Lecture 18
Lecture 18
Introduction to
Computing
Lecture 18
Dr. Iftikhar Azim Niaz
[email protected]
1
Last Lecture Summary I
Operating System Evolution
Types of Operating Systems
Stand alone Operating Systems
DOS
Windows NT
Windows 9x (Windows 95, 98 ME)
Windows 2000
Windows XP, Windows Vista, Windows 7
Mac OS X
Unix
Linux
2
Last Lecture Summary II
Network Operating Systems
Features
Windows NT Server
Windows 2000 Server
Windows 2003 Server
Windows 2008 Server
Unix for Servers
Linux for Servers
Solaris
Novell Netware
3
Embedded Operating
Systems
built into the circuitry of an electronic device
unlike a PC's operating system, which resides on a
magnetic disk
Stable and fast
Found in wide variety of devices
Appliances
Automobiles
Bar-code scanners
Cell phones,
Medical equipment and
Personal Digital Assistants (PDAs
4
Embedded Operating
Systems
An embedded operating system resides on
a ROM chip on a mobile device or
consumer electronic device
Windows Windows
Palm OS iPhone OS
Embedded CE Mobile
Google Embedded
BlackBerry Symbian OS
Android Linux
5
Windows XP Embedded
Based on Windows XP
Professional
Not an off-the-shelf OS so
much as it is a do-it-
yourself kit for device
manufacturers
who wish to pick and choose
the parts of the Windows XP
Professional OS their
products need
Customized for each
device 6
Windows CE
Scaled-down Windows OS designed for use on
communications, entertainment, and computing devices with
limited functionality
Although a small OS, it supports wireless communications,
multimedia and Web browsing
Windows CE is a GUI that supports color, sound, multitasking,
multimedia, e-mail, Internet access, and Web browsing
A built-in file viewer allows users to view files created in
popular programs such as Word, Excel, and PowerPoint
Devices equipped with Windows CE can communicate
wirelessly with computers and other devices using Bluetooth
or other wireless technologies,
as long as the device is equipped with the necessary
communications hardware
7
Windows CE
Allows for the use of smaller versions of Microsoft
Word, Excel, Internet Explorer and Outlook.
Microsoft is positioning a version of Windows CE for the
automotive market, calling it Windows Automotive.
Examples of devices that use Windows CE include
VoIP telephones, industrial control devices
digital cameras, point-of-sale terminals
automated teller machines, digital photo frames
fuel pumps, security robots, handheld navigation devices
portable media players, ticket machines, and
computerized sewing machines.
8
Windows CE
Also provided as a kit to
manufacturers
Customized for each device
Not based on a desktop
OS This sewing machine uses
Windows Embedded CE to assist
Latest version is designed with stitching quilts, garments,
specially for embedded crafts, decorations, and embroidery
devices requiring a real-time
OS
9
Windows Mobile
based on Windows Embedded CE,
includes functionality, programs, and a
user interface designed for specific
types of smart phones and PDAs
Devices with a touch screen use
Windows Mobile Professional, and
Devices without touch screens use Smart phone
with Windows
Windows Mobile Standard Mobile OS
Allows for the use of smaller versions
of Microsoft Word, Excel, Internet
Explorer and Outlook
10
Windows Mobile
Users have access to all the basic PIM (personal
information manager) functions such as
contact lists, schedules, tasks, calendars, and notes
Information on the mobile device easily synchronizes with a
personal computer or prints on a printer using a cable or a
wireless technology.
Additional features that allow users to
check e-mail, browse the Web, listen to music,
take pictures or record video, watch a video,
send and receive text messages and instant messages
record a voice message, manage finances, view a map
read an e-book, or play a game.
Some devices also support handwriting and voice input.
11
Pocket PC
A custom version of Windows CE
developed by Microsoft
Developed to compete with Palm OS
Not customizable
Interacts securely with business networks
Run on ARM version 4 compatible CPUs
application components, such as
Microsoft® Pocket Internet Explorer
Microsoft® Pocket Word
Microsoft® Pocket Excel, and
Microsoft® Pocket Outlook.
12
Pocket PC
includes an optimized kernel, which allows the
OS to operate with great efficiency
These devices are targeted at the business
and corporate market rather than consumers.
The latest version gives users the ability to
securely access data from a business network
via a handheld device, and
It gives system administrators the ability to
manage and control a PC or server via a
wireless network connection.
13
Palm OS
Proprietary mobile OS
Standard OS on Palm PDA
First PDA OS for consumers
Can be found on smart phones
Designed for ease of use with a
touch screen-based GUI
provided with a suite of basic
applications for Personal
Information Management (PIM)
Run on ARM architecture-
based processors 14
Palm OS Features
Simple, single-tasking environment to allow launching of
full screen applications with a basic, common GUI set
Monochrome or color screens with resolutions up to
480x320 pixel
Handwriting recognition input system called Graffiti 2
HotSync technology for data synchronization with desktop
computers
Sound playback and record capabilities
Simple security model: Device can be locked by password,
arbitrary application records can be made private
TCP/IP network access
Serial port/USB, infrared, Bluetooth and Wi-Fi connections
Expansion memory card support
15
Palm OS
With Palm OS devices, users manage schedules
and contacts, phone messages, notes, task and
address lists, and appointments.
Information on the mobile device easily prints on a
printer using a cable or a wireless technology.
Many Palm OS devices allow users to connect
wirelessly to the Internet; browse the Web; send
and receive e-mail messages, text messages, and
instant messages; listen to music; record voice
messages; and view digital photos.
The latest version of Palm OS allows for biometric
identification and supports the use of smart cards
16
iPhone OS (iOS)
Developed by Apple, is an OS for the
iPhone, iPad, Apple TV and iPod Touch
These devices are multi-touch,
meaning they recognize multiple points
of contact
Interface control elements consist of
sliders, switches, and buttons.
provides Wi-Fi access to the iTunes
Music Store iPhone OS
runs on Apple
iOS is derived from OS X, with which it iPhone
28
Utility Software
As an OS is improved and updated, the
functionality of popular utilities is included with
subsequent releases of the OS
Most OS include several built-in utility software
Users often buy stand-alone utilities because
they offer improvements over those included
with the OS
Thousands of different utility software and many
of them are available on Internet
Some are free and some are priced from very
inexpensive to hundreds of dollars
29
Functions Provided by Utility
Software
Managing files Securing a computer from
30
File Manager
A utility that performs functions related to file
management
Displaying a list of files
Organizing files in folders
Copying, renaming, deleting, moving, and sorting
files and folders
folder is a specific named location on a storage medium
that contains related documents
Creating shortcuts
shortcut is an icon on the desktop or in a folder that
provides a user with immediate access to a program or file
OS typically include a file manager
31
Windows Explorer
displays links to files and folders, as well as
previews of folder contents and certain types of files
Long file names
Folders can be created and nested
All storage devices work consistently
thumbnail
32
Search Utility
a program that attempts to locate a file on your computer
based on criteria you specifies
can look through documents, photos, music, and other files on
your computer and/or on the Internet, combining search
results in a single location
criteria could be a word or words contained in a file, date the
file was created or modified, size of the file, location of the file,
file name, author/ artist, and other similar properties
33
Search Utility - Index
typically use an index to assist with locating files quickly.
An index stores a variety of information about a file,
including its name, date created, date modified, author
name, and so on.
When you enter search criteria, instead of looking
through every file and folder on the storage medium, the
search utility looks through the index first to find a match.
Each entry in the index contains a link to the actual file
on the disk for easy retrieval
OS typically include a built-in search utility.
In Windows, all the Explorer windows, as well as the
Start menu, contain a Search box where you enter the
search criteria.
34
Image Viewer / Image
Browser
a utility that allows users to
display, copy, and print the
contents of a graphics file,
such as a photo
users can see images without
having to open them in a paint
or image editing program
Most OS has an image viewer Windows Photo Viewer
allows user to see the
Windows Photo Viewer, which contents of a photo file
also allows you to print and e-
mail photos
35
Image Viewer
it can often handle various graphics file formats.
Such software usually renders the image
according to properties of the display such as
color depth, display resolution, and color profile
Typical features of image viewers are:
basic viewing operations such as zooming and
rotation
fullscreen display, Slideshow, thumbnail display
Printing, screen capture
Common Image viewer include
Windows Picture Viewer, ACDSee, IrfanView, XnView,
MediaPro1, Eye of GNOME, Gwenview 36
Uninstaller
A utility that removes a program, as well as any
associated entries in the system files
When a program is installed, OS records the information
it uses to run the software in the system files
Uninstaller deletes files and folders from the hard disk, as
well as removes program entries from the system files
OS usually provide an uninstaller
41
Disk Defragmentation
Which combines all files so that no files are stored in a
noncontiguous manner
The defragmentation process can consume more than
one hour in some cases.
You can cancel the operation at any time by clicking the
Stop operation button in the Disk Defragmenter window
42
Disk Defragmenter
43
File Compression
Shrinks the size of a file
Takes up less space on disk
Will increase disk capacity
Compressing files frees up space on the storage
media and improves system performance
Uploading and downloading compressed files to and
from the Internet reduces the file transmission time
Compressed files, sometimes called zipped files,
usually have a .zip extension
Lossy and Lossless compression
PKZip, WinZip and WinRAR
44
File Compression
763 KB
on disk
Compressed
157 KB
45
Backup and Restore Utility
A backup utility allows users to copy files to another storage medium
such as another hard disk, optical disc, USB flash drive, or tape
During the back up process, the utility monitors progress and alerts
you if it needs additional media, such as another disc
Most compress files during backup to require less storage space
By compressing the files, the
backup program requires less
storage space for the backup
files than for the original files.
Because they are
compressed, you usually
cannot use backup files in
their backed up form
46
Backup and Restore Utility
A restore utility reverses the process and returns
backed up files to their original form
Backup utilities work with a restore utility
Most backup and restore utilities include a scheduler,
which instructs the computer to perform a backup
automatically on a regularly scheduled basis.
OS, such as Windows, include
a backup and restore utility
When you purchase an
external hard disk, it also
usually includes a backup and
restore utility
47
Diagnostic Utility
Compiles technical
information about
hardware and
some software
Prepares report
outlining problems
48
Screen Saver
A screen saver causes a
display device’s screen to
show a moving image or
blank screen if no activity
occurs for a specified
time
To secure computer, user
configures screen saver
to require password to
deactivate
49
Firewall
Crucial utility
Detects and protects your
computer from unauthorized
intruders
Makes computer invisible to
hackers
Zone Alarm is a home firewall
Cisco sells hardware firewalls
Windows XP automatically
enables the built-in personal
firewall upon installation
50
Intrusion Detection
monitors network or system activities for malicious
activities or policy violations and produces reports to a
Management Station
primarily focused on identifying possible incidents,
logging information about them, and reporting attempts
differs from a firewall in that a firewall looks outwardly
for intrusions in order to stop them from happening.
Firewalls limit access between networks to prevent
intrusion and do not signal an attack from inside the
network
Often part of a firewall package
Announces attempts to breach security
Snort is a Linux based package 51
Virus, Worm and Trojans
A virus describes a potentially damaging computer
program that affects a computer negatively
52
Signs of Virus Infection
Effective antivirus
products not only detect
and remove viruses; they
also help you recover
data that has been lost
because of a virus
53
Anti-Virus Software
Crucial utility
Identifies and removes viruses in memory,
storage media and incoming files
Most antivirus programs also protect against
worms and Trojan horses
Must be updated regularly
Popular Antivirus Programs
McAfee, Norton Anti-Virus, Microsoft Security
Essential, Kaspersky
McAfee and Norton offer Web-based antivirus
programs
54
Spyware and Adware
Spyware is a program placed on
Adware displays an online
a computer without the user’s
advertisement in a banner or
knowledge that secretly collects
pop-up window
information about the user
• A spyware remover detects • An adware remover is a
and deletes spyware and other program that detects and
similar programs deletes adware
57
Disk Burning Software
Disc burning software writes text, graphics,
audio, and video files on a recordable or
rewritable optical disc, CD, DVD, Blu-Ray
58
PC Maintenance Utility
A personal computer
maintenance utility identifies and
fixes operating system problems,
detects and repairs disk
problems, and includes the
capability of improving a
computer’s performance
some utilities continuously
monitor a computer while you
use it to identify and repair
problems before they occur.
59
Summary
Embedded Operating Systems
Windows XP Embedded, Windows CE Embedded
CE, Windows Mobile
Pocket PC
Palm OS
iPhone OS / iOS
BlackBerry OS
Google Andriod
Embedded Linux
Symbian OS
60
Summary
Managing files Intrusion detection
Searching for files Screen savers
Viewing images Antivirus
Uninstalling Removing spyware
programs and adware
Cleaning up Disks Filtering Internet
Defragmenting content
Disks Playing media files
Backing up files and Burning optical discs
disks and
Disk Compression Maintaining a PC 61
Recommended Websites
https://en.wikipedia.org/wiki/Mobile_operating_system
https://en.wikipedia.org/wiki/Palm_OS
https://en.wikipedia.org/wiki/BlackBerry_OS
https://en.wikipedia.org/wiki/IOS_(Apple)
https://en.wikipedia.org/wiki/Symbian_OS
https://en.wikipedia.org/wiki/Pocket_PC
https://en.wikipedia.org/wiki/Utility_software
62