Presentation is loading. Please wait.

Presentation is loading. Please wait.

System Software Chapter 5

Similar presentations


Presentation on theme: "System Software Chapter 5"— Presentation transcript:

1 System Software Chapter 5
Welcome to Chapter 5 of Visualizing Technology, fifth edition, by Debra Geoghan. This chapter discusses operating systems and disk utility software. Chapter 5 System Software <#>

2 Copyright © 2017 Pearson Education, Inc.
Objectives Explain What an Operating System Does Compare Desktop Operating Systems Configure a Desktop Operating System Compare Specialized Operating Systems Compare the Most Common Network Operating Systems List and Explain Important Utility Software Chapter 5 Objectives Are: Explain What An Operating System Does Compare Desktop Operating Systems Configure A Desktop Operating System Compare Specialized Operating Systems Compare The Most Common Network Operating Systems List And Explain Important Utility Software Copyright © 2017 Pearson Education, Inc. <#>

3 Explain What an Operating System Does
Objective 1 explains what an operating system does and how it manages and controls hardware and interacts with software. Objective 1 Copyright © 2017 Pearson Education, Inc. <#>

4 Copyright © 2017 Pearson Education, Inc.
System Software System software Software that makes the computer run Operating system Most important type of system software Provides user with the interface to communicate with hardware and other software A personal computer is useless without an operating system The operating system, often called the OS, is the most important type of system software because it provides the user with the interface to communicate with hardware and other software on the computer and manages system resources. A computer cannot run without an operating system installed. Objective 1 Copyright © 2017 Pearson Education, Inc. <#>

5 Modern Operating System
Provides User interface (GUI) Manages resources (multitasking) Controls hardware (PnP) Interacts with software (API) Modern operating systems have a graphical user interface (GUI), which uses point-and-click. The operating system manages the allocation of resources to hardware and software. Today’s operating systems control many peripheral devices and communicate with hardware through device drivers; the Plug and Play (PnP) feature allows you to easily add peripherals. The application programming interface (API) lets applications request services, such as a request to print or save a file, from the operating system. Objective 1 Copyright © 2017 Pearson Education, Inc. <#>

6 Compare Desktop Operating Systems
Objective 2 compares desktop operating systems found on PCs today. Objective 2 Copyright © 2017 Pearson Education, Inc. <#>

7 Compare Desktop Operating Systems Microsoft Windows
Most common desktop operating system Approximately 20 percent of PCs run a version of Windows Windows 8 introduced a totally new interface The most common desktop operating system is Microsoft Windows. About 90 percent of personal computers are running a version of Windows. Versions from 1985 to the present are shown on this slide. Objective 2 Copyright © 2017 Pearson Education, Inc. <#>

8 Compare Desktop Operating Systems Mac OS X
First released in 1984; used a GUI; called Mac system software OS X operating system released in 2001 Current version is OS X El Capitan Apple introduced its first Macintosh computer in This system introduced the graphical user interface (GUI) and was called Mac system software. The OS X operating system was released in 2001. Objective 2 Copyright © 2017 Pearson Education, Inc. <#>

9 Compare Desktop Operating Systems Linux
Open source – the code is publicly available Developed in 1991 by Linus Torvalds Does not have a single version but many distributions (distros) Linux was developed in 1991 by Linus Torvalds. Unlike Windows and Mac, Linux does not refer to a single version but many distributions or “distros.” Linux operating system software is open source. Open source is software that has its source code published and made available to the public. This enables anyone to copy, modify, and redistribute it without paying fees. Objective 2 Copyright © 2017 Pearson Education, Inc. <#>

10 Configure a Desktop Operating System
Objective 3 discusses how to configure your desktop operating system to make your system more secure, more efficient, and more personalized. Objective 3 Copyright © 2017 Pearson Education, Inc. <#>

11 Configure a Desktop Operating System Configuring Your OS
Settings charm - displays settings, help, and info for the current app PC settings – enables the configuring of user accounts and accessibility Control Panel – options to configure a monitor, or troubleshoot settings, hardware, and software Swipe in from the top-right of the screen and click or tap the Settings charm. The Settings charm displays settings and help for the app you are currently using. PC settings enable you to change many common settings on your system and configure user accounts, privacy settings, and accessibility settings. The Control Panel gives you more options to configure, monitor, or troubleshoot settings, hardware, and software. Objective 3 Copyright © 2017 Pearson Education, Inc.

12 Configure a Desktop Operating System System Preferences for a Mac
System Preferences are accessed through the Apple menu or the icon on the dock System Preferences in OS X are grouped into rows Preferences configure hardware settings, user accounts, and customize the way your computer looks and responds System Preferences in OS X are grouped into rows. You can configure hardware settings, user accounts, and customize the way your computer looks and responds. Objective 3 Copyright © 2017 Pearson Education, Inc.

13 Configure a Desktop Operating System User Accounts
Four types of Windows accounts: Standard account - for everyday computing Child account – a standard account with Family Safety turned on by default Administrator account – making global changes, installing software, and configuring settings Guest account – for temporary access Share your devices among users by creating separate user accounts, which grant each user access to a computer system and enable you to keep your files private and set restrictions on what other users can do. There are four types of Windows accounts: standard, child, administrator, and guest. Objective 3 Copyright © 2017 Pearson Education, Inc.

14 Compare Specialized Operating Systems
Objective 4 compares specialized operating system such as embedded and mobile operating systems. Objective 4 Copyright © 2017 Pearson Education, Inc. <#>

15 Specialized Operating Systems Embedded vs. Mobile Operating Systems
Specialized and limited functions Installed in: GPS devices ATM machines Communication systems Car entertainment systems Mobile Full-featured Installed in: Smartphones Tablets An embedded operating system is a specialized operating system that runs GPS devices, cable boxes, ATMs, and car communication and entertainment systems. Mobile devices such as smartphones and tablets run embedded mobile operating systems, which are more full-featured. Objective 4 Copyright © 2017 Pearson Education, Inc. <#>

16 Specialized Operating Systems Smartphone Operating Systems
Apple iOS: Proprietary - found only on Apple devices Google Android: Linux kernel Found on devices by many companies Microsoft Windows Phone: Based on Windows Embedded CE Smartphones have embedded operating systems, each with unique features. The Apple iOS is proprietary and found only on iPhones. Microsoft Windows Phone is based on the Windows Embedded CE. It is found on devices made by many companies, as is the Google Android, which has a Linux kernel. All of these operating systems include touch-screen support, , and web browsers. Objective 4 Copyright © 2017 Pearson Education, Inc. <#>

17 Compare the Most Common Network Operating Systems
Objective 5 discusses the four major network operating systems: Windows Server, Linux, UNIX, Apache Web Server, and Novell. Objective 5 Copyright © 2017 Pearson Education, Inc. <#>

18 Network Operating Systems
A network operating system (NOS) is a multiuser operating system that controls the software and hardware running on a network. The NOS allows multiple computers—clients—to communicate with the server and each other to share resources, run applications, and send messages. The NOS provides services such as file and print services, communication services, Internet, and services. Modern network operating systems include: Windows Server, Linux, UNIX, Apache Web Server, and Novell. Objective 5 Copyright © 2017 Pearson Education, Inc. <#>

19 Copyright © 2017 Pearson Education, Inc.
Types of Networks Client-server – a network in which, upon login, the user gets access to centralized services like printers and file storage School network Peer-to-peer – a network that does not require a NOS; files and services are shared but not centralized Home network Centralized resources and security make a client-server network indispensable in a business setting. When a client logs in to a network, the appropriate resources appear in the client’s environment. A peer-to-peer network does not have centralized services; files and services are shared but not centralized. This is the type of most home networks. Objective 5 Copyright © 2017 Pearson Education, Inc. <#>

20 List and Explain Important Utility Software
Objective 6 discusses the importance and the characteristics of the Windows and OS X operating system utility software. Objective 6 Copyright © 2017 Pearson Education, Inc. <#>

21 Important Utility Software Disk Utility Software
Hard disk drives Can be very large and hold a lot of information Important to keep your disks healthy to protect your files Formatting a disk Stores files in clusters (consisting of one or more sectors) on the hard drive Sets up the file system Hard disk drives today are very large and can hold a lot of information. It is important to keep your disks healthy to keep your system running efficiently and to protect your files. When a disk is first formatted to hold files, a set of concentric circles called tracks are created. The disk is then divided up like a pie into sectors. Files are stored in blocks of these sectors, called clusters. Objective 6 Copyright © 2017 Pearson Education, Inc. <#>

22 Important Utility Software Windows Utility Software
Check Disk Monitors health of the file system on a disk Optimize Drives Rearranges fragmented files to improve efficiency Disk Cleanup Looks for files that can be safely deleted to free up disk space Windows includes disk utilities to help maintain your computer. Disk checking utilities monitor the health of the file system on a disk. Files that are fragmented are broken into pieces and stored in nonadjacent or noncontiguous clusters on the disk, known as file fragmentation. The Optimize Drives tool arranges the fragmented files to de-clutter and improve efficiency. Disk Cleanup looks for files that can be safely deleted to free up disk space. Objective 6 Copyright © 2017 Pearson Education, Inc. <#>

23 Important Utility Software OS X Utility Software
Disk Utility Used to get information about the disks on your computer Verify and repair a disk HRS+ file system OS X’s HFS+ file system guards against fragmentation Macs rarely need to be defragmented OS X does not include a defragmenter utility No need for disk cleanup Macs have daily, weekly, and monthly maintenance scripts OS X comes with Disk Utility, accessible from the Utilities folder in the Launcher. Use this utility to get information about the disks on your computer and to verify and repair a disk with which you are having trouble. Macs rarely need to have a hard drive defragmented due to system safeguards. Additionally, a Mac does not need a disk cleanup utility as it has daily, weekly, and monthly maintenance scripts that run automatically. Objective 6 Copyright © 2017 Pearson Education, Inc. <#>

24 Important Utility Software Security Software
Firewall Blocks unauthorized access to a computer Antivirus Programs Protects against viruses, Trojan horses, worms, and spyware Antispyware software Prevents adware and spyware infections Malware Software designed to be harmful or malicious Security software is also considered utility software and includes firewalls, antivirus programs, and antispyware software. A firewall blocks unauthorized access to a computer. Antivirus programs protect against viruses, Trojan horses, worms, and spyware. Antispyware prevents adware and spyware infections. Malware is not security software but a general term for any software designed to be harmful or malicious. Objective 6 Copyright © 2017 Pearson Education, Inc. <#>

25 Copyright © 2017 Pearson Education, Inc.
Questions Are there any questions? Copyright © 2017 Pearson Education, Inc.

26 Copyright © 2017 Pearson Education, Inc.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America. Copyright © 2017 Pearson Education, Inc.


Download ppt "System Software Chapter 5"

Similar presentations


Ads by Google