SlideShare a Scribd company logo
Unit of competence:- install and optimizing
operating system software
Pre. By IT department
 This unit defines the performance outcomes, skills
and knowledge required to install operating system
(OS) software and to make adjustments as a means of
optimizing the system to accommodate business and
client needs
LO1:- Determine function of operating system
 Identify and demonstrate understanding of the purposes
of operating system
 Compare and contrast different operating systems and
their features
 Identify and demonstrate knowledge of the basic
functions of operating system, including file system,
memory management, process scheduling
 Identify and demonstrate management of virtual memory
 Introduction to windows
 Install operating system
 File system system
 What is system software? The system software is a
computer program, which is designed to run computer
hardware and applications. The system software makes
your system faster, effective, and safe. When installing
the operating system, the system software is already
installed on the computer.
 System files include function libraries, system services,
printer, and other hardware drivers, system preferences,
and other configuration files.
 Here are the features of system software.
 Usually written in a low-level language.
 It has a high speed.
 Less interactive.
 The system software is closer to the system.
 There is another software on your computer- application software.
Application software is a program that does actual work for users. It is
mainly created to perform user-specific tasks. Now, let’s see the
differences between system software and application software.
 System software is the general software, while application software is
special software.
 System software can run independently, but application software
cannot run independently.
 System software is designed to manage system resources, such as
memory and process management, security, etc., while application
software is designed to meet the needs of users to perform specific
tasks.
 System software is written in low-level languages ​​such as machine
or assembly language, while application software is a high-level
language used to write application software.
1. Windows
2. MAC OS
3. Ios
4. Chrome OS
5. Ubuntu
6. Android
7. Blackberry
 What is OS
 An Operating System (OS) is an interface between a computer
user and computer hardware. An operating system is a software
which performs all the basic tasks like file management, memory
management, process management, handling input and output,
and controlling peripheral devices such as disk drives and
printers.
 An operating system is software that enables applications to
interact with a computer's hardware. The software that contains
the core components of the operating system is called the kernel.
 The primary purposes of an Operating System are to enable
applications (spftwares) to interact with a computer's hardware
and to manage a system's hardware and software resources.
 Some popular Operating Systems include Linux
Operating System, Windows Operating System, VMS,
OS/400, AIX, z/OS, etc. Today, Operating systems is
found almost in every device like mobile phones,
personal computers, mainframe computers,
automobiles, TV, Toys etc.
Security is provided by OS to the user data and prevents
unauthorized access.
1. System performance is boosted with the help of the OS
2. Various applications or tasks and the number of users doing
the tasks are accounted for by OS
3. The computing system shows some errors
4. Many users use the computing system the hardware and
these errors are logged in the OS
5. The main memory is managed by OS
6. OS organizes the file system
 here are following 8-components of an Operating
System:
 Process Management
 I/O Device Management
 File Management
 Network Management
 Main Memory Management
 Secondary Storage Management
 Security Management
 Command Interpreter System
 A process is program or a fraction of a program that is
loaded in main memory. A process needs certain
resources including CPU time, Memory, Files, and I/O
devices to accomplish its task. The process
management component manages the multiple
processes running simultaneously on the Operating
System.
 A program in running state is called a process
 One of the purposes of an operating system is to hide the
peculiarities of specific hardware devices from the user. I/O
Device Management provides an abstract level of H/W devices
and keep the details from applications to ensure proper use of
devices, to prevent errors, and to provide users with convenient
and efficient programming environment.
 Following are the tasks of I/O Device Management component:
 Hide the details of H/W devices
 Manage main memory for the devices using cache, buffer, and
spooling
 Maintain and provide custom drivers for each device.
 File Management
 A files is a sequence of bits, bytes, lines or records whose
meaning is defined by its creator and user.
 The definition of network management is often broad,
as network management involves several different
components. Network management is the process of
managing and administering a computer network. A
computer network is a collection of various types of
computers connected with each other.
 Network management comprises fault analysis,
maintaining the quality of service, provisioning of
networks, and performance management.
 Network management is the process of keeping your
network healthy for an efficient communication
between different computers.
 Following are the features of network management:
 Network administration
 Network maintenance
 Network operation
 Network security
 Memory is a large array of words or bytes, each with its own address. It
is a repository of quickly accessible data shared by the CPU and I/O
devices.
 Main memory is a volatile storage device which means it loses its
contents in the case of system failure or as soon as system power goes
down.
 The main motivation behind Memory Management is to maximize
memory utilization on the computer system.The operating system is
responsible for the following activities in connections with memory
management:
 Keep track of which parts of memory are currently being used and by
whom.
 Decide which processes to load when memory space becomes
available.
 Allocate and deallocate memory space as needed.
 The main purpose of a computer system is to execute programs. These
programs, together with the data they access, must be in main memory
during execution. Since the main memory is too small to permanently
accommodate all data and program, the computer system must provide
secondary storage to backup main memory.
 Most modern computer systems use disks as the principle on-line
storage medium, for both programs and data. Most programs, like
compilers, assemblers, sort routines, editors, formatters, and so on, are
stored on the disk until loaded into memory, and then use the disk as
both the source and destination of their processing.
 The operating system is responsible for the following activities in
connection with disk management:
 Free space management
 Storage allocation
 Disk scheduling
 The operating system is primarily responsible for all task and activities
happen in the computer system. The various processes in an operating
system must be protected from each other’s activities. For that purpose,
various mechanisms which can be used to ensure that the files, memory
segment, cpu and other resources can be operated on only by those
processes that have gained proper authorization from the operating
system.
 Security Management refers to a mechanism for controlling the access
of programs, processes, or users to the resources defined by a computer
controls to be imposed, together with some means of enforcement.For
example, memory addressing hardware ensure that a process can only
execute within its own address space. The timer ensure that no process
can gain control of the CPU without relinquishing it. Finally, no
process is allowed to do it’s own I/O, to protect the integrity of the
various peripheral devices.
 One of the most important component of an operating system is
its command interpreter. The command interpreter is the primary
interface between the user and the rest of the system.
 Command Interpreter System executes a user command by
calling one or more number of underlying system programs or
system calls.
 Command Interpreter System allows human users to interact with
the Operating System and provides convenient programming
environment to the users.Many commands are given to the
operating system by control statements. A program which reads
and interprets control statements is automatically executed. This
program is called the shell and few examples are Windows DOS
command window, Bash of Unix/Linux or C-Shell of
Unix/Linux.
 An Operating System provides services to both the users and to
the programs.
 It provides programs an environment to execute.
 It provides users the services to execute the programs in a
convenient manner.
 Following are a few common services provided by an operating
system
 Program execution
 I/O operations
 File System manipulation
 Communication
 Error Detection
 Resource Allocation
 Protection
 Security refers to providing a protection system to
computer system resources such as CPU, memory, disk,
software programs and most importantly
data/information stored in the computer system.
 If a computer program is run by an unauthorized user,
then he/she may cause severe damage to computer or
data stored in it. So a computer system must be
protected against unauthorized access, malicious access
to system memory, viruses, worms etc
 We're going to discuss following topics
Authentication
One Time passwords
Program Threats
System Threats
Computer Security Classifications
 Introduction to windows
 Install operating system
 configure operating system
 Windows is a collection of programs known as
an operating system (OS) that controls a PC (personal
computer). First produced by Microsoft in November
1985, it has been frequently updated since, as computer
memory has got bigger, as processing chips have got
faster and, of course, when the internet was invented.
Prior to Windows, PCs were operated by a series of text
commands.
 Windows' key benefits and features
 Allows the user to interact with the computer (through
the keyboard, mouse, microphone, etc.).
 Controls the storage of data (images, files, music).
 Controls hardware attached to the computer such as
webcams, scanners and printers.
 Helps to open and close programs (word processors, games,
photo editors, etc.), and gives them part of the computer’s
memory to allow them to work.
 Controls what access to a computer different users have and
the computer's security.
 Deals with errors and user instructions, and issues simple
error messages.
 Promotes multitasking by allowing the user to do several
things on the computer at once – for example, watch a
video while writing a letter.
installing and optimizing operating system software
installing and optimizing operating system software
installing and optimizing operating system software
installing and optimizing operating system software
installing and optimizing operating system software
installing and optimizing operating system software
installing and optimizing operating system software
Ad

More Related Content

What's hot (20)

Administrate network and hardware peripherals Lecture #1
Administrate network and hardware peripherals Lecture #1Administrate network and hardware peripherals Lecture #1
Administrate network and hardware peripherals Lecture #1
Gera Paulos
 
Provide first level remote help desk support
Provide first level remote help desk supportProvide first level remote help desk support
Provide first level remote help desk support
Gera Paulos
 
Configuring and administrate server
Configuring and administrate serverConfiguring and administrate server
Configuring and administrate server
Gera Paulos
 
Operating Database Application ODA
Operating Database Application ODAOperating Database Application ODA
Operating Database Application ODA
Gera Paulos
 
511718784-maintain-inventory-of-equipment-software-and-documentation.pptx
511718784-maintain-inventory-of-equipment-software-and-documentation.pptx511718784-maintain-inventory-of-equipment-software-and-documentation.pptx
511718784-maintain-inventory-of-equipment-software-and-documentation.pptx
teferiGetachew1
 
Maintain equipment and consumables
Maintain equipment and consumablesMaintain equipment and consumables
Maintain equipment and consumables
Gera Paulos
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
Duressa Teshome
 
Computer repair and maintenance
Computer repair and maintenanceComputer repair and maintenance
Computer repair and maintenance
Cornelius Micah
 
Software and Networking tools
Software and Networking toolsSoftware and Networking tools
Software and Networking tools
Engineer Safaetul Ahasan
 
System and Network Administration/ SNA
System and Network Administration/ SNASystem and Network Administration/ SNA
System and Network Administration/ SNA
FaisalMashood
 
Creating technical documents
Creating technical documentsCreating technical documents
Creating technical documents
Gera Paulos
 
Computer Troubleshooting
Computer TroubleshootingComputer Troubleshooting
Computer Troubleshooting
Lisa Hartman
 
Chapter 1 Introduction To Computers
Chapter 1 Introduction To ComputersChapter 1 Introduction To Computers
Chapter 1 Introduction To Computers
norzaini
 
User account (Windows)
User account (Windows)User account (Windows)
User account (Windows)
Dev Dorse
 
Implement maintenance procedures
Implement maintenance proceduresImplement maintenance procedures
Implement maintenance procedures
Gera Paulos
 
Operating systems system structures
Operating systems   system structuresOperating systems   system structures
Operating systems system structures
Mukesh Chinta
 
Apply Problem Solving Techniques to Routine Malfunctions.pptx
Apply Problem Solving Techniques to Routine Malfunctions.pptxApply Problem Solving Techniques to Routine Malfunctions.pptx
Apply Problem Solving Techniques to Routine Malfunctions.pptx
wesendesta2
 
Infrastructure Planning and Design
Infrastructure Planning and DesignInfrastructure Planning and Design
Infrastructure Planning and Design
Sergi Duró
 
Care for Network and Computer Hardware L-2 (3).pptx
Care for Network and Computer Hardware     L-2 (3).pptxCare for Network and Computer Hardware     L-2 (3).pptx
Care for Network and Computer Hardware L-2 (3).pptx
aytenewbelay1
 
update and document.pptx
update and document.pptxupdate and document.pptx
update and document.pptx
ziway
 
Administrate network and hardware peripherals Lecture #1
Administrate network and hardware peripherals Lecture #1Administrate network and hardware peripherals Lecture #1
Administrate network and hardware peripherals Lecture #1
Gera Paulos
 
Provide first level remote help desk support
Provide first level remote help desk supportProvide first level remote help desk support
Provide first level remote help desk support
Gera Paulos
 
Configuring and administrate server
Configuring and administrate serverConfiguring and administrate server
Configuring and administrate server
Gera Paulos
 
Operating Database Application ODA
Operating Database Application ODAOperating Database Application ODA
Operating Database Application ODA
Gera Paulos
 
511718784-maintain-inventory-of-equipment-software-and-documentation.pptx
511718784-maintain-inventory-of-equipment-software-and-documentation.pptx511718784-maintain-inventory-of-equipment-software-and-documentation.pptx
511718784-maintain-inventory-of-equipment-software-and-documentation.pptx
teferiGetachew1
 
Maintain equipment and consumables
Maintain equipment and consumablesMaintain equipment and consumables
Maintain equipment and consumables
Gera Paulos
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
Duressa Teshome
 
Computer repair and maintenance
Computer repair and maintenanceComputer repair and maintenance
Computer repair and maintenance
Cornelius Micah
 
System and Network Administration/ SNA
System and Network Administration/ SNASystem and Network Administration/ SNA
System and Network Administration/ SNA
FaisalMashood
 
Creating technical documents
Creating technical documentsCreating technical documents
Creating technical documents
Gera Paulos
 
Computer Troubleshooting
Computer TroubleshootingComputer Troubleshooting
Computer Troubleshooting
Lisa Hartman
 
Chapter 1 Introduction To Computers
Chapter 1 Introduction To ComputersChapter 1 Introduction To Computers
Chapter 1 Introduction To Computers
norzaini
 
User account (Windows)
User account (Windows)User account (Windows)
User account (Windows)
Dev Dorse
 
Implement maintenance procedures
Implement maintenance proceduresImplement maintenance procedures
Implement maintenance procedures
Gera Paulos
 
Operating systems system structures
Operating systems   system structuresOperating systems   system structures
Operating systems system structures
Mukesh Chinta
 
Apply Problem Solving Techniques to Routine Malfunctions.pptx
Apply Problem Solving Techniques to Routine Malfunctions.pptxApply Problem Solving Techniques to Routine Malfunctions.pptx
Apply Problem Solving Techniques to Routine Malfunctions.pptx
wesendesta2
 
Infrastructure Planning and Design
Infrastructure Planning and DesignInfrastructure Planning and Design
Infrastructure Planning and Design
Sergi Duró
 
Care for Network and Computer Hardware L-2 (3).pptx
Care for Network and Computer Hardware     L-2 (3).pptxCare for Network and Computer Hardware     L-2 (3).pptx
Care for Network and Computer Hardware L-2 (3).pptx
aytenewbelay1
 
update and document.pptx
update and document.pptxupdate and document.pptx
update and document.pptx
ziway
 

Similar to installing and optimizing operating system software (20)

Introduction to operating system,OS.pptx
Introduction to operating system,OS.pptxIntroduction to operating system,OS.pptx
Introduction to operating system,OS.pptx
amnaazeem290
 
L-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.pptL-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.ppt
Kirti Verma
 
e.pdf
e.pdfe.pdf
e.pdf
ay3539355
 
operating system structure
operating system structureoperating system structure
operating system structure
Waseem Ud Din Farooqui
 
OS.pptx
OS.pptxOS.pptx
OS.pptx
abclara
 
2. Operating System Structure,Services,Call, Design and Implementation.pptx
2. Operating System Structure,Services,Call, Design and Implementation.pptx2. Operating System Structure,Services,Call, Design and Implementation.pptx
2. Operating System Structure,Services,Call, Design and Implementation.pptx
viceprincipalbfc
 
R20CSE2202-OPERATING-SYSTEMS .pdf
R20CSE2202-OPERATING-SYSTEMS        .pdfR20CSE2202-OPERATING-SYSTEMS        .pdf
R20CSE2202-OPERATING-SYSTEMS .pdf
cVan3
 
Operating system notes pdf
Operating system notes pdfOperating system notes pdf
Operating system notes pdf
Jasleen Kaur (Chandigarh University)
 
Operating System Structures and objectuve.pptx
Operating System Structures and objectuve.pptxOperating System Structures and objectuve.pptx
Operating System Structures and objectuve.pptx
viceprincipalbfc
 
UNIT I - Part 1.pptx
UNIT I - Part 1.pptxUNIT I - Part 1.pptx
UNIT I - Part 1.pptx
karthikaparthasarath
 
Ch3
Ch3Ch3
Ch3
Lokesh Kannaiyan
 
Basic operating systems in computer and it's uses
Basic operating systems in computer and it's usesBasic operating systems in computer and it's uses
Basic operating systems in computer and it's uses
Surya Vishnuram
 
Computer system software
Computer system softwareComputer system software
Computer system software
MozaSaid
 
Introduction of operating system
Introduction of operating systemIntroduction of operating system
Introduction of operating system
Jitendrakumar Upadhyay
 
Unit 1 q&a
Unit  1 q&aUnit  1 q&a
Unit 1 q&a
Dr.M.Karthika parthasarathy
 
ch1.ppt
ch1.pptch1.ppt
ch1.ppt
VandanaGaria
 
2 opreating system
2 opreating system2 opreating system
2 opreating system
HekmatFaisal
 
Operating system
Operating systemOperating system
Operating system
Ibrahim MH
 
Operating system
Operating systemOperating system
Operating system
ADITHYAM19
 
Basics of Operating System
Basics of Operating SystemBasics of Operating System
Basics of Operating System
Soumit Ghosh
 
Introduction to operating system,OS.pptx
Introduction to operating system,OS.pptxIntroduction to operating system,OS.pptx
Introduction to operating system,OS.pptx
amnaazeem290
 
L-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.pptL-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.ppt
Kirti Verma
 
2. Operating System Structure,Services,Call, Design and Implementation.pptx
2. Operating System Structure,Services,Call, Design and Implementation.pptx2. Operating System Structure,Services,Call, Design and Implementation.pptx
2. Operating System Structure,Services,Call, Design and Implementation.pptx
viceprincipalbfc
 
R20CSE2202-OPERATING-SYSTEMS .pdf
R20CSE2202-OPERATING-SYSTEMS        .pdfR20CSE2202-OPERATING-SYSTEMS        .pdf
R20CSE2202-OPERATING-SYSTEMS .pdf
cVan3
 
Operating System Structures and objectuve.pptx
Operating System Structures and objectuve.pptxOperating System Structures and objectuve.pptx
Operating System Structures and objectuve.pptx
viceprincipalbfc
 
Basic operating systems in computer and it's uses
Basic operating systems in computer and it's usesBasic operating systems in computer and it's uses
Basic operating systems in computer and it's uses
Surya Vishnuram
 
Computer system software
Computer system softwareComputer system software
Computer system software
MozaSaid
 
2 opreating system
2 opreating system2 opreating system
2 opreating system
HekmatFaisal
 
Operating system
Operating systemOperating system
Operating system
Ibrahim MH
 
Operating system
Operating systemOperating system
Operating system
ADITHYAM19
 
Basics of Operating System
Basics of Operating SystemBasics of Operating System
Basics of Operating System
Soumit Ghosh
 
Ad

More from ziway (20)

build a small wireless LAN LO2
build a small wireless LAN LO2build a small wireless LAN LO2
build a small wireless LAN LO2
ziway
 
build small WLAN.pptx
build small WLAN.pptxbuild small WLAN.pptx
build small WLAN.pptx
ziway
 
business plan
business planbusiness plan
business plan
ziway
 
develop Business Plan
develop Business Plandevelop Business Plan
develop Business Plan
ziway
 
Introduction to Anthropology
 Introduction to Anthropology Introduction to Anthropology
Introduction to Anthropology
ziway
 
preventing and eliminating muda.pptx
preventing and eliminating muda.pptxpreventing and eliminating muda.pptx
preventing and eliminating muda.pptx
ziway
 
use and create spreadsheet.ppt
use and create spreadsheet.pptuse and create spreadsheet.ppt
use and create spreadsheet.ppt
ziway
 
develop keyboard skill.pptx
develop keyboard skill.pptxdevelop keyboard skill.pptx
develop keyboard skill.pptx
ziway
 
Ex formula.pdf
Ex formula.pdfEx formula.pdf
Ex formula.pdf
ziway
 
Improve business practice by jaleto sunkemo
Improve business practice by jaleto sunkemoImprove business practice by jaleto sunkemo
Improve business practice by jaleto sunkemo
ziway
 
Apply quality control
Apply quality controlApply quality control
Apply quality control
ziway
 
Work in team environment
Work in team environmentWork in team environment
Work in team environment
ziway
 
Leading workplace communication
Leading workplace communicationLeading workplace communication
Leading workplace communication
ziway
 
Lead small team
Lead small teamLead small team
Lead small team
ziway
 
Improve business practice
Improve business practiceImprove business practice
Improve business practice
ziway
 
Utilize specialized-communicaton skill
Utilize specialized-communicaton  skillUtilize specialized-communicaton  skill
Utilize specialized-communicaton skill
ziway
 
Assit lvel4
Assit lvel4Assit lvel4
Assit lvel4
ziway
 
Keyboard and-proper-finger-positioning
Keyboard and-proper-finger-positioningKeyboard and-proper-finger-positioning
Keyboard and-proper-finger-positioning
ziway
 
Provide remote help desk support
Provide remote help desk supportProvide remote help desk support
Provide remote help desk support
ziway
 
8 network devices
8 network devices8 network devices
8 network devices
ziway
 
build a small wireless LAN LO2
build a small wireless LAN LO2build a small wireless LAN LO2
build a small wireless LAN LO2
ziway
 
build small WLAN.pptx
build small WLAN.pptxbuild small WLAN.pptx
build small WLAN.pptx
ziway
 
business plan
business planbusiness plan
business plan
ziway
 
develop Business Plan
develop Business Plandevelop Business Plan
develop Business Plan
ziway
 
Introduction to Anthropology
 Introduction to Anthropology Introduction to Anthropology
Introduction to Anthropology
ziway
 
preventing and eliminating muda.pptx
preventing and eliminating muda.pptxpreventing and eliminating muda.pptx
preventing and eliminating muda.pptx
ziway
 
use and create spreadsheet.ppt
use and create spreadsheet.pptuse and create spreadsheet.ppt
use and create spreadsheet.ppt
ziway
 
develop keyboard skill.pptx
develop keyboard skill.pptxdevelop keyboard skill.pptx
develop keyboard skill.pptx
ziway
 
Ex formula.pdf
Ex formula.pdfEx formula.pdf
Ex formula.pdf
ziway
 
Improve business practice by jaleto sunkemo
Improve business practice by jaleto sunkemoImprove business practice by jaleto sunkemo
Improve business practice by jaleto sunkemo
ziway
 
Apply quality control
Apply quality controlApply quality control
Apply quality control
ziway
 
Work in team environment
Work in team environmentWork in team environment
Work in team environment
ziway
 
Leading workplace communication
Leading workplace communicationLeading workplace communication
Leading workplace communication
ziway
 
Lead small team
Lead small teamLead small team
Lead small team
ziway
 
Improve business practice
Improve business practiceImprove business practice
Improve business practice
ziway
 
Utilize specialized-communicaton skill
Utilize specialized-communicaton  skillUtilize specialized-communicaton  skill
Utilize specialized-communicaton skill
ziway
 
Assit lvel4
Assit lvel4Assit lvel4
Assit lvel4
ziway
 
Keyboard and-proper-finger-positioning
Keyboard and-proper-finger-positioningKeyboard and-proper-finger-positioning
Keyboard and-proper-finger-positioning
ziway
 
Provide remote help desk support
Provide remote help desk supportProvide remote help desk support
Provide remote help desk support
ziway
 
8 network devices
8 network devices8 network devices
8 network devices
ziway
 
Ad

Recently uploaded (20)

Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?
Eric Torreborre
 
Developing System Infrastructure Design Plan.pptx
Developing System Infrastructure Design Plan.pptxDeveloping System Infrastructure Design Plan.pptx
Developing System Infrastructure Design Plan.pptx
wondimagegndesta
 
Viam product demo_ Deploying and scaling AI with hardware.pdf
Viam product demo_ Deploying and scaling AI with hardware.pdfViam product demo_ Deploying and scaling AI with hardware.pdf
Viam product demo_ Deploying and scaling AI with hardware.pdf
camilalamoratta
 
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à GenèveUiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPathCommunity
 
machines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdfmachines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdf
AmirStern2
 
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Markus Eisele
 
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Raffi Khatchadourian
 
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
James Anderson
 
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Maarten Verwaest
 
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient CareAn Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
Cyntexa
 
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier VroomAI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
UXPA Boston
 
Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...
Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...
Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...
Mike Mingos
 
fennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solutionfennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solution
shallal2
 
AsyncAPI v3 : Streamlining Event-Driven API Design
AsyncAPI v3 : Streamlining Event-Driven API DesignAsyncAPI v3 : Streamlining Event-Driven API Design
AsyncAPI v3 : Streamlining Event-Driven API Design
leonid54
 
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent LasterAI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
All Things Open
 
Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)
Kaya Weers
 
Cybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and MitigationCybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and Mitigation
VICTOR MAESTRE RAMIREZ
 
Artificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptxArtificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptx
03ANMOLCHAURASIYA
 
Unlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web AppsUnlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web Apps
Maximiliano Firtman
 
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
Lorenzo Miniero
 
Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?
Eric Torreborre
 
Developing System Infrastructure Design Plan.pptx
Developing System Infrastructure Design Plan.pptxDeveloping System Infrastructure Design Plan.pptx
Developing System Infrastructure Design Plan.pptx
wondimagegndesta
 
Viam product demo_ Deploying and scaling AI with hardware.pdf
Viam product demo_ Deploying and scaling AI with hardware.pdfViam product demo_ Deploying and scaling AI with hardware.pdf
Viam product demo_ Deploying and scaling AI with hardware.pdf
camilalamoratta
 
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à GenèveUiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPathCommunity
 
machines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdfmachines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdf
AmirStern2
 
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Markus Eisele
 
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Raffi Khatchadourian
 
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
James Anderson
 
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Maarten Verwaest
 
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient CareAn Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
Cyntexa
 
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier VroomAI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
UXPA Boston
 
Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...
Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...
Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...
Mike Mingos
 
fennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solutionfennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solution
shallal2
 
AsyncAPI v3 : Streamlining Event-Driven API Design
AsyncAPI v3 : Streamlining Event-Driven API DesignAsyncAPI v3 : Streamlining Event-Driven API Design
AsyncAPI v3 : Streamlining Event-Driven API Design
leonid54
 
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent LasterAI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
All Things Open
 
Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)
Kaya Weers
 
Cybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and MitigationCybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and Mitigation
VICTOR MAESTRE RAMIREZ
 
Artificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptxArtificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptx
03ANMOLCHAURASIYA
 
Unlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web AppsUnlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web Apps
Maximiliano Firtman
 
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
Lorenzo Miniero
 

installing and optimizing operating system software

  • 1. Unit of competence:- install and optimizing operating system software Pre. By IT department
  • 2.  This unit defines the performance outcomes, skills and knowledge required to install operating system (OS) software and to make adjustments as a means of optimizing the system to accommodate business and client needs
  • 3. LO1:- Determine function of operating system  Identify and demonstrate understanding of the purposes of operating system  Compare and contrast different operating systems and their features  Identify and demonstrate knowledge of the basic functions of operating system, including file system, memory management, process scheduling  Identify and demonstrate management of virtual memory
  • 4.  Introduction to windows  Install operating system  File system system
  • 5.  What is system software? The system software is a computer program, which is designed to run computer hardware and applications. The system software makes your system faster, effective, and safe. When installing the operating system, the system software is already installed on the computer.  System files include function libraries, system services, printer, and other hardware drivers, system preferences, and other configuration files.
  • 6.  Here are the features of system software.  Usually written in a low-level language.  It has a high speed.  Less interactive.  The system software is closer to the system.
  • 7.  There is another software on your computer- application software. Application software is a program that does actual work for users. It is mainly created to perform user-specific tasks. Now, let’s see the differences between system software and application software.  System software is the general software, while application software is special software.  System software can run independently, but application software cannot run independently.  System software is designed to manage system resources, such as memory and process management, security, etc., while application software is designed to meet the needs of users to perform specific tasks.  System software is written in low-level languages ​​such as machine or assembly language, while application software is a high-level language used to write application software.
  • 8. 1. Windows 2. MAC OS 3. Ios 4. Chrome OS 5. Ubuntu 6. Android 7. Blackberry
  • 9.  What is OS  An Operating System (OS) is an interface between a computer user and computer hardware. An operating system is a software which performs all the basic tasks like file management, memory management, process management, handling input and output, and controlling peripheral devices such as disk drives and printers.  An operating system is software that enables applications to interact with a computer's hardware. The software that contains the core components of the operating system is called the kernel.  The primary purposes of an Operating System are to enable applications (spftwares) to interact with a computer's hardware and to manage a system's hardware and software resources.
  • 10.  Some popular Operating Systems include Linux Operating System, Windows Operating System, VMS, OS/400, AIX, z/OS, etc. Today, Operating systems is found almost in every device like mobile phones, personal computers, mainframe computers, automobiles, TV, Toys etc.
  • 11. Security is provided by OS to the user data and prevents unauthorized access. 1. System performance is boosted with the help of the OS 2. Various applications or tasks and the number of users doing the tasks are accounted for by OS 3. The computing system shows some errors 4. Many users use the computing system the hardware and these errors are logged in the OS 5. The main memory is managed by OS 6. OS organizes the file system
  • 12.  here are following 8-components of an Operating System:  Process Management  I/O Device Management  File Management  Network Management  Main Memory Management  Secondary Storage Management  Security Management  Command Interpreter System
  • 13.  A process is program or a fraction of a program that is loaded in main memory. A process needs certain resources including CPU time, Memory, Files, and I/O devices to accomplish its task. The process management component manages the multiple processes running simultaneously on the Operating System.  A program in running state is called a process
  • 14.  One of the purposes of an operating system is to hide the peculiarities of specific hardware devices from the user. I/O Device Management provides an abstract level of H/W devices and keep the details from applications to ensure proper use of devices, to prevent errors, and to provide users with convenient and efficient programming environment.  Following are the tasks of I/O Device Management component:  Hide the details of H/W devices  Manage main memory for the devices using cache, buffer, and spooling  Maintain and provide custom drivers for each device.  File Management  A files is a sequence of bits, bytes, lines or records whose meaning is defined by its creator and user.
  • 15.  The definition of network management is often broad, as network management involves several different components. Network management is the process of managing and administering a computer network. A computer network is a collection of various types of computers connected with each other.  Network management comprises fault analysis, maintaining the quality of service, provisioning of networks, and performance management.
  • 16.  Network management is the process of keeping your network healthy for an efficient communication between different computers.  Following are the features of network management:  Network administration  Network maintenance  Network operation  Network security
  • 17.  Memory is a large array of words or bytes, each with its own address. It is a repository of quickly accessible data shared by the CPU and I/O devices.  Main memory is a volatile storage device which means it loses its contents in the case of system failure or as soon as system power goes down.  The main motivation behind Memory Management is to maximize memory utilization on the computer system.The operating system is responsible for the following activities in connections with memory management:  Keep track of which parts of memory are currently being used and by whom.  Decide which processes to load when memory space becomes available.  Allocate and deallocate memory space as needed.
  • 18.  The main purpose of a computer system is to execute programs. These programs, together with the data they access, must be in main memory during execution. Since the main memory is too small to permanently accommodate all data and program, the computer system must provide secondary storage to backup main memory.  Most modern computer systems use disks as the principle on-line storage medium, for both programs and data. Most programs, like compilers, assemblers, sort routines, editors, formatters, and so on, are stored on the disk until loaded into memory, and then use the disk as both the source and destination of their processing.  The operating system is responsible for the following activities in connection with disk management:  Free space management  Storage allocation  Disk scheduling
  • 19.  The operating system is primarily responsible for all task and activities happen in the computer system. The various processes in an operating system must be protected from each other’s activities. For that purpose, various mechanisms which can be used to ensure that the files, memory segment, cpu and other resources can be operated on only by those processes that have gained proper authorization from the operating system.  Security Management refers to a mechanism for controlling the access of programs, processes, or users to the resources defined by a computer controls to be imposed, together with some means of enforcement.For example, memory addressing hardware ensure that a process can only execute within its own address space. The timer ensure that no process can gain control of the CPU without relinquishing it. Finally, no process is allowed to do it’s own I/O, to protect the integrity of the various peripheral devices.
  • 20.  One of the most important component of an operating system is its command interpreter. The command interpreter is the primary interface between the user and the rest of the system.  Command Interpreter System executes a user command by calling one or more number of underlying system programs or system calls.  Command Interpreter System allows human users to interact with the Operating System and provides convenient programming environment to the users.Many commands are given to the operating system by control statements. A program which reads and interprets control statements is automatically executed. This program is called the shell and few examples are Windows DOS command window, Bash of Unix/Linux or C-Shell of Unix/Linux.
  • 21.  An Operating System provides services to both the users and to the programs.  It provides programs an environment to execute.  It provides users the services to execute the programs in a convenient manner.  Following are a few common services provided by an operating system  Program execution  I/O operations  File System manipulation  Communication  Error Detection  Resource Allocation  Protection
  • 22.  Security refers to providing a protection system to computer system resources such as CPU, memory, disk, software programs and most importantly data/information stored in the computer system.  If a computer program is run by an unauthorized user, then he/she may cause severe damage to computer or data stored in it. So a computer system must be protected against unauthorized access, malicious access to system memory, viruses, worms etc
  • 23.  We're going to discuss following topics Authentication One Time passwords Program Threats System Threats Computer Security Classifications
  • 24.  Introduction to windows  Install operating system  configure operating system
  • 25.  Windows is a collection of programs known as an operating system (OS) that controls a PC (personal computer). First produced by Microsoft in November 1985, it has been frequently updated since, as computer memory has got bigger, as processing chips have got faster and, of course, when the internet was invented. Prior to Windows, PCs were operated by a series of text commands.  Windows' key benefits and features  Allows the user to interact with the computer (through the keyboard, mouse, microphone, etc.).
  • 26.  Controls the storage of data (images, files, music).  Controls hardware attached to the computer such as webcams, scanners and printers.  Helps to open and close programs (word processors, games, photo editors, etc.), and gives them part of the computer’s memory to allow them to work.  Controls what access to a computer different users have and the computer's security.  Deals with errors and user instructions, and issues simple error messages.  Promotes multitasking by allowing the user to do several things on the computer at once – for example, watch a video while writing a letter.
  翻译: