SlideShare a Scribd company logo
K.HIMABINDU., M. Tech
K.HIMABINDU., M. Tech
OBJECTIVES
1. Assist the user to use the computer system CONVENIENTLY.
2. Enable the user to use the computer system and window EFFICIENTLY.
3. Assign the processors for performing tasks.
4. Allocate memory, managing memory and other storage areas.
5. Apply various command interpretations.
6. Schedule various jobs/tasks.
7. Establish priorities for different jobs.
8. Coordinate and manage peripherals devices.
9. Know input and out management.
10.Establish data security an integrity.
K.HIMABINDU., M. Tech
K.HIMABINDU., M. Tech
K.HIMABINDU., M. Tech
K.HIMABINDU., M. Tech
Definition of Operating System
• An operating system is a set of program files which controls the resources of the
computer system and allows the communication of hardware components of a
computer to the software components of the computer system. Operating systems
provides access to computer services which is possible only via working of both
the hardware components and the software components.
• User can interact with the operating system through Command Line Interface
(CLI) OR Graphical User Interface (GUI).
• Examples : CLI - DOS
GUI-Windows
K.HIMABINDU., M. Tech
Characteristics of OS
1. Single tasking or Multitasking
2. Single threading or Multithreading
3. Character based or Graphic user interface
4. Weak or Strong Security
5. 8,16,32 and 64 bits processed at a time
6. Portable and Non-portable Operating system
7. Proprietary and open operating systems
K.HIMABINDU., M. Tech
K.HIMABINDU., M. Tech
TYPES OF
Single User
Multi User
Multi Programming
Multi Process
Time Sharing
Real Time / On line
Batch Processing
K.HIMABINDU., M. Tech
K.HIMABINDU., M. Tech
Disk Operating System (DOS) is OS software which loads into computer memory and
performs tasks, manages secondary storages devices and maintains information on the
disk devices.
DOS is the first operating system which is used widely in personal computers. First version
of DOS called PC-DOS was developed for IBM by bill gates of Microsoft Corporation. Bill
gates retained rights for marketing a Microsoft version of DOS called MS –DOS.
DOS is a command line operating system and prompts user to enter commands. DOS is a
16-bit operating system and does not support multi users and multitasking.
K.HIMABINDU., M. Tech
Purpose:
Each time the computer boots up, DOS searches for a configuration system file and it uses the commands to configure the
system. DOS uses the commands in auto execution bat to further refine the way it starts the computer system. If the auto
execution boot is not set, the machine will be in default mode. This file is used to run programs automatically on start up. The
operating system causes all the commands in this file executed before the start up is completed. It coordinates the flow of
information between computer the disk, floppy or hard disk.
K.HIMABINDU., M. Tech
Types of Commands in MS DOS
1. Internal Commands (Loaded into PRIMARY Memory)
1.Dir – The command list out
all the directories.
a) Dir/p – To get directories
page wise
b) Dir/w- Width wise
c) Dir[drive]- To list out the
directories of another
directory.
d) Dir*.<extension>
e) Dir*.* - current directory
f) Dir com???.*
g) Dir/s – sub directories
2.MD Or MKDIR
3.CD<Directory Name>
4.RD<SUB-DIRECTORY NAME>
5.CD..
6. COPY<source
filename><destination file
name>
7.COPY CON<FILE NAME>
8. REN<Existing file
name><new file name>
9.DEL<file name>
10. PATH
11.PROMPT
12. VER
13. VOL
14. CLS
15. DATE
16. TIME
17. TYPE
K.HIMABINDU., M. Tech
Types of Commands in MS DOS
2. External Commands (Do not need to be loaded into MEMORY)
1.BACKUP C:
2.RESORE A:C:
3. ATTRIB<FILE Name>[+h] or [-h] or [+r] or [-r]
4.CHKDSK C
5.DISKCOPY A:B:
6.COMP A:B.COMI C:B.COM
7.DISKCOMP A:B:
8.FORMAT A:
9. PRINT<FILE NAME>
10. RECOVER<FILENAME>
11.REPLACE A:/*.*C:/STUDENTS
12. LABEL A:STUD
13. EDIT<FILE NAME>
14. FIND’’marks’’*.txt
K.HIMABINDU., M. Tech
WILDCARD CHARACTERS
A wildcard character is a special character or symbol that represents one or more other
characters. The most commonly used wildcard characters are the asterisk(*), which typically
represents zero or more characters in a string of characters, and the question mark(?), which
typically represents anyone character.
1.To find a directory by using ‘*’ - C:>dir BCOM*
2. To delete a file by using ‘*’ - C:>DEL *TXT
3.To find a file by using ‘?’ - C:>dir? BCOM
4. To delete a file or directory by using ‘?’ - C:>DEL ? Doc
K.HIMABINDU., M. Tech
A Computer Virus is a compute program that can copies itself and spread from one computer to another.
A computer virus is “a computer program usually hidden within another program that produces copies of itself and inserts
them into other programs or files, and then destroys data”.
Computer viruses are never naturally occurring; they are always man made. Once created and released, however, their
spread is not directly under human control.
Computer Virus
K.HIMABINDU., M. Tech
Symptoms of a Computer Virus
1. The computer runs slower
than usual.
2. The computer stops
responding or it locks up
frequently.
3. The computer crashes, and
then it restarts every few
minutes.
4. The compute restarts on its
own. Additionally, the
computer does not run as
usual.
5. Applications on the
computer do not work
correctly.
1. Disks or Disk drives are
inaccessible.
2. You cannot print items
correctly.
3. You see unusual error
messages.
4. You see distorted menus and
dialog boxes.
5. A program disappears from
the computer even though
you did not intentionally
remove the program
K.HIMABINDU., M. Tech
K.HIMABINDU., M. Tech
Different
Types of
ANTIVIRUS
K.HIMABINDU., M. Tech
Windows1.01, 1.02, 1.03, 1.04
Windows 2.03,2.10,2.11
Windows 3.0,3.1,NT 3.1,3.2, NT
3.5,3.51
Windows 95
Windows NT 4.0
Windows 98
Windows2000
Windows ME
Windows XP
Windows XP Professional X64
Windows Vista
Windows 7
Windows 8
Windows 8.1
Windows 10
Microsoft windows client versions.
K.HIMABINDU., M. Tech
Microsoft
windows
server
versions.
K.HIMABINDU., M. Tech
K.HIMABINDU., M. Tech
Icons in
windows
desktop
Application
Window
Document
Window
K.HIMABINDU., M. Tech
Basic Components of a Window
K.HIMABINDU., M. Tech
Window menu
K.HIMABINDU., M. Tech
CONTROL PANEL
K.HIMABINDU., M. Tech
K.HIMABINDU., M. Tech

More Related Content

What's hot

Storage devices
Storage devicesStorage devices
Storage devices
rabail asghar
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
Damian T. Gordon
 
Input output and storage devices activity
Input output and storage devices activityInput output and storage devices activity
Input output and storage devices activityshidabahri
 
Processing Devices
Processing DevicesProcessing Devices
Processing Devices
itsvineeth209
 
Computer operation
Computer operationComputer operation
Computer operation
Munim Chaudhry
 
Operating systems
Operating systems Operating systems
Operating systems
vinothinisureshbabu
 
Basic of computer
Basic of computerBasic of computer
Basic of computer
Mŕ ƛwešome
 
Basic Computer Concepts
Basic Computer ConceptsBasic Computer Concepts
Basic Computer Concepts
JOANA MARIE DIESTA
 
Fundamentals of operating system
Fundamentals of operating systemFundamentals of operating system
Fundamentals of operating system
Jayesh Chauhan
 
Bios ( Basic Input Output System )
Bios ( Basic Input Output System )Bios ( Basic Input Output System )
Bios ( Basic Input Output System )
Jesthine Nesshal
 
Basic dos-commands
Basic dos-commandsBasic dos-commands
Basic dos-commands
parag dhok
 
How to install windows 10
How to install windows 10How to install windows 10
How to install windows 10
Annu Ahmed
 
Powerpoint on Software Concept (ClassXI)
Powerpoint on Software Concept (ClassXI)Powerpoint on Software Concept (ClassXI)
Powerpoint on Software Concept (ClassXI)
Fernando Torres
 
Disk Management
Disk ManagementDisk Management
Disk Management
Anjali Negi
 
Operating Systems - File Management
Operating Systems -  File ManagementOperating Systems -  File Management
Operating Systems - File Management
Damian T. Gordon
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
Mukesh Chinta
 
Machine language
Machine languageMachine language
Machine language
鍾誠 陳鍾誠
 
Basic Parts of a Desktop
Basic Parts of a DesktopBasic Parts of a Desktop
Basic Parts of a Desktop
Queenie Elumbaring
 
Operating Systems Basics
Operating Systems BasicsOperating Systems Basics
Operating Systems Basics
nishantsri
 

What's hot (20)

Storage devices
Storage devicesStorage devices
Storage devices
 
Application software
Application softwareApplication software
Application software
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
Input output and storage devices activity
Input output and storage devices activityInput output and storage devices activity
Input output and storage devices activity
 
Processing Devices
Processing DevicesProcessing Devices
Processing Devices
 
Computer operation
Computer operationComputer operation
Computer operation
 
Operating systems
Operating systems Operating systems
Operating systems
 
Basic of computer
Basic of computerBasic of computer
Basic of computer
 
Basic Computer Concepts
Basic Computer ConceptsBasic Computer Concepts
Basic Computer Concepts
 
Fundamentals of operating system
Fundamentals of operating systemFundamentals of operating system
Fundamentals of operating system
 
Bios ( Basic Input Output System )
Bios ( Basic Input Output System )Bios ( Basic Input Output System )
Bios ( Basic Input Output System )
 
Basic dos-commands
Basic dos-commandsBasic dos-commands
Basic dos-commands
 
How to install windows 10
How to install windows 10How to install windows 10
How to install windows 10
 
Powerpoint on Software Concept (ClassXI)
Powerpoint on Software Concept (ClassXI)Powerpoint on Software Concept (ClassXI)
Powerpoint on Software Concept (ClassXI)
 
Disk Management
Disk ManagementDisk Management
Disk Management
 
Operating Systems - File Management
Operating Systems -  File ManagementOperating Systems -  File Management
Operating Systems - File Management
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
Machine language
Machine languageMachine language
Machine language
 
Basic Parts of a Desktop
Basic Parts of a DesktopBasic Parts of a Desktop
Basic Parts of a Desktop
 
Operating Systems Basics
Operating Systems BasicsOperating Systems Basics
Operating Systems Basics
 

Similar to Operating system

Operating system of computer
Operating system of computerOperating system of computer
Operating system of computer
HamzaAbbas43
 
Operating System
Operating SystemOperating System
Operating SystemSyahida
 
Operating system
Operating systemOperating system
Operating system
Tanvirul Islam
 
Operating system
Operating systemOperating system
Operating system
covapretic
 
Topic # 10 of outline SNA.pptx
Topic # 10 of outline SNA.pptxTopic # 10 of outline SNA.pptx
Topic # 10 of outline SNA.pptx
AyeCS11
 
Reformat PPT.pptx
Reformat PPT.pptxReformat PPT.pptx
Reformat PPT.pptx
LINDYLGERAL
 
Ms dos
Ms dosMs dos
Sistemas operativos
Sistemas operativosSistemas operativos
Sistemas operativos
3022359
 
Chp 03 pti - (shared) up
Chp 03   pti - (shared) upChp 03   pti - (shared) up
Chp 03 pti - (shared) up
YUSRA FERNANDO
 
Chp 03 - Software PTI - (Shared).pdf
Chp 03 - Software PTI - (Shared).pdfChp 03 - Software PTI - (Shared).pdf
Chp 03 - Software PTI - (Shared).pdf
YUSRA FERNANDO
 
I B.Sc C & HA - Basics of CS
I B.Sc C & HA - Basics of CSI B.Sc C & HA - Basics of CS
I B.Sc C & HA - Basics of CS
Hepsijeba
 
Functions of OS.ppt
 Functions of OS.ppt Functions of OS.ppt
Functions of OS.ppt
JunaidAkbar37
 
System Software
System SoftwareSystem Software
System Software
NaqashAhmad14
 
Operating system
Operating systemOperating system
Operating system
Madhu Bala
 
Operating system,window
Operating system,windowOperating system,window
Operating system,window
Khurram Burjees
 
What is a computer
What is a computerWhat is a computer
What is a computer
Shankar Gangaju
 
Operating system
Operating systemOperating system
Operating system
MusTufa Nullwala
 
Dos commands new
Dos commands new Dos commands new
Dos commands new
suraj pandey
 

Similar to Operating system (20)

Operating system of computer
Operating system of computerOperating system of computer
Operating system of computer
 
Operating System
Operating SystemOperating System
Operating System
 
Os
OsOs
Os
 
Operating system
Operating systemOperating system
Operating system
 
Operating system
Operating systemOperating system
Operating system
 
Topic # 10 of outline SNA.pptx
Topic # 10 of outline SNA.pptxTopic # 10 of outline SNA.pptx
Topic # 10 of outline SNA.pptx
 
Reformat PPT.pptx
Reformat PPT.pptxReformat PPT.pptx
Reformat PPT.pptx
 
Chapter 2(answer)2
Chapter 2(answer)2Chapter 2(answer)2
Chapter 2(answer)2
 
Ms dos
Ms dosMs dos
Ms dos
 
Sistemas operativos
Sistemas operativosSistemas operativos
Sistemas operativos
 
Chp 03 pti - (shared) up
Chp 03   pti - (shared) upChp 03   pti - (shared) up
Chp 03 pti - (shared) up
 
Chp 03 - Software PTI - (Shared).pdf
Chp 03 - Software PTI - (Shared).pdfChp 03 - Software PTI - (Shared).pdf
Chp 03 - Software PTI - (Shared).pdf
 
I B.Sc C & HA - Basics of CS
I B.Sc C & HA - Basics of CSI B.Sc C & HA - Basics of CS
I B.Sc C & HA - Basics of CS
 
Functions of OS.ppt
 Functions of OS.ppt Functions of OS.ppt
Functions of OS.ppt
 
System Software
System SoftwareSystem Software
System Software
 
Operating system
Operating systemOperating system
Operating system
 
Operating system,window
Operating system,windowOperating system,window
Operating system,window
 
What is a computer
What is a computerWhat is a computer
What is a computer
 
Operating system
Operating systemOperating system
Operating system
 
Dos commands new
Dos commands new Dos commands new
Dos commands new
 

More from himabindukursam

Word processing
Word processingWord processing
Word processing
himabindukursam
 
Knowing Computer
Knowing ComputerKnowing Computer
Knowing Computer
himabindukursam
 
Computer
ComputerComputer
Computer
himabindukursam
 
Computer introduction
Computer introductionComputer introduction
Computer introduction
himabindukursam
 
Introduction computer class
Introduction computer classIntroduction computer class
Introduction computer class
himabindukursam
 
Computer Introduction
Computer IntroductionComputer Introduction
Computer Introduction
himabindukursam
 

More from himabindukursam (6)

Word processing
Word processingWord processing
Word processing
 
Knowing Computer
Knowing ComputerKnowing Computer
Knowing Computer
 
Computer
ComputerComputer
Computer
 
Computer introduction
Computer introductionComputer introduction
Computer introduction
 
Introduction computer class
Introduction computer classIntroduction computer class
Introduction computer class
 
Computer Introduction
Computer IntroductionComputer Introduction
Computer Introduction
 

Recently uploaded

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

Operating system

  • 2. K.HIMABINDU., M. Tech OBJECTIVES 1. Assist the user to use the computer system CONVENIENTLY. 2. Enable the user to use the computer system and window EFFICIENTLY. 3. Assign the processors for performing tasks. 4. Allocate memory, managing memory and other storage areas. 5. Apply various command interpretations. 6. Schedule various jobs/tasks. 7. Establish priorities for different jobs. 8. Coordinate and manage peripherals devices. 9. Know input and out management. 10.Establish data security an integrity.
  • 7. Definition of Operating System • An operating system is a set of program files which controls the resources of the computer system and allows the communication of hardware components of a computer to the software components of the computer system. Operating systems provides access to computer services which is possible only via working of both the hardware components and the software components. • User can interact with the operating system through Command Line Interface (CLI) OR Graphical User Interface (GUI). • Examples : CLI - DOS GUI-Windows
  • 8. K.HIMABINDU., M. Tech Characteristics of OS 1. Single tasking or Multitasking 2. Single threading or Multithreading 3. Character based or Graphic user interface 4. Weak or Strong Security 5. 8,16,32 and 64 bits processed at a time 6. Portable and Non-portable Operating system 7. Proprietary and open operating systems
  • 10. K.HIMABINDU., M. Tech TYPES OF Single User Multi User Multi Programming Multi Process Time Sharing Real Time / On line Batch Processing
  • 12. K.HIMABINDU., M. Tech Disk Operating System (DOS) is OS software which loads into computer memory and performs tasks, manages secondary storages devices and maintains information on the disk devices. DOS is the first operating system which is used widely in personal computers. First version of DOS called PC-DOS was developed for IBM by bill gates of Microsoft Corporation. Bill gates retained rights for marketing a Microsoft version of DOS called MS –DOS. DOS is a command line operating system and prompts user to enter commands. DOS is a 16-bit operating system and does not support multi users and multitasking.
  • 13. K.HIMABINDU., M. Tech Purpose: Each time the computer boots up, DOS searches for a configuration system file and it uses the commands to configure the system. DOS uses the commands in auto execution bat to further refine the way it starts the computer system. If the auto execution boot is not set, the machine will be in default mode. This file is used to run programs automatically on start up. The operating system causes all the commands in this file executed before the start up is completed. It coordinates the flow of information between computer the disk, floppy or hard disk.
  • 14. K.HIMABINDU., M. Tech Types of Commands in MS DOS 1. Internal Commands (Loaded into PRIMARY Memory) 1.Dir – The command list out all the directories. a) Dir/p – To get directories page wise b) Dir/w- Width wise c) Dir[drive]- To list out the directories of another directory. d) Dir*.<extension> e) Dir*.* - current directory f) Dir com???.* g) Dir/s – sub directories 2.MD Or MKDIR 3.CD<Directory Name> 4.RD<SUB-DIRECTORY NAME> 5.CD.. 6. COPY<source filename><destination file name> 7.COPY CON<FILE NAME> 8. REN<Existing file name><new file name> 9.DEL<file name> 10. PATH 11.PROMPT 12. VER 13. VOL 14. CLS 15. DATE 16. TIME 17. TYPE
  • 15. K.HIMABINDU., M. Tech Types of Commands in MS DOS 2. External Commands (Do not need to be loaded into MEMORY) 1.BACKUP C: 2.RESORE A:C: 3. ATTRIB<FILE Name>[+h] or [-h] or [+r] or [-r] 4.CHKDSK C 5.DISKCOPY A:B: 6.COMP A:B.COMI C:B.COM 7.DISKCOMP A:B: 8.FORMAT A: 9. PRINT<FILE NAME> 10. RECOVER<FILENAME> 11.REPLACE A:/*.*C:/STUDENTS 12. LABEL A:STUD 13. EDIT<FILE NAME> 14. FIND’’marks’’*.txt
  • 16. K.HIMABINDU., M. Tech WILDCARD CHARACTERS A wildcard character is a special character or symbol that represents one or more other characters. The most commonly used wildcard characters are the asterisk(*), which typically represents zero or more characters in a string of characters, and the question mark(?), which typically represents anyone character. 1.To find a directory by using ‘*’ - C:>dir BCOM* 2. To delete a file by using ‘*’ - C:>DEL *TXT 3.To find a file by using ‘?’ - C:>dir? BCOM 4. To delete a file or directory by using ‘?’ - C:>DEL ? Doc
  • 17. K.HIMABINDU., M. Tech A Computer Virus is a compute program that can copies itself and spread from one computer to another. A computer virus is “a computer program usually hidden within another program that produces copies of itself and inserts them into other programs or files, and then destroys data”. Computer viruses are never naturally occurring; they are always man made. Once created and released, however, their spread is not directly under human control. Computer Virus
  • 18. K.HIMABINDU., M. Tech Symptoms of a Computer Virus 1. The computer runs slower than usual. 2. The computer stops responding or it locks up frequently. 3. The computer crashes, and then it restarts every few minutes. 4. The compute restarts on its own. Additionally, the computer does not run as usual. 5. Applications on the computer do not work correctly. 1. Disks or Disk drives are inaccessible. 2. You cannot print items correctly. 3. You see unusual error messages. 4. You see distorted menus and dialog boxes. 5. A program disappears from the computer even though you did not intentionally remove the program
  • 21. K.HIMABINDU., M. Tech Windows1.01, 1.02, 1.03, 1.04 Windows 2.03,2.10,2.11 Windows 3.0,3.1,NT 3.1,3.2, NT 3.5,3.51 Windows 95 Windows NT 4.0 Windows 98 Windows2000 Windows ME Windows XP Windows XP Professional X64 Windows Vista Windows 7 Windows 8 Windows 8.1 Windows 10 Microsoft windows client versions.
  • 24. K.HIMABINDU., M. Tech Icons in windows desktop Application Window Document Window
  • 25. K.HIMABINDU., M. Tech Basic Components of a Window