SlideShare a Scribd company logo
1 of 21
Download to read offline
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 1 / 21 File: lec9chap8f04.doc
General Items:
? Computer security
? Computer purchasing
Reading Materials:
?
Miscellaneous:
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 2 / 21 File: lec9chap8f04.doc
Type of software
- System Software
o programs controlling the operation of the computer and devices
?Operating system programs (platform)
?Utility programs
- Application (perform a specific task)
o Graphics, Multimedia, Web page designer, Communication
software
o Designed for a specific OS – some can be cross-platform
Operating system (OS)
- An OS is a set of programs that coordinate activities between computer
hardware resources
- Also called software platform
- It typically resides in the hardware or ROM
- Examples: Windows XP, Mac OS X
-
Operating
System
Starting
Computer
User
Interface
Managing
Programs
Configuring
Devices
Monitoring
performance
Controlling
NetworkOS Functions
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 3 / 21 File: lec9chap8f04.doc
Basic idea
- Not all computers need OS
o hardware is fixed, same program is run at all times
- Examples: Macintosh, Windows, Unix
- Functions:
o Manages hardware and software resources
o Applications to deal with hardware
- Four types:
o Real time (very little user-interface capability and no end-user
utilities)
o Single user-single task (Palm OS - DOS)
o Single user-multitask (Desktop)
o Multi user (Networking)
Computer booting (wakeup-call)
- This is one of the basic OS functions
- Bootstrap: a program that loads the OS into the RAM
- Booting: Computer startup or restarting process
o Cold booting or warm booting
o Upon booting -> OS instructions are loaded in the RAM
o
o Kernel: Instructions managing memory and devices, application
startups, maintains computer’s clock – Core or OS
Operating System Programs:
Memory resident (reside in RAM)
Example: Kernel
Nonresident (reside in hardware)
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 4 / 21 File: lec9chap8f04.doc
Starting a computer:
- Power up
- Processor reset, Finding the ROM BIOS chips
o Basic Input/Output System (contains startup instructions)
o Executes a series of tests to make sure all devices are operational
(keyboard, monitor, internal busses, RAM chips, etc.)
- BIOS performs the POST: Power-on self test
o The result is compared with the information recorded in the CMOS
chip
o CMOS chip maintains the information about system configuration,
memory, other devices
o Finds new devices
o Detects any device errors
- BIOS starts searching for “system files” (drive A, C, CD, etc.)
o .COM, .DRV, .DLL, .366, etc.
o System files are loaded in the RAM
- The KERNEL is loaded in the memory (the operating system takes over!)
- The operating system loads the system configuration
o System configuration information are in REGISTRY files
- Files in the Startup Folder are executed
User Interface
Interacting with software through user interface
- Command line (command language)
- Graphical (GUI) – menu, Icons
Managing programs
- Single user/single tasking
- Single user/multitasking
o Foreground and background processing
- Multi users
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 5 / 21 File: lec9chap8f04.doc
- Multi processing (supporting two or more processors)
o Fault-tolerant computer (duplicated components)
Memory Management
- Used to optimize the use of RAM
o How to distribute data, instructions, programs in different memory
locations
o Clearing unused memory locations
- Virtual memory
o Optimizing the RAM
o Using hardware disk as additional RAM (called swap file)
o Paging: technique of swapping items between memory and hard
drive: Swap out (of RAM), Swap in (the RAM)
o When paging time is too long -> more RAM is required
(Thrashing) – not much execution is going on!
Scheduling job
- The operating system performs operations (jobs) based on some order
- Serving disciplines: FCFS operations, Priority Operations
- Buffering: Waiting for available resources
- Spooling:
o Buffering PRINT jobs (advantage?)
o Jobs are QUEUED (stacked)
o Print spooler: a program that places jobs in the queue
Configuring devices
Device drivers are used to communicate with different devices
A device driver is a program: how the processor should communicate with a
device – Print drivers (*.drv)
Installing drivers
Plug and play (computer recognizes the device)
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 6 / 21 File: lec9chap8f04.doc
Monitoring performance
- Operating systems can monitor system performance
- Uses a performance monitor program (resident or nonresident program?)
- Includes: Disk usage, memory usage, processor activities, number of
reads and writes to a file – provides a good way to measure your system
resources (need more VM?)
File management services
- Include storage and file management functions
- Includes:
o Formatting and disk copying
?Formatting: Preparing a disk for reading and writing
?When a disk is formatted it looses all its information
o Checking the available storage
o Copy, renaming, deleting, moving, creating short cuts
Controlling a network
- Operating systems can be Network OS (NOS)
- Connecting a server and several clients
- Sharing resources / resource allocation
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 7 / 21 File: lec9chap8f04.doc
Types of operating systems
DOS:
- MS-DOS (Disk Operating System) 1980
- Used for personal computers
- IBM Compatibles
- Uses Command lines
Windows 3.x:
- DOS driven program with GUI interface (3.1, 3.11, etc.)
- DOS-based OS with GUI operating environment
- Not multitasking
- Based on 16-bit processors
Time
DOS
Win 3.x
Win 95
NT
Win 98
Win 2000
Millen
XP Home
XP Prof.
Power/
Integration
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 8 / 21 File: lec9chap8f04.doc
Windows 95
- Multi tasking OS (not based on DOS)
- Uses 32-bit processors
- Used for Windows NT
Windows Me
- Upgrade to 98
- For home users
- Optimized for digital photography and movies, audio, web design, home
networking
Windows XP
- Home and professional editions
- Movie Maker
- Better file sharing
- Fast startup
- Better security
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 9 / 21 File: lec9chap8f04.doc
-
Types of operating systems:
- Stand- alone: Complete OS working on a desktop, notebook,
etc. Examples: Window XP, Mac, Linux, UNIX
- Network: Designed to support networks, typically reside on the server,
- Embedded: Reside on a ROM chip – used for PDAs mobile
devices, Examples: Windows CE, .NET, Windows Mobile
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 10 / 21 File: lec9chap8f04.doc
Type of software
- Application (perform a specific task)
o Graphics, Multimedia, Web page designer, Communication
software
- System Software
o programs controlling the operation of the computer and devices
?Operating system programs
?Utility programs
Utility Programs
- A system software that typically manages a computer, its devices or its
programs
- Utility suites: collection of several utility programs
- Examples of utility programs: Norton Utilities, McAfee
- Basic utility files:
o File viewer: View or copy files
o File compression: Shrinks (Zips) the size of a file – PKZIP,
PKUNZIP
o Diagnostic utility: Compile information about the computer
performance and devices - memory usage, processor utilization,
etc.
o Uninstaller: Utility that removes all the related files, typically
embedded in the OS
o Scanning files: Moves all unnecessary files, finds some physical
and logical problems
?Physical problem: bad disk, scratched CD
?Logical problem: corrupted files
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 11 / 21 File: lec9chap8f04.doc
o Defragmenting: Organizing the files on the hard drive
?Fragmented file: a files scattered on different sectors on the
HD
?Defragmenting: place files on continuous sectors
o Backup utility: copy and backup your files
?Program restoration: accessing the backup files
?Using an Internet hard drive
o Screen savers:
?Used to be critical to avoid permanent image “etching” on
monitor’s screen
?Today mostly used for screen blocking
?Want some cool screen savers? http://www.free-search.com/
-
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 12 / 21 File: lec9chap8f04.doc
Who are computer hackers?
- A person who enjoys exploring the details of programmable systems and
how to stretch their capabilities, as opposed to most users, who prefer to
learn only the minimum necessary.
- One who programs enthusiastically (even obsessively)
- A person capable of appreciating hack value.
- A person who is good at programming quickly.
- An expert at a particular program, or one who frequently does work using
it or on it.
Basic hacking operations
- Piracy (copying and using commercial software purchased by someone
else)
- Sniffing gather information regarding the status of components of a
network system
- Attackers (forcing to teardown the system)
- And more…
Cute hacking
- Play with the hidden files
- Change system files (boot-up logos)
Hacking software
- Password stealer (AOL password, windows, etc.)
- Sniffers
- Cracking tools
- Spy tools (monitor all key strokes, and other computer activities)
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 13 / 21 File: lec9chap8f04.doc
Why do we need computer security?
- Thanks to Internet a huge amount of personal information are being
exchanged on the net
- Credit-card information
- Social Security numbers
- Private correspondence
- Personal details
- Sensitive company information
- Bank-account information
Basic security operations
- Encryption
- Authentication
Encryption
- Definition: Encoding the contents of the message in such a way that hides
its contents from outsiders
- Goes back to the Roman Empire.
- Without a computer it is easy to break (crack) the code!
- Check the LOCK in your web page!
- Also used in cell phones and cordless phones
- The encrypted message is called the ciphertext.
- The process of retrieving the plaintext from the ciphertext is called
decryption.
- Encryption and decryption usually make use of a key
- Cryptanalysis is the art of breaking ciphers, i.e. retrieving the plaintext
without knowing the proper key
- One popular way is to have a Public-key (PGP)
- The key is based on a HASH value
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 14 / 21 File: lec9chap8f04.doc
Authentication
- Password
- Password card
- Digital signature
- Biometric
o Face scan
o Retina check
o Finger print
o Voice identification
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 15 / 21 File: lec9chap8f04.doc
Purchasing a computer
- Computer category
o Desktop
o Laptop
o Supercomputer
o Internet application
- Basic Component
o CD/DVD – 24/48 X (150 KBps) / 650MB & 4.7 GB
o Modems – 56Kbps
o Network cards - Supporting DSL
o Printer – Ink jet; Laser
o Monitor – LCD, CRT; 17,19,21 inches;
o Processor – Intel; ADM 2.2 GHz
o RAM – 256; 516 MB
o Internet connection – Subscription to ISP, OSP
- Purchasing a laptop
o Screen size
o Processor
o Hard drive size
o Wireless card
o Available software
o Weight
o Memory – RAM
o Disk drive / CD-RW
o Warranty
o Built-in cam
o Backup hard drive
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 16 / 21 File: lec9chap8f04.doc
- Purchasing online
o http://www.dell.com
o Configure your own PC:
? http://www.mypcgoodies.com
?http://www.directpc.ca/index.jsp
o Search for "computer auction"
?http://www.dellauction.com/
o search through eBay: www.ebay.com
?Search for computer, laptop
?You can BID on different items!
o Always check the price online!
o Check your computer configuration:
http://www.pny.com/configurator/config.asp
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 17 / 21 File: lec9chap8f04.doc
Learn more about computers:
PC MAC Reviews/Guides
www.shopper.cnet.com www.store.apple.com www.shopper.cnet.com
www.hp.com www.clubmac.com www.pcworld.com
www.compusa.com www.macx.com www.byte.com
www.dartek.com www.apple.com www.zdnet.com/review
www.dell.com www.eshop.msn.com
www.gateway.com www.macworld.com
www.micron.com
www.global.acer.com
www.fujitsu.com
www.sony.com
- Warranty?
o How expensive is it?
o How many years?
o One time?
o Covers the screen
o Buy back programs! Nothing short of hoax!
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 18 / 21 File: lec9chap8f04.doc
- So what do you use the computer for?
o School (work processing and simple projects)
?Anything works!
o Mostly games
?Lots of memory and fast processor
?Good monitor
?Joysticks, etc.
o Internet / browsing / emailing
?Good connection
o Advance applications (programming)
?Lots of memory and fast processor
o Multimedia (digital photography)
?Lots of memory and fast processor
?Good Sound card - Creative Sound Blaster Audigy 2 ZS Good
?Video card - Quadro4 3000 FX, 256 MB, AGP 8x
? 3-D display capacity
- Processor types
o Pentium
o ADM Athlon XP
o Celeron
- Operating system
o Windows
o Mac
o Unix
- Capability
o RAM size
o Processor speed
o CD ROM/DVD/ CD Write (CDRW)
o Video Card
o Cache
o Modem / drivers
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 19 / 21 File: lec9chap8f04.doc
- Software
o Office
o Acrobat products
o Games
o Some are just free!
- Accessories
o Printer
o Scanner
o Digital camera
- Smart shoppers
o Return policies
o Hidden costs
Check several places and compare prices!
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 20 / 21 File: lec9chap8f04.doc
Quiz
Name two types of system software programs.
Name three examples of operating systems.
What is Virtual Memory? – Where is it?
What is booting? How many types of booting we have?
What is Plug and Play?
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 21 / 21 File: lec9chap8f04.doc
Quiz
Name two types of system software programs.
What is Encryption?
Why do we COMPRESS files?
Name three examples of operating systems.

More Related Content

What's hot (20)

Unit1 four part basic computer organization
Unit1 four part basic computer organizationUnit1 four part basic computer organization
Unit1 four part basic computer organization
 
operating system
operating systemoperating system
operating system
 
Introduction To operating System:
Introduction To operating System:Introduction To operating System:
Introduction To operating System:
 
Operatig System Tutorial Level3
Operatig System Tutorial Level3Operatig System Tutorial Level3
Operatig System Tutorial Level3
 
System software vt
System software vtSystem software vt
System software vt
 
Operating system
Operating systemOperating system
Operating system
 
Ch11
Ch11Ch11
Ch11
 
Ch12
Ch12Ch12
Ch12
 
Computer Organisation
Computer OrganisationComputer Organisation
Computer Organisation
 
BASICS OF COMPUTER
BASICS OF COMPUTERBASICS OF COMPUTER
BASICS OF COMPUTER
 
1 5 system software and computer management
1 5 system software and computer management1 5 system software and computer management
1 5 system software and computer management
 
Operating System Case Study and I/O System
Operating System Case Study and I/O SystemOperating System Case Study and I/O System
Operating System Case Study and I/O System
 
Unit 20 brief 1 task 2_worksheet
Unit 20 brief 1 task 2_worksheetUnit 20 brief 1 task 2_worksheet
Unit 20 brief 1 task 2_worksheet
 
Computer softwre
Computer softwreComputer softwre
Computer softwre
 
Ch01 introducing operating systems
Ch01 introducing operating systemsCh01 introducing operating systems
Ch01 introducing operating systems
 
OPERATING SYSTEM
OPERATING SYSTEMOPERATING SYSTEM
OPERATING SYSTEM
 
Operating System Structure (documentation)
Operating System Structure (documentation)Operating System Structure (documentation)
Operating System Structure (documentation)
 
Computer Literacy Lesson Two
Computer Literacy Lesson TwoComputer Literacy Lesson Two
Computer Literacy Lesson Two
 
Operating System
Operating SystemOperating System
Operating System
 
booting steps of a computer
booting steps of a computerbooting steps of a computer
booting steps of a computer
 

Viewers also liked

Cps 189 cps ongoing supervisory case review guide
Cps 189 cps ongoing supervisory case review guideCps 189 cps ongoing supervisory case review guide
Cps 189 cps ongoing supervisory case review guidescreaminc
 
2 amicus brief for-grandmother-as-amicus-curiae-in-support-of-appellant
2 amicus brief for-grandmother-as-amicus-curiae-in-support-of-appellant2 amicus brief for-grandmother-as-amicus-curiae-in-support-of-appellant
2 amicus brief for-grandmother-as-amicus-curiae-in-support-of-appellantscreaminc
 
Williams v. state
Williams v. stateWilliams v. state
Williams v. statescreaminc
 
Lec1chap1f04
Lec1chap1f04Lec1chap1f04
Lec1chap1f04screaminc
 
Lec3chap2f04
Lec3chap2f04Lec3chap2f04
Lec3chap2f04screaminc
 
Grand families.org --14-state-of-grandfamilies-report-final
Grand families.org --14-state-of-grandfamilies-report-finalGrand families.org --14-state-of-grandfamilies-report-final
Grand families.org --14-state-of-grandfamilies-report-finalscreaminc
 
Objections and corrections draft
Objections and corrections draftObjections and corrections draft
Objections and corrections draftscreaminc
 
Class action lawsuit --kenny-a-consent-decree-entered-102805-file-stamped
Class action lawsuit --kenny-a-consent-decree-entered-102805-file-stampedClass action lawsuit --kenny-a-consent-decree-entered-102805-file-stamped
Class action lawsuit --kenny-a-consent-decree-entered-102805-file-stampedscreaminc
 
Extending foster care_policy_toolkit_5
Extending foster care_policy_toolkit_5Extending foster care_policy_toolkit_5
Extending foster care_policy_toolkit_5screaminc
 
Leslie stewart custody lawyer
Leslie stewart custody lawyerLeslie stewart custody lawyer
Leslie stewart custody lawyerscreaminc
 
3.9 court review of custodial orders
3.9 court review of custodial orders3.9 court review of custodial orders
3.9 court review of custodial ordersscreaminc
 
Lec45chap4f04
Lec45chap4f04Lec45chap4f04
Lec45chap4f04screaminc
 
Cps 455 a safety assessment
Cps 455 a safety assessmentCps 455 a safety assessment
Cps 455 a safety assessmentscreaminc
 
Certori of lower court example of format bring rissler petitioned
Certori of lower court example of format bring rissler petitionedCertori of lower court example of format bring rissler petitioned
Certori of lower court example of format bring rissler petitionedscreaminc
 
Cps 32 child fatality serious injury report
Cps 32 child fatality serious injury reportCps 32 child fatality serious injury report
Cps 32 child fatality serious injury reportscreaminc
 
Deprivation rules 2014
Deprivation rules 2014Deprivation rules 2014
Deprivation rules 2014screaminc
 
Ch06 deprivation-dependency
Ch06 deprivation-dependencyCh06 deprivation-dependency
Ch06 deprivation-dependencyscreaminc
 

Viewers also liked (18)

Cps 189 cps ongoing supervisory case review guide
Cps 189 cps ongoing supervisory case review guideCps 189 cps ongoing supervisory case review guide
Cps 189 cps ongoing supervisory case review guide
 
2 amicus brief for-grandmother-as-amicus-curiae-in-support-of-appellant
2 amicus brief for-grandmother-as-amicus-curiae-in-support-of-appellant2 amicus brief for-grandmother-as-amicus-curiae-in-support-of-appellant
2 amicus brief for-grandmother-as-amicus-curiae-in-support-of-appellant
 
Williams v. state
Williams v. stateWilliams v. state
Williams v. state
 
Man3000
Man3000Man3000
Man3000
 
Lec1chap1f04
Lec1chap1f04Lec1chap1f04
Lec1chap1f04
 
Lec3chap2f04
Lec3chap2f04Lec3chap2f04
Lec3chap2f04
 
Grand families.org --14-state-of-grandfamilies-report-final
Grand families.org --14-state-of-grandfamilies-report-finalGrand families.org --14-state-of-grandfamilies-report-final
Grand families.org --14-state-of-grandfamilies-report-final
 
Objections and corrections draft
Objections and corrections draftObjections and corrections draft
Objections and corrections draft
 
Class action lawsuit --kenny-a-consent-decree-entered-102805-file-stamped
Class action lawsuit --kenny-a-consent-decree-entered-102805-file-stampedClass action lawsuit --kenny-a-consent-decree-entered-102805-file-stamped
Class action lawsuit --kenny-a-consent-decree-entered-102805-file-stamped
 
Extending foster care_policy_toolkit_5
Extending foster care_policy_toolkit_5Extending foster care_policy_toolkit_5
Extending foster care_policy_toolkit_5
 
Leslie stewart custody lawyer
Leslie stewart custody lawyerLeslie stewart custody lawyer
Leslie stewart custody lawyer
 
3.9 court review of custodial orders
3.9 court review of custodial orders3.9 court review of custodial orders
3.9 court review of custodial orders
 
Lec45chap4f04
Lec45chap4f04Lec45chap4f04
Lec45chap4f04
 
Cps 455 a safety assessment
Cps 455 a safety assessmentCps 455 a safety assessment
Cps 455 a safety assessment
 
Certori of lower court example of format bring rissler petitioned
Certori of lower court example of format bring rissler petitionedCertori of lower court example of format bring rissler petitioned
Certori of lower court example of format bring rissler petitioned
 
Cps 32 child fatality serious injury report
Cps 32 child fatality serious injury reportCps 32 child fatality serious injury report
Cps 32 child fatality serious injury report
 
Deprivation rules 2014
Deprivation rules 2014Deprivation rules 2014
Deprivation rules 2014
 
Ch06 deprivation-dependency
Ch06 deprivation-dependencyCh06 deprivation-dependency
Ch06 deprivation-dependency
 

Similar to Lec9chap8f04

Operatingsystems
Operatingsystems Operatingsystems
Operatingsystems kuldeepy60
 
Systems and Applications.pptx
Systems and Applications.pptxSystems and Applications.pptx
Systems and Applications.pptxMonaNashaat3
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYGOKUL SREE
 
Itk rawa t____operatingsystems2
Itk rawa t____operatingsystems2Itk rawa t____operatingsystems2
Itk rawa t____operatingsystems2KapiL RawaT
 
PT101-WEEK-8-9-Importance-functions-of-Input-output-in-OS-1.pptx
PT101-WEEK-8-9-Importance-functions-of-Input-output-in-OS-1.pptxPT101-WEEK-8-9-Importance-functions-of-Input-output-in-OS-1.pptx
PT101-WEEK-8-9-Importance-functions-of-Input-output-in-OS-1.pptxAngelikaSolomon
 
Operating system of computer
Operating system of computerOperating system of computer
Operating system of computerHamzaAbbas43
 
Introduction to Embedded Linux
Introduction to Embedded LinuxIntroduction to Embedded Linux
Introduction to Embedded LinuxHossain Reja
 
Amr Chap 08 Operating Systems & Utility Programs
Amr Chap 08 Operating Systems & Utility ProgramsAmr Chap 08 Operating Systems & Utility Programs
Amr Chap 08 Operating Systems & Utility Programssharing notes123
 
Reformat PPT.pptx
Reformat PPT.pptxReformat PPT.pptx
Reformat PPT.pptxLINDYLGERAL
 
Linux fundamentals Training
Linux fundamentals TrainingLinux fundamentals Training
Linux fundamentals TrainingLove Steven
 
operating system
operating systemoperating system
operating systemIbbad shah
 
Principles of operating system
Principles of operating systemPrinciples of operating system
Principles of operating systemAnil Dharmapuri
 

Similar to Lec9chap8f04 (20)

Operatingsystems
Operatingsystems Operatingsystems
Operatingsystems
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Systems and Applications.pptx
Systems and Applications.pptxSystems and Applications.pptx
Systems and Applications.pptx
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
 
Itk rawa t____operatingsystems2
Itk rawa t____operatingsystems2Itk rawa t____operatingsystems2
Itk rawa t____operatingsystems2
 
PT101-WEEK-8-9-Importance-functions-of-Input-output-in-OS-1.pptx
PT101-WEEK-8-9-Importance-functions-of-Input-output-in-OS-1.pptxPT101-WEEK-8-9-Importance-functions-of-Input-output-in-OS-1.pptx
PT101-WEEK-8-9-Importance-functions-of-Input-output-in-OS-1.pptx
 
Software
SoftwareSoftware
Software
 
Operating system of computer
Operating system of computerOperating system of computer
Operating system of computer
 
Cs1 3-operating systems
Cs1 3-operating systemsCs1 3-operating systems
Cs1 3-operating systems
 
Notes
NotesNotes
Notes
 
Introduction to Embedded Linux
Introduction to Embedded LinuxIntroduction to Embedded Linux
Introduction to Embedded Linux
 
Amr Chap 08 Operating Systems & Utility Programs
Amr Chap 08 Operating Systems & Utility ProgramsAmr Chap 08 Operating Systems & Utility Programs
Amr Chap 08 Operating Systems & Utility Programs
 
Reformat PPT.pptx
Reformat PPT.pptxReformat PPT.pptx
Reformat PPT.pptx
 
os.ppt
os.pptos.ppt
os.ppt
 
Operating system
Operating systemOperating system
Operating system
 
Linux fundamentals Training
Linux fundamentals TrainingLinux fundamentals Training
Linux fundamentals Training
 
operating system
operating systemoperating system
operating system
 
Operating system,window
Operating system,windowOperating system,window
Operating system,window
 
Ict 5
Ict 5Ict 5
Ict 5
 
Principles of operating system
Principles of operating systemPrinciples of operating system
Principles of operating system
 

More from screaminc

07052015 when the empirical base crumbles- the myth that open dependency proc...
07052015 when the empirical base crumbles- the myth that open dependency proc...07052015 when the empirical base crumbles- the myth that open dependency proc...
07052015 when the empirical base crumbles- the myth that open dependency proc...screaminc
 
Georgia court improvement project (cip)
Georgia court improvement project (cip)Georgia court improvement project (cip)
Georgia court improvement project (cip)screaminc
 
Juvenile justice delinquency prevention and treatment programs rfp (3)
Juvenile justice delinquency prevention and treatment programs rfp (3)Juvenile justice delinquency prevention and treatment programs rfp (3)
Juvenile justice delinquency prevention and treatment programs rfp (3)screaminc
 
Civil discovery (section 9 11-37)
Civil discovery (section 9 11-37)Civil discovery (section 9 11-37)
Civil discovery (section 9 11-37)screaminc
 
Amended+motion+for+new+trial+(pdf)
Amended+motion+for+new+trial+(pdf)Amended+motion+for+new+trial+(pdf)
Amended+motion+for+new+trial+(pdf)screaminc
 
Motion for new trial -clu 12-19_14_no_51_14
Motion for new trial -clu 12-19_14_no_51_14Motion for new trial -clu 12-19_14_no_51_14
Motion for new trial -clu 12-19_14_no_51_14screaminc
 
Amicus brief-draft-two
Amicus brief-draft-twoAmicus brief-draft-two
Amicus brief-draft-twoscreaminc
 
Appealpowerpoint by darice goode
Appealpowerpoint   by darice goodeAppealpowerpoint   by darice goode
Appealpowerpoint by darice goodescreaminc
 
Juvenile code revised ---hb 242
Juvenile code revised ---hb 242Juvenile code revised ---hb 242
Juvenile code revised ---hb 242screaminc
 
Appealpowerpoint
AppealpowerpointAppealpowerpoint
Appealpowerpointscreaminc
 
Uniform juvenile court rules 01 22-13
Uniform juvenile court rules   01 22-13Uniform juvenile court rules   01 22-13
Uniform juvenile court rules 01 22-13screaminc
 
March 2015 appeal--s14a1703
March 2015 appeal--s14a1703March 2015 appeal--s14a1703
March 2015 appeal--s14a1703screaminc
 
How to file motion for new trial 07142015
How to file motion for new trial 07142015How to file motion for new trial 07142015
How to file motion for new trial 07142015screaminc
 
Narcissistic personality disorder and the dsm–v --miller widigercampbell20101
Narcissistic personality disorder and the dsm–v --miller widigercampbell20101Narcissistic personality disorder and the dsm–v --miller widigercampbell20101
Narcissistic personality disorder and the dsm–v --miller widigercampbell20101screaminc
 
Np v state_of_georgia_usa_statement_of_interest
Np v state_of_georgia_usa_statement_of_interestNp v state_of_georgia_usa_statement_of_interest
Np v state_of_georgia_usa_statement_of_interestscreaminc
 
Changes from dsm iv-tr to dsm-5
Changes from dsm iv-tr to dsm-5Changes from dsm iv-tr to dsm-5
Changes from dsm iv-tr to dsm-5screaminc
 
Cps 36 open records request
Cps 36 open records requestCps 36 open records request
Cps 36 open records requestscreaminc
 
Cps 198 i-screen out form-
Cps 198 i-screen out form-Cps 198 i-screen out form-
Cps 198 i-screen out form-screaminc
 
Appeal format
Appeal formatAppeal format
Appeal formatscreaminc
 
A reference manual for department of family and children services case managers
A reference manual for department of family and children services case managersA reference manual for department of family and children services case managers
A reference manual for department of family and children services case managersscreaminc
 

More from screaminc (20)

07052015 when the empirical base crumbles- the myth that open dependency proc...
07052015 when the empirical base crumbles- the myth that open dependency proc...07052015 when the empirical base crumbles- the myth that open dependency proc...
07052015 when the empirical base crumbles- the myth that open dependency proc...
 
Georgia court improvement project (cip)
Georgia court improvement project (cip)Georgia court improvement project (cip)
Georgia court improvement project (cip)
 
Juvenile justice delinquency prevention and treatment programs rfp (3)
Juvenile justice delinquency prevention and treatment programs rfp (3)Juvenile justice delinquency prevention and treatment programs rfp (3)
Juvenile justice delinquency prevention and treatment programs rfp (3)
 
Civil discovery (section 9 11-37)
Civil discovery (section 9 11-37)Civil discovery (section 9 11-37)
Civil discovery (section 9 11-37)
 
Amended+motion+for+new+trial+(pdf)
Amended+motion+for+new+trial+(pdf)Amended+motion+for+new+trial+(pdf)
Amended+motion+for+new+trial+(pdf)
 
Motion for new trial -clu 12-19_14_no_51_14
Motion for new trial -clu 12-19_14_no_51_14Motion for new trial -clu 12-19_14_no_51_14
Motion for new trial -clu 12-19_14_no_51_14
 
Amicus brief-draft-two
Amicus brief-draft-twoAmicus brief-draft-two
Amicus brief-draft-two
 
Appealpowerpoint by darice goode
Appealpowerpoint   by darice goodeAppealpowerpoint   by darice goode
Appealpowerpoint by darice goode
 
Juvenile code revised ---hb 242
Juvenile code revised ---hb 242Juvenile code revised ---hb 242
Juvenile code revised ---hb 242
 
Appealpowerpoint
AppealpowerpointAppealpowerpoint
Appealpowerpoint
 
Uniform juvenile court rules 01 22-13
Uniform juvenile court rules   01 22-13Uniform juvenile court rules   01 22-13
Uniform juvenile court rules 01 22-13
 
March 2015 appeal--s14a1703
March 2015 appeal--s14a1703March 2015 appeal--s14a1703
March 2015 appeal--s14a1703
 
How to file motion for new trial 07142015
How to file motion for new trial 07142015How to file motion for new trial 07142015
How to file motion for new trial 07142015
 
Narcissistic personality disorder and the dsm–v --miller widigercampbell20101
Narcissistic personality disorder and the dsm–v --miller widigercampbell20101Narcissistic personality disorder and the dsm–v --miller widigercampbell20101
Narcissistic personality disorder and the dsm–v --miller widigercampbell20101
 
Np v state_of_georgia_usa_statement_of_interest
Np v state_of_georgia_usa_statement_of_interestNp v state_of_georgia_usa_statement_of_interest
Np v state_of_georgia_usa_statement_of_interest
 
Changes from dsm iv-tr to dsm-5
Changes from dsm iv-tr to dsm-5Changes from dsm iv-tr to dsm-5
Changes from dsm iv-tr to dsm-5
 
Cps 36 open records request
Cps 36 open records requestCps 36 open records request
Cps 36 open records request
 
Cps 198 i-screen out form-
Cps 198 i-screen out form-Cps 198 i-screen out form-
Cps 198 i-screen out form-
 
Appeal format
Appeal formatAppeal format
Appeal format
 
A reference manual for department of family and children services case managers
A reference manual for department of family and children services case managersA reference manual for department of family and children services case managers
A reference manual for department of family and children services case managers
 

Recently uploaded

Russian Call Girls Kolkata Chhaya 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls Kolkata Chhaya 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls Kolkata Chhaya 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls Kolkata Chhaya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...anilsa9823
 
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...ranjana rawat
 
Call Girls Dubai Slut Wife O525547819 Call Girls Dubai Gaped
Call Girls Dubai Slut Wife O525547819 Call Girls Dubai GapedCall Girls Dubai Slut Wife O525547819 Call Girls Dubai Gaped
Call Girls Dubai Slut Wife O525547819 Call Girls Dubai Gapedkojalkojal131
 
Thane Escorts, (Pooja 09892124323), Thane Call Girls
Thane Escorts, (Pooja 09892124323), Thane Call GirlsThane Escorts, (Pooja 09892124323), Thane Call Girls
Thane Escorts, (Pooja 09892124323), Thane Call GirlsPooja Nehwal
 
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...Pooja Nehwal
 
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...Call Girls in Nagpur High Profile
 
如何办理萨省大学毕业证(UofS毕业证)成绩单留信学历认证原版一比一
如何办理萨省大学毕业证(UofS毕业证)成绩单留信学历认证原版一比一如何办理萨省大学毕业证(UofS毕业证)成绩单留信学历认证原版一比一
如何办理萨省大学毕业证(UofS毕业证)成绩单留信学历认证原版一比一ga6c6bdl
 
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)kojalkojal131
 
Alambagh Call Girl 9548273370 , Call Girls Service Lucknow
Alambagh Call Girl 9548273370 , Call Girls Service LucknowAlambagh Call Girl 9548273370 , Call Girls Service Lucknow
Alambagh Call Girl 9548273370 , Call Girls Service Lucknowmakika9823
 
VIP Call Girls Hitech City ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...
VIP Call Girls Hitech City ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...VIP Call Girls Hitech City ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...
VIP Call Girls Hitech City ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...Suhani Kapoor
 
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...ranjana rawat
 
Call Girls Service Kolkata Aishwarya 🤌 8250192130 🚀 Vip Call Girls Kolkata
Call Girls Service Kolkata Aishwarya 🤌  8250192130 🚀 Vip Call Girls KolkataCall Girls Service Kolkata Aishwarya 🤌  8250192130 🚀 Vip Call Girls Kolkata
Call Girls Service Kolkata Aishwarya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service - Bandra F...
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service -  Bandra F...WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service -  Bandra F...
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service - Bandra F...Pooja Nehwal
 
Russian Escorts in lucknow 💗 9719455033 💥 Lovely Lasses: Radiant Beauties Shi...
Russian Escorts in lucknow 💗 9719455033 💥 Lovely Lasses: Radiant Beauties Shi...Russian Escorts in lucknow 💗 9719455033 💥 Lovely Lasses: Radiant Beauties Shi...
Russian Escorts in lucknow 💗 9719455033 💥 Lovely Lasses: Radiant Beauties Shi...nagunakhan
 
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...Pooja Nehwal
 
Russian Call Girls In South Delhi Delhi 9711199012 💋✔💕😘 Independent Escorts D...
Russian Call Girls In South Delhi Delhi 9711199012 💋✔💕😘 Independent Escorts D...Russian Call Girls In South Delhi Delhi 9711199012 💋✔💕😘 Independent Escorts D...
Russian Call Girls In South Delhi Delhi 9711199012 💋✔💕😘 Independent Escorts D...nagunakhan
 
定制宾州州立大学毕业证(PSU毕业证) 成绩单留信学历认证原版一比一
定制宾州州立大学毕业证(PSU毕业证) 成绩单留信学历认证原版一比一定制宾州州立大学毕业证(PSU毕业证) 成绩单留信学历认证原版一比一
定制宾州州立大学毕业证(PSU毕业证) 成绩单留信学历认证原版一比一ga6c6bdl
 
Call Girls Delhi {Rohini} 9711199012 high profile service
Call Girls Delhi {Rohini} 9711199012 high profile serviceCall Girls Delhi {Rohini} 9711199012 high profile service
Call Girls Delhi {Rohini} 9711199012 high profile servicerehmti665
 

Recently uploaded (20)

Russian Call Girls Kolkata Chhaya 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls Kolkata Chhaya 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls Kolkata Chhaya 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls Kolkata Chhaya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
 
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...
 
Call Girls Dubai Slut Wife O525547819 Call Girls Dubai Gaped
Call Girls Dubai Slut Wife O525547819 Call Girls Dubai GapedCall Girls Dubai Slut Wife O525547819 Call Girls Dubai Gaped
Call Girls Dubai Slut Wife O525547819 Call Girls Dubai Gaped
 
Thane Escorts, (Pooja 09892124323), Thane Call Girls
Thane Escorts, (Pooja 09892124323), Thane Call GirlsThane Escorts, (Pooja 09892124323), Thane Call Girls
Thane Escorts, (Pooja 09892124323), Thane Call Girls
 
🔝 9953056974🔝 Delhi Call Girls in Ajmeri Gate
🔝 9953056974🔝 Delhi Call Girls in Ajmeri Gate🔝 9953056974🔝 Delhi Call Girls in Ajmeri Gate
🔝 9953056974🔝 Delhi Call Girls in Ajmeri Gate
 
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
 
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
 
如何办理萨省大学毕业证(UofS毕业证)成绩单留信学历认证原版一比一
如何办理萨省大学毕业证(UofS毕业证)成绩单留信学历认证原版一比一如何办理萨省大学毕业证(UofS毕业证)成绩单留信学历认证原版一比一
如何办理萨省大学毕业证(UofS毕业证)成绩单留信学历认证原版一比一
 
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
 
Alambagh Call Girl 9548273370 , Call Girls Service Lucknow
Alambagh Call Girl 9548273370 , Call Girls Service LucknowAlambagh Call Girl 9548273370 , Call Girls Service Lucknow
Alambagh Call Girl 9548273370 , Call Girls Service Lucknow
 
VIP Call Girls Hitech City ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...
VIP Call Girls Hitech City ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...VIP Call Girls Hitech City ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...
VIP Call Girls Hitech City ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...
 
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
 
Call Girls Service Kolkata Aishwarya 🤌 8250192130 🚀 Vip Call Girls Kolkata
Call Girls Service Kolkata Aishwarya 🤌  8250192130 🚀 Vip Call Girls KolkataCall Girls Service Kolkata Aishwarya 🤌  8250192130 🚀 Vip Call Girls Kolkata
Call Girls Service Kolkata Aishwarya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service - Bandra F...
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service -  Bandra F...WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service -  Bandra F...
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service - Bandra F...
 
Russian Escorts in lucknow 💗 9719455033 💥 Lovely Lasses: Radiant Beauties Shi...
Russian Escorts in lucknow 💗 9719455033 💥 Lovely Lasses: Radiant Beauties Shi...Russian Escorts in lucknow 💗 9719455033 💥 Lovely Lasses: Radiant Beauties Shi...
Russian Escorts in lucknow 💗 9719455033 💥 Lovely Lasses: Radiant Beauties Shi...
 
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
 
Russian Call Girls In South Delhi Delhi 9711199012 💋✔💕😘 Independent Escorts D...
Russian Call Girls In South Delhi Delhi 9711199012 💋✔💕😘 Independent Escorts D...Russian Call Girls In South Delhi Delhi 9711199012 💋✔💕😘 Independent Escorts D...
Russian Call Girls In South Delhi Delhi 9711199012 💋✔💕😘 Independent Escorts D...
 
定制宾州州立大学毕业证(PSU毕业证) 成绩单留信学历认证原版一比一
定制宾州州立大学毕业证(PSU毕业证) 成绩单留信学历认证原版一比一定制宾州州立大学毕业证(PSU毕业证) 成绩单留信学历认证原版一比一
定制宾州州立大学毕业证(PSU毕业证) 成绩单留信学历认证原版一比一
 
Call Girls Delhi {Rohini} 9711199012 high profile service
Call Girls Delhi {Rohini} 9711199012 high profile serviceCall Girls Delhi {Rohini} 9711199012 high profile service
Call Girls Delhi {Rohini} 9711199012 high profile service
 

Lec9chap8f04

  • 1. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 1 / 21 File: lec9chap8f04.doc General Items: ? Computer security ? Computer purchasing Reading Materials: ? Miscellaneous:
  • 2. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 2 / 21 File: lec9chap8f04.doc Type of software - System Software o programs controlling the operation of the computer and devices ?Operating system programs (platform) ?Utility programs - Application (perform a specific task) o Graphics, Multimedia, Web page designer, Communication software o Designed for a specific OS – some can be cross-platform Operating system (OS) - An OS is a set of programs that coordinate activities between computer hardware resources - Also called software platform - It typically resides in the hardware or ROM - Examples: Windows XP, Mac OS X - Operating System Starting Computer User Interface Managing Programs Configuring Devices Monitoring performance Controlling NetworkOS Functions
  • 3. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 3 / 21 File: lec9chap8f04.doc Basic idea - Not all computers need OS o hardware is fixed, same program is run at all times - Examples: Macintosh, Windows, Unix - Functions: o Manages hardware and software resources o Applications to deal with hardware - Four types: o Real time (very little user-interface capability and no end-user utilities) o Single user-single task (Palm OS - DOS) o Single user-multitask (Desktop) o Multi user (Networking) Computer booting (wakeup-call) - This is one of the basic OS functions - Bootstrap: a program that loads the OS into the RAM - Booting: Computer startup or restarting process o Cold booting or warm booting o Upon booting -> OS instructions are loaded in the RAM o o Kernel: Instructions managing memory and devices, application startups, maintains computer’s clock – Core or OS Operating System Programs: Memory resident (reside in RAM) Example: Kernel Nonresident (reside in hardware)
  • 4. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 4 / 21 File: lec9chap8f04.doc Starting a computer: - Power up - Processor reset, Finding the ROM BIOS chips o Basic Input/Output System (contains startup instructions) o Executes a series of tests to make sure all devices are operational (keyboard, monitor, internal busses, RAM chips, etc.) - BIOS performs the POST: Power-on self test o The result is compared with the information recorded in the CMOS chip o CMOS chip maintains the information about system configuration, memory, other devices o Finds new devices o Detects any device errors - BIOS starts searching for “system files” (drive A, C, CD, etc.) o .COM, .DRV, .DLL, .366, etc. o System files are loaded in the RAM - The KERNEL is loaded in the memory (the operating system takes over!) - The operating system loads the system configuration o System configuration information are in REGISTRY files - Files in the Startup Folder are executed User Interface Interacting with software through user interface - Command line (command language) - Graphical (GUI) – menu, Icons Managing programs - Single user/single tasking - Single user/multitasking o Foreground and background processing - Multi users
  • 5. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 5 / 21 File: lec9chap8f04.doc - Multi processing (supporting two or more processors) o Fault-tolerant computer (duplicated components) Memory Management - Used to optimize the use of RAM o How to distribute data, instructions, programs in different memory locations o Clearing unused memory locations - Virtual memory o Optimizing the RAM o Using hardware disk as additional RAM (called swap file) o Paging: technique of swapping items between memory and hard drive: Swap out (of RAM), Swap in (the RAM) o When paging time is too long -> more RAM is required (Thrashing) – not much execution is going on! Scheduling job - The operating system performs operations (jobs) based on some order - Serving disciplines: FCFS operations, Priority Operations - Buffering: Waiting for available resources - Spooling: o Buffering PRINT jobs (advantage?) o Jobs are QUEUED (stacked) o Print spooler: a program that places jobs in the queue Configuring devices Device drivers are used to communicate with different devices A device driver is a program: how the processor should communicate with a device – Print drivers (*.drv) Installing drivers Plug and play (computer recognizes the device)
  • 6. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 6 / 21 File: lec9chap8f04.doc Monitoring performance - Operating systems can monitor system performance - Uses a performance monitor program (resident or nonresident program?) - Includes: Disk usage, memory usage, processor activities, number of reads and writes to a file – provides a good way to measure your system resources (need more VM?) File management services - Include storage and file management functions - Includes: o Formatting and disk copying ?Formatting: Preparing a disk for reading and writing ?When a disk is formatted it looses all its information o Checking the available storage o Copy, renaming, deleting, moving, creating short cuts Controlling a network - Operating systems can be Network OS (NOS) - Connecting a server and several clients - Sharing resources / resource allocation
  • 7. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 7 / 21 File: lec9chap8f04.doc Types of operating systems DOS: - MS-DOS (Disk Operating System) 1980 - Used for personal computers - IBM Compatibles - Uses Command lines Windows 3.x: - DOS driven program with GUI interface (3.1, 3.11, etc.) - DOS-based OS with GUI operating environment - Not multitasking - Based on 16-bit processors Time DOS Win 3.x Win 95 NT Win 98 Win 2000 Millen XP Home XP Prof. Power/ Integration
  • 8. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 8 / 21 File: lec9chap8f04.doc Windows 95 - Multi tasking OS (not based on DOS) - Uses 32-bit processors - Used for Windows NT Windows Me - Upgrade to 98 - For home users - Optimized for digital photography and movies, audio, web design, home networking Windows XP - Home and professional editions - Movie Maker - Better file sharing - Fast startup - Better security
  • 9. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 9 / 21 File: lec9chap8f04.doc - Types of operating systems: - Stand- alone: Complete OS working on a desktop, notebook, etc. Examples: Window XP, Mac, Linux, UNIX - Network: Designed to support networks, typically reside on the server, - Embedded: Reside on a ROM chip – used for PDAs mobile devices, Examples: Windows CE, .NET, Windows Mobile
  • 10. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 10 / 21 File: lec9chap8f04.doc Type of software - Application (perform a specific task) o Graphics, Multimedia, Web page designer, Communication software - System Software o programs controlling the operation of the computer and devices ?Operating system programs ?Utility programs Utility Programs - A system software that typically manages a computer, its devices or its programs - Utility suites: collection of several utility programs - Examples of utility programs: Norton Utilities, McAfee - Basic utility files: o File viewer: View or copy files o File compression: Shrinks (Zips) the size of a file – PKZIP, PKUNZIP o Diagnostic utility: Compile information about the computer performance and devices - memory usage, processor utilization, etc. o Uninstaller: Utility that removes all the related files, typically embedded in the OS o Scanning files: Moves all unnecessary files, finds some physical and logical problems ?Physical problem: bad disk, scratched CD ?Logical problem: corrupted files
  • 11. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 11 / 21 File: lec9chap8f04.doc o Defragmenting: Organizing the files on the hard drive ?Fragmented file: a files scattered on different sectors on the HD ?Defragmenting: place files on continuous sectors o Backup utility: copy and backup your files ?Program restoration: accessing the backup files ?Using an Internet hard drive o Screen savers: ?Used to be critical to avoid permanent image “etching” on monitor’s screen ?Today mostly used for screen blocking ?Want some cool screen savers? http://www.free-search.com/ -
  • 12. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 12 / 21 File: lec9chap8f04.doc Who are computer hackers? - A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. - One who programs enthusiastically (even obsessively) - A person capable of appreciating hack value. - A person who is good at programming quickly. - An expert at a particular program, or one who frequently does work using it or on it. Basic hacking operations - Piracy (copying and using commercial software purchased by someone else) - Sniffing gather information regarding the status of components of a network system - Attackers (forcing to teardown the system) - And more… Cute hacking - Play with the hidden files - Change system files (boot-up logos) Hacking software - Password stealer (AOL password, windows, etc.) - Sniffers - Cracking tools - Spy tools (monitor all key strokes, and other computer activities)
  • 13. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 13 / 21 File: lec9chap8f04.doc Why do we need computer security? - Thanks to Internet a huge amount of personal information are being exchanged on the net - Credit-card information - Social Security numbers - Private correspondence - Personal details - Sensitive company information - Bank-account information Basic security operations - Encryption - Authentication Encryption - Definition: Encoding the contents of the message in such a way that hides its contents from outsiders - Goes back to the Roman Empire. - Without a computer it is easy to break (crack) the code! - Check the LOCK in your web page! - Also used in cell phones and cordless phones - The encrypted message is called the ciphertext. - The process of retrieving the plaintext from the ciphertext is called decryption. - Encryption and decryption usually make use of a key - Cryptanalysis is the art of breaking ciphers, i.e. retrieving the plaintext without knowing the proper key - One popular way is to have a Public-key (PGP) - The key is based on a HASH value
  • 14. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 14 / 21 File: lec9chap8f04.doc Authentication - Password - Password card - Digital signature - Biometric o Face scan o Retina check o Finger print o Voice identification
  • 15. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 15 / 21 File: lec9chap8f04.doc Purchasing a computer - Computer category o Desktop o Laptop o Supercomputer o Internet application - Basic Component o CD/DVD – 24/48 X (150 KBps) / 650MB & 4.7 GB o Modems – 56Kbps o Network cards - Supporting DSL o Printer – Ink jet; Laser o Monitor – LCD, CRT; 17,19,21 inches; o Processor – Intel; ADM 2.2 GHz o RAM – 256; 516 MB o Internet connection – Subscription to ISP, OSP - Purchasing a laptop o Screen size o Processor o Hard drive size o Wireless card o Available software o Weight o Memory – RAM o Disk drive / CD-RW o Warranty o Built-in cam o Backup hard drive
  • 16. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 16 / 21 File: lec9chap8f04.doc - Purchasing online o http://www.dell.com o Configure your own PC: ? http://www.mypcgoodies.com ?http://www.directpc.ca/index.jsp o Search for "computer auction" ?http://www.dellauction.com/ o search through eBay: www.ebay.com ?Search for computer, laptop ?You can BID on different items! o Always check the price online! o Check your computer configuration: http://www.pny.com/configurator/config.asp
  • 17. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 17 / 21 File: lec9chap8f04.doc Learn more about computers: PC MAC Reviews/Guides www.shopper.cnet.com www.store.apple.com www.shopper.cnet.com www.hp.com www.clubmac.com www.pcworld.com www.compusa.com www.macx.com www.byte.com www.dartek.com www.apple.com www.zdnet.com/review www.dell.com www.eshop.msn.com www.gateway.com www.macworld.com www.micron.com www.global.acer.com www.fujitsu.com www.sony.com - Warranty? o How expensive is it? o How many years? o One time? o Covers the screen o Buy back programs! Nothing short of hoax!
  • 18. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 18 / 21 File: lec9chap8f04.doc - So what do you use the computer for? o School (work processing and simple projects) ?Anything works! o Mostly games ?Lots of memory and fast processor ?Good monitor ?Joysticks, etc. o Internet / browsing / emailing ?Good connection o Advance applications (programming) ?Lots of memory and fast processor o Multimedia (digital photography) ?Lots of memory and fast processor ?Good Sound card - Creative Sound Blaster Audigy 2 ZS Good ?Video card - Quadro4 3000 FX, 256 MB, AGP 8x ? 3-D display capacity - Processor types o Pentium o ADM Athlon XP o Celeron - Operating system o Windows o Mac o Unix - Capability o RAM size o Processor speed o CD ROM/DVD/ CD Write (CDRW) o Video Card o Cache o Modem / drivers
  • 19. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 19 / 21 File: lec9chap8f04.doc - Software o Office o Acrobat products o Games o Some are just free! - Accessories o Printer o Scanner o Digital camera - Smart shoppers o Return policies o Hidden costs Check several places and compare prices!
  • 20. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 20 / 21 File: lec9chap8f04.doc Quiz Name two types of system software programs. Name three examples of operating systems. What is Virtual Memory? – Where is it? What is booting? How many types of booting we have? What is Plug and Play?
  • 21. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 21 / 21 File: lec9chap8f04.doc Quiz Name two types of system software programs. What is Encryption? Why do we COMPRESS files? Name three examples of operating systems.