ENG03 - Operating Systems
ENG03 - Operating Systems
Operating systems
freedigitalphotos.net
In all large corporations, there is a pervasive fear that someone, somewhere is having fun with a computer on company time.
Networks help alleviate that fear.
John C. Dvorak
Overview
Estos son los objetivos y contenidos de esta unidad
OBJETIVOS
CONTENIDOS
Gramática Vocabulario
An operating system is a collection of software that manages computer hardware resources and provides common services
for computer programs. The operating system is a vital component of the system software in a computer system. Application
programs require an operating system to function. Most operating systems perform similar functions that include starting and
shutting down a computer, providing a user interface, managing programs and memory, coordinating tasks, configuring
devices, stablishing an Internet connection, monitoring performance, providing file management and other utilities, and
automatically updating itself and certain utility programs.
Different sizes of computers typically use different operating systems because operating systems generally are written to run
on a specific type of computer. For example, a mainframe computer does not use the same operating system as a personal
computer. Even the same types of computers, such as desktop computers, may not use the same operating system. Some,
however, can run multiple operating systems.
GCFLearnFree.org®
Self-assessment
Some terms are commonly used and have definitions that are easy to understand. Others are less common and their
definitions include more advanced terminology. Here you have some examples:
To load the first piece of software that starts a computer. Since the operating system is essential
for
Boot
running all other programs, it is usually the first piece of software loaded into the computer
Clipboard A clipboard is a temporary storage area for data that the user wants to copy from one place to another.
Remote
It is the ability to get access to a computer or a network from a remote distance.
access
Safe
It is an alternate boot method for Windows operating systems that makes it easier to diagnose problems.
mode
Task In computer programming, a basic unit of programming that an operating system controls.
Utility A small program that provides an addition to the capabilities provided by the operating system.
Pronounced wih-jit. It is a generic term for the part of a GUI that allows the user to interface with the
Widget
application and operating system.
Wizard A wizard is a computer utility designed to simplify the execution of lengthy or complicated tasks.
Self-assessment
Now, try to find the right definition for each term. Here you have a good dictionary for this terminology in case you
need help.
TERM DEFINITION
b. The state of a computer, usually determined by which programs are running and
BIOS
basic hardware and software characteristics.
f. The essential center of a computer operating system, the core that provides basic
driver
services for all other parts of the operating system.
h. A computer program that provides services to other computer programs (and their
executable
users) in the same or other computers.
j. Acronym for basic input/output system. It manages data flow between the
kernel computer's operating system and attached devices such as the hard disk, keyboard,
mouse or printer .
ENG03- Operating Systems 04/04/2018 Página 4 de 30
k. Acronym for The Real-time Operating system Nucleus. It is a set of interfaces and
network design guidelines (a set of software design specifications) for creating the computer
code that will become the kernel.
l. A particular kind of file that is capable of being executed or run as a program in the
server
computer.
n. The background pattern or picture against which desktop menus, icons, and other
wallpaper
elements are displayed and moved around.
Submit
freedigitalphotos.net
http://bagas.adi.luhung.students-blog.undip.ac.id/
http://computer.yourdictionary.com/program-manager
Memory management
The essential requirement of memory management is to provi
allocate portions of memory to programs at their request,
www.it.uu.se/edu/course/homepage/os/vt06/overview
Configuring devices
Another function of an operating system is handling input a
enabling communication with input and output devices. Most o
with drivers for popular input and output devices.
When you start the computer, the OS loads each device driv
device, its driver must be installed before you can use the de
OSs support Plug and Play (the OS automatically configure
install them).
windows-7/configuring-device-installation-settings
File management
The operating system also provides users with the capability of
files and directories saved or retrieved from a computer disk
system allows the user to perform such tasks as creating
renaming files, coping and moving files, and deleting files
keeps track of where files are located on the hard drive through
thebrain.com/beyond-hierarchies/
Revise
Contrast clauses
You use contrast clauses when you want to make two statements, one of which contrasts with the other or makes
it appear unexpected or surprising. Some contrast clauses - called concessive clauses - are introduced by
conjunctions such as although, even though, though, whereas, while.
Although many different operating systems exist for different types of computers, most of them provide similar
functions.
We can also use despite or in spite of to make a contrast. These are followed by either a noun phrase or an ‘ing’
form.
If you want a clause to follow despite or in spite of you must add the fact that.
although
though +
sentence
even though
in spite of
+
noun phrase or "ing" form
despite
Revise
Other words or expressions that can be used to express concession or contrast include: however, nevertheless
(very formal), anyhow (informal), in any case (informal), on the other hand (formal).
Commas are used to separate these expressions from the sentence or within a sentence.
Examples:
The new procedures which have been implemented, are not problem-free. They have, however, improved the
efficiency of the department
On the other hand, project performance and outputs were deemed to be the responsibility of the work group
Translate these sentences. Notice that they all contain a contrast expression.
1. Even if the drive is not being actively written to or read from, most operating systems do a lot of accesses to the
system disk in the background. (storage.toshiba.eu)
2. Although your knowledge of operating systems and different types of media is quite good, you should intensify
your studies on networks.
3. In spite of being protected by antivirus software, the operating system got infected by a trojan.
4. However, international students are using social networks to enhance their learning experience.
Show Feedback
We have already learned that operating systems create a link between users and the
applications and that they form the core of computer systems.
There are different types of operating systems and here, we will have a look at how
they differ from one another. Within the broad family
of operating systems, there are
several types, categorized based on the
types of computers they control and the sort of
applications they support. Clearly, the precise nature of an operating system will
depend on the application in which it is to be used.
1. Operating Systems for Real-time: These types of OS are used to control machinery,
control systems and industrial systems and
have very less or in certain case no user-
interface capability. Some examples are: control of nuclear power plants, chemical
processing and air traffic control systems.
2. Operating Systems for Single User, Single Task: This is a typical computer system
where one user can work effectively only on one task. Cell phones and palm tops are
examples where these types of systems are used.
3. Operating Systems for Single User, Multi-tasking: Computer Operating Systems of desktops or laptops typically fall
within this category. Here, the user can use several applications at a time.
4. Operating Systems for Multi-User: Here, various users use the computer system through different terminal and the
Operating Systems on that computer has to balance multiple users with multiple applications
5. Embedded operating systems are designed to be used in embedded computer systems. They are designed to operate
on small machines like PDAs with less autonomy. They are able to operate with a limited number of resources. They are very
compact and extremely efficient by design. Windows CE and Minix 3 are some examples of embedded operating systems.
Self-assessment
Read the text and then, choose the right answer to complete the sentences below:
1.The type of an operating system will be mainly based on the type of computer they control and on ...
a. the hardware
2. Operating systems for Real Time are systems designed to control ...
a. machinery
b. industrial systems
c. Both of them
3. A ... operating system allows various users to run programs at the same time.
a. multi-user
b. single-user
c. real time
4.This operating system allows the execution of multiple tasks at one time.
a. single-tasking
b. multi-tasking
c. Neither of them
In previous sections of the unit we have read that one of the main tasks
of the operating system is to control the hardware,
among others. It also provides the basic user interface.
To be stable.
To be multi-task (do several different things at once),
To be powerful (be able to deal with large hard disks, lots of files, and large amounts of RAM)
To be secure (so that hackers and viruses cannot damage it). And, last but not least,
To be user-friendly (so that users can do what they want in a simple uncomplicated way).
Perhaps the most popular OS today is Microsoft Windows, which has about 85% of the market share for PCs and about 30%
of the market share for servers. But there are many more operating systems out there besides the various versions of
Windows, and each one is optimized to perform some tasks better than others. Free BSD, Solaris, Linux and Mac OS X are
some good examples of non-Windows operating systems.
Adapted from:http://www.english-online.org.uk/comp.htm
Reading activity
MICROSOFT WINDOWS
Find words and expressions in the text with the following definitions:
was deficient in
Show Feedback
Since it was released, it has established the standard for operating system ease of use
and has been the model for many of the following GUIs elaborated for systems that did not
belong to Macintosh.
http://www.muylinux.com/2010/11/24/
UNIX (pronounced YOUnix) is a multitasking, multi-user computer operating system originally developed in the early 70's
by a group of scientists at Bell Labs.
During the late 1970s and early 1980s, the influence of Unix in academic
circles led to large-scale adoption of Unix by
commercial startups, like for example: Solaris.
Several versions of this operating system exist, each with small differences. Most of them offer a graphical user interface.
Today Unix-like operating systems such as MINIX, Linux, and BSD descendants are commonly encountered. The term
traditional Unix may be used to describe an operating system that has the characteristics of either Version 7 Unix or UNIX
System V.
Some of the most significant advantages of UNIX systems are:
Unix is more flexible and can be installed on many different types of computers, such as: main-frame computers,
supercomputers and micro-computers.
Unix is more stable and does not go down as often as Windows does, therefore requires less administration and
maintenance.
After reading both texts, decide if these statements are TRUE or FALSE.
1. Mac OS is known to have familiarized the use of graphical user interface
True. False.
2. The original Mac OS had no name
True. False.
3. Mac OS is not a simple operating system to use
True. False.
4. In contrast to Mac OS, Mac OS X can be used in computers which have not been manufactured by Apple
True. False.
5. Mac OS X Lion in the last version of this operating system
True. False.
6. A group of scientists created UNIX at the beginning of the 70s
True. False.
7. All versions of UNIX offer GUI
True. False.
8. Linux is a Unix-like operating system
True. False.
LINUX
Wikimedia Commons
Linux is a multi-tasking Unix-like computer operating system assembled under the model of free and open source
ENG03- Operating Systems 04/04/2018 Página 13 de 30
software
development and distribution. The defining component of Linux is the Linux kernel, an operating system kernel first
released 5 October 1991 by Linus Torvalds.
Linux was originally developed as a free operating system for Intel x86-based personal computers. It has since been ported
to more computer hardware platforms than any other operating system. It is a leading operating system on servers and other
systems such as mainframe computers and supercomputers.
Linux also runs on embedded systems, such as mobile phones, tablet computers, network routers, televisions and
video game consoles; the Android system in wide use on mobile devices is built on the Linux kernel.
The development of Linux is one of the most prominent examples of free and open source software collaboration: the
underlying source code may be used, modified, and distributed-commercially or non-commercially-by anyone under licenses
such as the GNU General Public License. Many programmers have dedicated time to modify and redistribute Linux to
make it the best possible version of UNIX.
Some popular mainstream Linux distributions include Debian (and its derivatives such as Ubuntu), Fedora and openSUSE.
Self-assessment
Read the text and choose the best meaning for each word. Pay attention to context!
1. Assembled
a. met
b. grouped
c. encountered
2. Development
a. origin
b. creation
c. evolution
3. Defining
a. distinctive
b. regular
c. credible
4. Ported
a. taken
b. transferred
c. ordered
5. Platform
a. pulpit
b. stage
c. program
6. Leading
a. preeminent
b. winning
c. capital
Exercise
Use the table below and try to complete each gap with the information required.
FIRST LAST LAST TARGET
NAME MAKER FREE SECURITY
RELEASE VERSION RELEASE SYSTEM
PC
OS X Apple Inc 2001 10.8 2012 NO ipfirewall
*WS
*Workstation
You can find information in: http://en.wikipedia.org/wiki/Comparison_of_operating_systems
Show Feedback
Achieving good computer security could seem like a really hard task.
Fortunately, following a few
simple steps you can get a good
measure of
security in very little time.
2) Install security patches. At least monthly, you must check for and
apply updates for all software you use.
7) Avoid P2P and distributed filesharing. There are quite a lot of filesharing networks. Most
are free. And all are rife with
trojans, viruses, worms, **adware, spyware, and
every other form of imaginable malicious code .There's no such thing as
safe
anonymous filesharing. Avoid it like the plague: it is a must.
8) Keep abreast of Internet scams. Criminals think of clever ways to separate you from
your hard earned cash. Don't get
fooled by emails telling sad stories, or
making unsolicited job offers, or promising lotto winnings. Likewise, beware of
email
masquerading as a security concern from your bank or other eCommerce site..
Exercise
Find words in the text above that have something to do with security.
Show Feedback
A step ahead
ENG03- Operating Systems 04/04/2018 Página 16 de 30
The expression Malware, is a combination of the words malicious software. It is software created to damage or
alter the computer data or its operations. There are four main types:
Spyware. It is software installed on computers that collects information about users without their
knowledge. The presence of spyware
is typically hidden from the user and can be difficult to detect. It often
enters a computer when a user installs a new program.
Revise
REMEMBER: We use a reflexive pronoun when the subject and the object of the sentence are the same:
REMEMBER: Unlike Spanish, reflexive pronouns are not used after common verbs like:
feel, relax,
concentrate, dress, wash, shave, meet, complain, hurry up,
get up, sit down, stand up, lie down, wake up,
remember, worry.
If you need some more explanations about this topic, have a look here
freedigitalphotos.net
If you think your computer may be infected, take all necessary steps to clear your system and avoid infecting other
computers. You will
just need anti-virus softwares
Instructions:
1. You must be cautious about what disks and files you accept from other people.
2. You mustn't reuse disks that have been in other computers, don't download files from insecure sites, and
don't open e-mail attachments unless you are expecting them. Be wary of messages and attachments, even
from people you know, with vague subject lines and contents, such as 'Check this' or 'See these pics!!!'
3. You should obtain an antivirus program to more safely share disks, download files from the Internet and
open e-mail attachments.
4. If your system gets a virus, visit your virus-scan software manufacturer's Web site and install any virus
updates that are available. Then, run the software. The software may not be able to delete the virus, but it may
be able to identify it.
5. Search the Web for information about your specific virus by typing the name of the virus into a search
engine, followed by the word 'virus.' For example, Melissa virus,' 'Bubble Boy virus,' and so on.
6. You can download and install any software patches or other programs that will help you eliminate the virus.
You can also follow any instructions you find on deleting the virus manually.
7. Run another virus scan to make sure the virus was deleted
8. Employ extra caution when you receive attachments that end in the commonly used extensions .doc, .exe,
.com, .xls or .ppt. Never open attachments that end in .vbs or .js, since a typical user doesn't have to open
these files.
obligation, present
must Users must install legal software
and future
Exercise
A.- A Trojan virus is a faulty computer program that can infect remote computers by changing the desktop or
deleting important files. Generally
called a Trojan Horse, it may appear as a legitimate file or software from
a
trusted source, in other words: tricking users into opening it or downloading it. Users must take action and should
protect their personal computer files by learning to delete this Trojan virus.
B.-Common viruses work by attaching themselves to real programs. A general virus may
be so small that in most
cases its victims have no idea it is hidden within their downloaded program. As the user opens their download
program to install it, the virus also opens and installs secretly. The virus then has to use the computers internal
system to replicate itself and hide throughout the computer. Viruses can do everything from hijack your operating
system, to completely wiping your hard disk. You mustn't be unaware of these dangers.
http://www.ehow.com/how-does
Show Feedback
Practice
In case you need to revise modal verbs again, watch this video
Practice
Say if
the following statements are true or false:
2.- Modal
verbs go before a verb in the simple form.
3.- You
can't use 'to' after any modal verb.
4.- Would
isn't the past tense of will
Click here
Self-assessment
Submit
Spam is a new word that is used to define unsolicited email. A recent survey showed that office workers in Europe an The
USA spend 20 minutes a day deleting spam when they open their Email programs every morning. It is not legal to send
spam, but it is so common that it is not easy to fight it. Most Spam tries to sell all kinds of products, like online medicines,
surgery to enlarge certain parts of your body, all kind of fake certificates, some spammers even sell university degrees. Spam
can also be dangerous because it can contain a virus than will infect your computer, so, as a rule, you must never open an
email you don't know who is coming from. There are some filters nowadays that stop some spam. But they are not 100%
effective.
Because the barrier to entry is so low, spams are numerous, and the volume of unsolicited mail has become very high. In the
year 2011, the estimated figure for spam messages is around seven trillion. The costs, such as lost productivity and fraud,
are borne by the public and by Internet service providers. Spamming has been the subject of legislation
in many jurisdictions.
A step ahead
According to the Internet Society and other sources, the term spam
is derived from the 1970 Spam sketch of the BBC television
comedy series Monty Python's Flying Circus.The
sketch is set in
a cafe where nearly every item on the menu includes Spam canned luncheon meat. As the waiter recites the
Spam-filled menu, a
chorus of Viking patrons drowns out all conversations with a song repeating "Spam, Spam,
Spam, Spam... lovely Spam! wonderful Spam!", hence "Spamming" the dialog.The excessive amount of Spam
mentioned in the sketch is a reference to the preponderance of imported canned meat products in the United
Kingdom, particularly a brand of tinned ham (Spiced ham = SPAM) from the USA, in the years after World War II,
as the country struggled to rebuild its agricultural base. Spam captured a large slice of the British market within
lower economic classes and became a byword among British children of the 1960s for low-grade fodder
due to its
commonality, monotonous taste and cheap price - hence the humour of the Python sketch.
It later came to be used on Usenet to mean excessive multiple posting-the repeated posting of the same message.
The unwanted message would appear in many if not all newsgroups, just as Spam appeared in nearly all the menu
ENG03- Operating Systems 04/04/2018 Página 21 de 30
items in the Monty Python sketch.
Have some fun and watch the video of the Monty Python spam sketch
https://www.youtube.com/watch?v=anwy2MPT5RE
The more you clean up your email, the faster it grows. Receiving Spam email is
not only annoying, inconvenient, and sometimes expensive, it could also cause
you to completely have everything on your computer deleted. Spam is difficult to
control, even if you block the sender. They just use a different email address.
There is another method to try,
that with patience will get these spammers
stopped.
There are several ways you can do this, but here you can find some tips to help
you clean up your email
STEPS
Paste the full headers into the box and press "Process Spam",
or just send the headers to the email address given
to you above the box. If you send it, wait for an email (unless you are using Quick Reporting) and click on the link in it.
*What is SpamCop?:SpamCop is the premier service for reporting spam. SpamCop determines the origin of unwanted email
and reports it to the relevant Internet service providers. By reporting spam, you have a positive impact on the problem.
Reporting unsolicited email also helps feed spam filtering systems, including, but
not limited to, SpamCop's own service.
There are many programs that will automatically report your spam for you, saving a lot of time.
Warnings
*Header: the first section of a message that contains information about the content and transmission of the message
including the sending and destination addresses (encabezado)
Adapted from: http://www.wikihow.com/Fight-Spam
www.onlineconnectit.com/
Exercise
After watching the video again, match the first part of the sentences on the left to the second part on the right
6. There are four main things f. in an electronic format sent to your inbox
Show Feedback
Watch the second part of the video and complete the paragraphs with the expressions below:
- Don't give your email address to unreliable sources. Avoid
to free offers that are sent to
you or that
on your browser screen. They are designed to capture your address.
This is like
your mobile number to strangers on the street.
If you have to
for services on the internet, make sure you take the
box to say you
don't want to be contacted by third parties.
- Spam protection from you ISP. Your internet service provider can also provide a level of protection
.
Content 3 Networks
A computer network is a system in which computers, servers, mainframes, network devices, peripherals, or various other
devices are connected to share information and resources. A
great example of a network is the Internet, connecting millions
of people all over the world together
Networks may be classified according to a wide variety of characteristics: geographical area, topology, protocol, scale,
hardware and associated software technology, or design.
you can connect a printer or a scanner, to one computer and let other
computers of the network print or scan, to that printer or scanner
you can create files and store them in one computer, then access those files
from other computers connected to it
Photo:freedigitalphotos.net
A step ahead
Network Protocol. The communication language used by computer devices is called the protocol. Network
protocols like HTTP, TCP/IP, and SMTP provide a foundation that
much of the Internet is built on.
Photo:freedigitalphotos.net
Self-assessment
http://youtu.be/TVvEheZVwdg
Watch the video again and say if these statements are TRUE or FALSE
1.The main purpose of a computer network is to share information between one computer to another
True. False.
2. LAN stands for Legal Area Network
True. False.
3. A MAN network covers more than 30 miles in size
True. False.
ENG03- Operating Systems 04/04/2018 Página 25 de 30
4. The Internet is the biggest WAN network we have out there
True. False.
5. A node is anything attached to a computer
True. False.
6. Communication media is the way nodes are connected
True. False.
The term phrasal verb is commonly applied to a verb in combination with a preposition/adverb that has a meaning
different from the original verb.
For example, the verb to give means = to provide, to present. But the verb to give + up (preposition) means = to surrender.
Here you have a list of the most common phrasal verbs, and below a list of the phrasal verbs commonly used in STE.
A step ahead
If a computer boots up, or if someone boots a computer up, it is turned on so that it is ready to
Boot up
use.
Connect up
To join something (e.g. telephone, computer) to the main supply of power or to the main system.
Dial up To dial a number that connects a computer with an Internet service provider
To get into someone else's computer system without permission in order to look at information
Hack into
or do something illegal.
Key in To type in
Pull down To click on a word or item that opens up a list of options or functions.
Scroll down
To move a page down
Switch/Turn To shut down an operation, to stop the flow of energy by the use of a button or switch.
off
Type out/up To produce a copy of something you have written by typing it into a computer or by using a
typewriter.
Wipe out To remove information stored on part of a computer (esp. memory, hard disk)
Self-assessment
1. I will ask my brother to help me
my new email account.
3. I will
a copy of the document for each one of us.
5. I forgot to
the printer, so obviously it didn't work.
6. You should
the files just in case.
7.
the web address. It will take you to the site you are looking for.
8.
the page and you will see the name of the web designer.
9. Don't
the computer, I'm going to use it.
10.
to your internet service provider for help.
Submit
Exercise
Revise some of the terms you have studied in the unit and find the right definitions for them.
b. a software program that runs on your computer; for example: email programs, web-browsers or word
processors, etc.
f. software programs that add functionality to your computer, such as: antivirus, backup, or security programs.
h. the base or foundation of the operating system which provides the most basic services, like memory
management for example.
j. a software program that enables a specific hardware device to work with a computer's operating system.
Required for peripherals or video cards.
k. copyrighted software given away for free by the author, although he retains the copyright.
l. software that communicates with the hardware and allows other programs to run.
ñ. abbreviation for Wireless Fidelity. A set of standards for radio-based wireless networks
o. part of an operating system that lets the user interact with a computer using graphic images and a cursor.
Show Feedback
Exercise
1. [...] between two computers that aren't already on the same network but are in the same room, you can create a
computer-to-computer network,
also known as an ad hoc network.
windows.microsoft.com
2. They have developed a computer network through INTERNET to exchange information and believe that with a
good communication system an effective technical assistance programme can be realized.
unjiu.org
3. Verizon specifically does not authorize the use of its proprietary computers, servers, routers and computer
network (the "Verizon Network")
to accept, transmit or distribute unsolicited bulk e-mail sent from the
Internet to
Verizon subscribers (or to others).
my.verizon.com
4. We note that, in the current period of globalization, information technology and the rapid development of new
telecommunication and computer network systems have been accompanied by the abuse of those technologies
for criminal purposes.
daccess-ods.un.org
5. It is your responsibility to back up all software and data that is stored on your computer's hard disk drive(s)
and/or on any other storage
devices you may have, in advance of permitting a professional to perform services on
your personal computer or personal computer network.
europa.eu
Show Feedback
Self-assessment
3.
I use your mobile phone, please?
5. You
be an expert to install certain devices in your computer.
6. The virus
contain a payload that remains dormant until it is activate (for example, by pressing a certain
key)
7. A digital certificate
be signed by a secure digital-certificate issuer.
Exercise
Replace the verb in bald with a phrasal verb of similar meaning. All the phrasal verbs required have been
explained in the unit.
1. Hackers usually try to penetrate other computer systems. When they manage to do it, they can close them for
hours.
3. Although the internet was designed to be robust, the fact is that one day it could stop working.
4. Can I connect my laptop to my TV to view things from the internet on larger screen?
5. The problem happens when the downloaded window doesn't appear, but it shows that it's there.
6. I have tried to assemble my android device to my desktop. I started the process, left for a few minutes, and
when I returned and tried to click on tools or options, nothing happened. No response.
7. Connect the USB end of the adapter into one of the USB ports on your computer system.
Show Feedback