ICT Skills: Types of Operating Systems An Operating System (OS)
ICT Skills: Types of Operating Systems An Operating System (OS)
SKILLS
• Memory Management
• Processor Management
• Device Management
• File Management
• Security
• Control over system performance
• Job accounting
• Error detecting aids
• Coordination between other software and users
1
The different types of operating systems are as follows:
Interactive (GUI-based) A graphical user interface is a user-friendly operating system in
which commands can be entered by clicking/double-clicking/right-clicking a mouse.
Windows operating system is an example of an interactive operating system.
Single-user, single-task operating system: This type of operating system allows only
one user to do a task on the computer and one thing at a time.
Single-user, multi-task operating system: This type of operating system is used on
Desktop computers, laptops, where a single user can operate on several programs at the
same time. For example, Windows, Apple MacOS are examples of single-user multi task
operating system.
Multi-user A multi-user operating system enables multiple users to work on the same
computer at different times or simultaneously.
Real Time A real time operating system is used to control machinery, scientific
instruments, like robots, in complex animations and computer controlled automated
machines. A real-time operating system is a computing environment that reacts to input
within a specific period of time. It manages the resources of the computer so that any
particular operation is executed in the same amount of time every time it is executed.
Windows CE and Lynx OS are examples of real-time operating systems.
Figure 1
3
Computer :
It displays all the storage areas of the computer . Through the Computer icon, you can access all
drives, files, and folders on the computer. When you double-click Computer icon, a window shown
below in Figure 2 appears on the screen.
Taskbar is the long horizontal bar present at the bottom of the screen. To left of the Taskbar is the
Start button and to the right appears Date/Time. You can also see icons of active applications and
some shortcuts on the Taskbar
Fig 3 Taskbar
Start button it is located on the left of the taskbar. Clicking the Start button (Figure 4) opens the
Start menu and provides access to programs and features, like:
Shut Down: - allows the user to turn off the computer
All Programs: - Provides access to all the installed programs and applications. To start an
application, just click it.
Search Box: - This allows the user to search a file or a folder or run executable files. Control
4
panel: - This allows the user to change various settings.
Recycle Bin Files and folders deleted by the user are stored in the Recycle Bin. From Recycle
Bin, you can retrieve files or folders deleted by mistake.
File Concept, File Operations, File Organization, Directory Structures And File-
System Structures
Everything you store on your computer is stored in the form of a file. There are specific naming
conventions for naming files or folders, like characters that can be used, maximum number of
characters, etc. Files can be separately placed into groups, called folders/directories. Each
directory/folder can contain related files and/or sub-folders
2. Select the drive in which you want to create a new folder. Say, Local Disk D:.
5
3. Window will open up showing files and folders in Local Disc D: Click New Folder on the toolbar.
2. In the Shortcut menu, click New and select the type of the file you want to create.
3. Type the new name or edit the existing name and press the Enter key.
You can copy a file or a folder in any one of the following ways:
1. Shortcut menu:
c. Select the drive or the folder where you want to make a copy of the selected file or folder.
To copy a file or a folder, hold down the Ctrl key while dragging it to the new location.
3. Using Keyboard:
You can move a file or a folder in any one of the following ways:
1. Shortcut menu:
c. Select the drive or the folder where you want to move the selected file or folder.
2. Drag and Drop method: To copy a file or a folder, select the file and drag it to a new location.
3. Using Keyboard:
You can permanently delete the contents of the Recycle Bin in any one of the following ways:
Right-click the Recycle Bin icon and then click Empty Recycle Bin
OR
To recover a file from the Recycle Bin, right-click the file, and then click Restore.
Or
• Keep the components of the computer, like keyboard, mouse, monitor, etc. clean.
• Ensure backups are working properly by periodically restoring or checking of data. You should
7
use external hard drive for backup of data on your computer.
How to take
Always keep your anti-virus software updated so that it can detect new viruses. Full system scan
should be done to periodically, preferably weekly to scan for viruses.
A regular disk defragmentation should be done to remove all unnecessary information that slows
down the computer.
Disk defragmentation done at regular intervals helps the disc space to be used at an optimal level.
Take regular backup of the data on your computer. In case the data is lost due to any reason,
system failure, virus attack, etc., you can easily retrieve your data using backup files till your last
update.
System should be upgraded with new updates that were not there at the time of purchase, like,
increasing RAM, to improve the performance. Also storage space should also be increased for
storage of more information.
If you are getting some disc errors, then make sure that temporary internet files are deleted from
time to time.
8
QUESTIONS-1 MARK
1 Here are the steps that take place when starting a computer. Rearrange the steps 1
in the correct order. i) Desktop appears after login ii) Login screen appears iii) Power
on Self-Test (POST) starts iv) Operating system starts v) Welcome screen appears
a) i) -> ii) -> iii) -> iv) -> v)
b) ii) -> iv) -> iii) -> v) -> i)
c) iii) -> iv) -> v) -> ii) -> i)
d) iii) -> v) -> iv) -> ii) -> i)
2 Which one of the following is an example of Operating System? 1
a) Microsoft Word
b) Microsoft Windows
c) Microsoft Excel
d) Microsoft Access
3 Given below are the steps to make a copy of folder ‘D:\Myfolder’ in ‘C:\Documents’. 1
Rearrange the steps in the correct order.
(i) Right click anywhere in the folder and select Paste option from the
shortcut menu or use Ctrl+V keyboard keys.
(ii) Select the C: drive and locate Documents folder.
(iii) Right click on Myfolder and select Paste option from the shortcut menu or
use Ctrl+C keyboard keys.
(iv) (iv) Select the D: drive and locate Myfolder.
(a) (iii) -> (i) -> (ii) -> (iv)
(b) (iv) -> (ii) -> (iii) -> (i)
(c) (iv) -> (iii) -> (ii) -> (i)
(d) (i) -> (ii) -> (iii) -> (iv)
4 Which of the following is not an example of Antivirus software? 1
(i) McAfee (ii) Norton (iii) Disk Clean-up (iv) Kaspersky
5 Given below are the components of the taskbar in Windows 7. Rearrange the icons 1
from left to right of the taskbar. (a)Date/Time (b) Start Button (c) Notification Area
(d) File Explorer
(i) (c) -> (a) -> (b) -> (d) (ii) (b) -> (d) -> (c) -> (a) (iii) (d) -> (c) -> (b) -> (a) (iv) (a) ->
(b) -> (c) -> (d)
6 Which of the following is not a symptom of a computer affected with virus? 1
(i) Computer stops responding (ii) Computer restarts on its own (iii) Computer can’t
open a permanently deleted file (iv) Computer runs very slowly
9
7 The cleaning of software installed in the computer cannot be achieved by 1
.
a) Disk clean-up b) backup c) Cleaning CPU cabinet d) Installing antivirus software
8 Which of the following will you opt for saving a file? 1
(a) save button on standard toolbar
(b) save option from file menu
(c) pressing Ctrl+S
(d) any of the above
9 is leakage of information stored in a computer. 1
10
16 Which one of the following shortcut keys is used to paste a file? 1
a. Ctrl + c
b. Ctrl + p
c. Ctrl + v
d. Ctrl + x
17 What are the best options for caring for computer devices? 1
a. Keeping a Device Clean
b. Prepare a Maintenance Schedule
c. Do not overcharge your battery
d. All of the above
20 Sometimes we get mails from companies who are advertising a product or trying to 1
attract you to their website. Such mails are called .
a. Trash
b. Inbox
c. Spam
d. None of the above
21 What happens if you keep a device plugged in after it has been fully charged? 1
a. It can break.
b. It can overheat.
c. It can stop functioning.
d. Data can get corrupt.
23 Which option does not need to be enabled in order to keep a device cool? 1
a. Make sure the computer’s CPU fan is working.
b. Keep the device unplugged when in use.
c. Do not cover a laptop with a blanket.
d. Avoid leaving the device in the sun.
11
24 Which of the following is required for keyboard maintenance? 1
a. Use a very dilute combination of soap and water applied with a non-abrasive
cloth to remove stains from the keycaps.
b. Turn the keyboard upside down and shake it to remove foreign material.
c. Blow dust and other particles with the help of a blower.
d. All of the above.
27 When a hacker takes your personal information and assumes your identity, this is 1
referred to as theft.
a. Physical
b. Identity
c. Software Piracy
d. None of the above
29 Sometimes you may receive very attractive offers saying you have won a huge 1
amount of money in a lottery and that you can claim the prize by depositing a
certain amount of money known as .
a. Trojan House
b. Online Predator
c. Theft
d. Internet Scams
DESCRIPTIVE QUESTIONS
12
1 What do you mean by Operating System? 1
Ans. Operating System: It is a software that acts as an interface between the user
and the computer.
2 Give two examples of mobile operating system. 2
Ans.
File Folder
a. A Notepad file
b. A Sound File
c. An image file
13
b. .mp3
c. .jpg
7 Write the steps to create folder on desktop? 1
a. Cut
b. Copy
c. Paste
Ans. Backing up data means to save the information present on your computer on
another device, such as CD/DVD drives or hard disk.
Ans. We get mails from companies who are advertising a product or trying to
attract you to their website. Such mails are called Spam.
Ans. Viruses are computer programs that can damage the data and software
programs or steal the information stored on a computer.
13 Name two types of Virus. 2
Ans. Few tips to protect our data from online theft and viruses are:
a. Use passwords to login to your computer:
b. Install Anti-virus and Firewall:
c. Use Data Encryption
14
d. Give details of your credit card or bank account only on secure sites
15 What do you mean by threats to Computer? 1
Ans. Threats are the ways in which personal information can be leaked from a
computer without our knowing.
16 List the various threats to a computer and its data. 2
1 Virus
2. Phishing
3. Online theft
4. Cyber crime
17 What is ‘s’ in “https”? 1
18 a. Antivirus
15
19 a. Delete
20 c. Spam
21 b. It can overheat.
25 c. Both a) and b)
26 a. Physical
27 b. Identity
28 b. Online Predator
29 d. Internet Scams
30 b. https://
16