0% found this document useful (0 votes)
73 views30 pages

ENG03 - Operating Systems

ENG03- Operating Systems

Uploaded by

Jose Miguel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
73 views30 pages

ENG03 - Operating Systems

ENG03- Operating Systems

Uploaded by

Jose Miguel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

Unit 3.

Operating systems

freedigitalphotos.net

In all large corporations, there is a pervasive fear that someone, somewhere is having fun with a computer on company time.
Networks help alleviate that fear.
John C. Dvorak

Overview
Estos son los objetivos y contenidos de esta unidad

OBJETIVOS

Usar correctamente las estructuras estudiadas en la unidad


Usar los verbos modales adecuados al tema de la unidad
Diferenciar y usar diversos conectores de contraste
Entender textos sobre sistemas operativos, y redes
Usar "phrasal verbs" referidos al tema de la unidad
Traducir frases sencillas sobre lo estudiado en la unidad
Entender vídeos acerca de los sistemas operativos, virus y spam

CONTENIDOS
Gramática Vocabulario

Verbos modales Phrasal verbs


Conectores de contraste Sistemas operativos
Pronombres reflexivos Seguridad en tu ordenador
Redes

Content 1. What is an operating system?

ENG03- Operating Systems 04/04/2018 Página 1 de 30


 

An operating system is a collection of software that manages computer hardware resources and provides common services
for computer programs. The operating system is a vital component of the system software in a computer system. Application
programs require an operating system to function. Most operating systems perform similar functions that include starting and
shutting down a computer, providing a user interface, managing programs and memory, coordinating tasks, configuring
devices, stablishing an Internet connection, monitoring performance, providing file management and other utilities, and
automatically updating itself and certain utility programs.

Different sizes of computers typically use different operating systems because operating systems generally are written to run
on a specific type of computer. For example, a mainframe computer does not use the same operating system as a personal
computer. Even the same types of computers, such as desktop computers, may not use the same operating system. Some,
however, can run multiple operating systems.

Watch this video about how an operating system works


 

GCFLearnFree.org®

Self-assessment

ENG03- Operating Systems 04/04/2018 Página 2 de 30


Listen to the video above, but try not to look at the text. While you listen, decide if these statements are TRUE or
FALSE.
 
1. Computers can speak several languages.
True. False.
 
2. The Operating System is the program that gives you access to your computer
True. False.
 
3. What your computer can do is determined by the Operating System and your computer software
True. False.
 
4. The most habitual operating systems are Windows and Linux
True. False.
 
5. Mobile devices also need Operating Systems
True. False.
 
6. Google Android is an operating system for mobiles
True. False.
 
7. All applications are compatible with any operating system
True. False.
 
8. You should get to know your operating system
True. False.

Content 1.1 Related terms


Learn some of the most frequent terms related to operating systems which may help you to understand better the texts
you are going to find in the unit.

Some terms are commonly used and have definitions that are easy to understand. Others are less common and their
definitions include more advanced terminology. Here you have some examples:

An access control list is a set


of data that tells a computer operating system which access rights each
ACL
user or group has to a specific system object, such as a directory or file.

To load the first piece of software that starts a computer. Since the operating system is essential
for
Boot
running all other programs, it is usually the first piece of software loaded into the computer

Clipboard A clipboard is a temporary storage area for data that the user wants to copy from one place to another.

A program that enhances an operating system by creating an environment


in which you can run other
Control
programs. Control programs generally provide
a graphical interface and enable you to run several
program
programs at once in
different windows.

GUI Pronounced GOO-ee. Acronym for graphical user interface.

Remote
It is the ability to get access to a computer or a network from a remote distance.
access

Safe
It is an alternate boot method for Windows operating systems that makes it easier to diagnose problems.
mode

ENG03- Operating Systems 04/04/2018 Página 3 de 30


System
A type of computer program that is designed to run a computer's hardware and application programs.
software

Task In computer programming, a basic unit of programming that an operating system controls.

Utility A small program that provides an addition to the capabilities provided by the operating system.

Pronounced wih-jit. It is a generic term for the part of a GUI that allows the user to interface with the
Widget
application and operating system.

Wizard A wizard is a computer utility designed to simplify the execution of lengthy or complicated tasks.

Self-assessment

Now, try to find the right definition for each term. Here you have a good dictionary for this terminology in case you
need help.

TERM DEFINITION

abort a. The speed at which a microprocessor executes instructions.

b. The state of a computer, usually determined by which programs are running and
BIOS
basic hardware and software characteristics.

c. A program that interacts with a particular device or special (frequently optional)


Chrome OS
kind of software.

d. A Web browser that is smaller, faster, and in some ways


more secure than the
clock speed
Mozilla browser from which much of its code was originally derived.

command e. A group of two or more computer systems linked together.

f. The essential center of a computer operating system, the core that provides basic
driver
services for all other parts of the operating system.

environment g. To stop a program or function before it has finished naturally.

h. A computer program that provides services to other computer programs (and their
executable
users) in the same or other computers.

i. A specific order from a user to the computer's operating system or to an application


Firefox
to perform a service.

j. Acronym for basic input/output system. It manages data flow between the
kernel computer's operating system and attached devices such as the hard disk, keyboard,
mouse or printer .
ENG03- Operating Systems 04/04/2018 Página 4 de 30
k. Acronym for The Real-time Operating system Nucleus. It is a set of interfaces and
network design guidelines (a set of software design specifications) for creating the computer
code that will become the kernel.

l. A particular kind of file that is capable of being executed or run as a program in the
server
computer.

TRON m. Short for Google Chrome Operating System

n. The background pattern or picture against which desktop menus, icons, and other
wallpaper
elements are displayed and moved around.

Submit
  

Content 1.2 Operating system functions


As we have already read, an operating system is a group of computer programs that coordinates all the activities among
computer hardware devices. It is the first program loaded into the computer by a boot program and remains in memory at all
times. Although many different operating systems exist for different types of computers, most of them provide similar
functions. However, the operating system handles most of these functions automatically.

But what are the main functions of an operating system?

Booting the computer


The process of starting or restarting the computer is known as b
A cold boot is when you turn on a computer that has been turn

A warm boot is the process of using the operating system to


re
When you boot a computer, a series of messages may be displ

freedigitalphotos.net

Providing a user interface


A user interacts with software through the user interface.
The two main types of user interfaces are: command line
interface (GUI).
With a command line interface, the user interacts with the ope

commands to perform specific tasks. An example of a comman


(disk operating system).
Whereas with a graphical user interface, the user interacts wit
by using a mouse
to access windows, icons, and menus. An
user interface is Windows Vista or Windows 7.

http://bagas.adi.luhung.students-blog.undip.ac.id/

Managing data and programs

ENG03- Operating Systems 04/04/2018 Página 5 de 30


How an operating system handles programs directly affects you
In the early days of personal computing, single-tasking opera
only one application at a time.
Multitasking operating systems enable users to work with tw
programs at the same time.
Apart from application programs, an OS manages other pro
utilities or routines that provide support to other programs or ha

http://computer.yourdictionary.com/program-manager

Memory management
The essential requirement of memory management is to provi
allocate portions of memory to programs at their request,

when no longer needed. This is critical to the


computer system
been devised that increase the effectiveness of memory
memory systems separate the memory addresses used by
physical addresses, allowing separation of processes and in
available amount of RAM using paging or swapping to seconda
of the virtual memory manager can have an
extensive eff
performance.

www.it.uu.se/edu/course/homepage/os/vt06/overview

Configuring devices
Another function of an operating system is handling input a
enabling communication with input and output devices. Most o
with drivers for popular input and output devices.
When you start the computer, the OS loads each device driv
device, its driver must be installed before you can use the de
OSs support Plug and Play (the OS automatically configure
install them).

windows-7/configuring-device-installation-settings

File management
The operating system also provides users with the capability of
files and directories saved or retrieved from a computer disk
system allows the user to perform such tasks as creating
renaming files, coping and moving files, and deleting files
keeps track of where files are located on the hard drive through

thebrain.com/beyond-hierarchies/

ENG03- Operating Systems 04/04/2018 Página 6 de 30


Content 1.2.1 How to express contrast

Revise

Contrast clauses
You use contrast clauses when you want to make two statements, one of which contrasts with the other or makes
it appear unexpected or surprising. Some contrast clauses - called concessive clauses - are introduced by
conjunctions such as although, even though, though, whereas, while.

Although many different operating systems exist for different types of computers, most of them provide similar
functions.
 

We can also use despite or in spite of to make a contrast. These are followed by either a noun phrase or an ‘ing’
form.

Despite working hard, he failed his exam


In spite of his hard work, he failed his exam

If you want a clause to follow despite or in spite of you must add the fact that.

Despite the fact that he worked hard, he failed his examination.

HAVE A LOOK AT THE CHART BELOW:

although  

though +
sentence

even though  

 
in spite of
+
noun phrase or "ing" form
despite
 

Revise

Other words or expressions that can be used to express concession or contrast include: however, nevertheless
(very formal), anyhow (informal), in any case (informal), on the other hand (formal).

Commas are used to separate these expressions from the sentence or within a sentence.

Often used at the beginning of a sentence

Examples:

The new procedures which have been implemented, are not problem-free. They have, however, improved the
efficiency of the department

Nevertheless, it is not enough to ensure the irreversibility of the process.

On the other hand, project performance and outputs were deemed to be the responsibility of the work group

ENG03- Operating Systems 04/04/2018 Página 7 de 30


Exercise

Translate these sentences. Notice that they all contain a contrast expression.

1. Even if the drive is not being actively written to or read from, most operating systems do a lot of accesses to the
system disk in the background. (storage.toshiba.eu)

2. Although your knowledge of operating systems and different types of media is quite good, you should intensify
your studies on networks.

3. In spite of being protected by antivirus software, the operating system got infected by a trojan.

4. However, international students are using social networks to enhance their learning experience.

5. I always use Windows, whereas my husband prefers Linux.

Show Feedback

Content 1.3 Types of operating systems

We have already learned that operating systems create a link between users and the
applications and that they form the core of computer systems.

There are different types of operating systems and here, we will have a look at how
they differ from one another. Within the broad family
of operating systems, there are
several types, categorized based on the
types of computers they control and the sort of
applications they support. Clearly, the precise nature of an operating system will
depend on the application in which it is to be used.

1. Operating Systems for Real-time: These types of OS are used to control machinery,
control systems and industrial systems and
have very less or in certain case no user-
interface capability. Some examples are: control of nuclear power plants, chemical
processing and air traffic control systems.

2. Operating Systems for Single User, Single Task: This is a typical computer system
where one user can work effectively only on one task. Cell phones and palm tops are
examples where these types of systems are used.

3. Operating Systems for Single User, Multi-tasking: Computer Operating Systems of desktops or laptops typically fall
within this category. Here, the user can use several applications at a time.

4. Operating Systems for Multi-User: Here, various users use the computer system through different terminal and the
Operating Systems on that computer has to balance multiple users with multiple applications

5. Embedded operating systems are designed to be used in embedded computer systems. They are designed to operate
on small machines like PDAs with less autonomy. They are able to operate with a limited number of resources. They are very
compact and extremely efficient by design. Windows CE and Minix 3 are some examples of embedded operating systems.

Photo:Creative Commons Attribution-Share Alike 3.0 Unported

Self-assessment

Read the text and then, choose the right answer to complete the sentences below:
1.The type of an operating system will be mainly based on the type of computer they control and on ...
a. the hardware

ENG03- Operating Systems 04/04/2018 Página 8 de 30


b. the sort of applications they support
c. the user of the computer

2. Operating systems for Real Time are systems designed to control ...
a. machinery
b. industrial systems
c. Both of them

3. A ... operating system allows various users to run programs at the same time.
a. multi-user
b. single-user
c. real time

4.This operating system allows the execution of multiple tasks at one time.
a. single-tasking
b. multi-tasking
c. Neither of them

5.Single-user operating systems are usable by ... at a time


a. several users
b. one user
c. Both of them

6. Desktops or laptops use ... operating systems.


a. single-user
b. multi-user
c. Real Time

7.Small machines like PDAs are operated by ... operating systems


a. multi-user
b. multi-tasking
c. embedded

Content 1.4 Examples of operating systems

ENG03- Operating Systems 04/04/2018 Página 9 de 30


http://www.goodthiftshop.com/2009/11/know-what-the-operating-system/

In previous sections of the unit we have read that one of the main tasks
of the operating system is to control the hardware,
among others. It also provides the basic user interface.

The essential aspects required of a modern OS are:

To be stable.
To be multi-task (do several different things at once),
To be powerful (be able to deal with large hard disks, lots of files, and large amounts of RAM)
To be secure (so that hackers and viruses cannot damage it). And, last but not least,
To be user-friendly (so that users can do what they want in a simple uncomplicated way).

Perhaps the most popular OS today is Microsoft Windows, which has about 85% of the market share for PCs and about 30%
of the market share for servers. But there are many more operating systems out there besides the various versions of
Windows, and each one is optimized to perform some tasks better than others. Free BSD, Solaris, Linux and Mac OS X are
some good examples of non-Windows operating systems.
Adapted from:http://www.english-online.org.uk/comp.htm

Reading activity

MICROSOFT WINDOWS

During the 1980s to the mid 1990s MS-DOS


was the most commonly
used member of the DOS family of operating systems, and was the
main operating system for IBM PC compatible personal computers until
it was gradually substituted by operating systems offering a graphical
user interface (GUI), in particular by various generations of the
Microsoft Windows operating system.

Windows is the most popular PC operating system in the world. The


first version of Windows
was released in November of 1985. This
program wasn't very popular as it lacked functionality compared to the
Apple operating system.

In August of 1995, Windows 95 was released. This operating system


offered a consumer solution with significant changes to the user interface.
ENG03- Operating Systems 04/04/2018 Página 10 de 30
It was the first Microsoft operating system to use the plug and play system,
Windows 95 revolutionized the desktop platform and achieved mass
popularity.

The most recent Windows, Windows 8, (released on October 25, 2012)


introduces significant changes to the operating system's graphical user interface and platform.

Photos: http://www.mundotech.net/enviar-email-con-comandos-msdos/ - http://xora.org/2012-preparate-por-que-este-ano-llega-windows-8/

Find words and expressions in the text with the following definitions:

DEFINITION WORD IN THE TEXT

the most important

made available to the public

was deficient in

a person who buys services for personal use

important enough to merit attention

changed radically or fundamentally

accomplished by effort, skill or courage

affecting a large amount

Definitions adapted from:wordreference.com

Show Feedback

Content 1.4.1 Examples of operating systems II


MAC OS

Mac OS is a series of graphical user interface-based operating systems developed by


Apple Inc. for their Macintosh line of computer systems. Mac OS is credited with
popularizing the graphical user interface. The original form of what Apple now calls OS X
was the integral and unnamed system software first introduced in 1984 with the original
Macintosh, and referred to simply as the System software.

Since it was released, it has established the standard for operating system ease of use
and has been the model for many of the following GUIs elaborated for systems that did not
belong to Macintosh.

ENG03- Operating Systems 04/04/2018 Página 11 de 30


Mac OS X is the successor of the original Mac OS, which is a multi-tasking operating
system used only for computers made by Apple.

  It was first released in 1999 as Mac OS X Server 1.0. Since then,


six more distinct "client"
  and "server" editions of Mac OS X have been released, the most recent being OS X 10.8
  "Mountain Lion", which was released to the public on July 25th 2012. Releases of Mac OS
  X are named
after big cats:
 
 
 
 
  10.0 Cheetah 2001
  10.1 Puma 2001
  10.2 Jaguar 2002
  10.3 Panther 2003
  10.4 Tiger 2005
  10.5 Leopard 2007
http://www.tech-junkie.org/ 10.6 Snow Leopard 2009
10.7 Lion 2011
10.8 Mountain Lion 2012
http://www.matuk.com/
 
 

 http://www.muylinux.com/2010/11/24/

UNIX (pronounced YOUnix) is a multitasking, multi-user computer operating system originally developed in the early 70's
by a group of scientists at Bell Labs.
During the late 1970s and early 1980s, the influence of Unix in academic
circles led to large-scale adoption of Unix by
commercial startups, like for example: Solaris.
Several versions of this operating system exist, each with small differences. Most of them offer a graphical user interface.
Today Unix-like operating systems such as MINIX, Linux, and BSD descendants are commonly encountered. The term
traditional Unix may be used to describe an operating system that has the characteristics of either Version 7 Unix or UNIX
System V.
Some of the most significant advantages of UNIX systems are:

Unix is more flexible and can be installed on many different types of computers, such as: main-frame computers,
supercomputers and micro-computers.

Unix is more stable and does not go down as often as Windows does, therefore requires less administration and
maintenance.

Both texts adapted from:http://en.wikipedia.org/

ENG03- Operating Systems 04/04/2018 Página 12 de 30


Self-assessment

After reading both texts, decide if these statements are TRUE or FALSE.
 
1. Mac OS is known to have familiarized the use of graphical user interface
True. False.
 
2. The original Mac OS had no name
True. False.
 
3. Mac OS is not a simple operating system to use
True. False.
 
4. In contrast to Mac OS, Mac OS X can be used in computers which have not been manufactured by Apple
True. False.
 
5. Mac OS X Lion in the last version of this operating system
True. False.
 
6. A group of scientists created UNIX at the beginning of the 70s
True. False.
 
7. All versions of UNIX offer GUI
True. False.
 
8. Linux is a Unix-like operating system
True. False.

Content 1.4.2 Examples of operating systems III

LINUX

Wikimedia Commons

Linux is a multi-tasking Unix-like computer operating system assembled under the model of free and open source
ENG03- Operating Systems 04/04/2018 Página 13 de 30
software
development and distribution. The defining component of Linux is the Linux kernel, an operating system kernel first
released 5 October 1991 by Linus Torvalds.
Linux was originally developed as a free operating system for Intel x86-based personal computers. It has since been ported
to more computer hardware platforms than any other operating system. It is a leading operating system on servers and other
systems such as mainframe computers and supercomputers.

Linux also runs on embedded systems, such as mobile phones, tablet computers, network routers, televisions and
video game consoles; the Android system in wide use on mobile devices is built on the Linux kernel.

The development of Linux is one of the most prominent examples of free and open source software collaboration: the
underlying source code may be used, modified, and distributed-commercially or non-commercially-by anyone under licenses
such as the GNU General Public License. Many programmers have dedicated time to modify and redistribute Linux to
make it the best possible version of UNIX. 

Some versions of Linux are command-line, while others are GUI.


Many application programs  and utilities have Linux versions, such as: Mozilla, Netscape, Yahoo!, Messenger, RealPlayer,
QuickTime, and Acrobat Reader.

Some popular mainstream Linux distributions include Debian (and its derivatives such as Ubuntu), Fedora and openSUSE. 

Self-assessment

Read the text and choose the best meaning for each word. Pay attention to context!
1. Assembled
a. met
b. grouped
c. encountered

2. Development
a. origin
b. creation
c. evolution

3. Defining
a. distinctive
b. regular
c. credible

4. Ported
a. taken
b. transferred
c. ordered

5. Platform
a. pulpit
b. stage
c. program

6. Leading
a. preeminent
b. winning
c. capital

ENG03- Operating Systems 04/04/2018 Página 14 de 30


7. Underlying
a. radical
b. latest
c. basic

Exercise

Make a comparative of some of the operating systems we have just analyzed.

Use the table below and try to complete each gap with the information required.
FIRST LAST LAST TARGET
  NAME MAKER FREE SECURITY
RELEASE VERSION RELEASE SYSTEM

PC
OS X Apple Inc 2001 10.8 2012 NO ipfirewall
*WS

*Workstation
You can find information in: http://en.wikipedia.org/wiki/Comparison_of_operating_systems

Show Feedback

Content 2 Computer security


Computer security
Administering security is one of the main functions of the operating
systems.
Read the text and check the meaning and use of the modal verbs in
red.

Achieving good computer security could seem like a really hard task.
Fortunately, following a few
simple steps you can get a good
measure of
security in very little time.

ENG03- Operating Systems 04/04/2018 Página 15 de 30


1) Use antivirus software and keep it up-to-date. You should
check
for new definition updates daily. Most antivirus software can be
configured to do this
automatically.

2) Install security patches. At least monthly, you must check for and
apply updates for all software you use.

3) Use a firewall. No Internet connection is safe without one. Firewalls


are necessary: it takes only minutes for a non-firewalled computer to be
infected.

4) Secure your browser. It is not a matter of simply avoiding certain 'types'


of sites. Known, legitimate websites are
frequently being compromised and
implanted with malicious javascript that foists *malware onto visitors'
computers. To
ensure optimum browsing safety, the best tip is to disable javascript
for all but the most essential of sites -- such as your
banking or regular
ecommerce sites. Not only will you enjoy safer browsing, you'll be able to
eliminate unwanted pop-ups as
well.

5) Take control of your email. You mustn't


open email attachments received unexpectedly -- no matter who may have sent
it. Remember that most
worms and trojan-laden spam try to spoof the sender's name. Reading email in
plain text offers
important security benefits.

6) Treat IM suspiciously. Instant Messaging is a frequent target of worms and


Trojans: you should be cautious

7) Avoid P2P and distributed filesharing. There are quite a lot of filesharing networks. Most
are free. And all are rife with
trojans, viruses, worms, **adware, spyware, and
every other form of imaginable malicious code .There's no such thing as
safe
anonymous filesharing. Avoid it like the plague: it is a must.

8) Keep abreast of Internet scams. Criminals think of clever ways to separate you from
your hard earned cash. Don't get
fooled by emails telling sad stories, or
making unsolicited job offers, or promising lotto winnings. Likewise, beware of
email
masquerading as a security concern from your bank or other eCommerce site..

9) Don't fall victim to virus


hoaxes. Dire-sounding email spreading fear, uncertainty and
doubt about non-existent threats
serves only to spread needless alarm and may even cause you to delete perfectly
legitimate files in response.

Remember, there's far more good than bad on the


Internet.

The goal is to be cautious, aware, and even suspicious. By following the


tips above and becoming actively engaged in your
own security, you'll not only
be protecting yourself, you'll be contributing to the protection and betterment
of the Internet as a
whole.
Adapted from: antivirus.about.com/od/securitytips
Photo above: freedigitalphotos.net

Exercise

Find words in the text above that have something to do with security.

For example: antivirus

Show Feedback

A step ahead
ENG03- Operating Systems 04/04/2018 Página 16 de 30

The expression Malware, is a combination of the words malicious software. It is software created to damage or
alter the computer data or its operations. There are four main types:

Viruses. They are computer programs which are potentially damaging


as they may affect or infect negatively the computer without your
knowledge and run against your wishes. A Virus can also replicate itself.
Once they are in a computer, they can spread and may damage your
files and operating system.

Worms. They replicate themselves to spread to other computers.They


often use a computer network to spread. Unlike a computer virus, they
do not need to attach themselves
to an existing program. Worms very
often cause some harm to the network, whereas viruses almost always
corrupt or modify files on a targeted computer.

Trojan horses. They disguise as legitimate files or helpful programs


with the purpose of granting a hacker unauthorized access to a
computer. Trojans do not attempt to inject themselves
into other files like
a computer virus. Trojan horses may steal information, or harm their
host computer systems.The term is derived from the Trojan Horse story
in Greek mythology because they present themselves as harmless,
useful gifts, in order to persuade victims to install them on their computers

Spyware. It is software installed on computers that collects information about users without their
knowledge. The presence of spyware
is typically hidden from the user and can be difficult to detect. It often
enters a computer when a user installs a new program.

The word Adware is a combination of the words advertising-suppported-software.


It is any software package
which automatically renders adverts, very often in the form of a pop up window. Sometimes, spyware is hidden in
adware.
Adapted from wikipedia
Photo:freedigitalphotos.net

Revise

Have a look at these sentences from the text above:


A Virus can also replicate itself.
Trojans do not attempt to inject themselves into other files like a computer virus
They replicate themselves to spread to other computers

The words in red are reflexive pronouns:

REMEMBER: We use a reflexive pronoun when the subject and the object of the sentence are the same:

A virus can replicate itself

Trojans do not attempt to inject themselves into other files

REMEMBER: Unlike Spanish, reflexive pronouns are not used after common verbs like:
feel, relax,
concentrate, dress, wash, shave, meet, complain, hurry up,
get up, sit down, stand up, lie down, wake up,
remember, worry.

I felt exhausted after working all day


It's good to relax.
What time shall we meet?

If you need some more explanations about this topic, have a look here

Content 2.1 Virus


ENG03- Operating Systems 04/04/2018 Página 17 de 30
How to Protect a Computer from Viruses

freedigitalphotos.net

If you think your computer may be infected, take all necessary steps to clear your system and avoid infecting other
computers. You will
just need anti-virus softwares

Instructions:

1. You must be cautious about what disks and files you accept from other people.

2. You mustn't reuse disks that have been in other computers, don't download files from insecure sites, and
don't open e-mail attachments unless you are expecting them. Be wary of messages and attachments, even
from people you know, with vague subject lines and contents, such as 'Check this' or 'See these pics!!!'

3. You should obtain an antivirus program to more safely share disks, download files from the Internet and
open e-mail attachments.

4. If your system gets a virus, visit your virus-scan software manufacturer's Web site and install any virus
updates that are available. Then, run the software. The software may not be able to delete the virus, but it may
be able to identify it.

5. Search the Web for information about your specific virus by typing the name of the virus into a search
engine, followed by the word 'virus.' For example, Melissa virus,' 'Bubble Boy virus,' and so on.

6. You can download and install any software patches or other programs that will help you eliminate the virus.
You can also follow any instructions you find on deleting the virus manually.

7. Run another virus scan to make sure the virus was deleted

8. Employ extra caution when you receive attachments that end in the commonly used extensions .doc, .exe,
.com, .xls or .ppt. Never open attachments that end in .vbs or .js, since a typical user doesn't have to open
these files.

REVISE THE USE AND MEANING OF MODAL VERBS


A modal verb can express different meanings and different modal verbs can convey the same meaning: Let's have a
look at the table below

VERB MODAL VALUE EXAMPLES

obligation, present
must Users must install legal software
and future

obligation, present, past You have to type in the password twice.


have to
and future Did she have to work yesterday?

advice or recommendation The email should include the requested information.


ENG03- Operating Systems 04/04/2018 Página 18 de 30
should
in present and future You shouldn't modify the program.

prohibition, present and You mustn't smoke in the classroom.


mustn't
future

lack of obligation, present, You don't have to log in again.


don't have to
past and future She won't have to take another course.

lack of obligation, present Need we start the computer again?


need/needn't
and future We needn't do the exam tomorrow

Can / Could ability An ebook can be very convenient for travelling


Be able to I couldn't run the program because an error occurred

May / Might possibility I may win the web design competition


An error might occur but it is quite improbable.

Exercise

Translate these sentences

A.- A Trojan virus is a faulty computer program that can infect remote computers by changing the desktop or
deleting important files. Generally
called a Trojan Horse, it may appear as a legitimate file or software from
a
trusted source, in other words: tricking users into opening it or downloading it. Users must take action and should
protect their personal computer files by learning to delete this Trojan virus.

B.-Common viruses work by attaching themselves to real programs. A general virus may
be so small that in most
cases its victims have no idea it is hidden within their downloaded program. As the user opens their download
program to install it, the virus also opens and installs secretly. The virus then has to use the computers internal
system to replicate itself and hide throughout the computer. Viruses can do everything from hijack your operating
system, to completely wiping your hard disk. You mustn't be unaware of these dangers.
http://www.ehow.com/how-does

Show Feedback

Practice
In case you need to revise modal verbs again, watch this video
 

ENG03- Operating Systems 04/04/2018 Página 19 de 30


bylearnamericanenglish

Practice

Answer this question about the video

1.- How many modal verbs appear in the video?

Say if
the following statements are true or false:

2.- Modal
verbs go before a verb in the simple form.

3.- You
can't use 'to' after any modal verb.

4.- Would
isn't the past tense of will

Click here

Self-assessment

Match each sentence with the meaning implied by the modals

Can you open the file?


a. OBLIGATION IN THE PRESENT

Technicians must revise all the computers


b. ABILITY IN THE FUTURE

They should have some IT knowledge


c. ABILITY IN THE PRESENT

We may begin the new project next week d. LACK OF OBLIGATION

You mustn't use illegal software e. OBLIGATION IN THE FUTURE

Students don't have to finish their web pages now f. RECOMMENDATION

Will they have to work on Saturdays? g. PROBABILITY

They will be able to perform some specific tasks h. PROHIBITION

Submit
  

Content 2.2 Spam


 

ENG03- Operating Systems 04/04/2018 Página 20 de 30


freedigitalphotos.net

Spam is a new word that is used to define unsolicited email. A recent survey showed that office workers in Europe an The
USA spend 20 minutes a day deleting spam when they open their Email programs every morning. It is not legal to send
spam, but it is so common that it is not easy to fight it. Most Spam tries to sell all kinds of products, like online medicines,
surgery to enlarge certain parts of your body, all kind of fake certificates, some spammers even sell university degrees. Spam
can also be dangerous because it can contain a virus than will infect your computer, so, as a rule, you must never open an
email you don't know who is coming from. There are some filters nowadays that stop some spam. But they are not 100%
effective.
 

Because the barrier to entry is so low, spams are numerous, and the volume of unsolicited mail has become very high. In the
year 2011, the estimated figure for spam messages is around seven trillion. The costs, such as lost productivity and fraud,
are borne by the public and by Internet service providers. Spamming has been the subject of legislation
in many jurisdictions.

A step ahead

What is the original meaning of the word "Spam"?

Spam (shortened from *spiced ham)


is a canned precooked meat
product made by the Hormel Foods Corporation, first introduced in
1937. The labeled ingredients in the classic variety of Spam are
chopped pork shoulder meat, with ham meat added, salt and water.
The product has become part of many jokes and urban legends
about mystery meat, which has made it part of pop culture and
folklore.Through a Monty Python sketch, in which Spam is
portrayed as omnipresent and inescapable, its name has come to
be given to electronic spam, including spam email.

According to the Internet Society and other sources, the term spam
is derived from the 1970 Spam sketch of the BBC television
comedy series Monty Python's Flying Circus.The
sketch is set in
a cafe where nearly every item on the menu includes Spam canned luncheon meat. As the waiter recites the
Spam-filled menu, a
chorus of Viking patrons drowns out all conversations with a song repeating "Spam, Spam,
Spam, Spam... lovely Spam! wonderful Spam!", hence "Spamming" the dialog.The excessive amount of Spam
mentioned in the sketch is a reference to the preponderance of imported canned meat products in the United
Kingdom, particularly a brand of tinned ham (Spiced ham = SPAM) from the USA, in the years after World War II,
as the country struggled to rebuild its agricultural base. Spam captured a large slice of the British market within
lower economic classes and became a byword among British children of the 1960s for low-grade fodder
due to its
commonality, monotonous taste and cheap price - hence the humour of the Python sketch.

It later came to be used on Usenet to mean excessive multiple posting-the repeated posting of the same message.
The unwanted message would appear in many if not all newsgroups, just as Spam appeared in nearly all the menu
ENG03- Operating Systems 04/04/2018 Página 21 de 30
items in the Monty Python sketch.

* Variedad de carne enlatada.


Photo above: Matthew W. Jackson

Have some fun and watch the video of the Monty Python spam sketch

https://www.youtube.com/watch?v=anwy2MPT5RE

Content 2.2.1 How to fight spam

The more you clean up your email, the faster it grows. Receiving Spam email is
not only annoying, inconvenient, and sometimes expensive, it could also cause
you to completely have everything on your computer deleted. Spam is difficult to
control, even if you block the sender. They just use a different email address.
There is another method to try,
that with patience will get these spammers
stopped.
There are several ways you can do this, but here you can find some tips to help
you clean up your email

STEPS

Select all the text of the full *headers with CTRL+A.

Press CTRL+C to copy the headers.

Go to **SpamCop and sign up.

Paste the full headers into the box and press "Process Spam",
or just send the headers to the email address given
to you above the box. If you send it, wait for an email (unless you are using Quick Reporting) and click on the link in it.

Scroll down and click "Send Reports".

*What is SpamCop?:SpamCop is the premier service for reporting spam. SpamCop determines the origin of unwanted email
and reports it to the relevant Internet service providers. By reporting spam, you have a positive impact on the problem.
Reporting unsolicited email also helps feed spam filtering systems, including, but
not limited to, SpamCop's own service.

Beware of Cheap Imitations - SpamCop.net established 1998

There are many programs that will automatically report your spam for you, saving a lot of time.

If you use SpamCop, quick reporting is easier to use.

Warnings

ENG03- Operating Systems 04/04/2018 Página 22 de 30


If you use quick reporting, be careful not to send legitimate emails.
Do not reply to spam unless you are trying to receive more.
Do not click on links in spam unless you are using Firefox and a virus-scanner.
Do not accidentally go to http://www.spamcop.com, which is fake, instead, go to http://www.spamcop.net/

*Header: the first section of a message that contains information about the content and transmission of the message
including the sending and destination addresses (encabezado) 
Adapted from: http://www.wikihow.com/Fight-Spam

Watch this video about how to fight spam

www.onlineconnectit.com/

Exercise

After watching the video again, match the first part of the sentences on the left to the second part on the right

1. Spam is unsolicited junk mail sent to you a. reach my computer?

2. It's like the junk mail you get through


b. through the server that stores your mail
your door but

3. How does spam c. spam reaching me?

d. by companies that are trying to sell you their


4. Spam is sent across the internet
products or services

5. How can I prevent e. you can do to combat the threat of spam

6. There are four main things f. in an electronic format sent to your inbox

Show Feedback

ENG03- Operating Systems 04/04/2018 Página 23 de 30


Self-assessment

Watch the second part of the video and complete the paragraphs with the expressions below:

AGAINST SIGNING OPT GREATER POP SIGN GIVING


SPAM UP OUT CONTROL UP UP OUT

 
- Don't give your email address to unreliable sources. Avoid

to free offers that are sent to

you or that

on your browser screen. They are designed to capture your address.

This is like

your mobile number to strangers on the street.

If you have to

for services on the internet, make sure you take the

box to say you
don't want to be contacted by third parties.
- Spam protection from you ISP. Your internet service provider can also provide a level of protection


.

- Spam protection from a hosted service. This method allows



of the level of the
content that reaches you.
Submit
  

Content 3 Networks
A computer network is a system in which computers, servers, mainframes, network devices, peripherals, or various other
devices are connected to share information and resources. A
great example of a network is the Internet, connecting millions
of people all over the world together

Networks may be classified according to a wide variety of characteristics: geographical area, topology, protocol, scale,
hardware and associated software technology, or design.

The principal purpose of a computer network is to share resources:


For example:

you can connect a printer or a scanner, to one computer and let other
computers of the network print or scan, to that printer or scanner

you can create files and store them in one computer, then access those files
from other computers connected to it

Today, computer networks are the nucleus of modern communication.


The range of communication has increased significantly in the past decade,
and this expansion in communication would not have been possible
without
the progression of computer network.
Computer networks, and the technologies needed to connect and communicate
through and between them, continue to impulse computer hardware, software, and peripherals industries.

Photo:freedigitalphotos.net

A step ahead

Networks may be classified according to a wide variety of criteria.

ENG03- Operating Systems 04/04/2018 Página 24 de 30


The geographical area it spans. Local area networks (LANs), across a single building.
MANs, are Metropolitan Area Networks, usually span a city or a large
campus.
Wide area networks (WANs), cover a broad area (across metropolitan,
regional, or national boundaries). The Internet is the world's largest
public WAN.

Network Design.The two types are called client-server and peer-to-


peer.
Client-server network: a computer stores email, Web pages, files and
or applications and distributes information to the other nodes.
On a peer-to-peer network, all computers have the same functions.
Client-server networks are more common in business and peer-to-peer networks in homes.

Topology (layout or structure) from the point of view of data flow.


In a bus network, all computers are connected to a common cable.
In a star network, a central node connects all other nodes in the network.
In a ring network, all devices are connected to one another in a continuous ring.

Network Protocol. The communication language used by computer devices is called the protocol. Network
protocols like HTTP, TCP/IP, and SMTP provide a foundation that
much of the Internet is built on.
Photo:freedigitalphotos.net

Self-assessment

Watch this video about computer networks

http://youtu.be/TVvEheZVwdg

Watch the video again and say if these statements are TRUE or FALSE
 
1.The main purpose of a computer network is to share information between one computer to another
True. False.
 
2. LAN stands for Legal Area Network
True. False.
 
3. A MAN network covers more than 30 miles in size
True. False.
ENG03- Operating Systems 04/04/2018 Página 25 de 30
 
4. The Internet is the biggest WAN network we have out there
True. False.
 
5. A node is anything attached to a computer
True. False.
 
6. Communication media is the way nodes are connected
True. False.

Content 3.1 Phrasal verbs


In previous texts and videos, we have read and listened to expressions like:
How to set up an Internet connection at home
The hacker broke into the computer system and stole data
It is risky to log on to your bank account using public computers
Avoid signing up to free offers that are sent to you or that pop up on your browser screen

They are all phrasal verbs.

The term phrasal verb is commonly applied to a verb in combination with a preposition/adverb that has a meaning
different from the original verb.
For example, the verb to give means = to provide, to present. But the verb to give + up (preposition) means = to surrender.

Here you have a list of the most common phrasal verbs, and below a list of the phrasal verbs commonly used in STE.

A step ahead

Back up To make a security copy

If a computer boots up, or if someone boots a computer up, it is turned on so that it is ready to
Boot up
use.

Click on To move a mouse over an icon, word ... and click

Connect up
To join something (e.g. telephone, computer) to the main supply of power or to the main system.

Dial up To dial a number that connects a computer with an Internet service provider

Go down If a computer goes down, it stops working.

To get into someone else's computer system without permission in order to look at information
Hack into
or do something illegal.

Hook up To connect to something

Key in To type in

Log in / on To go onto a computer network by typing in a personal code

Log off To go off a computer network by signing out.

Plug in To insert a plug into an electric outlet

Pop up To appear suddenly

Power up To start the power, to turn on a machine.

ENG03- Operating Systems 04/04/2018 Página 26 de 30


Print out To make a copy of something from a computer or a word processor.

Pull down To click on a word or item that opens up a list of options or functions.

Scroll down
To move a page down

Scroll up To move a page up

Set up To assemble or prepare a piece of hardware.

Shut down To turn off a computer.

Switch/Turn To activate or cause to energize by the use of a button or a switch.


on

Switch/Turn To shut down an operation, to stop the flow of energy by the use of a button or switch.
off

Type out/up To produce a copy of something you have written by typing it into a computer or by using a
typewriter.

Wipe out To remove information stored on part of a computer (esp. memory, hard disk)
 

Self-assessment

Complete the sentences below with one of these phrasal verbs.

POP UP PLUG IN SET UP KEY IN BACK UP

SCROLL DOWN PRINT OUT WIPE OUT DIAL UP SHUT DOWN

 
1. I will ask my brother to help me

my new email account.

2. Whenever I open the site, a window



saying that I want a free prize. It is annoying!

3. I will

a copy of the document for each one of us.

4. There are far too many data. I have to



the hard disk.

5. I forgot to

the printer, so obviously it didn't work.

6. You should

the files just in case.

7.

the web address. It will take you to the site you are looking for.

8.

the page and you will see the name of the web designer.

9. Don't

the computer, I'm going to use it.

10.

to your internet service provider for help.

Submit
  

ENG03- Operating Systems 04/04/2018 Página 27 de 30


Extra practice

Exercise

Revise some of the terms you have studied in the unit and find the right definitions for them.

ADWARE DRIVER UTILITIES KERNEL


HUB FREEWARE LINUX GUI

BUS OPERATING APPLICATION TROJAN


ROUTER STAR LAN WiFi
SYSTEM HORSE

a. network in which all nodes are connected to a central computer

b. a software program that runs on your computer; for example: email programs, web-browsers or word
processors, etc.

c. software with advertisements embedded in the application.

d. a destructive program that masquerades as a benign application.

e. a network topology in which all devices are attached to a single wire.

f. software programs that add functionality to your computer, such as: antivirus, backup, or security programs.

g. a Unix-like operating system created by Linus Torvalds.

h. the base or foundation of the operating system which provides the most basic services, like memory
management for example.

i. computer network limited to a small area: a building or university campus.

j. a software program that enables a specific hardware device to work with a computer's operating system.
Required for peripherals or video cards.

k. copyrighted software given away for free by the author, although he retains the copyright.

l. software that communicates with the hardware and allows other programs to run.

m. a common connection point for devices on a network

n. it directs communicating messages when several networks are connected together

ñ. abbreviation for Wireless Fidelity. A set of standards for radio-based wireless networks

o. part of an operating system that lets the user interact with a computer using graphic images and a cursor.

Show Feedback

Exercise

Translate these sentences:


ENG03- Operating Systems 04/04/2018 Página 28 de 30
 

1. [...] between two computers that aren't already on the same network but are in the same room, you can create a
computer-to-computer network,
also known as an ad hoc network.
windows.microsoft.com

2. They have developed a computer network through INTERNET to exchange information and believe that with a
good communication system an effective technical assistance programme can be realized.
unjiu.org

3. Verizon specifically does not authorize the use of its proprietary computers, servers, routers and computer
network (the "Verizon Network")
to accept, transmit or distribute unsolicited bulk e-mail sent from the
Internet to
Verizon subscribers (or to others).
my.verizon.com

4. We note that, in the current period of globalization, information technology and the rapid development of new
telecommunication and computer network systems have been accompanied by the abuse of those technologies
for criminal purposes.
daccess-ods.un.org

5. It is your responsibility to back up all software and data that is stored on your computer's hard disk drive(s)
and/or on any other storage
devices you may have, in advance of permitting a professional to perform services on
your personal computer or personal computer network.
europa.eu

Show Feedback

Self-assessment

Complete the sentences with the right modal verb.


1. If you are designing a web, you
like to insert songs, videos, podcasts, etc.

2. The price of the last version of OS X


go down next month. But it is quite improbable.

3.
I use your mobile phone, please?

4. To hear these audio files, you


have the right plug-in.

5. You


be an expert to install certain devices in your computer.

6. The virus
contain a payload that remains dormant until it is activate (for example, by pressing a certain
key)
7. A digital certificate
be signed by a secure digital-certificate issuer.

8. Use an anti-virus program so that the virus


spread.
 
Submit
  

Exercise

Replace the verb in bald with a phrasal verb of similar meaning. All the phrasal verbs required have been
explained in the unit.

1. Hackers usually try to penetrate other computer systems. When they manage to do it, they can close them for
hours.

ENG03- Operating Systems 04/04/2018 Página 29 de 30


2. Don't discard any credit card receipts; someone could take them.

3. Although the internet was designed to be robust, the fact is that one day it could stop working.

4. Can I connect my laptop to my TV to view things from the internet on larger screen?

5. The problem happens when the downloaded window doesn't appear, but it shows that it's there.

6. I have tried to assemble my android device to my desktop. I started the process, left for a few minutes, and
when I returned and tried to click on tools or options, nothing happened. No response.

7. Connect the USB end of the adapter into one of the USB ports on your computer system.

Show Feedback

ENG03- Operating Systems 04/04/2018 Página 30 de 30

You might also like