SlideShare a Scribd company logo
Operating
System Basics
Functions of Operating
Systems
 Provide a user interface
 Run programs
 Manage hardware devices
 Organized file storage
Types of Operating Systems
 Real-time operating system
 Very fast small OS
 Built into a device
 Respond quickly to user input
 MP3 players, Medical devices
Types of Operating Systems
 Single user/Single tasking OS
 One user works on the system
 Performs one task at a time
 MS-DOS and Palm OS
 Take up little space on disk
 Run on inexpensive computers
Types of Operating Systems
 Single user/Multitasking OS
 User performs many tasks at once
 Most common form of OS
 Windows XP and OS X
 Require expensive computers
 Tend to be complex
Types of Operating Systems
 Multi user/Multitasking OS
 Many users connect to one computer
 Each user has a unique session
 UNIX, Linux, and VMS
 Maintenance can be easy
 Requires a powerful computer
Multi user/Multi tasking OS
Providing a User Interface
 User interface
 How a user interacts with a computer
 Require different skill sets
Providing a User Interface
 Graphical user interface (GUI)
 Most common interface
 Windows, OS X, Gnome, KDE
 Uses a mouse to control objects
 Uses a desktop metaphor
 Shortcuts open programs or documents
 Open documents have additional objects
 Task switching
 Dialog boxes allow directed input
Graphical User Interface
Providing a User Interface
 Command line interfaces
 Older interface
 DOS, Linux, UNIX
 User types commands at a prompt
 User must remember all commands
 Included in all GUIs
Command Line Interface
Running Programs
 Many different applications supported
 System call
 Provides consistent access to OS features
 Share information between programs
 Copy and paste
 Object Linking and Embedding
Managing Hardware
 Programs need to access hardware
 Interrupts
 CPU is stopped
 Hardware device is accessed
 Device drivers control the hardware
Organizing Files and Folders
 Organized storage
 Long file names
 Folders can be created and nested
 All storage devices work consistently
Enhancing an OS
 Utilities
 Provide services not included with OS
 Goes beyond the four functions
 Firewall, anti-virus and compression
 Prices vary
Enhancing an OS
 Backup software
 Archives files onto removable media
 Ensures data integrity
 Most OS include a backup package
 Many third party packages exist
Backup Software
Enhancing an OS
 Anti-virus software
 Crucial utility
 Finds, blocks and removes viruses
 Must be updated regularly
 McAfee and Norton Anti-Virus
Enhancing an OS
 Firewall
 Crucial utility
 Protects your computer from intruders
 Makes computer invisible to hackers
 Zone Labs is a home firewall
 Cisco sells hardware firewalls
Enhancing an OS
 Intrusion detection
 Often part of a firewall package
 Announces attempts to breach security
 Snort is a Linux based package
Enhancing an OS
 Screen savers
 Crucial utility for command line systems
 Prevents burn in
 Merely fun for GUI systems
 Screen saver decorates idle screens

More Related Content

Similar to Introduction to Operating Systems.pptx

Introduction to Operating system
Introduction to Operating system Introduction to Operating system
Introduction to Operating system
Bilal Bhatti
 
OS UNIT 1 PPT.pptx
OS UNIT 1 PPT.pptxOS UNIT 1 PPT.pptx
OS UNIT 1 PPT.pptx
PRABAVATHIH
 
Two Operating Systems
Two   Operating SystemsTwo   Operating Systems
Two Operating SystemsMISY
 
OS Basic.ppt
OS Basic.pptOS Basic.ppt
OS Basic.ppt
christine987332
 
OPERATING SYSTEMS INTRODUCTION chapter 1.pptx
OPERATING SYSTEMS INTRODUCTION chapter 1.pptxOPERATING SYSTEMS INTRODUCTION chapter 1.pptx
OPERATING SYSTEMS INTRODUCTION chapter 1.pptx
natyesu
 
Intro_Chapter_06A.ppt
Intro_Chapter_06A.pptIntro_Chapter_06A.ppt
Intro_Chapter_06A.ppt
rehmat
 
L7 operating system
L7   operating systemL7   operating system
L7 operating systemheidirobison
 
CSC103 Operating Systems, System Software, Powershell
CSC103 Operating Systems, System Software, PowershellCSC103 Operating Systems, System Software, Powershell
CSC103 Operating Systems, System Software, Powershell
Richard Homa
 
Operating system
Operating systemOperating system
Operating system
Tanvirul Islam
 
System software os system and utility ggood
System software os system and utility ggoodSystem software os system and utility ggood
System software os system and utility ggoodrozanadiana
 
Operating Systems Genesis, Development and Functions m.pptx
Operating Systems Genesis, Development and Functions  m.pptxOperating Systems Genesis, Development and Functions  m.pptx
Operating Systems Genesis, Development and Functions m.pptx
DrIrfanulHaqAkhoon
 
Software Theory Presentation
Software Theory PresentationSoftware Theory Presentation
Software Theory Presentationalexmurch
 
opreting system
opreting systemopreting system
opreting system
opreting systemopreting system
opreting system
opreting systemopreting system
opreting system
opreting systemopreting system
opreting system
opreting systemopreting system
opreting system
opreting systemopreting system

Similar to Introduction to Operating Systems.pptx (20)

Introduction to Operating system
Introduction to Operating system Introduction to Operating system
Introduction to Operating system
 
OS UNIT 1 PPT.pptx
OS UNIT 1 PPT.pptxOS UNIT 1 PPT.pptx
OS UNIT 1 PPT.pptx
 
Two Operating Systems
Two   Operating SystemsTwo   Operating Systems
Two Operating Systems
 
OS Basic.ppt
OS Basic.pptOS Basic.ppt
OS Basic.ppt
 
OPERATING SYSTEMS INTRODUCTION chapter 1.pptx
OPERATING SYSTEMS INTRODUCTION chapter 1.pptxOPERATING SYSTEMS INTRODUCTION chapter 1.pptx
OPERATING SYSTEMS INTRODUCTION chapter 1.pptx
 
Intro_Chapter_06A.ppt
Intro_Chapter_06A.pptIntro_Chapter_06A.ppt
Intro_Chapter_06A.ppt
 
Intro ch 07_a
Intro ch 07_aIntro ch 07_a
Intro ch 07_a
 
L7 operating system
L7   operating systemL7   operating system
L7 operating system
 
CSC103 Operating Systems, System Software, Powershell
CSC103 Operating Systems, System Software, PowershellCSC103 Operating Systems, System Software, Powershell
CSC103 Operating Systems, System Software, Powershell
 
Operating system
Operating systemOperating system
Operating system
 
System software os system and utility ggood
System software os system and utility ggoodSystem software os system and utility ggood
System software os system and utility ggood
 
Operating Systems Genesis, Development and Functions m.pptx
Operating Systems Genesis, Development and Functions  m.pptxOperating Systems Genesis, Development and Functions  m.pptx
Operating Systems Genesis, Development and Functions m.pptx
 
Software Theory Presentation
Software Theory PresentationSoftware Theory Presentation
Software Theory Presentation
 
opreting system
opreting systemopreting system
opreting system
 
opreting system
opreting systemopreting system
opreting system
 
opreting system
opreting systemopreting system
opreting system
 
opreting system
opreting systemopreting system
opreting system
 
opreting system
opreting systemopreting system
opreting system
 
opreting system
opreting systemopreting system
opreting system
 
Computer Systems Hardware
Computer Systems   HardwareComputer Systems   Hardware
Computer Systems Hardware
 

Recently uploaded

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 

Recently uploaded (20)

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 

Introduction to Operating Systems.pptx

  • 2. Functions of Operating Systems  Provide a user interface  Run programs  Manage hardware devices  Organized file storage
  • 3. Types of Operating Systems  Real-time operating system  Very fast small OS  Built into a device  Respond quickly to user input  MP3 players, Medical devices
  • 4. Types of Operating Systems  Single user/Single tasking OS  One user works on the system  Performs one task at a time  MS-DOS and Palm OS  Take up little space on disk  Run on inexpensive computers
  • 5. Types of Operating Systems  Single user/Multitasking OS  User performs many tasks at once  Most common form of OS  Windows XP and OS X  Require expensive computers  Tend to be complex
  • 6. Types of Operating Systems  Multi user/Multitasking OS  Many users connect to one computer  Each user has a unique session  UNIX, Linux, and VMS  Maintenance can be easy  Requires a powerful computer
  • 8. Providing a User Interface  User interface  How a user interacts with a computer  Require different skill sets
  • 9. Providing a User Interface  Graphical user interface (GUI)  Most common interface  Windows, OS X, Gnome, KDE  Uses a mouse to control objects  Uses a desktop metaphor  Shortcuts open programs or documents  Open documents have additional objects  Task switching  Dialog boxes allow directed input
  • 11. Providing a User Interface  Command line interfaces  Older interface  DOS, Linux, UNIX  User types commands at a prompt  User must remember all commands  Included in all GUIs
  • 13. Running Programs  Many different applications supported  System call  Provides consistent access to OS features  Share information between programs  Copy and paste  Object Linking and Embedding
  • 14. Managing Hardware  Programs need to access hardware  Interrupts  CPU is stopped  Hardware device is accessed  Device drivers control the hardware
  • 15. Organizing Files and Folders  Organized storage  Long file names  Folders can be created and nested  All storage devices work consistently
  • 16. Enhancing an OS  Utilities  Provide services not included with OS  Goes beyond the four functions  Firewall, anti-virus and compression  Prices vary
  • 17. Enhancing an OS  Backup software  Archives files onto removable media  Ensures data integrity  Most OS include a backup package  Many third party packages exist
  • 19. Enhancing an OS  Anti-virus software  Crucial utility  Finds, blocks and removes viruses  Must be updated regularly  McAfee and Norton Anti-Virus
  • 20. Enhancing an OS  Firewall  Crucial utility  Protects your computer from intruders  Makes computer invisible to hackers  Zone Labs is a home firewall  Cisco sells hardware firewalls
  • 21. Enhancing an OS  Intrusion detection  Often part of a firewall package  Announces attempts to breach security  Snort is a Linux based package
  • 22. Enhancing an OS  Screen savers  Crucial utility for command line systems  Prevents burn in  Merely fun for GUI systems  Screen saver decorates idle screens