Module 2 - Computer Software
Module 2 - Computer Software
Introduction
To
Information
Technology
University Requirements
Compulsory Course
2 Cr
MODULE 2
COMPUTER SOFTWARE
Ahmed A. Soliman
Module agenda
An operating system (OS) is system software that manages computer hardware and software resources and
provides common services for computer programs.
For hardware functions such as input and output and memory allocation, the operating system acts as an
intermediary between programs and the computer hardware, although the application code is usually
executed directly by the hardware and frequently makes system calls to an OS function or is interrupted by
it. Operating systems are found on many devices that contain a computer – from cellular phones and video
game consoles to web servers and supercomputers.
Operating system
function
GM-NAA I/O
First-ever UNIVAC I Operating System
computer OS Fortran Monitor System (FMS)
list IBM 650 Tape System
Batch Processing Monitor (BPM)
Dartmouth Time Sharing System (DTSS)
CTSS (Compatible Time-Sharing System)
IBM OS/360
Apple macOS
Names of
modern Google's Android OS
Main
components of I/O Device Network
an operating Management Management.
system
Memory Security
management Management
Main components of
an operating system
• PARTITION
A logical part of the hard drive that contains data, the
operating system interacts with each partition as a
stand-alone disk
• FOLDER/DIRECTORY
Logical grouping of files that the user creates to
organize files into relevant groups
• FILE
The main data container that contains the actual bytes
the composes data
Paths
C:\Documents\AIU\Building.jpg
• File
• Extension
• Path separator
Modern file systems
• Some file systems are accessible on any device and
operating system, while some others are dedicated
and can be only accessed on specific operating
system but can be accessed on other systems with
limited abilities
• The main purpose of a file system is to store each
file’s exact place on the physical media and its
calculated size, attributes and physical location on the
storage device
• Common file systems
• FAT32
• ExFAT
• Proprietary File systems
• Apple IOS: Uses HFS+ file system
• Microsoft Windows: Uses NTFS file system
• Google Android: uses EXT4 file system
Main Process Management
components
of an
operating
• Process creation and termination.
system • Suspension and resumption.
• Synchronization process
• Communication process
Process
management
The operating system manages the resources of the computer device to satisfy
the demands of the application as long as it is running
When the application is closes, the system deallocates the resources that were
used by it to make it available for other running applications of mark it as free for
the use of new processes that the user might launch later.
Process resources allocation life cycle
Process created
Application launch Memory allocated
Processor workload dedicated
Resources maintained
Application running Dynamic reallocation of resources to meet
application demands during runtime
Process terminated
Application close Memory deallocated
Processor workload freed
Task manager
(Practical)
management • The control unit in the processor handles the hardware and
reports each unit status to the system so it can then Manage it
properly.
I/O Device Management
Process Management
of an
• It offers buffer caching system
• It provides general device driver code
• It provides drivers for particular hardware devices.
operating
• I/O helps you to knows the individualities of a specific device.
Network Management
system
• Distributed systems help you to various computing resources in size and function. They may involve
microprocessors, minicomputers, and many general-purpose computer systems.
• A distributed system also offers the user access to the various resources the network shares.
• It helps to access shared resources that help computation to speed-up or offers data availability and reliability.
Memory management
• It helps you to keep track of primary memory.
• Determine what part of it are in use by whom, what part is not in use.
• In a multiprogramming system, the OS takes a decision about which process will get Memory and how much.
• Allocates the memory when a process requests
• It also de-allocates the Memory when a process no longer requires or has been terminated.
Security Management
•The various processes in an operating system need to be secured from each other’s activities. For that purpose,
various mechanisms can be used to ensure that those processes which want to operate files, memory CPU, and
other hardware resources should have proper authorization from the operating system.
Main Network Management
components
of an
operating • Networks helps connecting computers to various
system network resources available, in addition to
connecting computers to each others.
• Usually, computers need other network devices
to help connect them to network resources like
(Network switches, routers and access points)
What is a network
Why Memory
Management To minimize fragmentation issues.
is Required?
To proper utilization of main memory.
attacks
Malware
Phishing
Types of OS Attacks
It means that some portion of a message is altered or that message is delayed or reordered
2. Modification of messages to produce an unauthorized effect. For example, a message meaning. Allow JOHN to read
confidential file X is modified as Allow Smith to read confidential file X.
It involves the passive capture of a message and its subsequent transmission to produce an
3. Replay authorized effect.
It prevents normal use of communication facilities. This attack may have a specific target.
4. Denial of Service For example, an entity may suppress all messages directed to a particular destination.
Types of OS Attacks
Passive Attacks:
A Passive attack attempts to learn or make use of information from the system but does not affect
system resources. Passive Attacks are eavesdropping on or monitoring of transmission. The goal of the
opponent is to obtain information is being transmitted.
• 1. The release of message content
• An electronic mail message or a transferred file or even entering a text in an
electronic form field may contain sensitive or confidential information. We
would like to prevent an opponent from learning the contents of these
transmissions.
• 2. Traffic analysis
• Suppose that we had a way of masking (encryption) of information, so that
the attacker even if captured the message could not extract any information
from the message.
• The opponent could determine the location and identity of the
communicating host and could observe the frequency and length of
messages being exchanged. This information might be useful in guessing the
nature of the communication that was taking place.
Types of OS Attacks
Malware
Malware is malicious software used to breach information systems by exploiting
network vulnerabilities. This usually happens when users click links and attachments
that install harmful software. There are different types of malware including spyware,
ransomware, viruses, and worms. Malware can have a variety of malicious capabilities:
• It can block access to the network or parts of the network
• It can install other malware
• It can secretly copy data from the hard drive and transmit it
• It can disrupt the system and make it inoperable
Types of OS Attacks
• Ransomware
Ransom malware, or ransomware, is a
type of malware that prevents users from
accessing their system or personal files
and demands ransom payment in order
to regain access. While some people
might think “a virus locked my
computer,” ransomware would typically
be classified as a different form of
malware than a virus.
Types of OS Attacks
Phishing
Phishing is a social engineering attack entailing fraudulent
communications appearing to come from a trusted source.
Attempts to steal sensitive information or trick people into
installing malware often come via email. Phishing is the
leading cause of cyber-attacks worldwide.
Security management
Tear Apart
Your System
Operating system
virtualization products
• Microsoft Hyper-V: Developed by Microsoft, Hyper-V comes
pre-shipped with Microsoft Windows starting Windows 8 and
above, however, the feature needs to be enabled first to be
able to use it
• Oracle VirtualBox: developed by the well know Oracle
corporation, it is a freeware application that enables you to
install multiple systems all isolated from each others and it is
lightweighted when compared to other similar solutions.
• VMWare Workstation: is a paid application that offers a vast
variety of features to enable you to install different operating
systems and run them side by side, even create a network
between them.
Using Oracle VirtualBox
virtualization platform
(Practical)
Computer
Applications
• Defining applications
• Installation
• Execution and Termination
• Uninstallation
• Layered architecture
• Licensing and payment
models
• Practical: Microsoft Word
Computer applications
definition
An installation package is mainly a compressed file that contains all the files,
resources and instructions needed to successfully prepare the application to be
installed and launched later.
Application Once an installation package decompresses the resources needed for the
application, it immediately launches an embedded application called the
installation Installer, which helps the user during the installation process.
The installer also saves each change it makes during the installation process, so
it can revert it when the user decides to Uninstall the application
The user only needs to install the application once, then he may use the
installed application as many times as he wants without the need to reinstall
Running an application and
force-ending not responding
ones
• Usually and for most modern applications, running
an app after installation requires nothing than double
clicking its icon that the installer creates it.
• Under some circumstances, an application might
become unresponsive for multiple possible reasons
like :-
• Insufficient system resources
• Missing file or directory
• Invalid permissions
• Application internal error
• In such cases, most modern operating systems offers
a Task manager that is dedicated to forcefully end
unresponsive applications
Running an application and force-ending not
responding ones
That’s where the data goes when it gets loaded from the
Persistent data layer underlying database to the memory so the application can
process it safely in isolation of the actual database
Popular
The application requires a
Spotify, YouTube
periodic payment (usually Premium, Netflix and
monthly) to keep using the Anghami
Pay-As-You-Go:
Like: Microsoft Azure,
The application tailors a Amazon Web Services,
dedicated payment amount and other online cloud
services
based on the features you
select
Module 2: Summary
Operating System Applications