4.3 SOFTWARE NOTES
- System software
- Application software
1. COMPUTER SOFTWARE
1.3. FUNCTIONS OF AN OPERATING SYSTEM
FUNCTIONS OF AN OPERATING SYSTEM
Most operating systems provide similar functions that are outlined as follows :
- Starting a computer, (Booting the computer)
- Providing a user interface,
- Managing programs,
- Configuring devices, (Device drivers are often needed). Plug and Play devices are recognized automatically.
- Monitoring performance
- Providing file management.
- Administering security.
- Managing resources.
- Coordinating tasks, and Spooling.
- Managing memory,
- Establishing an Internet connection
A) STARTING THE COMPUTER, (BOOTING) AND TURNING IT OFF
The process of starting or restarting a computer is called booting. The process of turning on a computer after it had been powered off completely is known as cold booting. Warm booting is the process of restarting a computer that already is powered on. When you install new software, often an on-screen prompt instructs you to restart the computer. In this case, a warm boot is appropriate. On startup, the OS may verify that the person attempting to use the computer is a legitimate user through use of a password. After the user logs on, the desktop and icons are displayed on the screen. Finally, the operating system also executes programs in the Startup folder, which contains a list of programs that open automatically when you boot the computer. TURNING OFF When you instruct the computer to Turn Off, (See figure), the operating system properly closes any open processes and programs, saves your settings, and shuts down the computer.
B) PROVIDING A USER INTERFACE
Computer users interact with software through its user interface. A user interface is the part of the software with which you interact; it controls how data and instructions are entered and information is presented on the screen.
It is through the user interface of an operating system that you communicate with the computer.
TYPES OF USER INTERFACES
Three types of user interfaces are
- Command-Line Interface (CLI),
- Menu-Driven Interface (MDI), and
- Graphical User Interface (GUI).
Most operating systems use a combination of these types of user interfaces to define how you interact with your computer.
1. Command-Line Interface
With a command-line interface, you type keywords such as COPY, RENAME or DEL, using the keyboard to enter instructions. A keyword is a special word, phrase, or code that a program understands as an instruction.
2. Menu-Driven Interface
A menu-driven interface provides menus as a means of entering commands. Menu-driven interfaces are easier to learn than CLI because users do not have to cram keywords for commands. The characteristic of being easy to learn and use is described as being User
3. Graphical User Interface (GUI)
Most of today's software programs have a graphical user interface (GUI). A GUI is a user Interface in which visual images such as icons and buttons are used to issue commands.
Of all the interfaces a GUI typically is the most User friendly, because it does not require you to know any command language.
DISADVANTAGES OF A GUI AS COMPARED TO CLI
- GUI requires the computer to have more RAM as compared to Command-Line.
- Command line instructions execute faster than GUI instructions
- Processing GUI images ‘wastes’ CPU cycles
EXAMPLES OF ELEMENTS/ OBJECTS OF A GUI
A GUI has very many features/elements in form of graphics that a user interacts with while using a computer. Some of these include:
|
|
A GUI menu displays a set of available commands or options from which you choose
one or more.
An icon is a small graphic that represents an item such as a program, an Instruction,
or a file on a computer’s hard disk
C) FILE MANAGEMENT
The operating systems help to organize files and folders on a computer’s hard disk drive.
WHAT IS THE DIFFERENCE BETWEEN A FILE AND A FOLDER?
A file is a collection of bits that have been processed and stored in secondary memory.
A file may be a document that may contain
characters such as a letter, a database, a
computer program, a song, a picture, etc.
A folder is a directory that usually contains
related information. A folder can contain
both files and other subfolders. Folders are represented by a folder icon.
D. MANAGING PROGRAM
Operating systems can support just one user running one program or many of users running multiple programs.
These various capabilities of operating systems are described as
i. Single-tasking,
ii. Single-user and multi-user,
iii. Multitasking, and
iv. Multiprocessing,
- A single user-single tasking operating system allows only one user to run one program at a time, while a single user-multitasking operating system allows one user to work on two or more programs that reside in memory at the same time.
- A multi-user operating system enables two or more users to run programs simultaneously. For example, mainframes, allow hundreds of users to connect at the same time.
- A multiprocessing OS manages the coordinated processing of data by more than one processor. Multiprocessing increases a computer's speed and helps in fault-tolerant systems. Common File Extensions
- When a computer is running multiple programs concurrently, one program is in the foreground and the others are in the background.
- To make a program active, click on its tab on the taskbar or its window.
- This causes the operating system to place it in the foreground. In addition to application programs, an operating system manages other processes.
- Some of these processes are memory residents.
- They include utilities and routines that provide support to other programs or hardware.
D) MANAGING MEMORY
The purpose of memory management is to optimize the use of RAM. RAM holds data and instructions while the
processor is using them.
- The operating system allocates data and instructions to an area of memory while they are being processed, and carefully monitors the contents of RAM.
- Finally, the operating system releases these items from RAM when the processor no longer requires them.
- If you have many programs running at a go, it is possible to run out of RAM. So, the OS may have to use virtual memory.
- With virtual memory, the operating system allocates a portion of a storage medium, usually the hard disk, to function as additional RAM.
- As you interact with a program, part of it may be in physical RAM, while the rest of the program is on the hard disk as virtual memory.
- Users may notice the computer slowing down while it uses virtual memory because virtual memory is slower than RAM. The area of the hard disk used for virtual memory is called a swap file.
E) COORDINATING TASKS
The operating system determines the order in which tasks are processed.
- A task, or job, is a piece of work or operation that the processor manages.
- Tasks include receiving data from an input device, processing instructions, sending information to an output device, and transferring items from storage to memory and from memory to storage. Thousands of tasks can be going on in a computer simultaneously.
- Sometimes, a device may be busy processing one job when it receives a second job. This occurs because the processor operates at a much faster rate of speed than peripheral devices.
- For example, if the processor sends five print jobs to a printer, the printer can print only one document at a time.
- When this happens, the OS allocates/assigns memory to the jobs in the execution queue in an area called the buffer.
- A BUFFER is an area of memory or storage in which data and information is placed while waiting to be transferred to or from an input or output device.
- Operating systems typically use a technique called spooling to increase computer system efficiency.
- SPOOLING refers to the process of putting tasks that need to be done into a buffer until they can be executed.
- The operating system commonly uses a print spooler with print jobs. A print spooler intercepts documents to be printed from the operating system and places them in the queue in the buffer. As soon as the print job is placed in the buffer, the CPU is available to process the next instruction.
- Spooling increases both processor and printer efficiency by placing print jobs in a buffer on disk before they are printed
F) CONFIGURING DEVICES
- If you add a new device to your computer, such as a printer, its driver must be installed before the device will be operational.
- For devices with Plug and Play support, the OS recognizes the new device and loads the necessary drivers automatically. It also checks for conflicts with other devices.
- For devices that are not Plug and Play, Windows operating system provides a wizard to guide users through the installation steps.
- If you have an Internet connection, the Wizard will search an online repository of device drivers.
- If Windows still is unable to find a driver, you can download one from the manufacturer's Web site manually.
- Alternatively, you can install the drivers from a CD-ROM provided with the purchased device.
G) ESTABLISHING AN INTERNET CONNECTION
Operating systems typically provide a means to establish Internet connections. This is through a "Connect to a network" Wizard that guides users through the process of setting up a connection between a computer and an Internet service provider.
Some operating systems also include a Web browser and an e-mail program, enabling you to begin using the Web and communicate with others as soon as you set up the Internet connection.
H) MONITORING PERFORMANCE
The OS monitors the performance of the computer system. It keeps track of each computer job, the various system resources and devices, the processor usage, the amount of unused physical RAM, and network usage.
Operating systems typically contain a performance monitor. A performance monitor is a program that assesses and reports information about various computer resources and devices.
The information in performance reports helps users and administrators to identify a problem with the resources so they can try to resolve any problems
I) ADMINISTERING SECURITY
- The OS helps users to administer computer access security by use of a user name or user ID and a password before a user logs on to, a computer.
- After entering a user ID and password, the operating system compares the user's entry with a list of authorized user names and passwords.
- If the entry matches the user name and password kept on file, the operating system grants the user access.
- To protect sensitive data and information as it travels over the network, a network operating system may encrypt it to prevent unauthorized users from reading the data.
- Encryption is the process of encoding data and information into an unreadable form.
- When an authorized user attempts to read the data, it is decrypted or converted back into a readable form.