SlideShare a Scribd company logo
1 of 43
SYSTEM SOFTWARE
AND COMPUTER
MANAGEMENT
Module 1.5
1
SYSTEM SOFTWARE
AND COMPUTER
MANAGEMENT
Module 1.5
2
Content
•Operating systems
•Operating system utilities
•Security tools
•Factors influencing performance
•Troubleshooting using utility software
•Test and improve your knowledge
3
OPERATING SYSTEMS
System software that controls all activities that take
place in a computer
4
What happens when a computer is switched on
5
Process of loading the operating system is called booting the
computer
Load operating system into memory - control of the computer handed
over to operating system
Find the operating system
Instructions perform some basic hardware tests
Computer looks for instructions to follow (on ROM)
The role of the operating system
6
To allow us to
interact with
the computer
via a GUI
Providing
the user
interface
Manage
which
programs and
tasks can use
the CPU
Managing
programs
Disk
management
Memory
management
Input/Output
management
Managing
hardware
User and
password
control
Basic
protection
against
threats
Providing
basic
security
Multitasking: ability of the operating
system to load and process multiple
tasks at the same time
The Task Manager
• Provides some information
about the computer’s
performance and the
applications and processes
running.
• Most often used to terminate
a process or program that is
not responding.
7
Single-user versus multi-user operating
systems
• Single-user operating system
• Can only be used by a single user at a time
• Multi-user operating systems
• Allows multiple users to access a computer system at the same
time
8
Written module activity
• Read pages 61 – 63
• Study first section of summary on page 72 (until
Task Manager)
• Complete questions 1 – 11 on page 74
9
OPERATING
SYSTEM UTILITIES
Programs that perform system maintenance and
administration tasks
10
File management
• Naming files
11
File names
• file name & file extension (full stop & 3 – 5 letters)
File extensions and file types
• identifies the file type or format and is automatically added
• also determines which program will open the type of file by
default
Path
• ‘succession’ of folders that leads to the location of a file
Common file types and extensions
12
Graphicsfiles
JPEG, BMP,
GIF, WMF, TIF,
PNG
Created by a
graphics
program or it
can be
inserted into a
file by most
programs such
as MS-Word
Officefiles DOCX, XLXS,
PPTX, ACCDB
Word
processing
(Word),
spreadsheets
(Excel),
presentations
(PowerPoint)
and databases
(Access)
Audiofiles
MP3, MP4,
WAV, CDA,
WMA
Created by
any media
player
program
Videofiles
MPEG, ASF,
WMV, AVI
Created by
any media
player
program
13
Textfiles
TXT
Similar to
word
processing
files, except
that no fonts,
styles,
colours or
formatting is
saved
Richtextfiles
RTF
Allows basic
formatting to
be applied
and saved.
Can be
opened in
any word
processor or
a utility like
WordPad
Programfiles
EXE or COM
Actual
programs,
not data files,
that run (or
execute)
when
opened
Common file types and extensions
14
Portable
DocumentFormat
PDF
Used to
distribute
document files,
read by free
utility program,
cannot be
edited.
Compressedfiles
ZIP or RAR
Compressed to
save space.
The files in a
compressed or
‘zipped’ folder
have to be
decompressed
or ‘unzipped’ in
order to open
and use them.
HypertextMarkup
Languagefiles
HTML
Web page
which can be
opened in a
web browser.
Common file types and extensions
File management
• Information about files
15
File property
• File name, size and date modified
File attribute
• A property of a file that can be set
• Read-only & Hidden
Metadata
• Additional data stored about a file that describes the
contents of the file, i.e. author & title properties
File management
• File manager functions
16
Searching
• Searching for a file based on criteria: file size, type of file,
partial file name, file type, date accessed and text in the
contents of the file.
Compressing
• The process of reducing the size of a file by producing a
smaller, compressed version of the file.
Decompressing
• Converting a compressed or zipped set of files back to
their original size.
Updates
We update software to
• download patches and service packs to fix errors or bugs
in our programs
• close security loopholes
• add new features and improvements
17
Updates
18
Most software publishers will automatically notify
you when an update or new version of a program
is available. This is normally done via the
Internet.
Updates
19
Many programs such as the Windows operating
system can be scheduled to check for updates at
fixed intervals (as specified by you).
Scheduling
• Why schedulers are useful:
• automatically check for updates
• set schedulers to run at off-peak times
20
Printer management
Print file
Print job send
to disk:
spooling
Printer queue
21
View information about the documents
waiting to print and manage by
deleting tasks
pausing the
tasks
restarting the tasks
(paper jam)
Backup – why?
• files can be accidentally overwritten or deleted
• hardware failures – a disk drive crashes
• hardware can be stolen
• disasters – fires, earthquakes and floods can destroy
hardware
• files can be corrupted by power fluctuations
• files can be deleted or corrupted by viruses, etc.
22
Backup
Backup software
• Most operating systems provide backup
utilities.
• Third-party vendors have specialised backup
programs
• scheduling when to back up the files
• choosing to do a full backup of all the files or just those that have
been changed since the last backup
• compressing the files to save space on the backup media, etc.
23
Backup
Backup tips
• Use software that automatically manages your
backup process.
• Only back up your data not programs.
• Back up your files onto external portable media.
• Keep the backups off-site.
• Perform ‘housekeeping’.
• Consider archiving large files.
• Check that the backups are actually working.
24
Written module activity
• Read pages 64 – 68
• Study Operating system utilities in summary
(page 72, 73)
• Complete questions 12 – 26 on Page 74 – 76
25
SECURITY TOOLS
Security measures and facilities to help control and
prevent the spread of malware.
26
Access control
• Access control means that the operating system
specifically asks your permission before any software can
be installed.
• The purpose of access control is to try to make it
impossible for malware to be secretly installed on your
computer without your knowledge.
27
Firewall
• A firewall is software or hardware that acts as a barrier
between your computer and the Internet.
• Built into the operating system.
28
Security
• Action/Security Center in Windows operating systems
warns you about settings that could make your system
insecure. You can check settings for
• firewall
• Windows automatic updates
• anti-malware (virus and spyware) software settings.
29
30
FACTORS INFLUENCING
PERFORMANCE
31
Memory (RAM)
• Programs and data need to be loaded
from disk into RAM (memory).
• If memory is full, parts of the data/programs that the
computer is not currently busy with are stored on an area
on the hard disk.
• These have to be loaded back into memory again when
needed – slows down the computer.
The more memory you have available, the better.
Adding more RAM is often the cheapest and most
effective upgrade.
32
Memory (RAM)
• Caching
• Cache memory is built into various components on a
computer, including the processor.
• It stores frequently or recently accessed data, based on
the assumption that it will probably be accessed again
soon.
• This memory is more expensive, because it is faster than
normal memory (RAM) but it can increase the overall
performance of a computer quite dramatically.
33
CPU
The speed
(measured in
GHz)
• In general, the
higher the speed,
the faster the
CPU.
The number of
cores, e.g. dual-
core or quad core
• Number of
physical
processors
included in a
single ‘chip’.
• Each core is a
complete
processor that
can work
independently of
any other core on
the CPU chip.
Cache size
• A special high-
speed memory
used to store
recently or
frequently
accessed data.
• The larger the
cache memory on
the CPU, the
faster it is likely to
perform.
34
Hard drive
• Data and programs need to be loaded from disk into
memory.
• Changes to files need to be written back to disk.
• A ‘faster’ hard drive can improve the overall performance
of a computer system.
• Remember also:
When a hard drive is fragmented,
the files will take longer to retrieve.
35
Influence of malware
• Malware can slow your computer down by using up
resources such as free memory and hard drive space.
• Spyware can slow your Internet connection down if it
frequently connects to the Internet.
36
TROUBLESHOOTING USING
UTILITY SOFTWARE
37
Disk scanning
• Generally, it is not recommended that you repair a hard
drive that you suspect is faulty unless you are sure you
know how to do it.
• Problems on flash drives can be fixed quite easily by
running a disk scanner.
38
Disk defragmentation
• A disk defragmenter is a tool that reorganises the parts of
files and speeds your computer up again.
• Defragmentation does not free up disk space.
• Possible to schedule the running of a defrag operation.
39
Disk filling up (too little space)
• Windows - Disk Cleanup Wizard:
• Removes temporary files downloaded from the Internet
or temporary files created by Windows.
• Removes installed programs that you no longer or
seldom use.
40
Written module activity
• Read pages 68 – 72
• Study last section from summary on page 73
(Security tools to the end)
• Complete questions 27 – 35 on page 76
41
TEST AND IMPROVE
YOUR KNOWLEDGE
42
Written module activity
43

More Related Content

What's hot

Nt introduction(os)
Nt introduction(os)Nt introduction(os)
Nt introduction(os)NehaTadam
 
System Z operating system
System Z operating systemSystem Z operating system
System Z operating systemArpana shree
 
Lesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and ProtectingLesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and ProtectingGene Carboni
 
Computer system software
Computer system softwareComputer system software
Computer system softwareMozaSaid
 
introduction to operating system
introduction to operating systemintroduction to operating system
introduction to operating systemHAMZA AHMED
 
1.introduction
1.introduction1.introduction
1.introductionSenthil Kanth
 
Operating System BCA 301
Operating System BCA 301Operating System BCA 301
Operating System BCA 301cpjcollege
 
OS - Operating System
OS - Operating System OS - Operating System
OS - Operating System MaqdamYasir
 
Operating Systems FYBSC IT UNIT I- Introduction to Operating Systems
Operating Systems FYBSC IT UNIT I- Introduction to Operating SystemsOperating Systems FYBSC IT UNIT I- Introduction to Operating Systems
Operating Systems FYBSC IT UNIT I- Introduction to Operating SystemsArti Parab Academics
 
ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1OriginalGSM
 
Lesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery MethodsLesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery MethodsGene Carboni
 
Ch1-Operating System Concept
Ch1-Operating System ConceptCh1-Operating System Concept
Ch1-Operating System ConceptMuhammad Bilal Tariq
 
ITFT_Device management in Operating System
ITFT_Device management in Operating SystemITFT_Device management in Operating System
ITFT_Device management in Operating SystemSneh Prabha
 

What's hot (19)

Fundamental
FundamentalFundamental
Fundamental
 
Nt introduction(os)
Nt introduction(os)Nt introduction(os)
Nt introduction(os)
 
System Z operating system
System Z operating systemSystem Z operating system
System Z operating system
 
Lesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and ProtectingLesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and Protecting
 
Ch1
Ch1Ch1
Ch1
 
Computer system software
Computer system softwareComputer system software
Computer system software
 
introduction to operating system
introduction to operating systemintroduction to operating system
introduction to operating system
 
Ch03
Ch03Ch03
Ch03
 
1.introduction
1.introduction1.introduction
1.introduction
 
Operating System BCA 301
Operating System BCA 301Operating System BCA 301
Operating System BCA 301
 
OS - Operating System
OS - Operating System OS - Operating System
OS - Operating System
 
Opearating System
Opearating  SystemOpearating  System
Opearating System
 
Operating Systems FYBSC IT UNIT I- Introduction to Operating Systems
Operating Systems FYBSC IT UNIT I- Introduction to Operating SystemsOperating Systems FYBSC IT UNIT I- Introduction to Operating Systems
Operating Systems FYBSC IT UNIT I- Introduction to Operating Systems
 
ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1
 
Os1
Os1Os1
Os1
 
Lesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery MethodsLesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery Methods
 
Ch1-Operating System Concept
Ch1-Operating System ConceptCh1-Operating System Concept
Ch1-Operating System Concept
 
ITFT_Device management in Operating System
ITFT_Device management in Operating SystemITFT_Device management in Operating System
ITFT_Device management in Operating System
 
9781111306366 ppt ch3
9781111306366 ppt ch39781111306366 ppt ch3
9781111306366 ppt ch3
 

Similar to 1 5 system software and computer management

ITC Lecture02.pptx
ITC Lecture02.pptxITC Lecture02.pptx
ITC Lecture02.pptxssuser368f5d
 
IGCSE_ICT_Chapter 1.pptx
IGCSE_ICT_Chapter 1.pptxIGCSE_ICT_Chapter 1.pptx
IGCSE_ICT_Chapter 1.pptxFatimaWaheed30
 
Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)ella dimaiwat
 
Presentation1
Presentation1Presentation1
Presentation1aterodz
 
Unit 1 computing fundamental 2013
Unit 1 computing fundamental 2013Unit 1 computing fundamental 2013
Unit 1 computing fundamental 2013Yousuf Al Khanbashi
 
Unit 2.pptx
Unit 2.pptxUnit 2.pptx
Unit 2.pptxKrishRaj48
 
Introduction to Operating Systems - Mary Margarat
Introduction to Operating Systems - Mary MargaratIntroduction to Operating Systems - Mary Margarat
Introduction to Operating Systems - Mary MargaratMary Margarat
 
System software
System softwareSystem software
System softwareBushra M
 
Bioinformatics
BioinformaticsBioinformatics
Bioinformaticstamilvani4
 
Software.pptx
Software.pptxSoftware.pptx
Software.pptxRabiaAsif31
 
Introduction to computer system
Introduction to computer systemIntroduction to computer system
Introduction to computer systemSweta Kumari Barnwal
 
unit1 part1.ppt
unit1 part1.pptunit1 part1.ppt
unit1 part1.pptsuresh554942
 
module 1-1.pptx
module 1-1.pptxmodule 1-1.pptx
module 1-1.pptxDaysPiracy
 
UNIT I-Computer Operation-Fundamentals.ppt
UNIT I-Computer Operation-Fundamentals.pptUNIT I-Computer Operation-Fundamentals.ppt
UNIT I-Computer Operation-Fundamentals.pptJohnReyBoaquia2
 
Chapter 1-2 _ Operating Systems.pdf
Chapter 1-2 _ Operating Systems.pdfChapter 1-2 _ Operating Systems.pdf
Chapter 1-2 _ Operating Systems.pdfAfendeyAthurJinir
 

Similar to 1 5 system software and computer management (20)

ITC Lecture02.pptx
ITC Lecture02.pptxITC Lecture02.pptx
ITC Lecture02.pptx
 
IGCSE_ICT_Chapter 1.pptx
IGCSE_ICT_Chapter 1.pptxIGCSE_ICT_Chapter 1.pptx
IGCSE_ICT_Chapter 1.pptx
 
Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)
 
hiren boot CD
hiren boot CDhiren boot CD
hiren boot CD
 
Parts of a Computer ppt
Parts of a Computer pptParts of a Computer ppt
Parts of a Computer ppt
 
Presentation1
Presentation1Presentation1
Presentation1
 
P3
P3P3
P3
 
Unit 1 computing fundamental 2013
Unit 1 computing fundamental 2013Unit 1 computing fundamental 2013
Unit 1 computing fundamental 2013
 
Unit 2.pptx
Unit 2.pptxUnit 2.pptx
Unit 2.pptx
 
Unit 2.pptx
Unit 2.pptxUnit 2.pptx
Unit 2.pptx
 
Introduction to Operating Systems - Mary Margarat
Introduction to Operating Systems - Mary MargaratIntroduction to Operating Systems - Mary Margarat
Introduction to Operating Systems - Mary Margarat
 
System software
System softwareSystem software
System software
 
Bioinformatics
BioinformaticsBioinformatics
Bioinformatics
 
Software.pptx
Software.pptxSoftware.pptx
Software.pptx
 
Introduction to computer system
Introduction to computer systemIntroduction to computer system
Introduction to computer system
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
 
unit1 part1.ppt
unit1 part1.pptunit1 part1.ppt
unit1 part1.ppt
 
module 1-1.pptx
module 1-1.pptxmodule 1-1.pptx
module 1-1.pptx
 
UNIT I-Computer Operation-Fundamentals.ppt
UNIT I-Computer Operation-Fundamentals.pptUNIT I-Computer Operation-Fundamentals.ppt
UNIT I-Computer Operation-Fundamentals.ppt
 
Chapter 1-2 _ Operating Systems.pdf
Chapter 1-2 _ Operating Systems.pdfChapter 1-2 _ Operating Systems.pdf
Chapter 1-2 _ Operating Systems.pdf
 

More from QondileRamokgadi

7 1 information management
7 1 information management7 1 information management
7 1 information managementQondileRamokgadi
 
4 4 making changes to graphs
4 4 making changes to graphs4 4 making changes to graphs
4 4 making changes to graphsQondileRamokgadi
 
4 2 decisions and functions
4 2 decisions and functions4 2 decisions and functions
4 2 decisions and functionsQondileRamokgadi
 
3 3 integrate, check and share documents
3 3 integrate, check and share documents3 3 integrate, check and share documents
3 3 integrate, check and share documentsQondileRamokgadi
 
3 2 working with long documents
3 2 working with long documents3 2 working with long documents
3 2 working with long documentsQondileRamokgadi
 
2 2 the dangers of computer crime
2 2 the dangers of computer crime2 2 the dangers of computer crime
2 2 the dangers of computer crimeQondileRamokgadi
 
2 1 internet services and connections
2 1 internet services and connections2 1 internet services and connections
2 1 internet services and connectionsQondileRamokgadi
 
1 3 hardware recommendations
1 3 hardware recommendations1 3 hardware recommendations
1 3 hardware recommendationsQondileRamokgadi
 

More from QondileRamokgadi (10)

My pln
My plnMy pln
My pln
 
7 1 information management
7 1 information management7 1 information management
7 1 information management
 
4 4 making changes to graphs
4 4 making changes to graphs4 4 making changes to graphs
4 4 making changes to graphs
 
4 2 decisions and functions
4 2 decisions and functions4 2 decisions and functions
4 2 decisions and functions
 
3 3 integrate, check and share documents
3 3 integrate, check and share documents3 3 integrate, check and share documents
3 3 integrate, check and share documents
 
3 2 working with long documents
3 2 working with long documents3 2 working with long documents
3 2 working with long documents
 
2 2 the dangers of computer crime
2 2 the dangers of computer crime2 2 the dangers of computer crime
2 2 the dangers of computer crime
 
2 1 internet services and connections
2 1 internet services and connections2 1 internet services and connections
2 1 internet services and connections
 
1 3 hardware recommendations
1 3 hardware recommendations1 3 hardware recommendations
1 3 hardware recommendations
 
1 2 hardware
1 2 hardware1 2 hardware
1 2 hardware
 

Recently uploaded

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 

Recently uploaded (20)

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 

1 5 system software and computer management

  • 3. Content •Operating systems •Operating system utilities •Security tools •Factors influencing performance •Troubleshooting using utility software •Test and improve your knowledge 3
  • 4. OPERATING SYSTEMS System software that controls all activities that take place in a computer 4
  • 5. What happens when a computer is switched on 5 Process of loading the operating system is called booting the computer Load operating system into memory - control of the computer handed over to operating system Find the operating system Instructions perform some basic hardware tests Computer looks for instructions to follow (on ROM)
  • 6. The role of the operating system 6 To allow us to interact with the computer via a GUI Providing the user interface Manage which programs and tasks can use the CPU Managing programs Disk management Memory management Input/Output management Managing hardware User and password control Basic protection against threats Providing basic security Multitasking: ability of the operating system to load and process multiple tasks at the same time
  • 7. The Task Manager • Provides some information about the computer’s performance and the applications and processes running. • Most often used to terminate a process or program that is not responding. 7
  • 8. Single-user versus multi-user operating systems • Single-user operating system • Can only be used by a single user at a time • Multi-user operating systems • Allows multiple users to access a computer system at the same time 8
  • 9. Written module activity • Read pages 61 – 63 • Study first section of summary on page 72 (until Task Manager) • Complete questions 1 – 11 on page 74 9
  • 10. OPERATING SYSTEM UTILITIES Programs that perform system maintenance and administration tasks 10
  • 11. File management • Naming files 11 File names • file name & file extension (full stop & 3 – 5 letters) File extensions and file types • identifies the file type or format and is automatically added • also determines which program will open the type of file by default Path • ‘succession’ of folders that leads to the location of a file
  • 12. Common file types and extensions 12 Graphicsfiles JPEG, BMP, GIF, WMF, TIF, PNG Created by a graphics program or it can be inserted into a file by most programs such as MS-Word Officefiles DOCX, XLXS, PPTX, ACCDB Word processing (Word), spreadsheets (Excel), presentations (PowerPoint) and databases (Access) Audiofiles MP3, MP4, WAV, CDA, WMA Created by any media player program Videofiles MPEG, ASF, WMV, AVI Created by any media player program
  • 13. 13 Textfiles TXT Similar to word processing files, except that no fonts, styles, colours or formatting is saved Richtextfiles RTF Allows basic formatting to be applied and saved. Can be opened in any word processor or a utility like WordPad Programfiles EXE or COM Actual programs, not data files, that run (or execute) when opened Common file types and extensions
  • 14. 14 Portable DocumentFormat PDF Used to distribute document files, read by free utility program, cannot be edited. Compressedfiles ZIP or RAR Compressed to save space. The files in a compressed or ‘zipped’ folder have to be decompressed or ‘unzipped’ in order to open and use them. HypertextMarkup Languagefiles HTML Web page which can be opened in a web browser. Common file types and extensions
  • 15. File management • Information about files 15 File property • File name, size and date modified File attribute • A property of a file that can be set • Read-only & Hidden Metadata • Additional data stored about a file that describes the contents of the file, i.e. author & title properties
  • 16. File management • File manager functions 16 Searching • Searching for a file based on criteria: file size, type of file, partial file name, file type, date accessed and text in the contents of the file. Compressing • The process of reducing the size of a file by producing a smaller, compressed version of the file. Decompressing • Converting a compressed or zipped set of files back to their original size.
  • 17. Updates We update software to • download patches and service packs to fix errors or bugs in our programs • close security loopholes • add new features and improvements 17
  • 18. Updates 18 Most software publishers will automatically notify you when an update or new version of a program is available. This is normally done via the Internet.
  • 19. Updates 19 Many programs such as the Windows operating system can be scheduled to check for updates at fixed intervals (as specified by you).
  • 20. Scheduling • Why schedulers are useful: • automatically check for updates • set schedulers to run at off-peak times 20
  • 21. Printer management Print file Print job send to disk: spooling Printer queue 21 View information about the documents waiting to print and manage by deleting tasks pausing the tasks restarting the tasks (paper jam)
  • 22. Backup – why? • files can be accidentally overwritten or deleted • hardware failures – a disk drive crashes • hardware can be stolen • disasters – fires, earthquakes and floods can destroy hardware • files can be corrupted by power fluctuations • files can be deleted or corrupted by viruses, etc. 22
  • 23. Backup Backup software • Most operating systems provide backup utilities. • Third-party vendors have specialised backup programs • scheduling when to back up the files • choosing to do a full backup of all the files or just those that have been changed since the last backup • compressing the files to save space on the backup media, etc. 23
  • 24. Backup Backup tips • Use software that automatically manages your backup process. • Only back up your data not programs. • Back up your files onto external portable media. • Keep the backups off-site. • Perform ‘housekeeping’. • Consider archiving large files. • Check that the backups are actually working. 24
  • 25. Written module activity • Read pages 64 – 68 • Study Operating system utilities in summary (page 72, 73) • Complete questions 12 – 26 on Page 74 – 76 25
  • 26. SECURITY TOOLS Security measures and facilities to help control and prevent the spread of malware. 26
  • 27. Access control • Access control means that the operating system specifically asks your permission before any software can be installed. • The purpose of access control is to try to make it impossible for malware to be secretly installed on your computer without your knowledge. 27
  • 28. Firewall • A firewall is software or hardware that acts as a barrier between your computer and the Internet. • Built into the operating system. 28
  • 29. Security • Action/Security Center in Windows operating systems warns you about settings that could make your system insecure. You can check settings for • firewall • Windows automatic updates • anti-malware (virus and spyware) software settings. 29
  • 30. 30
  • 32. Memory (RAM) • Programs and data need to be loaded from disk into RAM (memory). • If memory is full, parts of the data/programs that the computer is not currently busy with are stored on an area on the hard disk. • These have to be loaded back into memory again when needed – slows down the computer. The more memory you have available, the better. Adding more RAM is often the cheapest and most effective upgrade. 32
  • 33. Memory (RAM) • Caching • Cache memory is built into various components on a computer, including the processor. • It stores frequently or recently accessed data, based on the assumption that it will probably be accessed again soon. • This memory is more expensive, because it is faster than normal memory (RAM) but it can increase the overall performance of a computer quite dramatically. 33
  • 34. CPU The speed (measured in GHz) • In general, the higher the speed, the faster the CPU. The number of cores, e.g. dual- core or quad core • Number of physical processors included in a single ‘chip’. • Each core is a complete processor that can work independently of any other core on the CPU chip. Cache size • A special high- speed memory used to store recently or frequently accessed data. • The larger the cache memory on the CPU, the faster it is likely to perform. 34
  • 35. Hard drive • Data and programs need to be loaded from disk into memory. • Changes to files need to be written back to disk. • A ‘faster’ hard drive can improve the overall performance of a computer system. • Remember also: When a hard drive is fragmented, the files will take longer to retrieve. 35
  • 36. Influence of malware • Malware can slow your computer down by using up resources such as free memory and hard drive space. • Spyware can slow your Internet connection down if it frequently connects to the Internet. 36
  • 38. Disk scanning • Generally, it is not recommended that you repair a hard drive that you suspect is faulty unless you are sure you know how to do it. • Problems on flash drives can be fixed quite easily by running a disk scanner. 38
  • 39. Disk defragmentation • A disk defragmenter is a tool that reorganises the parts of files and speeds your computer up again. • Defragmentation does not free up disk space. • Possible to schedule the running of a defrag operation. 39
  • 40. Disk filling up (too little space) • Windows - Disk Cleanup Wizard: • Removes temporary files downloaded from the Internet or temporary files created by Windows. • Removes installed programs that you no longer or seldom use. 40
  • 41. Written module activity • Read pages 68 – 72 • Study last section from summary on page 73 (Security tools to the end) • Complete questions 27 – 35 on page 76 41
  • 42. TEST AND IMPROVE YOUR KNOWLEDGE 42