SlideShare a Scribd company logo
By…
Robin
singh
Defin
ition
Comp
uter
Consis
ts
Goa
ls &
Ser
vice
Func
tion
of OS
Typ
es
of
OS
Part
of
OS
User
Inter
face
GUI
User
Interfa
ce
Enh
anci
ng
OS
CUI
User
Interf
ace
Back
up
S/W
Contents
Operating System
• An Operating System is a program that acts
as an intermediary/interface between a user
of a computer and the computer hardware.
• Managing all these varied components
requires a layer of software – the
Operating System (OS).
A modern computer consists of
• One or more processors
• Main memory
• Disks
• Printers
• Various input/output devices.
• Control/execute user/application programs.
• Handling Input/output Operations
• Manipulation of file system
• Make the computer system convenient to use.
• Ease the solving of user problems.
• Use the computer hardware in an efficient manner.
• Error detection and handling
• Resource allocation
• Accounting
• Information and Resource protection
Operating System goals Or Service
Functions of Operating Systems
• Provide a user interface
• Run programs
• Manage hardware devices
• Organized file storage
• Processor Management
• Storage (Memory) Management
• Information Management
Major Function
Part Of Operate System
An Operating System has two part:-
1. Kernel
2. Shell
The kernel is responsible for interacting with hardware
and the shell is responsible for interacting with the user
Shell Command.com
Kernel IOS.SYS MSDOS.SYS
Hardware
User 1 User 2 User 3
Types of Operating Systems
 Single user/Single tasking OS
 One user works on the system
 Performs one task at a time
 MS-DOS and Palm OS
 Take up little space on disk
 Run on inexpensive computers
 Single user/Multitasking OS
 User performs many tasks at once
 Most common form of OS
 Windows XP and OS X
 Require expensive computers
 Tend to be complex
 Multi user/Multitasking OS
 Many users connect to one computer
 Each user has a unique session
 UNIX, Linux, and VMS
 Maintenance can be easy
 Requires a powerful computer
Types of Operating Systems
 Time Sharing operating system
 Time Shearing technic
 If the time elapses, CPU shift over to the next job waiting & the
previous Program is put to wait
 Interactive OS
 Interactive in nature
 Provide GUI interface
 Easy interaction
 Real-time operating system
 Very fast small OS
 Built into a device
 Respond quickly to user input
 MP3 players, Medical devices
Multi user/Multi tasking OS
User 1 User 2
Providing a User Interface
• User interface
– How a user interacts with a computer
– Require different skill sets
Providing a User Interface
• Graphical user interface (GUI)
– Most common interface
– Windows, OS X, Gnome, KDE
– Uses a mouse to control objects
– Uses a desktop metaphor
– Shortcuts open programs or documents
– Open documents have additional objects
– Task switching
– Dialog boxes allow directed input
Graphical User Interface
Providing a User Interface
• Command line interfaces
• Or
• Command User Interface
– Older interface
– DOS, Linux, UNIX
– User types commands at a prompt
– User must remember all commands
– Included in all GUIs
Command Line Interface
Command User Interface
&
Running Programs
• Many different applications supported
• System call
– Provides consistent access to OS features
• Share information between programs
– Copy and paste
– Object Linking and Embedding
Managing Hardware
• Programs need to access hardware
• Interrupts
– CPU is stopped
– Hardware device is accessed
• Device drivers control the hardware
Organizing Files and Folders
• Organized storage
• Long file names
• Folders can be created and nested
• All storage devices work consistently
Enhancing an OSUtilities
– Provide services not included with OS
– Goes beyond the four functions
– Firewall, anti-virus and compression
– Prices vary
 Backup software
 Archives files onto removable media
 Ensures data integrity
 Most OS include a backup package
 Many third party packages exist
 Anti-virus software
 Crucial utility
 Finds, blocks and removes viruses
 Must be updated regularly
 McAfee and Norton Anti-Virus
 Firewall
 Crucial utility
 Protects your computer from intrude
 Makes computer invisible to hackers
 Zone Labs is a home firewall
 Cisco sells hardware firewalls
 Intrusion detection
 Often part of a firewall package
 Announces attempts to breach security
 Snort is a Linux based package
Backup Software
Thank You
For Your
Attention

More Related Content

What's hot

Operating systems
Operating systemsOperating systems
Operating systems
Chinmay Raul
 
Operating System 2
Operating System 2Operating System 2
Operating System 2
tech2click
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
Dr. C.V. Suresh Babu
 
Operating system basics
Operating system basicsOperating system basics
Operating system basics
John Carlo Catacutan
 
Operating System Overview.
Operating System Overview.Operating System Overview.
Operating System Overview.
akash726788
 
Operating systems
Operating systemsOperating systems
Operating systems
11mooremichael
 
Operating Systems As a Product
Operating Systems As a ProductOperating Systems As a Product
Operating Systems As a Product
Harshit Srivastava
 
Operating systems
Operating systemsOperating systems
Operating systems
Srishti Gupta
 
Operating system components
Operating system componentsOperating system components
Operating system components
Syed Zaid Irshad
 
Operating system
Operating systemOperating system
Operating system
MusTufa Nullwala
 
How Operating system works.
How Operating system works. How Operating system works.
How Operating system works.
Fahad Farooq
 
Types of Operating System
Types of Operating SystemTypes of Operating System
Types of Operating System
Sayam Asjad
 
Modern operating system.......
Modern operating system.......Modern operating system.......
Modern operating system.......
vignesh0009
 
Operating system ppt
Operating system pptOperating system ppt
Computer Operating System
Computer Operating System Computer Operating System
Computer Operating System
Liton Ahmed
 
Os unit 1(cont)
Os unit 1(cont)Os unit 1(cont)
Bba i-introduction to computer-u-3-functions operating systems
Bba  i-introduction to computer-u-3-functions operating systemsBba  i-introduction to computer-u-3-functions operating systems
Bba i-introduction to computer-u-3-functions operating systems
Rai University
 
Operating System
Operating SystemOperating System
Operating System
ushabarad142
 

What's hot (19)

Operating systems
Operating systemsOperating systems
Operating systems
 
Operating System 2
Operating System 2Operating System 2
Operating System 2
 
Intro ch 07_a
Intro ch 07_aIntro ch 07_a
Intro ch 07_a
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
Operating system basics
Operating system basicsOperating system basics
Operating system basics
 
Operating System Overview.
Operating System Overview.Operating System Overview.
Operating System Overview.
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Operating Systems As a Product
Operating Systems As a ProductOperating Systems As a Product
Operating Systems As a Product
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Operating system components
Operating system componentsOperating system components
Operating system components
 
Operating system
Operating systemOperating system
Operating system
 
How Operating system works.
How Operating system works. How Operating system works.
How Operating system works.
 
Types of Operating System
Types of Operating SystemTypes of Operating System
Types of Operating System
 
Modern operating system.......
Modern operating system.......Modern operating system.......
Modern operating system.......
 
Operating system ppt
Operating system pptOperating system ppt
Operating system ppt
 
Computer Operating System
Computer Operating System Computer Operating System
Computer Operating System
 
Os unit 1(cont)
Os unit 1(cont)Os unit 1(cont)
Os unit 1(cont)
 
Bba i-introduction to computer-u-3-functions operating systems
Bba  i-introduction to computer-u-3-functions operating systemsBba  i-introduction to computer-u-3-functions operating systems
Bba i-introduction to computer-u-3-functions operating systems
 
Operating System
Operating SystemOperating System
Operating System
 

Viewers also liked

nomenclaturas básicas
nomenclaturas básicas nomenclaturas básicas
nomenclaturas básicas
cynthia zavaleta
 
Open School KB TK PKP JIS 2017
Open School KB TK PKP JIS 2017Open School KB TK PKP JIS 2017
Open School KB TK PKP JIS 2017
tkpkpjis
 
Projecte psiconets
Projecte psiconetsProjecte psiconets
Projecte psiconets
Tonips
 
Theater Dance Resume Jamie McCoy
Theater Dance Resume Jamie McCoyTheater Dance Resume Jamie McCoy
Theater Dance Resume Jamie McCoyJamie McCoy
 
Bill gates powerpoint
Bill gates powerpointBill gates powerpoint
Bill gates powerpointmasonwilson1
 
Presentation on bill gates iii
Presentation on bill gates iiiPresentation on bill gates iii
Presentation on bill gates iii
Racy Daniel
 
Demand and supply .ppt
Demand and supply .pptDemand and supply .ppt
Demand and supply .ppt
jaganshettar
 
Demand, Supply, and Market Equilibrium
Demand, Supply, and Market EquilibriumDemand, Supply, and Market Equilibrium
Demand, Supply, and Market EquilibriumNoel Buensuceso
 
The theory of demand and supply
The theory of demand and supplyThe theory of demand and supply
The theory of demand and supplyvinetarushad
 
Bill gates presentation
Bill gates presentationBill gates presentation
Bill gates presentation
donmos
 
Supply and Demand
Supply and DemandSupply and Demand
Supply and Demand
Lina Nandy
 
Supply and Demand, Law of Demand,Law of Supply, Equilibrium
Supply and Demand, Law of Demand,Law of Supply, EquilibriumSupply and Demand, Law of Demand,Law of Supply, Equilibrium
Supply and Demand, Law of Demand,Law of Supply, Equilibrium
Advance Business Consulting
 
Bill Gates
Bill GatesBill Gates
Bill Gates
Ankit Gupta
 
Dispatches From The New Economy: The Five Faces Of The On-Demand Economy
Dispatches From The New Economy: The Five Faces Of The On-Demand EconomyDispatches From The New Economy: The Five Faces Of The On-Demand Economy
Dispatches From The New Economy: The Five Faces Of The On-Demand Economy
Intuit Inc.
 
Bill gates powerpoint:)
Bill gates powerpoint:)Bill gates powerpoint:)
Bill gates powerpoint:)Ashley Sumrall
 

Viewers also liked (17)

nomenclaturas básicas
nomenclaturas básicas nomenclaturas básicas
nomenclaturas básicas
 
Open School KB TK PKP JIS 2017
Open School KB TK PKP JIS 2017Open School KB TK PKP JIS 2017
Open School KB TK PKP JIS 2017
 
Capstone
CapstoneCapstone
Capstone
 
Scarlatti
ScarlattiScarlatti
Scarlatti
 
Projecte psiconets
Projecte psiconetsProjecte psiconets
Projecte psiconets
 
Theater Dance Resume Jamie McCoy
Theater Dance Resume Jamie McCoyTheater Dance Resume Jamie McCoy
Theater Dance Resume Jamie McCoy
 
Bill gates powerpoint
Bill gates powerpointBill gates powerpoint
Bill gates powerpoint
 
Presentation on bill gates iii
Presentation on bill gates iiiPresentation on bill gates iii
Presentation on bill gates iii
 
Demand and supply .ppt
Demand and supply .pptDemand and supply .ppt
Demand and supply .ppt
 
Demand, Supply, and Market Equilibrium
Demand, Supply, and Market EquilibriumDemand, Supply, and Market Equilibrium
Demand, Supply, and Market Equilibrium
 
The theory of demand and supply
The theory of demand and supplyThe theory of demand and supply
The theory of demand and supply
 
Bill gates presentation
Bill gates presentationBill gates presentation
Bill gates presentation
 
Supply and Demand
Supply and DemandSupply and Demand
Supply and Demand
 
Supply and Demand, Law of Demand,Law of Supply, Equilibrium
Supply and Demand, Law of Demand,Law of Supply, EquilibriumSupply and Demand, Law of Demand,Law of Supply, Equilibrium
Supply and Demand, Law of Demand,Law of Supply, Equilibrium
 
Bill Gates
Bill GatesBill Gates
Bill Gates
 
Dispatches From The New Economy: The Five Faces Of The On-Demand Economy
Dispatches From The New Economy: The Five Faces Of The On-Demand EconomyDispatches From The New Economy: The Five Faces Of The On-Demand Economy
Dispatches From The New Economy: The Five Faces Of The On-Demand Economy
 
Bill gates powerpoint:)
Bill gates powerpoint:)Bill gates powerpoint:)
Bill gates powerpoint:)
 

Similar to Operating System's Concept, Working, Types, Part, and Many More

Operating System Basics.ppt
Operating System Basics.pptOperating System Basics.ppt
Operating System Basics.ppt
UmaMahesh623495
 
4 operating system basics
4   operating system basics4   operating system basics
4 operating system basics
bsnl007
 
OS Basic.ppt
OS Basic.pptOS Basic.ppt
OS Basic.ppt
christine987332
 
Chapter 7A Peter Norton
Chapter 7A Peter NortonChapter 7A Peter Norton
Chapter 7A Peter Norton
রেদওয়ান হৃদয়
 
Intro_Chapter_06A.ppt
Intro_Chapter_06A.pptIntro_Chapter_06A.ppt
Intro_Chapter_06A.ppt
rehmat
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
Shaina Mavreen Villaroza
 
Nt introduction(os)
Nt introduction(os)Nt introduction(os)
Nt introduction(os)
NehaTadam
 
OS UNIT 1 PPT.pptx
OS UNIT 1 PPT.pptxOS UNIT 1 PPT.pptx
OS UNIT 1 PPT.pptx
PRABAVATHIH
 
Kernel security Concepts
Kernel security ConceptsKernel security Concepts
Kernel security Concepts
Mohit Saxena
 
Module 3 business computing.pdf
Module 3 business computing.pdfModule 3 business computing.pdf
Module 3 business computing.pdf
Dhiviya Rose
 
Operatimg system basics
Operatimg system basicsOperatimg system basics
Operatimg system basics
Muhammad Shahid
 
Operatimg system basics
Operatimg system basicsOperatimg system basics
Operatimg system basics
Muhammad Shahid
 
opreting system
opreting systemopreting system
opreting system
opreting systemopreting system
opreting system
opreting systemopreting system
opreting system
opreting systemopreting system
opreting system
opreting systemopreting system
opreting system
opreting systemopreting system
unit1 part1.ppt
unit1 part1.pptunit1 part1.ppt
unit1 part1.ppt
suresh554942
 
Introduction to Operating Systems.pptx
Introduction to Operating Systems.pptxIntroduction to Operating Systems.pptx
Introduction to Operating Systems.pptx
SidraZafar43
 

Similar to Operating System's Concept, Working, Types, Part, and Many More (20)

Operating System Basics.ppt
Operating System Basics.pptOperating System Basics.ppt
Operating System Basics.ppt
 
4 operating system basics
4   operating system basics4   operating system basics
4 operating system basics
 
OS Basic.ppt
OS Basic.pptOS Basic.ppt
OS Basic.ppt
 
Chapter 7A Peter Norton
Chapter 7A Peter NortonChapter 7A Peter Norton
Chapter 7A Peter Norton
 
Intro_Chapter_06A.ppt
Intro_Chapter_06A.pptIntro_Chapter_06A.ppt
Intro_Chapter_06A.ppt
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
 
Nt introduction(os)
Nt introduction(os)Nt introduction(os)
Nt introduction(os)
 
OS UNIT 1 PPT.pptx
OS UNIT 1 PPT.pptxOS UNIT 1 PPT.pptx
OS UNIT 1 PPT.pptx
 
Kernel security Concepts
Kernel security ConceptsKernel security Concepts
Kernel security Concepts
 
Module 3 business computing.pdf
Module 3 business computing.pdfModule 3 business computing.pdf
Module 3 business computing.pdf
 
Operatimg system basics
Operatimg system basicsOperatimg system basics
Operatimg system basics
 
Operatimg system basics
Operatimg system basicsOperatimg system basics
Operatimg system basics
 
opreting system
opreting systemopreting system
opreting system
 
opreting system
opreting systemopreting system
opreting system
 
opreting system
opreting systemopreting system
opreting system
 
opreting system
opreting systemopreting system
opreting system
 
opreting system
opreting systemopreting system
opreting system
 
opreting system
opreting systemopreting system
opreting system
 
unit1 part1.ppt
unit1 part1.pptunit1 part1.ppt
unit1 part1.ppt
 
Introduction to Operating Systems.pptx
Introduction to Operating Systems.pptxIntroduction to Operating Systems.pptx
Introduction to Operating Systems.pptx
 

Recently uploaded

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

Operating System's Concept, Working, Types, Part, and Many More

  • 3. Operating System • An Operating System is a program that acts as an intermediary/interface between a user of a computer and the computer hardware. • Managing all these varied components requires a layer of software – the Operating System (OS).
  • 4. A modern computer consists of • One or more processors • Main memory • Disks • Printers • Various input/output devices.
  • 5. • Control/execute user/application programs. • Handling Input/output Operations • Manipulation of file system • Make the computer system convenient to use. • Ease the solving of user problems. • Use the computer hardware in an efficient manner. • Error detection and handling • Resource allocation • Accounting • Information and Resource protection Operating System goals Or Service
  • 6. Functions of Operating Systems • Provide a user interface • Run programs • Manage hardware devices • Organized file storage • Processor Management • Storage (Memory) Management • Information Management Major Function
  • 7. Part Of Operate System An Operating System has two part:- 1. Kernel 2. Shell The kernel is responsible for interacting with hardware and the shell is responsible for interacting with the user Shell Command.com Kernel IOS.SYS MSDOS.SYS Hardware User 1 User 2 User 3
  • 8. Types of Operating Systems  Single user/Single tasking OS  One user works on the system  Performs one task at a time  MS-DOS and Palm OS  Take up little space on disk  Run on inexpensive computers  Single user/Multitasking OS  User performs many tasks at once  Most common form of OS  Windows XP and OS X  Require expensive computers  Tend to be complex  Multi user/Multitasking OS  Many users connect to one computer  Each user has a unique session  UNIX, Linux, and VMS  Maintenance can be easy  Requires a powerful computer
  • 9. Types of Operating Systems  Time Sharing operating system  Time Shearing technic  If the time elapses, CPU shift over to the next job waiting & the previous Program is put to wait  Interactive OS  Interactive in nature  Provide GUI interface  Easy interaction  Real-time operating system  Very fast small OS  Built into a device  Respond quickly to user input  MP3 players, Medical devices
  • 10. Multi user/Multi tasking OS User 1 User 2
  • 11. Providing a User Interface • User interface – How a user interacts with a computer – Require different skill sets
  • 12. Providing a User Interface • Graphical user interface (GUI) – Most common interface – Windows, OS X, Gnome, KDE – Uses a mouse to control objects – Uses a desktop metaphor – Shortcuts open programs or documents – Open documents have additional objects – Task switching – Dialog boxes allow directed input
  • 14. Providing a User Interface • Command line interfaces • Or • Command User Interface – Older interface – DOS, Linux, UNIX – User types commands at a prompt – User must remember all commands – Included in all GUIs
  • 15. Command Line Interface Command User Interface &
  • 16. Running Programs • Many different applications supported • System call – Provides consistent access to OS features • Share information between programs – Copy and paste – Object Linking and Embedding
  • 17. Managing Hardware • Programs need to access hardware • Interrupts – CPU is stopped – Hardware device is accessed • Device drivers control the hardware
  • 18. Organizing Files and Folders • Organized storage • Long file names • Folders can be created and nested • All storage devices work consistently
  • 19. Enhancing an OSUtilities – Provide services not included with OS – Goes beyond the four functions – Firewall, anti-virus and compression – Prices vary  Backup software  Archives files onto removable media  Ensures data integrity  Most OS include a backup package  Many third party packages exist  Anti-virus software  Crucial utility  Finds, blocks and removes viruses  Must be updated regularly  McAfee and Norton Anti-Virus  Firewall  Crucial utility  Protects your computer from intrude  Makes computer invisible to hackers  Zone Labs is a home firewall  Cisco sells hardware firewalls  Intrusion detection  Often part of a firewall package  Announces attempts to breach security  Snort is a Linux based package

Editor's Notes

  1. <number>
  2. <number> Teaching Tip File and folder storage is covered in chapter 6.
  3. <number> Insider information The first commercial GUI was the Xerox Star. Teaching Tip There are several types of dialog boxes. Any errors are displayed in a dialog box. This box is system modal - it requires a response before returning to the OS. Save and print boxes are application modal - The box must be dealt with before returning to the application. However, other OS tasks can be performed.
  4. <number> Teaching tip Demonstrate the command line interface in Windows by running cmd. In the command line interface use ping and ipconfig as commands that cannot be run in the GUI.
  5. <number> Teaching tip Most students have never encountered a link. I use MS Excel and MS Word to link. Create and save a simple spreadsheet in Excel. Copy the spreadsheet to the clipboard. Open MS Word and paste-link the spreadsheet. Save the MS Word document. Then change and save the spreadsheet in Excel. The word document is automatically updated.
  6. <number> Discussion point The mouse uses an interrupt. Many users will move the mouse while waiting for the CPU to finish a task. What does moving the mouse do to the current process? Teaching tip Discuss what can happen when the wrong driver is installed on a computer.
  7. <number> Discussion point With Windows XP and SP2, Microsoft has included a firewall and pop-up blocker both typically considered utility software. In the near future, the core services provided by an OS may include security features.