After studying this lesson, you will have a clear understanding of, Ø

what an Operating System is

Ø

functions of an Operating System

Ø

User Interfaces

Ø

how to use Windows Operating System

5.1 Introduction As a student who studies Information Communication, you may be a frequent user of the computer. If someone asks you the most essential software system for the function of the computer, your answer should be the 'Operating System'. We cannot use the computer without the Operating System. When we activate the computer, the operating system functions automatically, creating the environment necessary for us to use the computer. MS DOS, Windows (XP, ME, Vista, 7) UNIX, Linux and Mac OS can be mentioned as some of the most commonly used operating systems. The main function of a computer operating system is to provide an interface for its users by hiding the complxity of computer hardware and other software so that users can easily access the relevant software. Moreover, the computer operating system should coordinate all the devices to get the maximum benefit out of them. However, the user sees a user-friendly interface as the operating system and does not the internal operations.

96

For free distribution

The relationship between the modern computer system and user can be shown in the following format. User

Utilities

Application Software Operating System Hardware Figure 5.1

The user resorts to Application software and utility software to perform his activities. However, these software cannot work directly with computer hardware. Very often the co-ordination between hardware and software is performed by the operating system. Application Software The software utilized for day to day activities come under Application Software. Eg. Word Processing Software, Spreadsheet Software. Utility Software These are the software that help the user efficiently use the computer. Eg. Anti-virus software, Trouble Shooting Tools/Diagnostic Tools.

Functions of an Operating System The basic functions of an operating system can be divided into five categories: 1. 2. 3. 4. 5. For free distribution

Process Management Memory Management Device Management File Management Security Management 97

1. Memory Management Providing allocations in the memory for various tasks too is another function of an operating system. Computer memory is managed in an organized manner by the operating system when several processes are done simultaneously so that there will be no clash among them. Another function of an operating system is to release the memory to perform a new task when the previous task is totally completed. It is the responsibility of the operating system to manage memory to avoid clashes when there are many users of the computer.

2. Process Management Computer programs are the set of instructions that programmers write in language (eg; C, Java) for the computers to follow. When a program is running in the computer it is called a "process". Process management is a basic function of modern operating systems. However, only one process operates at one time in the Central Processing Unit when several processes are in operation. The processes are activated one at a time in a selected order.

3. Device Management Device Management is another function that has to be performed by the operating system. An operating system has to handle various devices in various ways. Some examples for these can be the hardware segments of a computer system such as the printer. Factors such as the speed of the devices, amount of information, its purpose, direction where information flows, protocol used to transmit information (communication protocol) affect the management of devices. For example, if you want to read a letter in the hard disk, even though accessing the hard disk will appear to be a very simple task, it can be considered a collection of a number of small processes. This task will be fulfilled by the coordination of Input / Output Hardware (I/O Hardware) and Input / Output Software (I/O Software).

98

For free distribution

4. File Management The data/information is stored in secondary storage in the form of 'files'. You may have used them to save information in computer and retrieved those later. It is very important for a computer to save files in a place we want and to manage them properly. The operating system manages the processes of creating, naming, organizing, accessing, using and protecting the files. It gives opportunity to create, copy, move, rename, retrieve and delete files and directories (a collection of files). Another name for a directory is a folder.

5. Security Management The operating system also protects a computer system from external and internal dangers. For example, the use of the user name and the password are two mechanisms used by the operating system to control unauthorized entry into a computer.

5.2

User Interfaces According to the nature of the computer user interface, there are two types. 1. CLI – Command Line Interface 2. GUI – Graphical User Interface

1. CLI – Command Line Interface In the CLI a prompt is found in the screen. The user should type according to the given instructions or special commands here. Command Line Interfaces are found in operating systems such as MS DOS, Unix and Linux. (see Figure 5.2)

For free distribution

99

Figure - 5.2 Ms Dos Interface

2. GUI – Graphical User Interface A graphical interface is used here to make use of the computer easier and simpler for the user. There is no need to keep the commands in mind and the computer can be handled very easily using graphics. The first GUI was designed in 100

For free distribution

1970’s by Xerox Corporation’s Palo Alto Research Centre. With the widespread use of the GUI interface in Apple Macintosh computers, they were introduced in for many operating systems. The following elements can be seen in the operating systems that give GUIs. 1.

Windows

2.

Icons

3.

Menus

4.

Pointer

1. Windows One major facility found in operating systems with GUI (Graphical User Interface) is the varieties of separate windows to perform different requirements. These Windows can be moved here and there on computer screen and their sizes can be changed to suit the requirements. Moreover, they can be minimized and maximized as required.

2. Icons Small pictures which represent commands, files or Windows are called icons. We can operate the commands or software by using these icons.

3. Menu A list of options out of which to choose is called a menu. Very often under the Main Menu Bar there are sub-menus.

4. Pointer The mouse pointer is used to show the place where the mouse is located on the computer screen. Mostly this is shown in the shape of an arrow head.

The Desktop When the computer is switched on the Desktop appears. By using the icons or Taskbar that appears on it, we can perform the required functions (Figure 5.3) For free distribution

101

Windows Title bar

Address bar

Tool bar

Minimize Button

Maximize Button

Icon

Figure 5.3 Graphical User Interface of windows

Advantages of using Graphical User Interface 1. The user can use the menus and icons displayed in a GUI very easily. Not only selecting icons and the menu, but also operating the computer can be done very easily as the pointing device can be moved throughout the computer screen. 2. Even the users who do not have a sound knowledge in handling computers can use the computer using the Graphical User Interface (GUI). 3. Very often by gaining a knowledge of a tooltip that is displayed on the screen describing an icon, it is easy to understand the relevant functions.

102

For free distribution

Close Button

5.3

Files and Folders in the Windows Operating System Windows Explorer

Windows Explorer is the graphical user interface for File Management in Microsoft Windows. This enables us to access files and folders. Further we can access all the storage devices through the same window. You can start the Windows Explorer by selecting the Explorer option from the popup menu by right clicking on the My Computer Icon on the Desktop or pressing the letter ‘E’ with Windows Key (Win key) on the key board or using the start button on the Taskbar. This section is explained according to Windows XP, which is in wide use at present (There can be slight changes in other windows operating systems).

Figure - 5.4 - Windows Explorer Window

The main menu of Windows Explorer will appear on the top of window (Figure 5.4). There are three toolbars below that. They are: For free distribution

103

1. Standard Toolbar 2. Address Bar. 3. Links.

1. Standard Toolbar You can change this as you wish. Some commands can be operated using the tools in this Toolbar. You can change the tools as follows; View è Toolbars

è

Customize

2. Address Bar Apart from accessing internal and external data storages, this enables us to access the outside web pages. The Address Bar can be used as a Command Line as well.

3. Links You can change the links as you wish using the short cuts for the web pages you frequently browse. 1. Explore your folder saved in My Documents using the Address Bar. Assignment 5.1

2. Prepare the Standard Toolbar as you wish.

3. Add the short cuts of the search engines you browse frequently to links tool bar. The area below the toolbars mentioned above is called the data area. This is normally divided into two.

Explorer Bar This is the left, vertical column of the Windows Explorer. This shows a hierarchical view of the storage of your computer. 104

For free distribution

You can see the content of any folder by clicking on + sign which is by the folders. Further, you can collapse the folder by clicking the – sign by the folder. When you click on the main folder or sub folder in Explorer Bar, the content is displayed on the right side of the screen. Drives The storage displayed on the Windows Explorer are as follows: A: and B: show floppy disk drives and then from C: onward represent the storage devices like hard disks, CDs and DVDs. Recycle bin When a file is deleted, it is removed from the hard disk and it goes to the folder called recycle bin. It can be restored if necessary. However, if you delete the file from the recycle bin, you cannot restore the file.

1.Create the folder structure shown below on the desktop. Assignment 5.2

2.

Draw a picture using MS Paint and save it as PaintEx1 in the folder ‘Paint’ you made.

3. Save a copy of PaintEx1 in the 'Documents' folder. 4. Change the file name of PaintEx1 in the folder 'Documents' to 'My picture' 5. Delete 'My picture' in the folder 'Documents' 6. Note down what you can observe in the Recycle Bin.

For free distribution

105

File and File Extensions A file in a hard disk, CD/DVD or devices connected by USB ports are recognized by its file name. The file type can be identified by its extension. For instance, if the file extension is ‘exe’, that file can be executed by double clicking on the file. The file extension ‘doc’, represent a file created by MS word. A dot (.) is used to separate the file name and the file extension.

Prepare a list of file extensions in your computer. Assignment 5.3

For your further knowledge...

Linux Operating System Ken Thompson, Dennis Ritchie and the group created the operating system called UNIX in 1969. Based on the copies issued of UNIX, later on the operating systems such as BSD, Solaris and Mac OS were created. In addition, taking the concepts of UNIX as models, Andrew Tanenbaum created the operating system called Minix to facilitate teaching operating systems to students. After obtaining a computer, Linus Torvalds who was studying computer science at the University of Helsinki used the operating system Minix. As he was not satisfied with that operating system, he started creating his own. Though his creation had similarities with Minix, he did not use programs taken from Minix. This new operating system was named as Linux. Later on, incorporating GNU software created by the Free Software Foundation in Massachusets, Linux Operating system was upgraded to be of a higher standard. Therefore, that operating system is called as GNU/Linux too. 106

For free distribution

From the beginning itself Linux programs were created as a free and open source operating system. It was popular only among friends in the universities and later it became widespread. At the same time software which could be used in Linux operating systems came to be widely developed all over the world. This type of software created to meet the demands of certain people are today competing with the commercial software. Numerous companies and associations in the world amend these software to suit the different needs and release them through internet or in purchasable CD’s. Among these release Ubuntu, Debian, Redhat and Suse have become very popular. They are in two forms such as live CD’s and installed CD’s. Unlike Windows Operating system, there are various interface set-ups created to use in Linux. Among them, Gnome, KDE3, KDE4, XFCE4 and Enlightenment can be stated in the descending order of popularity. Figure 5.5 depicts the screen of Gnome interface setup. Though it was somewhat inconvenient to use Linux for the users in the past, the increasing number of common users at present proves it to be convenient now.

Interface set up of the Gnome Interface Figure 5.5

For free distribution

107

chapter 5.pdf

Memory Management. 3. Device Management. 4. File Management. 5. Security Management. User. Utilities Application Software. Operating System. Hardware.

1MB Sizes 0 Downloads 377 Views

Recommend Documents

Chapter Tour Chapter
Pictures with captions/ Info graphics: Charts and/or maps (page with title):. Biography (People, some info):. Chapter Objectives: Primary Source Documents (Title ...

Chapter 1.2 Chapter 1.4.1
Disk Operating System (DOS). What is DOS, and why learn about it? Microsoft developed the Disk Operating System (DOS) in 1981. DOS, which is sometimes called MS-DOS, was designed for the IBM PC. Windows 98 and Windows. 2000 both support DOS commands

chapter p chapter 1
Write the product in standard form. 5) (3 + 5i)(2 + 9i). 5). Find the product of the complex number and its conjugate. 6) -1 - 5i. 6). CHAPTER 1. Find the domain of ...

CHAPTER ONE
MAPS. 1. The VOC territories in Austronesian-speaking Asia, ca. the 1660s. 2. Indigenous ethno-linguistic groups of Taiwan. 3. Geographic distribution of ...

Chapter 5
not in the domain. The only critical point is x = 0. As x moves away from 0 on either side, the values of y decrease. The function has a local maximum value at (0, ...... (b) Since. ,. dV. dV dr dt dr dt. = we have. 2 . dV dr rh dt dt π. = (c). 2. 2

Chapter 15
373 cancelled each other and there is zero displacement throughout. To put the principle of superposition mathematically, let y1 (x,t) and y2 (x,t) be the displacements due to two wave disturbances in the medium. If the waves arrive in a region simul

Chapter 9
9.1 Introduction. In mathematics, the word, “sequence” is used in much the same way as it is in ordinary English. When we say that a collection of objects is listed ...

Chapter 09
In the late 1700s and early 1800s, he kept notes about his travels .... In 1762, he quit the company. In 1670, the Hudson's Bay Company held trading rights and.

Chapter 15
The most familiar type of waves such as waves on a string, water waves, sound waves, seismic waves, etc. is the so-called mechanical waves. These waves require a medium for propagation, they cannot propagate through vacuum. They involve oscillations

Physics 235 Chapter 3 - 1 - Chapter 3 Oscillations In this Chapter ...
In this Chapter different types of oscillations will be discussed. A particle carrying out oscillatory motion, oscillates around a stable equilibrium position (note: if ...

Chapter 1 – Getting Started Chapter 2 - PSM ... - GCAP CoolCast
What is Garden City Ammonia Program? What is Refrigeration? Why Refrigeration? Why Take an Operator I Course? Is there a Career in the Industrial ...

ACF Central Florida Chapter Named Southeast Region Chapter of the ...
Mar 31, 2016 - Page 1 ... or on Facebook at www. ... Plugrá® European-Style Butter; Vitamix; Ecolab; Allen Brothers; Wisconsin Milk Marketing Board; Atlantic ...

ACF Central Florida Chapter Named Southeast Region Chapter of the ...
Mar 31, 2016 - ... Vitamix; Ecolab; Allen Brothers; Wisconsin Milk Marketing Board; Atlantic Veal & Lamb;. American Technical Publishers; Par-Way Tryson Company; The ... for chefs in the United States, with the Certified Executive Chef®, ... ACF on

Chapter 1 – Getting Started Chapter 2 - PSM ... - GCAP CoolCast
How much Must I Know about Process Safety Management to be an Operator? Are there Any Organizations that Can Help Me in ... “To the Extent they can affect the process” Mean? How do I Properly Document this Training? ... are some Chemical Characte

Chapter 9_86-117p.pdf
These books have Spirit for theme. I shall never ... He said: 'I will make each of them threefold.' He and life .... "My son Bees create honey by gathering the sweet.

Chapter 3
The 4 step numbers in the example below, are also labels ... 3 • 2 = 6 , is just the point 3 on a number line, being scaled by 2 (made twice as far from the origin).

Chapter
order to communicate alarms from patient monitoring and therapeutic ... After implementation of the central application (AM), as specified in the ACM profile,.

Chapter
SPSS (version 12.0, SPSS Inc.) was used for all analysis. .... ence of prehospital ECG predictive of a reduced door-to-balloon time (mean ± SE) by 38.8 ... Lastly, a multivariate logistic regression model was constructed to determine the sig-.

CHAPTER 11 -
Taking a job at Starbucks would mean giving up that $75,000 a year job, the ...... signatures of people who no longer ...... The pagination of this electronic.

Chapter 1
converged to the highest peak because the selective pressure focuses attention to the area of .... thus allowing the formation of non-equal hyper-volume niches. In order to ..... The crossover operator exchanges the architecture of two ANNs in.

Chapter 1
strategy entails, the research findings are difficult to compare. .... rooms (cf. Li 1984; Wu 2001; Yu 2001). Comprehensive Surveys of EFL Learner Behaviours.

Chapter 4
For example, based on historical data, an insurance company could apply ..... ios we explicitly assume that the only goal of data mining is to optimize accuracy.