SlideShare a Scribd company logo
Chapter 7A
Operating System Basics
Operating System
• The operating system (OS) is the most important program
that runs on a computer. Every general-purpose computer
must have an operating system to run other programs
and applications.
• Computer operating systems perform basic tasks, such as
recognizing input from the keyboard sending output to the
display screen, keeping track of files and directories on the
disk, and controlling peripheral devices such as printers.
• For large systems, the operating system has even greater
responsibilities and powers. It is like a traffic cop — it makes sure
that different programs and users running at the same time do not
interfere with each other. The operating system is also responsible
for security, ensuring that unauthorized users do not access the
system.
Operating system
Functions of Operating Systems
• Provide a user interface
• Run programs
• Manage hardware devices
• Organized file storage
7A-7A-55
Types of Operating Systems
• Real-time operating system
• Is an application that responds to certain inputs extremely quickly-
thousandths or millionths of a second.
• Very fast small OS
• Built into a device
• Respond quickly to user input
• It can support multiple simultaneous tasks or it may only
support single tasking.
• MP3 players, Medical devices, machinery, life support
system
Types of Operating Systems
• Single user/Single tasking OS
• One user works on the system
• Performs one task at a time
• MS-DOS and Palm OS
• Take up little space on disk
• Run on inexpensive computers
Types of Operating Systems
• Single user/Multitasking OS
• User performs many tasks at once
• Most common form of OS
• Windows XP and OS X
• Require expensive computers
• Tend to be complex
Types of Operating Systems
• Multi user/Multitasking OS
• Many users connect to one computer
• Each user has a unique session
• UNIX, Linux, and VMS
• Maintenance can be easy
• Requires a powerful computer
Multi user/Multi tasking OS
Providing a User Interface
• User interface
• How a user interacts with a computer
• Require different skill sets
Providing a User Interface
• Graphical user interface (GUI)
• Most common interface
• Windows, OS X, Gnome, KDE
• Uses a mouse to control objects
• Uses a desktop metaphor
• Shortcuts open programs or documents
• Open documents have additional objects
• Task switching
• Dialog boxes allow directed input
Graphical User Interface
Providing a User Interface
• Command line interfaces
• Older interface
• DOS, Linux, UNIX
• User types commands at a prompt
• User must remember all commands
• Included in all GUIs
Command Line Interface
Running Programs
• Many different applications supported
• System call
• Provides consistent access to OS features
• Share information between programs
• Copy and paste
• Object Linking and Embedding
• The operating system provides a consistent interface between application
programs and the user.
• It is also the interface between those programs and other computer
resources such as memory a printer or another program.
• Programmers write computer programs with built in instructions called
system calls that request services from operating system.
Operating System Services:
• Saves the contents of files to a disk for permanent storage.
• Reads the contents of a file from disk into memory.
• Sends a document to the printer and activates the printer.
• Provides resources that let you copy or move data from one
document to another, or from one program to another.
• Allocating RAM among the running programs
• Recognizing keystrokes or mouse clicks and displaying
characters or graphics on the screen.
A hierarchical file systemA hierarchical file system
The operating system acts as an intermediaryThe operating system acts as an intermediary
between the software and the hardware.between the software and the hardware.
O.L.E. (Object Linking and
Embedding - data is copied from
one type of document and
embedded into another. The data
that is copied retains a link with
the original document.
Multitasking - means being
able to perform two or more
procedures at the same time--
such as printing a multipage
document, sending e-mail
over the Internet, and typing a
letter--all simultaneously.
Managing Hardware
• Programs need to access hardware
• Interrupts
• CPU is stopped
• Hardware device is accessed
• Figure 6A.14
• Device drivers control the hardware
Interrupt Request (IRQ) -
used by the operating system
to send requests to use
memory and other hardware
devices attached to the
computer system.
Enhancing an OS
• Utilities
• Enhance OS capabilities.
• Provide services not included with OS
• Goes beyond the four functions
• Firewall, anti-virus and compression
• Prices vary
Enhancing an OS
• Backup software
• Archives files onto removable media
• Ensures data integrity
• Most OS include a backup package
• Many third party packages exist
Backup Software
Enhancing an OS
• Anti-virus software
• Crucial utility
• Finds, blocks and removes viruses
• Must be updated regularly
• McAfee and Norton Anti-Virus
Enhancing an OS
• Firewall
• Crucial utility
• Protects your computer from intruders
• Makes computer invisible to hackers
• Zone Labs is a home firewall
• Cisco sells hardware firewalls
Enhancing an OS
• Intrusion detection
• Often part of a firewall package
• Announces attempts to breach security
• Snort is a Linux based package
Enhancing an OS
• Screen savers
• Crucial utility for command line systems
• Prevents burn in
• Merely fun for GUI systems
• Screen saver decorates idle screens
Chapter 7A
End of Chapter

More Related Content

What's hot

Chapter 4 Peter Norton
Chapter 4 Peter NortonChapter 4 Peter Norton
Chapter 4 Peter Norton
রেদওয়ান হৃদয়
 
Intro Ch 06 A
Intro Ch 06 AIntro Ch 06 A
Intro Ch 06 A
ali00061
 
Intro Ch 04 A
Intro Ch 04 AIntro Ch 04 A
Intro Ch 04 A
ali00061
 
Chapter 2A Peter Norton
Chapter 2A Peter NortonChapter 2A Peter Norton
Chapter 2A Peter Norton
রেদওয়ান হৃদয়
 
Intro ch 05_a Peter Norton
Intro ch 05_a Peter NortonIntro ch 05_a Peter Norton
Intro ch 05_a Peter Norton
sam17896
 
Intro ch 01_a
Intro ch 01_aIntro ch 01_a
Intro Ch 03 A
Intro Ch 03 AIntro Ch 03 A
Intro Ch 03 A
ali00061
 
Peter Norton - Introduction to computers - Part 2
Peter Norton - Introduction to computers - Part 2Peter Norton - Introduction to computers - Part 2
Peter Norton - Introduction to computers - Part 2
Konstantin Pankratov
 
chapter 7A peter norton Operating system basic
chapter 7A peter norton Operating system basicchapter 7A peter norton Operating system basic
chapter 7A peter norton Operating system basic
M Malik
 
Intro Ch 09 A
Intro Ch 09 AIntro Ch 09 A
Intro Ch 09 A
ali00061
 
Peter Norton’s Introduction to Computers
Peter Norton’s Introduction to ComputersPeter Norton’s Introduction to Computers
Peter Norton’s Introduction to ComputersUjjwal 'Shanu'
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.
Šhæÿæñ Æhmęd
 
Intro Ch 02 A
Intro Ch 02 AIntro Ch 02 A
Intro Ch 02 A
ali00061
 
chapter 1 peter norton introduction to computers
chapter 1 peter norton introduction to computerschapter 1 peter norton introduction to computers
chapter 1 peter norton introduction to computers
M Malik
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
Mukesh Chinta
 
Von Neumann Architecture
Von Neumann ArchitectureVon Neumann Architecture
Von Neumann Architecture
Chamodi Adikaram
 
Introduction of computer network
Introduction of computer networkIntroduction of computer network
Introduction of computer network
Vivek Kumar Sinha
 

What's hot (20)

Chapter 4 Peter Norton
Chapter 4 Peter NortonChapter 4 Peter Norton
Chapter 4 Peter Norton
 
chapter 4B Peter Norton
chapter 4B Peter Nortonchapter 4B Peter Norton
chapter 4B Peter Norton
 
Intro Ch 06 A
Intro Ch 06 AIntro Ch 06 A
Intro Ch 06 A
 
Intro Ch 04 A
Intro Ch 04 AIntro Ch 04 A
Intro Ch 04 A
 
Osi model
Osi modelOsi model
Osi model
 
Chapter 2A Peter Norton
Chapter 2A Peter NortonChapter 2A Peter Norton
Chapter 2A Peter Norton
 
Intro ch 05_a Peter Norton
Intro ch 05_a Peter NortonIntro ch 05_a Peter Norton
Intro ch 05_a Peter Norton
 
Intro ch 01_a
Intro ch 01_aIntro ch 01_a
Intro ch 01_a
 
Intro Ch 03 A
Intro Ch 03 AIntro Ch 03 A
Intro Ch 03 A
 
Chapter 9A
Chapter 9AChapter 9A
Chapter 9A
 
Peter Norton - Introduction to computers - Part 2
Peter Norton - Introduction to computers - Part 2Peter Norton - Introduction to computers - Part 2
Peter Norton - Introduction to computers - Part 2
 
chapter 7A peter norton Operating system basic
chapter 7A peter norton Operating system basicchapter 7A peter norton Operating system basic
chapter 7A peter norton Operating system basic
 
Intro Ch 09 A
Intro Ch 09 AIntro Ch 09 A
Intro Ch 09 A
 
Peter Norton’s Introduction to Computers
Peter Norton’s Introduction to ComputersPeter Norton’s Introduction to Computers
Peter Norton’s Introduction to Computers
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.
 
Intro Ch 02 A
Intro Ch 02 AIntro Ch 02 A
Intro Ch 02 A
 
chapter 1 peter norton introduction to computers
chapter 1 peter norton introduction to computerschapter 1 peter norton introduction to computers
chapter 1 peter norton introduction to computers
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
Von Neumann Architecture
Von Neumann ArchitectureVon Neumann Architecture
Von Neumann Architecture
 
Introduction of computer network
Introduction of computer networkIntroduction of computer network
Introduction of computer network
 

Viewers also liked

Peter Norton - Introduction to computers Part 1
Peter Norton - Introduction to computers Part 1Peter Norton - Introduction to computers Part 1
Peter Norton - Introduction to computers Part 1
Konstantin Pankratov
 
Introduction to computing lecture1
Introduction to computing lecture1Introduction to computing lecture1
Introduction to computing lecture1Abdul_jabbar_k
 
chapter 7b peter norton Survey of PC and Network Operating System
chapter 7b peter norton Survey of PC and Network Operating Systemchapter 7b peter norton Survey of PC and Network Operating System
chapter 7b peter norton Survey of PC and Network Operating System
M Malik
 
Computer Science & Information Systems
Computer Science & Information SystemsComputer Science & Information Systems
Computer Science & Information Systems
Luis Borges Gouveia
 
Chapter 1 -introduction_to_computers csc
Chapter 1 -introduction_to_computers cscChapter 1 -introduction_to_computers csc
Chapter 1 -introduction_to_computers cscTyrah Ira
 
Chapter 1B Peter Norton
Chapter 1B Peter NortonChapter 1B Peter Norton
Chapter 1B Peter Norton
রেদওয়ান হৃদয়
 
Short keys function in MS word
Short keys function in MS wordShort keys function in MS word
Short keys function in MS word
M Malik
 
Number systems
Number systemsNumber systems
Chapter 1 Introduction To Computers
Chapter 1 Introduction To ComputersChapter 1 Introduction To Computers
Chapter 1 Introduction To Computersnorzaini
 
Introduction to computers by peter norton 6 e (c.b)
Introduction to computers by peter norton 6 e (c.b)Introduction to computers by peter norton 6 e (c.b)
Introduction to computers by peter norton 6 e (c.b)Fauzan Ilham
 
Introduction to Computers
Introduction to ComputersIntroduction to Computers
Introduction to ComputersSamudin Kassan
 
Chapter 01
Chapter 01Chapter 01
Synonyms, antonyms, homonyms
Synonyms, antonyms, homonyms Synonyms, antonyms, homonyms
Synonyms, antonyms, homonyms
M Malik
 

Viewers also liked (14)

Peter Norton - Introduction to computers Part 1
Peter Norton - Introduction to computers Part 1Peter Norton - Introduction to computers Part 1
Peter Norton - Introduction to computers Part 1
 
Introduction to computing lecture1
Introduction to computing lecture1Introduction to computing lecture1
Introduction to computing lecture1
 
chapter 7b peter norton Survey of PC and Network Operating System
chapter 7b peter norton Survey of PC and Network Operating Systemchapter 7b peter norton Survey of PC and Network Operating System
chapter 7b peter norton Survey of PC and Network Operating System
 
Computer Science & Information Systems
Computer Science & Information SystemsComputer Science & Information Systems
Computer Science & Information Systems
 
Chapter 1 -introduction_to_computers csc
Chapter 1 -introduction_to_computers cscChapter 1 -introduction_to_computers csc
Chapter 1 -introduction_to_computers csc
 
Computer science
Computer scienceComputer science
Computer science
 
Chapter 1B Peter Norton
Chapter 1B Peter NortonChapter 1B Peter Norton
Chapter 1B Peter Norton
 
Short keys function in MS word
Short keys function in MS wordShort keys function in MS word
Short keys function in MS word
 
Number systems
Number systemsNumber systems
Number systems
 
Chapter 1 Introduction To Computers
Chapter 1 Introduction To ComputersChapter 1 Introduction To Computers
Chapter 1 Introduction To Computers
 
Introduction to computers by peter norton 6 e (c.b)
Introduction to computers by peter norton 6 e (c.b)Introduction to computers by peter norton 6 e (c.b)
Introduction to computers by peter norton 6 e (c.b)
 
Introduction to Computers
Introduction to ComputersIntroduction to Computers
Introduction to Computers
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
Synonyms, antonyms, homonyms
Synonyms, antonyms, homonyms Synonyms, antonyms, homonyms
Synonyms, antonyms, homonyms
 

Similar to Chapter 7A Peter Norton

Operating System's Concept, Working, Types, Part, and Many More
Operating System's Concept, Working, Types, Part, and Many MoreOperating System's Concept, Working, Types, Part, and Many More
Operating System's Concept, Working, Types, Part, and Many More
Robin Thakur
 
Operating System Basics.ppt
Operating System Basics.pptOperating System Basics.ppt
Operating System Basics.ppt
UmaMahesh623495
 
4 operating system basics
4   operating system basics4   operating system basics
4 operating system basics
bsnl007
 
unit1 part1.ppt
unit1 part1.pptunit1 part1.ppt
unit1 part1.ppt
suresh554942
 
systems_software
systems_softwaresystems_software
systems_software
Brian Shonhiwa
 
lecture 1 (Introduction to Operating System.)
lecture 1 (Introduction to Operating System.)lecture 1 (Introduction to Operating System.)
lecture 1 (Introduction to Operating System.)
WajeehaBaig
 
week-1-200310134908.pptx
week-1-200310134908.pptxweek-1-200310134908.pptx
week-1-200310134908.pptx
ssuser5c874e
 
Lecture 4.pptx
Lecture 4.pptxLecture 4.pptx
Lecture 4.pptx
sara591850
 
Operating systems
Operating systemsOperating systems
Operating systemsJoshuaIgo
 
Introduction & Background(Operating Systems).pptx
Introduction & Background(Operating Systems).pptxIntroduction & Background(Operating Systems).pptx
Introduction & Background(Operating Systems).pptx
ssuserf7df42
 
Chapter one_oS.ppt
Chapter one_oS.pptChapter one_oS.ppt
Chapter one_oS.ppt
miki304759
 
Introduction to Operating system CBSE
Introduction to Operating system CBSE Introduction to Operating system CBSE
Introduction to Operating system CBSE
PrashantChahal3
 
OVERVIEW OF OPERATING SYSTEM -Basic concepts of operating system like functio...
OVERVIEW OF OPERATING SYSTEM -Basic concepts of operating system like functio...OVERVIEW OF OPERATING SYSTEM -Basic concepts of operating system like functio...
OVERVIEW OF OPERATING SYSTEM -Basic concepts of operating system like functio...
ApurvaLaddha
 
platform-technologies_compress.pdf
platform-technologies_compress.pdfplatform-technologies_compress.pdf
platform-technologies_compress.pdf
AbCc3
 
Nt introduction(os)
Nt introduction(os)Nt introduction(os)
Nt introduction(os)
NehaTadam
 
ICT Presentation operating system and types.pptx
ICT Presentation operating system and types.pptxICT Presentation operating system and types.pptx
ICT Presentation operating system and types.pptx
Shehlafaiz1
 
Functions Of Operating Systems
Functions Of Operating SystemsFunctions Of Operating Systems
Functions Of Operating Systems
Akshay Kurup
 
Foundation of information system - Software
Foundation of information system - SoftwareFoundation of information system - Software
Foundation of information system - Software
rh8g7p44p7
 
BAIT1003 Chapter 6
BAIT1003 Chapter 6BAIT1003 Chapter 6
BAIT1003 Chapter 6
limsh
 
fdocuments.in_unit-2-foc.ppt
fdocuments.in_unit-2-foc.pptfdocuments.in_unit-2-foc.ppt
fdocuments.in_unit-2-foc.ppt
KrishanPalSingh39
 

Similar to Chapter 7A Peter Norton (20)

Operating System's Concept, Working, Types, Part, and Many More
Operating System's Concept, Working, Types, Part, and Many MoreOperating System's Concept, Working, Types, Part, and Many More
Operating System's Concept, Working, Types, Part, and Many More
 
Operating System Basics.ppt
Operating System Basics.pptOperating System Basics.ppt
Operating System Basics.ppt
 
4 operating system basics
4   operating system basics4   operating system basics
4 operating system basics
 
unit1 part1.ppt
unit1 part1.pptunit1 part1.ppt
unit1 part1.ppt
 
systems_software
systems_softwaresystems_software
systems_software
 
lecture 1 (Introduction to Operating System.)
lecture 1 (Introduction to Operating System.)lecture 1 (Introduction to Operating System.)
lecture 1 (Introduction to Operating System.)
 
week-1-200310134908.pptx
week-1-200310134908.pptxweek-1-200310134908.pptx
week-1-200310134908.pptx
 
Lecture 4.pptx
Lecture 4.pptxLecture 4.pptx
Lecture 4.pptx
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Introduction & Background(Operating Systems).pptx
Introduction & Background(Operating Systems).pptxIntroduction & Background(Operating Systems).pptx
Introduction & Background(Operating Systems).pptx
 
Chapter one_oS.ppt
Chapter one_oS.pptChapter one_oS.ppt
Chapter one_oS.ppt
 
Introduction to Operating system CBSE
Introduction to Operating system CBSE Introduction to Operating system CBSE
Introduction to Operating system CBSE
 
OVERVIEW OF OPERATING SYSTEM -Basic concepts of operating system like functio...
OVERVIEW OF OPERATING SYSTEM -Basic concepts of operating system like functio...OVERVIEW OF OPERATING SYSTEM -Basic concepts of operating system like functio...
OVERVIEW OF OPERATING SYSTEM -Basic concepts of operating system like functio...
 
platform-technologies_compress.pdf
platform-technologies_compress.pdfplatform-technologies_compress.pdf
platform-technologies_compress.pdf
 
Nt introduction(os)
Nt introduction(os)Nt introduction(os)
Nt introduction(os)
 
ICT Presentation operating system and types.pptx
ICT Presentation operating system and types.pptxICT Presentation operating system and types.pptx
ICT Presentation operating system and types.pptx
 
Functions Of Operating Systems
Functions Of Operating SystemsFunctions Of Operating Systems
Functions Of Operating Systems
 
Foundation of information system - Software
Foundation of information system - SoftwareFoundation of information system - Software
Foundation of information system - Software
 
BAIT1003 Chapter 6
BAIT1003 Chapter 6BAIT1003 Chapter 6
BAIT1003 Chapter 6
 
fdocuments.in_unit-2-foc.ppt
fdocuments.in_unit-2-foc.pptfdocuments.in_unit-2-foc.ppt
fdocuments.in_unit-2-foc.ppt
 

Recently uploaded

Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 

Recently uploaded (20)

Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 

Chapter 7A Peter Norton

  • 2. Operating System • The operating system (OS) is the most important program that runs on a computer. Every general-purpose computer must have an operating system to run other programs and applications. • Computer operating systems perform basic tasks, such as recognizing input from the keyboard sending output to the display screen, keeping track of files and directories on the disk, and controlling peripheral devices such as printers.
  • 3. • For large systems, the operating system has even greater responsibilities and powers. It is like a traffic cop — it makes sure that different programs and users running at the same time do not interfere with each other. The operating system is also responsible for security, ensuring that unauthorized users do not access the system.
  • 5. Functions of Operating Systems • Provide a user interface • Run programs • Manage hardware devices • Organized file storage 7A-7A-55
  • 6. Types of Operating Systems • Real-time operating system • Is an application that responds to certain inputs extremely quickly- thousandths or millionths of a second. • Very fast small OS • Built into a device • Respond quickly to user input • It can support multiple simultaneous tasks or it may only support single tasking. • MP3 players, Medical devices, machinery, life support system
  • 7.
  • 8. Types of Operating Systems • Single user/Single tasking OS • One user works on the system • Performs one task at a time • MS-DOS and Palm OS • Take up little space on disk • Run on inexpensive computers
  • 9. Types of Operating Systems • Single user/Multitasking OS • User performs many tasks at once • Most common form of OS • Windows XP and OS X • Require expensive computers • Tend to be complex
  • 10. Types of Operating Systems • Multi user/Multitasking OS • Many users connect to one computer • Each user has a unique session • UNIX, Linux, and VMS • Maintenance can be easy • Requires a powerful computer
  • 12. Providing a User Interface • User interface • How a user interacts with a computer • Require different skill sets
  • 13. Providing a User Interface • Graphical user interface (GUI) • Most common interface • Windows, OS X, Gnome, KDE • Uses a mouse to control objects • Uses a desktop metaphor • Shortcuts open programs or documents • Open documents have additional objects • Task switching • Dialog boxes allow directed input
  • 15. Providing a User Interface • Command line interfaces • Older interface • DOS, Linux, UNIX • User types commands at a prompt • User must remember all commands • Included in all GUIs
  • 17.
  • 18. Running Programs • Many different applications supported • System call • Provides consistent access to OS features • Share information between programs • Copy and paste • Object Linking and Embedding
  • 19. • The operating system provides a consistent interface between application programs and the user. • It is also the interface between those programs and other computer resources such as memory a printer or another program. • Programmers write computer programs with built in instructions called system calls that request services from operating system.
  • 20. Operating System Services: • Saves the contents of files to a disk for permanent storage. • Reads the contents of a file from disk into memory. • Sends a document to the printer and activates the printer. • Provides resources that let you copy or move data from one document to another, or from one program to another. • Allocating RAM among the running programs • Recognizing keystrokes or mouse clicks and displaying characters or graphics on the screen.
  • 21. A hierarchical file systemA hierarchical file system
  • 22. The operating system acts as an intermediaryThe operating system acts as an intermediary between the software and the hardware.between the software and the hardware.
  • 23. O.L.E. (Object Linking and Embedding - data is copied from one type of document and embedded into another. The data that is copied retains a link with the original document.
  • 24. Multitasking - means being able to perform two or more procedures at the same time-- such as printing a multipage document, sending e-mail over the Internet, and typing a letter--all simultaneously.
  • 25. Managing Hardware • Programs need to access hardware • Interrupts • CPU is stopped • Hardware device is accessed • Figure 6A.14 • Device drivers control the hardware
  • 26.
  • 27. Interrupt Request (IRQ) - used by the operating system to send requests to use memory and other hardware devices attached to the computer system.
  • 28. Enhancing an OS • Utilities • Enhance OS capabilities. • Provide services not included with OS • Goes beyond the four functions • Firewall, anti-virus and compression • Prices vary
  • 29. Enhancing an OS • Backup software • Archives files onto removable media • Ensures data integrity • Most OS include a backup package • Many third party packages exist
  • 31. Enhancing an OS • Anti-virus software • Crucial utility • Finds, blocks and removes viruses • Must be updated regularly • McAfee and Norton Anti-Virus
  • 32. Enhancing an OS • Firewall • Crucial utility • Protects your computer from intruders • Makes computer invisible to hackers • Zone Labs is a home firewall • Cisco sells hardware firewalls
  • 33. Enhancing an OS • Intrusion detection • Often part of a firewall package • Announces attempts to breach security • Snort is a Linux based package
  • 34. Enhancing an OS • Screen savers • Crucial utility for command line systems • Prevents burn in • Merely fun for GUI systems • Screen saver decorates idle screens
  • 35. Chapter 7A End of Chapter

Editor's Notes

  1. Teaching Tip File and folder storage is covered in chapter 6.
  2. Teaching tip It is true that multi-tasking operating systems are complex. However both XP and OS X make the multitasking process painless for the user.
  3. Teaching tip Multi-user Multitasking OS's are found on supercomputers, mainframes and minicomputers. Through Linux, a PC can also support user sessions and terminal connections.
  4. Insider information The first commercial GUI was the Xerox Star. Teaching Tip There are several types of dialog boxes. Any errors are displayed in a dialog box. This box is system modal - it requires a response before returning to the OS. Save and print boxes are application modal - The box must be dealt with before returning to the application. However, other OS tasks can be performed.
  5. Teaching tip Demonstrate the command line interface in Windows by running cmd. In the command line interface use ping and ipconfig as commands that cannot be run in the GUI.
  6. Teaching tip Most students have never encountered a link. I use MS Excel and MS Word to link. Create and save a simple spreadsheet in Excel. Copy the spreadsheet to the clipboard. Open MS Word and paste-link the spreadsheet. Save the MS Word document. Then change and save the spreadsheet in Excel. The word document is automatically updated.
  7. Discussion point The mouse uses an interrupt. Many users will move the mouse while waiting for the CPU to finish a task. What does moving the mouse do to the current process? Teaching tip Discuss what can happen when the wrong driver is installed on a computer.
  8. Discussion point With Windows XP and SP2, Microsoft has included a firewall and pop-up blocker both typically considered utility software. In the near future, the core services provided by an OS may include security features.
  9. Teaching tip Windows XP includes a firewall. Service pack 2 will turn this firewall on by default. To test your computer’s security visit www.grc.com and run the various Shields Up! tests