Chapter Two Operating System

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 35

Chapter Two

Operating System
What is an operating system ??

Definition :
An Operating System is an interface between user and hardware of a computer system.

Goals of O.S :
• To make the computer system convenient to use.
• To use the computer hardware in an efficient manner.

Purpose of O.S :
The purpose of an operating system is to provide an environment in which a user may
execute programs.
An operating system allows your computer to manage software and perform essential
tasks. It is also a Graphical User Interface (GUI) that allows you to visually interact
with your computer’s functions in a logical, fun, and easy way.
Operating System
 Collection of programs which control the
resources of a computer system
 Written in low-level languages (i.e. machine-
dependent)
 Interface between the users and the hardware
 When the computer is on, OS will first load
into the main memory
Basic functions of the operating system

Device configuration
Controls peripheral devices connected to the computer

File management
Transfers files between main memory and secondary
Operating storage, manages file folders, allocates the secondary
System storage space, and provides file protection and recovery

Memory management
Allocates the use of random access memory (RAM) to
requesting processes

Interface platform
Allows the computer to run other applications
Operating System Functions

• Process management
• Interrupts
• Memory management
• Virtual file system
• Device drivers
• Networking
• Security
• Graphical user interfaces
Graphic User Interface (GUI)
Different Types of Operating System
Good Operating System
• Efficient
• Time spent to execute its programs should be
short
• Small in size
• Memory occupied should be as small as possible
• Reliable
Special Features of OS
• multi-tasking
• multi-programming
• parallel processing
• Buffering
Multi-tasking
• to handle 2 or more programs at the same time from a single user ‘s perception
– CPU can only perform one task at a time, however, it runs so fast that 2 or
more jobs seem to execute at the same time
Multi-programming
• 2 or more programs store in the main memory
at the same time
• when one job reeds to wait (e.g. I/O
operation), CPU switch to another job to
execute
• when the first job finishes waiting, CPU will
get back the first job to execute
What is a file, a folder, and a shortcut
• The basic difference between the two is that files
store data, while folders store files and other folders.
• A shortcut is a link that points to a program on the
computer. Shortcuts allow users to create links to
their programs in any folder, Start bar, Taskbar,
Desktop or other locations on their computer.
Windows 7 system requirements
Architecture 32-bit 64-bit
Processor 1 GHz 32-bit processor 1 GHz 64-bit processor
Memory (RAM) 1 GB of RAM 2 GB of RAM
Graphics Card DirectX 9 graphics processor with WDDM driver model 1.0 (For
Aero)

HDD free space 16 GB of available disk space 20 GB of available disk space

Optical drive DVD drive (only to install from DVD/CD Media)


Flavors of Windows 7

Windows 7 Starter Edition:


Windows 7 Home Basic:
Windows 7 Home Premium:
Windows 7 Professional
Windows 7 Enterprise:
Windows 7 Ultimate:
Windows 8
• Windows 8 was produced by Microsoft for use on
personal computers, including home and business
desktops, laptops, tablets, and home theater PCs.
• Development of this operating system started before
the release of its predecessor in 2009.
• Its existence was first announced in January 2011 at
Consumer Electronics Show.
Minimum hardware requirements for Windows 8 Enterprise edition

Architecture IA-32 (32-bit) x86-64 (64-bit)

Processor 1 GHz (with PAE, NX and SSE2 support)

Memory (RAM) 1 GB 2 GB

DirectX 9 graphics device with WDDM 1.0 or higher


Graphics Card
driver

Storage 20 GB
What is a Virus?
 Computer virus is a software program written with malicious
intentions.
 Computer virus is a harmful software program written
intentionally to enter a computer without the user's permission
or knowledge. It has the ability to replicate itself, thus continuing
to spread. Some viruses do little but replicate, while others can
cause severe harm or adversely affect the program and
performance of the system. A virus should never be assumed
harmless and left on a system.
Indications of virus
• Your computer work slower than it was.
• Your computer freezes frequently or doesn’t open properly
• Your computer restarts in every couple minutes.
• Your system doesn’t work properly and restarts itself
• Applications in your computer doesn’t work properly.
• You cannot reach to discs and drivers
• You cannot print
• You are seeing unusual errors
• You see messed up-shaped menus
Types of Computer Viruses

 There are number of computer viruses that can impede the functioning
of your computer system.
The Spread of Computer Viruses

Computer viruses usually spread in one of three ways: from


removable media; from downloads off the Internet; and from
e-mail attachments.

Although the Internet gets a bad rap as a source of viruses,


you're no more likely to contract a virus from the Web than
you are from packaged software. Still, scan everything you
download, and update your antivirus software regularly.
Why Do People Create Computer
Viruses?

To take control of a computer and use it for specific


tasks
 To generate money
 To steal sensitive information (credit card numbers,
passwords, personal details, data etc.)
 To prove a point, to prove it can be done, to prove ones
skill or for revenge purposes
 To cripple a computer or network
Memory Resident Virus

 These viruses fix themselves in the computer memory and get


activated whenever the OS runs and infects all the files that are then
opened.
 This type of virus hides in the RAM and stays there even after the
malicious code is executed. It gets control over the system memory
and allocate memory blocks through which it runs its own code, and
executes the code when any function is executed.
 Examples: Randex, CMJ, Meve, and MrKlunky
Overwrite Viruses

 A virus of this kind is characterized by the fact that it deletes the


information contained in the files that it infects, totally useless once
they have been infected.
 The virus replaces the file content. However, it does not change the file
size.
 Examples: Way, Trj.Reboot, Trivial.88.D
Boot Sector Virus

 This type of virus affects the boot sector of a hard disk. This is a
crucial part of the disk, in which information of the disk itself is
stored along with a program that makes it possible to boot (start) the
computer from the disk. This type of virus is also called Master
Boot Sector Virus or Master Boot Record Virus.
 It hides in the memory until DOS accesses the floppy disk, and
whichever boot data is accessed, the
virus infects it.
 Examples: Polyboot.B, AntiEXE
Macro Virus

 Macro viruses infect files that are created using certain applications
or programs that contain macros, like .doc, .xls, .pps, .mdb, etc. These
mini-programs make it possible to automate series of operations so
that they are performed as a single action, thereby saving the user
from having to carry them out one by one. These viruses
automatically infect the file that contains macros, and also infects the
templates and documents that the file contains. It is referred to as a
type of e-mail virus.
 These hide in documents that are
shared via e-mail or networks.
 Examples: Relax, Melissa.A, Bablas,
O97M/Y2K
Polymorphic Virus

 Polymorphic viruses encrypt or encode themselves in a different way


(using different algorithms and encryption keys) every time they infect
a system. This makes it impossible for antivirus software to find them
using string or signature searches (because they are different in each
encryption). The virus then goes on to create a large number of copies.
 Examples: Elkern, Marburg, Satan Bug
and Tuareg
Web Scripting Virus

 Many web pages include complex codes in order to create


an interesting and interactive content. This code is often
exploited to bring about certain undesirable actions.
 The main sources of web scripting viruses are the web
browsers or infected web pages.
 Examples: JS.Fortnight is a virus that spreads through
malicious e-mails.
Worms

 A worm is a program very similar to a virus; it has the ability


to self-replicate and can lead to negative effects on your
system. But they can be detected and eliminated by an
antivirus software.
 These generally spread through e-mails and networks. They
do not infect files or damage them, but they replicate so fast
that the entire network may collapse.
 Examples: PSWBugbear.B, Lovgate.F, Trile.C,
Sobig.D, Mapson
Trojans

 Trojan horses: A Trojan horse is simply a


computer program. The program claims to do one
thing (it may claim to be a game) but instead does
damage when you run it (it may erase your hard
disk). Trojan horses have no way to replicate
automatically.
 Examples: Trojan.Vundo
Disadvantages of Viruses

 Format hard disk


 Copy, rename and delete files
 Modify files dates and extensions
 Display false message every few times
 Damage data
 Damage software
Disadvantages od Viruses
 Computer runs slowly
 Random restarts
 Unknown and uninstalled icons on desktop
 Icons change in appearance
 System memory and disk space is reduced
 New windows open up at an alarming rate
 Error messages on regular basis
 Files mysteriously disappear
Computer Anti-Virus

 Antivirus software is a computer program that detects, prevents, and takes


action to disarm or remove malicious software programs, such as viruses
and worms.
 There are certain types of anti-viruses.
Best Computer Anti-Viruses

 There are so many anti-viruses which works against viruses but some
anti-viruses are trusted and are very famous.
Advantages of Anti-Virus

 Protecting Personal Data


If you have an anti virus then you
don’t need to worry
about the virus that it will:
 Format hard disk
 Copy, rename and delete files
 Modify files dates and extensions
 Display false message every few times
 Damage data
 Damage software
 preventing hackers from digging their hooks into your life and
END

You might also like