SlideShare a Scribd company logo
Information & Communication
Technology (ICT)
Introduction To Computer Hardware
DIT Part 1
Lecture 6
Copyrights By Tanveer Malik
Operating System (OS)
• A collection of software modules to assist
programmers in enhancing system efficiency,
flexibility, and robustness.
• An Extended Machine from
the users’ viewpoint.
• A Resource Manager from the
system’s viewpoint.
Copyrights By Tanveer Malik
The Three Elements of an OS
• User Interface : The part of the OS that you
interface with.
• Kernel : The core of the OS. Interacts with the
BIOS (at one end), and the UI (at the
other end).
• File Management System : Organizes and
manages files.
Copyrights By Tanveer Malik
Operating System Functions
• File Management
• Application Management
• Built-in Utility Programs
• Control of Computer Hardware
Copyrights By Tanveer Malik
Operating System Types
• Multiuser – Two or more users work with the
computer at the same time
• Multitasking – Two or more processes running
at the same time.
• Multithreading – Two or more parts of the
same process running at the same time.
Copyrights By Tanveer Malik
PC Operating Systems
• Microsoft Windows
• Mac OS
• Linux
Copyrights By Tanveer Malik
MS Windows Versions
• Home (Non-Professional) Versions
– Windows 95
– Windows 98
– Windows Me
• Professional (Business) Versions
– Windows NT
– Windows 2000
• The Two Lines Came Together in Windows
XP (2001)
Copyrights By Tanveer Malik
Disk Operating System
( DOS )
• The first PC Operating System (1981)
• Not a Multitasking OS, only one program could run at a
time
• A command-line interface, no GUI.
• Early versions of Windows sat on top of DOS and used it
to communicate with the BIOS.
• Windows XP communicates directly with the BIOS, but
allows commands to be entered via a command prompt.
Copyrights By Tanveer Malik
File System
• A file is a collection of bytes of information
treated as a single unit.
• It is given a name to make it easy to find and
use later.
• The file system keeps track of where a file is
actually resident on a disk.
• A disk (hard disk, floppy, optical disk) is
subdivided into directories or folders.
Copyrights By Tanveer Malik
File System (continued)
• The top level folder on a disk is known as the
root.
• The root is generally subdivided into
subfolders.
• Any folder or subfolder can contain files and
other folders.
• The fully-qualified filename includes the name
of the file and the path to the folder in which
it resides:
c:courses061cit141chapter4.ppt
Copyrights By Tanveer Malik
Windows Registered File Types
• A particular file extension can be registered and
associated with a particular program.
– .docx files are associated with MS Word
– .xlsx files are associated with MS Excel
– .txt files are associated with Notepad
– .html files are associated with IE
• This is how Windows knows what to do when you
double-click a file in My Computer.
Copyrights By Tanveer Malik
File Attributes
• Each file has four attributes which can be
viewed or set.
– Read Only – File may be viewed, copied, executed
(if appropriate), but not changed. It can be
deleted.
– Hidden – File will not be displayed in normal list of
files.
– System – File is identified to belong to system,
should not be messed with.
– Archive – File is (or is not) a candidate for backup.
Copyrights By Tanveer Malik
Assignment
– .
Lecture 6

More Related Content

What's hot

Operating Systems 1 (3/12) - Architectures
Operating Systems 1 (3/12) - ArchitecturesOperating Systems 1 (3/12) - Architectures
Operating Systems 1 (3/12) - Architectures
Peter Tröger
 
Code4vn course intro linux day1
Code4vn course intro linux day1Code4vn course intro linux day1
Code4vn course intro linux day1
Cường Nguyễn
 
Presentación de computación
Presentación de computaciónPresentación de computación
Presentación de computación
vasomozu56
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
IES Aramo
 
System protection in Operating System
System protection in Operating SystemSystem protection in Operating System
System protection in Operating System
sohaildanish
 
Chapter 14 - Protection
Chapter 14 - ProtectionChapter 14 - Protection
Chapter 14 - Protection
Wayne Jones Jnr
 
Windows V/S Linux OS - Comparison
Windows V/S Linux OS - ComparisonWindows V/S Linux OS - Comparison
Windows V/S Linux OS - Comparison
Hariharan Ganesan
 
Linux Advantages and Disadvantages
Linux Advantages and DisadvantagesLinux Advantages and Disadvantages
Linux Advantages and Disadvantages
SHUBHA CHATURVEDI
 
Windows Architecture Explained by Stacksol
Windows Architecture Explained by StacksolWindows Architecture Explained by Stacksol
Windows Architecture Explained by Stacksol
Stacksol
 
Presentation on o s for bca iv
Presentation on o s for bca ivPresentation on o s for bca iv
Presentation on o s for bca iv
Ajit Singh
 
Operating systems
Operating systemsOperating systems
Operating systems
7867867861
 
fundamentals of information technology
fundamentals of information technologyfundamentals of information technology
fundamentals of information technology
SoundaryaB2
 
Neww
NewwNeww
Operating Systems
Operating SystemsOperating Systems
Operating Systems
Mohamed Loey
 
Operating system
Operating systemOperating system
Operating system
Ashit_24
 
System components of windows xp
System components of windows xpSystem components of windows xp
System components of windows xpMohd Tousif
 
Operating Systems (OS)
Operating Systems (OS)Operating Systems (OS)
Operating Systems (OS)
educemilywesling
 

What's hot (20)

Operating Systems 1 (3/12) - Architectures
Operating Systems 1 (3/12) - ArchitecturesOperating Systems 1 (3/12) - Architectures
Operating Systems 1 (3/12) - Architectures
 
Code4vn course intro linux day1
Code4vn course intro linux day1Code4vn course intro linux day1
Code4vn course intro linux day1
 
K04 software
K04 softwareK04 software
K04 software
 
Presentación de computación
Presentación de computaciónPresentación de computación
Presentación de computación
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
 
System protection in Operating System
System protection in Operating SystemSystem protection in Operating System
System protection in Operating System
 
Chapter 14 - Protection
Chapter 14 - ProtectionChapter 14 - Protection
Chapter 14 - Protection
 
Windows V/S Linux OS - Comparison
Windows V/S Linux OS - ComparisonWindows V/S Linux OS - Comparison
Windows V/S Linux OS - Comparison
 
Linux Advantages and Disadvantages
Linux Advantages and DisadvantagesLinux Advantages and Disadvantages
Linux Advantages and Disadvantages
 
OSCh21
OSCh21OSCh21
OSCh21
 
Windows Architecture Explained by Stacksol
Windows Architecture Explained by StacksolWindows Architecture Explained by Stacksol
Windows Architecture Explained by Stacksol
 
Presentation on o s for bca iv
Presentation on o s for bca ivPresentation on o s for bca iv
Presentation on o s for bca iv
 
Operating systems
Operating systemsOperating systems
Operating systems
 
fundamentals of information technology
fundamentals of information technologyfundamentals of information technology
fundamentals of information technology
 
Neww
NewwNeww
Neww
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
 
Operating system
Operating systemOperating system
Operating system
 
Network operating system
Network operating systemNetwork operating system
Network operating system
 
System components of windows xp
System components of windows xpSystem components of windows xp
System components of windows xp
 
Operating Systems (OS)
Operating Systems (OS)Operating Systems (OS)
Operating Systems (OS)
 

Similar to Lecture 6

Poking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And ProfitPoking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And Profit
ssusera432ea1
 
operating system ondesktop computer ( laptop)
operating system ondesktop  computer ( laptop)operating system ondesktop  computer ( laptop)
operating system ondesktop computer ( laptop)
BandaruGowtham1
 
File Management & Access Control
File Management & Access Control File Management & Access Control
File Management & Access Control
YuvrajWadavale
 
UNIT I.pptx
UNIT I.pptxUNIT I.pptx
UNIT I.pptx
YogapriyaJ1
 
System calls in OS.pptx
System calls in OS.pptxSystem calls in OS.pptx
System calls in OS.pptx
DivyaKS18
 
unit1 part1.ppt
unit1 part1.pptunit1 part1.ppt
unit1 part1.ppt
suresh554942
 
UNIT III.pptx
UNIT III.pptxUNIT III.pptx
UNIT III.pptx
YogapriyaJ1
 
File management in OS
File management in OSFile management in OS
File management in OS
Bhavik Vashi
 
How to Audit Linux - Gene Kartavtsev, ISACA MN
How to Audit Linux - Gene Kartavtsev, ISACA MNHow to Audit Linux - Gene Kartavtsev, ISACA MN
How to Audit Linux - Gene Kartavtsev, ISACA MN
Gene Kartavtsev
 
11. operating-systems-part-1
11. operating-systems-part-111. operating-systems-part-1
11. operating-systems-part-1
Muhammad Ahad
 
Chapter one_oS.ppt
Chapter one_oS.pptChapter one_oS.ppt
Chapter one_oS.ppt
miki304759
 
System software
System softwareSystem software
System software
Bushra M
 
ITFT_File system interface in Operating System
ITFT_File system interface in Operating SystemITFT_File system interface in Operating System
ITFT_File system interface in Operating System
Sneh Prabha
 
Concepts of Malicious Windows Programs
Concepts of Malicious Windows ProgramsConcepts of Malicious Windows Programs
Concepts of Malicious Windows ProgramsNatraj G
 
unixoperatingsystem-130327073532-phpapp01.pdf
unixoperatingsystem-130327073532-phpapp01.pdfunixoperatingsystem-130327073532-phpapp01.pdf
unixoperatingsystem-130327073532-phpapp01.pdf
IxtiyorTeshaboyev
 
Computer Software | Lecture 4D
Computer Software | Lecture 4DComputer Software | Lecture 4D
Computer Software | Lecture 4D
CMDLMS
 
Computer Software - Lecture D
Computer Software - Lecture DComputer Software - Lecture D
Computer Software - Lecture D
CMDLearning
 
Operating system and installation
Operating system and  installationOperating system and  installation
Operating system and installation
IshworKhatiwada
 
Unix Tutorial & overview
Unix Tutorial & overviewUnix Tutorial & overview
Unix Tutorial & overview
QA TrainingHub
 
UNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptx
UNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptxUNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptx
UNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptx
LeahRachael
 

Similar to Lecture 6 (20)

Poking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And ProfitPoking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And Profit
 
operating system ondesktop computer ( laptop)
operating system ondesktop  computer ( laptop)operating system ondesktop  computer ( laptop)
operating system ondesktop computer ( laptop)
 
File Management & Access Control
File Management & Access Control File Management & Access Control
File Management & Access Control
 
UNIT I.pptx
UNIT I.pptxUNIT I.pptx
UNIT I.pptx
 
System calls in OS.pptx
System calls in OS.pptxSystem calls in OS.pptx
System calls in OS.pptx
 
unit1 part1.ppt
unit1 part1.pptunit1 part1.ppt
unit1 part1.ppt
 
UNIT III.pptx
UNIT III.pptxUNIT III.pptx
UNIT III.pptx
 
File management in OS
File management in OSFile management in OS
File management in OS
 
How to Audit Linux - Gene Kartavtsev, ISACA MN
How to Audit Linux - Gene Kartavtsev, ISACA MNHow to Audit Linux - Gene Kartavtsev, ISACA MN
How to Audit Linux - Gene Kartavtsev, ISACA MN
 
11. operating-systems-part-1
11. operating-systems-part-111. operating-systems-part-1
11. operating-systems-part-1
 
Chapter one_oS.ppt
Chapter one_oS.pptChapter one_oS.ppt
Chapter one_oS.ppt
 
System software
System softwareSystem software
System software
 
ITFT_File system interface in Operating System
ITFT_File system interface in Operating SystemITFT_File system interface in Operating System
ITFT_File system interface in Operating System
 
Concepts of Malicious Windows Programs
Concepts of Malicious Windows ProgramsConcepts of Malicious Windows Programs
Concepts of Malicious Windows Programs
 
unixoperatingsystem-130327073532-phpapp01.pdf
unixoperatingsystem-130327073532-phpapp01.pdfunixoperatingsystem-130327073532-phpapp01.pdf
unixoperatingsystem-130327073532-phpapp01.pdf
 
Computer Software | Lecture 4D
Computer Software | Lecture 4DComputer Software | Lecture 4D
Computer Software | Lecture 4D
 
Computer Software - Lecture D
Computer Software - Lecture DComputer Software - Lecture D
Computer Software - Lecture D
 
Operating system and installation
Operating system and  installationOperating system and  installation
Operating system and installation
 
Unix Tutorial & overview
Unix Tutorial & overviewUnix Tutorial & overview
Unix Tutorial & overview
 
UNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptx
UNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptxUNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptx
UNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptx
 

More from Tanveer Malik

Lecture 12 security policy
Lecture 12 security policyLecture 12 security policy
Lecture 12 security policy
Tanveer Malik
 
Lecture 11 active directory
Lecture 11 active directoryLecture 11 active directory
Lecture 11 active directory
Tanveer Malik
 
Lecture 10 i pv4 & ipv6
Lecture 10 i pv4 & ipv6Lecture 10 i pv4 & ipv6
Lecture 10 i pv4 & ipv6
Tanveer Malik
 
Lecture 8 disk management
Lecture 8 disk managementLecture 8 disk management
Lecture 8 disk management
Tanveer Malik
 
Lecture 6 internet services in network
Lecture 6 internet services in networkLecture 6 internet services in network
Lecture 6 internet services in network
Tanveer Malik
 
Lecture 5 software to control network
Lecture 5 software to control networkLecture 5 software to control network
Lecture 5 software to control network
Tanveer Malik
 
Lecture 4 sharing of resources on network
Lecture 4 sharing of resources on networkLecture 4 sharing of resources on network
Lecture 4 sharing of resources on network
Tanveer Malik
 
Lecture 3 transmission media
Lecture 3 transmission mediaLecture 3 transmission media
Lecture 3 transmission media
Tanveer Malik
 
Lecture 2 protocol details
Lecture 2 protocol detailsLecture 2 protocol details
Lecture 2 protocol details
Tanveer Malik
 
Lecture 1 networking types roles
Lecture 1 networking types rolesLecture 1 networking types roles
Lecture 1 networking types roles
Tanveer Malik
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
Tanveer Malik
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
Tanveer Malik
 
Lecture 10
Lecture 10Lecture 10
Lecture 10
Tanveer Malik
 
Lecture 9
Lecture 9Lecture 9
Lecture 9
Tanveer Malik
 
Lecture 8
Lecture 8Lecture 8
Lecture 8
Tanveer Malik
 
Lecture 7
Lecture 7Lecture 7
Lecture 7
Tanveer Malik
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
Tanveer Malik
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
Tanveer Malik
 
Lecture 4
Lecture 4Lecture 4
Lecture 4
Tanveer Malik
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
Tanveer Malik
 

More from Tanveer Malik (20)

Lecture 12 security policy
Lecture 12 security policyLecture 12 security policy
Lecture 12 security policy
 
Lecture 11 active directory
Lecture 11 active directoryLecture 11 active directory
Lecture 11 active directory
 
Lecture 10 i pv4 & ipv6
Lecture 10 i pv4 & ipv6Lecture 10 i pv4 & ipv6
Lecture 10 i pv4 & ipv6
 
Lecture 8 disk management
Lecture 8 disk managementLecture 8 disk management
Lecture 8 disk management
 
Lecture 6 internet services in network
Lecture 6 internet services in networkLecture 6 internet services in network
Lecture 6 internet services in network
 
Lecture 5 software to control network
Lecture 5 software to control networkLecture 5 software to control network
Lecture 5 software to control network
 
Lecture 4 sharing of resources on network
Lecture 4 sharing of resources on networkLecture 4 sharing of resources on network
Lecture 4 sharing of resources on network
 
Lecture 3 transmission media
Lecture 3 transmission mediaLecture 3 transmission media
Lecture 3 transmission media
 
Lecture 2 protocol details
Lecture 2 protocol detailsLecture 2 protocol details
Lecture 2 protocol details
 
Lecture 1 networking types roles
Lecture 1 networking types rolesLecture 1 networking types roles
Lecture 1 networking types roles
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Lecture 10
Lecture 10Lecture 10
Lecture 10
 
Lecture 9
Lecture 9Lecture 9
Lecture 9
 
Lecture 8
Lecture 8Lecture 8
Lecture 8
 
Lecture 7
Lecture 7Lecture 7
Lecture 7
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Lecture 4
Lecture 4Lecture 4
Lecture 4
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
 

Recently uploaded

Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 

Recently uploaded (20)

Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 

Lecture 6

  • 1. Information & Communication Technology (ICT) Introduction To Computer Hardware DIT Part 1 Lecture 6 Copyrights By Tanveer Malik
  • 2. Operating System (OS) • A collection of software modules to assist programmers in enhancing system efficiency, flexibility, and robustness. • An Extended Machine from the users’ viewpoint. • A Resource Manager from the system’s viewpoint. Copyrights By Tanveer Malik
  • 3. The Three Elements of an OS • User Interface : The part of the OS that you interface with. • Kernel : The core of the OS. Interacts with the BIOS (at one end), and the UI (at the other end). • File Management System : Organizes and manages files. Copyrights By Tanveer Malik
  • 4. Operating System Functions • File Management • Application Management • Built-in Utility Programs • Control of Computer Hardware Copyrights By Tanveer Malik
  • 5. Operating System Types • Multiuser – Two or more users work with the computer at the same time • Multitasking – Two or more processes running at the same time. • Multithreading – Two or more parts of the same process running at the same time. Copyrights By Tanveer Malik
  • 6. PC Operating Systems • Microsoft Windows • Mac OS • Linux Copyrights By Tanveer Malik
  • 7. MS Windows Versions • Home (Non-Professional) Versions – Windows 95 – Windows 98 – Windows Me • Professional (Business) Versions – Windows NT – Windows 2000 • The Two Lines Came Together in Windows XP (2001) Copyrights By Tanveer Malik
  • 8. Disk Operating System ( DOS ) • The first PC Operating System (1981) • Not a Multitasking OS, only one program could run at a time • A command-line interface, no GUI. • Early versions of Windows sat on top of DOS and used it to communicate with the BIOS. • Windows XP communicates directly with the BIOS, but allows commands to be entered via a command prompt. Copyrights By Tanveer Malik
  • 9. File System • A file is a collection of bytes of information treated as a single unit. • It is given a name to make it easy to find and use later. • The file system keeps track of where a file is actually resident on a disk. • A disk (hard disk, floppy, optical disk) is subdivided into directories or folders. Copyrights By Tanveer Malik
  • 10. File System (continued) • The top level folder on a disk is known as the root. • The root is generally subdivided into subfolders. • Any folder or subfolder can contain files and other folders. • The fully-qualified filename includes the name of the file and the path to the folder in which it resides: c:courses061cit141chapter4.ppt Copyrights By Tanveer Malik
  • 11. Windows Registered File Types • A particular file extension can be registered and associated with a particular program. – .docx files are associated with MS Word – .xlsx files are associated with MS Excel – .txt files are associated with Notepad – .html files are associated with IE • This is how Windows knows what to do when you double-click a file in My Computer. Copyrights By Tanveer Malik
  • 12. File Attributes • Each file has four attributes which can be viewed or set. – Read Only – File may be viewed, copied, executed (if appropriate), but not changed. It can be deleted. – Hidden – File will not be displayed in normal list of files. – System – File is identified to belong to system, should not be messed with. – Archive – File is (or is not) a candidate for backup. Copyrights By Tanveer Malik