0% found this document useful (0 votes)
28 views32 pages

Lesson 1 - ICT-Hardware - Software - Docx-Combined

The document provides an overview of Information and Communication Technology (ICT), detailing its components such as hardware, software, networks, and data, and emphasizes its role in education. It also discusses computer hardware and software, including their definitions, advantages, disadvantages, and the relationship between them. Additionally, it covers computer viruses, their types, methods of spread, and the importance of antivirus software for protection against malware.

Uploaded by

sabalberolacel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views32 pages

Lesson 1 - ICT-Hardware - Software - Docx-Combined

The document provides an overview of Information and Communication Technology (ICT), detailing its components such as hardware, software, networks, and data, and emphasizes its role in education. It also discusses computer hardware and software, including their definitions, advantages, disadvantages, and the relationship between them. Additionally, it covers computer viruses, their types, methods of spread, and the importance of antivirus software for protection against malware.

Uploaded by

sabalberolacel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

LESSON 1 : ICT, Computer Hardware and Computer Software

INFORMATION and COMMUNICATION TECHNOLOGY (ICT)


It encompasses all technologies that facilitate communication and the exchange of
information, including telecommunications, broadcasting, internet and mobile
technologies
Its emphasizing its critical role in today’s interconnected world. ICT is much more
than just tools and devices. It represents a fundamental framework that supports
communication, information sharing and services across various domains.
COMPONENTS OF ICT

●​ HARDWARE - Physical devices such as computers, smartphones, and servers that


facilitate the operation of ICT systems and services.
●​ Software - Applications and operating systems that provide the functionality and user
interface, enabling users to perform various tasks within ICT.
●​ Networks - the means of communication that connect hardware and software,
allowing data transfer and interaction between devices across local and global scales.
●​ Data - The information processed, stored, and transmitted in ICT systems, serving as
the foundation for decision making and informing users.

ICT in Education

Transforming learning through digital mediums


●​ E-learning platforms - Online systems and resources that facilitate remote learning,
offering access to courses and materials globally, often with an emphasis on
interactivity
●​ Digital Platforms - Incorporates technology into traditional learning environments,
enabling dynamic and adaptive teaching methods while fostering student
engagement.
●​ Impact on learning outcomes - research shows that effective integration of ICT in
education enhances engagement, retention, and performance across diverse student
populations.

Computer System Hardware


Introduction
A computer system is made up of both hardware and software. Hardware refers to the
physical components of a computer that can be touched and seen. These components
work together to perform various computing tasks.
●​ Software is another term for a computer program. Software controls the computer and
makes it do useful work. Without software a computer is useless.
●​ Hardware refers to the physical components that make up a computer system. These
include the computer's processor, memory, monitor, keyboard, mouse, disk drive,
printer, and so on.
Advantages of Computers

1.​ Speed – Computers can process large amounts of data in seconds.


2.​ Accuracy – They perform calculations and tasks with high precision.
3.​ Automation – Once programmed, computers can execute tasks automatically.
4.​ Storage – Large amounts of data can be stored and retrieved easily.
5.​ Connectivity – Computers enable global communication through the internet.
6.​ Multitasking – They can run multiple applications simultaneously.
7.​ Entertainment – Used for gaming, watching movies, and listening to music.
8.​ Research and Education – Computers provide access to vast educational
resources.

Disadvantages of Computers
1.​ Cybersecurity Risks – Susceptible to hacking, viruses, and data breaches.
2.​ Health Issues – Prolonged use can cause eye strain, back pain, and stress.
3.​ Unemployment – Automation can replace human jobs in some sectors.
4.​ High Costs – Advanced computers and software can be expensive.
5.​ Dependency – Over-reliance on computers can reduce critical thinking skills.
6.​ Privacy Concerns – Personal data can be misused or stolen.
7.​ Distraction – Social media and gaming can lead to decreased productivity.

Categories of Computer Hardware


1. Input Devices

●​ Used to enter data and instructions into the computer.


●​ Examples:
o​ Keyboard – Used for typing.
o​ Mouse – A pointing device to control the cursor.
o​ Scanner – Converts physical documents into digital format.
o​ Microphone – Captures audio input.

2. Processing Unit (Central Processing Unit - CPU)

●​ The brain of the computer that processes instructions.


●​ Consists of:
o​ Arithmetic Logic Unit (ALU) – Performs calculations and logical
operations.
o​ Control Unit (CU) – Directs operations within the computer.
o​ Registers – Temporary storage for quick data access.

3. Memory (Storage Units)

●​ Primary Memory (Volatile - Temporary Storage):


o​ RAM (Random Access Memory) – Stores data temporarily while in use.
o​ Cache Memory – Speeds up processing by storing frequently used data.
●​ Secondary Memory (Non-Volatile - Permanent Storage):

o​ Hard Disk Drive (HDD) / Solid-State Drive (SSD) – Used for long-term
data storage.
o​ USB Flash Drive & Memory Card – Portable storage devices.
o​ CD/DVD/Blu-ray Discs – Optical storage media.

4. Output Devices

●​ Display processed data and results to the user.


●​ Examples:

o​ Monitor (LCD/LED) – Displays images and videos.


o​ Printer (Inkjet/Laser) – Produces hard copies of documents.
o​ Speakers – Output sound.

5. Peripheral Devices

●​ External devices that enhance a computer’s capabilities.


●​ Examples:

o​ External Hard Drives – Additional storage.


o​ Webcams – Used for video communication.
Computer Software Basic

Software – a set of instructions or programs that tells a computer what to do or how to


perform a specific task (computer software runs on hardware).

2 Types of Software

1. Application Software
2. System Software

1. Application Software
A computer program that provides users with tools to accomplish a specific task.

Examples : word processing,spreadsheets, database management,Internet


browsers,email programs,media players,desktop publishing, etc.

2. System Software
​ it is designed to run a computer’s hardware and application software, and make the
computer system available for use. It serves as the interface between hardware,
application software, and the user.

Main types:
●​ Operating Systems (OS)
●​ Device Drive
●​ Utility Software

1.​ Operating System - A software that controls and coordinates the computer
hardware devices and runs other software and applications on a computer. It is the main
part of system software and a computer will not function without it.

Main functions of OS: booting the computer, managing system resources (CPU,
memory, storage devices, printer, etc.), managing files, handling input and output,
executing and providing services for application software, etc.

Examples: Microsoft Windows, Apple iOS, Android OS, macOS, Linux, etc.

2.Device Driver - A software program that is designed to control a particular hardware


device that is attached to a computer.

Main purpose of device driver : it acts as a translator between the hardware device and
operating systems or applications that use it.
It instructs computer on how to communicate with the device by translating the
operating system’s instructions into a language that a device can understand in order to
perform the necessary task.

Examples: printer driver, display driver, USB driver, sound card driver, motherboard
driver, ROM driver, etc.

3.Utility Software - a type of system software that helps set up, analyze, configure,
strengthen, maintain a computer and performs a very specific task.

Examples: antivirus software, backup software,memory tester,screen saver, etc.


The Relationship Between Hardware and Software
Hardware and software are two fundamental components of a computer system
that work together to perform various tasks. While hardware consists of the physical
components of a computer, software refers to the programs and operating systems that
run on the hardware.

The Relationship Between Hardware and Software are:


●​ Hardware and software both are interdependent on each other. Each of them should
work along to form computer produce a helpful output.
●​ The software can not be used if there is no support of any hardware device.
●​ When there is no proper instructions given, the hardware cannot be used and is
useless.
●​ To get a selected job done in computer, the relevant software package has to be
loaded into the hardware.
●​ Hardware needs software to function, while software requires hardware to run.
●​ Example: A keyboard (hardware) works with a word processing program
(software) to type documents.
Lesson 2: Computer Virus, Types of Viruses, and Use of
Antivirus Software
Definition of a Computer Virus
A computer virus is a type of malicious software (malware) designed
to replicate itself and spread from one computer to another. It attaches itself to
files or programs and can damage, alter, or delete data, disrupt system
operations, and compromise security.
How Computer Viruses Spread:

●​ Downloading infected files from the internet


●​ Opening email attachments from unknown sources
●​ Using infected USB drives or external storage
●​ Clicking on malicious links on websites or social media

Types of Computer Viruses


There are various types of computer viruses, each with different behaviors
and effects:
1.​ Boot Sector Virus – Infects the master boot record of a computer,
making it difficult to remove without specialized tools.

How it spreads
●​ Boot sector viruses can infect a computer when a user starts it
with an infected floppy disk.
●​ The virus can also infect other floppy disks when accessed on an
infected computer.
●​ Boot sector viruses can infect every disk accessed on an infected
system.

How to prevent
●​ Avoid downloading from unsecure sites and sources.
●​ Check if a site you're visiting is legitimate or not.

How to remove
●​ Boot sector viruses can usually be removed.
●​ If the virus cannot be removed due to encryption or excessive
damage to existing code, the hard drive may need reformatting to
eliminate the infection.

2.​ File Infector Virus – is a type of malware that infects executable files,
such as those with .exe or .com extensions. It can spread quickly across
networks and systems.

How does a file infector virus spread


●​ It copies its code onto executable programs
●​ It overwrites files when they are opened
●​ It spreads to other executable files and programs

How can file infector viruses damage device?


●​ They can permanently damage a device and make it unusable
●​ They can carry payloads that damage hard drives

How can detect and remove file infector viruses?


●​ Run a full system antivirus scan
●​ Allow the antivirus to quarantine or remove any infected files it
detects
●​ If the virus is sophisticated, you may need to run the scan multiple
times
3.​ Macro Virus – is a malicious program that's embedded in a document,
spreadsheets, and other files that use macros, such as Microsoft Word or
Excel files.

How macro viruses spread


●​ Email attachments: Macro viruses are often spread through
infected email attachments.
●​ Shared documents: Macro viruses can spread when a user
opens an infected document on a shared network drive or
removable media device.
●​ Malicious advertisements: Spoofed ads can include infected
links or downloads.

How to protect yourself


●​ Use strong antivirus software to detect and block macro viruses.
●​ Don't open files from untrusted sources.
●​ Don't click on links in unsolicited emails or advertisements.
●​ If you suspect your system is infected, run a full system scan and
contact your IT administrator.

4.​ Polymorphic Virus – is a type of malware that can change its form to
avoid detection by security tools.

How it works
●​ Encrypts its code using a new key each time it changes form
●​ Modifies its physical file makeup
●​ Retains the same basic routines after each infection
Why it's dangerous
●​ Polymorphic viruses are one of the most dangerous forms of
malware
●​ Traditional cybersecurity defenses, like antivirus software, are
often unable to withstand a polymorphic virus attack

Additional information
●​ Polymorphic viruses are complex file infectors
●​ They are advanced cyber threats that constantly evolve their code
●​ They pose significant challenges to organizations
5.​ Worms – is a type of malware that can spread automatically through a
network. Worms can harm networks by overloading servers, stealing data,
and corrupting files.

How worms spread


●​ Worms can spread by sending mass emails to infected users'
contacts.
●​ Worms can exploit vulnerabilities in security software.
●​ Worms can self-replicate, creating copies of themselves to send
to other computers.

Examples of computer worms


●​ Storm Worm - An email worm that sent false news stories about
a storm wave that would kill people in Europe

●​ SQL Slammer - A worm that crashed routers, launched DoS


attacks, and disrupted internet traffic in 2003

●​ Stuxnet - A worm that targeted industrial control systems used in


Iran's nuclear program

●​ Code Red - A worm that targeted Microsoft IIS web servers and
defaced websites with the text "Hacked by Chinese"

●​ Conficker - A worm that exploited flaws in Windows to infect


millions of computers in over a hundred countries

●​ Mydoom - A worm that targeted Windows computers and infected


millions of machines since its release in 2004

●​ Nimda - A worm that modified existing websites to offer malicious


downloads
Worms are different from viruses because worms can operate on their
own while a virus needs a host computer.

6.​ Trojan Horse (Trojan) – is a type of malware that tricks users into
downloading and running malicious software.

How Trojans work


●​ Trojans are disguised as legitimate programs
●​ They can be spread through emails, social engineering, banner
ads, and pop-ups
●​ Once activated, Trojans can steal data, spy on users, and gain
access to systems

How Trojans are named


●​ The term comes from the Greek myth of the wooden horse used
to sneak into Troy
●​ In the myth, the Greeks pretended to leave the war behind, but
returned the following night to sack Troy

How to protect against Trojans


●​ Use up-to-date anti-malware protection
●​ Be wary of suspicious emails, attachments, and websites
●​ Avoid clicking on links in suspicious emails or websites

7.Ransomware – is a type of malware that encrypts a victim's files and


demands a ransom for their return. It can also lock a device or steal and
delete data.

How ransomware works


●​ Attackers trick users into downloading ransomware through
emails, ads, links, or websites
●​ The ransomware encrypts the victim's files
●​ The victim is asked to pay a ransom to the attackers to regain
access to their files

Ransomware risks
●​ Ransomware can cause costly disruptions and loss of data
●​ It can be difficult to trace and prosecute the perpetrators because
they often use cryptocurrencies
●​ Even if the ransom is paid, there's no guarantee the victim will get
their files back

8.Spyware – Secretly collects user information, such as passwords and


browsing habits, and sends it to hackers.

How to detect spyware


●​ Endless pop-up windows
●​ Redirects to other websites than the one you typed into your
browser
●​ New toolbars and icons appear in your browser or task tray

How to remove spyware


●​ Use a virus scanner app
●​ Use a factory reset or bootable antivirus tool

How to prevent spyware


●​ Use multi-factor authentication
●​ Regularly update and patch your OS and antimalware software
●​ Block potentially harmful websites and use content filtering
●​ Don't download apps from untrusted websites

Given below are such signs which may help you identify computer
viruses:

●​ Speed of the System – In case a virus is completely executed into


your device, the time taken to open applications may become longer
and the entire system processing may start working slowly
●​ Pop-up Windows – One may start getting too many pop up windows
on their screen which may be virus affected and harm the device even
more
●​ Self Execution of Programs – Files or applications may start opening
in the background of the system by themselves and you may not even
know about them
●​ Log out from Accounts – In case of a virus attack, the probability of
accounts getting hacked increase and password protected sites may
also get hacked and you might get logged out from all of them
●​ Crashing of the Device – In most cases, if the virus spreads in
maximum files and programs, there are chances that the entire device
may crash and stop working

Antivirus Software and Its Importance


Antivirus software is a program designed to detect, prevent, and
remove malicious software from a computer system. It plays a crucial role in
cybersecurity by protecting computers from viruses, worms, Trojans,
ransomware, spyware, and other forms of malware. With the increasing use of
the internet and digital devices, antivirus software has become an essential
tool for ensuring data security and system integrity.
Popular Antivirus Software
1.​ Windows Defender (Microsoft)
●​ Pre-installed on Windows systems.
●​ Provides real-time protection and firewall features.
●​ Regular updates from Microsoft.
2.​ Norton Antivirus (NortonLifeLock)
●​ Advanced threat protection with AI-based security.
●​ Secure VPN for online privacy.
●​ Identity theft protection and password manager.
3.​ McAfee Total Protection
●​ Comprehensive malware and phishing protection.
●​ Secure VPN and encrypted storage.
●​ Multi-device compatibility.
4.​ Bitdefender Antivirus Plus
●​ Behavior-based detection and anti-phishing tools.
●​ Multi-layer ransomware protection.
●​ Secure online banking tools.
5.​ Avast Free Antivirus
●​ Free version available with basic security features.
●​ Wi-Fi security scanner and phishing protection.
●​ Lightweight and user-friendly.
6.​ Kaspersky Internet Security
●​ Strong malware detection rates.
●​ Parental controls and safe online banking.
●​ Webcam and microphone protection.
7.​ ESET NOD32 Antivirus
●​ Advanced heuristic detection.
●​ Minimal system impact with high-speed scanning.
●​ USB and external device scanning.

Free vs. Paid Antivirus Software


Free Antivirus:
●​ Basic protection against common malware.
●​ Limited features and may include ads.
●​ Suitable for personal use with minimal security needs.
Paid Antivirus:
●​ Comprehensive security features (firewall, VPN, anti-ransomware,
etc.).
●​ Regular updates and better customer support.
●​ Suitable for businesses and users handling sensitive data.

Functions of Antivirus Software:


1.​ Scanning Files and Programs – Examines files, software, and system
processes for malware.
2.​ Virus Definition Updates – Regularly updates virus databases to
recognize new threats.
3.​ Real-Time Protection – Continuously monitors system activities to detect
and prevent infections.
4.​ Quarantine and Removal – Isolates and deletes malicious files to
prevent damage.
5.​ Firewall and Web Protection – Prevents unauthorized access and
blocks dangerous websites.

Importance of Antivirus Software


●​ Protects Personal and Business Data – Prevents data theft and loss.
●​ Prevents System Slowdowns and Failures – Stops malware from
affecting system performance.
●​ Safeguards Online Activities – Protects users from phishing,
ransomware, and other cyber threats.
●​ Ensures Safe Software and File Downloads – Scans downloads for
potential threats.

Best Practices for Virus Prevention


●​ Keep Antivirus Software Updated – Regular updates improve malware
detection capabilities.
●​ Enable Real-Time Protection – Ensures continuous monitoring of
system activities.
●​ Perform Regular System Scans – Identifies and removes hidden
threats.
●​ Avoid Downloading Suspicious Files – Downloads should be from
trusted sources only.
●​ Use Strong Passwords and Multi-Factor Authentication – Enhances
overall cybersecurity.
●​ Regularly back up important files to external storage or cloud services.
Lesson 3: Proper Use of Tools in Computer Hardware
Servicing
Introduction
Computer hardware servicing involves assembling, troubleshooting,
repairing, and maintaining computer components. To perform these tasks
effectively, technicians must use the correct tools and follow proper handling
procedures. The improper use of tools can lead to hardware damage, injury,
and inefficiency in troubleshooting and repair.
Types of Tools and their Proper Use
1. Hand Tools
Hand tools are manually operated and essential for assembling and
disassembling computer components. Hand tools are essential in computer
hardware servicing for assembling, repairing, and maintaining components
safely and efficiently. Proper use ensures precision, prevents damage, and
enhances technician safety.

●​ Screwdrivers (Philips and Flat-head) - Used to tighten or loosen screws


in computer cases, motherboards, and components. Always choose the
correct screwdriver type to avoid damaging screws.
●​ Hex Driver (Nut Driver)-Used for installing and removing hexagonal nuts
in computer components. Apply steady pressure to prevent stripping the
nut.
●​ Needle-Nose Pliers-Used to grip small parts, bend wires, or remove
jumpers. Use gentle force to avoid damaging fragile components.
●​ Wire Cutter/Stripper-Cuts and removes insulation from wires when
repairing power connections. Ensure correct positioning to avoid cutting
too much wire.
●​ Tweezers- Used to handle small parts such as jumpers and screws. Hold
components firmly but gently to prevent dropping or misplacing them.

Importance of Hand Tools


✔​ Ensures Safe Handling of Computer Components

●​ Delicate components like motherboards, RAM, and processors require


precision tools to avoid accidental damage.
●​ Using the right tools prevents unnecessary force that could break
fragile parts.

✔​ Improves Work Efficiency and Accuracy

●​ Proper hand tools help complete tasks faster and with more accuracy.
●​ Example: A magnetic screwdriver makes installing tiny screws easier.
✔​ Prevents Damage to Hardware

●​ Using incorrect or low-quality tools can strip screws, damage


connectors, or scratch circuit boards.
●​ Proper tools reduce the risk of costly mistakes.

✔​ Reduces Risk of Personal Injury

●​ Handling sharp or electrical components with inappropriate tools can


cause cuts, burns, or shocks.
●​ Insulated tools protect against electric hazards.

✔​ Extends the Lifespan of Tools and Components

●​ Well-maintained tools last longer and remain effective.


●​ Using tools correctly minimizes wear and tear on both the tools and the
hardware.

2.​ Cleaning Tools


Cleaning tools help maintain computer efficiency by preventing dust
buildup and overheating.
●​ Brush- Used to clean dust from circuit boards and components. Use
a soft-bristle brush to avoid scratching delicate parts.
●​ Compressed Air-Blows dust and debris from hard-to-reach areas.
Hold the can upright and spray in short bursts to prevent moisture
buildup.
●​ Lint-Free Cloth-Cleans surfaces without leaving lint or
scratches.Wipe gently to prevent damage.
●​ Isopropyl Alcohol & Cleaning Solution- Used to clean circuit
boards, connectors, and screen surfaces.Apply the solution to a cloth
instead of spraying directly on components.

Keeping computer components clean is essential for ensuring proper


functioning and longevity. Here are the key reasons why regular
cleaning is important:
✔​ Prevents Overheating

●​ Dust and debris can accumulate on cooling fans, heat sinks, and vents,
restricting airflow and causing the computer to overheat. Overheating
can lead to performance issues and potential hardware failure.

✔​ Extends the Lifespan of Components


●​ Dirt, dust, and grime can cause wear and tear on internal components,
leading to premature failure. Regular cleaning helps maintain the
hardware in good condition, prolonging its lifespan.

✔​ Improves Performance

●​ A clean computer runs more efficiently. When dust clogs components,


it can slow down processing speeds, cause lagging, and reduce overall
performance.

✔​ Prevents Electrical Issues

●​ Dust can cause static electricity buildup, which can damage sensitive
electronic components like the motherboard, RAM, and processor.
Cleaning reduces the risk of static discharge that could harm the
system.

✔​ Reduces Noise Levels

●​ When cooling fans are clogged with dust, they have to work harder,
making them louder. Cleaning the fans and vents helps keep the
system quieter during operation.

✔​ Prevents System Crashes and Malfunctions

●​ Dirt and dust can interfere with connections on circuit boards and
cause short circuits, leading to unexpected crashes and hardware
malfunctions.

✔​ Protects Moving Parts from Wear and Tear

●​ Components like hard drives and cooling fans have moving parts that
can be affected by dust accumulation, causing them to wear out faster.
Keeping them clean helps ensure smooth operation.

✔​ Enhances Airflow and Cooling Efficiency

●​ Clean components allow better air circulation inside the computer case,
keeping temperatures at optimal levels and preventing thermal
throttling.

✔​ Prevents Unpleasant Odors and Health Issues

●​ A buildup of dust and bacteria can create bad odors and contribute to
allergies or respiratory issues, especially in shared workspaces.
3.​ Diagnostic Tools
Diagnostic tools help identify and troubleshoot computer hardware
issues.
●​ Multimeter-Measures voltage, current, and resistance in circuits. Set
the correct range before testing to prevent damage to the multimeter.
●​ Power Supply Tester-Checks if the PSU is supplying the correct
voltage. Ensure the power supply is unplugged before connecting the
tester.
●​ POST Card (Power On Self-Test Card) - Diagnoses motherboard
and boot-up issues. Insert the card properly into the PCI slot before
powering on the system.
●​ Thermal Scanner- Detects overheating in computer components.
Point the scanner at components without direct contact for accurate
readings.

Importance of Diagnostic Tools in Identifying and Troubleshooting


Computer Hardware Issues
Diagnostic tools play a crucial role in maintaining and repairing
computer hardware by helping technicians quickly identify and resolve issues.
Here are the key reasons why these tools are essential:
✔​ Speeds Up Troubleshooting

●​ Diagnostic tools help pinpoint hardware issues quickly, reducing the


time needed for troubleshooting.
●​ Saves technicians from manually checking each component, improving
efficiency.

✔​ Accurately Identifies Hardware Problems

●​ Provides precise information about malfunctioning components, such


as faulty RAM, overheating CPUs, or failing hard drives.
●​ Reduces guesswork and prevents unnecessary part replacements.

✔​ Prevents Further Damage

●​ Detecting issues early helps prevent minor problems from escalating


into major failures.
●​ Example: Identifying overheating issues can prevent CPU or GPU
damage.

✔​ Saves Cost on Repairs

●​ Accurate diagnosis ensures that only the faulty component is replaced,


avoiding unnecessary expenses.
●​ Prevents trial-and-error repairs, which can lead to additional damage
and costs.

✔​ Ensures System Stability and Performance


●​ Regular diagnostics help maintain a stable and smoothly running
system.
●​ Identifies performance bottlenecks, allowing users to optimize their
hardware setup.

✔​ Enhances Preventive Maintenance

●​ Diagnostic tools help detect potential issues before they cause major
failures.
●​ Preventive maintenance extends the lifespan of computer components.

4 Software Tools
Software tools assist in diagnosing and optimizing computer
performance.
●​ Antivirus Software-Detects and removes malware affecting system
performance. Keep antivirus updated to ensure maximum protection.
●​ Disk Cleanup and Defragmentation Tools- Organizes and removes
unnecessary files to improve system speed. Schedule regular
cleanups to maintain performance.
●​ Hardware Monitoring Software-Monitors temperature, fan speed,
and system voltage levels. Check readings regularly to detect
potential hardware failures.
Importance of Software Tools and Their Proper Use
Software tools play a vital role in computer maintenance,
troubleshooting, productivity, and security. Using them properly ensures
system efficiency, data integrity, and overall performance. Here’s why they are
important:
✔​ Enhances System Performance

●​ Software tools help optimize system resources, clean unnecessary


files, and improve speed.

✔​ Aids in Troubleshooting and Repair

●​ Diagnostic and repair tools detect and fix software and hardware
issues.

✔​ Strengthens Security and Protection

●​ Antivirus and anti-malware software prevent threats like viruses,


ransomware, and phishing attacks.

✔​ Ensures Data Safety and Recovery

●​ Backup and recovery tools help prevent data loss due to system
crashes or accidental deletion.
5. ESD (Electrostatic Discharge) Tools
ESD tools prevent static electricity from damaging sensitive computer
components.
●​ ESD Wrist Strap - Worn on the wrist and connected to a grounded
surface. Prevents static buildup on the technician’s body.
●​ ESD Mat - Provides a grounded surface for working with computer
components. Place all components on the mat to prevent electrostatic
damage.
●​ ESD Bags (Anti-Static Bags) - Used for storing and transporting
electronic components. Prevents static buildup that can damage
sensitive parts.
●​ ESD Gloves - Used when handling delicate electronics to prevent
static transfer from hands.
Importance of ESD (Electrostatic Discharge) Tools
Electrostatic Discharge (ESD) tools are essential in computer hardware
servicing to protect sensitive electronic components from damage caused by
static electricity. Proper use of these tools ensures safe handling, extends
component lifespan, and prevents costly repairs.

Importance of ESD Tools


✔​ Prevents Damage to Sensitive Components

●​ Static electricity can easily damage delicate computer parts like RAM,
motherboards, processors, and graphics cards.
●​ ESD tools help discharge static safely before handling these
components.

✔​ Ensures Reliable Computer Performance

●​ Preventing static-related damage ensures that hardware functions


properly and avoids unexpected failures.
●​ Protects system stability and longevity.

✔​ Reduces Repair and Replacement Costs

●​ Damaged components due to ESD can be costly to replace.


●​ Using proper ESD protection minimizes the risk of expensive failures.

✔​ Protects Technicians from Electric Shock

●​ ESD wrist straps and mats safely dissipate static, reducing the risk of
accidental electric shock when handling components.

✔​ Prevents Data Loss

●​ ESD damage can corrupt data stored in electronic components like


SSDs and RAM.

Safety Measures When Using Computer Hardware Tools



✅ Use the right tool for the right job to prevent damage to components.​



Inspect tools before use to ensure they are in good condition.​
Handle tools with care to avoid damaging delicate computer parts.​

✅ Follow electrical safety procedures when using diagnostic tools.​

✅ Keep workspaces clean and organized to prevent accidents.


Wear anti-static gear to prevent electrostatic discharge.​
Lesson 4: Occupational Health and Safety (OHS) Procedures
for Computer Hardware Servicing
Introduction to OHS in Computer Hardware Servicing
Occupational Health and Safety (OHS) is a set of guidelines and
procedures designed to protect technicians, workers, and equipment from
accidents, injuries, and hazards in the workplace. In computer hardware
servicing, following OHS procedures ensures a safe and efficient working
environment.
Common Hazards and Risks in Computer Hardware Servicing
Working with computers and electronic components presents several
hazards, including:
Common Hazards and Risks
1. Electrical Hazards

●​ Risk: Electric shock, short circuits, or fire hazards.


●​ Causes: Working with live circuits, improper handling of power
supplies, damaged wires.
●​ Safety Measures:
o​ Always unplug devices before servicing.
o​ Use insulated tools.
o​ Wear rubber-soled shoes and avoid working in wet areas.

2. Electrostatic Discharge (ESD)

●​ Risk: Damage to sensitive computer components.


●​ Causes: Static electricity from the human body or surroundings.
●​ Safety Measures:
o​ Use an anti-static wrist strap.
o​ Work on an anti-static mat.
o​ Handle components by their edges.

3. Physical Hazards

●​ Risk: Cuts, burns, muscle strain.


●​ Causes: Sharp edges of computer cases, heavy lifting, soldering iron
burns.
●​ Safety Measures:
o​ Use protective gloves when handling sharp objects.
o​ Lift heavy items properly using leg muscles.
o​ Handle soldering irons with care and use proper ventilation.

4. Fire Hazards

●​ Risk: Fires caused by electrical malfunctions.


●​ Causes: Overloaded power sockets, overheating components,
improper wiring.
●​ Safety Measures:
o​ Avoid overloading electrical outlets.
o​ Keep flammable materials away from workstations.
o​ Have a fire extinguisher nearby and know how to use it.

5. Chemical Hazards

●​ Risk: Health problems due to exposure to toxic substances.


●​ Causes: Cleaning solvents, lead-based soldering materials.
●​ Safety Measures:
o​ Use chemicals in well-ventilated areas.
o​ Wear protective gloves and masks.
o​ Store chemicals properly and label them clearly.

6. Trip and Fall Hazards

●​ Risk: Injuries from slipping, tripping, or falling.


●​ Causes: Cables lying on the floor, cluttered workspaces.
●​ Safety Measures:
o​ Organize cables using cable management tools.
o​ Keep the workspace clean and free of obstructions.
o​ Ensure proper lighting in the work area.

OHS Procedures in Computer Hardware Servicing


1. Personal Protective Equipment (PPE)

●​ Protects the technician from physical and chemical hazards.


●​ Examples of PPE:
o​ Anti-static wrist strap – prevents electrostatic discharge (ESD).
o​ Safety goggles – protects eyes from debris or chemical
splashes.
o​ Gloves – prevents cuts and burns when handling sharp or hot
components.

2. Proper Handling of Tools and Equipment

●​ Prevents damage to tools, components, and reduces injury risks.


●​ Procedures:
o​ Use the right tool for the task (e.g., screwdrivers, anti-static
tools).
o​ Store tools properly after use.
o​ Inspect tools regularly for damage.

3. Electrical Safety Measures

●​ Prevents electrocution, short circuits, and equipment damage.


●​ Procedures:
o​ Turn off and unplug devices before servicing.
o​ Avoid working on wet surfaces.
o​ Use insulated tools when handling electrical components.
4. Safe Workplace Practices

●​ Keeps the work environment organized and hazard-free.


●​ Procedures:
o​ Keep the workspace clean and clutter-free.
o​ Organize cables to prevent tripping hazards.
o​ Ensure proper lighting and ventilation.

5. Fire Safety Precautions

●​ Prevents fire hazards due to electrical issues.


●​ Procedures:
o​ Do not overload power outlets.
o​ Keep flammable materials away from electronics.
o​ Have a fire extinguisher nearby and know how to use it.

6. Handling Hazardous Materials

●​ Prevents exposure to toxic substances.


●​ Procedures:
o​ Use chemicals in well-ventilated areas.
o​ Wear gloves and masks when handling solvents.
o​ Dispose of hazardous materials properly.

7. First Aid and Emergency Procedures

●​ Ensures quick response to accidents and injuries.


●​ Procedures:
o​ Know the location of first aid kits.
o​ Report accidents immediately.
o​ Follow emergency evacuation procedures if needed.

Emergency Procedures and First Aid


Emergencies can happen at any time. It must be prepared to handle
situations such as electrical shocks, burns, fire hazards, and minor injuries.
This lesson focuses on emergency procedures and first aid measures to
ensure safety in the workplace.

1. Electrical Shock Response

●​ Do not touch the victim directly if they are in contact with electricity.
●​ Turn off the power source immediately, if safe to do so.
●​ Use a non-conductive object (like a wooden stick) to separate the
person from the electrical source.
●​ Check for breathing and heartbeat. If the person is unresponsive,
perform CPR if trained.
●​ Seek medical help immediately.

2. Fire Emergency Response


●​ Turn off electrical power to prevent further damage.
●​ Use a fire extinguisher (Class C for electrical fires) to put out the fire.
●​ Do NOT use water on electrical fires, as it may cause further hazards.
●​ Evacuate immediately if the fire cannot be controlled and call
emergency services.

3. First Aid for Burns

●​ For minor burns (from soldering irons or hot components), run cool
water over the affected area for at least 10 minutes.
●​ For severe burns, do not apply ice or ointments. Cover the burn with a
clean, dry cloth and seek medical help.
●​ If clothing catches fire, remember STOP, DROP, and ROLL to put it
out.

4. First Aid for Cuts and Wounds

●​ Wash hands before treating the wound to avoid infection.


●​ Apply pressure with a clean cloth to stop bleeding.
●​ Clean the wound with antiseptic and cover with a sterile bandage.
●​ Seek medical help if the wound is deep or does not stop bleeding.

5. First Aid for Eye Irritation

●​ If chemicals or dust enter the eyes, flush with clean water for at least
15 minutes.
●​ Avoid rubbing the eyes, as this may worsen irritation.
●​ Seek medical attention if the irritation persists.

OHS for Effective Computer Troubleshooting

1.​ Fully shut down and unplug the computer before you make any
attempts to disassemble the system unit.
2.​ Take off any metal objects on your arms or fingers such as bracelets,
rings or watches.
3.​ Make sure your hands are completely dry to avoid damaging any
mechanical parts as well as to avoid electrocution.
4.​ Hazards/risk in the workplace and their corresponding indicators are
identifies to minimize or eliminate risk to co workers, workplace and
environment.
5.​ Never plug an ATX power supply into AC power while adding and
connecting cards of motherboard.
6.​ Use an anti-static wrist strap or anti-static mat to remove any electro
static discharge.
7.​ Be careful when holding the motherboard, Its underside actually quite
pointy and able to hurt you.
8.​ Be careful no to drop any small parts (particularly screws) into
unreachable areas such as into the computer fan or disk drive.
9.​ Never spray cleaning liquids directly unto any part of your computer.
10.​ Personal protective equipment are correctly used.
11.​ The table should be clean and non-metallic short circuits.
12.​ Always wear rubber shoes or safety shoes when working on computer.
13.​ Do not force components into computer ports.
14.​ Store your removed components and peripherals on Anti-Static bag.
15.​ Never assume anything without checking it out for yourself.

Importance of Occupational Health and Safety (OHS) in Computer


Hardware Servicing
1. Prevents Workplace Accidents and Injuries

●​ OHS practices help reduce risks of electrical shocks, burns, and cuts.
●​ Ensures proper handling of tools, wires, and computer components.
●​ Encourages the use of personal protective equipment (PPE), such
as anti-static wrist straps, gloves, and safety goggles.

2. Protects Equipment and Prevents Damage

●​ Prevents electrostatic discharge (ESD), which can damage sensitive


computer components.
●​ Reduces fire hazards caused by overheating or faulty wiring.
●​ Ensures that tools and equipment are properly maintained and
stored.

3. Promotes Efficiency and Productivity

●​ A clean and organized workspace allows technicians to work faster


and more effectively.
●​ Fewer accidents mean less downtime and more work accomplished.
●​ Following OHS procedures leads to better-quality repairs and
services.
4. Ensures Compliance with Safety Regulations

●​ Companies must follow government-mandated OHS laws and


workplace safety standards.
●​ Ensuring OHS compliance helps prevent legal issues and penalties.
●​ Protects the company’s reputation by maintaining a safe and healthy
work environment.

5. Promotes a Healthy Work Environment

●​ Prevents exposure to toxic chemicals, such as cleaning solvents and


soldering fumes.
●​ Encourages proper posture and lifting techniques to avoid muscle
strain.
●​ Minimizes trip and fall hazards by keeping cables and tools properly
arranged.
Lesson 5: Introduction to Operating System

Operating System

An Operating System (OS) is system software that manages computer hardware,


software resources, and provides essential services for applications. It acts as an
intermediary between the user and the computer hardware, enabling smooth operation
and interaction. An operating system is a software which performs all the basic tasks like
file management, memory management, process management, handling input and
output, and controlling peripheral devices such as disk drives and printers.

Functions of an Operating System


An operating system performs several essential functions that ensure the smooth
operation of a computer system:

1.​ Process Management: The OS manages processes, which are programs in


execution. It allocates system resources, such as CPU time, memory, and
input/output devices, to different processes, ensuring efficient multitasking./
Handles execution of multiple applications.
2.​ Memory Management: The OS is responsible for managing the computer’s
memory. It allocates memory to processes, ensuring that each process has
sufficient memory to run. It also handles memory deallocation when processes are
completed or terminated./ Allocates memory for programs and ensures efficient
usage.
3.​ File System Management: The OS provides a file system that organizes and
manages files on storage devices. It allows users to create, read, write, and delete
files, ensuring data integrity and security. / Organizes and secures data storage.
4.​ Device Management: The OS controls and manages input/output devices, such
as keyboards, mice, printers, and disk drives. It provides an interface for
applications to interact with these devices, ensuring proper device utilization and
coordination./Controls hardware components like keyboards, printers, and hard
drives.
5.​ User Interface: The OS provides a user-friendly interface that allows users to
interact with the computer system. It can be a command-line interface (CLI) or a
graphical user interface (GUI), enabling users to execute commands, launch
applications, and perform various tasks./ Provides a way for users to interact with
the computer (Graphical User Interface (GUI) or Command-Line Interface (CLI)).

Types of Operating Systems


1. Batch Operating System
This type of operating system does not interact with the computer directly. There is
an operator which takes similar jobs having the same requirements and groups them into
batches. It is the responsibility of the operator to sort jobs with similar needs. Batch
Operating System is designed to manage and execute a large number of jobs efficiently
by processing them in groups.

Batch Operating System


Advantages of Batch Operating System

●​ Multiple users can share the batch systems.


●​ The idle time for the batch system is very less.
●​ It is easy to manage large work repeatedly in batch systems.

Disadvantages of Batch Operating System

●​CPU is not used efficiently. When the current process is doing IO, CPU is free
and could be utilized by other processes waiting.
●​ The other jobs will have to wait for an unknown time if any job fails.
●​ In batch operating system, average response time increases as all processes
are processed one by one.

Examples of Batch Operating Systems: Payroll Systems, Bank Statements, etc

2. Multi-Programming Operating System


Multiprogramming Operating Systems can be simply illustrated as more than one
program is present in the main memory and any one of them can be kept in execution.
This is basically used for better utilization of resources.

Advantages of Multi-Programming Operating System

●​ CPU is better utilized and overall performance of the system improves.


●​ It helps in reducing the response time.

Multi-Tasking/Time-sharing Operating systems

It is a type of Multiprogramming system with every process running in round robin


manner. Each task is given some time to execute so that all the tasks work smoothly.
Each user gets the time of the CPU as they use a single system. These systems are also
known as Multitasking Systems. The task can be from a single user or different users
also. The time that each task gets to execute is called quantum. After this time interval is
over OS switches over to the next task.
Advantages of Time-Sharing OS

●​ Each task gets an equal opportunity.


●​ Fewer chances of duplication of software.
●​ CPU idle time can be reduced.
●​ Resource Sharing: Time-sharing systems allow multiple users to share
hardware resources such as the CPU, memory, and peripherals, reducing the
cost of hardware and increasing efficiency.
●​ Improved Productivity: Time-sharing allows users to work concurrently,
thereby reducing the waiting time for their turn to use the computer. This
increased productivity translates to more work getting done in less time.
●​ Improved User Experience: Time-sharing provides an interactive environment
that allows users to communicate with the computer in real time, providing a
better user experience than batch processing.

Disadvantages of Time-Sharing OS

●​ Reliability problem.
●​ One must have to take care of the security and integrity of user programs and
data.
●​ Data communication problem.
●​ High Overhead: Time-sharing systems have a higher overhead than other
operating systems due to the need for scheduling, context switching, and
other overheads that come with supporting multiple users.
●​ Complexity: Time-sharing systems are complex and require advanced
software to manage multiple users simultaneously. This complexity increases
the chance of bugs and errors.
●​ Security Risks: With multiple users sharing resources, the risk of security
breaches increases. Time-sharing systems require careful management of
user access, authentication, and authorization to ensure the security of data
and software.

Examples of Time-Sharing OS with explanation

●​ IBM VM/CMS : IBM VM/CMS is a time-sharing operating system that was first
introduced in 1972. It is still in use today, providing a virtual machine
environment that allows multiple users to run their own instances of operating
systems and applications.
●​ TSO (Time Sharing Option) : TSO is a time-sharing operating system that
was first introduced in the 1960s by IBM for the IBM System/360 mainframe
computer. It allowed multiple users to access the same computer
simultaneously, running their own applications.
●​ Windows Terminal Services : Windows Terminal Services is a time-sharing
operating system that allows multiple users to access a Windows server
remotely. Users can run their own applications and access shared resources,
such as printers and network storage, in real-time.

3. Multi-Processing Operating System


Multi-Processing Operating System is a type of Operating System in which more
than one CPU is used for the execution of resources. It betters the throughput of the
System.
Advantages of Multi-Processing Operating System

●​ It increases the throughput of the system as processes can be parallelized.


●​ As it has several processors, so, if one processor fails, we can proceed with
another processor.

4. Multi User Operating Systems


These systems allow multiple users to be active at the same time. These system can be
either multiprocessor or single processor with interleaving.

Time-Sharing OS

5. Distributed Operating System


These types of operating system is a recent advancement in the world of computer
technology and are being widely accepted all over the world and, that too, at a great
pace. Various autonomous interconnected computers communicate with each other using
a shared communication network. Independent systems possess their own memory unit
and CPU. These are referred to as loosely coupled systems or distributed systems .
These systems’ processors differ in size and function. The major benefit of working with
these types of the operating system is that it is always possible that one user can access
the files or software which are not actually present on his system but some other system
connected within this network i.e., remote access is enabled within the devices connected
in that network.

Distributed OS

Advantages of Distributed Operating System

●​ Failure of one will not affect the other network communication, as all systems
are independent of each other.
●​ Electronic mail increases the data exchange speed.
●​ Since resources are being shared, computation is highly fast and durable.
●​ Load on host computer reduces.
●​ These systems are easily scalable as many systems can be easily added to
the network.
●​ Delay in data processing reduces.
Disadvantages of Distributed Operating System

●​ Failure of the main network will stop the entire communication.


●​ To establish distributed systems the language is used not well-defined yet.
●​ These types of systems are not readily available as they are very expensive.
Not only that the underlying software is highly complex and not understood
well yet.

Examples of Distributed Operating Systems are LOCUS, etc.

Issues With Distributed Operating Systems

●​ Networking causes delays in the transfer of data between nodes of a


distributed system. Such delays may lead to an inconsistent view of data
located in different nodes, and make it difficult to know the chronological order
in which events occurred in the system.
●​ Control functions like scheduling, resource allocation, and deadlock detection
have to be performed in several nodes to achieve computation speedup and
provide reliable operation when computers or networking components fail.
●​ Messages exchanged by processes present in different nodes may travel over
public networks and pass through computer systems that are not controlled by
the distributed operating system. An intruder may exploit this feature to tamper
with messages, or create fake messages to fool the authentication procedure
and masquerade as a user of the system.

6. Network Operating System


These systems run on a server and provide the capability to manage data, users,
groups, security, applications, and other networking functions. These types of operating
systems allow shared access to files, printers, security, applications, and other networking
functions over a small private network. One more important aspect of Network Operating
Systems is that all the users are well aware of the underlying configuration, of all other
users within the network, their individual connections, etc. and that’s why these
computers are popularly known as tightly coupled systems .

Network Operating System

Advantages of Network Operating System

●​ Highly stable centralized servers.


●​ Security concerns are handled through servers.
●​ New technologies and hardware up-gradation are easily integrated into the
system.
●​ Server access is possible remotely from different locations and types of
systems.

Disadvantages of Network Operating System


●​ Servers are costly.
●​ User has to depend on a central location for most operations.
●​ Maintenance and updates are required regularly.

Examples of Network Operating Systems are Microsoft Windows Server 2003,


Microsoft Windows Server 2008, UNIX, Linux, Mac OS X, Novell NetWare, BSD, etc.

7. Real-Time Operating System


These types of OSs serve real-time systems. The time interval required to process
and respond to inputs is very small. This time interval is called response time.Real-time
systems are used when there are time requirements that are very strict like missile
systems, air traffic control systems, robots, etc.

Types of Real-Time Operating Systems

●​ Hard Real-Time Systems: Hard Real-Time OSs are meant for applications
where time constraints are very strict and even the shortest possible delay is
not acceptable. These systems are built for saving life like automatic
parachutes or airbags which are required to be readily available in case of an
accident. Virtual memory is rarely found in these systems.
●​ Soft Real-Time Systems: These OSs are for applications where
time-constraint is less strict.

Real-Time Operating System

Advantages of RTOS

●​ Maximum Consumption: Maximum utilization of devices and systems, thus


more output from all the resources.
●​ Task Shifting: The time assigned for shifting tasks in these systems is very
less. For example, in older systems, it takes about 10 microseconds in shifting
from one task to another, and in the latest systems, it takes 3 microseconds.
●​ Focus on Application: Focus on running applications and less importance on
applications that are in the queue.
●​ Real-time operating system in the embedded system: Since the size of
programs is small, RTOS can also be used in embedded systems like in
transport and others.
●​ Error Free: These types of systems are error-free.
●​ Memory Allocation: Memory allocation is best managed in these types of
systems.

Disadvantages of RTOS
●​ Limited Tasks: Very few tasks run at the same time and their concentration is
very less on a few applications to avoid errors.
●​ Use heavy system resources: Sometimes the system resources are not so
good and they are expensive as well.
●​ Complex Algorithms: The algorithms are very complex and difficult for the
designer to write on.
●​ Device driver and interrupt signals: It needs specific device drivers and
interrupts signal to respond earliest to interrupts.
●​ Thread Priority: It is not good to set thread priority as these systems are very
less prone to switching tasks.

Examples of Real-Time Operating Systems are Scientific experiments, medical


imaging systems, industrial control systems, weapon systems, robots, air traffic control
systems, etc.

8. Mobile Operating Systems


These operating systems are mainly for mobile devices. Examples of such
operating systems are Android and iOS.

History and Evolution of Operating Systems

The evolution of operating systems (OS) has gone through several phases, from simple
batch processing to advanced AI-driven systems. Below is a historical overview of how
OS technology has developed over time.

1. First Generation (1940s - Early 1950s): No Operating System

●​ Early computers like the ENIAC and UNIVAC did not have an OS.
●​ Programmers manually input machine code using punch cards and switches.
●​ There was no user interface; computers executed only one program at a time.

2. Second Generation (1950s - Early 1960s): Batch Processing Systems

●​ The first operating systems emerged to automate job execution.


●​ Batch processing was introduced, where programs were grouped into batches and
executed sequentially.
●​ Example: IBM’s early batch processing systems.
●​ Computers were expensive and mainly used by governments and large institutions.

3. Third Generation (1960s - 1970s): Multiprogramming and Time-Sharing

●​ Multiprogramming allowed multiple programs to run simultaneously, improving


efficiency.
●​ Time-sharing OS enabled multiple users to interact with the computer at the same
time.
●​ Example: UNIX (1969) developed at AT&T’s Bell Labs became one of the most
influential OS.
●​ Introduction of the first graphical user interfaces (GUIs) in research labs.

4. Fourth Generation (1980s - 1990s): Personal Computers and GUI-Based OS

●​ Rise of personal computers (PCs) led to more user-friendly OS with graphical


interfaces.
●​ Microsoft introduced MS-DOS (1981) and later Windows (1985), making computing
accessible to non-technical users.
●​ Apple released macOS (formerly System 1) in 1984 with a full GUI experience.
●​ Linux (1991) was introduced as an open-source alternative.

5. Fifth Generation (2000s - Present): Mobile, Cloud, and AI-Based OS

●​ The rise of smartphones led to mobile OS like Android (2008) and iOS (2007).
●​ Cloud-based OS, such as Google Chrome OS, introduced the concept of web-based
computing.
●​ AI-driven OS improvements include predictive analytics, voice assistants, and
automation.

Examples of Popular Operating Systems:


1. Windows OS

●​ Developed by Microsoft, Windows is one of the most widely used operating


systems for personal and business computers.
●​ It provides a graphical user interface (GUI), making it user-friendly.
●​ Versions include Windows 7, Windows 10, and Windows 11.
●​ Used for gaming, office work, and general computing.

2. macOS

●​ Developed by Apple Inc., macOS is designed for Mac computers.


●​ It offers a sleek user interface and tight security features.
●​ Versions include macOS Ventura, macOS Sonoma.
●​ Preferred by creative professionals for video editing, graphic design, and
software development.

3. Linux

●​ An open-source operating system used for servers, desktops, and embedded


systems.
●​ It has many distributions (Ubuntu, Fedora, Debian, etc.).
●​ Known for security, stability, and flexibility.
●​ Often used by developers and IT professionals.

4. Android

●​ Developed by Google, Android is an operating system for mobile devices like


smartphones and tablets.
●​ It is based on the Linux kernel and supports millions of apps via the Google Play
Store.
●​ Commonly used in brands like Samsung, Xiaomi, and OnePlus.

5. iOS

●​ The operating system for Apple’s iPhones and iPads.


●​ Known for its smooth performance, security, and exclusive apps.
●​ Apps are available through the Apple App Store.
●​ Works seamlessly with other Apple devices like MacBooks and Apple Watch.

You might also like