Lesson 3-Os
Lesson 3-Os
• Inventory tracking
• Managing budgets
• Representing company in
communication
• Searching Internet
• Organizing and accessing databases
• Designing presentations
• More efficient tasks
Hardware
Mainboard
• CPU
• RAM / ROM
• BIOS
• Buses
• CMOS Battery
Storage
• Fixed - SSD & HDD
• Removable
Input and Output
Software – Operating System
Additional Software
• Users create, play, listen, surf, etc.
• Install and uninstall without affecting OS
Examples:
• Microsoft Office
Memory Management
Process Management
Device Management
Security
Control over System Performance
Job Accounting
Error Detecting Aids
Coordination between Users and Other Software
Functions of Operating Systems
Memory Management
• For memory management, the OS performs the following tasks:
• The OS keeps track of primary memory – meaning, which user program
can use which bytes of memory, memory addresses that have already
been assigned, as well as memory addresses yet to be used.
• The OS determines the order in which processes would be permitted
memory access and for how long in multiprogramming.
• It allocates memory to the process when the process asks for it and
deallocates memory when the process exits or performs an I/O activity.
processor management
Security
To safeguard user data, the operating system employs
password protection and other related measures. It also
protects programs and user data from illegal access.
Control over System Performance
The operating system monitors the overall health of the system in
order to optimise performance. To get a thorough picture of the
system’s health, keep track of the time between system responses
and service requests. This can aid performance by providing
critical information for troubleshooting issues.
Job Accounting
The operating system maintains track of how much time and
resources are consumed by different tasks and users, and this
data can be used to measure resource utilisation for a specific
user or group of users.
Error Detecting Aids
The OS constantly monitors the system in order
to discover faults and prevent a computer system
from failing.
• Window: adjustable
• Toolbar/taskbar
Shortcuts
A. Microsoft Windows
B. Linux
C. Unix
D. MacOS
Class Discussion: Keyboard Shortcuts
You have learned a variety of keyboard shortcuts and experienced using
shortcuts keys and right-click mouse methods on computers. With your
classmates, discuss the following:
• Do you think you will use shortcuts or the right-click method more frequently?
• Which of the shortcuts will you use the most and why?
• Which shortcut key was new or the most helpful to learn about?
• Are there other shortcut keys you use that were not mentioned in this module
that you use frequently?
Finding Programs and Files
• Folder naming
• Simple but meaningful
• Capital letters to delimit words
• Avoid repetition and redundancy
• Numbers include at least two digits
Network Files
• Backups
• Any backup better than none
• Work only as safe as backup plan
• Check backups periodically
Online Files
Cloud storage
• Remote encrypted servers
• Permission or date-based
restrictions
• Multiple service providers
Understanding Snips and Screenshots
More and more business are moving their files and data storage to secure
cloud platforms. Find at least two classmates to share an image of a
computer with from cloud-based storage.
• Find an image of a computer from the internet, a local file or create something.
• If you don’t have a cloud account (e.g. Google Drive, iCloud, Dropbox, OneDrive,
etc.) talk with a classmate about setting up one or using theirs.