Operating Systems

In: Computers and Technology

Submitted By family4
Words 496
Pages 2
LDW -Unit 1 Review Exercise
8 points each

1. Explain the difference between operating system software, application software, and utility software.

• Operating system software is the programs that act as the central control program it is the gap between the system and the user. It acts as an intermediary between the applications and the hardware. Examples…..are task management, job management, memory management, and file management. It is the basis foundation for both utility and applications to run.
• Application software includes database programs, word processors and spreadsheets. It a system that is unable to run without the operating system and system utilities. Examples…are Microsoft Windows, DOS, Mac OSX, Unix and Linux. It a program that is dedicated to a single purpose and does not come as a basic requirement.
• Utility software performs actions for protecting, securing and storing information into the system. Examples…..are virus scanners, dish defragmenters, encryption utilities, and backup software. It runs maintenance to assure basic functions of a computer can run accordingly and these features are free.

2. Explain the concept of virtual memory and why it is needed.

It is a backup memory when RAM cannot store all of the information so the hard drive holds it temporarily.

3. What would be a possible cause of disk “thrashing”?

Trashing can be caused by running too many applications over your system.

4. How is the Windows registry organized?

Windows registry is organized in a hierarchical order.

5. How would you change mouse parameters like double-click speed?

You can use the control panel and access/manipulate the mouse parameters.

6. Why should you install updates for Windows XP?

You should install updates regular to keep your PC up to date which can help avoid any types of disasters such as…...

Similar Documents

Operating System Comparison

...If an OS does not support memory, processor, device and file management should it be still considered an OS? What is the minimum features should an OS have to be considered an OS (there is no right answer to this question, and is constantly debated in the industry). Be sure to support your response. An operating system can be thought of as the link between the computer hardware and the software that is used to perform various tasks. Without an operating system the software applications and computer hardware itself cannot function. Each operating system usually consists of several features, among them memory, processor, device and file management but there are also networking features, security and I/O functions to be considered. Due to the similar nature of computer hardware then many operating systems will require most, if not all of those functions. However, from a technical perspective if we examine the interaction between the core computer hardware and the system applications then it is possible to narrow down those functions that can be deemed essential. The core of the operating system, usually known as the kernel, provides the most basic level of control over the hardware. We can assume that the hardware would consist at the very least of a CPU, Memory and various Devices and the kernel would be responsible for managing each of these as required by any user interaction or application request. While this may be a functioning operating system, practically File......

Words: 270 - Pages: 2

Operating System

...American Intercontinental University * Leonel A Silvestre * ITCO211 * File System Hi As your help desk technician I will do everything we can to help you with the operating system problem. Everybody knows what is a Hard Disk or Hard Drive let me refresh your mind, with a simple explanation: Hard Disk/ Drive, is a device for storing and retrieving digital information, primarily computer data. It consists of one or more rigid rapidly rotating discs (platters) coated with magnetic material, and with magnetic heads arranged to write data to the surfaces and read it from them. With that been said, now move forward with Operating System and Hard Disk/ Drive. I would like to recommend you the best operating system is DOS (Disk Operating System), why? Because has everything you need. Let me tell you a little more about DOS. Disk Operating System: Most often abbreviated as DOS, refer to operating system software used in most computers that provides the abstraction and management of secondary storage devices and the information on them (e.g., file systems for organizing files of all sorts). Such software is referred to as a disk operating system when the storage devices it manages are made of rotating platters, such as floppy disks or hard disks. In the early days of microcomputers, computer memory space was often limited, so the disk operating system was an extension of the operating system. This component was only loaded if needed. Otherwise...

Words: 1780 - Pages: 8

Operating System

... how these services should be classified. The National Institute of Standards and Technology (NIST) in the United States has proposed three cloud computing service models as referenced by (Bhattacharjee, Wyld &ump; Maurin, 2010): Software as a Service (SaaS), in which software applications are provided and managed in the cloud by a Cloud Service Provider (CSP). An example of this is Microsoft® Online Services, which offer hosted versions of Microsoft Exchange and Microsoft SharePoint® for use by both public and private organizations. Platform as a Service (PaaS), in which a CSP delivers the underlying infrastructure, including operating systems and storage, and allows organizations to build and run applications using languages and tools provided and supported by the CSP. An example is Microsoft’s Windows Azure™ platform.4 Infrastructure as a Service (IaaS), in which a CSP gives an organization access to basic IT infrastructure (network, hardware, core operating system, and virtualization software) on which the organization can deploy its own applications and data in a virtualized environment, applications that were developed using languages and tools that are not provided or supported by the CSP. Examples include Amazon’s EC2 and Rackspace’s Cloud Servers. Key characteristics of all three models include convenience, cost effectiveness, flexibility, and elasticity—all made possible through the sharing of resources by multiple tenants and by rapid provisioning...

Words: 2090 - Pages: 9

Operating System

...Short Paper: Open Source Operating Systems Linux is one of the modern, free open source operating system provides speed, performance, stability, and reliability comparable to commercial operating systems. Kernel performance, System libraries and System utilities added by Linux open source development community, licensing and compatibility across distributions made Linux successful. (Silberschatz, Galvin, Gagne Wiley & Sons, 2011, page.38) Kernel Performance: The core Linux operating-system kernel is entirely original and implemented as a traditional monolithic kernel for performance reasons. Kernel design is modular enough to allow most drivers to be dynamically loaded and unloaded at run time. The initial kernel does not have networking support, limited device driver’s support and basic virtual memory system included. Kernel is evolved with time by supporting technologies like improved TCP/IP performance, ISDN. Latest kernel supports remotely mount / un-mount volumes, internal kernel threads, loadable modules, automatic loading modules on demand, dynamic kernel configuration at run time, symmetric multiprocessors, and journal file systems. Kernel mode allows a process to be pre-empted while running. (Silberschatz, Galvin, Gagne Wiley & Sons, 2011, page.802) The Linux System: The kernel forms only the core operating system. Kernel is responsible of maintaining all important abstractions of the operating systems including virtual memory and processes. System...

Words: 1110 - Pages: 5

Operating System

...,TheDesignoftheUNIXOperatingSystem,PrenticeHall (1987). [Backetal.2000]G.Back,P.Tullman,L.Stoller,W.C.Hsieh,andJ.Lepreau, "TechniquesfortheDesignofJavaOperatingSystems",2000USENIXAnnual TechnicalConference(2000). [Bakeretal.1991]M.G.Baker,J.H.Hartman,M.D.Kupfer,K.W.Shirriff,and J.K.Ousterhout,"MeasurementsofaDistributedFileSystem",Proceedingsofthe ACMSymposiumonOperatingSystems Principles(1991),pages198-212. [Balakrishnanetal.2003]H.Balakrishnan,M.F.Kaashoek,D.Karger,R.Mor-ris,andI.Stoica,"LookingUpDatainP2PSystems",CommunicationsoftheACM, Volume46,Number2(2003),pages43^8 . [Baldwin2002]J.Baldwin,"LockingintheMultithreadedFreeBSDKernel", USENIXBSD(2002). [Barnes1993]G.Barnes,"AMethodforImplementin gLock-FreeSharedData Structures",ProceedingsoftheACMSymposiumonParallelAlgorithmsandArchi-tectures(1993),pages261-270. [Barrera1991]J.S.Barrera,"AFastMachNetworkIPCImplementation" , ProceedingsoftheUSENIXMachSymposium(1991),pages1-12. Bibliography85 7 [Basuetal.1995]A.Basu,V.Buch,W.Vogels,andT.vonEicken,"U-Net:AUser-LevelNetworkInterfaceforParallelandDistributedComputing",Proceedings oftheACMSymposiumonOperatingSi/stemsPrinciples(1995). [Bayeretal.1978]R.Bayer,R.M.Graham,andG.Seegmuller,editors,Operating Systems-AnAdvancedCourse,SpringerVerlag(1978). [Bays1977]C.Bays,"AComparisonofNext-Fit,First-Fitan dBest-Fit",Commu-nicationsoftheACM,Volume20,Number3(1977),pages191-192. [Belady1966]L.A.Belady,"AStudyofReplacementAlgorithmsforaVirtual-StorageComputer...

Words: 5897 - Pages: 24

Operating System

..., their current status and other attributes. * Process- to mange processes. 3.9 List 3 general categories of information in a process control block. * Process identification- in virtually all operating systems, each process is assigned a unique numeric identifier (index) into the primary process tables. * Process state information-consist of the contents of processor register, while the process is running, the information is in register. When the process is interrupted all the information must be saved. * Process control information- additional information needed by the OS to control coordinate the various active processes. 3.10 Why are two modes (user and kernel) needed? * It’s necessary to protect the OS and key operating system tables, such as process control block form interference by user programs. In the kernel mode, the software has complete control of the processor and all its instructions, register and memory. The level of control IS not necessary and for the safe ty is not desirable for user programs....

Words: 643 - Pages: 3

Operating System

...| | |Introduction to | |Public Relations | | | Unit 1 Unit 1 Introduction to Public Relations Introduction The Public Relations Environment Public relations play an important role in contributing towards mutual understanding among groups and institution in return helping our convoluted society to make decisions and function effectively. It successfully harmonizes private and public policies. Public relations has a significant role in diverse institution of society such as businesses, trade unions, government agencies, voluntary associations, foundations, hospitals, schools, colleges and religious institutions. To flourish or to achieve set targets, these institutions must communicate within or with outer world such as remote employees, members, customers, local communities, share holders and other institutions. The targeted institutional goals can only be achieved if the management knows the mindset and values of their people. The external environment has a great influence on setting up of goals. The public...

Words: 4538 - Pages: 19

Operating System

... users. Changing settings improperly can make the system unstable, cause crashes, or even prevent the computer from booting. The CMOS configuration screen is accessible during the POST phase of boot up, by pressing a key before the operating system initializes. Normally this is the Del key but it might be another. A line of text will indicate which key will take the user into the CMOS or BIOS setup screen. Changes cannot be made from within an operating system such as Microsoft Windows®, but must be made within a true DOS session. There is also an option to protect CMOS settings by requiring a password to change settings. Changes are saved upon exit by pressing the F10 key, then the computer reboots to utilize the new settings. Most motherboard manuals provide a complete list of available CMOS options. These will vary according to motherboard design and BIOS manufacturer. he CMOS is also a computer chip on the motherboard, but more specifically, it is a RAM chip. This is a type of memory chip which stores information about the computer components, as well as various settings for those components and other variables. However, normal RAM chips lose the information stored in them when power is no longer supplied to them. In order to retain the information in the CMOS chip, a CMOS battery on the motherboard supplies constant power to that CMOS chip. If the battery is removed from the motherboard or runs out of juice (e.g. a dead CMOS battery), the CMOS would lose the...

Words: 747 - Pages: 3

Operating System

...Program Execution The purpose of a computer systems is to allow the user to execute programs. So the operating systems provides an environment where the user can conveniently run programs. The user does not have to worry about the memory allocation or multitasking or anything. These things are taken care of by the operating systems. Running a program involves the allocating and deallocating memory, CPU scheduling in case of multiprocess. These functions cannot be given to the user-level programs. So user-level programs cannot help the user to run programs independently without the help from operating systems. I/O Operations Each program requires an input and produces output. This involves the use of I/O. The operating systems hides the user the details of underlying hardware for the I/O. All the user sees is that the I/O has been performed without any details. So the operating systems by providing I/O makes it convenient for the users to run programs. For efficiently and protection users cannot control I/O so this service cannot be provided by user-level programs. File System Manipulation The output of a program may need to be written into new files or input taken from some files. The operating systems provides this service. The user does not have to worry about secondary storage management. User gives a command for reading or writing to a file and sees his her task accomplished. Thus operating systems makes it easier for user programs to accomplished their task...

Words: 557 - Pages: 3

Operating System

.... My home laptop features are Windows 7 and a HD monitor, CD DVD player which can burn music or movies. I can watch and record TV on my laptop, and I can access photo, movies, and videos from a PC running Window. There many others operating systems Windows has like Windows XP, and Windows Vista which don’t meet the requirement to be upgraded to Windows 8. Windows also make operating system for mobile phones such as, Window 7 that replace Windows mobile OS in 2010.Mobile phones and tablets use operating system also like Symbian, BlackBerry, Android OS and HP web OS. Operating system for handheld have some similarity to a desktop like scheduling processor resource, managing memory, loading programs etc. If you are trying to install a new operating system there are a few things you should check for. Where and how to locate the RAM on your computer and the computer name. Do my computer meet the requirements of this new operating system. Check the rating of the operating system and see if it is the right choice for you to install into your computer. One major way to identify the operating system is to watch what operating system shows up on your monitor when you turn on your computer. If Windows is display when you turn on your computer then your operating system is Windows. If an apple icon appear on your screen or monitor then your operating system is Mac OS X. Always check the computer setting or control panel for the RAM....

Words: 534 - Pages: 3

Operating System

... cache. * Cache Coherency in Multiprocessor Environment. Must make sure that an update to the value of A in one cache is immediately reflected in all other caches where A resides. 1.9 * Protection refers to any mechanism for controlling the access of processes or users to the resources defined by a computer system. Security is to defend a system from internal and external attacks. 1.10 * Kernel Data Structures is the fundamental data structures used in OS. 1.11 * Computing Environments 1. Traditional Computing 2. Mobile Computing 3. Distributed Systems 4. Client-Server Computing 5. Peer-to-Peer Computing 6. Virtualization 7. Cloud Computing 8. Real-Time Embedded Systems 1.12 * Operating systems made available in source-code format rather than just binary closed-source...

Words: 380 - Pages: 2

Operating System

...We live in an advanced age. Some of us can't even remember a time when we didn't use a computer on every basis. Technology has been developing rapidly, compare to the past 20 years. In this new era of technology, computers and laptops have the most critical outcome in our lives. It is changing the way we connect, communicate, share data and interacts. But most importantly, the Operating System has a huge impact on any type of PC and smartphones. According to (Capron, 2001), “An Operating System is the fundamental software that has the access to control all other software and hardware resources” (p. 65). It has control of every file, processes, session of memory and device. (Nickerson, 2001) stated, “The most centralized system software is the OS. Without it, PCs would be extremely hard to utilize.” (p. 31). It is specially designed to work for different types of computers. For example: desktop computer, laptop, tablet PC, handheld PC, etc. Generally, a personal computer (PC) is all-purpose computer. The size and the capabilities make it convenient for individuals, and which is intended to be operated directly by an end user. The different types of operating systems are, Windows, Linux, Mac OS, etc. and each of them have different versions. These advances in hardware and software technologies have increased demands for more advanced and better operating systems. Now, compatible companies such as Windows and Apple are coming up with newer generations in the OS field which...

Words: 1560 - Pages: 7

Operating System

...Jerosemin B. Gamboa ZSC 111 - 2ET Assignment: Give some proponents of sociology and their important contributions. Era/ Years | Proponent | Contribution | 1798 - 1857 | Comte, Auguste | August Comte is known as the founder of positivism and is credited with coininging the term sociology. Comte helped shape and expand the field of sociology and placed a great deal of emphasis in his work on systematic observation and social order. | 1818 – 1883 | Marx, Karl | Karl Marx is one of the most famous figures in the founding of sociology. He is known for his theory of historical materialism, which focuses on the way social order, like class structure and hierarchy, emerges out of the economic system of a society. He theorized this relationship as a dialectic between thebase and superstructure of society. Some of his notable works, like "The Manifesto of the Communist Party," were co-written with Friedrich Engels. Much of his theory is contained in the series of volumes titledCapital. Marx has been described as one of the most influential figures in human history, and in a 1999 BBC poll was voted the "thinker of the millennium" by people from around the world. | 1858 - 1917 | Durkheim, Émile | Social Fact, AnomieEmile Durkheim is knows as the "father of sociology" and is a founding figure in the field of sociology. He is credited with making sociology a science. One of his most famous pieces of work includes Suicide: A Study In Sociology, and another important work of...

Words: 949 - Pages: 4

Windows Operating System

...James Windows Operating System Exercise 3.1 1. Summarize the four phases of the Windows boot process in your own words. 2. Over the years, Microsoft has consistently updated the Windows operating system with new versions. Compare and contrast the features of Windows 7 and Windows Vista. 3. The Windows operating system has specific requirements that must be met in order to install it on a PC or mobile device. Which three most important hardware devices must be considered before you install Windows 8, 7, Vista, or XP on a computer? Explain why these three devices are important in general. 4. Mobile computing is the way of the future and so are mobile operating systems. Describe the features and benefits of the two major mobile operating systems, Android and Apple iOS. 1. The first phase would be to power up the computer by pressing the power button, doing so the power button creates an electrical impulse that instructs the motherboard to power on the power supply to begin the computers boot up sequence. The second phase after your initial startup power sequence is the BIOS activates and runs the power-on self-test (POST) that checks the hardware of the computer such as the CPU, RAM, video interface, hard drives, USB interfaces, and other integrated ports and interfaces, making sure everything is working properly, after that the BIOS displays an option for you to press if you choose to enter into the BIOS settings. The third phase of the computer boot up...

Words: 1232 - Pages: 5

Operating System

... LAB 1 : FUNDAMENTALS OF DATABASE MANAGEMENT SYSTEM LEARNING OUTCOMES This lab sheets comprises of activities 1A until 1D By the end of this lab session, you must be able to: * Explain and identify common database management system * Describe the three-schema architecture of DBMS * Describe the client-server architecture of DBMS * Identify the categories of DBMS * Describe the benefits of Desktop database and Server database * Select an appropriate DBMS suitable for a given business requirements * Identify the contribution of database technology to society Activity 1A Databases and DBMS are an essential component of life in modern society: most of usedcounter several activities every day that involve some interaction with a database.For example, if we go to the bank to deposit or withdraw funds, if we make a hotel or airline reservation, if we access a computerized library catalog to search for a bibliographicitem, or if we purchase something online such as a book, toy, or computer chances are that our activities will involve someone or some computer program accessing a database. Even purchasing items at a supermarket often automatically updates the database that holds the inventory of grocery items. 1. Why would you choose a DBMS instead of simply storing data in operating system files? 2. Name few of database names that you know. 3. When would it make sense not to use a DBMS? Activity 1B Diagram 1 1. Describe the three level...

Words: 653 - Pages: 3