SlideShare a Scribd company logo
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 1 / 21 File: lec9chap8f04.doc
General Items:
? Computer security
? Computer purchasing
Reading Materials:
?
Miscellaneous:
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 2 / 21 File: lec9chap8f04.doc
Type of software
- System Software
o programs controlling the operation of the computer and devices
?Operating system programs (platform)
?Utility programs
- Application (perform a specific task)
o Graphics, Multimedia, Web page designer, Communication
software
o Designed for a specific OS – some can be cross-platform
Operating system (OS)
- An OS is a set of programs that coordinate activities between computer
hardware resources
- Also called software platform
- It typically resides in the hardware or ROM
- Examples: Windows XP, Mac OS X
-
Operating
System
Starting
Computer
User
Interface
Managing
Programs
Configuring
Devices
Monitoring
performance
Controlling
NetworkOS Functions
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 3 / 21 File: lec9chap8f04.doc
Basic idea
- Not all computers need OS
o hardware is fixed, same program is run at all times
- Examples: Macintosh, Windows, Unix
- Functions:
o Manages hardware and software resources
o Applications to deal with hardware
- Four types:
o Real time (very little user-interface capability and no end-user
utilities)
o Single user-single task (Palm OS - DOS)
o Single user-multitask (Desktop)
o Multi user (Networking)
Computer booting (wakeup-call)
- This is one of the basic OS functions
- Bootstrap: a program that loads the OS into the RAM
- Booting: Computer startup or restarting process
o Cold booting or warm booting
o Upon booting -> OS instructions are loaded in the RAM
o
o Kernel: Instructions managing memory and devices, application
startups, maintains computer’s clock – Core or OS
Operating System Programs:
Memory resident (reside in RAM)
Example: Kernel
Nonresident (reside in hardware)
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 4 / 21 File: lec9chap8f04.doc
Starting a computer:
- Power up
- Processor reset, Finding the ROM BIOS chips
o Basic Input/Output System (contains startup instructions)
o Executes a series of tests to make sure all devices are operational
(keyboard, monitor, internal busses, RAM chips, etc.)
- BIOS performs the POST: Power-on self test
o The result is compared with the information recorded in the CMOS
chip
o CMOS chip maintains the information about system configuration,
memory, other devices
o Finds new devices
o Detects any device errors
- BIOS starts searching for “system files” (drive A, C, CD, etc.)
o .COM, .DRV, .DLL, .366, etc.
o System files are loaded in the RAM
- The KERNEL is loaded in the memory (the operating system takes over!)
- The operating system loads the system configuration
o System configuration information are in REGISTRY files
- Files in the Startup Folder are executed
User Interface
Interacting with software through user interface
- Command line (command language)
- Graphical (GUI) – menu, Icons
Managing programs
- Single user/single tasking
- Single user/multitasking
o Foreground and background processing
- Multi users
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 5 / 21 File: lec9chap8f04.doc
- Multi processing (supporting two or more processors)
o Fault-tolerant computer (duplicated components)
Memory Management
- Used to optimize the use of RAM
o How to distribute data, instructions, programs in different memory
locations
o Clearing unused memory locations
- Virtual memory
o Optimizing the RAM
o Using hardware disk as additional RAM (called swap file)
o Paging: technique of swapping items between memory and hard
drive: Swap out (of RAM), Swap in (the RAM)
o When paging time is too long -> more RAM is required
(Thrashing) – not much execution is going on!
Scheduling job
- The operating system performs operations (jobs) based on some order
- Serving disciplines: FCFS operations, Priority Operations
- Buffering: Waiting for available resources
- Spooling:
o Buffering PRINT jobs (advantage?)
o Jobs are QUEUED (stacked)
o Print spooler: a program that places jobs in the queue
Configuring devices
Device drivers are used to communicate with different devices
A device driver is a program: how the processor should communicate with a
device – Print drivers (*.drv)
Installing drivers
Plug and play (computer recognizes the device)
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 6 / 21 File: lec9chap8f04.doc
Monitoring performance
- Operating systems can monitor system performance
- Uses a performance monitor program (resident or nonresident program?)
- Includes: Disk usage, memory usage, processor activities, number of
reads and writes to a file – provides a good way to measure your system
resources (need more VM?)
File management services
- Include storage and file management functions
- Includes:
o Formatting and disk copying
?Formatting: Preparing a disk for reading and writing
?When a disk is formatted it looses all its information
o Checking the available storage
o Copy, renaming, deleting, moving, creating short cuts
Controlling a network
- Operating systems can be Network OS (NOS)
- Connecting a server and several clients
- Sharing resources / resource allocation
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 7 / 21 File: lec9chap8f04.doc
Types of operating systems
DOS:
- MS-DOS (Disk Operating System) 1980
- Used for personal computers
- IBM Compatibles
- Uses Command lines
Windows 3.x:
- DOS driven program with GUI interface (3.1, 3.11, etc.)
- DOS-based OS with GUI operating environment
- Not multitasking
- Based on 16-bit processors
Time
DOS
Win 3.x
Win 95
NT
Win 98
Win 2000
Millen
XP Home
XP Prof.
Power/
Integration
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 8 / 21 File: lec9chap8f04.doc
Windows 95
- Multi tasking OS (not based on DOS)
- Uses 32-bit processors
- Used for Windows NT
Windows Me
- Upgrade to 98
- For home users
- Optimized for digital photography and movies, audio, web design, home
networking
Windows XP
- Home and professional editions
- Movie Maker
- Better file sharing
- Fast startup
- Better security
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 9 / 21 File: lec9chap8f04.doc
-
Types of operating systems:
- Stand- alone: Complete OS working on a desktop, notebook,
etc. Examples: Window XP, Mac, Linux, UNIX
- Network: Designed to support networks, typically reside on the server,
- Embedded: Reside on a ROM chip – used for PDAs mobile
devices, Examples: Windows CE, .NET, Windows Mobile
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 10 / 21 File: lec9chap8f04.doc
Type of software
- Application (perform a specific task)
o Graphics, Multimedia, Web page designer, Communication
software
- System Software
o programs controlling the operation of the computer and devices
?Operating system programs
?Utility programs
Utility Programs
- A system software that typically manages a computer, its devices or its
programs
- Utility suites: collection of several utility programs
- Examples of utility programs: Norton Utilities, McAfee
- Basic utility files:
o File viewer: View or copy files
o File compression: Shrinks (Zips) the size of a file – PKZIP,
PKUNZIP
o Diagnostic utility: Compile information about the computer
performance and devices - memory usage, processor utilization,
etc.
o Uninstaller: Utility that removes all the related files, typically
embedded in the OS
o Scanning files: Moves all unnecessary files, finds some physical
and logical problems
?Physical problem: bad disk, scratched CD
?Logical problem: corrupted files
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 11 / 21 File: lec9chap8f04.doc
o Defragmenting: Organizing the files on the hard drive
?Fragmented file: a files scattered on different sectors on the
HD
?Defragmenting: place files on continuous sectors
o Backup utility: copy and backup your files
?Program restoration: accessing the backup files
?Using an Internet hard drive
o Screen savers:
?Used to be critical to avoid permanent image “etching” on
monitor’s screen
?Today mostly used for screen blocking
?Want some cool screen savers? http://www.free-search.com/
-
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 12 / 21 File: lec9chap8f04.doc
Who are computer hackers?
- A person who enjoys exploring the details of programmable systems and
how to stretch their capabilities, as opposed to most users, who prefer to
learn only the minimum necessary.
- One who programs enthusiastically (even obsessively)
- A person capable of appreciating hack value.
- A person who is good at programming quickly.
- An expert at a particular program, or one who frequently does work using
it or on it.
Basic hacking operations
- Piracy (copying and using commercial software purchased by someone
else)
- Sniffing gather information regarding the status of components of a
network system
- Attackers (forcing to teardown the system)
- And more…
Cute hacking
- Play with the hidden files
- Change system files (boot-up logos)
Hacking software
- Password stealer (AOL password, windows, etc.)
- Sniffers
- Cracking tools
- Spy tools (monitor all key strokes, and other computer activities)
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 13 / 21 File: lec9chap8f04.doc
Why do we need computer security?
- Thanks to Internet a huge amount of personal information are being
exchanged on the net
- Credit-card information
- Social Security numbers
- Private correspondence
- Personal details
- Sensitive company information
- Bank-account information
Basic security operations
- Encryption
- Authentication
Encryption
- Definition: Encoding the contents of the message in such a way that hides
its contents from outsiders
- Goes back to the Roman Empire.
- Without a computer it is easy to break (crack) the code!
- Check the LOCK in your web page!
- Also used in cell phones and cordless phones
- The encrypted message is called the ciphertext.
- The process of retrieving the plaintext from the ciphertext is called
decryption.
- Encryption and decryption usually make use of a key
- Cryptanalysis is the art of breaking ciphers, i.e. retrieving the plaintext
without knowing the proper key
- One popular way is to have a Public-key (PGP)
- The key is based on a HASH value
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 14 / 21 File: lec9chap8f04.doc
Authentication
- Password
- Password card
- Digital signature
- Biometric
o Face scan
o Retina check
o Finger print
o Voice identification
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 15 / 21 File: lec9chap8f04.doc
Purchasing a computer
- Computer category
o Desktop
o Laptop
o Supercomputer
o Internet application
- Basic Component
o CD/DVD – 24/48 X (150 KBps) / 650MB & 4.7 GB
o Modems – 56Kbps
o Network cards - Supporting DSL
o Printer – Ink jet; Laser
o Monitor – LCD, CRT; 17,19,21 inches;
o Processor – Intel; ADM 2.2 GHz
o RAM – 256; 516 MB
o Internet connection – Subscription to ISP, OSP
- Purchasing a laptop
o Screen size
o Processor
o Hard drive size
o Wireless card
o Available software
o Weight
o Memory – RAM
o Disk drive / CD-RW
o Warranty
o Built-in cam
o Backup hard drive
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 16 / 21 File: lec9chap8f04.doc
- Purchasing online
o http://www.dell.com
o Configure your own PC:
? http://www.mypcgoodies.com
?http://www.directpc.ca/index.jsp
o Search for "computer auction"
?http://www.dellauction.com/
o search through eBay: www.ebay.com
?Search for computer, laptop
?You can BID on different items!
o Always check the price online!
o Check your computer configuration:
http://www.pny.com/configurator/config.asp
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 17 / 21 File: lec9chap8f04.doc
Learn more about computers:
PC MAC Reviews/Guides
www.shopper.cnet.com www.store.apple.com www.shopper.cnet.com
www.hp.com www.clubmac.com www.pcworld.com
www.compusa.com www.macx.com www.byte.com
www.dartek.com www.apple.com www.zdnet.com/review
www.dell.com www.eshop.msn.com
www.gateway.com www.macworld.com
www.micron.com
www.global.acer.com
www.fujitsu.com
www.sony.com
- Warranty?
o How expensive is it?
o How many years?
o One time?
o Covers the screen
o Buy back programs! Nothing short of hoax!
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 18 / 21 File: lec9chap8f04.doc
- So what do you use the computer for?
o School (work processing and simple projects)
?Anything works!
o Mostly games
?Lots of memory and fast processor
?Good monitor
?Joysticks, etc.
o Internet / browsing / emailing
?Good connection
o Advance applications (programming)
?Lots of memory and fast processor
o Multimedia (digital photography)
?Lots of memory and fast processor
?Good Sound card - Creative Sound Blaster Audigy 2 ZS Good
?Video card - Quadro4 3000 FX, 256 MB, AGP 8x
? 3-D display capacity
- Processor types
o Pentium
o ADM Athlon XP
o Celeron
- Operating system
o Windows
o Mac
o Unix
- Capability
o RAM size
o Processor speed
o CD ROM/DVD/ CD Write (CDRW)
o Video Card
o Cache
o Modem / drivers
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 19 / 21 File: lec9chap8f04.doc
- Software
o Office
o Acrobat products
o Games
o Some are just free!
- Accessories
o Printer
o Scanner
o Digital camera
- Smart shoppers
o Return policies
o Hidden costs
Check several places and compare prices!
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 20 / 21 File: lec9chap8f04.doc
Quiz
Name two types of system software programs.
Name three examples of operating systems.
What is Virtual Memory? – Where is it?
What is booting? How many types of booting we have?
What is Plug and Play?
Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004
F.Farahmand 21 / 21 File: lec9chap8f04.doc
Quiz
Name two types of system software programs.
What is Encryption?
Why do we COMPRESS files?
Name three examples of operating systems.

More Related Content

PPT
Understanding operating systems 5th ed ch14
PPTX
System Software
PPT
Osup.f inal
PPTX
Operating system-1
PPT
Chapter - 1
PPT
PPTX
OS - Operating System
PDF
02.Os Structure
Understanding operating systems 5th ed ch14
System Software
Osup.f inal
Operating system-1
Chapter - 1
OS - Operating System
02.Os Structure

What's hot (20)

PPT
Unit1 four part basic computer organization
PPT
operating system
PPT
Introduction To operating System:
PPT
Operatig System Tutorial Level3
PDF
System software vt
PPTX
Operating system
PPTX
Computer Organisation
PPTX
1 5 system software and computer management
PPTX
Operating System Case Study and I/O System
DOCX
Unit 20 brief 1 task 2_worksheet
PPTX
Computer softwre
PPT
Ch01 introducing operating systems
DOCX
Operating System Structure (documentation)
PPTX
Computer Literacy Lesson Two
PDF
Operating System
PPTX
booting steps of a computer
Unit1 four part basic computer organization
operating system
Introduction To operating System:
Operatig System Tutorial Level3
System software vt
Operating system
Computer Organisation
1 5 system software and computer management
Operating System Case Study and I/O System
Unit 20 brief 1 task 2_worksheet
Computer softwre
Ch01 introducing operating systems
Operating System Structure (documentation)
Computer Literacy Lesson Two
Operating System
booting steps of a computer
Ad

Viewers also liked (18)

DOC
Cps 189 cps ongoing supervisory case review guide
PDF
2 amicus brief for-grandmother-as-amicus-curiae-in-support-of-appellant
DOCX
Williams v. state
PDF
Man3000
PDF
Lec1chap1f04
PDF
Lec3chap2f04
PDF
Grand families.org --14-state-of-grandfamilies-report-final
DOCX
Objections and corrections draft
DOCX
Class action lawsuit --kenny-a-consent-decree-entered-102805-file-stamped
PDF
Extending foster care_policy_toolkit_5
DOCX
Leslie stewart custody lawyer
PDF
3.9 court review of custodial orders
PDF
Lec45chap4f04
DOC
Cps 455 a safety assessment
PDF
Certori of lower court example of format bring rissler petitioned
DOC
Cps 32 child fatality serious injury report
PDF
Deprivation rules 2014
PDF
Ch06 deprivation-dependency
Cps 189 cps ongoing supervisory case review guide
2 amicus brief for-grandmother-as-amicus-curiae-in-support-of-appellant
Williams v. state
Man3000
Lec1chap1f04
Lec3chap2f04
Grand families.org --14-state-of-grandfamilies-report-final
Objections and corrections draft
Class action lawsuit --kenny-a-consent-decree-entered-102805-file-stamped
Extending foster care_policy_toolkit_5
Leslie stewart custody lawyer
3.9 court review of custodial orders
Lec45chap4f04
Cps 455 a safety assessment
Certori of lower court example of format bring rissler petitioned
Cps 32 child fatality serious injury report
Deprivation rules 2014
Ch06 deprivation-dependency
Ad

Similar to Lec9chap8f04 (20)

PPS
Operatingsystems
PPT
Operating systems
PPTX
Session 1(Concept of operating system).pptx
PPTX
Systems and Applications.pptx
PDF
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
PPT
Itk rawa t____operatingsystems2
PPTX
PT101-WEEK-8-9-Importance-functions-of-Input-output-in-OS-1.pptx
DOCX
PPTX
Operating system of computer
PPT
Cs1 3-operating systems
PPTX
New 04-Program Execution and Operating Systems.pptx
PPT
Introduction to Computer MBA SEM I - Copy (4).ppt
PDF
Introduction to os module 1 pdf operating system
PPT
Notes
PPTX
Introduction to Embedded Linux
PPTX
Amr Chap 08 Operating Systems & Utility Programs
PPTX
Reformat PPT.pptx
PPT
os.ppt
PPTX
Operating system
PPT
Linux fundamentals Training
Operatingsystems
Operating systems
Session 1(Concept of operating system).pptx
Systems and Applications.pptx
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
Itk rawa t____operatingsystems2
PT101-WEEK-8-9-Importance-functions-of-Input-output-in-OS-1.pptx
Operating system of computer
Cs1 3-operating systems
New 04-Program Execution and Operating Systems.pptx
Introduction to Computer MBA SEM I - Copy (4).ppt
Introduction to os module 1 pdf operating system
Notes
Introduction to Embedded Linux
Amr Chap 08 Operating Systems & Utility Programs
Reformat PPT.pptx
os.ppt
Operating system
Linux fundamentals Training

More from screaminc (20)

DOC
07052015 when the empirical base crumbles- the myth that open dependency proc...
DOCX
Georgia court improvement project (cip)
PDF
Juvenile justice delinquency prevention and treatment programs rfp (3)
DOCX
Civil discovery (section 9 11-37)
PDF
Amended+motion+for+new+trial+(pdf)
PDF
Motion for new trial -clu 12-19_14_no_51_14
PDF
Amicus brief-draft-two
PPT
Appealpowerpoint by darice goode
PDF
Juvenile code revised ---hb 242
PPT
Appealpowerpoint
PDF
Uniform juvenile court rules 01 22-13
PDF
March 2015 appeal--s14a1703
DOCX
How to file motion for new trial 07142015
PDF
Narcissistic personality disorder and the dsm–v --miller widigercampbell20101
RTF
Np v state_of_georgia_usa_statement_of_interest
PDF
Changes from dsm iv-tr to dsm-5
DOC
Cps 36 open records request
DOC
Cps 198 i-screen out form-
DOCX
Appeal format
DOCX
A reference manual for department of family and children services case managers
07052015 when the empirical base crumbles- the myth that open dependency proc...
Georgia court improvement project (cip)
Juvenile justice delinquency prevention and treatment programs rfp (3)
Civil discovery (section 9 11-37)
Amended+motion+for+new+trial+(pdf)
Motion for new trial -clu 12-19_14_no_51_14
Amicus brief-draft-two
Appealpowerpoint by darice goode
Juvenile code revised ---hb 242
Appealpowerpoint
Uniform juvenile court rules 01 22-13
March 2015 appeal--s14a1703
How to file motion for new trial 07142015
Narcissistic personality disorder and the dsm–v --miller widigercampbell20101
Np v state_of_georgia_usa_statement_of_interest
Changes from dsm iv-tr to dsm-5
Cps 36 open records request
Cps 198 i-screen out form-
Appeal format
A reference manual for department of family and children services case managers

Recently uploaded (20)

PPTX
Prograce_Present.....ggation_Simple.pptx
PDF
ICT grade for 8. MATATAG curriculum .P2.pdf
PPT
chapter_1_a.ppthduushshwhwbshshshsbbsbsbsbsh
PPTX
Lecture 3b C Library _ ESP32.pptxjfjfjffkkfkfk
PPTX
New professional education PROF-ED-7_103359.pptx
PPT
Hypersensitivity Namisha1111111111-WPS.ppt
PDF
Maxon CINEMA 4D 2025 Crack Free Download Latest Version
PPTX
Wireless and Mobile Backhaul Market.pptx
PPTX
Entre CHtzyshshshshshshshzhhzzhhz 4MSt.pptx
PPTX
Embedded for Artificial Intelligence 1.pptx
DOCX
fsdffdghjjgfxfdghjvhjvgfdfcbchghgghgcbjghf
PPTX
Embeded System for Artificial intelligence 2.pptx
DOCX
A PROPOSAL ON IoT climate sensor 2.docx
PDF
2_STM32&SecureElements2_STM32&SecureElements
PPTX
unit1d-communitypharmacy-240815170017-d032dce8.pptx
PDF
Tcl Scripting for EDA.pdf
PPTX
Operating System Processes_Scheduler OSS
PPTX
"Fundamentals of Digital Image Processing: A Visual Approach"
PPTX
material for studying about lift elevators escalation
PDF
Dozuki_Solution-hardware minimalization.
Prograce_Present.....ggation_Simple.pptx
ICT grade for 8. MATATAG curriculum .P2.pdf
chapter_1_a.ppthduushshwhwbshshshsbbsbsbsbsh
Lecture 3b C Library _ ESP32.pptxjfjfjffkkfkfk
New professional education PROF-ED-7_103359.pptx
Hypersensitivity Namisha1111111111-WPS.ppt
Maxon CINEMA 4D 2025 Crack Free Download Latest Version
Wireless and Mobile Backhaul Market.pptx
Entre CHtzyshshshshshshshzhhzzhhz 4MSt.pptx
Embedded for Artificial Intelligence 1.pptx
fsdffdghjjgfxfdghjvhjvgfdfcbchghgghgcbjghf
Embeded System for Artificial intelligence 2.pptx
A PROPOSAL ON IoT climate sensor 2.docx
2_STM32&SecureElements2_STM32&SecureElements
unit1d-communitypharmacy-240815170017-d032dce8.pptx
Tcl Scripting for EDA.pdf
Operating System Processes_Scheduler OSS
"Fundamentals of Digital Image Processing: A Visual Approach"
material for studying about lift elevators escalation
Dozuki_Solution-hardware minimalization.

Lec9chap8f04

  • 1. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 1 / 21 File: lec9chap8f04.doc General Items: ? Computer security ? Computer purchasing Reading Materials: ? Miscellaneous:
  • 2. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 2 / 21 File: lec9chap8f04.doc Type of software - System Software o programs controlling the operation of the computer and devices ?Operating system programs (platform) ?Utility programs - Application (perform a specific task) o Graphics, Multimedia, Web page designer, Communication software o Designed for a specific OS – some can be cross-platform Operating system (OS) - An OS is a set of programs that coordinate activities between computer hardware resources - Also called software platform - It typically resides in the hardware or ROM - Examples: Windows XP, Mac OS X - Operating System Starting Computer User Interface Managing Programs Configuring Devices Monitoring performance Controlling NetworkOS Functions
  • 3. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 3 / 21 File: lec9chap8f04.doc Basic idea - Not all computers need OS o hardware is fixed, same program is run at all times - Examples: Macintosh, Windows, Unix - Functions: o Manages hardware and software resources o Applications to deal with hardware - Four types: o Real time (very little user-interface capability and no end-user utilities) o Single user-single task (Palm OS - DOS) o Single user-multitask (Desktop) o Multi user (Networking) Computer booting (wakeup-call) - This is one of the basic OS functions - Bootstrap: a program that loads the OS into the RAM - Booting: Computer startup or restarting process o Cold booting or warm booting o Upon booting -> OS instructions are loaded in the RAM o o Kernel: Instructions managing memory and devices, application startups, maintains computer’s clock – Core or OS Operating System Programs: Memory resident (reside in RAM) Example: Kernel Nonresident (reside in hardware)
  • 4. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 4 / 21 File: lec9chap8f04.doc Starting a computer: - Power up - Processor reset, Finding the ROM BIOS chips o Basic Input/Output System (contains startup instructions) o Executes a series of tests to make sure all devices are operational (keyboard, monitor, internal busses, RAM chips, etc.) - BIOS performs the POST: Power-on self test o The result is compared with the information recorded in the CMOS chip o CMOS chip maintains the information about system configuration, memory, other devices o Finds new devices o Detects any device errors - BIOS starts searching for “system files” (drive A, C, CD, etc.) o .COM, .DRV, .DLL, .366, etc. o System files are loaded in the RAM - The KERNEL is loaded in the memory (the operating system takes over!) - The operating system loads the system configuration o System configuration information are in REGISTRY files - Files in the Startup Folder are executed User Interface Interacting with software through user interface - Command line (command language) - Graphical (GUI) – menu, Icons Managing programs - Single user/single tasking - Single user/multitasking o Foreground and background processing - Multi users
  • 5. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 5 / 21 File: lec9chap8f04.doc - Multi processing (supporting two or more processors) o Fault-tolerant computer (duplicated components) Memory Management - Used to optimize the use of RAM o How to distribute data, instructions, programs in different memory locations o Clearing unused memory locations - Virtual memory o Optimizing the RAM o Using hardware disk as additional RAM (called swap file) o Paging: technique of swapping items between memory and hard drive: Swap out (of RAM), Swap in (the RAM) o When paging time is too long -> more RAM is required (Thrashing) – not much execution is going on! Scheduling job - The operating system performs operations (jobs) based on some order - Serving disciplines: FCFS operations, Priority Operations - Buffering: Waiting for available resources - Spooling: o Buffering PRINT jobs (advantage?) o Jobs are QUEUED (stacked) o Print spooler: a program that places jobs in the queue Configuring devices Device drivers are used to communicate with different devices A device driver is a program: how the processor should communicate with a device – Print drivers (*.drv) Installing drivers Plug and play (computer recognizes the device)
  • 6. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 6 / 21 File: lec9chap8f04.doc Monitoring performance - Operating systems can monitor system performance - Uses a performance monitor program (resident or nonresident program?) - Includes: Disk usage, memory usage, processor activities, number of reads and writes to a file – provides a good way to measure your system resources (need more VM?) File management services - Include storage and file management functions - Includes: o Formatting and disk copying ?Formatting: Preparing a disk for reading and writing ?When a disk is formatted it looses all its information o Checking the available storage o Copy, renaming, deleting, moving, creating short cuts Controlling a network - Operating systems can be Network OS (NOS) - Connecting a server and several clients - Sharing resources / resource allocation
  • 7. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 7 / 21 File: lec9chap8f04.doc Types of operating systems DOS: - MS-DOS (Disk Operating System) 1980 - Used for personal computers - IBM Compatibles - Uses Command lines Windows 3.x: - DOS driven program with GUI interface (3.1, 3.11, etc.) - DOS-based OS with GUI operating environment - Not multitasking - Based on 16-bit processors Time DOS Win 3.x Win 95 NT Win 98 Win 2000 Millen XP Home XP Prof. Power/ Integration
  • 8. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 8 / 21 File: lec9chap8f04.doc Windows 95 - Multi tasking OS (not based on DOS) - Uses 32-bit processors - Used for Windows NT Windows Me - Upgrade to 98 - For home users - Optimized for digital photography and movies, audio, web design, home networking Windows XP - Home and professional editions - Movie Maker - Better file sharing - Fast startup - Better security
  • 9. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 9 / 21 File: lec9chap8f04.doc - Types of operating systems: - Stand- alone: Complete OS working on a desktop, notebook, etc. Examples: Window XP, Mac, Linux, UNIX - Network: Designed to support networks, typically reside on the server, - Embedded: Reside on a ROM chip – used for PDAs mobile devices, Examples: Windows CE, .NET, Windows Mobile
  • 10. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 10 / 21 File: lec9chap8f04.doc Type of software - Application (perform a specific task) o Graphics, Multimedia, Web page designer, Communication software - System Software o programs controlling the operation of the computer and devices ?Operating system programs ?Utility programs Utility Programs - A system software that typically manages a computer, its devices or its programs - Utility suites: collection of several utility programs - Examples of utility programs: Norton Utilities, McAfee - Basic utility files: o File viewer: View or copy files o File compression: Shrinks (Zips) the size of a file – PKZIP, PKUNZIP o Diagnostic utility: Compile information about the computer performance and devices - memory usage, processor utilization, etc. o Uninstaller: Utility that removes all the related files, typically embedded in the OS o Scanning files: Moves all unnecessary files, finds some physical and logical problems ?Physical problem: bad disk, scratched CD ?Logical problem: corrupted files
  • 11. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 11 / 21 File: lec9chap8f04.doc o Defragmenting: Organizing the files on the hard drive ?Fragmented file: a files scattered on different sectors on the HD ?Defragmenting: place files on continuous sectors o Backup utility: copy and backup your files ?Program restoration: accessing the backup files ?Using an Internet hard drive o Screen savers: ?Used to be critical to avoid permanent image “etching” on monitor’s screen ?Today mostly used for screen blocking ?Want some cool screen savers? http://www.free-search.com/ -
  • 12. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 12 / 21 File: lec9chap8f04.doc Who are computer hackers? - A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. - One who programs enthusiastically (even obsessively) - A person capable of appreciating hack value. - A person who is good at programming quickly. - An expert at a particular program, or one who frequently does work using it or on it. Basic hacking operations - Piracy (copying and using commercial software purchased by someone else) - Sniffing gather information regarding the status of components of a network system - Attackers (forcing to teardown the system) - And more… Cute hacking - Play with the hidden files - Change system files (boot-up logos) Hacking software - Password stealer (AOL password, windows, etc.) - Sniffers - Cracking tools - Spy tools (monitor all key strokes, and other computer activities)
  • 13. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 13 / 21 File: lec9chap8f04.doc Why do we need computer security? - Thanks to Internet a huge amount of personal information are being exchanged on the net - Credit-card information - Social Security numbers - Private correspondence - Personal details - Sensitive company information - Bank-account information Basic security operations - Encryption - Authentication Encryption - Definition: Encoding the contents of the message in such a way that hides its contents from outsiders - Goes back to the Roman Empire. - Without a computer it is easy to break (crack) the code! - Check the LOCK in your web page! - Also used in cell phones and cordless phones - The encrypted message is called the ciphertext. - The process of retrieving the plaintext from the ciphertext is called decryption. - Encryption and decryption usually make use of a key - Cryptanalysis is the art of breaking ciphers, i.e. retrieving the plaintext without knowing the proper key - One popular way is to have a Public-key (PGP) - The key is based on a HASH value
  • 14. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 14 / 21 File: lec9chap8f04.doc Authentication - Password - Password card - Digital signature - Biometric o Face scan o Retina check o Finger print o Voice identification
  • 15. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 15 / 21 File: lec9chap8f04.doc Purchasing a computer - Computer category o Desktop o Laptop o Supercomputer o Internet application - Basic Component o CD/DVD – 24/48 X (150 KBps) / 650MB & 4.7 GB o Modems – 56Kbps o Network cards - Supporting DSL o Printer – Ink jet; Laser o Monitor – LCD, CRT; 17,19,21 inches; o Processor – Intel; ADM 2.2 GHz o RAM – 256; 516 MB o Internet connection – Subscription to ISP, OSP - Purchasing a laptop o Screen size o Processor o Hard drive size o Wireless card o Available software o Weight o Memory – RAM o Disk drive / CD-RW o Warranty o Built-in cam o Backup hard drive
  • 16. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 16 / 21 File: lec9chap8f04.doc - Purchasing online o http://www.dell.com o Configure your own PC: ? http://www.mypcgoodies.com ?http://www.directpc.ca/index.jsp o Search for "computer auction" ?http://www.dellauction.com/ o search through eBay: www.ebay.com ?Search for computer, laptop ?You can BID on different items! o Always check the price online! o Check your computer configuration: http://www.pny.com/configurator/config.asp
  • 17. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 17 / 21 File: lec9chap8f04.doc Learn more about computers: PC MAC Reviews/Guides www.shopper.cnet.com www.store.apple.com www.shopper.cnet.com www.hp.com www.clubmac.com www.pcworld.com www.compusa.com www.macx.com www.byte.com www.dartek.com www.apple.com www.zdnet.com/review www.dell.com www.eshop.msn.com www.gateway.com www.macworld.com www.micron.com www.global.acer.com www.fujitsu.com www.sony.com - Warranty? o How expensive is it? o How many years? o One time? o Covers the screen o Buy back programs! Nothing short of hoax!
  • 18. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 18 / 21 File: lec9chap8f04.doc - So what do you use the computer for? o School (work processing and simple projects) ?Anything works! o Mostly games ?Lots of memory and fast processor ?Good monitor ?Joysticks, etc. o Internet / browsing / emailing ?Good connection o Advance applications (programming) ?Lots of memory and fast processor o Multimedia (digital photography) ?Lots of memory and fast processor ?Good Sound card - Creative Sound Blaster Audigy 2 ZS Good ?Video card - Quadro4 3000 FX, 256 MB, AGP 8x ? 3-D display capacity - Processor types o Pentium o ADM Athlon XP o Celeron - Operating system o Windows o Mac o Unix - Capability o RAM size o Processor speed o CD ROM/DVD/ CD Write (CDRW) o Video Card o Cache o Modem / drivers
  • 19. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 19 / 21 File: lec9chap8f04.doc - Software o Office o Acrobat products o Games o Some are just free! - Accessories o Printer o Scanner o Digital camera - Smart shoppers o Return policies o Hidden costs Check several places and compare prices!
  • 20. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 20 / 21 File: lec9chap8f04.doc Quiz Name two types of system software programs. Name three examples of operating systems. What is Virtual Memory? – Where is it? What is booting? How many types of booting we have? What is Plug and Play?
  • 21. Lecture 10 / Chapter 8 COSC1300/ITSC 1401/BCIS 1405 10/19/2004 F.Farahmand 21 / 21 File: lec9chap8f04.doc Quiz Name two types of system software programs. What is Encryption? Why do we COMPRESS files? Name three examples of operating systems.