SlideShare a Scribd company logo
1 of 15
USING AN OPERATING
SYSTEM
Mr Musonda
OPERATING SYSTEM
• This is the most important type of software in a computer. Operating
system is part of systems software.
• It is the one that tells the hardware what to do and how to do it.
• It interprets the user’s commands.
• It acts as an interface, i.e. as a link, between applications software and
the hardware.
• • It directs the flow of data from input to output or storage.
COMPUTER SOFTWARE
• Computer hardware requires software to tell it what to do and how to
do it.
• A computer consists of many, different types of software.
• Every software has a specific purpose in the computer.
• Computer software is in three types – Systems software(operating
software), Utility software, and Applications software.
BASIC UNDERSTANDING OF PROGRAM
EXECUTION
• The main function of the CPU is to execute, i.e. to run a program.
• A program consists of several instructions , or steps.
• Each instruction tells the computer to perform a specific task.
• A program is executed one instruction at a time this program is loaded
in RAM.
• The CU, the ALU and the RAM coordinate very
closely during program execution.
EXAMPLES OF OPERATING SYSTEMS
• Microsoft Windows 95, 98, NT, Me, 2000, 2007, XP, Server 2003 and
Vista.
• Unix
• Linux
• Mac OS 9, X
APPLICATIONS SOFTWARE
• This is software in a computer which users employ to do their work.
• Whereas a computer may have one Operating System software, it
always has several Applications software, all being serviced by the
same Operating System.
• Applications software interacts with users directly – it is the one which
knows how to manipulate data the way the user wants it to be.
• It does not have the capacity to control or interact with the hardware
directly.
ICT SECURITY
• These refer to the defense necessary to wade off threats imposed
on ICT resources Basically, security is ensuring that resources are
free from unauthorized internal and external manipulation
TYPES OF SECURITY
• There are two types of security:
1. DATA SECURITY
• This kind of security ensures that data, information and software are
safe from internal and external.
2. PHYSICAL SECURITY
• The one that ensures that all the various types of hardware are
safe.
TYPES OF THREATS
• Some of the threats are as follows:
– Unauthorized access of individuals to data storage.
– Incorrect use of hardware and software, media or computer rooms.
– Unauthorized manipulation of data files or equipment.
– Theft of data or hardware.
– Fire/water.
– Environmental conditions, e.g. temperature and humidity.
– Viruses and other malicious code.
MEASURES TO IMPROVE ON SECURITY
• Examples of possible measures are:
• Keeping all doors to computer rooms locked so that access is upon
permission granted.
• Locking computers so that only personnel with computer keys can
unlock and use them.
• Using passwords to start computers and to open files.
MEASURES TO IMPROVE ON SECURITY
• Backing up all data and programs so that should the data and programs
that are used become corrupt, backups can quickly be used.
• Keeping data and program backups in a separate room which is also
secured.
• Installing antivirus software and keeping it updated.
COMPUTER VIRUSES
• A computer virus is a program that is meant to cause some kind of
damage or discomfort when it is activated on an infected computer.
• Virus is a general term, but viruses are in categories.
HOW COMPUTERS BECOME INFECTED WITH VIRUSES
• There are many ways in which a computer may become infected by a
virus.
• Some of the common ones are as follows:
– Transfer of removable storage media, e.g. floppies, CDs and flash
disks, from one computer to another.
– Through e-mail; when you receive and open an infected e-mail, your
computer gets infected.
– Through downloads, e.g. of music, pictures, videos, documents and
software on the Internet.
HOW TO MINIMISE VIRUS ATTACKS
• Ensure that your computer has latest versions of antivirus software.
• Always update the antivirus software from the Internet.
• Always scan your computer for viruses.

More Related Content

What's hot

BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
limsh
 
lesson 14 Software- paupautoniikent
lesson 14 Software- paupautoniikentlesson 14 Software- paupautoniikent
lesson 14 Software- paupautoniikent
paujoy
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
lbcollins18
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
Srinu Potnuru
 
Computer virus
Computer virusComputer virus
Computer virus
rana_babar
 

What's hot (20)

Isys20261 lecture 02
Isys20261 lecture 02Isys20261 lecture 02
Isys20261 lecture 02
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
lesson 14 Software- paupautoniikent
lesson 14 Software- paupautoniikentlesson 14 Software- paupautoniikent
lesson 14 Software- paupautoniikent
 
Software Security
Software SecuritySoftware Security
Software Security
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Computer virus
Computer virusComputer virus
Computer virus
 
System security
System securitySystem security
System security
 
Coud discovery chap 5
Coud discovery chap 5Coud discovery chap 5
Coud discovery chap 5
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Presentation1
Presentation1Presentation1
Presentation1
 
system Security
system Security system Security
system Security
 
Week 12
Week 12Week 12
Week 12
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 

Similar to Lecture 2 using an operating system

Operating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptxOperating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptx
DondonGoles
 
JULY-DEC_2023_BSCBT_3_SEM_V9_BSCBT301_BSCBT301_Fundamentals_of_IT_Unit_2__Ppt...
JULY-DEC_2023_BSCBT_3_SEM_V9_BSCBT301_BSCBT301_Fundamentals_of_IT_Unit_2__Ppt...JULY-DEC_2023_BSCBT_3_SEM_V9_BSCBT301_BSCBT301_Fundamentals_of_IT_Unit_2__Ppt...
JULY-DEC_2023_BSCBT_3_SEM_V9_BSCBT301_BSCBT301_Fundamentals_of_IT_Unit_2__Ppt...
naikayushkumar32
 
Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)
ella dimaiwat
 
Computer virus
Computer virusComputer virus
Computer virus
rana_babar
 

Similar to Lecture 2 using an operating system (20)

Operating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptxOperating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptx
 
module_1-_5_computer_software.ppt
module_1-_5_computer_software.pptmodule_1-_5_computer_software.ppt
module_1-_5_computer_software.ppt
 
ICT Skills.pdf
ICT Skills.pdfICT Skills.pdf
ICT Skills.pdf
 
Computer Security update and virus .pptx
Computer Security  update and virus .pptxComputer Security  update and virus .pptx
Computer Security update and virus .pptx
 
COM 311 L -2.pptx
COM 311 L -2.pptxCOM 311 L -2.pptx
COM 311 L -2.pptx
 
Chp 03 - Software PTI - (Shared).pdf
Chp 03 - Software PTI - (Shared).pdfChp 03 - Software PTI - (Shared).pdf
Chp 03 - Software PTI - (Shared).pdf
 
Chp 03 pti - (shared) up
Chp 03   pti - (shared) upChp 03   pti - (shared) up
Chp 03 pti - (shared) up
 
Neethu Narayanan- Operating System
 Neethu Narayanan- Operating System Neethu Narayanan- Operating System
Neethu Narayanan- Operating System
 
Introduction to Computer Software
Introduction to Computer SoftwareIntroduction to Computer Software
Introduction to Computer Software
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
JULY-DEC_2023_BSCBT_3_SEM_V9_BSCBT301_BSCBT301_Fundamentals_of_IT_Unit_2__Ppt...
JULY-DEC_2023_BSCBT_3_SEM_V9_BSCBT301_BSCBT301_Fundamentals_of_IT_Unit_2__Ppt...JULY-DEC_2023_BSCBT_3_SEM_V9_BSCBT301_BSCBT301_Fundamentals_of_IT_Unit_2__Ppt...
JULY-DEC_2023_BSCBT_3_SEM_V9_BSCBT301_BSCBT301_Fundamentals_of_IT_Unit_2__Ppt...
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
IS100 Week 11
IS100 Week 11IS100 Week 11
IS100 Week 11
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)
 
Note 3
Note 3Note 3
Note 3
 
System Security Sem 2(Module 1).pptx
System Security Sem 2(Module     1).pptxSystem Security Sem 2(Module     1).pptx
System Security Sem 2(Module 1).pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Chapter Last.ppt
Chapter Last.pptChapter Last.ppt
Chapter Last.ppt
 
Note 03
Note 03Note 03
Note 03
 

More from Maxwell Musonda

More from Maxwell Musonda (14)

SESSION 9 - Storage on the computer .pdf
SESSION 9 - Storage on the computer .pdfSESSION 9 - Storage on the computer .pdf
SESSION 9 - Storage on the computer .pdf
 
SESSION 6 - Input Devices - Optical Scanners and Magnetic Ink Character Recog...
SESSION 6 - Input Devices - Optical Scanners and Magnetic Ink Character Recog...SESSION 6 - Input Devices - Optical Scanners and Magnetic Ink Character Recog...
SESSION 6 - Input Devices - Optical Scanners and Magnetic Ink Character Recog...
 
SESSION 5 - Basic input devices, Keyboard and Mouse .pdf
SESSION 5 - Basic input devices, Keyboard and Mouse .pdfSESSION 5 - Basic input devices, Keyboard and Mouse .pdf
SESSION 5 - Basic input devices, Keyboard and Mouse .pdf
 
SESSION 4 - Generations of Computers .pdf
SESSION 4 - Generations of Computers .pdfSESSION 4 - Generations of Computers .pdf
SESSION 4 - Generations of Computers .pdf
 
SESSION 3 - IMPORTANCE OF COMPUTERS IN BUSINESS.pdf
SESSION 3 - IMPORTANCE OF COMPUTERS IN BUSINESS.pdfSESSION 3 - IMPORTANCE OF COMPUTERS IN BUSINESS.pdf
SESSION 3 - IMPORTANCE OF COMPUTERS IN BUSINESS.pdf
 
SESSION 2 - CHARACTERISTICS OF COMPUTERS.pdf
SESSION 2 - CHARACTERISTICS OF COMPUTERS.pdfSESSION 2 - CHARACTERISTICS OF COMPUTERS.pdf
SESSION 2 - CHARACTERISTICS OF COMPUTERS.pdf
 
SESSION 1 - Introductory lesson to computer applications - definition of comp...
SESSION 1 - Introductory lesson to computer applications - definition of comp...SESSION 1 - Introductory lesson to computer applications - definition of comp...
SESSION 1 - Introductory lesson to computer applications - definition of comp...
 
Lecture 10 using powerpoint and project presentations
Lecture 10   using powerpoint and project presentationsLecture 10   using powerpoint and project presentations
Lecture 10 using powerpoint and project presentations
 
Lec ture 9 using the internet
Lec ture 9   using the internetLec ture 9   using the internet
Lec ture 9 using the internet
 
Lecture 8 using spreadsheet
Lecture 8   using spreadsheetLecture 8   using spreadsheet
Lecture 8 using spreadsheet
 
Lecture 5 sending and receiving e-mail
Lecture 5   sending and receiving e-mailLecture 5   sending and receiving e-mail
Lecture 5 sending and receiving e-mail
 
Lecture 4 sending and receiving e-mail
Lecture 4   sending and receiving e-mailLecture 4   sending and receiving e-mail
Lecture 4 sending and receiving e-mail
 
Lecture 3 use word processing for technical report
Lecture 3   use word processing for technical report Lecture 3   use word processing for technical report
Lecture 3 use word processing for technical report
 
Lecture 1 operate a computer system
Lecture 1   operate a computer systemLecture 1   operate a computer system
Lecture 1 operate a computer system
 

Recently uploaded

Recently uploaded (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Lecture 2 using an operating system

  • 2. OPERATING SYSTEM • This is the most important type of software in a computer. Operating system is part of systems software. • It is the one that tells the hardware what to do and how to do it. • It interprets the user’s commands. • It acts as an interface, i.e. as a link, between applications software and the hardware. • • It directs the flow of data from input to output or storage.
  • 3. COMPUTER SOFTWARE • Computer hardware requires software to tell it what to do and how to do it. • A computer consists of many, different types of software. • Every software has a specific purpose in the computer. • Computer software is in three types – Systems software(operating software), Utility software, and Applications software.
  • 4. BASIC UNDERSTANDING OF PROGRAM EXECUTION • The main function of the CPU is to execute, i.e. to run a program. • A program consists of several instructions , or steps. • Each instruction tells the computer to perform a specific task. • A program is executed one instruction at a time this program is loaded in RAM. • The CU, the ALU and the RAM coordinate very closely during program execution.
  • 5. EXAMPLES OF OPERATING SYSTEMS • Microsoft Windows 95, 98, NT, Me, 2000, 2007, XP, Server 2003 and Vista. • Unix • Linux • Mac OS 9, X
  • 6.
  • 7. APPLICATIONS SOFTWARE • This is software in a computer which users employ to do their work. • Whereas a computer may have one Operating System software, it always has several Applications software, all being serviced by the same Operating System. • Applications software interacts with users directly – it is the one which knows how to manipulate data the way the user wants it to be. • It does not have the capacity to control or interact with the hardware directly.
  • 8. ICT SECURITY • These refer to the defense necessary to wade off threats imposed on ICT resources Basically, security is ensuring that resources are free from unauthorized internal and external manipulation
  • 9. TYPES OF SECURITY • There are two types of security: 1. DATA SECURITY • This kind of security ensures that data, information and software are safe from internal and external. 2. PHYSICAL SECURITY • The one that ensures that all the various types of hardware are safe.
  • 10. TYPES OF THREATS • Some of the threats are as follows: – Unauthorized access of individuals to data storage. – Incorrect use of hardware and software, media or computer rooms. – Unauthorized manipulation of data files or equipment. – Theft of data or hardware. – Fire/water. – Environmental conditions, e.g. temperature and humidity. – Viruses and other malicious code.
  • 11. MEASURES TO IMPROVE ON SECURITY • Examples of possible measures are: • Keeping all doors to computer rooms locked so that access is upon permission granted. • Locking computers so that only personnel with computer keys can unlock and use them. • Using passwords to start computers and to open files.
  • 12. MEASURES TO IMPROVE ON SECURITY • Backing up all data and programs so that should the data and programs that are used become corrupt, backups can quickly be used. • Keeping data and program backups in a separate room which is also secured. • Installing antivirus software and keeping it updated.
  • 13. COMPUTER VIRUSES • A computer virus is a program that is meant to cause some kind of damage or discomfort when it is activated on an infected computer. • Virus is a general term, but viruses are in categories.
  • 14. HOW COMPUTERS BECOME INFECTED WITH VIRUSES • There are many ways in which a computer may become infected by a virus. • Some of the common ones are as follows: – Transfer of removable storage media, e.g. floppies, CDs and flash disks, from one computer to another. – Through e-mail; when you receive and open an infected e-mail, your computer gets infected. – Through downloads, e.g. of music, pictures, videos, documents and software on the Internet.
  • 15. HOW TO MINIMISE VIRUS ATTACKS • Ensure that your computer has latest versions of antivirus software. • Always update the antivirus software from the Internet. • Always scan your computer for viruses.