Int 2 Computer Software Notes

11
Operating Systems Int 2 Computer Systems - Comp Software Information Sheet 5.4.1 Produced by P W Shadbolt Queensferry High School 2004 When you turn on a PC or Mac the electricity starts-up a program (Boot File) based in a ROM chip which searches the attached storage devices (usually the Floppy Disc Drive, then the CD-ROM drive and then the Hard disc drive) for a program called the Operating System., which it then loads into RAM memory. The Operating System is a suite of programs that controls the hardware and software running on the computer, allowing the user to communicate with application programs and peripheral devices. Whether you load or save a file, access the internet, print a hard copy or just type on the keyboard, the operating system is involved working in the background. These programs remain in RAM until you turn your computer off. STANDARD FUNCTIONS An easy way of thinking what an operating system does is to think about the tasks that can be done on the desktop of your computer. These are all tasks carried out by the operating system. Operating systems have a number of Standard functions including Memory management - Controls where programs and data are stored in the RAM. It allocates suitable memory locations to programs and data and makes sure that they don’t get mixed up. File Management - The operating system manages all the files that are located on backing storage. It is responsible for • Deleting, copying, creating and re-naming Files • Keeping the physical information as to where files are stored. • Formatting and Cataloging Discs • Loading and Saving to/from Disc • Ensures data is sent to the correct program • Controlling access to files (read and write privileges) Input / Output - Reads information from the mouse and keyboard and reacts accordingly. Sends information to the correct printer. Error Reporting - Sends messages to the user if there is a problem e.g. “out of memory” Interpreting user’s commands - This is the connection between the user and the computer. It makes sure that the commands are valid and then translates them into instructions that the computer system can follow. We call this the Human Computer Interface (HCI). There are two main types of HCI WIMP interfaces such as Windows 95 and the Mac-OS Command Driven interfaces such as Unix and the Acorn MOS If a computer system is to be user-friendly it must have an easy to use interface, on the other hand it must be fast and flexible for the advanced user. • Command Driven Interface This is when all the functions of the package (Word processor, Database, etc.) are controlled by commands e.g. PRINT, SCREEN, and SAVE etc. This is not a very suitable environment for non-experts but means that an expert user can move quickly and easily to the point they want without having to take time going through numerous menus. VIEW is an example of a command driven word processor.

description

Int 2 Computer Software Notes

Transcript of Int 2 Computer Software Notes

Page 1: Int 2 Computer Software Notes

Operating Systems

Int 2 Computer Systems - Comp Software Information Sheet 5.4.1

Produced by P W Shadbolt Queensferry High School 2004

When you turn on a PC or Mac the electricity starts-up a

program (Boot File) based in a ROM chip which searches the

attached storage devices (usually the Floppy Disc Drive, then

the CD-ROM drive and then the Hard disc drive) for a program

called the Operating System., which it then loads into RAM

memory. The Operating System is a suite of programs that controls the hardware

and software running on the computer, allowing the user to communicate with

application programs and peripheral devices. Whether you load or save a file,

access the internet, print a hard copy or just type on the keyboard, the operating system is involved

working in the background. These programs remain in RAM until you turn your computer off.

STANDARD FUNCTIONS

An easy way of thinking what an operating system does is to think about the tasks that can be done on the

desktop of your computer. These are all tasks carried out by the operating system.

Operating systems have a number of Standard functions including

Memory management -

Controls where programs and data are stored in the RAM. It allocates suitable memory

locations to programs and data and makes sure that they don’t get mixed up.

File Management -

The operating system manages all the files that are located on backing storage. It is

responsible for

• Deleting, copying, creating and re-naming Files

• Keeping the physical information as to where files are stored.

• Formatting and Cataloging Discs

• Loading and Saving to/from Disc

• Ensures data is sent to the correct program

• Controlling access to files (read and write privileges)

Input / Output -

Reads information from the mouse and keyboard and reacts accordingly. Sends information

to the correct printer.

Error Reporting -

Sends messages to the user if there is a problem e.g. “out of memory”

Interpreting user’s commands -

This is the connection between the user and the computer. It makes sure that the

commands are valid and then translates them into instructions that the computer system can

follow. We call this the Human Computer Interface (HCI).

There are two main types of HCI

• WIMP interfaces such as Windows 95 and the Mac-OS

• Command Driven interfaces such as Unix and the Acorn MOS

If a computer system is to be user-friendly it must have an easy to use interface, on the other hand it must

be fast and flexible for the advanced user.

• Command Driven Interface

This is when all the functions of the package (Word processor, Database, etc.) are controlled by

commands e.g. PRINT, SCREEN, and SAVE etc. This is not a very suitable environment for non-experts

but means that an expert user can move quickly and easily to the point they want without having to take

time going through numerous menus. VIEW is an example of a command driven word processor.

Page 2: Int 2 Computer Software Notes

Operating Systems

Int 2 Computer Systems - Comp Software Information Sheet 5.4.1

Produced by P W Shadbolt Queensferry High School 2004

• WIMP (Windows, Icons, Menu and Pointer)

This environment is said to be the most "user friendly". This means that beginners can learn how to use

the system faster than other types of environment. The pull-down menus allows functions to be easily

available and have the advantage over menu-driven environments of not passing you from one menu to

another because all menus are available at all times. While having this ease of use for beginners the

WIMP environment also allows expert users to use command keys to access functions quickly. Some

micros even give you the opportunity to give a number of instructions with one command

WINDOW

This is an area of the screen that is used to display the document that the user is

currently working on. Most systems can have several windows open at the same

time, although only one is active at any time. You activate the window by using

the pointer.

ICONS

These are small graphics that are used to represent items such as files, printers, disk drives etc. They help

to make the operating system very user friendly.

MENU

This offers you a list of choices. The menu bar either at the top or bottom of the page will give you a list

of choices, which you can select from.

POINTER

The pointer is an icon that is moved around the screen by using the mouse or other input device. The

pointer is used to select from menus, select icons or make windows.

STANDARD OPERATING SYSTEMS

These are Operating Systems that are used by a number of different hardware manufacturers. The main

advantage for the hardware companies is that users feel at ease with an Operating System they have used

before; also there are many similar applications available due to the large market. There can be problems

with a file that has been created by the same application package but used with different operating

systems (e.g., Claris files created on the Mac are slightly different from those saved on the PC although

they can be accessed from the application)

ROM BASED OR DISC BASED

Most computer systems like the Macs and PCs have their Operating Systems on

disc (Disc Operating System). Some older systems like the BBC have their

Operating Systems on ROM inside the computer. The advantage of the ROM

based OS is that it works faster. This is because access to ROM is faster than access to disc or hard disc

drive. The disadvantage is that in order to upgrade or improve your Operating System you have to take the

computer apart to replace the chip. With the increase in access speed of hard disc drives there are very

few computers left that have ROM based operating systems.

There are four main types of operating systems in popular

use today: MS-DOS, Windows,

UNIX and MacOS. All four of these operating systems run

on personal computers.

Examples of operating systems

DOS is an old (early 1980s) command-line operating system

that requires the user to memorise and enter all commands

from a command prompt.

A DOS Window:

Page 3: Int 2 Computer Software Notes

Operating Systems

Int 2 Computer Systems - Comp Software Information Sheet 5.4.1

Produced by P W Shadbolt Queensferry High School 2004

Windows 3.1 (late 1980s) was Microsoft’s first

attempt at a Macintosh-like Graphical User Interface

(GUI); this interface allowed:

1. programs to be launched by double-clicking

icons with a mouse

2. files to be copied by drag and drop

3. much easier copy and paste.

Windows 95/98/ME/2000/NT/XP are a family of Microsoft 32-bit operating

systems. At the time of this writing these operating systems dominate the market and

are to be found on most people’s personal computers. Microsoft has come a long way

since Windows 3.1 and Windows has become much more powerful and stable.

OS2 began as a joint venture between

IBM and Microsoft. IBM finished and

marketed this operating system. It is not

used extensively today.

UNIX was originally a command-line based operating system like DOS (although

it predates DOS by more than a decade). However, UNIX now

incorporates all of the features of a modern GUI and more.

UNIX is most popular for companies and large institutions,

particularly for multiuser environments.

Linux is a UNIX-like operating system for personal

computers. Its primary distinguishing feature is that its source

code (basically, the text of the program) is freely distributed.

A worldwide community of users work to improve Linux.

MacOS X is the current operating system for Apple Macintosh

computers. Throughout the 1990s the operation systems for the Mac

were quite similar to Microsoft Windows. However, in MacOSX

Apple has decided to base their operating system on UNIX.

Page 4: Int 2 Computer Software Notes

Applications

Int 2 Computer Systems - Comp Software Information Sheet 5.4.2

Produced by P W Shadbolt Queensferry High School 2004

Application programs

A Computer Application is a computer program that has been designed to help people with a particular

task. Different applications help with different tasks. The one that is used will depend on the type of task

that the user wishes to perform. Application packages have been designed to:

PROCESS TEXT

This type of package can store and process documents that are text based.

These packages allow the user to enter, store and retrieve text documents

and to perform a wide range of operations on the text. For example,

deleting, inserting, spell checking and using search and replace. Text

processing packages also allow the user to change the style, font and format

of the text. The best example of a text processing package is word

processing packages. Text processors would be used to produce letters, reports,

PROCESS NUMBERS

This type of application is designed to enable the user to enter, store and process

numerical data. A spreadsheet package is an example of a number processing

package. The working area of a spreadsheet has been divided into rows and

columns that form the cells into which the data is entered. Cells can contain text -

this is generally used for labels and headings, numbers on which the calculations are

carried out, and formulae – this defines the calculation to be carried out on the

numbers. Number processing applications would be used by accountants, bankers,

insurance companies etc. to perform statistical or financial calculations and to

process mathematical or scientific data.

PROCESS DATA

This type of application enables the user to store, manipulate and retrieve

collections of data. A database is rather like an electronic filing system/address

book that you can question. You can put in as much

information as you want and then ask it to sort the

information in different ways or search for specific

information. In a simple database the data is

organised into separate distinct files, each with their

own records and fields. In more complex databases

the files are linked together to enable the user to

perform complicated sorts and searches. Databases

are used in a wide range of business, commercial and Government organisations to deal with tasks such as

resource management, record keeping and stock control. For example, the Police use databases to keep

track of criminals and all the cars in the country. If they wanted to, the Police could give you a list of

people who all have the same make, model and colour of car as you in the country.

PROCESS GRAPHICS

There are 3 main graphics applications - drawing, painting and business graphics packages

Drawing

Drawing packages store instructions in order to draw shapes. A drawing package is

useful for designing; for example; a new kitchen or planning a new house extension

as drawing packages can be precise and can scale the drawing up or down, for

drawing outlines or for drawing shapes. It is called an object-orientated package,

which means that it is made up of a series of objects (lines, boxes, circles etc.),

which can be altered and moved around.

Page 5: Int 2 Computer Software Notes

Applications

Int 2 Computer Systems - Comp Software Information Sheet 5.4.2

Produced by P W Shadbolt Queensferry High School 2004

Painting

Painting packages store the drawings as pixels. This

is called a bit-mapped package as it draws by filling in

the pixels (little dots) on the screen. It is used as

though you were painting with pencils and rubber.

Painting packages are ideal for producing artistic

effects in drawings such as tone and shading. They

are good for freehand drawings and are suitable for

graphics work where artistic effects are an important

element, for example when drawing a poster or a book illustration. It is

much more creative than the drawing package. The painting and drawing

packages can be easily mixed up. An easy way to remember the difference is that the painting package has

a rubber and a spray gun capability.

Business Graphics

Business graphics applications turn numbers and statistics into graphical form. They

are often included in spreadsheet packages and are useful for business reports,

presentations, sales figures and exam results.

COMMUNICATIONS SOFTWARE

Communications software is used to:

• regulate the speed of the modem

• store and dial phone numbers

• establish connections on the phone system

• record and carry out logging in procedure.

During the transmission, the communications software:

• encodes data transmitted

• co-ordinates transmissions with other computers

• checks for errors in transmission.

Communications Software and The Internet

Many complex communication tasks must be completed in order to access the Internet. The Internet

Service Provider (ISP) supplies the software that provides and carries out these tasks. One of the tasks of

the ISP is to manage the user’s connection to the Internet.

The World Wide Web (WWW)

The WWW is accessed via a browser. A browser is a program that provides the

user with the tools to help them navigate through the pages of the WWW. A

good browser will provide the following features:

• somewhere to enter the address of the page being searched for

• a bookmark to allow the user to find useful pages quickly

• a home button that takes the user to their own home page

• back and forward buttons to take the user through the web pages that they have recently visited

• a method of saving useful data to disk.

MULTIMEDIA SOFTWARE

There are 2 categories of multimedia software. Authoring software and software that provides

multimedia-based information systems.

Authoring Software

Authoring software allows the user to develop projects or presentations, which combine the elements of:

• graphics (still and video)

• animation

• sound

• text

Page 6: Int 2 Computer Software Notes

Applications

Int 2 Computer Systems - Comp Software Information Sheet 5.4.2

Produced by P W Shadbolt Queensferry High School 2004

The user selects what elements they require from a range of files held on backing storage and combines

them into a presentation by setting up links between them. Authoring packages are script based whereas

the multimedia document is linked together using commands or icons.

Multimedia-based Information Systems

Multimedia-based Information Systems are commercially based packages that provide

information to the user. An example of a multimedia-based system is the encyclopedia Encarta.

INTEGRATED PACKAGE

Apple Works and Microsoft Works are examples of

integrated packages. These consist of a combination of

word processing, spreadsheet, database, graphics and

communications packages linked together. This makes it

easy to combine information from the different packages

and it is usually a great deal cheaper than buying the

packages individually, although not usually as powerful.

Characteristics of an Integrated Package

• Integrated packages make it easy to copy data between packages.

• Integrated packages reduce the need to enter data as the same data can be

used in a whole range of applications. For example, numbers in a spreadsheet

file can be transferred to a word processing or database file.

• Integrated packages have a common HCI. This means that similar menus, windows, commands

and icons are used in each of the applications. This makes it easy to switch between applications

and therefore reduces training costs and learning time.

• Integrated packages help the user to complete complex tasks as tasks cannot always be solved

using the feature in one application package, the user may have to use the facilities of more than

one application to complete the task.

• Integrated packages help to increase productivity because it is easy to switch between

applications and transfer data between them and users do not need to open and close several

packages to solve complex problems.

Limitations of an Integrated Package

• Applications within the package are not as powerful as stand alone or

dedicated packages. For example, the word processing package does not offer the same range of

functions as a dedicated word processing package.

Page 7: Int 2 Computer Software Notes

Objects & Operations

Int 2 Computer Systems - Comp Software Information Sheet 5.4.3

Produced by P W Shadbolt Queensferry High School 2004

General purpose packages (GPPs)

These are application packages that are in common use and may be supplied with desktop computer

systems. GPPs are widespread because the data objects contained in each package fall into the categories

of text, number, data and graphics; these are the most commonly used data type in the field of computing.

The following table lists some of the objects and operations used in each of the four main GPPs:

Each of the above packages its own native file format; this means the file format in which the package

would normally save data. For example:-

Microsoft Word normally saves data as a Word file although it could be saved as several other data types.

In some operating systems (e.g. Windows) the data type can be identified by the file extension; in the case

of a Word file this is .doc.

If the file is saved as plain text then the extension is .txt, if saved as RFT then it is .rtf. In this way you can

tell what type a file is by its name.

Standard file formats allow data to be transferred between different computer platforms and also between

different applications. A plain text file can be read by a word processor, a spreadsheet package and a

database. This makes it possible to export data from any one of these packages and import it into another.

Page 8: Int 2 Computer Software Notes

Standard File Formats

Int 2 Computer Systems - Comp Software Information Sheet 5.4.4

Produced by P W Shadbolt Queensferry High School 2004

Application Standards When application packages first became popular

one of the main problems was that manufacturers

made little effort to ensure that their files could

be read by software made by other manufacturers.

This was particularly true of word processors, where for example files

created in Word could not be used in

Wordperfect. Manufacturers made an attempt to

address this problem by including the

ability to save word-processed files

as plain text or ASCII. As all word

processors could now read a common

file format the situation improved.

However, it was soon realised that

saving a document as plain text did not include the formatting of the original document (font, bold, italic,

etc.). The next aim was to have a common file format that would include the formatting so that documents

created in one word processing package could be totally compatible with others. This led to the

development of rich text format (RFT), which is still in use today. RTF includes the formatting codes.

Many application packages can now save documents in foreign formats to aid the portability of files.

Sometimes these problems can cause frustration for users when they want to use another computer to load

a file. The problems that can occur are:

The backing storage drive is different from the media the file is saved on.

For example - the file is saved on a floppy that has been formatted for a Mac and the

disc drive will only read PC formatted discs.

Differing operating systems and the files won't be recognised. An error message from

the operating system will be given to the user.

For example - an AppleWorks file was saved on a computer with

MacOS 8 and you try to load it on a PC, which has Windows 95 as its operating system.

The PC will look for the filename to have a specific suffix e.g. cwk.

The computer does not have the appropriate application software.

For example, the file was created on Microsoft Word and the other computer only has

AppleWorks.

Using a different computer or ensuring that your media is formatted for

the correct standard or installing different operating system software

could resolve the first two problems.

The third problem is typical as each

application saves files in its own way

and other packages find it difficult to

read these files. However, standards

have been set which allow the user to

save data in a format, which can be read by other packages.

Standard file formats for text files are: RTF (Rich Text Format), ASCII and text

Page 9: Int 2 Computer Software Notes

Standard File Formats

Int 2 Computer Systems - Comp Software Information Sheet 5.4.4

Produced by P W Shadbolt Queensferry High School 2004

RTF

Rich Text Format (RTF) is a file format that lets you exchange text files

between different word processors in different operating systems.

ASCII

ASCII (American Standard Code for

Information Interchange) is the most common

format for text files in computers and on the

Internet.

There are even groups of sad individuals who spend great amounts of time and

effort creating complex pictures using ASCII code. A simple search on Google

returned more than 7000 sites dedicated to this art form.

Text

The term text file is often used as a synonym for ASCII file, a file in which characters are represented by

their ASCII codes

However, the disadvantage of saving files using these standards is that

special formatting created within the original file may be lost e.g.

different styles, fonts and sizes.

These different formats can usually

be chosen in the Save As.... menu

using the Format option in each

package.

Page 10: Int 2 Computer Software Notes

Viruses

Int 2 Computer Systems - Comp Software Information Sheet 5.4.5

Produced by P W Shadbolt Queensferry High School 2004

Viruses

Most programs are designed to be useful; some, like

viruses, are not! A computer virus is self-replicating

piece of computer code that can partially or fully attach

itself to files or applications, and can cause your

computer to do something you don’t want it to do. Virus

behaviour can range from annoying to destructive, but

even relatively benign viruses tend to cause harm.

Viruses enter your system via e-mail, downloads from the internet, infected

floppy disks, homemade CDs and ‘fun’ websites.

Currently the primary vehicle for transmission of

computer viruses is e-mail. Viruses arrive on a

computer as an attachment to an e-mail, which,

when opened by the user, sends further copies of

itself to everyone in the user’s address book. Clearly

such a means of replicating can be highly prolific. In the case of infected floppy

disks, the disk acts as a carrier spreading the virus into each machine when it is placed into the drive.

Homemade CDs spread viruses in a similar fashion when the original CD has been

infected during its compilation.

The popular use of programs such as Napster and Kazaa, which

allow users anywhere on the internet to share files on each

other’s hard drives, has led to concerns about this being used as

a means of spreading viruses. According to an article in the UK-

based IT site, The Register, 6% of all the music downloaded from KaZaa is virus-laden.

When a virus program is executed it tends to perform four actions:

1. replication: copies itself to other files, particularly to .com and .exe files and the boot sector record

2. camouflage: attempts to disguise itself to avoid detection from anti-virus software

3. event watching: whenever the virus runs it checks for certain events, e.g. a specific date, when the virus

will activate

4. delivery: this is the purpose of the virus or what it does. This may be a simple jumbling up of letters or

wiping an entire hard drive.

Signs of a virus

There are a number of tell-tale signs that can

indicate that your computer has been infected

with a virus. They include:

• displaying unwanted messages

• strange sounds or visual effects

• computer keeps rebooting unexpectedly

• a flood of unexpected e-mails.

A common misconception is that all types of

interfering programs are viruses. They aren’t.

Worms, Trojan horses and viruses are in a

broader category of what analysts call ‘malicious

code.’

Page 11: Int 2 Computer Software Notes

Anti-Virus Techniques

INT 2 Computer Systems - Comp Software Infosheet 5.4.6

Produced by S Lambert for Drummond Community High School Computing Department 2004

Anti-Virus Software Detection Techniques

Anti-virus programs are used to detect and remove viruses. However, detection and removal of viruses are

often difficult. Anti-virus software is necessary to help locate viruses and destroy them. Norton Ant-

Virus and Virex are two common anti-virus software.

When dealing with these types of viruses as well as using anti-virus software, there are various ways of

either preventing viruses or making the virus infection less costly and painful.

Install anti-virus software from a well known, reputable company, Update it regularly, and use it.

New viruses come out every single day (see above).

In addition to scanning for viruses on a regular basis, install an 'on access'

scanner and configure it to start automatically each time you boot your

system. This will protect your system by checking for viruses each time

your computer accesses an executable file.

Virus scan any new programs or other files that may contain executable

code before you run or open them, no matter where they come from. There

have been cases of commercially distributed floppy disks and CD-ROMs

spreading virus infections.

Anti-virus programs aren't very good at detecting Trojan horse programs, so be extremely careful

about opening binary files and Word/Excel documents from unknown sources. This includes

posts in binary newsgroups, downloads from web/ftp sites that aren't well known or don't have a

good reputation, and executable files unexpectedly received as attachments to email or during an

on-line chat session.

Be extremely careful about accepting programs or other

files during on-line chat sessions. This is one of the

more common means that users end up with a virus or

trojan horse problems.

Do regular backups. Some viruses and trojan horse

programs will erase or corrupt files on your hard drive,

and a recent backup may be the only way to recover

your data.

Ideally, you should back up your entire system on a regular basis. If this

isn't practical, at least backup files that you can't afford to lose or that

would be difficult to replace: documents, bookmark files, address books,

important email, etc.