The document contains information about 10 students including their names and student IDs. It then provides an overview of topics to be covered in introductory lessons on Python programming language, Microsoft Excel, and the Windows operating system. These include basic concepts like data types, functions, and interfaces in each topic.
this ppt is about basic knowlegde of an OS and is certainly very helpful. helpful for a student. follow me at my instagram
https://www.instagram.com/shantanu_stark/?hl=en
INTRODUCTION CHAP. 1 complete access to all the hardware and can.docxvrickens
INTRODUCTION CHAP. 1
complete access to all the hardware and can execute any instruction the machine is capable of executing. The rest of the software runs in user mode, in which only a subset of the machine instructions is available. In particular, those instructions that affect control of the machine or do I/O )Input/Output" are forbidden to user-mode programs. We will come back to the difference between kernel mode and user mode repeatedly throughout this book. It plays a crucial role in how operating sys- tems work.
Web browser
E-mail Music reader player
User interface program
Operating system
User mode
Kernel mode
Software
Hardware
Figure 1-1. Where the operating system fits in.
The user interface program, shell or GUI, is the lowest level of user-mode soft- ware, and allows the user to start other programs, such as a Web browser, email reader, or music player. These programs, too, make heavy use of the operating sys- tem.
The placement of the operating system is shown in Fig. 1-1. It runs on the bare hardware and provides the base for all the other software.
An important distinction between the operating system and normal (user- mode) software is that if a user does not like a particular email reader, he† is free to get a different one or write his own if he so chooses; he is not free to write his own clock interrupt handler, which is part of the operating system and is protected by hardware against attempts by users to modify it.
This distinction, however, is sometimes blurred in embedded systems (which may not have kernel mode) or interpreted systems (such as Java-based systems that use interpretation, not hardware, to separate the components).
Also, in many systems there are programs that run in user mode but help the operating system or perform privileged functions. For example, there is often a program that allows users to change their passwords. It is not part of the operating system and does not run in kernel mode, but it clearly carries out a sensitive func- tion and has to be protected in a special way. In some systems, this idea is carried to an extreme, and pieces of what is traditionally considered to be the operating
† ‘‘He’’ should be read as ‘‘he or she’’ throughout the book.
SEC. 1.1 WHAT IS AN OPERATING SYSTEM? 3
system (such as the file system) run in user space. In such systems, it is difficult to draw a clear boundary. Everything running in kernel mode is clearly part of the operating system, but some programs running outside it are arguably also part of it, or at least closely associated with it.
Operating systems differ from user (i.e., application) programs in ways other than where they reside. In particular, they are huge, complex, and long-lived. The source code of the heart of an operating system like Linux or Windows is on the order of five million lines of code or more. To conceive of what this means, think of printing out five million lines in book form, with 50 lines per page and 100 ...
this ppt is about basic knowlegde of an OS and is certainly very helpful. helpful for a student. follow me at my instagram
https://www.instagram.com/shantanu_stark/?hl=en
INTRODUCTION CHAP. 1 complete access to all the hardware and can.docxvrickens
INTRODUCTION CHAP. 1
complete access to all the hardware and can execute any instruction the machine is capable of executing. The rest of the software runs in user mode, in which only a subset of the machine instructions is available. In particular, those instructions that affect control of the machine or do I/O )Input/Output" are forbidden to user-mode programs. We will come back to the difference between kernel mode and user mode repeatedly throughout this book. It plays a crucial role in how operating sys- tems work.
Web browser
E-mail Music reader player
User interface program
Operating system
User mode
Kernel mode
Software
Hardware
Figure 1-1. Where the operating system fits in.
The user interface program, shell or GUI, is the lowest level of user-mode soft- ware, and allows the user to start other programs, such as a Web browser, email reader, or music player. These programs, too, make heavy use of the operating sys- tem.
The placement of the operating system is shown in Fig. 1-1. It runs on the bare hardware and provides the base for all the other software.
An important distinction between the operating system and normal (user- mode) software is that if a user does not like a particular email reader, he† is free to get a different one or write his own if he so chooses; he is not free to write his own clock interrupt handler, which is part of the operating system and is protected by hardware against attempts by users to modify it.
This distinction, however, is sometimes blurred in embedded systems (which may not have kernel mode) or interpreted systems (such as Java-based systems that use interpretation, not hardware, to separate the components).
Also, in many systems there are programs that run in user mode but help the operating system or perform privileged functions. For example, there is often a program that allows users to change their passwords. It is not part of the operating system and does not run in kernel mode, but it clearly carries out a sensitive func- tion and has to be protected in a special way. In some systems, this idea is carried to an extreme, and pieces of what is traditionally considered to be the operating
† ‘‘He’’ should be read as ‘‘he or she’’ throughout the book.
SEC. 1.1 WHAT IS AN OPERATING SYSTEM? 3
system (such as the file system) run in user space. In such systems, it is difficult to draw a clear boundary. Everything running in kernel mode is clearly part of the operating system, but some programs running outside it are arguably also part of it, or at least closely associated with it.
Operating systems differ from user (i.e., application) programs in ways other than where they reside. In particular, they are huge, complex, and long-lived. The source code of the heart of an operating system like Linux or Windows is on the order of five million lines of code or more. To conceive of what this means, think of printing out five million lines in book form, with 50 lines per page and 100 ...
Oplægget blev holdt ved et seminar i InfinIT-interessegruppen Højniveausprog til indlejrede systemer, der blev afholdt den 6. marts 2013. Læs mere om interessegruppen her: http://www.infinit.dk/dk/interessegrupper/hoejniveau_sprog_til_indlejrede_systemer/hoejniveau_sprog_til_indlejrede_systemer.htm
I Am Linux-Introductory Module on LinuxSagar Kumar
This module covers Introduction to Linux, History of Linux, Features of Linux, Advantage of Linux, File System Hierarchy Standard, Knowing root, Linux Commands, Working with Files and Directories, etc.
Slides introduce hardware and software components of Computer System and it also discusses generations of Programming language and Programming language translators. It will be Useful for 1st Engineering students of all disciplines.
Computer and multimedia Week 1 Windows Architecture.pptxfatahozil
The kernel is the most trusted part of the operating system. Multiple rings of protection were among the most revolutionary concepts introduced by the Multics operating system, most general-purpose systems use only two rings, even if the hardware they run on provides more CPU modes than that. For example, Windows 7 and Windows Server 2008 (and their predecessors) use only two rings, with ring 0 corresponding to kernel mode and ring 3 to user mode, because earlier versions of Windows ran on processors that supported only two protection levels.
Many modern CPU architectures (including the popular Intel x86 architecture) include some form of ring protection, although the Windows NT operating system, like Unix, does not fully utilize this feature. Under DOS, the kernel, drivers and applications typically run on ring 3 (however, this is exclusive to the case where protected-mode drivers and/or DOS extenders are used; as a real-mode OS, the system runs with effectively no protection), whereas 386 memory managers such as EMM386 run at ring 0.
Windows Memory
Each process started on x86 version of Windows uses a flat memory model that ranges from 0x00000000 – 0xFFFFFFFF. The lower half of the memory, 0x00000000 – 0x7FFFFFFF, is reserved for user space code. While the upper half of the memory, 0x80000000 – 0xFFFFFFFF, is reserved for the kernel code. The Windows operating system also doesn’t use the segmentation (well actually it does, because it has to), but the segment table contains segment descriptors that use the entire linear address space. There are four segments, two for user and two for kernel mode, which describe the data and code for each of the modes. But all of the descriptors actually contain the same linear address space. This means they all point to the same segment in memory that is 0xFFFFFFFF bits long, proving that there is no segmentation on Windows systems.
The segmentation is actually not used by the Windows system. Therefore we can use the terms “virtual address space” and “linear address space” interchangeably, because they are the same in this particular case. Because of this, when talking about user space code being loaded in the virtual address space from 0x00000000 to 0x7FFFFFFF, we’re actually talking about linear addresses. Those addresses are then sent into the paging unit to be translated into physical addresses. We’ve just determined that even though each process uses a flat memory model that spans the entire 4GB linear address space, it can only use half of it. This is because the other half is reserved for kernel code: the program can thus use, at most, 2GB of memory.
Every process has its own unique value in the CR3 register that points to the process’ page directory table. Because each process has its own page directory table that is used to translate the linear address to physical address, two processes can use the same linear address, while their physical address is different. Okay, so each program has its own ad
Oplægget blev holdt ved et seminar i InfinIT-interessegruppen Højniveausprog til indlejrede systemer, der blev afholdt den 6. marts 2013. Læs mere om interessegruppen her: http://www.infinit.dk/dk/interessegrupper/hoejniveau_sprog_til_indlejrede_systemer/hoejniveau_sprog_til_indlejrede_systemer.htm
I Am Linux-Introductory Module on LinuxSagar Kumar
This module covers Introduction to Linux, History of Linux, Features of Linux, Advantage of Linux, File System Hierarchy Standard, Knowing root, Linux Commands, Working with Files and Directories, etc.
Slides introduce hardware and software components of Computer System and it also discusses generations of Programming language and Programming language translators. It will be Useful for 1st Engineering students of all disciplines.
Computer and multimedia Week 1 Windows Architecture.pptxfatahozil
The kernel is the most trusted part of the operating system. Multiple rings of protection were among the most revolutionary concepts introduced by the Multics operating system, most general-purpose systems use only two rings, even if the hardware they run on provides more CPU modes than that. For example, Windows 7 and Windows Server 2008 (and their predecessors) use only two rings, with ring 0 corresponding to kernel mode and ring 3 to user mode, because earlier versions of Windows ran on processors that supported only two protection levels.
Many modern CPU architectures (including the popular Intel x86 architecture) include some form of ring protection, although the Windows NT operating system, like Unix, does not fully utilize this feature. Under DOS, the kernel, drivers and applications typically run on ring 3 (however, this is exclusive to the case where protected-mode drivers and/or DOS extenders are used; as a real-mode OS, the system runs with effectively no protection), whereas 386 memory managers such as EMM386 run at ring 0.
Windows Memory
Each process started on x86 version of Windows uses a flat memory model that ranges from 0x00000000 – 0xFFFFFFFF. The lower half of the memory, 0x00000000 – 0x7FFFFFFF, is reserved for user space code. While the upper half of the memory, 0x80000000 – 0xFFFFFFFF, is reserved for the kernel code. The Windows operating system also doesn’t use the segmentation (well actually it does, because it has to), but the segment table contains segment descriptors that use the entire linear address space. There are four segments, two for user and two for kernel mode, which describe the data and code for each of the modes. But all of the descriptors actually contain the same linear address space. This means they all point to the same segment in memory that is 0xFFFFFFFF bits long, proving that there is no segmentation on Windows systems.
The segmentation is actually not used by the Windows system. Therefore we can use the terms “virtual address space” and “linear address space” interchangeably, because they are the same in this particular case. Because of this, when talking about user space code being loaded in the virtual address space from 0x00000000 to 0x7FFFFFFF, we’re actually talking about linear addresses. Those addresses are then sent into the paging unit to be translated into physical addresses. We’ve just determined that even though each process uses a flat memory model that spans the entire 4GB linear address space, it can only use half of it. This is because the other half is reserved for kernel code: the program can thus use, at most, 2GB of memory.
Every process has its own unique value in the CR3 register that points to the process’ page directory table. Because each process has its own page directory table that is used to translate the linear address to physical address, two processes can use the same linear address, while their physical address is different. Okay, so each program has its own ad
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
1. * * Names
* Babar Ali
* FA19/BBA/004
* Waqas
* FA19/BBA/008
* Ali Raza
* FA19/BBA/003
* Taiyab
* FA19/BBA/007
* Tariq
* FA18-BBA-014
* Jawad
* FA19/BBA/005
* Shahbaz
* FA19/BBA/006
*Topics
*Introduction to Python
Language.
*Introduction to MS Excel
*Windows Operating System
2. Python is a widely used general-purpose, high
level programming language. It was initially
designed by Guido van Rossum in 1991 and
developed by Python Software Foundation. It
was mainly developed for emphasis on code
readability, and its syntax allows programmers
to express concepts in fewer lines of code.
Python is a programming language that lets
you work quickly and integrate systems more
efficiently.
There are two major Python versions- Python 2
and Python 3. Both are quite different.
*
3. • Beginning of the Python Language:
• Before starting python language we need an interpreter to interpret and run the program.
• Linux is the best interpreter for python language as it comes bundled with the python
language.
• Example with a program:
• # Script Begins
•
• print(“PAKISTAN")
•
• # Scripts Ends
• Let us analyze the script line by line.
• Line 1 : [# Script Begins] In Python language comments begin with #.
• Line 2 : [print(“PAKISTAN”)] In a Python script to print something on the console print()
function is used – it simply prints out a line. And its also includes a new line.
• Line 3 : [# Script Ends] This is just another comment like Line 1.
4. *Features of Python Language:
* 1) Easy to Learn and Use
* Python is easy to learn and use. It is developer-friendly and high level programming language.
* 2) Expressive Language
* Python language is more expressive means that it is more understandable and readable.
* 3) Interpreted Language
* Python is an interpreted language i.e. interpreter executes the code line by line at a time. This makes
debugging easy and thus suitable for beginners.
* 4) Cross-platform Language
* Python can run equally on different platforms such as Windows, Linux, Unix and Macintosh etc. So, we can
say that Python is a portable language.
* 5) Large Standard Library
* Python has a large and broad library and provides rich set of module and functions for rapid application
development.
* 6) GUI Programming Support
* Graphical user interfaces can be developed using Python.
* 7) Integrated
* It can be easily integrated with languages like C, C++, JAVA etc.
* 8) Extensible
* It implies that other languages such as C/C++ can be used to compile the code and thus it can be used further
in our python code.
5. Python language elements
*Basic data types and containers
* Python has several basic data types and containers. Becoming familiar with them is essential to
effective use of Python, and is a good starting point for learning Python.
*Variable names and assignment
* Python variable names are case-sensitive and start with a letter or an underscore. A leading
underscore may be used by convention to indicate a variable
*Functions
* When programs get too complex, they are likely to be full of bugs and hard to maintain. The most
fundamental construct for keeping complexity under control is the function.
*Exceptions and tracebacks
* Exceptions are part of a program flow control mechanism that is specially designed for handling
errors or other “exceptional conditions”, but that can be used more generally. A traceback is the error
report from an uncaught exception, showing the chain of function calls leading to the exception.
*Functions
* When programs get too complex, they are likely to be full of bugs and hard to maintain. The most
fundamental construct for keeping complexity under control is the function.
*Exceptions and tracebacks
* Exceptions are part of a program flow control mechanism that is specially designed for handling
errors or other “exceptional conditions”, but that can be used more generally. A traceback is the error
report from an uncaught exception, showing the chain of function calls leading to the exception.
8. Microsoft Excel interface
Excel interface is very simple and efficient. It provides methods for carrying out tasks with minimum clicks of the
mouse. It provides the ways to work with the keyboard.
Elements of excel interface
Worksheet:
Worksheet is where you enter all your data.
Worksheet is made up of rows and columns.
Rows are labeled with numbers and columns are labeled with letters.
Workbook:
Workbook is a group of worksheets saved together as one excel file.
Each workbook in excel contains 3 worksheets. The first sheet is called sheet 1 and so on.. .
Active cell:
Active cell is used to tell excel where you want to enter or edit data.
Title bar:
It is located at the very top of the screen .
It displays the name of the current work book on it.
Menu bar:
Menus vary program to program.
Menu commands are used to moving, saving, erasing, printing, saving, and changing the appearence of data etc.
Toolbars:
Toolbars provide shortcuts to. Menu commands.
Toolbars are located just below the menu bar.
It consist of icons that act as shortcuts to the commands.
Toolbar that appears below menu bar is called standard toolbar.
9. *Formula bar:
* This bar displays the location of the active cell and the value or formula used in the active cell.
*Cell:
Intersection of row and column is call cell.
Cell holds data.
Cell may contain text, numbers, and even graphical patterns.
* Cell Address:
Cells are identified by combination of their column letter and row number.
* Sheet Tabs:
Sheet tabs at the bottom of the workbook.
Sheet tabs are used to move from one sheet to another in a workbook.
* Status bar:
It appears at the bottom of excel interface.
It displays information about a command, a toolbar icon or an operation in programs
Smart tags:
* Smart tags appears when the user makes an entry and Microsoft excel believes the user may want to
change.
* Smart tags provide the facility to make changes easily.
12. *
*About Windows XP
* Windows XP is developed by Microsoft.
* It was released in 2001.
* XP stands for experience.
* Easier to use
* Available in different versions such as XP Home, XP Professional, and XP Media Centre.
* Windows XP Professional is often used in business environment and by home.
* The media Centre is built on XP Professional.
*Features of Windows XP
*New user interface:
* Provides a new user interface with different visual style. Desktop and taskbar are more attractive
and easier to use. Windows layout and design of start menu is also changed.
*Easier to use:
*Provides an easier way to work with files and folders. It saves all files in My
Documents folder on desktop by default. It also manage a recently used files
for quick access later.
* Easier to manage
* Multitasking
13. *Multi-User:
* It means that many users can use the computer at a same time. These users can be connected to a computer
over the internet.
*Clean Desktop Wizard:
* By default, the desktop cleanup Wizards runs every sixty days. It cleans-up desktop by moving unused
desktop shortcuts to a folder called unused desktop shortcuts.
*Networking:
* It provides the facility to establish, maintain and troubleshoot a network.
*Multiprocessing:
* Multiprocessing is the capability to support and utilize multiple processors in a computer. Two or more
processors can execute different programs at the same time . It increase the output of the computer.
*System restore:
* It is used to restore operating system in case of any problem. The operating system is restored to a previous
state without any loss of data.
*Latest Hardware Support:
* Includes the latest drivers to support latest advancements in computer hardware technology.
*Task panel:
* It provides an easy way to access the most commonly used folder tasks. The task panel displays a list of
hyperlink task to the left of the folder contents. For example, My pictures and My music folders provide
links to manage pictures and music files.
14. *Windows Desktop
* On-screen work area that contain windows, icons, menus and dialog boxes is called desktop.
* Desktop is the entering point in Windows.
* Desktop is the first object that appears when Windows is started.
* The user can also change the look of the desktop.
Icons on Desktop
My Document
My Computer
My Network Places
Recycle Bin
Internet Explorer
Elements of Desktop
Icons:
An icon is a small graphic that represent a program, drive, folder or document. Some important icon that appear on
Desktop are My Computer, My Document etc.
Taskbar:
Taskbar is located on bottom of the desktop and it consist of start button
and some elements in the right side.
Start button
It is used to access different programs installed in the computer.