0% found this document useful (0 votes)
16 views8 pages

Clark Os 1-3

This document contains an assessment submitted by Clark Kent B. Aligan for Chapter 1-3 of the course IT312 Operating Systems and Applications. The assessment includes descriptions of common operating systems, utilities, and threats. It also discusses the layers that make up an operating system including the user interface, file system, I/O, memory management, and kernel. Examples are provided for functions of config.sys, autoexec.bat, graphical user interfaces, and the Windows registry. Possible causes for incorrect login errors on a network are outlined.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views8 pages

Clark Os 1-3

This document contains an assessment submitted by Clark Kent B. Aligan for Chapter 1-3 of the course IT312 Operating Systems and Applications. The assessment includes descriptions of common operating systems, utilities, and threats. It also discusses the layers that make up an operating system including the user interface, file system, I/O, memory management, and kernel. Examples are provided for functions of config.sys, autoexec.bat, graphical user interfaces, and the Windows registry. Possible causes for incorrect login errors on a network are outlined.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Output

in
IT312-Operating Systems and Applications

Chapter I – 3Activities

by:

Clark Kent B. Aligan


BSIT-3A

to:

DR. RENANTE A. DIAMANTE


Assistant Prof. 2

1st Semester/S.Y. 2021-2022


ASSESSMENT FOR CHAPTER 1
A.

URL Description of the site


 www.google.com Google
 www.facebook.com Facebook
 www.youtube.com YouTube
 www.gmail.com Gmail
 www.yahoo.com Yahoo!
B.

OS Supplied Utility Third Party Utility


Windows 10 Pro Windows Microsoft Defender

Comment:
Microsoft Defender is a free antivirus software built into Windows PCs, but a paid version is
available to corporate users. The antivirus offers malware protection and is enabled by default so
you can work while it runs quietly in the background.
The software covers the basic internet security areas, but you get frequent updates to the software.
You can tune the protection level to your liking thereby blocking potentially unwanted apps and
protecting your files and folders from ransomware.
C.

OS Supplied Utility
Windows 10 Pro Windows
Third-Party Utilities URL
Smart Defrag 7 https://www.iobit.com/en/iobitsmartdefrag.php
D.

OS Supplied Utility Third Party Utility


Windows 10 Pro Windows Disk cleanup
Comments:
Disk Cleanup helps free up space on your hard disk, creating improved system performance.
Disk Cleanup searches your disk and then shows you temporary files, Internet cache files, and
unnecessary program files that you can safely delete. You can direct Disk Cleanup to delete some or
all of those files. This tool guides you through a series of tasks and systematic procedures to help you
get back to work quickly.
E.

OS Supplied Utility Third Party Utility


Windows 10 Pro Windows WinRAR
Comment:
WinRAR is a powerful compression tool with many integrated additional functions to help you organize
your compressed archives.

Operating System Windows 10 Pro


Features and functions available:
Process Explorer is a small utility available for free. It can help to find out the files and directory
opened by a program. If you need information that what file or folder is using a process then this tool is
very helpful. It is useful to track the DLL version problems or handle leaks.
F.

G.

Name of threat Type of Virus System Infected


1. Crypto ransomware Ransomware Encrypt your important data, such
as documents, pictures and
videos.
2. Backdoor Trojan Trojan Malware Enables an attacker to gain
remote access to a computer and
take control of it using a
backdoor.
3. “ILOVEYOU" Virus Worm is a computer worm that infected
over ten million Windows
personal computers on and after
5 May 2000 when it started
spreading as an email message
with the subject line "ILOVEYOU"
4. Zeus Gameover Peer-to-peer malware Steal user’s sensitive personal
and financial data

5. Spy Trojan Trojan Malware This includes logging their


keyboard actions, taking
screenshots, accessing the
applications they use, and
tracking login data.
ASSESSMENT FOR CHAPTER 2

1. What are the main types of OS?

 Batch Operating System


 Multitasking/Time Sharing OS
 Multiprocessing OS
 Real Time OS
 Distributed OS
 Network OS
 Mobile OS
[

2. An OS can be said to consist of several ‘layers. How many layers

make up an OS, and what are they? Discuss each layer.

 User Interface

This is the layer of software with which the user interacts directly – the command line interface (CLI) in
MS-DOS and UNIX type OSs, or the graphical user interface (GUI) in Windows, OS/2 and X-Windows in
UNIX/Linux.

 The function of the file system

A file management system is an application that is used to store, arrange, and access files stored on a
disk or other storage location.

 Input/ Output (Control device drivers)

Below the file system is the layer which deals with the physical

interaction of software with the outside world – the input/output (I/O) system. All

the physical communication with external devices, such as disk drives,

keyboard, printers and screen, is controlled by this layer.

 Memory Management

Below the I/O layer of an operating system is the memory management

layer. This is responsible for sharing the physical memory in the computer
between the different processes which want to use it, and dealing with the

situation of a program requiring more memory than is present or available.

 Kernel

The kernel is the essential center of a computer operating system (OS). It is the core that provides basic
services for all other parts of the OS.

3. Name the types of user interface.

 Command Line Interface (CLI)


 Graphical User Interface (GUI)

4. What is the most common medium for storing data?

 Hard Disk Drive

5. What is the function of config.sys?

 Is a text file containing DOS (disk operating system) commands that tell

the OS how the computer is initially set up. More specifically, config.sys

commands specify memory device drivers and programs that control hardware

devices; enable or disable system features; and set limits on system resources.

Config.sys loads at start-up before the autoexec.bat file. Because config.sys is

a text file, it is editable in any text editing program.

6. What is the function of autoexec.bat?


 Is a file containing DOS commands that are executed when the
computer is booted (started). The commands in autoexec.bat tell the OS which
application programs are to be automatically started, how memory is to be
managed, and initialize other settings.
7. What is the function of graphical user interface?

 In contrast, a GUI expects the user to type little or nothing at the

keyboard. Almost all operations can be done using a mouse to point at menus
of commands, or pictures (icons) on the screen representing commands, and

executing them by clicking a mouse button.

8. What is the function of registry?

 The registry is the data file for all 32-bit hardware/driver combinations

and 32-bit applications in both Windows NT and Windows 9x. As 16-bit drivers

do not work in NT, all devices are controlled through the registry, even those

normally controlled by the BIOS. In Windows 9x, 16-bit drivers will continue to

work as real-mode devices, and they use system.ini for control.

9. Give an example wherein the registry is being used.

 Without the registry, the OS would not have the necessary information

to run, to control attached devices, to launch and control applications, and to

respond correctly to user input.

10.Where are Windows’ API functions stored?

 folder \Windows\System32

ASSESSMENT FOR CHAPTER 3

1. You are trying to log on to a computer on a network; you are sure you have entered the
correct username and password, but the system tells you ‘incorrect login’. What are some of
the causes of this?

 Under some circumstances, you may receive incorrect password messages (despite
entering the correct username and password) if your account is in a “locked” state. You may
still be able to log into some services, but for others, you may receive messages like:
Incorrect user ID or password. Type the correct user ID and password, and try again. The
referenced account is currently locked out and may not be logged on to.
If you are certain you are entering the correct password but still receiving these
messages, DO NOT RESET YOUR PASSWORD as this can exacerbate the issue. When
you reset your password, your account is not unlocked automatically, so your new password
will not work either.

2. What are the two methods of initiating the shut-down procedure in Windows Operating
system?

 one is to place the mouse pointer over the Start button on the taskbar and click the left mouse
button,

The other method is to press the Windows key on the keyboard, which displays the start menu box,
and proceed as above.

3. What is meant by a ‘hierarchical’ file storage structure?

 A hierarchical file system is how drives, folders, files, and other storage devices are organized and
displayed on an operating system. In a hierarchical file system, the drives, folders, and files are
displayed in groups, which allows the user to see only the files they're interested in seeing.

4. What options are presented if you right-click the windows 10 logo on the task bar? Kindly
discuss the function of each option.

 Windows Start-Up

5. Which characters can NOT be used in the Windows OS file naming convention?

 Reserved characters which may not be used in the name.

6. What attributes are associated with the files io.sys and msdos.sys?

 Windows 9x operating systems

7. What attributes are associated with the files win.ini and system.ini?

 Windows Operating Systems

8. I want to print 10 copies of a document. How do I do this?

 To increase or decrease the number of copies required, either use the arrows at the side of
the Number of copies box, or type in the number of copies required.

9. How can a print job be cancelled?


[

 In the list, click the document you want to pause or cancel. On the Document menu, click
Pause Printing or Cancel Printing.
10. I want to print page 1 to 20, but I want to skip page 5, 10 and 15. How do I do this?
 First, go to printer setting, then on page range, click on pages: and type 1-4 pages only
after that pages, go to printer setting again ang type 7-9 pages. And then 11-14 pages,
after printing that, go again to printer setting and type 16-20 pages. So that the pages that
you want to skip will be skipped.
11. I want to rename a certain folder, kindly demonstrate using the method in GUI and using
the command line interface. Kindly use screen shots to support your answer.

First thing I did was I created a document file


and named it as myname, then I opened cmd
and find the directory of my file which is d:, and
type dir and rename my file jude.

You might also like