0% found this document useful (0 votes)
101 views29 pages

Software L2 Operatingsystems

The document provides an overview of operating systems and their key functions, including providing a user interface, managing memory and peripherals, enabling multi-tasking, and providing security. It discusses different types of operating systems and user interfaces. It also explains the functions of an operating system in more detail, such as memory management, multi-tasking, interrupts, peripheral management, storage device management, and managing security through access rights and permissions.

Uploaded by

Shakila Shaki
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
101 views29 pages

Software L2 Operatingsystems

The document provides an overview of operating systems and their key functions, including providing a user interface, managing memory and peripherals, enabling multi-tasking, and providing security. It discusses different types of operating systems and user interfaces. It also explains the functions of an operating system in more detail, such as memory management, multi-tasking, interrupts, peripheral management, storage device management, and managing security through access rights and permissions.

Uploaded by

Shakila Shaki
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

Cambridge Operating systems

IGCSE Unit 5
Software and security
Computer Science
Section 1

2
Objectives
• Explain the need for the following functions of an
operating system:
Providing a user interface
Memory management
Peripheral management
Multi-tasking
Security
• Understand the need for interrupts
Operating systems
Unit 5 Software and security

Types of system software

Software

System Application
Software Software

Operating Utility Program


systems programs translators
Operating systems
Unit 5 Software and security

What Operating Systems have


you heard of?
• In pairs, write down any operating systems
that you’ve heard of
Operating systems
Unit 5 Software and security

Some Operating Systems


• Android OS
• Versions have nicknames such as Jelly Bean and Kit Kat

• OS X (Apple MACs)
• Versions have nicknames such as “Mountain Lion” and “Snow
Leopard”

• iOS (iPhone/iPad)
• MS-DOS and Windows
• Google Chrome OS (based on Linux)
• Linux
Operating systems
Unit 5 Software and security

Worksheet 2a
• What does an operating system do?
• In pairs/small groups, write down all the things that
you think an operating system does
Operating systems
Unit 5 Software and security

Operating System definition


“Software that ... manages a computer’s hardware and
provides a user interface”
Operating systems
Unit 5 Software and security

Functions of an Operating
System
• Provides a user interface
• Manages hardware:
• Manages how programs use main memory
• Allows multitasking
• Manages peripherals
• Manages how files are stored on disks/storage devices
• Provides security
Operating systems
Unit 5 Software and security

User Interface
• Without a user interface we would have to
communicate in binary!
• The user interface for a
device has to suit how
it is used....
• How many types of
interface can you name?
Operating systems
Unit 5 Software and security

Types of User Interface


• GUI: Graphical User Interface
• WIMP: Windows, Icons, Menus and Pointers

• Menu-driven interface
• CLI: Command Line Interface
• Just text, like Windows command prompt
• Voice activated
• Real-time
• sensors detect inputs, actuators output actions
Operating systems
Unit 5 Software and security

WIMP Interfaces
• Windows is a WIMP user interface
• Stands for: Windows, Icons, Menus and Pointers
Operating systems
Unit 5 Software and security

WIMP Interfaces
• User can click on icons using a pointer or cursor
• Icons represent main functions rather than having to
type instructions
• Right-click to get context-sensitive menus
• Different shaped pointers for different uses:
Operating systems
Unit 5 Software and security

Menu-driven interfaces
• Less commonly used but still prevalent in some
areas
Operating systems
Unit 5 Software and security

Command Line Interfaces


• All user commands must be typed in as text
• No graphics
• Quicker for expert users who know the commands
• Takes less space on the disk and in RAM
Operating systems
Unit 5 Software and security

Worksheet 2b
• Working in pairs, complete the
worksheet to describe the
user interface of a
smart-phone
• Consider:
• How the user inputs
data/commands
• How the user gets
information from it
Operating systems
Unit 5 Software and security

Memory management
• To run a program, the Main memory (RAM)
computer must copy the
File A
program from storage into
Program D
main memory – Why?
Program A File C
• Data used by the program is
copied into main memory
Program A
• The operating system keeps a Program B

record of where each program and


its data are located
OS

• It must not overwrite existing


programs Array Program E
Operating systems
Unit 5 Software and security

Multi-tasking
• You may use your computer to do several tasks at
the same time with different software:
homework, playing music, messaging friends...
• There are many background programs running on
the computer as well
• They are taking it in turns to get
processor time to execute
instructions
• The OS must manage how the
programs share the processor
Operating systems
Unit 5 Software and security

Task Manager
Operating systems
Unit 5 Software and security

Interrupts
• Interrupts are signals sent to the CPU by external
devices to indicate an event that needs immediate
attention
• They tell the CPU to suspend its current activities
and execute appropriate instructions
• Hardware interrupts are generated by hardware
devices – for example, printer out of paper
• Software interrupts are generated by programs,
e.g. a divide-by-zero error will cause a calculation
to be abandoned and an error message displayed
Operating systems
Unit 5 Software and security

Examples of interrupts
• Think of some other events that could cause
• A hardware interrupt
• A software interrupt
Operating systems
Unit 5 Software and security

Peripheral management

• Peripherals are all the devices outside of the CPU


• Includes input and output devices, secondary storage

• The access speed of these is relatively slow


Operating systems
Unit 5 Software and security

Sending data to a printer


• The computer can send data thousands of times
faster than the printer can print it
• The computer sends the printer output to a print
buffer, a special area of memory in either the
computer or the printer, at full speed
• From here, it is transmitted it to the printer, typically a page at
a time
• The print buffer may store a number of jobs waiting to be
printed
Operating systems
Unit 5 Software and security

The print buffer


• The screenshot shows a print buffer in action
• It shows the status of each job in the buffer, and
whether it is printing or waiting its turn
Operating systems
Unit 5 Software and security

Storage device management


• The operating system must manage:
• Copying files from disk to main memory
• Copying data files back to secondary storage
Operating systems
Unit 5 Software and security

Disk and file management


• The hard disk in a
computer is a storage
peripheral
• The operating system:
• manages where on the
disk files are written
• keeps track of where they
are so they can be
retrieved
• makes sure no file
overwrites another file
Operating systems
Unit 5 Software and security

Managing security
• The operating system organises user logins and
passwords

• May include password protection on individual files


• Controls access rights
Operating systems
Unit 5 Software and security

Access rights
• Access rights:
• If a computer is used by more than
one person, each user should be
able to see only their own files
• Users and system administrators
have different levels of access
rights
• Some users may be allowed to
read files but not edit them

• May include encryption of


some files
Operating systems
Unit 5 Software and security

Access rights
• Access rights may be set
on disks, folders and even
individual files
• How are access rights
used in school?
Operating systems
Unit 5 Software and security

Worksheet 2c
• Build the diamond shape jigsaw puzzle by matching
the terms on the edges of each piece
• Discuss why you think a certain piece belongs where
you have put it; make sure everyone in the group
agrees

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy