8 44Pages 426 - 427
Web filtering
software
Anti-spam
programs
Phishing
filters
Pop-up
blockers
Utility Programs
• A file compression utility shrinks the size of a file(s)
– Compressing files frees up room on the storage media
– Two types of compression
• Lossy
• Lossless
• Compressed files sometimes are called zipped files
– Can be uncompressed
Discovering Computers 2012: Chapter 8 45Page 427
Utility Programs
• A media player allows you to view images and
animation, listen to audio, and watch video files
on your computer
Discovering Computers 2012: Chapter 8 46Page 427
Figure 8-38
Utility Programs
• Disc burning software
writes text, graphics,
audio, and video files
on a recordable or
rewritable optical disc
Discovering Computers 2012: Chapter 8
47Page 428
Figure 8-39
Utility Programs
• A personal computer
maintenance utility
identifies and fixes
operating system
problems, detects and
repairs disk problems,
and includes the
capability of improving
a computer’s
performance
Discovering Computers 2012: Chapter 8
48Page 428
Figure 8-40
Summary
Definition of an
operating system
Functions common to
most operating systems
Variety of stand-alone
operating systems,
server operating
systems, and embedded
operating systems
Several utility programs
Discovering Computers 2012: Chapter 8 49Page 429
Your Interactive Guide
to the Digital World
Discovering
Computers 2012
Chapter 8 Complete

Contenu connexe

Tendances

Discovering Computers: Chapter 05
Discovering Computers: Chapter 05Discovering Computers: Chapter 05
Discovering Computers: Chapter 05Anna Stirling
 
Chapter 05 Digital Safety and Security
Chapter 05 Digital Safety and SecurityChapter 05 Digital Safety and Security
Chapter 05 Digital Safety and Securityxtin101
 
CH08-Types of Utility programs and Operating System
CH08-Types of Utility programs and Operating SystemCH08-Types of Utility programs and Operating System
CH08-Types of Utility programs and Operating SystemSukanya Ben
 
Chapter 5 input
Chapter 5   inputChapter 5   input
Chapter 5 inputhaider ali
 
Types and components of computer system
Types and components of computer systemTypes and components of computer system
Types and components of computer systemmkhisalg
 
Discovering Computers: Chapter 14
Discovering Computers: Chapter 14Discovering Computers: Chapter 14
Discovering Computers: Chapter 14Anna Stirling
 
Discovering Computers: Chapter 13
Discovering Computers: Chapter 13Discovering Computers: Chapter 13
Discovering Computers: Chapter 13Anna Stirling
 
Discovering Computers: Chapter 06
Discovering Computers: Chapter 06Discovering Computers: Chapter 06
Discovering Computers: Chapter 06Anna Stirling
 
Chapter 02 The Internet
Chapter 02 The InternetChapter 02 The Internet
Chapter 02 The Internetxtin101
 
Chapter 2 the internet and world wide web
Chapter 2   the internet and world wide webChapter 2   the internet and world wide web
Chapter 2 the internet and world wide webhaider ali
 
Components of computer and software: Introduction
Components of computer and software: IntroductionComponents of computer and software: Introduction
Components of computer and software: IntroductionShivaraj Bhardwaj
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirusShabnam Bashir
 
The different components of a computer system
The different components of a computer system The different components of a computer system
The different components of a computer system Subagini Manivannan
 
Fundamentals of information technology
Fundamentals       of          information   technologyFundamentals       of          information   technology
Fundamentals of information technologyhaider ali
 
Chapter01Introducing Hardware
Chapter01Introducing HardwareChapter01Introducing Hardware
Chapter01Introducing HardwarePatty Ramsey
 
Chapter 09 Operating Systems
Chapter 09 Operating SystemsChapter 09 Operating Systems
Chapter 09 Operating Systemsxtin101
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...yaminohime
 
Evolution of Microsoft windows operating systems
Evolution of Microsoft windows operating systemsEvolution of Microsoft windows operating systems
Evolution of Microsoft windows operating systemsSai praveen Seva
 

Tendances (20)

Discovering Computers: Chapter 05
Discovering Computers: Chapter 05Discovering Computers: Chapter 05
Discovering Computers: Chapter 05
 
Chapter 05 Digital Safety and Security
Chapter 05 Digital Safety and SecurityChapter 05 Digital Safety and Security
Chapter 05 Digital Safety and Security
 
CH08-Types of Utility programs and Operating System
CH08-Types of Utility programs and Operating SystemCH08-Types of Utility programs and Operating System
CH08-Types of Utility programs and Operating System
 
Chapter 5 input
Chapter 5   inputChapter 5   input
Chapter 5 input
 
Types and components of computer system
Types and components of computer systemTypes and components of computer system
Types and components of computer system
 
Discovering Computers: Chapter 14
Discovering Computers: Chapter 14Discovering Computers: Chapter 14
Discovering Computers: Chapter 14
 
Discovering Computers: Chapter 13
Discovering Computers: Chapter 13Discovering Computers: Chapter 13
Discovering Computers: Chapter 13
 
Discovering Computers: Chapter 06
Discovering Computers: Chapter 06Discovering Computers: Chapter 06
Discovering Computers: Chapter 06
 
Chapter 02 The Internet
Chapter 02 The InternetChapter 02 The Internet
Chapter 02 The Internet
 
Chapter 04
Chapter 04Chapter 04
Chapter 04
 
Chapter 2 the internet and world wide web
Chapter 2   the internet and world wide webChapter 2   the internet and world wide web
Chapter 2 the internet and world wide web
 
Components of computer and software: Introduction
Components of computer and software: IntroductionComponents of computer and software: Introduction
Components of computer and software: Introduction
 
System software vs application software
System software vs application softwareSystem software vs application software
System software vs application software
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
The different components of a computer system
The different components of a computer system The different components of a computer system
The different components of a computer system
 
Fundamentals of information technology
Fundamentals       of          information   technologyFundamentals       of          information   technology
Fundamentals of information technology
 
Chapter01Introducing Hardware
Chapter01Introducing HardwareChapter01Introducing Hardware
Chapter01Introducing Hardware
 
Chapter 09 Operating Systems
Chapter 09 Operating SystemsChapter 09 Operating Systems
Chapter 09 Operating Systems
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
 
Evolution of Microsoft windows operating systems
Evolution of Microsoft windows operating systemsEvolution of Microsoft windows operating systems
Evolution of Microsoft windows operating systems
 

Similaire à Chapter 8 operating systems and utility programs

Operating systems
Operating systemsOperating systems
Operating systemsvicky vicky
 
Utility-Softwares.pptxgdgfgdgdfgdfggfgfd
Utility-Softwares.pptxgdgfgdgdfgdfggfgfdUtility-Softwares.pptxgdgfgdgdfgdfggfgfd
Utility-Softwares.pptxgdgfgdgdfgdfggfgfdghioredondo0
 
CH. 4 Operating Systems and Utility Programs
CH. 4 Operating Systems and Utility ProgramsCH. 4 Operating Systems and Utility Programs
CH. 4 Operating Systems and Utility Programsmalik1972
 
Week2 chapter 02_2.6.1.1_os_2015
Week2 chapter 02_2.6.1.1_os_2015Week2 chapter 02_2.6.1.1_os_2015
Week2 chapter 02_2.6.1.1_os_2015indranirishi
 
Week8 chapter 02_2.6.1.1_os_2016
Week8 chapter 02_2.6.1.1_os_2016Week8 chapter 02_2.6.1.1_os_2016
Week8 chapter 02_2.6.1.1_os_2016dilahkmpk
 
Operating System And Utility Program
Operating System And Utility ProgramOperating System And Utility Program
Operating System And Utility ProgramVicq Chibi'sLover
 
Chapter 05 os dan utility program csc & tts
Chapter 05 os dan utility program csc & ttsChapter 05 os dan utility program csc & tts
Chapter 05 os dan utility program csc & ttsHisyam Rosly
 
W2 q3-function-of-operating-system (2)
W2 q3-function-of-operating-system (2)W2 q3-function-of-operating-system (2)
W2 q3-function-of-operating-system (2)Sonnie Bars
 
Lecture-3: Operating System & Application Softwares
Lecture-3: Operating System & Application SoftwaresLecture-3: Operating System & Application Softwares
Lecture-3: Operating System & Application SoftwaresMubashir Ali
 
PDT DC015 Chapter 2 Computer System 2017/2018 (m)
PDT DC015 Chapter 2 Computer System 2017/2018 (m)PDT DC015 Chapter 2 Computer System 2017/2018 (m)
PDT DC015 Chapter 2 Computer System 2017/2018 (m)Fizaril Amzari Omar
 
PST SC015 Chapter 2 Computer System (IV) 2017/2018
PST SC015 Chapter 2 Computer System (IV) 2017/2018PST SC015 Chapter 2 Computer System (IV) 2017/2018
PST SC015 Chapter 2 Computer System (IV) 2017/2018Fizaril Amzari Omar
 
BAIT1003 Chapter 6
BAIT1003 Chapter 6BAIT1003 Chapter 6
BAIT1003 Chapter 6limsh
 
Operating System & Utility Programme
Operating System & Utility ProgrammeOperating System & Utility Programme
Operating System & Utility Programmebbp2067
 
Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)ella dimaiwat
 

Similaire à Chapter 8 operating systems and utility programs (20)

Operating systems
Operating systemsOperating systems
Operating systems
 
Utility-Softwares.pptxgdgfgdgdfgdfggfgfd
Utility-Softwares.pptxgdgfgdgdfgdfggfgfdUtility-Softwares.pptxgdgfgdgdfgdfggfgfd
Utility-Softwares.pptxgdgfgdgdfgdfggfgfd
 
CH. 4 Operating Systems and Utility Programs
CH. 4 Operating Systems and Utility ProgramsCH. 4 Operating Systems and Utility Programs
CH. 4 Operating Systems and Utility Programs
 
Week2 chapter 02_2.6.1.1_os_2015
Week2 chapter 02_2.6.1.1_os_2015Week2 chapter 02_2.6.1.1_os_2015
Week2 chapter 02_2.6.1.1_os_2015
 
Week8 chapter 02_2.6.1.1_os_2016
Week8 chapter 02_2.6.1.1_os_2016Week8 chapter 02_2.6.1.1_os_2016
Week8 chapter 02_2.6.1.1_os_2016
 
Week 6
Week 6Week 6
Week 6
 
Operating System And Utility Program
Operating System And Utility ProgramOperating System And Utility Program
Operating System And Utility Program
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Chapter_09_OS.pdf
Chapter_09_OS.pdfChapter_09_OS.pdf
Chapter_09_OS.pdf
 
Chapter 05 os dan utility program csc & tts
Chapter 05 os dan utility program csc & ttsChapter 05 os dan utility program csc & tts
Chapter 05 os dan utility program csc & tts
 
W2 q3-function-of-operating-system (2)
W2 q3-function-of-operating-system (2)W2 q3-function-of-operating-system (2)
W2 q3-function-of-operating-system (2)
 
Lecture-3: Operating System & Application Softwares
Lecture-3: Operating System & Application SoftwaresLecture-3: Operating System & Application Softwares
Lecture-3: Operating System & Application Softwares
 
PDT DC015 Chapter 2 Computer System 2017/2018 (m)
PDT DC015 Chapter 2 Computer System 2017/2018 (m)PDT DC015 Chapter 2 Computer System 2017/2018 (m)
PDT DC015 Chapter 2 Computer System 2017/2018 (m)
 
operating system
operating systemoperating system
operating system
 
PST SC015 Chapter 2 Computer System (IV) 2017/2018
PST SC015 Chapter 2 Computer System (IV) 2017/2018PST SC015 Chapter 2 Computer System (IV) 2017/2018
PST SC015 Chapter 2 Computer System (IV) 2017/2018
 
BAIT1003 Chapter 6
BAIT1003 Chapter 6BAIT1003 Chapter 6
BAIT1003 Chapter 6
 
Operating System & Utility Programme
Operating System & Utility ProgrammeOperating System & Utility Programme
Operating System & Utility Programme
 
Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)
 
Chapter08
Chapter08Chapter08
Chapter08
 
Topic 6
Topic 6Topic 6
Topic 6
 

Plus de haider ali

Upwork freelancer guide
Upwork freelancer guideUpwork freelancer guide
Upwork freelancer guidehaider ali
 
Chapter 13 programming languages and program development
Chapter 13   programming languages and program developmentChapter 13   programming languages and program development
Chapter 13 programming languages and program developmenthaider ali
 
Chapter 12 information system development
Chapter 12   information system developmentChapter 12   information system development
Chapter 12 information system developmenthaider ali
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacyhaider ali
 
Chapter 10 database management
Chapter 10   database managementChapter 10   database management
Chapter 10 database managementhaider ali
 
Chapter 9 communications and networks
Chapter 9   communications and networksChapter 9   communications and networks
Chapter 9 communications and networkshaider ali
 
Chapter 4 the components of the system unit
Chapter 4   the components of the system unitChapter 4   the components of the system unit
Chapter 4 the components of the system unithaider ali
 
Chapter 3 application software
Chapter 3   application softwareChapter 3   application software
Chapter 3 application softwarehaider ali
 
Modalauxiliaries 1
Modalauxiliaries 1Modalauxiliaries 1
Modalauxiliaries 1haider ali
 
Teaching tenses
Teaching tensesTeaching tenses
Teaching tenseshaider ali
 
English parts of speech
English parts of speech English parts of speech
English parts of speech haider ali
 
Parts of speech
Parts of speechParts of speech
Parts of speechhaider ali
 
How to configure an operating system
How to configure an operating systemHow to configure an operating system
How to configure an operating systemhaider ali
 
Chapter 1 introduction to computers
Chapter 1   introduction to computersChapter 1   introduction to computers
Chapter 1 introduction to computershaider ali
 
Parts of-speech
Parts of-speech Parts of-speech
Parts of-speech haider ali
 
Communication devices
Communication devicesCommunication devices
Communication deviceshaider ali
 
Fundamental of Information Technology
Fundamental of Information Technology Fundamental of Information Technology
Fundamental of Information Technology haider ali
 
Business in education
Business in educationBusiness in education
Business in educationhaider ali
 
NETWORK Topologies
NETWORK TopologiesNETWORK Topologies
NETWORK Topologieshaider ali
 

Plus de haider ali (20)

Upwork freelancer guide
Upwork freelancer guideUpwork freelancer guide
Upwork freelancer guide
 
Chapter 13 programming languages and program development
Chapter 13   programming languages and program developmentChapter 13   programming languages and program development
Chapter 13 programming languages and program development
 
Chapter 12 information system development
Chapter 12   information system developmentChapter 12   information system development
Chapter 12 information system development
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacy
 
Chapter 10 database management
Chapter 10   database managementChapter 10   database management
Chapter 10 database management
 
Chapter 9 communications and networks
Chapter 9   communications and networksChapter 9   communications and networks
Chapter 9 communications and networks
 
Chapter 4 the components of the system unit
Chapter 4   the components of the system unitChapter 4   the components of the system unit
Chapter 4 the components of the system unit
 
Chapter 3 application software
Chapter 3   application softwareChapter 3   application software
Chapter 3 application software
 
Modalauxiliaries 1
Modalauxiliaries 1Modalauxiliaries 1
Modalauxiliaries 1
 
Teaching tenses
Teaching tensesTeaching tenses
Teaching tenses
 
Tenses
TensesTenses
Tenses
 
English parts of speech
English parts of speech English parts of speech
English parts of speech
 
Parts of speech
Parts of speechParts of speech
Parts of speech
 
How to configure an operating system
How to configure an operating systemHow to configure an operating system
How to configure an operating system
 
Chapter 1 introduction to computers
Chapter 1   introduction to computersChapter 1   introduction to computers
Chapter 1 introduction to computers
 
Parts of-speech
Parts of-speech Parts of-speech
Parts of-speech
 
Communication devices
Communication devicesCommunication devices
Communication devices
 
Fundamental of Information Technology
Fundamental of Information Technology Fundamental of Information Technology
Fundamental of Information Technology
 
Business in education
Business in educationBusiness in education
Business in education
 
NETWORK Topologies
NETWORK TopologiesNETWORK Topologies
NETWORK Topologies
 

Dernier

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Dernier (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Chapter 8 operating systems and utility programs

  • 1. System Software • System software consists of the programs that control or maintain the operations of the computer and its devices Discovering Computers 2012: Chapter 8 1Page 398 Operating systems Utility Programs
  • 2. Operating Systems • An operating system (OS) is a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources Discovering Computers 2012: Chapter 8 2Pages 398 - 399 Start and shut down a computer Provide a user interface Manage programs Manage memory Coordinate tasks Configure devices Establish an Internet connection Monitor performance Provide utilities Automatically update Control a network Administer security
  • 3. Operating Systems Discovering Computers 2012: Chapter 8 3Pages 398 – 399 Figure 8-1
  • 4. Operating System Functions • The process of starting or restarting a computer is called booting Discovering Computers 2012: Chapter 8 4Page 400 Figure 8-2 Cold boot • Turning on a computer that has been powered off completely Warm boot • Using the operating system to restart a computer
  • 5. Operating System Functions Discovering Computers 2012: Chapter 8 5Page 401 Figure 8-3
  • 6. Operating System Functions A boot drive is the drive from which your computer starts •You can boot from a boot disk •A recovery disk contains a few system files that will start the computer Discovering Computers 2012: Chapter 8 6Page 402
  • 7. Operating System Functions • An operating system includes various shut down options Discovering Computers 2012: Chapter 8 7Page 402 Sleep mode saves any open documents and programs to RAM, turns off all unneeded functions, and then places the computer in a low- power state Hibernate saves any open documents and programs to a hard disk before removing power from the computer
  • 8. Operating System Functions • A user interface controls how you enter data and instructions and how information is displayed on the screen • With a graphical user interface (GUI), you interact with menus and visual images Discovering Computers 2012: Chapter 8 8Pages 402 – 403 Figure 8-4
  • 9. Operating System Functions • With a command-line interface, a user uses the keyboard to enter data and instructions Discovering Computers 2012: Chapter 8 9Page 403 Figure 8-5
  • 10. Operating System Functions • How an operating system handles programs directly affects your productivity Discovering Computers 2012: Chapter 8 10Pages 404 - 405 Single user and multiuser Single tasking and multitasking Foreground and background Preemptive multitasking Multiprocessing
  • 11. Operating System Functions Discovering Computers 2012: Chapter 8 11Page 404 Figure 8-6
  • 12. Operating System Functions • Memory management optimizes the use of RAM • Virtual memory is a portion of a storage medium functioning as additional RAM Discovering Computers 2012: Chapter 8 12Page 406 Figure 8-8
  • 13. Operating System Functions • The operating system determines the order in which tasks are processed Discovering Computers 2012: Chapter 8 13Page 407 Figure 8-9
  • 14. Operating System Functions Discovering Computers 2012: Chapter 8 14Page 408
  • 15. Operating System Functions • Operating systems typically provide a means to establish Internet connections Discovering Computers 2012: Chapter 8 15Page 408 Figure 8-10
  • 16. Operating System Functions • A performance monitor is a program that assesses and reports information about various computer resources and devices Discovering Computers 2012: Chapter 8 16Pages 408 – 409 Figure 8-11
  • 17. Operating System Functions • Operating systems often provide users with the capability of: Discovering Computers 2012: Chapter 8 17Page 409 Managing files Searching for files Viewing images Securing a computer Uninstalling programs Cleaning up disks Defragmenting disks Diagnosing problems Backing up files and disks Setting up screen savers
  • 18. Operating System Functions • Automatic update automatically provides updates to the program Discovering Computers 2012: Chapter 8 18Page 409 Figure 8-12
  • 19. Operating System Functions • Some operating systems are designed to work with a server on a network • A server operating system organizes and coordinates how multiple users access and share resources on a network • A network administrator uses the server operating system to: – Add and remove users, computers, and other devices – Install software and administer network security Discovering Computers 2012: Chapter 8 19Page 410
  • 20. Operating System Functions • Each user has a user account – A user name, or user ID, identifies a specific user – A password is a private combination of characters associated with the user name Discovering Computers 2012: Chapter 8 20Page 410 Figure 8-13
  • 21. Types of Operating Systems Discovering Computers 2012: Chapter 8 21Page 412 Figure 8-14
  • 22. Stand-Alone Operating Systems • A stand-alone operating system is a complete operating system that works on a desktop computer, notebook computer, or mobile computing device Discovering Computers 2012: Chapter 8 22Page 412 Windows 7 Mac OS X UNIX Linux
  • 23. Stand-Alone Operating Systems • Windows 7 is Microsoft’s fastest, most efficient operating system to date and is available in multiple editions: Discovering Computers 2012: Chapter 8 23Pages 413 - 414 Windows 7 Starter Windows 7 Home Premium Windows 7 Ultimate Windows 7 Professional
  • 24. Stand-Alone Operating Systems • Windows 7 provides programs such as: Discovering Computers 2012: Chapter 8 24Page 414 Windows Firewall Windows DVD Maker Windows Media Player Desktop Gadget Gallery
  • 25. Stand-Alone Operating Systems Discovering Computers 2012: Chapter 8 25Page 414 Figures 8-16 – 8-17
  • 26. Stand-Alone Operating Systems Discovering Computers 2012: Chapter 8 26Page 415 Figure 8-18
  • 27. Stand-Alone Operating Systems • The Macintosh operating system has set the standard for operating system ease of use • Latest version is Mac OS X Discovering Computers 2012: Chapter 8 27Page 415 Figure 8-19
  • 28. Stand-Alone Operating Systems UNIX is a multitasking operating system developed in the early 1970s Linux is an open-source, popular, multitasking UNIX- type operating system Discovering Computers 2012: Chapter 8 28Pages 416 – 417 Figures 8-20 – 8-21
  • 29. Server Operating Systems Windows Server 2008 UNIX Linux Solaris NetWare Discovering Computers 2012: Chapter 8 29Pages 417 - 418
  • 30. Server Operating Systems • Windows Server 2008 is an upgrade to Windows Server 2003 – Part of the Windows Server 2008 family – Multiple editions • Most editions include Hyper-V, a virtualization technology – Virtualization is the practice of sharing or pooling computing resources Discovering Computers 2012: Chapter 8 30Pages 417 - 418
  • 31. Embedded Operating Systems • An embedded operating system resides on a ROM chip on a mobile device or consumer electronic device Discovering Computers 2012: Chapter 8 31Pages 418 - 420 Windows Embedded CE Windows Phone 7 Palm OS iPhone OS BlackBerry Google Android Embedded Linux Symbian OS
  • 32. Embedded Operating Systems Discovering Computers 2012: Chapter 8 32Pages 419 – 420 Figures 8-22 – 8-26
  • 33. Utility Programs • A utility program is a type of system software that allows a user to perform maintenance-type tasks Discovering Computers 2012: Chapter 8 33Page 421 Figure 8-27
  • 34. Utility Programs • A file manager is a utility that performs functions related to file management – Displaying a list of files – Organizing files in folders – Copying, renaming, deleting, moving, and sorting files and folders – Creating shortcuts Discovering Computers 2012: Chapter 8 34Page 422 Figure 8-28
  • 35. Utility Programs • A search utility is a program that attempts to locate a file on your computer based on criteria you specify Discovering Computers 2012: Chapter 8 35Page 422 Figure 8-29
  • 36. Utility Programs • An image viewer allows users to display, copy, and print the contents of a graphics file • An uninstaller removes a program, as well as any associated entries in the system files Discovering Computers 2012: Chapter 8 36Page 423 Figure 8-30
  • 37. Utility Programs • A disk cleanup utility searches for and removes unnecessary files – Downloaded program files – Temporary Internet files – Deleted files – Unused program files Discovering Computers 2012: Chapter 8 37Page 423 Figure 8-31
  • 38. Utility Programs • A disk defragmenter reorganizes the files and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs run faster – Defragmenting Discovering Computers 2012: Chapter 8 38Pages 423 – 424 Figure 8-32
  • 39. Utility Programs • A backup utility allows users to copy files to another storage medium • A restore utility reverses the process and returns backed up files to their original form Discovering Computers 2012: Chapter 8 39Page 424 Figure 8-33
  • 40. Utility Programs • A screen saver causes a display device’s screen to show a moving image or blank screen if no activity occurs for a specified time • A personal firewall detects and protects a personal computer from unauthorized intrusions Discovering Computers 2012: Chapter 8 40Page 425 Figures 8-34 – 8-35
  • 41. Utility Programs A virus describes a potentially damaging computer program that affects a computer negatively A worm copies itself repeatedly in memory or over a network A Trojan horse hides within or looks like a legitimate program An antivirus program protects a computer against viruses Discovering Computers 2012: Chapter 8 41Pages 425 - 426
  • 42. Utility Programs Discovering Computers 2012: Chapter 8 42Pages 425 – 426 Figures 8-36 – 8-37
  • 43. Utility Programs Spyware is a program placed on a computer without the user’s knowledge that secretly collects information about the user • A spyware remover detects and deletes spyware and other similar programs Adware displays an online advertisement in a banner or pop-up window • An adware remover is a program that detects and deletes adware Discovering Computers 2012: Chapter 8 43Page 426
  • 44. Utility Programs • Filters are programs that remove or block certain items from being displayed Discovering Computers 2012: Chapter 8 44Pages 426 - 427 Web filtering software Anti-spam programs Phishing filters Pop-up blockers
  • 45. Utility Programs • A file compression utility shrinks the size of a file(s) – Compressing files frees up room on the storage media – Two types of compression • Lossy • Lossless • Compressed files sometimes are called zipped files – Can be uncompressed Discovering Computers 2012: Chapter 8 45Page 427
  • 46. Utility Programs • A media player allows you to view images and animation, listen to audio, and watch video files on your computer Discovering Computers 2012: Chapter 8 46Page 427 Figure 8-38
  • 47. Utility Programs • Disc burning software writes text, graphics, audio, and video files on a recordable or rewritable optical disc Discovering Computers 2012: Chapter 8 47Page 428 Figure 8-39
  • 48. Utility Programs • A personal computer maintenance utility identifies and fixes operating system problems, detects and repairs disk problems, and includes the capability of improving a computer’s performance Discovering Computers 2012: Chapter 8 48Page 428 Figure 8-40
  • 49. Summary Definition of an operating system Functions common to most operating systems Variety of stand-alone operating systems, server operating systems, and embedded operating systems Several utility programs Discovering Computers 2012: Chapter 8 49Page 429
  • 50. Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 8 Complete