1.3 Hardware and software

1.3.6 Operating systems Operating system is a software program which controls the operations of the computer system & manages all of the computer’s hardware and programs. It acts as a layer of software between applications programs and hardware and provides an interface through which a user can run an application. It controls how the computer responds to user’s requests and how the hardware communicates with each other. Without an operating system, no matter how many programs you have, the computer is useless. However, not all computers need an operating system. An automated system such as household appliances that is microprocessor-controlled, like a washing machine or a digital camera, has a single control program performing a single task with a fixed set of input and output hardware. Loading an operating system: When a user switches on a laptop, desktop it usually has no operating system in internal memory ready to run and manage the computer. Computer then automatically run a small firmware program to start the process of loading the operating system into RAM, ready to take control. In a PC or laptop this firmware is stored in flash memory. The first firmware program performs a power-on selftest (POST). The purpose of Posting is to prevent the computer from starting to run in an unusable state. It checks the integrity of the firmware what external devices are connected and the size of internal memory. Then it identifies the most promising disk drive from which to load an operating system. The second firmware program called the ‘boot loader’ then loads the first, tiny portion of the operating system into RAM from a hard disk. This portion of the operating system software can in turn load the rest of the operating system software and associated data into RAM. This process, in which the operating system loads itself and then takes control of the computer, is known as ‘bootstrapping’. Function of operating system: 1. Manage user accounts and security using one or more usernames and password. 2. Provide an interface for the user that allows the user to: a. Run application programs. b. Manage files in backing storage. c. Read and respond to error messages. 3. Manage the processors time 4. Manage the allocation of internal memory. 5. Control peripheral devices-input devices such as keyboards, output devices such as printers and backing storage such as hard disk drive. 6. Provide spooling (temporary storage of input or output data in a queue on hard disk) 7. Manage interrupt signals to the processor. 8. Perform ‘housekeeping tasks’, such as defragmenting a drive or file indexing.

Types of Interfaces: The means of communication between the user and the machine is known as the user interface and consists of both hardware and software. It consist al hardware and software through which a user provide input to a Page 1 of 5

1.3 Hardware and software

1.3.6 Operating systems computer or receives information from it. There are different types of interface, which are useful in different situations and for different types of user. Command line interface Graphical user interface Graphical user interface Graphical interfaces are called GUI (graphical user interface) or WIMP (windows, icons, menus, and pointer) because it displays graphics as well as text. A GUI is very user friendly. The user will expect to be able to select options by use of menus of choices and by using small pictures which represent the different options available. Choices are selected by the user by using some sort of pointing device to indicate choice; typically this would be a mouse. Command line interface Or command based interface is one where the user types a series of commands at the keyboard which tell the computer what their intentions are. The user needs to know what the possible commands are, and also needs to understand the way files are stored on the system. The characteristics of a command based interface are The user needs to know what commands are available The user needs to understand the commands The user needs to understand the way that material is stored in the computer system Because of the above points there are two very important characteristics about a command based interface. First, the system is very much more open than in the other types of interface. Other interfaces restrict the options that the user has available to them. This can be particularly important for the system manager because different users can only be allowed to have access to specific parts of the system. The second characteristic is that command based interfaces can only be used by computer literate people because you not only have to understand the commands and their uses but you also need to understand something about how the computer operates, particular how information is stored.

Page 2 of 5

1.3 Hardware and software

1.3.6 Operating systems Utility software Utility programs are part of the operating system of a computer and are routines which carry out important tasks which are necessary from time to time on the system. They do not produce a pretty picture, or a letter which can be sent to someone so they are not application programs, but the types of job that they do are so important that the system could not run without them. There are many examples of utility software but we shall limit ourselves to just a few: 1. The surface of a disk can store so much data that the computer cannot handle it all at once so it needs to be split up so that data stored on it can be found again. When it is new a disk surface is blank so the computer “draws lines” on the surface to split it into small areas. The process is called formatting and it is carried out by a utility program called a disk formatter. 2. When files are to be stored on a disk they need to be managed. This includes arranging for them to be stored in a certain place, finding files again after they have been stored, moving them around to get them in a sensible order and deleting them when they are not needed any more. All of these actions are carried out by utility programs called file handlers. 3. A computer system is made up of lots of different sorts of hardware, each piece of which needs instructions about how to work. These programs are called hardware drivers. 4. Some files are very large. In most files it is possible to find simple ways of reducing the size of the file while keeping all its meaning. This can be very important when files are being sent from one computer to another as the communication is speeded up. The programs that reduce the size of files are called file compressors. 5. When files are being sent from one computer to another it is possible that they may contain a virus which will infect the receiving computer. A virus checker (scanner, killer,..) is a utility program which keeps a constant check on files searching for viruses which it will delete if it finds any. Buffer An operating system is often able to pass input data to an application program far faster than an input device can supply it. Similarly, it can often supply the application programs output data far faster than an output device can accept it. To compensate for the difference in rates of data processing and allow the processor to perform other tasks while waiting to receive or send data, system software uses an area of memory to hold data temporarily. Such an area in memory is called a buffer. Polling Method in which operating system periodically checks each peripheral device for communication is called polling.

Page 3 of 5

1.3 Hardware and software

1.3.6 Operating systems Interrupts An interrupt is a signal sent from a peripheral device (hardware) or program (software) to the processor to indicate that the sender needs attention. This leaves the operating system entirely free to process other task until its attention is needed. A processor usually has relatively few hardware interrupt inputs with different priorities. Before fetching each machine code instruction from internal memory, the processor checks an area of memory within the processor called its ‘interrupt register’ to see whether any interrupts are waiting to be serviced. Programs can also generate interrupts. An application program can use a software interrupt request a service from the operating system. Handshaking Term used to describe the process of one computer establishing a connection with another computer or device. The handshake is often the steps of verifying the connection, the speed, or the authorization of the computer trying to connect to it. Checksum A checksum is a way of summarizing a block of data such as a USB or network data packet. At its simplest, it consists of the arithmetical sum of all the numerical values of all the elements of the block. The sum reduced to a standard number of digits and transmitted with the block. When the block of data get to its destination, the same mathematical calculation is performed on the data by the received device and the result is compared with the received checksum. If two checksum match, the integrity of the data has been maintained. If the two checksums do not match then an error has been made in transmitting the data and the receiving device requests the sending device to re-transmit the data. Even if one binary digit has changed in the data, the recalculated check sum does not match the received checksum and the data are rejected.

Page 4 of 5

1.3 Hardware and software

1.3.6 Operating systems File Management: Another part of the operating system is the file manager. While the memory manager is responsible for the maintenance of primary memory, the file manager is responsible for the maintenance of secondary storage (e.g., hard disks) The operating system is responsible for the following activities in connections with file management: File creation and deletion. Directory creation and deletion. Support for manipulating files and directories. Mapping files onto secondary storage. File backup on stable (nonvolatile) storage media. Identify and locate a selected file Use a directory to describe the location of all files plus their attributes On a shared system describe user access control Blocking for access to files provide simple and fast algorithms to read and write files give and deny access rights on files to users and programs allocate and de-allocate files to processes provide users and programs with simple commands for file handling

Page 5 of 5

1.3.6 Operating systems.pdf

software and associated data into RAM. This process, in which the operating system loads itself and then. takes control of the computer, is known as ...

82KB Sizes 1 Downloads 163 Views

Recommend Documents

dvuma - 136.pdf
Kanojo toys big sex issue tsubomi homeless orgy. ホãƒ1⁄4ムレã‚. 1japan無制éTM生ä ̧å‡oã— è· ̄ä ̧Šç”Ÿæ ́»è€... è»å›£vsã¤ã1⁄4ã¿ã‚¢ãƒ€ãƒ«ãƒˆdvd.

136 08 article.pmd
nutrients on seed yield attributes and storage potential of carry ... treatments were kept in storage under ambient condition (28+2oC .... Palmertree, H.D. 1981.

Newsletter 136.pdf
Another goal for this winter is the upgrading of. our current computer business program. This is a major. task and we need to finalise our assessment of various.

119-136.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. 119-136.pdf.Missing:

New Doc 136 -
Page 1. Scanned by CamScanner.

Canada - aviation freqs - 136-137E.PDF
telecommunications programs have been transferred to Industry. Canada. All notes in square brackets [ ] were added for clarification purposes. Prepared by:.

Ank-9 Pg 102 to 136.pmd
Ãkku÷eMku «òLkwt hûkı. fhğkLkwt nkuŞ íŞkhu íku s òu «òLku htòzu yux÷u fu ğkz ÚkELku [e¼zkt øk¤u íkku fnuğk fkuLku sğwt ? 44. zwtøkhk ËqhÚke hr¤Şk{ık ...

Paginas 129-136.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Paginas ...

man-136\amma-mahan-olu.pdf
PDF Ebook : Mahan Kosh In Punjabi Language. Page 3 of 5. man-136\amma-mahan-olu.pdf. man-136\amma-mahan-olu.pdf. Open. Extract. Open with. Sign In.

136 - CHARLEROI - 21.06.2015 - 10 miles - GENERAL.pdf ...
136 - CHARLEROI - 21.06.2015 - 10 miles - GENERAL.pdf. 136 - CHARLEROI - 21.06.2015 - 10 miles - GENERAL.pdf. Open. Extract. Open with. Sign In.

Job #136-17 Library Technician.pdf
Connect more apps... Try one of the apps below to open or edit this item. Job #136-17 Library Technician.pdf. Job #136-17 Library Technician.pdf. Open. Extract.

Ank-9 Pg 102 to 136.pmd
21. †eÃkwÁ»k - †e yLku ÃkwÁ»k. 22. LkkxfrMkLku{k - Lkkxf yLku rMkLku{k økwshkíke PAPER-1 (ÔŞkfhı). ÷u¾f : «VwÕ÷ økZğe (D.Pharm, M.A., L.L.B., M.P.A.) ...

man-136\hithotcomics-com.pdf
easiest way to reveal is that you can likewise save the soft data of Hithotcomics Com in your. appropriate and also offered gadget. This problem will certainly ...

man-136\nirvana-aunty-pundai.pdf
Page 2 of 5. NIRVANA AUNTY PUNDAI PDF. This is it the book Nirvana Aunty Pundai to be best seller recently. ... learn the very best book Nirvana Aunty Pundai that you can check out now. Currently, reading this stunning ... LIST EBOOK RELATED TO NIRVA

man-136\zabardasti-gand-mari.pdf
motors to guide shops. Obtain the queuing, under the rainfall or very hot light, and still hunt for the. unknown publication to be because book shop. By visiting this ...

One Piece Chapter 136.pdf
Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. One Piece Chapter 136.pdf. One Piece Chapter 136.pdf. Open.

Canada - aviation freqs - 136-137E.PDF
Spectrum Management. Terrestrial Radiocommunication Agreements and Arrangements. U.S./Canada Interim Channelling. Arrangement for the Aeronautical.

Lipar 61.127-136.pdf
Loading… Page 1. Whoops! There was a problem loading more pages. Retrying... Lipar 61.127-136.pdf. Lipar 61.127-136.pdf. Open. Extract. Open with. Sign In.

[O973.Ebook] Ebook Operating System: Operating ...
Jan 21, 2016 - prosperous system by reading this soft file of the Operating System: Operating System For Beginners ... What do you think of our concept here?

DEPARTMENT ORDER NO. 136 .pdf
Declaration Form (B.C. Form 214). 1.2 Customs Official Receipts ... DEPARTMENT ORDER NO. 136 .pdf. DEPARTMENT ORDER NO. 136 .pdf. Open. Extract.

C-136-16.pdf
Page 1 of 43. Sentencia C-136/16. Referencia: expediente D-10953. Demanda de inconstitucionalidad contra el. artículo 59 (parcial) de la Ley 1476 de. 2011.

DEPARTMENT ORDER NO. 136 .pdf
Loading… Page 1. Whoops! There was a problem loading more pages. Retrying... DEPARTMENT ORDER NO. 136 .pdf. DEPARTMENT ORDER NO. 136 .pdf. Open. Extract. Open with. Sign In. Main menu. Displaying DEPARTMENT ORDER NO. 136 .pdf.