0% found this document useful (0 votes)
14 views

GUI (Graphical User Interface)

The document provides an overview of Graphical User Interfaces (GUIs), detailing their components and characteristics, as well as the differences between dumb and intelligent terminals. It also discusses computer worms and viruses, their types, infection methods, and prevention strategies. Additionally, it covers operating systems like MS-Windows, Windows NT, and Linux, along with memory management concepts and process scheduling in multiprogramming environments.
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

GUI (Graphical User Interface)

The document provides an overview of Graphical User Interfaces (GUIs), detailing their components and characteristics, as well as the differences between dumb and intelligent terminals. It also discusses computer worms and viruses, their types, infection methods, and prevention strategies. Additionally, it covers operating systems like MS-Windows, Windows NT, and Linux, along with memory management concepts and process scheduling in multiprogramming environments.
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 24

GUI (Graphical User

Interface)
 The pictorial representation are called pictures rather than representations.
 The OS interacts with the help of pictures rather than commands.
 GUI environment gives a flexible working environment to the user for interacting with
the hardware.
 Fast and easy.
 Interaction through icons. (Icons are pictorial representation of a program)
Four characteristics of icon.
1. Visual 2.Textual 3. Operational 4. Positional
Basic Components of GUI

 Desktop
 Windows
 Menu Bar
 Menu
 Scroll Bar
 Menu Options
 Dialog Box
 Listbox
 Text Box
 Radio Button
 Control Menu
Terminal I/O

 A terminal or VDU (Visual Display Unit) is a common I/O medium.


 Terminal Hardware: Divided into 2 parts.
Input medium – keyboard
Output medium – Video screen
 Terminal can be: Dumb Terminal or Intelligent Terminal
Dumb Intelligent
Terminal Terminal
• Very limited memory • Can carry some processing
• Responsible for basic input • Eg – validation
and output of characters. • Requires more powerful
• No processing on the input hardware and software
characters. • Eg- ATM machine.
• Eg – normal monitor
Computer Worms

 Full program by itself.


 Spreads through network.
 Consumes the hardware resources.
 Can bring entire network to halt.
 Contains a mailing list which contains the name & address
of the reachable machines.
 Intelligent Worm and Dumb Worm.
 Prevention:
1. Strong & Protection polices.
2. Includes various checkpoints in the communication.
Computer Virus

 Clear intention of infecting other programs.


 Does not operate independently.
 Corrupts the code as well as data.
Types of Virus:
1. Boot Sector Infectors
2. Memory Resident Infectors
3. File Specific Infectors
4. Command Processor Infectors
5. General Purpose Infectors
Boot Sector Infector
Memory Resident Infector

Command Processor
File Specific Infector Infector
Infection Methods:

1. Append
2. Replace
3. Insert
4. Delete
5. Redirect

Virus Removal:
The virus removal program scans the disk files from the patterns of the known disk. On
detection, it removes them. However, if that virus has already damaged some other data,
it would be impossible to recover the old data.

Virus Prevention:
• Buy official legal copies of software from reliable stores or sources.
• Be careful when picking up free, unreliable or illegal software.
• Frequent backups and running of monitoring programs.
MS-Windows & Windows NT

MS Windows Windows NT
 Supports all GUI features but works  It is a full-fledged operating system.
slow due to MS-DOS  Does not require MS-DOS
 Only one application at a time can underneath.
be executed on the processor.  Supports portable OS like UNIX.
 Allows to start many application but  It is multi-user, multitasking,
can execute only one. All others are
multithreading
idle.
 Needs a lot of memory.
Multi- user

Multi- threading

Multi-
tasking
Features of Windows NT

1. Virtual Memory Management

2. Symmetric Processing

3. Threads

4. Multi tasking

5. Built – in Networking
Linux
 Looks and feels like any other UNIX system
 It is open-source (free) OS.
 Its development began in 1991.
 True 32-bit processor in Intel’s range of PC compatible CPU’s.
 Revolves around the central operating system kernel- the core.
 It is a standard environment for applications and for user programming.
Features of LINUX

 It is multi-user operating system with a full set of


unix compatible tools.
 It runs on a wide variety of platforms. It was
developed exclusively on PC architecture.
 It provides as much as functionality from limited
resources. It can run on machine having 4MB of
RAM.
 It presents standard interfaces to both the
programmer and user.
 It supports a wide base of applications.
 It is free software. Free in the sense that people can
copy it, modify it , use it in any manner they want.
 The file system in LINUX obeys UNIX semantics.
Components of LINUX

 Kernel : Maintains all important abstractions of the OS such as


processes and virtual memory..

 System Libraries : defines a standard set of functions through


which applications can interact with the kernel.

 System Utilities : These are programs that perform individual,


specialized management task. Some system utilities may be involved
just once to initialize and configure some aspects of system.
Video RAM??? Data Bytes and Attribute
Bytes
 It is basically the memory that the terminal hardware itself has.
 All characters stores in the Video RAM are displayed on the screen by the video
controller using display electronics.
 All information is stored in Video RAM.
 It consists of 2000 data bytes (0 to 1999) preceded by 2000 corresponding
attribute bytes.
 A typical alphanumeric screen can display 25 lines each consisting of 80
characters
 25*80= 2000 characters.
Attribute Data byte Attribute Data byte
byte 0 0 byte 1 1

Attribute Data byte


byte 1999 1999
Data Byte Attribute Byte
 All 2000 characters are stored in  There is one attribute byte for each
Video RAM to display any specific data byte.
character on the screen at a  This byte tells the video
specific position all ASCII code for
controller how the character is
that character is to move in video
to be displayed.
RAM.
 It specifies whether the
corresponding data character which
is stored next to it in video RAM is to
be displayed bold, underlined etc
etc.
Context Switching

 In Multiprogramming, CPU can execute 2 or more processes


simultaneously. When process1 waits for an external event such as I/O
operation, CPU executes process2 and vice versa.
 When CPU switches from one process to another the time requires for
switching is called as context switching.
Terms of Process Scheduling:

Turnaround Terminal Event


Waiting Time
Time Response Time Response Time
Time a job spends
The time to
waiting in the
Elapsed time respond with an
queue of the
between the answer or result to
newly admitted
program or a job is a question and Time to respond
process for the OS
submitted and the depends on with an event
to allocate
time when it is degree of
resources to it
completed multiprogramming
before the
.
execution
Terms with reference to Process Management:

External Purchased Internal


Time Slice
Priority Priority Priority

Used by
scheduling Each process
Used in some
Specified by the algorithm. is normally
data centre
user externally They base given certain
situations
generally at the their time to run
where each
time of initiating calculations irrespective of
the process. user pays for
on the current its
the time used.
state of the importance.
process.
Running, Ready and Blocked Process in Process
Management
Running State
• There is only one process, which is executed b CPU at any given
moment is called as running state.

Ready State
• The process which is not waiting for an external event such as I/O
operation but which is not running is said to be in ready state.
• There is only one CPU, which is executing some process while the
process in the ready state is waiting for CPU’s attention.
Blocked
State
• When the process is waiting for an external event such as an I/O
operation, the process is said to be in blocked state.
Terms in case of Magnetic Disk:
Latency Time/
Tracks and Transmission
Seek Time Rotational
Sectors Time
delay
Magnetic disk
surface is made The time The time
up of concentric The time required for required for
circles called required for activate requested
tracks. read/write read/write sector on
A track is heads to move head for track to rotate
further divided to the correct appropriate below the
into smaller track surface and
areas called head
read data
sectors.
Memory Map of Single User Operating System

 The Operating System like MS-DOS is a single user OS.


 The memory map consist of program to be executed i.e. process, free
memory available, command interpreter and kernel.
 Command interpreter of the single user OS is invoked when the
computer is started.
 The OS loads the program to be executed in main memory as assigns
memory. Then sets instruction pointer and executes the program. Free Memory
 If the program is terminated, then it is removed from the memory.
Process
 The kernel of such OS provides basic operating system services.
Command Interpreter

Kernel
Terms related to Memory Management :

Locality of Reference Page Fault Working Set

• The basic principle behind • In many systems, when a • At any time, a process has a
virtual memory is called process is executing with only number of pages in the physical
locality of reference. a few pages in memory and memory. Not all the pages are
when an instruction is actively referred.
• This gives some basis to encountered which refers to • The set of pages in the physical
forecast whether a page is any instruction or data in some memory actively referred to at
likely to be referenced in other page which is outside the any moment is called working
the near future or not. main memory i.e on the disk , set.
• Thus, it helps to decide page fault occurs.
• At this stage, the OS must bring
whether the page should the required page into the
be thrown out from Main memory before the execution of
memory to make space for that instruction can restart.
new page or not.
Terms related to Memory Management :

Page
Dirty Page/ Dirty
Replacement Demand Paging
Bit
Policy
• As the no. of processes and the • In this, a page is brought in only
no. of pages in main memory when demanded.
increases all the page frames • Consider a process is created
become occupied. • The page which is modified with no pages in main memory.
• At this time, if a new page is to after it is loaded in main When the process is dispatched
be brought in, the operating memory from disk is called initially, the program counter
system has to overwrite some dirty page. will have been loaded with the
existing page in the memory. • The operating system address of first instruction. This
• The page to be overwritten is address is obviously belongs to
maintains one bit for each a page outside the main
selected by page replacement physical page frame to denote memory.
policy. whether a page has become • So a page fault will occur and
dirty or not.
• this is called dirty bit. the OS will now bring that page
in memory.

You might also like