Complete E1
Complete E1
Advantages of Multiprogramming OS
Throughout the system, it increased as the CPU always had one program to execute.
Response time can also be reduced.
Disadvantages of Multiprogramming OS
Multiprogramming systems provide an environment in which various systems resources
are used efficiently, but they do not provide any user interaction with the computer
system.
Multiprocessing Operating System
In Multiprocessing, Parallel computing is achieved. There are more than
one processors present in the system which can execute more than one process at the same time.
This will increase the throughput of the system.
In Multiprocessing, Parallel computing is achieved. More than one processor present in the
system can execute more than one process simultaneously, which will increase the throughput of
the system.
Advantages of Multiprocessing operating system:
Increased reliability: Due to the multiprocessing system, processing tasks can be
distributed among several processors. This increases reliability as if one processor fails,
the task can be given to another processor for completion.
Increased throughout: As several processors increase, more work can be done in less.
Disadvantages of Multiprocessing operating System
Multiprocessing operating system is more complex and sophisticated as it takes care of
multiple CPUs simultaneously.
Distributed operating System
Distributed systems use multiple central processors to serve multiple
real-time
time applications and multiple users. Data processing jobs are distributed among the
processors accordingly.
The processors communicate with one another through various
communication lines (such as high
high-speed buses or telephone lines).
These are referred as loosely coupled systems or distributed systems.
Processors
ors in a distributed system may vary in size and function. These processors are referred as
sites, nodes, computers, and so on.
The advantages of distributed systems are as follows −
With resource sharing facility, a user at one site may be able to use the resources
available at another.
Speedup the exchange of data with one another via electronic mail.
If one site fails in a distributed system, the remaining sites can potentially continue
operating.
Better service to the customers.
Reduction of the load on the host computer.
Reduction of delays in data processing.
Network operating System
A Network Operating System runs on a server and provides the
server the capability to manage data, users, groups, sec
security,
urity, applications, and other networking
functions. The primary purpose of the network operating system is to allow shared file and printer
access among multiple computers in a network, typically a local area network (LAN), a private
network or to other networks.
Examples of network operating systems include Microsoft Windows Server 2003, Microsoft
Windows Server 2008, UNIX, Linux, Mac OS X, Novell NetWare, and BSD.
It is better that operating systems have a modular structure, unlike MS-DOS. That would lead to
greater control over the computer system and its various applications. The modular structure
would also allow the programmers to hide information as required and implement internal
routines as they see fit without changing the outer specifications.
Advantages
Following are advantages of a simple operating system structure.
Easy Development - In simple operation system, being very few interfaces,
development is easy especially when only limited functionalities are to be delivered.
Better Performance - Such a sytem, as have few layers and directly interects with
hardware, can provide a better performance as compared to other types of operating
systems.
Disadvantages
Following are disadvantages of a simple operating system structure.
Frequent System Failures - Being poorly designed, such a system is not robust. If
one program fails, entires operating system crashses. Thus system failures are quiet
frequent in simple operating systems.
Poor Maintainability - As all layers of operating systems are tightly coupled,
change in one layer can impact other layers heavily and making code unmanageable
over a period of time.
Monolith Structure
In monolith structured operating system, a central piece of code called
kernel is responsible for all major operations of an operating system. Such operations includes
file management, memory management, device management and so on. The kernal is the main
component of an operating system and it provides all the services of an operating system to the
application programs and system programs.
The kernel has access to the all the resources and it acts as an interface
with application programs and the underlying hardware. A monolithic kernel structure promotes
timesharing, multiprogramming model and was used in old banking systems.
Advantages
Following are advantages of a monolith operating system structure.
Easy Development - As kernel is the only layer to develop with all major
functionalities, it is easier to design and develop.
Performance - As Kernel is responsible for memory management, other
operations and have direct access to the hardware, it performs better.
Disadvantages
Following are disadvantages of a monolith operating system structure.
Crash Prone - As Kernel is responsible for all functions, if one function fails
entire operating system fails.
Difficult to enhance - It is very difficult to add a new service without impacting
other services of a monolith operating system.
Micro-Kernel Structure
As in case monolith structure, there was single kernel, in micro-
kernel, we have multiple kernels each one specilized in particular service. Each microkernel is
developed independent to the other one and makes system more stable. If one kernel fails the
operating sytem will keep working with other kernel's functionalities.
Advantages
Following are advantages of a microkernel operating system structure.
Reliable and Stable - As multiple kernels are working simultaneously, chances
of failure of operating sytem is very less. If one functionlity is down, operating
system can still provide other functionalities using stable kernels.
Maintainability - Being small sized kernels, code size is maintainable. One can
enhance a microkernel code base without impacting other microkernel code base.
Disadvantages
Following are disadvantages of a microkernel operating system structure.
Complex to Design - Such a microkernel based architecture is difficult to design.
Performance Degradation - Multi kernel, Multi-modular communication may
hamper the performance as compared to monolith architecture.
Exo-Kernel Structure
Exo-Kernal Structured operating system was designed and developed
at MIT. The aim of this design was to keep Kernel size minimal while allowing the application
programs to manage hardware resources directly. The purpose of removing abstraction of
operating system for hardware resources was to enable application programmer to write high
performance code while exo-kernel handles other operations.
Advantages
Following are advantages of a exo-kernel operating system structure.
High Performance - As application program can allocate memory, a better designed
code can make optimal use and perform better.
Application Control - As resource management is not secured by operating system,
application program has more control over system resources and can write custom
operations on system resources.
Disadvantages
Following are disadvantages of a exo-kernel operating system structure.
Unreliable and Unsafe - As security is in application program level, a poorly
written code can ruin the system.
Complex Design - Exo-Kernel designing is complicated.
Layered Structure
One way to achieve modularity in the operating system is the layered
approach. In this, the bottom layer is the hardware and the topmost layer is the user interface.
An image demonstrating the layered approach is as follows −
As seen from the image, each upper layer is built on the bottom layer. All the
layers hide some structures, operations etc from their upper layers.
One problem with the layered structure is that each layer needs to be carefully
defined. This is necessary because the upper layers can only use the functionalities of the layers
below them.
Advantages
Following are advantages of a layered operating system structure.
High Customizable - Being layered, each layer implmentation can be customized
easily. A new functionality can be added without impacting other modules as well.
Verifiable - Being modular, each layer can be verified and debugged easily.
Disadvantages
Following are disadvantages of a layered operating system structure.
Less Performant - A layered structured operating system is less performant as
compared to basic structured operating system.
Complex designing - Each layer is to planned carefully as each layer communicates
with lower layer only and a good design process is required to create a layered
operating system.
Modular Structure
Modular structure operating system works on the similar princhiple as a
monolith but with better design. A central kernal is responsible for all major operations of
operating system.
This kernal has set of core functionality and other services are loaded
as modules dynamically to the kernal at boot time or at runtime. Sun Solaris OS is one of the
example of Modular structured operating system.
Advantages
Following are advantages of a modular operating system structure.
High Customizable - Being modular, each module implmentation can be
customized easily. A new functionality can be added without impacting other
modules as well.
Verifiable - Being modular, each layer can be verified and debugged easily.
Disadvantages
Following are disadvantages of a modular operating system structure.
Less Performant - A modular structured operating system is less performant as
compared to basic structured operating system.
Complex designing - Each module is to planned carefully as each module
communicates with kernal. A communication API is to be devised to facilitate the
communication.
Virtual Machine Structure
In this kind of structure, hardware like CPU, memory, hard disks are abstracted into virtual
machines. User can use them with actually configure them using execution contexts. Virtual
machine takes a good amount of disk space and is to be provisioned. Muliple virtual machines can
be created on a single physical machine.
Advantages
Following are advantages of a virtual machine based operating system structure.
High Customizable - Being virtual, functionality are easily accessible, can be
customized on need basis.
Secure - Being virtual, and no direct hardware access, such systems are highly
secured.
Disadvantages
Following are disadvantages of a virtual machine based operating system structure.
Less Performant - A virtual structured operating system is less performant as
compared to modular structured operating system.
Complex designing - Each virtual component of the machine is to planned carefully
as each component is to abstract underlying hardware.
Geneations of Operating System
Operating systems have been evolving over the years. We can categorise this
evaluation based on different generations which is briefed below:
0th Generation (1940 - early 1950s)
The term 0th generation is used to refer to the period of development of computing when
Charles Babbage invented the Analytical Engine and later John Atanasoff created a computer in
1940. The hardware component technology of this period was electronic vacuum tubes. There was
no Operating System available for this generation computer and computer programs were written
in machine language. This computers in this generation were inefficient and dependent on the
varying competencies of the individual programmer as operators.
Device Management
An OS manages device communication via its respective drivers. It
performs the following activities for device management.
Keeps track of all devices connected to the system. Designates a program responsible for
every device known as the Input/Output controller.
Decide which process gets access to a certain device and for how long.
Allocates devices effectively and efficiently. Deallocates devices when they are no longer
required.
There are various input and output devices. An OS controls the working of these input-
output devices.
It receives the requests from these devices, performs a specific task, and communicates back
to the requesting process.
File Management
A file system is organized into directories for efficient or easy navigation
and usage. These directories may contain other directories and other files. An Operating System
carries out the following file management activities. It keeps track of where information is
stored, user access settings, the status of every file, and more.
These facilities are collectively known as the file system. An OS keeps
track of information regarding the creation, deletion, transfer, copy, and storage of files in an
organized way.
It also maintains the integrity of the data stored in these files, including
the file directory structure, by protecting against unauthorized access.
User Interface or Command Interpreter
The user interacts with the computer system through the operating
system. Hence OS acts as an interface between the user and the computer hardware. This user
interface is offered through a set of commands or a graphical user interface (GUI).
Through this interface, the user makes interacts with the applications
and the machine hardware.
Security
The operating system uses password protection to protect user data and
similar other techniques. it also prevents unauthorized access to programs and user data. The
operating system provides various techniques which assure the integrity and confidentiality of
user data.
Job Accounting
The operating system Keeps track of time and resources used by various tasks
and users, this information can be used to track resource usage for a particular user or group of
users. In a multitasking OS where multiple programs run simultaneously, the OS determines
which applications should run in which order and how time should be allocated to each
application.
Error-Detecting Aids
The operating system constantly monitors the system to detect errors and
avoid malfunctioning computer systems. From time to time, the operating system checks the
system for any external threat or malicious software activity. It also checks the hardware for
any type of damage. This process displays several alerts to the user so that the appropriate
action can be taken against any damage caused to the system.
System Calls
A system call is a way for a user program to interface with the operating
system. The program requests several services, and the OS responds by invoking a series of
system calls to satisfy the request. A system call can be written in assembly language or a high-
level language like C or Pascal. System calls are predefined functions that the operating system
may directly invoke if a high-level language is used.
A system call is a method for a computer program to request a service
from the kernel of the operating system on which it is running. A system call is a method of
interacting with the operating system via programs. A system call is a request from computer
software to an operating system's kernel.
The Application Program Interface (API) connects the operating
system's functions to user programs. It acts as a link between the operating system and a
process, allowing user-level programs to request operating system services. The kernel system
can only be accessed using system calls. System calls are required for any programs that use
resources.
Why do you need system calls in Operating System?
There are various situations where you must require system calls in the operating system.
Following of the situations are as follows:
It is must require when a file system wants to create or delete a file.
Network connections require the system calls to sending and receiving data packets.
If you want to read or write a file, you need to system calls.
If you want to access hardware devices, including a printer, scanner, you need a
system call.
System calls are used to create and manage new processes.
How System Calls Work
The Applications run in an area of memory known as user space. A
system call connects to the operating system's kernel, which executes in kernel space. When an
application creates a system call, it must first obtain permission from the kernel. It achieves this
using an interrupt request, which pauses the current process and transfers control to the kernel.
If the request is permitted, the kernel performs the requested action, like
creating or deleting a file. As input, the application receives the kernel's output. The application
resumes the procedure after the input is received. When the operation is finished, the kernel
returns the results to the application and then moves data from kernel space to user space in
memory.
A simple system call may take few nanoseconds to provide the result,
like retrieving the system date and time. A more complicated system call, such as connecting to
a network device, may take a few seconds. Most operating systems launch a distinct kernel
thread for each system call to avoid bottlenecks. Modern operating systems are multi-threaded,
which means they can handle various system calls at the same time.
Process Control
Process control is the system call that is used to direct the processes. Some process control
examples include creating, load, abort, end, execute, process, terminate the process, etc.
File Management
File management is a system call that is used to handle the files. Some file management
examples include creating files, delete files, open, close, read, write, etc.
Device Management
Device management is a system call that is used to deal with devices. Some examples of device
management include read, device, write, get device attributes, release device, etc.
Information Maintenance
Information maintenance is a system call that is used to maintain information. There are some
examples of information maintenance, including getting system data, set time or date, get time
or date, set system data, etc.
Communication
Communication is a system call that is used for communication. There are some examples of
communication, including create, delete communication connections, send, receive messages,
etc.
System Boot
Booting
ng in Operating System
Booting is the process of starting a computer. It can be initiated by
hardware such as a button press or by a software command. After it is switched on, a CPU has
no software in its main memory,
ry, so some processes must load software into memory before
execution. This may be done by hardware or firmware in the CPU or by a separate processor in
the computer system.
Restarting a computer also is called rebooting, which can be "hard",
"
e.g., after electrical power to the CPU is switched from off to on, or "soft
soft", where the power is
not cut. On some systems, a soft boot may optionally clear RAM to zero. Hard and soft booting
can be initiated by hardware such as a button press or a software command. Booting is
complete when the operative runtime system, typically the operating system and some s
applications, is attained.
The process of returning a computer from a state of sleep does not
involve booting; however, restoring it from a state of hibernation does. Minimally, some
embedded systems do nott require a noticeable boot sequence to begin functioning and, when
turned on, may run operational programs that are stored in ROM. All computer systems are
state machines and a reboot may be the only method to return to a designated zero-state
zero from an
unintended, locked state.
In addition to loading an operating system or stand--alone utility, the boot
process can also load a storage dump program for diagnosing problems in an operating system.
Sequencing of Booting
1. Boot Loader: Computers powered by the central processing unit can only execute code found
in the system's memory. Modern operating systems and application program code and data are
stored on nonvolatile memories. When a computer is first powered on, it must initially rely only
on the code and data stored in nonvolatile portions of the system's memory. The operating
system is not really loaded at boot time, and the computer's hardware cannot perform many
complex systems actions.
The program that starts the chain reaction that ends with the entire operating system being loaded
is the boot loader or bootstrap loader. The boot loader's only job is to load other software for the
operating system to start.
2. Boot Devices: The boot device is the device from which the operating system is loaded. A
modern PC BIOS (Basic Input/Output System) supports booting from various devices. These
include the local hard disk drive, optical drive, floppy drive, a network interface card, and a USB
device. The BIOS will allow the user to configure a boot order. If the boot order is set to:
CD Drive
Hard Disk Drive
Network
The BIOS will try to boot from the CD drive first, and if that fails,
then it will try to boot from the hard disk drive, and if that fails, then it will try to boot from the
network, and if that fails, then it won't boot at all.
3. Boot Sequence: There is a standard boot sequence that all personal computers use. First, the
CPU runs an instruction in memory for the BIOS. That instruction contains a jump instruction
that transfers to the BIOS start-up program. This program runs a power-on self-test (POST) to
check that devices the computer will rely on are functioning properly. Then, the BIOS goes
through the configured boot sequence until it finds a bootable device. Once BIOS has found a
bootable device, BIOS loads the bootsector and transfers execution to the boot sector. If the boot
device is a hard drive, it will be a master boot record (MBR).
The MBR code checks the partition table for an active partition. If one
is found, the MBR code loads that partition's boot sector and executes it. The boot sector is often
operating system specific, and however, in most operating systems, its main function is to load
and execute the operating system kernel, which continues start-up. Suppose there is no active
partition, or the active partition's boot sector is invalid. In that case, the MBR may load a
secondary boot loader which will select a partition and load its boot sector, which usually loads
the corresponding operating system kernel.
1. Cold Booting: When the computer starts for the first time or is in a shut-down state and
switch on the power button to start the system, this type of process to start the computer is
called cold booting. During cold booting, the system will read all the instructions from the
ROM (BIOS) and the Operating System will be automatically get loaded into the system.
This booting takes more time than Hot or Warm Booting.
2. Warm Booting: Warm or Hot Booting process is when computer systems come to no
response or hang state, and then the system is allowed to restart during on condition. It is
also referred to as rebooting. There are many reasons for this state, and the only solution is
to reboot the computer. Rebooting may be required when we install new software or
hardware. The system requires a reboot to set software or hardware configuration changes,
or sometimes systems may behave abnormally or may not respond properly. In such a case,
the system has to be a force restart. Most commonly Ctrl+Alt+Del button is used to reboot
the system. Else, in some systems, the external reset button may be available to reboot the
system.
Step 1: Once the computer system is turned on, BIOS (Basic Input /Output System) performs a
series of activities or functionality tests on programs stored in ROM, called on POST (Power-on
Self Test) that checks to see whether peripherals in the system are in perfect order or not.
Step 2: After the BIOS is done with pre pre-boot
boot activities or functionality test, it read bootable
boot
sequence from CMOS (Common Metal Oxide Semiconductor) and looks for master boot record
in the first physical sector of the bootable disk as per boot device sequence specified in CMOS.
For example, if the boot device sequence is:
Floppy Disk
Hard Disk
CDROM
Step 3: After this, the master boot record will search first in a floppy disk drive.
drive If not found,
then the hard disk drive will search for the master boot record. But if the master boot record is
not even present on the hard disk, then the CDROM drive will search. If the system cannot read
the master boot record from any of these sources, ROM displays "No No Boot device found"
found and
halted the system. On finding the master boot record from a pparticular
articular bootable disk drive, the
operating system loader, also called Bootstrap loader, is loaded from the boot sector of that
bootable drive· into memory. A bootstrap loader is a special program that is present in the boot
sector of a bootable drive.
Step 4: The bootstrap loader first loads the IO.SYS file. After this, MSDOS.SYS file is loaded,
which is the core file of the DOS operating system.
Step 5: After this, MSDOS.SYS file searches to find Command Interpreter in CONFIG.SYS file,
and when it finds, it loads into memory. If no Command Interpreter is specified in
the CONFIG.SYS file, the COMMAND.COM file is loaded as the default Command Interpreter
of the DOS operating system.
Step 6: The last file is to be loaded and executed is the AUTOEXEC.BAT file that contains a
sequence of DOS commands. After this, the prompt is displayed. We can see the drive letter of
bootable drive displayed on the computer system, which indicates that the operating system has
been successfully on the system from that drive.
System Programs
The performance of the entire computer's application software is controlled by the system
program, which is one of several sorts of system programs that users of operating systems can
use.
o File management:
The files and directory are generally manipulated by these programs, which also create,
delete, copy, rename, print, and exit.
In the computer system, adding new files and putting them in certain places can be
helpful.
It aids in swiftly and simply locating these files within the computer system.
It effectively simplifies and streamlines the process of exchanging files among
users.
Files should be kept in distinct directories, which are folders.
Users can manage files according to their intended usage or conduct rapid searches
of files using these directories.
The ability to change a file's data or a directory's file names is helpful to users.
o Status information:
Status information is the knowledge of the input, output, storage, and CPU usage
processes and how the process will compute how much memory is needed to complete a
task.
o Communication:
The user offers these services because the operating system requires that a large number
of devices be able to communicate with one another via wireless or other devices.
o Background services:
In the operating system, there are several services that may be used for communication,
and a background service can be used to change the backdrop of your window and
search for and identify computer viruses.
INTRODUCTION TO DOS
A disk operating system (DOS) is an operating system for x86 based personal computers mostly
developed by Microsoft. MS-DOS,
DOS, its rebranding as IBM PC DOS, and some operating systems
attempting to be compatible with MS-DOS.
DOS. Sometimes it is referred to as "DOS", which is also the
generic acronym for disk operating system.
MS-DOS
DOS was the main operating system for IBM PC compatible per
personal
sonal computers during the 1980s.
It was gradually superseded by operating systems offering a graphical user interface (GUI) in various
graphical Microsoft Windows operating system generations.
Several competing products were released for the x86 platform during its lifetime, and MS-DOS
MS went
through eight versions until development ceased in 2000. Initially, M
MS-DOS
DOS was targeted at Intel 8086
processors running on computer hardware using floppy disks to store and access the operating system,
application software, and user data.
Progressive version releases delivered support for other mass storage media in ever greater sizes and
formats and added feature support for newer processors and rapidly evolving computer architectures.
Microsoft's development was the key product from a programming language company to a diverse
software development firm, providing essential revenue and marketing resources. It was also the
underlying basic operating system on which early versions of Windows ran as a GUI.
1. The read-only memory (ROM) bootstrap loader reads the Master Boot Record and passes control
over to it.
2. The boot record loads the disk operating system into memory, and it takes control of the
machine.
3. The computer transfers data stored on a magnetic disk to its main memory, the random-access
memory.
4. It also transfers data to external devices attached to the computer, such as a computer screen or
printer.
5. The computer provides various applications programming interfaces for programs like character
input/output, memory management, program loading, termination, and handling input from the
user through a keyboard.
6. The OS also provides file management that organizes, reads, and writes files on storage. The
files are organized in a hierarchical structure of directories, subdirectories, and files.
A disk operating system doesn't have a graphical user interface (GUI). Its interface is character-
based, so users must type commands in the command line to indicate what actions they want.
Features of DOS
Here are some of the distinguishing features of a disk operating system, such as:
1. MS-DOS does not offer GUI (Graphical User Interface) and doesn't accept mouse inputs. It is a
character-based interface system where all commands are entered in the text at the command-line
prompt.
2. A disk operating system manages files, folders and allows program loading and execution. It can
control hardware devices such as disk, memory and allocate resources.
3. MS-DOS offers a file system to organize, read and write files to the disk storage.
4. It is a single-user operating system and performs various tasks to ensure the proper operation of
systems.
5. It uses a 16-bit file allocation table (FAT16), and a 16-bit interface is used to define the location of
the memory of each file uniquely. These identifiers are stored in a tabular format with the name
File Allocation table.
6. MS-DOS does not support a multiuser operating system, and it is less secure and does not have a
concept of user roles. It is very lightweight due to its basic interface and limited features.
Limitations of MS-DOS
Here are the following limitations of the disk operating system, such as:
1. Built-in security:DOS does not have built-in security, such as file ownership and permissions.
2. No multiuser or multitasking:It also does not support multiuser or multitasking. It can only
run one program at a time, but it provides direct access to the basic I/O system and underlying
hardware.
3. Challenging interface:A user must type in commands and remember commands to run
programs and other OS tasks. For example, typing the command cd \directory_name changes the
current working directory to the named directory, and typing the command dir lists the files in the
current directory. This approach makes it difficult for beginners to use.
HISTORY OF DOS
DOS, or Disk Operating System, is a family of operating systems originally developed for
personal computers in the early 1980s. It was foundational in the evolution of personal computing.
Here’s a brief history of its development and key milestones:
6. DOS Today
1. DOS is still used in some specialized systems and embedded systems for its simplicity and low
resource requirements.
2. FreeDOS, an open-source version, remains available for enthusiasts, retro computing, and legacy
support.
In the booting process of DOS, the following steps are performed when we start a computer –
1. Once the computer system is turned on, BIOS (Basic Input /Output System) performs a series of
activities or functionality test on programs stored in ROM, called on Power-on Self-Test (POST)
that checks to see whether peripherals in system are in perfect order or not.
2. After the BIOS is done with pre-boot activities or functionality test, it read bootable sequence from
CMOS (Complementary metal oxide semiconductor) and looks for master boot record in first
physical sector of the bootable disk as per boot device sequence specified in CMOS. For example, if
the boot device sequence is –
a) Floppy Disk
b) Hard Disk
c) CDROM
3. After this, master boot record will be searched first in a floppy disk drive. If not found, then hard
disk drive will be searched for master boot record. But if the master boot record is not even present
on hard disk, then CDROM drive will be searched. If the system is not able to read master boot
record from any of these sources, ROM displays the message “No Boot device found” and system is
halted. On finding master boot record from a particular bootable disk drive, operating system
loader, also called Bootstrap loader is loaded from boot sector of that bootable drive· into memory.
A bootstrap loader is a special program that is present in boot sector of bootable drive.
4. Bootstrap loader first loads the IO.SYS file. After this, MSDOS.SYS file is loaded which is core
file of DOS operating system.
5. After this, MSDOS.SYS file searches to find Command Interpreter in CONFIG.SYS file and when
it finds, it loads into memory. If no Command Interpreter specified in the CONFIG.SYS file, the
COMMAND.COM file is loaded as default Command Interpreter of DOS operating system.
6. The last file is to be loaded and executed is the AUTOEXEC.BAT file that contains a sequence of
DOS commands. After this, the prompt is displayed, and we can see drive letter of bootable drive
displayed on the computer system, which indicates that operating system has been successfully on
the system from that drive.
Types of Booting
1. Cold Booting/Switch Booting – When the user starts computer by pressing power switch
on system unit, the operating system is loaded from disk to main memory this type of booting is
called Cold Booting. This booting takes more time than Hot or Warm Booting.
2. Hot or Warm Booting– Hot booting is done when computer system comes to no response
state/hang state. Computer does not respond to commands supplied by user. There are many reasons
for this state, only solution is to reboot computer by using the Reset button on cabinet or by pressing
a combination of ALT + CTRL + DEL keys from keyboard.
1. Directory Structure
1. Hierarchical Structure:Organize directories in a hierarchical format with broad categories at the
top level, gradually narrowing down into subcategories. For example:
Project/
├── Docs/
├── Code/
│ └── Analysis/
├── Data/
└── Reports/
- `sales_report_2023-08-30.xlsx`
- `marketing_plan_v02.docx`
- `data_processing_script_v01.py`
2. Folders:
- `2023-Q1/Reports/`
- `Code/Data_Processing/`
- `ClientDocs/Invoices/2023/`
These files are required for DOS to boot and operate. They typically reside in the root directory of
the bootable drive (often `C:\`).
1. IO.SYS: This is a core file that contains the basic input/output system (BIOS) drivers for DOS,
handling low-level device interactions such as reading from the keyboard or writing to the screen. It
also loads DOS into memory during the boot process.
2. MSDOS.SYS: Originally a binary file in early versions of DOS, `MSDOS.SYS` contains DOS
kernel code and is responsible for handling system calls, file operations, and memory management.
In later versions of DOS (like MS-DOS 6.22), `MSDOS.SYS` became a text configuration file in
Windows 95, storing settings that controlled startup behaviour.
3. COMMAND.COM: This is the default command-line interpreter for DOS. It provides the prompt,
runs batch files, and interprets and executes commands. If `COMMAND.COM` is missing, users
cannot access the command prompt.
1. CONFIG.SYS: A configuration file loaded during the boot process that allows users to set system
parameters and load device drivers. Typical entries include memory management (`HIMEM.SYS`),
device loading, and file buffers.
2. AUTOEXEC.BAT: A batch file that automatically executes upon startup, running user-specified
programs, setting environment variables (like `PATH` and `PROMPT`), and initializing the DOS
environment. For example, it can load `mouse.com` for mouse support.
1. HIMEM.SYS: A DOS driver for accessing extended memory (above 1 MB in 80286+ computers).
It’s often loaded via `CONFIG.SYS` to improve memory management.
2. EMM386.EXE: A memory manager that allows access to expanded memory (EMS) on computers
with 386 processors and above. It can also manage upper memory blocks (UMBs), which help load
programs high, freeing up conventional memory.
3. DRIVER.SYS, ANSI.SYS: These are optional drivers that can be loaded through `CONFIG.SYS`.
`DRIVER.SYS` manages hardware like disk drives, while `ANSI.SYS` provides ANSI escape code
support for enhanced text formatting in the command line.
1. The BIOS loads the boot sector from the bootable drive, which then loads `IO.SYS`.
2. `IO.SYS` loads `MSDOS.SYS`, initializing the DOS kernel.
3. `CONFIG.SYS` is processed to load any specified drivers or settings.
4. `COMMAND.COM` is loaded to provide the command prompt.
5. `AUTOEXEC.BAT` runs to set up the environment.
1. DIR
2. CLS
Syntax: `CLS`
Example: CLS
3. VER
Syntax: `VER`
Example: VER
4. VOL
Definition: Displays the disk volume label and serial number if they exist.
Example: VOL C:
5. DATE
DATE 08:30:2023
6. TIME
TIME 14:30:00
7. COPY
8. TYPE
9. REN (Rename)
10.DEL (Delete)
Example:CD C:\Users\John
Example: MD Projects
Example: RD Projects
14.PATH
Definition: Sets or displays the search path for executable files. The `PATH` command
specifies the directories DOS searches to find executable files.
Explanation: By setting a `PATH`, DOS will look in those directories to find any command or
program, saving users from needing to type the full path every time.
Definition: Checks the disk for errors and provides a status report on file system integrity.
2. XCOPY
3. PRINT
Example:PRINT report.txt
4. DISKCOPY
Example:DISKCOPY A: B:
5. DISKCOMP
Example:DISKCOMP A: B:
6. DOSKEY
Definition: Provides command history and macro functionality in the command line.
7. TREE
8. MOVE
9. LABEL
Example:LABEL C: DATA_DISK
10.APPEND
Definition: Sets paths where DOS will search for files if they are not in the current directory.
Syntax: `APPEND [drive:][path];...`
Example:APPEND C:\Docs
11.FORMAT
12.SORT
13.FDISK
14.BACKUP
15.EDIT
Example:EDIT notes.txt
16.MODE
Definition: Configures system devices, such as display settings and serial communication.
Syntax: `MODE [options]`
17.ATTRIB
18.HELP
19.SYS
The Windows Operating System is a family of graphical operating systems developed by Microsoft. It
provides a user-friendly interface and environment to perform various computing tasks. First released in 1985,
it has since evolved into one of the most widely used operating systems globally.
1. Graphical User Interface (GUI): Windows uses a graphical interface with icons, windows, and menus,
making it easy for users to interact with the system.
2. Compatibility: Supports a wide range of hardware and software applications.
3. User Management: Allows multiple user accounts with varying permissions and settings.
4. File Management: Includes tools like File Explorer for organizing files and folders.
5. Multitasking: Enables users to run multiple applications simultaneously.
6. Regular Updates: Microsoft provides updates for new features, security, and performance
improvements.
Uses of Windows:
Personal Computing: For everyday tasks like browsing, media consumption, and gaming.
Business Applications: Runs professional software, office suites, and productivity tools.
Development and Coding: Supports programming and development with tools like Visual Studio.
Server and Enterprise: Variants like Windows Server are used for managing networked systems.
History of Windows
Microsoft Windows, a graphical operating system developed by Microsoft, has been a cornerstone in
personal computing for decades.
Each version of Windows has built upon its predecessors to improve usability, security, and compatibility
while adapting to changing technology trends. Let me know if you'd like details on a specific version or
feature!
BASICS OF WINDOWS
1. Introduction to Windows
Windows is designed to manage hardware and software, providing a user-friendly platform for performing
various tasks. The current versions include features for productivity, multimedia, gaming, and connectivity.
Graphical User Interface (GUI): Allows users to interact with the computer using icons,
windows, menus, and buttons.
Start Menu: The central hub for accessing applications, settings, and files.
Taskbar: Shows open applications, provides shortcuts, and includes the system clock.
File Explorer: A tool to navigate and manage files and folders.
Search Functionality: Enables users to quickly find files, applications, or system settings.
Settings Panel: Offers control over system preferences like display, sound, and network.
3. Basic Operations
Starting the Computer: Turn on the computer, and Windows boots up to the login screen.
Logging In: Enter your username and password (if set).
Shutting Down/Restarting: Go to the Start menu > Power button for options.
Opening Applications: Use the Start menu or taskbar, or double-click icons on the desktop.
Switching Between Applications: Use the taskbar or press Alt + Tab.
Create New Files/Folders: Right-click > New > Choose File Type or Folder.
Copy/Move Files: Use drag-and-drop, or right-click > Copy/Cut > Paste.
Rename: Right-click on a file/folder > Rename.
Delete: Right-click > Delete (sends to the Recycle Bin, where you can restore it).
6. Customization
7. Troubleshooting Basics
Task Manager: Press Ctrl + Shift + Esc to view running programs and processes.
Restarting Applications: If an app is unresponsive, end it in Task Manager and reopen it.
Updates: Keep Windows up to date via Settings > Update & Security.
WINDOWS CONCEPTS
Desktop: The main screen where you see icons, the taskbar, and the start menu.
Graphical User Interface (GUI): Windows uses visual elements like icons, buttons, and menus to
allow interaction without text commands.
2. File System
Control Panel: Manage hardware, software, network settings, and system preferences (phasing out in
favor of Settings in recent versions).
Settings App: A modern interface for managing system configurations.
File Explorer is the tool for navigating and managing files and folders.
7. Networking
Network and Sharing Center: Used for managing internet connections, LAN, and Wi-Fi.
Workgroup and Domains: Workgroup is for peer-to-peer networks, and domains are for client-server
environments.
Install and run applications, including traditional desktop apps and modern apps from the Microsoft
Store.
11. Virtualization
Windows Update: Keeps the system up to date with security patches and feature
updates.
Support: Help via the Microsoft website, forums, or local IT.
WINDOWS STRUCTURE
DESKTOP
The Desktop is the primary workspace in the Windows operating system.
Features:
o Icons: Shortcuts to files, folders, or applications.
o Wallpaper: The background image or color displayed behind icons.
o Context Menu: Right-clicking provides options such as "View," "Sort by," and
"Personalize."
o Widgets (Windows 10/11): Quick access to news, weather, and other customizable
content.
TASKBAR
The Taskbar is a horizontal (or sometimes vertical) bar at the bottom (default) of the screen.
Features:
o Start Button: Access to the Start Menu.
o Pinned Applications: Frequently used apps can be pinned for quick access.
o Open Applications: Displays running applications with active window previews.
o System Tray: Icons for system controls like volume, network, battery, and
notifications.
o Search Bar (Windows 10/11): Quick search tool for files, apps, or web results.
o Virtual Desktops: Toggle between multiple desktop environments (Windows
10/11).
START MENU
The Start Menu is the central hub for accessing applications, settings, and files.
Features:
o Search Bar: Quickly locate apps, files, or settings.
o Pinned Applications/Live Tiles: Provides shortcuts to apps (tiles are more common
in Windows 10).
o All Apps List: Displays all installed applications in alphabetical order.
o User Profile Options: Allows signing out, locking, or switching users.
o Power Options: Sleep, restart, and shut down the system.
File Explorer: Use the File Explorer application to browse files and folders. Open it by pressing
Windows + E.
Search: Use the search bar in the taskbar or File Explorer to locate files by name or keyword.
4. Organizing
Sorting: In File Explorer, click column headers (e.g., Name, Date Modified) to sort.
Grouping: Right-click > Select Group by (e.g., Type, Date).
Folders: Use folders and subfolders to logically categorize files.
5. File Properties
6. Searching
Use the search bar in File Explorer for specific keywords.
Use Advanced Search Options:
o File type: type:.pdf
o Size: size:>10MB
o Date modified: datemodified:>01/01/2024
7. Shortcuts
Create Shortcut: Right-click a file/folder > Select Create shortcut to place a shortcut on the
Desktop or another location.
Common keyboard shortcuts:
o Ctrl + A: Select all items.
o Alt + Enter: Open properties.
o Ctrl + Z: Undo the last action.
8. Sharing Files
Within the Network: Right-click > Select Give access to>Specific people.
Cloud Sharing: Use services like OneDrive or Google Drive to share files online.
9. File Compression
The Recycle Bin in the Windows operating system is a feature that temporarily stores deleted files and
allows you to restore them if needed. Here’s a guide on how to work with the Recycle Bin and restore
deleted files:
Accessing the Recycle Bin
1. Shortcut Method:
o If you accidentally deleted a file, press Ctrl + Z immediately to undo the action.
2. Context Menu:
o Right-click on the desktop or folder and select Undo Delete.
If you’ve emptied the Recycle Bin but need a file back, recovery tools might help:
1. Windows Backup:
o If you’ve enabled File History or created a backup, restore the file from there.
2. Third-Party Recovery Software:
o Tools like Recuva, EaseUS Data Recovery Wizard, or Disk Drill can help
recover permanently deleted files.
1. Confirmation Prompt:
o Right-click the Recycle Bin icon >Properties> Check Display delete
confirmation dialog.
2. Increase Recycle Bin Size:
o In the Recycle Bin properties, you can allocate more storage to keep deleted files
longer.
WINDOWS EXPLOLER
Windows Explorer (now called File Explorer in recent versions of Windows) is a file management
application that allows users to browse, access, manage, and organize files and folders on a computer
running the Windows operating system. It provides a graphical user interface (GUI) for interacting
with the file system, making it easier to navigate through directories and files.
1. Navigation Pane: Located on the left side, it allows users to quickly access libraries (Documents,
Pictures, etc.), drives, network locations, and frequently used folders.
2. Address Bar: Shows the path of the current folder you're in and allows quick navigation by typing
or clicking on parts of the path.
3. File and Folder Management: You can create, delete, copy, paste, and move files and folders. It
also allows renaming and searching files.
4. File Previews: In certain views, File Explorer can display previews of files, like images,
documents, and videos.
5. Search Function: Located at the top-right, it allows searching for files and folders within the
current directory or the entire computer.
6. Ribbon Interface: In versions like Windows 8 and Windows 10, File Explorer uses a ribbon
interface similar to Microsoft Office programs, providing quick access to common tasks (copy,
paste, properties, etc.).
7. Context Menus: Right-clicking on files or folders brings up a context menu with additional
options like opening, copying, deleting, or opening properties.
8. Library System: Allows users to group files from different locations under a single folder view
(Documents, Music, Videos, etc.).
9. Network Sharing: It can access files and folders on other devices connected to the same network.
10. File Properties: You can right-click on a file or folder and select "Properties" to view detailed
information, such as size, creation date, and permissions.
In Windows 11 and later, Microsoft has continued to refine File Explorer's interface, adding features like
tabs (for multi-folder browsing) and a more modern, simplified design.
WINDOWS ACCESSORIES
Windows operating systems come with a variety of built-in accessory programs designed to enhance
user productivity and help with system maintenance. These tools are often lightweight and provide
basic functionality for everyday tasks.
1. Notepad – A simple text editor that allows you to create and edit plain text files without
formatting.
2. WordPad – A more advanced text editor compared to Notepad, offering basic word processing
capabilities, such as font formatting and image insertion.
3. Paint – A basic graphics editor for creating and editing images. It supports simple drawing and
editing tasks, including cropping and resizing.
4. Snipping Tool/Snippet & Sketch – Tools for capturing screenshots of your screen or specific
windows, with basic annotation capabilities.
5. Calculator – A simple calculator application with basic, scientific, and programmer modes.
6. Character Map – Allows users to view and insert special characters that are not on the standard
keyboard.
7. Disk Cleanup – Helps to free up space on the hard drive by deleting unnecessary files like system
files, temporary files, and browser cache.
8. Windows Media Player – A media player for playing audio and video files. (Note: It has been
replaced by Groove Music and Movies & TV in newer versions of Windows.)
9. File Explorer – The file management tool used to browse and organize files and folders on your
computer.
10. Sticky Notes – A digital note-taking app that allows users to quickly create and manage virtual
sticky notes on the desktop.
11. Sound Recorder/Voice Recorder – A simple tool to record audio using your computer’s
microphone.
12. Task Scheduler – Allows users to schedule tasks and programs to run at specified times or after
certain events.
13. Windows Fax and Scan – A utility for scanning documents or sending/receiving faxes, typically
used with fax-capable devices.
14. Remote Desktop Connection – A tool that enables users to connect to and control another
computer remotely over a network.
15. Magnifier – A screen magnifier that helps users with visual impairments by enlarging parts of the
screen.
16. Narrator – A screen reader that reads aloud the content on the screen, designed for users with
visual impairments.
These accessories are accessible through the Start Menu, Windows Settings, or the Search Bar in most
versions of Windows. They provide a convenient way to handle everyday tasks without needing third-
party software.
CONTROL PANEL
The Control Panel in the Windows operating system is a system utility that allows users to configure and
manage various settings and features of the computer. It provides access to a wide range of settings, such
as hardware, software, user accounts, security, network connections, and more.
Windows 10/11: You can access the Control Panel by typing “Control Panel” in the Start
menu search bar and selecting the app.
Alternatively: Press Windows + R, type control, and press Enter to open it directly.
The Print Manager allows you to manage print jobs, troubleshoot issues, and configure printer
settings.
1. Windows 10/11:
o Press Win + S and search for Control Panel.
o Go to Devices and Printers.
o Alternatively, open Settings>Bluetooth & devices>Printers & scanners.
2. Locate your printer in the list. Right-click it to view the queue or manage settings.
3. To see all print jobs:
o Open the Run dialog (Win + R).
o Type control printers and press Enter.
o Double-click a printer to open its queue.
2. Installing a Printer
You can install a printer using various methods, such as USB, Wi-Fi, or a network.
1. Via Settings:
o Go to Settings>Bluetooth & devices>Printers & scanners.
o Click Add a printer or scanner.
o Windows will search for available printers.
o Select your printer from the list and follow the setup prompts.
2. Manual Installation:
o If the printer isn’t detected, click The printer that I want isn’t listed.
o Choose one of the following options based on your network setup:
Add a printer using a TCP/IP address or hostname.
Add a shared printer by name.
o Enter the printer’s IP address or network name, then follow the instructions.
1. Visit the printer manufacturer’s website (e.g., HP, Epson, Canon) to download the latest
drivers.
2. Run the downloaded file and follow the installation steps.
3. During installation, choose whether the printer will be connected via USB or network.
3. Managing Printers:
MY COMPUTER
"My Computer" (renamed This PC in modern Windows versions like Windows 8 and later) is a
feature in the Windows operating system that provides a centralized location to access your
computer's resources. It is a part of the graphical user interface designed for easy navigation and
management of files, folders, and hardware connected to the system.
1. Access Drives:
o Displays all local storage drives (like C:, D:) and removable devices (e.g., USB drives,
DVDs).
o Includes network drives if connected to a network.
2. File Management:
o Allows you to browse and manage files and folders stored on your computer.
o Includes options to copy, move, delete, or organize your files.
3. Device Management:
o Provides shortcuts to connected devices like printers, external hard drives, and
phones.
4. System Information:
o Shows properties of the computer, such as available storage space, RAM,
processor type, and system type.
5. Search:
o Built-in search functionality for quickly finding files or folders.
6. Quick Access to Common Folders:
o Direct links to folders like Documents, Pictures, Downloads, and Desktop.
MEDIA PLAYER
A media player in the Windows operating system is a software application used for playing audio,
video, and other multimedia files. Windows typically comes with built-in media players, but users can
also install third-party options for additional features or compatibility.
Many users prefer third-party media players for their advanced features or broader format
support:
Support for various file formats (MP3, MP4, MKV, AVI, WMV, FLAC, etc.).
Subtitle support.
Streaming capabilities.
Customization options (skins, themes, equalizer settings).
Library management and playlist creation.
SOUND RECORDER
The Sound Recorder in Windows operating systems is a built-in utility used to record audio.
Over the years, it has evolved across different Windows versions, offering varied features:
1. Audio Recording:
It allows users to record audio using a microphone or other audio input devices.
2. Basic Editing:
Some versions of Sound Recorder let you trim audio, but it is primarily a lightweight
tool.
3. Formats Supported:
o Earlier versions saved files in formats like WAV.
o Newer versions (like in Windows 10/11) save files in M4A format.
4. Simple UI:
It's designed for quick and straightforward audio recording tasks without the need for
advanced technical knowledge.
Windows XP/7:
1. Go to the Start menu.
2. Search for "Sound Recorder."
3. Click the app to open it.
Windows 10/11 (Voice Recorder App):
1. Search for "Voice Recorder" in the Start menu.
2. Click the app to launch.
The Voice Recorder is the modern replacement for the Sound Recorder in newer
Windows versions.
Volume control in the Windows operating system allows users to adjust the audio output levels for the
entire system or specific applications. Here's how it works and the options available:
Volume Mixer
The Volume Mixer allows for individual volume control for different applications:
1. App-Specific Output:
o Navigate to Settings>System>Sound>Advanced sound options (App volume
and device preferences).
o Assign different audio output/input devices to specific applications.
2. Spatial Sound:
o Enable spatial sound for enhanced audio experiences (e.g., Windows Sonic for
Headphones, Dolby Atmos).
Volume control in Windows is user-friendly and customizable, catering to both basic and
advanced audio preferences.
Windows operating systems come with advanced features designed to enhance productivity, security,
and user experience. Here are some notable advanced features:
5. Windows Hello
8. DirectStorage
Features:
o Windows Defender Application Guard: Isolates untrusted websites or
applications.
o Secure Boot: Protects the boot process against malware.
o Windows Sandbox: Provides a secure, disposable environment for testing apps.
Benefits: Safeguards against cyber threats and ensures system integrity.
These features highlight the versatility of Windows as both a personal and professional operating
system.
Managing hardware and software in a Windows operating system involves overseeing the installation,
configuration, maintenance, and troubleshooting of system components.
1. Managing Hardware
a. Device Installation
Plug and Play: Most modern hardware is automatically detected and configured by
Windows when connected.
Device Drivers: Ensure the appropriate drivers are installed for hardware components to
function correctly. Drivers can be updated via:
o Device Manager: Windows + X → Device Manager.
o Manufacturer's website or Windows Update.
b. Device Manager
c. Peripheral Management
d. System Monitoring
Use tools like Task Manager and Performance Monitor to monitor hardware
performance.
Access Task Manager: Ctrl + Shift + Esc.
For detailed monitoring: Run → perfmon.
2. Managing Software
Install:
o Use the Microsoft Store for trusted apps.
o For third-party software, download from official websites.
Uninstall:
o Settings → Apps → Apps & features.
o Or use Control Panel → Programs → Uninstall a Program.
b. Updating Software
Regular updates keep software secure and functional:
o Windows Update: Automatically or manually update system software.
o Update third-party software via their in-built updater or the developer's website.
d. Application Management
6. Troubleshooting
Managing hardware and software effectively ensures optimal system performance and longevity.
Adding or removing hardware devices from a computer in a Windows operating system typically
involves using Device Manager, as well as physically connecting or disconnecting the hardware.
The "Add or Remove Programs" feature in Windows allows you to manage the installed
software on your computer, including uninstalling programs or repairing them. Here's how to
access and use it:
Managing Programs
1. Uninstall a Program:
o Find the program in the list.
o Click on it and select Uninstall.
o Follow the on-screen prompts to remove the program.
2. Modify or Repair a Program (if available):
o Select the program in the list.
o If the option is available, choose Modify or Repair.
o Follow the instructions to make changes or fix issues.
3. Sort and Search:
o Use the search bar to quickly locate a program.
o Sort by name, size, or installation date to organize the list.
BACKUP
Backing up data in a Windows operating system is essential to ensure the safety of your files and system
configuration in case of data loss, hardware failure, or malware attacks.
Windows offers several built-in tools and methods for performing backups:
1. File History
File History is a feature for backing up personal files to an external drive or network location.
1. Go to Control Panel > System and Security > Backup and Restore (Windows 7).
2. Click Create a system image on the left panel.
3. Select a destination (external drive, DVD, or network).
4. Follow the wizard to start the backup.
Restoration:
Use the same tool or a Windows Recovery Disk to restore from the image.
For more advanced options, you can use third-party tools like:
5. Manual Backup
Simply copy your important files to an external storage device or another computer.
Although not a file backup method, creating a system restore point can help recover system
settings and configurations.
Steps:
CLIPBOARD VIEWER
In Windows, the Clipboard Viewer was a tool available in older versions of the operating system, like
Windows 3.x and early Windows 95. It allowed users to view the contents of the Windows clipboard,
which could store text, images, files, and other data that had been copied or cut.
However, in modern versions of Windows (Windows 10 and later), the clipboard viewer tool is not
available as a standalone app. Instead, Windows offers clipboard functionality with a more integrated
approach. Here's how you can manage and view clipboard data in newer versions of Windows:
Windows 10 and Windows 11 feature a clipboard history function that allows you to access multiple
items you've copied to the clipboard, which can be quite useful for copying and pasting multiple items.
Ditto: A free and open-source clipboard manager that stores clipboard history, allowing
you to easily view and paste items.
ClipClip: Another clipboard manager that offers a more visual interface and robust
features like search and file storage.
These tools give you more control and visibility over the data stored in your clipboard.
DISK DEFRAGMENTER
In the Windows operating system, Disk Defragmenter (also known as Optimize Drives) is a utility that
helps improve the performance of your hard disk drive (HDD) by reorganizing fragmented data. When
files are stored on a hard disk, they may not be written sequentially. Over time, as files are modified,
saved, and deleted, parts of files can become scattered across the disk. This fragmentation can slow
down the system, as the disk's read/write head must move to different locations to access a file.
If your system uses a Solid State Drive (SSD), Windows automatically disables traditional
defragmentation for these drives, as they do not experience the same fragmentation issues as HDDs.
Instead, Windows will run a process called "Optimization", which performs tasks like the TRIM
command, helping to maintain the performance of the SSD.
Disk Defragmenter is generally not needed for SSDs but is essential for HDDs to maintain optimal
performance.
DRIVE SPACE
In a Windows operating system, drive space refers to the total storage capacity available on the drives
(like hard drives or solid-state drives) attached to the system, and how much of that storage is being
used versus how much is available.
1. Total Drive Space: The full capacity of the drive (e.g., 500GB, 1TB, etc.).
2. Used Space: The amount of space already occupied by files, applications, system data,
and other content.
3. Free Space: The remaining capacity on the drive that can still be used for storing files.
4. Drive Types:
o C: drive: Typically the primary drive where the operating system is installed.
o Secondary Drives: Additional drives (e.g., D:, E:) that may hold files or
applications.
1. File Explorer:
o Open File Explorer (Windows key + E).
o In the left panel, click This PC to see the available drives.
o Each drive will display a bar showing used and available space, along with
numerical values.
2. Disk Management:
o Right-click Start and select Disk Management.
o This will show all drives connected to your system, their partitions, and space
usage.
3. Settings (Windows 10/11):
o Go to Settings>System>Storage.
o It gives an overview of used space by category (e.g., apps, system files,
documents).
Disk Cleanup: You can use the built-in tool to remove temporary files, system files, and
other unnecessary data.
Uninstall Programs: Remove unused applications to free up space.
Move Files: You can move data like videos, documents, and photos to other drives or
external storage.
If you're running low on space, consider upgrading your storage or managing files more
efficiently.
SCANDISK
"Scandisk" is a utility tool in Windows operating systems used to check and repair file system errors on
a storage device (such as a hard drive or flash drive). It scans for and fixes various issues, like bad
sectors, lost clusters, and directory errors, to ensure the system operates smoothly.
In earlier versions of Windows (like Windows 95 and 98), the tool was called "ScanDisk," and it was
run from a command-line interface. In more recent versions of Windows, such as Windows XP and
later, the tool was integrated into the "Check Disk" (CHKDSK) feature, which performs the same tasks.
chkdsk /f
This will scan the drive and attempt to fix any detected issues. If you want to scan a different drive,
replace the "C:" with the letter of that drive (e.g., chkdsk D: /f).
In Windows operating systems, Windows Update is a service that manages the distribution of updates
to the OS and its software components. This service is vital for keeping the system up to date, secure,
and performing optimally.
Manually: Go to Settings > Update & Security > Windows Update, then click Check
for updates.
Automatic Updates: By default, Windows automatically checks for updates and installs
them as soon as they are available.
2. Types of Updates
Feature Updates: These are large updates that introduce new features and improvements
to the OS. They are typically released twice a year.
Quality Updates: These include security patches, bug fixes, and minor improvements.
They are released more frequently, often monthly (Patch Tuesday).
Driver Updates: These updates provide newer versions of hardware drivers to ensure the
hardware components are working correctly with the latest version of Windows.
Security Updates: These are updates designed to address security vulnerabilities and
ensure your system is protected from threats.
3. Update Settings
Active Hours: You can set active hours to specify when the device is in use, and
Windows Update will avoid restarting your device during those times.
Delivery Optimization: This feature allows you to get updates from other PCs on your
local network or even from the internet, reducing download times.
Windows Update Troubleshooter: If updates aren't working as expected, you can run
the Windows Update Troubleshooter to automatically detect and fix problems.
o Go to Settings > Update & Security > Troubleshoot > Additional
troubleshooters> Windows Update.
Resetting Windows Update Components: If the troubleshooter doesn't resolve the
issue, you may need to manually reset the update components by stopping services like
Windows Update and Background Intelligent Transfer Service (BITS) and renaming
the folders that store update files.
5. Update History
You can view a history of installed updates by going to Settings > Update & Security >
Windows Update > View update history.
6. Pause Updates
You can temporarily pause updates for a limited time (up to 35 days). This is available
under Settings > Update & Security > Windows Update > Pause updates.
In business environments, administrators can control updates more granularly using tools
like Windows Server Update Services (WSUS) or Microsoft Endpoint Configuration
Manager.
Regular updates are crucial for maintaining the security and performance of your Windows
system.
UNIT 4
LINUX INTRODUCTION
Linux is a powerful, open-source operating system (OS) widely used for servers, desktops, and embedded
systems. It is based on the Unix model and was initially created by Linus Torvalds in 1991. The Linux OS is
free and distributed under the GNU General Public License, which allows anyone to view, modify, and
distribute the source code.
1. Kernel: The core part of the Linux OS, responsible for interacting with hardware and managing system
resources (e.g., CPU, memory, input/output devices). It is monolithic, meaning it includes many features in
one piece of software.
2. Distributions (Distros): Linux comes in various "distributions" or versions, each with different packages
and user interfaces. Popular distributions include Ubuntu, Fedora, Debian, CentOS, and Arch Linux.
3. Shell: A command-line interface (CLI) that allows users to interact with the system by typing commands.
The most common shell is Bash (Bourne Again Shell).
4. Filesystem: Linux organizes data using a hierarchical filesystem structure, where the root directory ( /) is at
the top, and all other directories (e.g., /home, /etc, /usr) branch from it.
5. Package Management: Linux distros use package managers (e.g., apt for Debian-based distros, yum for
Red Hat-based distros) to install, update, and remove software.
6. Permissions: Linux is a multi-user operating system, meaning different users can have different access
levels. Permissions (read, write, execute) are set for files and directories, and every file or directory has an
owner and associated group.
7. Processes: Linux manages tasks and programs as processes. The OS allows multitasking, and you can
view/process them using commands like ps or top.
Advantages of Linux:
Linux is widely used in various fields like web hosting, cloud computing, software development, data centers,
and personal use. It offers flexibility, scalability, and cost-effectiveness, making it a popular choice for both
businesses and individuals.
ADVANTAGES&FEATURES OF UNIX
Unix is a powerful, multi-user, multitasking operating system used widely in servers, workstations, and
high-performance computing environments. Here are some key advantages and features:
Advantages of Unix:
1. Multiuser Capability: Unix supports multiple users simultaneously. It ensures that the system resources
are shared efficiently, allowing different users to work on the system without interfering with each other.
2. Multitasking: Unix is designed for multitasking, meaning it can execute multiple processes at the same
time, which is essential for servers and high-performance systems.
3. Portability: Unix is highly portable, which means it can run on almost any hardware platform with
minimal modification. This is because Unix source code is written in C, making it easier to move from
one system to another.
4. Security and Permissions: Unix provides robust security mechanisms. Users and processes are assigned
permissions, ensuring that access to files, devices, and commands is tightly controlled. It uses a role-
based access control system.
5. Stability and Reliability: Unix systems are known for their stability and are capable of running for
extended periods without crashing. It's used in environments where uptime is critical.
6. Networking: Unix has built-in networking capabilities, making it suitable for large-scale networking
operations. It supports protocols like TCP/IP, enabling communication over local networks and the
internet.
7. Open Source (Unix-like systems): While traditional Unix is proprietary, many Unix-like systems (e.g.,
Linux, BSD) are open-source, meaning the source code is available for free and can be modified by
anyone.
8. File System Hierarchy: Unix uses a hierarchical file system that organizes files in directories, making it
easier to manage data. It has a well-structured directory system with logical naming conventions.
9. Command Line Interface (CLI): Unix offers a powerful command-line interface for experienced users
and system administrators. The CLI provides high-level control over the system and can be automated
with scripts.
10. Strong Community Support: Unix, and its derivatives (Linux, BSD), have large, active communities
that provide support, documentation, and updates.
Features of Unix:
1. Kernel: The kernel is the core part of Unix, responsible for managing system resources and allowing
communication between hardware and software.
2. Shell: The shell is an interface between the user and the kernel. It can be command-line based (CLI) or
graphical (GUI). Popular Unix shells include bash, ksh, and zsh.
3. Processes: Unix allows the execution of multiple processes simultaneously, and each process can run in
its own memory space.
4. Virtual Memory: Unix uses virtual memory management to give each process the illusion of having its
own memory, enabling efficient resource management.
5. Pipes and Filters: Unix allows the output of one command to be used as the input for another, creating
powerful chains of command (pipes). Filters process data (e.g., grep, awk, sed) in a stream.
6. Text-based Configuration: Unix typically uses text files for configuration, which makes it easier to
manage and customize.
7. Utilities: Unix comes with a wide range of small, single-purpose utilities that can be combined in scripts
or used interactively to perform complex tasks.
8. File System Support: Unix supports various file systems like ext4, UFS, and ZFS. It also supports
mounting multiple file systems at once.
9. Inter-process Communication (IPC): Unix supports several mechanisms for processes to communicate,
including pipes, message queues, and shared memory.
10. User Management: Unix has built-in tools for managing users, groups, and their permissions, providing
system administrators with full control over user access to system resources.
These advantages and features contribute to the widespread use of Unix and Unix-like systems in enterprise
environments, academia, and various industries.
BASIC ARCHITECTURE OF UNIX/LINUX SYSTEM
The basic architecture of a UNIX/Linux system can be broken down into several key components that work
together to provide the functionality of the operating system.
1. Kernel
The kernel is the core of the UNIX/Linux operating system. It is responsible for managing system
resources such as CPU, memory, device input/output, and process management.
The kernel is loaded into memory at system boot and interacts directly with the hardware. It serves as
an intermediary between the hardware and software applications.
The kernel provides services such as system calls, memory management, file system management,
process scheduling, and security.
2. Shell
The shell is a command-line interface (CLI) that allows users to interact with the operating system by
entering commands. It is the user interface that interprets the commands typed by the user and
translates them into actions that the kernel can perform.
Examples of shells include Bash, Zsh, and Tcsh.
The shell also provides scripting capabilities to automate tasks.
3. File System
The file system organizes and stores data on disk drives and other storage devices. UNIX/Linux uses a
hierarchical directory structure, where files and directories are organized in a tree-like manner.
Key features of the file system include:
o Inodes: Data structures that store metadata about files, such as file size, owner, permissions, and
location on disk.
o Virtual File System (VFS): A layer that provides a common interface for accessing different
types of file systems (e.g., ext4, NFS).
4. System Libraries
System libraries provide a set of pre-written functions that programs can call to perform various tasks,
such as file operations, memory management, and process control.
These libraries allow programs to interact with the kernel without needing to write low-level code.
Common libraries include the C library (glibc).
5. System Utilities
System utilities are programs that perform various system tasks, such as file manipulation,
networking, user management, and process monitoring.
Examples include commands like ls, cp, ps, top, and grep.
6. Hardware
The hardware consists of the physical components of the system, including the CPU, memory,
storage devices, and input/output devices.
The kernel interacts with hardware through device drivers, which are specialized programs that enable
the kernel to communicate with hardware devices.
7. User Space
User space is the part of memory where user applications and processes run, as opposed to kernel
space, which is reserved for the kernel itself.
Applications like web browsers, text editors, and database servers run in user space and interact with
the kernel and system libraries through system calls.
8. Process Management
The process management component is responsible for creating, scheduling, and terminating
processes. Each running program is associated with a process that has a unique process ID (PID).
The kernel uses scheduling algorithms to allocate CPU time to processes based on priorities and
resource requirements.
9. Device Drivers
Device drivers are software components that allow the operating system to communicate with
hardware devices, such as printers, disks, and network interfaces. Drivers abstract the details of
hardware from user-level applications and system utilities.
Architecture Overview:
The kernel is the central component, providing the core functionality and interacting directly with the
hardware.
The shell acts as the user interface to the kernel.
System libraries and utilities provide a higher level of abstraction for interacting with the system.
User applications run in user space, interacting with the kernel and libraries to perform tasks.
This modular and layered structure provides flexibility, efficiency, and security in the UNIX/Linux operating
system.
The Linux file system is a hierarchical structure that organizes and stores files and directories on a computer's
storage device. It follows a tree-like structure with the root directory ( /) at the top, which branches out to
other directories, each serving a specific purpose.
1. Root Directory /
/bin: Contains essential binary files (executables) required for system operation (e.g., ls, cp, mv).
/boot: Contains files needed for booting the system, such as the boot loader and kernel images.
/dev: Contains device files representing hardware devices (e.g., /dev/sda for a hard drive).
/etc: Contains configuration files for the system and installed programs (e.g., /etc/passwd for
user info).
/home: Home directories for regular users, where personal files and settings are stored (e.g.,
/home/user1).
/lib: Contains shared libraries needed by the binaries in /bin and /sbin.
/media: Mount point for removable media such as USB drives, CD/DVD drives.
/mnt: Temporary mount point for mounting filesystems, typically used by system administrators.
/opt: Optional application software packages, typically third-party software.
/proc: A virtual filesystem that provides process and kernel information (e.g., /proc/cpuinfo).
/root: Home directory of the root user (administrator).
/sbin: Contains system binaries essential for system maintenance (e.g., fsck, shutdown).
/srv: Data for services provided by the system (e.g., web server data).
/sys: A virtual filesystem that provides information about the system's hardware and devices.
/tmp: Temporary files that are cleared on reboot.
/usr: Contains user binaries, libraries, documentation, and source code. It is subdivided into
/usr/bin, /usr/lib, and /usr/share.
/var: Variable data files, such as logs, databases, and email.
3. File Types
4. File Permissions
Each file and directory has permissions that control access. The permissions include:
Permissions are set for reading (r), writing (w), and executing (x) files.
Example:
The FHS defines the directory structure and directory contents in Linux systems,
ensuring consistency across distributions.
Hard Link: Points to the same inode (data structure that stores file metadata) as the
original file.
Symbolic (Soft) Link: A pointer to the file name itself, which can be broken if the target
file is moved or deleted.
Linux's file system is designed for high flexibility and efficiency, supporting both system-level and user-level
operations in a structured way.
In Linux, the filesystem hierarchy is organized with specific directories that follow a standard layout. These
directories are defined by the Filesystem Hierarchy Standard (FHS). Here are some of the most common
standard directories in Linux:
1. / (Root Directory): The top-level directory that contains all other directories and files in the system.
2. /bin: Contains essential binary executables (programs) required for basic system operation, such as ls,
cp, mv, and cat.
3. /boot: Contains bootloader files and kernel images, such as vmlinuz (the Linux kernel) and grub
configuration files.
4. /dev: Contains device files, which are used to access hardware devices like hard drives, terminals, and
USB devices. For example, /dev/sda refers to the first hard disk.
5. /etc: Contains system-wide configuration files and scripts. Examples include /etc/passwd (user
account information) and /etc/network/interfaces (network configuration).
6. /home: The directory where user-specific files and directories are stored. Each user typically has a
subdirectory under /home, such as /home/john.
7. /lib: Contains shared library files that are required by programs in /bin and /sbin.
8. /media: Contains mount points for removable media, like USB drives, CDs, and DVDs.
9. /mnt: Traditionally used for temporarily mounted filesystems. Mounting a filesystem manually can be
done here.
10. /opt: Contains optional or third-party software packages that are not part of the core system. Typically,
software installed here is self-contained.
11. /proc: A virtual filesystem that contains information about the kernel and running processes. For
example, /proc/cpuinfo provides details about the CPU.
12. /root: The home directory for the root (administrator) user. It is different from /home/root.
13. /run: Contains runtime data that is required by the system, including information about running services
and processes.
14. /sbin: Contains system binaries that are essential for system maintenance and recovery, typically used
by the root user (e.g., fsck, reboot).
15. /srv: Contains data for services provided by the system, such as websites, FTP files, or databases.
16. /sys: A virtual filesystem that provides information about the kernel, devices, and other system
parameters.
17. /tmp: A directory for temporary files that are used by programs during execution. Files in this directory
are usually deleted after a system reboot.
18. /usr: Contains user-related programs and data, including:
19. /var: Contains variable data files, such as log files (/var/log), mail (/var/mail), and spool
directories.
These directories form the structure that Linux systems rely on, and understanding their purpose helps in
navigating and managing a Linux system efficiently.
Partitioning the hard drive for Linux involves creating multiple sections, or partitions, to organize and manage
data effectively.
Use the lsblk or fdisk -l command to identify your drive and its size.
lsblk
/ (Root): The root partition where the system files and programs are stored. At least 15-20 GB is
recommended.
/home: The partition where user data (like documents, pictures, etc.) is stored. Size depends on your
usage, but typically at least 50 GB or more.
/swap: Used for swapping data from RAM to disk when the system runs out of memory. Usually 2x the
amount of RAM (though this can vary).
/boot (Optional): Contains bootloader files. This partition is optional if your system uses UEFI, but some
setups may still prefer it (usually 1-2 GB).
/var (Optional): Used for variable data like logs and cache files. This is useful if you expect a lot of logs
or cache generation.
3. Create Partitions
You can use various tools for partitioning. For a simple setup:
Using fdisk:
Then:
o Type m for help.
o Type n to create a new partition.
o Type p to select a primary partition, or e for extended.
o Follow the prompts to define the partition size.
o Type t to set the partition type (for swap, type 82).
o Type w to write the changes to the disk.
Using gparted (GUI tool):
o Install gparted if it's not already installed (sudo apt install gparted).
o Launch gparted, select your disk, and use the interface to create and format
partitions.
4. Format Partitions
sudomkswap /dev/sda3
sudoswapon /dev/sda3
5. Mount Partitions
sudomkdir /mnt/home
sudo mount /dev/sda2 /mnt/home
Enable swap:
sudoswapon /dev/sda3
6. Update /etc/fstab
sudoblkid
Edit /etc/fstab:
sudonano /etc/fstab
7. Finalize Installation
If you're installing Linux, proceed with the installation process, where the installer will detect the
partitions you've created and format them accordingly.
Installing a Linux system involves several key steps, whether you're setting it up on a physical machine or in a
virtual environment.
Popular distributions: Ubuntu, Fedora, Debian, CentOS, and Linux Mint are popular choices for
beginners and advanced users.
Download the ISO: Go to the official website of the chosen distribution and download the ISO file
(e.g., Ubuntu Downloads).
4. Start Installation
Once booted from the USB, you will be prompted to try or install Linux. Select Install to begin the
process.
You may be asked to select your language and keyboard layout.
You will have options for partitioning your hard drive. If you're installing Linux alongside another OS,
you might want to choose the option to install alongside existing OS. If you want a fresh installation,
you can delete existing partitions and create new ones.
Typically, you will create at least two partitions:
o Root partition (/): This is where the system files will go. Usually, 20-50 GB is enough for most
users.
o Swap partition: This acts as virtual memory. The size is usually equal to the amount of RAM
(e.g., if you have 8 GB of RAM, set the swap partition to 8 GB).
o Optionally, you may create additional partitions like /home for user files.
The installer will ask about the installation of the bootloader. The bootloader is responsible for
loading the operating system on boot. Usually, it’s installed on the same drive as the system (e.g.,
/dev/sda).
Once the partitions and configurations are set, the installer will copy the files to your hard drive.
This may take some time, depending on the speed of your system and the size of the installation.
After installation is complete, you will be prompted to reboot.
After rebooting, the system should boot into the newly installed Linux OS.
If you don’t see the bootloader, you may need to select the OS manually or adjust the
boot order in the BIOS/UEFI.
Update your system: Once you're logged in, run a system update. For example, on Ubuntu or
Debian-based systems, use:
sql
Copy code
sudo apt update &&sudo apt upgrade
Install additional software: Depending on your needs, you might want to install additional
software (like web browsers, development tools, media players, etc.).
Install drivers: Some hardware, like graphics cards or Wi-Fi adapters, may require proprietary
drivers. Most Linux distributions will offer to install these during setup or afterward.
11. Optional: Install a Virtual Machine (for testing or using alongside other OS)
If you're testing Linux or want to run it alongside another OS, you can use virtualization software
such as VirtualBox or VMware.
Shutdown Process
1. Initiating Shutdown:
o The shutdown process can be initiated using the following commands:
shutdown: This command shuts down or reboots the system after a specified delay.
poweroff: This command shuts down the system immediately.
reboot: Reboots the system.
2. Systemd Shutdown:
o On systems using systemd, the shutdown process begins with sending a SIGTERM signal
to all running processes to request them to terminate gracefully.
o Services that are managed by systemd are stopped in the reverse order they were started.
User sessions and daemons are halted.
3. Unmounting Filesystems:
o After processes have been terminated, the system unmounts all mounted filesystems. This
ensures data is properly written back to the disk before powering off.
4. Poweroff:
o Once all services are stopped and filesystems are unmounted, the system signals the
hardware to turn off power or enter a low-power state.
Shutdown Commands
Shutdown Command:
Reboot Command:
sudo reboot
Poweroff Command:
sudopoweroff
Linux is an open-source, Unix-like operating system (OS) that manages hardware resources and provides a
platform for running applications.
1. Kernel
The kernel is the core of the Linux OS. It acts as a bridge between the hardware and software. The kernel
manages system resources such as CPU, memory, disk space, and input/output devices. It is responsible
for:
2. Shell
The shell is a command-line interface (CLI) that allows users to interact with the operating system. Users
can input commands to execute programs, manipulate files, or control the system. Common shells include:
Bash (Bourne Again Shell): The most widely used shell in Linux.
Zsh, Fish, and others: Other shells offering different features.
3. File System
Linux organizes data in a hierarchical file structure starting with the root directory (/).
Process control: The kernel manages the creation, execution, and termination of
processes.
Scheduling: The kernel decides which process gets CPU time and when.
5. User Space
In addition to the kernel, Linux has a user space that includes all the non-kernel components,
like:
Libraries: Reusable code that programs can use (e.g., the C Standard Library).
Applications: User-installed programs like web browsers, text editors, etc.
Utilities: Command-line tools for managing system operations (e.g., ls, cp, rm).
6. Package Management
Linux distributions use package managers to handle software installation, upgrades, and removal.
Examples include:
Linux supports multi-user and multitasking environments, meaning it can run multiple processes
and allow multiple users to interact with the system simultaneously. Key features include:
Permissions: Each file and process has owner and group settings, controlling access.
Virtual Consoles: Multiple command-line interfaces (tty) that users can switch between.
Networking: Linux handles network operations with tools like ssh, ping, ifconfig.
8. Security
Linux comes in various flavors or distributions (distros), such as Ubuntu, Fedora, CentOS, Arch
Linux, etc. Each distribution provides different configurations and packages, but all are based on
the Linux kernel.
Overall, Linux is a powerful, flexible OS that can be customized for a variety of uses, from
personal desktops to servers and embedded systems.
LINUX GUI
A Linux GUI (Graphical User Interface) refers to the graphical interface that allows users to interact with
the Linux operating system using visual elements such as windows, icons, buttons, and menus, rather than
typing commands in a terminal (CLI - Command Line Interface).
X11: Traditional display server used by most Linux systems for managing graphical displays.
Wayland: A newer display server protocol aiming to replace X11 with improved security and
performance.
Window Managers: These manage how windows are displayed and interact with each other.
Common ones include:
o Openbox: Lightweight and customizable.
o i3: Tiling window manager, preferred by power users.
o Fluxbox: Lightweight and highly configurable.
LINUX DESKTOP
1. GNOME
2. KDE Plasma
Description: KDE Plasma is a powerful and visually stunning desktop environment. It's
known for its high customization options, making it perfect for users who enjoy tweaking
their setup.
Features:
o Highly customizable with a plethora of settings.
o Lightweight, fast, and feature-rich.
o A large number of built-in utilities for productivity.
o Supports a wide range of apps and themes.
3. XFCE
4. Cinnamon
5. LXQt / LXDE
Description: LXQt and LXDE are ultra-lightweight desktop environments. LXQt is the
newer version, replacing LXDE. They are ideal for very low-resource systems.
Features:
o Extremely fast and lightweight.
o Simple and easy-to-use interface.
6. MATE
Description: MATE is a continuation of the GNOME 2 desktop environment. It offers a
more traditional desktop experience, focusing on stability and familiarity.
Features:
o Classic desktop environment with a focus on stability and simplicity.
o Lightweight, and easy on system resources.
o Customizable and straightforward.
7. Budgie
8. Pantheon
9. i3 (Window Manager)
Description: i3 is not a full desktop environment but rather a tiling window manager. It
is suitable for advanced users who like to manage windows with keyboard shortcuts.
Features:
o Tiling window manager (keyboard-focused).
o Lightweight and minimal.
o Very customizable, but requires more setup and learning.
10. Deepin
Description: Deepin is a beautiful and feature-packed desktop environment, designed to
provide an elegant user experience. It is developed by the Deepin Linux community.
Features:
o Stunning design and smooth animations.
o Deep integration with its applications.
LINUX COMMAND :
Cd
Md
Rm
Mv
mv [source] [destination] – Move or rename files or directories.
Cp
Ls
The ls command in Linux is used to list the contents of a directory. By default, it shows the files
and directories in the current directory. Here are some common options you can use with ls:
1. Basic Command:
bash
Copy code
ls
bash
Copy code
ls -a
Displays all files, including hidden files (those starting with a dot .).
bash
Copy code
ls -l
Shows a detailed listing, including file permissions, owner, group, size, and the last
modified date.
bash
Copy code
ls -la
Combines both -a and-l options, showing all files (including hidden) with detailed
information.
bash
Copy code
ls -t
Lists files sorted by modification time, with the most recently modified files first.
bash
Copy code
ls -lh
bash
Copy code
ls -R
bash
Copy code
ls -S
bash
Copy code
ls -X
bash
Copy code
ls --color
Displays the output with color to help distinguish different file types (often enabled by
default).
bash
Copy code
ls -lAh
Cat
Find
Grep
Head
Tail
pwd – Print working directory (shows the current directory you are in).
ls – List directory contents.
o ls -l – List in long format (includes details like permissions, owner, size, etc.).
o ls -a – List all files, including hidden files (those starting with a dot).
cd [directory] – Change directory to the specified one.
o cd .. – Move up one directory.
o cd ~ – Move to the home directory.
mkdir [directory] – Create a new directory.
rmdir [directory] – Remove an empty directory.
rm [file] – Remove a file.
o rm -r [directory] – Remove a directory and its contents recursively.
touch [file] – Create a new empty file.
cp [source] [destination] – Copy files or directories.
o cp -r – Copy directories recursively.
mv [source] [destination] – Move or rename files or directories.
find [path] -name [filename] – Search for a file or directory by name.
File Permissions
System Information
Process Management
Networking
Disk Management
User Management