Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware...

33
Antwoine Tuggerson Computer Science 40 Professor Frank Bu; 10 May 2011

Transcript of Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware...

Page 1: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and

Antwoine Tuggerson Computer Science 40 Professor Frank Bu; 

10 May 2011 

Page 2: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and

System So@ware 

•  Consist of the programs that control or maintain the operaCons of the computer and its devices.  

•  Serves as the interface between the user, the applicaCon so@ware, and the computer’s hardware. 

Page 3: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and

OperaCng Systems (OS) 

•  Is a set of programs containing instrucCons that work together to coordinate all the acCviCes among computer hardware resources.  

•  Perform funcCons –  StarCng  –  ShuNng down  –  Providing  a user inference – Managing Memory and Programs etc. 

Page 4: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and

OperaCng System FuncCons 

•  StarCng and shuNng Down  •  StarCng or restarCng a computer is called booCng. 

•  StarCng a computer that has been powered off completely, is called cold boot 

•  RestarCng a computer is called warm boot.  – Warm boot properly closes any running process and programs, however it does not save any unsaved work or data. 

Page 5: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and

Steps of performing a cold boot 

•  Step 1‐ turning on the computer sends an electrical signal to the components 

•  Step 2‐ The charge of electricity causes the processor chip to reset itself and find the ROM chips that contain BIOS. Basic Input/Output Systems 

•  Step 3 BIOS execute a series of test called POST (Power‐On Self Test) 

•  Step 4 POST results are compared with CMOS (Computer metal‐oxide semiconductors) 

Page 6: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and

Steps of performing cold boot 

•  Step 5‐ If the POST  completes successfully, the BIOS searches for specific OperaCng system files called system files. For ex, looks for drives plugged into USB or OpCcal disc drives containing files. 

•  Step 6‐ Once located, the system files load into memory (RAM) from storage and execute. 

•  Step 7‐ OperaCng System loads system configuraCon informaCon. 

Page 7: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and

OperaCng System FuncCons 

•  Boot Drive‐ is the drive from which your personal computer boots (starts).  

•  Boot Disk‐ is a special disk that is used when the hard disk of the operaCng system is damaged or is not working 

Page 8: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and

Providing a User Interface 

•  User interface controls how you enter data and instrucCons and how informaCon is displayed on the screen.  

•  Types of user interfaces are graphical and command‐line.  

Page 9: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and

Graphical User Interface 

•  With a GUI, you can interact with menus and visual images such as bu;ons and other graphical objects to issue commands.  

•  For example, operaCng systems incorporate features such as Web browsers, links, and navigaCon bu;ons. 

Page 10: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and

Command‐Line Interface  

•  A user types commands or presses special keys on the keyboard to enter data and instrucCons. 

•  For example, to configure dives, manage system resources, and troubleshoot network connecCons, network administrators  and other advanced users work with a command‐line interface. 

Page 11: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and

Managing Programs 

•  Single user/single tasking operaCng system allows only one user to run one program at a Cme. 

•  Single user/mulCtasking operaCng system allows a single user to work on two or more programs that reside in memory at the same Cme 

Page 12: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and

Managing Memory 

•  Purpose is to opCmize the use of RAM or random access memory. 

•  The operaCng system allocates, or assigns, data and instrucCons to an area of memory while they are being processed.  

•  Monitors  the content of memory •  The operaCng system releases these items from being monitored in memory when the processor no longer requires them. 

Page 13: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and

CoordinaCng Tasks 

•  The operaCng system determines the order in which tasks are processed.  

•  A task, or job, is an operaCon the processor manages. 

•  This task receiving data from an input device, processing instrucCons, sending informaCon to an output device, and transferring items from storage to memory and from memory to storage.  

Page 14: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and

CoordinaCng Tasks 

•  When devices  are going to become idle, the operaCng system places items in buffers. 

•  Buffer‐ is a segment of memory or storage in which items are placed while waiCng to be transferred from an input/output device.  

•  Spooling‐ sends docs to be printed to a buffer instead of sending them immediately to the printer.   

Page 15: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and

Configuring Devices 

•    Driver‐ short for device driver, is a small program that tells the operaCng system how to communicate with a specific device.  

•  Most OS support Plug and Play, which means the OS automaCcally configures new devices as you install them. 

Page 16: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and

Monitoring Performance 

•  A performance monitor is a program that assesses and reports informaCon about various computer resources and devices 

•  For example, users can monitor the processor, disks, network, and memory usage.  

Page 17: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and

UpdaCng So@ware AutomaCcally 

•  AutomaCc update feature automaCcally provides updates to the program. 

•  With an OS,  these updates can include fixes to program bugs, or errors, enhancements to security, modificaCons to device drivers, access to new or expanded components such as desktop themes or games, and even updates to applicaCon so@ware on the computer such as a Web browser or and e‐mail program. 

Page 18: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and

Administering Security 

•  Computer and network administrators typically have an administrator account that enables them to access all files and programs on the computer or network, install programs, and specify seNng that affect all users on a computer or network. 

•  Manages: Log on, user name or user ID, and even password funcCons 

Page 19: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and

Types of OperaCng Systems 

•  Device‐dependent program is one that runs only on a a specific type or make of a computer. 

•  Proprietary so@ware is privately owned and limited to a specific vendor or computer model. 

•  Device‐independent are operaCng systems that run on computers provided by a variety of manufacturers. Can retain exisCng applicaCon so@ware and data files even if you change computer models or vendors. 

Page 20: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and

Stand‐Alone OperaCng Systems 

•  Is a complete operaCng system that works on a desktop computer, notebook computer, or mobile compuCng device. Some stand‐alone OS are called client OS. 

•  Client OS can operate with or without a network. 

•  Current Stand‐Alone OS: – Windows Vista, Mac OS X, UNIX, and Linux.  

Page 21: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and

Embedded OperaCng Systems 

•  It is an operaCng system on mobile devices and many consumer electronics and resides on a ROM chip. 

•  Includes: – Windows Embedded CE, Windows Mobile, Palm OS, iPhone OS, BlackBerry, embedded Linux, and Symbian OS. 

Page 22: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and

UClity Programs 

•  Also called uClity, is a type of system so@ware that allows a user to perform maintenance‐type tasks, usually related to managing a computer, its devices, or its programs. 

•  Most operaCng systems include several built‐in uClity programs. 

Page 23: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and

File manager 

•  Is a uClity that performs funcCons related to file management.  

•  Folder is a specific named locaCon on a storage medium that contains related documents. 

•  Shortcut is an icon on the desktop or in a folder that provides a user with immediate access to a program or file 

Page 24: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and

Search UClity and Image Viewer 

•  Search UClity‐ is a program that a;empts to locate a file on your computer based on criteria you specify. 

•  Image viewer‐ is a uClity that allows user to display, copy, and print the contents of a graphics file, such as a photo. 

Page 25: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and

Disk Cleanup and defragmenter 

•  Disk cleanup uClity searches for and removes unnecessary files. 

•  Disk Defragmenter‐ is a uClity that reorganizes the files and unused space on a computer’s hard disk so that the operaCng system accesses data more quickly and programs run faster.  

Page 26: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and

Backup and Restore UCliCes 

•  Backup uClity allows users to copy, or back up, selected files or an enCre hard disk to another storage medium such as an external hard disk, opCcal disc, USB flash drive, or tape. 

•  Restore uClity reverses the process and returns backed up files to their original form. 

Page 27: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and

Personal Firewall and AnCvirus Programs 

•  Personal firewall is a uClity that detects and protects a personal computer from unauthorized intrusions. 

•  AnCvirus Programs protects a computer against viruses by idenCfying and removing any computer viruses found in memory, on storage media, or on incoming files.  

Page 28: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and

Spyware and Adware Removers 

•  Spyware and adware removers are programs that detects and deletes spyware and adware. 

•  Spyware is a program placed on a computer w/o the user’s knowledge that secretly collects info about the user, o@en related to Web browsing habits. 

•  Adware is a program that displays an online ad in a banner or pup‐up window on Web pages, email, or any other internet source. 

Page 29: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and

File Compression 

•  File compression uClity shrinks the size of a file(s). 

•  Compressing files frees up room on the storage media and improves system performance.  

•  Compress files, someCmes called zipped files, usually have a .zip extension.  

•  To uncompress or unzip a file, you restore it to its original form. 

Page 30: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and

Media player and disc burning 

•  Media player is a program that allows you to view images and animaCon, listen to audio, and watch video files on your computer. 

•  Disk burning so@ware writes text, graphics, audio, and video files on a recordable or rewritable CD, DVD, or Blu‐ray Disc. 

Page 31: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and

Personal Computer Maintenance 

•  A personal computer maintenance uClity idenCfies and fixes operaCng system problems, detects and repairs disk problems, and includes and capability of improving a computer’s performance. 

Page 32: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and

Summary 

•  This chapter defined an operaCng system and then discussed the funcCons common most operaCng systems. The chapter introduced a variety of stand‐alone operaCng systems, server operaCng systems, and embedded operaCng systems. Finally, the chapter described several uClity programs. 

Page 33: Antwoine Tuggerson Computer Science 40 Professor Frank Bu ...fbutt/cs40.s11/Chap7.pdf · Spyware and Adware Removers • Spyware and adware removers are programs that detects and