Download presentation
Presentation is loading. Please wait.
Published byLewis Lester Modified over 9 years ago
1
1 Copyright © 2003 Prentice Hall, Inc Slides created by Bob Koziel Excerpts from Chapter 5
2
Copyright © 2003 Prentice Hall, Inc 2 Chapter 5 System Software: The Operating Environment COMPUTERS IN YOUR FUTURE 2004 COMPUTERS IN YOUR FUTURE 2004 by Bryan Pfaffenberger and Bill Daley Chapter 5 System Software: The Operating Environment What You Will Learn NEXT SLIDE Components of a computer’s system software The importance of an operating system Functions of an operating system What happens when the computer is turned on Types of user interfaces Strengths and weaknesses of the most popular operating system The six essential utilities Data backup procedures
3
Copyright © 2003 Prentice Hall, Inc 3 NEXT SLIDE System Software System software includes all of the programs needed to keep the computer and its peripheral devices running smoothly. Two major categories of system software: Operating system (OS) System utilities
4
Copyright © 2003 Prentice Hall, Inc 4 NEXT SLIDE The Operating System (OS) The operating system is a set of programs that perform certain basic functions. The functions of the operating system are: Starting the computer Managing programs Distributing memory Coordinating the processor and peripheral devices Enabling user interaction with the computer
5
Copyright © 2003 Prentice Hall, Inc 5 NEXT SLIDE Starting the Computer The cold booting process begins when the power is turned on. There are several steps to a cold boot: 1.ROM loads BIOS (basic input/output system) into the computer’s memory. 2.BIOS conducts a Power-on self-test (POST) to check the input/output system for operability. 3.BIOS searches for the OS. Settings in the CMOS (complementary metal-oxide semiconductor) determine where to look for the OS. 4.The kernel ( the essential OS components) is loaded into memory from storage. 5.OS takes control of the computer.
6
Copyright © 2003 Prentice Hall, Inc 6 NEXT SLIDE Configuring the System 1.The system is configured from the OS’s registry. 2.Drivers and utility programs are loaded into memory. 3.System utilities (volume control, antivirus software, etc.) are loaded into memory. 4.Authentication or user login occurs. 5.User interface begins, enabling user interaction with computer programs.
7
Copyright © 2003 Prentice Hall, Inc 7 NEXT SLIDE Managing Programs Single-tasking systems run one application program at a time. Multitasking operating systems have the ability to run more than one application program at a time. Multitasking is accomplished by: Foreground application– Active program or program in use Background application– Inactive program or program not in use
8
Copyright © 2003 Prentice Hall, Inc 8 NEXT SLIDE Types of Multitasking Cooperative– Foreground program controls CPU and relinquishes it when closed. This causes the computer to “freeze” or “hang.” Preemptive– Gives the OS control of the CPU when a program stops running. Multithreading– Enables the computer to perform more than one task in a program. Each task is a thread. Multiprocessing– One computer uses two or more processors at the same time. It sends tasks to other computers.
9
Copyright © 2003 Prentice Hall, Inc 9 Background Application Foreground Application NEXT SLIDE Example of Multitasking
10
Copyright © 2003 Prentice Hall, Inc 10 NEXT SLIDE Managing Memory The operating system allocates memory area for each running program. It keeps programs from interfering with each other. The OS uses virtual memory as an extension of RAM. Pages of data and instructions are swapped between RAM and the hard drive if RAM is full. The OS works with the direct memory access (DMA) controller to permit peripherals access to RAM.
11
Copyright © 2003 Prentice Hall, Inc 11 NEXT SLIDE Managing Virtual Memory
12
Copyright © 2003 Prentice Hall, Inc 12 Handling Input and Output Input and output devices generate interrupts or signals that tell the OS that something has happened. The OS provides interrupt handlers or mini-programs that begin when an interrupt occurs. Interrupt request (IRQ) lines handle the communications between input/output devices and the CPU. An IRQ conflict occurs when two devices try to use the same IRQ line causing system instability. Peripheral devices require their own input/output port. Input/output conflicts occur when two devices try to use the same port. NEXT SLIDE
13
Copyright © 2003 Prentice Hall, Inc 13 NEXT SLIDE Providing the User Interface The user interface is that part of the operating system that enables the user to interact with it. Two types of user interfaces: Command-line– Requires the user to type keywords or commands to enter data or give instructions. Graphical user interface (GUI)– Uses a graphics environment made up of objects, icons, buttons and menus. The user is able to use a pointing device (mouse, joystick, etc.) or keyboard to enter data and issue commands.
14
Copyright © 2003 Prentice Hall, Inc 14 NEXT SLIDE Command-Line Interface
15
Copyright © 2003 Prentice Hall, Inc 15 NEXT SLIDE Graphical User Interface (GUI)
16
Copyright © 2003 Prentice Hall, Inc 16 MS-DOS WINDOWS XPMAC OS LINUXUNIX NEXT SLIDE Popular Operating Systems
17
Copyright © 2003 Prentice Hall, Inc 17 NEXT SLIDE UNIX Developed by AT&T in 1970s First preemptive multitasking system Developed concepts of file management and path names Client/server networking system Widely used by corporations
18
Copyright © 2003 Prentice Hall, Inc 18 NEXT SLIDE MS-DOS Developed for IBM PCs in 1981 Uses command-line interface Use is diminishing
19
Copyright © 2003 Prentice Hall, Inc 19 NEXT SLIDE MAC OS First to use graphical user interface in 1984 Easiest operating system for beginners
20
Copyright © 2003 Prentice Hall, Inc 20 NEXT SLIDE Windows 3.X Includes Windows 3.0, 3.1, 3.11, and Windows for Workgroups 3.1 Not a true operating system Uses cooperative multitasking
21
Copyright © 2003 Prentice Hall, Inc 21 NEXT SLIDE Windows 95 and 98 Windows 95 True operating system Uses preemptive multitasking Downward compatible with DOS Considered a transitional system Windows 98 Improved version of Windows 95 More stable than Windows 95
22
Copyright © 2003 Prentice Hall, Inc 22 NEXT SLIDE Windows CE System used in PDAs or palmtops Runs simplified versions of Windows programs Data can be transferred to PCs Includes handwriting and speech recognition
23
Copyright © 2003 Prentice Hall, Inc 23 NEXT SLIDE Windows NT Designed for client/server systems Two components: Windows NT Workstation Windows NT Server Oriented to business needs Offers security, remote administration, directory services, and server
24
Copyright © 2003 Prentice Hall, Inc 24 NEXT SLIDE Windows 2000 Two versions: Microsoft Windows 2000 Professional Microsoft Windows 2000 Server Better stability and more features than Windows NT
25
Copyright © 2003 Prentice Hall, Inc 25 NEXT SLIDE Windows XP Replaces all previous versions of Windows Three versions: Windows XP Home Edition Windows XP Professional Windows XP Server
26
Copyright © 2003 Prentice Hall, Inc 26 NEXT SLIDE Linux Developed in 1991 by UNIX Competes with Windows and MAC Powerful and free Growing fast in acceptance Uses Apache web server
27
Copyright © 2003 Prentice Hall, Inc 27 NEXT SLIDE System Utilities System utilities are programs that help the operating system manage the computer system’s resources. Types of utilities: File management File finders Backup utilities Antivirus software File compression Disk scanning File defragmentation
28
Copyright © 2003 Prentice Hall, Inc 28 NEXT SLIDE File Management Utilities Known as a file manager. Enables the user to perform various tasks with files, folders, and directories on storage devices. Tasks include: Creating folders Saving, deleting, copying, and moving files and folders Examining the contents of files Launching application programs
29
Copyright © 2003 Prentice Hall, Inc 29 NEXT SLIDE File Finders File finders are programs that enable the user to find files on a storage device.
30
Copyright © 2003 Prentice Hall, Inc 30 NEXT SLIDE Backup Utilities Backup utilities are programs that enable the user to copy data from the hard disk to another storage medium.
31
Copyright © 2003 Prentice Hall, Inc 31 NEXT SLIDE Antivirus Software Antivirus software protects the computer from computer viruses.
32
Copyright © 2003 Prentice Hall, Inc 32 NEXT SLIDE File Compression Utility A file compression utility reduces the size of a file.
33
Copyright © 2003 Prentice Hall, Inc 33 NEXT SLIDE Disk Scanning Utility A disk scanning utility is a program that detects and fixes physical and logical problems on storage devices.
34
Copyright © 2003 Prentice Hall, Inc 34 NEXT SLIDE File Defragmentation Utility A file defragmentation utility is a program that moves data on a storage device to improve performance.
35
Copyright © 2003 Prentice Hall, Inc 35 NEXT SLIDE Chapter 5 Summary 1.An operating system manages programs, memory, and input/output devices, and it also provides a means of communicating with the user. 2.Multitasking enables you to work with more than one program at a time. 3.The basic types of interfaces are command-line and graphical user interface. 4.MAC OS introduced the GUI to personal computing. 1.An operating system manages programs, memory, and input/output devices, and it also provides a means of communicating with the user. 2.Multitasking enables you to work with more than one program at a time. 3.The basic types of interfaces are command-line and graphical user interface. 4.MAC OS introduced the GUI to personal computing.
36
Copyright © 2003 Prentice Hall, Inc 36 NEXT SLIDE Chapter 5 Summary cont. 5.There are many versions of Microsoft Windows. A.Windows 3X B.Windows 95 C.Windows 98 D.Windows NT E.Windows 2000 F.Windows CE G.Windows XP 6.System utilities include: A.Backup programs B.File managers C.File finders D.Disk scanning programs E.Antivirus software F.File compression utilities G.Defragmentation programs 5.There are many versions of Microsoft Windows. A.Windows 3X B.Windows 95 C.Windows 98 D.Windows NT E.Windows 2000 F.Windows CE G.Windows XP 6.System utilities include: A.Backup programs B.File managers C.File finders D.Disk scanning programs E.Antivirus software F.File compression utilities G.Defragmentation programs
37
Copyright © 2003 Prentice Hall, Inc 37 THE END
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.