Week 3 CFP Operating Systems and Utility Programs PDF
Week 3 CFP Operating Systems and Utility Programs PDF
Tuguegarao City
Prepared by:
Bryan Urita
Instructor
Reviewed by:
Recommended by:
Approved by:
For this week, September 7-11, 2020 of this grading period, the following shall be your guide for the
different lessons and tasks that you need to accomplish. Be patient, read it carefully before
proceeding to the tasks expected of you.
Learning Outcomes: At the end of this module, you are expected to:
I. Learning Content
System Software
It consists of the programs that control or maintain the operations of the computer and its devices.
System software serves as the interface between the user, the application software, and the
computer’s hardware. Two types of system software includes Operating Systems and Utility
Programs.
The two types of system software are Operating Systems and Utility Programs.
Operating Systems
An operating system (OS) is a set of
programs containing instructions that work
together to coordinate all the activities
among computer hardware resources.
Sleep mode - saves any open documents and programs to RAM, turns off all unneeded
functions, and then places the computer in a low-power state.
Hibernate - saves any open documents and programs to a hard disk before removing
power from the computer.
Graphical User Interface (GUI) - interact with menus and visual images such as buttons
ICTE 1012 – Computer Fundamentals and Programming | 4
and other graphical objects to issue commands.
Managing Programs
One function of the operating is
managing computer’s resources
such as CPU, memory, file storage,
I/O devices, and including the
network devices or connections.
Managing computer resources
includes allocating or scheduling
the use of different resources to
avoid conflicts between programs.
Below are the different methods
used by the OS to manage the
computer resources:
1. Single user – single tasking
2. Single user-multitasking
3. Multiuser
4. Multiprocessing
Managing Memory
ICTE 1012 – Computer Fundamentals and Programming | 5
Memory management - to optimize the use of random access memory (RAM). RAM consists
of one or more chips on the motherboard that hold items such as data and instructions while
the processor interprets and executes them.
Virtual memory - a concept in which the operating system allocates a portion of a storage
medium, usually the hard disk, to function as additional RAM.
Coordinating Tasks
This is all about the
determination of the OS
which task, job, are
processed. A multiuser
OS does not always
process tasks on a first-
come, first-served basis
but depending on the
priority of the user.
Configuring Devices
A driver is a small program that tells the OS how to communicate with a specific device. Each
device on a computer has its own specialized set of commands and thus requires its own
specific driver.
If you attach a new device to a computer, such as a printer or scanner, its driver must be
installed before you can use the device. Today, most devices and operating systems support
Plug and Play. Plug and Play means the operating system automatically configures new
devices as you install them. With Plug and Play, a user can plug in a device, turn on the
computer, and then use the device without having to configure the system manually.
Monitoring Performance
Operating systems typically contain a performance
monitor. A performance monitor is a program that
assesses and reports information about various
computer resources and devices.
Providing File Management and Other Utilities
Operating systems often provide users with the capability of managing files, searching for files,
viewing images, securing a computer from unauthorized access, uninstalling programs,
cleaning up disks, defragmenting disks, diagnosing problems, backing up files and disks, and
setting up screen savers. A later section in the chapter discusses these and other utilities in
depth.
Controlling a Network
Some operating systems are designed to work with a server on a network. A server operating
system is an operating system that organizes and coordinates how multiple users access and
share resources on a network. Resources include hardware, software, data, and information.
For example, a server operating system allows multiple users to share a printer, Internet
access, files, and programs.
Windows 10
Windows 10 is Microsoft's Windows successor to Windows 8. Windows 10 debuted on July 29,
2015. This version of Windows features Microsoft Edge, Microsoft's new browser. Any qualified
device (such as tablets, PCs, smartphones and Xbox consoles) can upgrade to Windows 10,
including those with pirated copies of Windows.
Mac OS X
Since it was released with Macintosh computers
in 1984, Apple’s Macintosh operating system
has set the standard for operating system ease
of use and has been the model for most of the
new GUIs developed for non-Macintosh
systems. The version Mac OS X is a
multitasking operating system available only for
computers manufactured by Apple. Apple’s
newest Mac operating system is macOS 10.15,
also known as macOS Catalina. This is the
fifteenth major release of the Mac operating
system.
UNIX
UNIX (pronounced YOU-nix) is a multitasking operating
system. Several versions of this operating system exist,
each slightly different. Although some versions of UNIX
have a command-line interface, most versions of UNIX
offer a graphical user interface. Today, a version of
UNIX is available for most computers of all sizes. Power
users often work with UNIX because of its flexibility and
power.
Linux
Linux is one of the faster growing operating systems.
Linux (pronounced LINN-uks), introduced in 1991, is a
popular, multitasking UNIX-type operating system.
Linux also includes many free programming languages
and utility programs. Linux is not proprietary software
like the operating systems discussed thus far. Instead,
Linux is open source software, which means its code is
available to the public for use, modification, and
redistribution.
Utility Programs
A utility program, also called a utility, is a type of system software that allows a user to
perform maintenance-type tasks, usually related to managing a computer, its devices, or its
programs.
Search Utility
A search utility is a program that attempts to
locate a file on your computer based on criteria
you specify.
Uninstaller
An uninstaller is a utility that removes a program, as well as any associated entries in the
system files. When you install a program, the operating system records the information it
uses to run the software in the system files. The uninstaller deletes files and folders from the
hard disk, as well as removes program entries from the system files.
Image Viewer
An image viewer is a utility that allows users to display,
copy, and print the contents of a graphics file. With an
image viewer, users can see images without having to
open them in a paint or image editing program.
Disk Cleanup
A disk cleanup utility searches for and removes
unnecessary files. Unnecessary files may include
downloaded program files, temporary Internet files,
deleted files, and unused program files.
Disk Defragmenter
A disk defragmenter is a utility that reorganizes the files
and unused space on a computer’s hard disk so that the
operating system accesses data more quickly and
programs run faster.
Screen Saver
A screen saver is a utility that causes a display device’s screen to show a moving image or
blank screen if no keyboard or mouse activity occurs for a specified time. When you press a
key on the keyboard or move the mouse, the screen saver disappears and the screen returns
to the previous state.
Personal Firewall
A personal firewall is a utility that detects and protects a personal computer from
unauthorized intrusions. Personal firewalls constantly monitor all transmissions to and from a
computer.
Antivirus Programs
The term, computer virus, describes a potentially
damaging computer program that affects, or
infects, a computer negatively by altering the way
the computer works without the user’s knowledge
or permission. Once the virus is in a computer, it
can spread throughout and may damage your files
and operating system.
An antivirus program protects a computer against viruses by identifying and removing any
computer viruses found in memory, on storage media, or on incoming files.
A spyware remover is a program that detects and deletes spyware, and similar programs. An
adware remover is a program that detects and deletes adware.
Internet Filters
Filters are programs that remove or block certain items from being displayed. Four widely used
Internet filters are anti-spam programs, Web filters, phishing filters, and pop-up blockers.
Anti-Spam Programs
Spam is an unsolicited e-mail message or newsgroup posting sent to many recipients
or newsgroups at once. Spam is Internet junk mail. An anti-spam program is a filtering
program that attempts to remove spam before it reaches your inbox. Internet access
providers often filter spam as a service for their subscribers.
Web Filters
Web filtering software is a program that restricts access to certain material on the
Web. Some restrict access to specific Web sites; others filter sites that use certain
words or phrases.
Phishing Filters
Phishing is a scam in which a perpetrator attempts to obtain your personal and/or
financial information. A phishing filter is a program that warns or blocks you from
potentially fraudulent or suspicious Web sites.
Pop-Up Blockers
File Compression
A file compression utility shrinks the size of a file(s). A compressed file takes up less storage
space than the original file. Compressing files frees up room on the storage media and
improves system performance.
Compressed files sometimes are called zipped files. When you receive or download a
compressed file, you must uncompress it. To uncompress, or unzip, a file, you restore it to its
original form.
Media Player
A media player is a program that allows you to
view images and animation, listen to audio, and
watch video files on your computer.
Disc Burning
Disc burning software writes text, graphics, audio,
and video files on a recordable or rewritable CD,
DVD, or Blu-ray Disc.
Instructions: Determine which statements are true with reference to the underlined words or phrases.
If the statement is false, then replace the underlined words or phrases with the correct ones to make
it true.
1. A buffer is a small program that tells the operating system how to communicate with a specific
device.
2. A warm boot is the process of using the operating system to restart a computer.
3. A password is a public combination of characters associated with the user name that allows
access to certain computer resources.
4. The program you currently are using is in the background, and the other programs running
but not in use are in the foreground.
5. Two types of system software are operating systems and application programs.
6. Pocket PCs use Palm OS as their operating system.
7. Examples of embedded operating systems include Windows Server 2008, UNIX, Linux,
Solaris, and NetWare.
8. Mac OS X is a multitasking operating system available only for computers manufactured by
Apple.
9. Aero Flip 3D is a UNIX-type operating system that is open source software.
10. A pop-up blocker shrinks the size of a file(s).
1. Windows users can increase the size of memory through _____, which can allocate available
storage space on removable flash memory devices as additional memory cache.
a. Windows Aero c. Windows ReadyBoost
b. Plug and Play d. a disk defragmenter
2. What enables the computer and network administrators to access all files and programs on the
computer or network, install programs, and specify settings that affect all users on a computer
or network?
a. file manager c. administrator account
b. personal computer maintenance d. graphical user interface
utility
3. How do we call the operating system on most mobile devices and many consumer electronics
which resides on a ROM chip?
a. network operating system c. stand-alone operating system
b. embedded operating system d. stand-alone utility program
4. A _____ is a specific named location on a storage medium that contains related documents.
a. file c. utility
b. buffer d. folder
5. How do we call this program that warns or blocks you from potentially fraudulent or suspicious
Web sites?
a. phishing filter c. Web filter
b. adware remover d. Trojan horse
6. What program allows you to view images and animation, listen to audio, and watch video files
on your computer?
ICTE 1012 – Computer Fundamentals and Programming | 15
a. file manager c. service pack
b. media player d. image viewer
Matching Match the terms with their definitions.
a. a potentially damaging computer program that affects, or infects, a
computer negatively by altering the way, the computer works without the
user’s knowledge or permission
___ 1. sleep b. copies itself repeatedly using up system resources and possibly shutting
mode the system down
___ 2. c. saves any open documents and programs to a hard disk before removing
Hibernate power from the computer
___ 3. worm d. hides within or looks like a legitimate program such as a screen saver
___ 4. Spam e. saves any open documents and programs to RAM, turns off all unneeded
functions, and then places the computer in a low-power state
f. an unsolicited e-mail message or newsgroup posting sent to many
recipients or newsgroups at once
III. Application
Problem Solving: The Problem Solving exercises extend your knowledge of the chapter concepts by
seeking solutions to practical computer problems that you may encounter at home, school, or work.
The Collaboration exercise should be completed with a team. Analyze each problem and briefly
identify the solution to the problem. Do not be too wordy. A simple sentence will do.
Password Required After turning on your computer, it prompts you to type a password to
continue the boot process; however, you forgot the password. What are your next steps to
allow the computer to continue the boot process, start Windows, and access the files on the
hard disk?
Automatic Updates Two or three times per month, your coworker receives a notification on
his computer that the computer recently has been updated. You ask your coworker about
these messages, and he says that Microsoft periodically installs updates automatically to
protect the computer from various threats, as well as to improve performance. You never have
seen this message appear on your computer. Does this mean that your computer does not
update automatically? How can you configure your computer to update automatically?
Antivirus Schedule You recently changed your work schedule so that you work until 6:00 p.m.
instead of 5:00 p.m. At 5:00 p.m. each day, you notice that the antivirus program on your
computer automatically begins scanning all files on your hard disk. This process slows your
computer, and the program usually still is scanning when you leave the office. How can you
change the configuration so that the antivirus program does not start until after you leave?
Learn It Online: The Learn It Online exercises are interactive Web exercises designed to reinforce
and expand your understanding of the chapter concepts. The descriptions below briefly summarize
each exercise.
IV. Rubrics
V. References
E-Book:
Shelly, G.B. & Vermaat, M.E. (2011). Discovering Computers: Living in a Digital World. © 2011
Course Technology, Cengage Learning
Internet Sites:
Windows 10 release information. Retrieved August 31, 2020 from
https://docs.microsoft.com/en-us/windows/release-information/
The History of Windows Operating Systems. Retrieved August 31, 2020 from
https://www.webopedia.com/DidYouKnow/Hardware_Software/history_of_microsoft_windows_oper
ating_system.html
What is the Latest Version of macOS? Retrieved August 31, 2020 from
https://www.howtogeek.com/352753/what-is-the-latest-version-of-macos/