KEMBAR78
Week 3 CFP Operating Systems and Utility Programs PDF | PDF | Operating System | Graphical User Interfaces
0% found this document useful (0 votes)
168 views17 pages

Week 3 CFP Operating Systems and Utility Programs PDF

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
168 views17 pages

Week 3 CFP Operating Systems and Utility Programs PDF

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

UNIVERSITY OF SAINT LOUIS

Tuguegarao City

SCHOOL OF ENGINEERING ARCHITECTURE AND


INFORMATION TECHNOLOGY EDUCATION
First Semester
S.Y. 2020-2021

CORRESPONDENCE LEARNING MODULE


ICTE 1012 - Computer Fundamentals and Programming

Prepared by:

Bryan Urita
Instructor

Reviewed by:

Jay Ventura, MIT


Program Chair

Recommended by:

Engr. Ronald Villaverde, ME-ECE, PECE


Academic Dean

Approved by:

Dr. Emmanuel James Pattaguan


VP for Academics
School of Engineering Architecture and Information Technology Education
Computer Engineering Department
Curriculum 2019-2020

CORRESPONDENCE LEARNING MODULE


ICTE 1012 – Computer Fundamentals and Programming

This Weeks’ Time Table: (September 7-11, 2020)

For this week, September 7-11, 2020 of this grading period, the following shall be your guide for the
different lessons and tasks that you need to accomplish. Be patient, read it carefully before
proceeding to the tasks expected of you.

GOOD LUCK! Have Fun!

Weekly Meeting Topics Activities or Tasks


First meeting System software Read the lessons on this
Operating systems module.
Operating system functions
Types of operating systems
Second meeting Stand-alone operating systems Read the lessons on this
Server operating systems module.
Embedded operating systems
Utility programs

ICTE 1012 – Computer Fundamentals and Programming | 2


CORRESPONDENCE LEARNING MODULE
ICTE 1012 – Computer Fundamentals and Programming
SY 2020-2021

Lesson 3: Operating Systems and Utility Programs

Topic: System software


Operating systems
Operating system functions
Types of operating systems
Stand-alone operating systems
Server operating systems
Embedded operating systems
Utility programs

Learning Outcomes: At the end of this module, you are expected to:

1. Discuss the different system software


2. Explain the different functions of Operating system.
3. Summarize the features of several stand-alone operating systems.
4. Identify various server operating systems
5. Describe several embedded operating systems.
6. Explain the purpose of several utility programs.

I. Learning Content

System Software
It consists of the programs that control or maintain the operations of the computer and its devices.
System software serves as the interface between the user, the application software, and the
computer’s hardware. Two types of system software includes Operating Systems and Utility
Programs.

The two types of system software are Operating Systems and Utility Programs.

Operating Systems
An operating system (OS) is a set of
programs containing instructions that work
together to coordinate all the activities
among computer hardware resources.

ICTE 1012 – Computer Fundamentals and Programming | 3


Operating System Functions

Starting and Shutting Down a Computer


Booting is the process of starting or restarting a computer.
Cold boot - turning on a computer that has been powered off completely.
Warm boot - process of using the operating system to restart a computer.

Sleep mode - saves any open documents and programs to RAM, turns off all unneeded
functions, and then places the computer in a low-power state.
Hibernate - saves any open documents and programs to a hard disk before removing
power from the computer.

Providing a User Interface

Graphical User Interface (GUI) - interact with menus and visual images such as buttons
ICTE 1012 – Computer Fundamentals and Programming | 4
and other graphical objects to issue commands.

Command-line Interface - a user types commands or presses special keys on the


keyboard to enter data and instructions

Managing Programs
One function of the operating is
managing computer’s resources
such as CPU, memory, file storage,
I/O devices, and including the
network devices or connections.
Managing computer resources
includes allocating or scheduling
the use of different resources to
avoid conflicts between programs.
Below are the different methods
used by the OS to manage the
computer resources:
1. Single user – single tasking
2. Single user-multitasking
3. Multiuser
4. Multiprocessing

Managing Memory
ICTE 1012 – Computer Fundamentals and Programming | 5
Memory management - to optimize the use of random access memory (RAM). RAM consists
of one or more chips on the motherboard that hold items such as data and instructions while
the processor interprets and executes them.

Virtual memory - a concept in which the operating system allocates a portion of a storage
medium, usually the hard disk, to function as additional RAM.
Coordinating Tasks
This is all about the
determination of the OS
which task, job, are
processed. A multiuser
OS does not always
process tasks on a first-
come, first-served basis
but depending on the
priority of the user.

While waiting for devices


to become idle, the
operating system places
items in buffers. A
buffer is a segment of
memory or storage in
which items are placed
while waiting to be
transferred from an input
device or to an output
device.
The operating system commonly uses buffers with printed documents. This process, called
spooling, sends documents to be printed to a buffer instead of sending them immediately to
the printer.

Configuring Devices
A driver is a small program that tells the OS how to communicate with a specific device. Each
device on a computer has its own specialized set of commands and thus requires its own
specific driver.

If you attach a new device to a computer, such as a printer or scanner, its driver must be
installed before you can use the device. Today, most devices and operating systems support
Plug and Play. Plug and Play means the operating system automatically configures new
devices as you install them. With Plug and Play, a user can plug in a device, turn on the
computer, and then use the device without having to configure the system manually.

ICTE 1012 – Computer Fundamentals and Programming | 6


Establishing an Internet Connection
Operating systems typically provide a means to
establish Internet connections. For example, Windows
includes a Set Up a Connection or Network wizard that
guides users through the process of setting up a
connection between a computer and an Internet access
provider

Monitoring Performance
Operating systems typically contain a performance
monitor. A performance monitor is a program that
assesses and reports information about various
computer resources and devices.
Providing File Management and Other Utilities
Operating systems often provide users with the capability of managing files, searching for files,
viewing images, securing a computer from unauthorized access, uninstalling programs,
cleaning up disks, defragmenting disks, diagnosing problems, backing up files and disks, and
setting up screen savers. A later section in the chapter discusses these and other utilities in
depth.

Updating Software Automatically


An automatic update feature automatically provides updates to the program. With an
operating system, these updates can include fixes to program bugs (errors), enhancements to
security, modifications to device drivers, access to new or expanded components such as
desktop themes or games, and even updates to application software on the computer such as
a Web browser or an e-mail program.

Controlling a Network
Some operating systems are designed to work with a server on a network. A server operating
system is an operating system that organizes and coordinates how multiple users access and
share resources on a network. Resources include hardware, software, data, and information.
For example, a server operating system allows multiple users to share a printer, Internet
access, files, and programs.

ICTE 1012 – Computer Fundamentals and Programming | 7


Administering Security
Computer and network administrators typically have
an administrator account that enables them to
access all files and programs on the computer or
network, install programs, and specify settings that
affect all users on a computer or network.

For each user, the network administrator


establishes a user account, which enables a user to
access, or log on to, a computer or a network.
Each user account typically consists of a user name
and password. A user name, or user ID, is a
unique combination of characters, such as letters of
the alphabet or numbers that identifies one specific
user. A password is a private combination of
characters associated with the user name that
allows access to certain computer resources. Some
operating systems allow the computer or network
administrator to assign passwords to files and
commands, restricting access to only authorized
users.

Types of Operating Systems

Newly purchased computer or


mobile device has an OS
preinstalled.

New versions of OS are usually


backward compatible, i.e., they
recognized and work with
applications software written for
earlier versions. By contrast,
application software may or may
not be upward compatible.

Stand-Alone Operating Systems

A stand-alone operating system is


a complete operating system that
works on a desktop computer,
notebook computer, or mobile
computing device. Some stand-
alone operating systems are
called client operating systems
because they also work in
conjunction with a server
ICTE 1012 – Computer Fundamentals and Programming | 8
operating system.

Windows 10
Windows 10 is Microsoft's Windows successor to Windows 8. Windows 10 debuted on July 29,
2015. This version of Windows features Microsoft Edge, Microsoft's new browser. Any qualified
device (such as tablets, PCs, smartphones and Xbox consoles) can upgrade to Windows 10,
including those with pirated copies of Windows.

Mac OS X
Since it was released with Macintosh computers
in 1984, Apple’s Macintosh operating system
has set the standard for operating system ease
of use and has been the model for most of the
new GUIs developed for non-Macintosh
systems. The version Mac OS X is a
multitasking operating system available only for
computers manufactured by Apple. Apple’s
newest Mac operating system is macOS 10.15,
also known as macOS Catalina. This is the
fifteenth major release of the Mac operating
system.

UNIX
UNIX (pronounced YOU-nix) is a multitasking operating
system. Several versions of this operating system exist,
each slightly different. Although some versions of UNIX
have a command-line interface, most versions of UNIX
offer a graphical user interface. Today, a version of
UNIX is available for most computers of all sizes. Power
users often work with UNIX because of its flexibility and
power.

Linux
Linux is one of the faster growing operating systems.
Linux (pronounced LINN-uks), introduced in 1991, is a
popular, multitasking UNIX-type operating system.
Linux also includes many free programming languages
and utility programs. Linux is not proprietary software
like the operating systems discussed thus far. Instead,
Linux is open source software, which means its code is
available to the public for use, modification, and
redistribution.

Server Operating Systems


A server operating system is an operating system that is designed specifically to support a
network. A server operating system typically resides on a server. The client computers on the
network rely on the server(s) for resources.

ICTE 1012 – Computer Fundamentals and Programming | 9


Following are examples of server operating systems:
 Windows Server 2008 is an upgrade to Windows Server 2003.
 UNIX and Linux often are called multipurpose operating systems because they are both
stand-alone and server operating systems.
 Solaris, a version of UNIX developed by Sun Microsystems, is a server operating system
designed specifically for e-commerce applications.
 Novell’s NetWare is a server operating system designed for client/server networks.

Embedded Operating Systems


The operating system on most mobile devices and many consumer electronics, called an
embedded operating system, resides on a ROM chip. Popular embedded operating systems
include Windows Embedded CE, Windows Mobile, Palm OS, iPhone OS, BlackBerry, Google
Android, embedded Linux, and Symbian OS.

 Windows Embedded CE is a scaled-down Windows operating system designed for use on


communications, entertainment, and computing devices with limited functionality.
 Windows Mobile, an operating system based on Windows Embedded CE, works on
specific types of smart phones and PDAs.
 Palm OS, a competing operating system to Windows Mobile, runs on smart phones and
PDAs.
 iPhone OS is an operating system for the iPhone and iPod touch.
 The BlackBerry operating system runs on handheld devices supplied by RIM (Research In
Motion)
 Google Android is an operating system designed by Google for mobile devices.
 Embedded Linux is a scaled-down Linux operating system designed for smart phones,
PDAs, portable media players, Internet telephones, and many other types of devices and
computers requiring an embedded operating system.
 Symbian OS is an open source multitasking operating system designed for smart phones.

Utility Programs
A utility program, also called a utility, is a type of system software that allows a user to
perform maintenance-type tasks, usually related to managing a computer, its devices, or its
programs.

ICTE 1012 – Computer Fundamentals and Programming | 10


File Manager
A file manager is a utility that performs
functions related to file management. Some of
the file management functions that a file
manager performs are displaying a list of files on
a storage medium; organizing files in folders;
and copying, renaming, deleting, moving, and
sorting files.

A folder is a specific named location on a


storage medium that contains related
documents.

Search Utility
A search utility is a program that attempts to
locate a file on your computer based on criteria
you specify.

Uninstaller
An uninstaller is a utility that removes a program, as well as any associated entries in the
system files. When you install a program, the operating system records the information it
uses to run the software in the system files. The uninstaller deletes files and folders from the
hard disk, as well as removes program entries from the system files.

Image Viewer
An image viewer is a utility that allows users to display,
copy, and print the contents of a graphics file. With an
image viewer, users can see images without having to
open them in a paint or image editing program.

Disk Cleanup
A disk cleanup utility searches for and removes
unnecessary files. Unnecessary files may include
downloaded program files, temporary Internet files,
deleted files, and unused program files.

Disk Defragmenter
A disk defragmenter is a utility that reorganizes the files
and unused space on a computer’s hard disk so that the
operating system accesses data more quickly and
programs run faster.

Fragmentation slows down disk access and thus the


performance of the entire computer. Defragmenting the
disk, or reorganizing it so that the files are stored in
ICTE 1012 – Computer Fundamentals and Programming | 11
contiguous sectors, solves this problem.

Backup and Restore Utilities


A backup utility allows users to copy, or back up,
selected files or an entire hard disk to another
storage medium such as another hard disk, optical
disc, USB flash drive, or tape. Some backup
programs compress or shrink the size of the file
during backup process.

Because they are compressed, you usually cannot


use backup files in their backed up form. In the
event you need to use a backup file, a restore
utility reverses the process and returns backed up
files to their original form. Backup utilities work with
a restore utility.

Screen Saver
A screen saver is a utility that causes a display device’s screen to show a moving image or
blank screen if no keyboard or mouse activity occurs for a specified time. When you press a
key on the keyboard or move the mouse, the screen saver disappears and the screen returns
to the previous state.

Personal Firewall
A personal firewall is a utility that detects and protects a personal computer from
unauthorized intrusions. Personal firewalls constantly monitor all transmissions to and from a
computer.

Antivirus Programs
The term, computer virus, describes a potentially
damaging computer program that affects, or
infects, a computer negatively by altering the way
the computer works without the user’s knowledge
or permission. Once the virus is in a computer, it
can spread throughout and may damage your files
and operating system.

A worm copies itself repeatedly, for example, in


memory or over a network, using up system
resources and possibly shutting the system down.
A Trojan horse hides within or looks like a
legitimate program such as a screen saver. A
certain condition or action usually triggers the
Trojan horse. Unlike a virus or worm, a Trojan
ICTE 1012 – Computer Fundamentals and Programming | 12
horse does not replicate itself.

An antivirus program protects a computer against viruses by identifying and removing any
computer viruses found in memory, on storage media, or on incoming files.

Signs of Virus Infection


 An unusual message or image is displayed on the computer screen
 An unusual sound or music plays randomly
 The available memory is less than what should be available
 A program or fi le suddenly is missing
 An unknown program or fi le mysteriously appears
 The size of a fi le changes without explanation
 A file becomes corrupted
 A program or fi le does not work properly
 System properties change
 The computer operates much slower than usual

Spyware and Adware Removers


Spyware is a program placed on a computer without the user’s knowledge that secretly
collects information about the user, often related to Web browsing habits.

A spyware remover is a program that detects and deletes spyware, and similar programs. An
adware remover is a program that detects and deletes adware.

Internet Filters
Filters are programs that remove or block certain items from being displayed. Four widely used
Internet filters are anti-spam programs, Web filters, phishing filters, and pop-up blockers.

Anti-Spam Programs
Spam is an unsolicited e-mail message or newsgroup posting sent to many recipients
or newsgroups at once. Spam is Internet junk mail. An anti-spam program is a filtering
program that attempts to remove spam before it reaches your inbox. Internet access
providers often filter spam as a service for their subscribers.

Web Filters
Web filtering software is a program that restricts access to certain material on the
Web. Some restrict access to specific Web sites; others filter sites that use certain
words or phrases.

Phishing Filters
Phishing is a scam in which a perpetrator attempts to obtain your personal and/or
financial information. A phishing filter is a program that warns or blocks you from
potentially fraudulent or suspicious Web sites.

Pop-Up Blockers

ICTE 1012 – Computer Fundamentals and Programming | 13


A pop-up ad is an Internet advertisement that suddenly appears in a new window in the
foreground of a Web page displayed in your browser. A pop-up blocker is a filtering
program that stops pop-up ads from displaying on Web pages.

File Compression
A file compression utility shrinks the size of a file(s). A compressed file takes up less storage
space than the original file. Compressing files frees up room on the storage media and
improves system performance.

Compressed files sometimes are called zipped files. When you receive or download a
compressed file, you must uncompress it. To uncompress, or unzip, a file, you restore it to its
original form.

Media Player
A media player is a program that allows you to
view images and animation, listen to audio, and
watch video files on your computer.

Disc Burning
Disc burning software writes text, graphics, audio,
and video files on a recordable or rewritable CD,
DVD, or Blu-ray Disc.

Personal Computer Maintenance


A personal computer maintenance utility
identifies and fixes operating system problems,
detects and repairs disk problems, and includes
the capability of improving a computer’s
performance.

ICTE 1012 – Computer Fundamentals and Programming | 14


II. Evaluation

Instructions: Determine which statements are true with reference to the underlined words or phrases.
If the statement is false, then replace the underlined words or phrases with the correct ones to make
it true.
1. A buffer is a small program that tells the operating system how to communicate with a specific
device.
2. A warm boot is the process of using the operating system to restart a computer.
3. A password is a public combination of characters associated with the user name that allows
access to certain computer resources.
4. The program you currently are using is in the background, and the other programs running
but not in use are in the foreground.
5. Two types of system software are operating systems and application programs.
6. Pocket PCs use Palm OS as their operating system.
7. Examples of embedded operating systems include Windows Server 2008, UNIX, Linux,
Solaris, and NetWare.
8. Mac OS X is a multitasking operating system available only for computers manufactured by
Apple.
9. Aero Flip 3D is a UNIX-type operating system that is open source software.
10. A pop-up blocker shrinks the size of a file(s).

Multiple Choice Select the best answer.

1. Windows users can increase the size of memory through _____, which can allocate available
storage space on removable flash memory devices as additional memory cache.
a. Windows Aero c. Windows ReadyBoost
b. Plug and Play d. a disk defragmenter
2. What enables the computer and network administrators to access all files and programs on the
computer or network, install programs, and specify settings that affect all users on a computer
or network?
a. file manager c. administrator account
b. personal computer maintenance d. graphical user interface
utility
3. How do we call the operating system on most mobile devices and many consumer electronics
which resides on a ROM chip?
a. network operating system c. stand-alone operating system
b. embedded operating system d. stand-alone utility program
4. A _____ is a specific named location on a storage medium that contains related documents.
a. file c. utility
b. buffer d. folder
5. How do we call this program that warns or blocks you from potentially fraudulent or suspicious
Web sites?
a. phishing filter c. Web filter
b. adware remover d. Trojan horse
6. What program allows you to view images and animation, listen to audio, and watch video files
on your computer?
ICTE 1012 – Computer Fundamentals and Programming | 15
a. file manager c. service pack
b. media player d. image viewer
Matching Match the terms with their definitions.
a. a potentially damaging computer program that affects, or infects, a
computer negatively by altering the way, the computer works without the
user’s knowledge or permission
___ 1. sleep b. copies itself repeatedly using up system resources and possibly shutting
mode the system down
___ 2. c. saves any open documents and programs to a hard disk before removing
Hibernate power from the computer
___ 3. worm d. hides within or looks like a legitimate program such as a screen saver
___ 4. Spam e. saves any open documents and programs to RAM, turns off all unneeded
functions, and then places the computer in a low-power state
f. an unsolicited e-mail message or newsgroup posting sent to many
recipients or newsgroups at once
III. Application

Problem Solving: The Problem Solving exercises extend your knowledge of the chapter concepts by
seeking solutions to practical computer problems that you may encounter at home, school, or work.
The Collaboration exercise should be completed with a team. Analyze each problem and briefly
identify the solution to the problem. Do not be too wordy. A simple sentence will do.

Password Required After turning on your computer, it prompts you to type a password to
continue the boot process; however, you forgot the password. What are your next steps to
allow the computer to continue the boot process, start Windows, and access the files on the
hard disk?

Automatic Updates Two or three times per month, your coworker receives a notification on
his computer that the computer recently has been updated. You ask your coworker about
these messages, and he says that Microsoft periodically installs updates automatically to
protect the computer from various threats, as well as to improve performance. You never have
seen this message appear on your computer. Does this mean that your computer does not
update automatically? How can you configure your computer to update automatically?

Antivirus Schedule You recently changed your work schedule so that you work until 6:00 p.m.
instead of 5:00 p.m. At 5:00 p.m. each day, you notice that the antivirus program on your
computer automatically begins scanning all files on your hard disk. This process slows your
computer, and the program usually still is scanning when you leave the office. How can you
change the configuration so that the antivirus program does not start until after you leave?

Learn It Online: The Learn It Online exercises are interactive Web exercises designed to reinforce
and expand your understanding of the chapter concepts. The descriptions below briefly summarize
each exercise.

Exploring Computer Careers


Read about a career as a systems programmer, search for related employment
advertisements, and then answer related questions.

ICTE 1012 – Computer Fundamentals and Programming | 16


Success Did Not Meet Exceed Far Exceed
Meet Expectations
Indicators Expectations Expectations Expectations
The content
The student The content is presented The content is straight
Content did not correct with some examples, clear to the point, clear, and
submit (2) errors in grammar (5) and direct to the no grammar error. (10)
point (7.5)

IV. Rubrics

V. References

E-Book:
Shelly, G.B. & Vermaat, M.E. (2011). Discovering Computers: Living in a Digital World. © 2011
Course Technology, Cengage Learning

Internet Sites:
Windows 10 release information. Retrieved August 31, 2020 from
https://docs.microsoft.com/en-us/windows/release-information/

The History of Windows Operating Systems. Retrieved August 31, 2020 from
https://www.webopedia.com/DidYouKnow/Hardware_Software/history_of_microsoft_windows_oper
ating_system.html

What is the Latest Version of macOS? Retrieved August 31, 2020 from
https://www.howtogeek.com/352753/what-is-the-latest-version-of-macos/

ICTE 1012 – Computer Fundamentals and Programming | 17

You might also like