Software L2 Operatingsystems
Software L2 Operatingsystems
IGCSE Unit 5
Software and security
Computer Science
Section 1
2
Objectives
• Explain the need for the following functions of an
operating system:
Providing a user interface
Memory management
Peripheral management
Multi-tasking
Security
• Understand the need for interrupts
Operating systems
Unit 5 Software and security
Software
System Application
Software Software
• OS X (Apple MACs)
• Versions have nicknames such as “Mountain Lion” and “Snow
Leopard”
• iOS (iPhone/iPad)
• MS-DOS and Windows
• Google Chrome OS (based on Linux)
• Linux
Operating systems
Unit 5 Software and security
Worksheet 2a
• What does an operating system do?
• In pairs/small groups, write down all the things that
you think an operating system does
Operating systems
Unit 5 Software and security
Functions of an Operating
System
• Provides a user interface
• Manages hardware:
• Manages how programs use main memory
• Allows multitasking
• Manages peripherals
• Manages how files are stored on disks/storage devices
• Provides security
Operating systems
Unit 5 Software and security
User Interface
• Without a user interface we would have to
communicate in binary!
• The user interface for a
device has to suit how
it is used....
• How many types of
interface can you name?
Operating systems
Unit 5 Software and security
• Menu-driven interface
• CLI: Command Line Interface
• Just text, like Windows command prompt
• Voice activated
• Real-time
• sensors detect inputs, actuators output actions
Operating systems
Unit 5 Software and security
WIMP Interfaces
• Windows is a WIMP user interface
• Stands for: Windows, Icons, Menus and Pointers
Operating systems
Unit 5 Software and security
WIMP Interfaces
• User can click on icons using a pointer or cursor
• Icons represent main functions rather than having to
type instructions
• Right-click to get context-sensitive menus
• Different shaped pointers for different uses:
Operating systems
Unit 5 Software and security
Menu-driven interfaces
• Less commonly used but still prevalent in some
areas
Operating systems
Unit 5 Software and security
Worksheet 2b
• Working in pairs, complete the
worksheet to describe the
user interface of a
smart-phone
• Consider:
• How the user inputs
data/commands
• How the user gets
information from it
Operating systems
Unit 5 Software and security
Memory management
• To run a program, the Main memory (RAM)
computer must copy the
File A
program from storage into
Program D
main memory – Why?
Program A File C
• Data used by the program is
copied into main memory
Program A
• The operating system keeps a Program B
Multi-tasking
• You may use your computer to do several tasks at
the same time with different software:
homework, playing music, messaging friends...
• There are many background programs running on
the computer as well
• They are taking it in turns to get
processor time to execute
instructions
• The OS must manage how the
programs share the processor
Operating systems
Unit 5 Software and security
Task Manager
Operating systems
Unit 5 Software and security
Interrupts
• Interrupts are signals sent to the CPU by external
devices to indicate an event that needs immediate
attention
• They tell the CPU to suspend its current activities
and execute appropriate instructions
• Hardware interrupts are generated by hardware
devices – for example, printer out of paper
• Software interrupts are generated by programs,
e.g. a divide-by-zero error will cause a calculation
to be abandoned and an error message displayed
Operating systems
Unit 5 Software and security
Examples of interrupts
• Think of some other events that could cause
• A hardware interrupt
• A software interrupt
Operating systems
Unit 5 Software and security
Peripheral management
Managing security
• The operating system organises user logins and
passwords
Access rights
• Access rights:
• If a computer is used by more than
one person, each user should be
able to see only their own files
• Users and system administrators
have different levels of access
rights
• Some users may be allowed to
read files but not edit them
Access rights
• Access rights may be set
on disks, folders and even
individual files
• How are access rights
used in school?
Operating systems
Unit 5 Software and security
Worksheet 2c
• Build the diamond shape jigsaw puzzle by matching
the terms on the edges of each piece
• Discuss why you think a certain piece belongs where
you have put it; make sure everyone in the group
agrees