0% found this document useful (0 votes)
2 views

3. System Software

System software is essential for managing computer operations and includes operating systems and utility programs. Operating systems coordinate hardware activities, provide user interfaces, manage memory and tasks, and ensure security, while utility programs assist with maintenance tasks. Different types of operating systems exist, including stand-alone, server, and embedded systems, each serving specific functions and environments.

Uploaded by

rashidmahnoor97
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

3. System Software

System software is essential for managing computer operations and includes operating systems and utility programs. Operating systems coordinate hardware activities, provide user interfaces, manage memory and tasks, and ensure security, while utility programs assist with maintenance tasks. Different types of operating systems exist, including stand-alone, server, and embedded systems, each serving specific functions and environments.

Uploaded by

rashidmahnoor97
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

System

Software
System Software
When you purchase a personal computer, it usually has system software
installed on its hard disk.
System software consists of the programs that control or maintain the
operations of the computer and its devices. System software serves as
the interface between the user, the application software, and the
computer’s hardware.

Two types of system software are

A. Operating systems
B. Utility programs
Operating Systems
An operating system (OS) is a set of programs containing instructions that work together to
coordinate all the activities among computer hardware resources. Most operating systems
perform similar functions that include starting and shutting down a computer, providing a user
interface, managing programs, managing memory, coordinating tasks, configuring devices,
establishing an Internet connection, monitoring performance, providing file management and
other utilities, and automatically updating itself and certain utility programs. Some operating
systems also allow users to control a network and administer security.

Although an operating system can run from an optical disc and/or flash memory mobile media, in
most cases, the operating system is installed and resides on the computer’s hard disk. On
handheld computers and many mobile devices, the operating system may reside on a ROM chip.

Different sizes of computers typically use different operating systems because operating systems
generally, are written to run on a specific type of computer. For example, a mainframe computer
does not use the same operating system as a personal computer. Even the same types of
computers, such as desktop computers, may not use the same operating system.
Operating System Functions
Many different operating systems exist; however, most operating systems provide similar
functions. The operating system handles many of these functions automatically, without
requiring any instruction from a user.

1. Starting and Shutting Down a Computer


Booting is the process of starting or restarting a computer. When turning on a computer
that has been powered off completely, you are performing a cold boot.
A warm boot, by contrast, is the process of using the operating system to restart a
computer. With Windows, for example, you can perform a warm boot by clicking a menu
command.
Each time you boot a computer, the kernel and other frequently used operating system
instructions are loaded, or copied, from storage into the computer’s memory (RAM). The
kernel is the core of an operating system that manages memory and devices, maintains the
computer’s clock, starts programs, and assigns the computer’s resources, such as devices,
programs, data, and information. The kernel is memory resident, which means it remains
in memory while the computer is running. Other parts of the operating system are
nonresident, that is, these instructions remain on a storage medium until they are needed.
2. Providing a User Interface
A user interface controls how you enter data and instructions and how information is
displayed on the screen. Two types of user interfaces are graphical and command-line.
i. Graphical User
With a graphical user interface (GUI), you interact with menus and visual images
such as buttons and other graphical objects to issue commands. Many current GUI
operating systems incorporate features like those of a Web browser.
Windows 7 offers two different GUIs, depending on your hardware configuration.
Computers with less than 1 GB of RAM work with the Windows 7 Basic interface.
Computers with more than 1 GB of RAM work with the Windows 7 Aero
interface, also known as Windows Aero.
ii. Command-Line Interface
To configure devices, manage system resources, and troubleshoot network
connections, network administrators and other advanced users work with a
command-line interface. In a command-line interface, a user types commands or
presses special keys on the keyboard to enter data and instructions. Some people
consider command-line interfaces difficult to use because they require exact
spelling, grammar, and punctuation.
3. Managing Programs
Some operating systems support a single user and only one running program at a
time. Others support thousands of users running multiple programs. How an
operating system handles programs directly affects your productivity.
A single user/multitasking operating system allows a single user to work on two or
more programs that reside in memory at the same time.
When a computer is running multiple programs concurrently, one program is in the
foreground and the others are in the background. The one in the foreground is the
active program, that is, the one you currently are using. The other programs running
but not in use are in the background.

4. Managing Memory
The purpose of memory management is to optimize the use of random-access
memory (RAM). RAM consists of one or more chips on the motherboard that hold
items such as data and instructions while the processor interprets and executes them.
The operating system allocates, or assigns, data and instructions to an area of memory
while they are being processed. Then, it carefully monitors the contents of memory.
Finally, the operating system releases these items when the processor no longer
requires them.
5. Coordinating Tasks
The operating system determines the order in which tasks are processed. A task, or
job, is an operation the processor manages. Tasks include receiving data from an
input device, processing instructions, sending information to an output device, and
transferring items from storage to memory and from memory to storage.

A multiuser operating system does not always process tasks on a first-come, first-
served basis. Sometimes, one user may have a higher priority than other users. In
this case, the operating system adjusts the schedule of tasks.

While waiting for devices to become idle, the operating system places items in
buffers. A buffer is a segment of memory or storage in which items are placed while
waiting to be transferred from an input device or to an output device.
The operating system commonly uses buffers with printed documents. This process,
called spooling, sends documents to be printed to a buffer instead of sending them
immediately to the printer. If a printer does not have its own internal memory or if
its memory is full, the operating system’s buffer holds the information waiting to
print while the printer prints from the buffer at its own rate of speed.
6. Configuring Devices
A driver is a small program that tells the operating system how to communicate with a
specific device. Each device on a computer, such as the mouse, keyboard, monitor,
printer, and scanner, has its own specialized set of commands and thus requires its own
specific driver. When you boot a computer, the operating system loads each device’s
driver.
If you attach a new device to a computer, such as a printer or scanner, its driver must be
installed before you can use the device. Today, most devices and operating systems
support Plug and Play. Plug and Play means the operating system automatically
configures new devices as you install them. With Plug and Play, a user can plug in a
device, turn on the computer, and then use the device without having to configure the
system manually.

7. Establishing an Internet Connection


Operating systems typically provide a means to establish Internet connections. For
example, Windows includes a Set Up a Connection or Network wizard that guides
users through the process of setting up a connection between a computer and an
Internet access provider.
8. Monitoring Performance
Operating systems typically contain a performance monitor. A performance monitor
is a program that assesses and reports information about various computer resources
and devices.

9. Providing File Management and Other Utilities


Operating systems often provide users with the capability of managing files,
searching for files, viewing images, securing a computer from unauthorized access,
uninstalling programs, cleaning up disks, defragmenting disks, diagnosing problems,
backing up files and disks, and setting up screen savers.

10. Updating Software Automatically


Many popular programs, including most operating systems, include an automatic
update feature that automatically provides updates to the program. With an operating
system, these updates can include fixes to program bugs (errors), enhancements to
security, modifications to device drivers, access to new or expanded components.
Many software makers provide free downloadable updates, sometimes called a
service pack, to users who have registered and/or activated their software.
11. Controlling a Network
Some operating systems are designed to work with a server on a network. A server
operating system is an operating system that organizes and coordinates how multiple
users access and share resources on a network. Resources include hardware, software,
data, and information. For example, a server operating system allows multiple users to
share a printer, Internet access, files, and programs.

12. Administering Security


Computer and network administrators typically have an administrator account that
enables them to access all files and programs on the computer or network, install
programs, and specify settings that affect all users on a computer or network. Settings
include creating user accounts and establishing permissions.
For each user, the network administrator establishes a user account, which enables a
user to access or log on to a computer or a network. A username, or user ID, is a
unique combination of characters, such as letters of the alphabet or numbers, that
identifies one specific user.
A password is a private combination of characters associated with the username that
allows access to certain computer resources. Some operating systems allow the
computer or network administrator to assign passwords to files and commands,
restricting access to only authorized users.
Types of Operating Systems
When you purchase a new computer or mobile device, it typically has an
operating system preinstalled. As new versions of the operating system are
released, users upgrade their existing computers and mobile devices to
incorporate features of the new version. Purchasing an operating system
upgrade usually costs less than purchasing the entire operating system. The
three basic categories of operating systems that exist today are stand-alone,
server, and embedded.

1. Stand-Alone Operating Systems


A stand-alone operating system is a complete operating system that works
on a desktop computer, notebook computer, or mobile computing device.
Some stand-alone operating systems are called client operating systems
because they also work in conjunction with a server operating system.
Client operating systems can operate with or without a network. Examples
of currently used stand-alone operating systems are Windows, MacOS,
UNIX, and Linux.
Windows 7 to 11
In the mid-1980s, Microsoft developed its first version of Windows, which provided a
graphical user interface (GUI). Since then, Microsoft continually has updated its Windows
operating system. Windows 11 is Microsoft’s fastest, most efficient operating system to date.

MacOS X to MacOS 15 Sequoia


Since it was released with Macintosh computers in 1984, Apple’s Macintosh operating system
has set the standard for operating system ease of use. The latest version, MacOS 15 Sequoia, is
a multitasking operating system available only for computers manufactured by Apple.

UNIX
UNIX (pronounced YOU-nix) is a multitasking operating system. Several versions of this
operating system exist, each slightly different. Although some versions of UNIX have a
command line interface, most versions of UNIX offer a graphical user interface.

Linux
Linux is one of the faster growing operating systems. Linux (pronounced LINN-uks),
introduced in 1991, is a popular, multitasking UNIX-type operating system. Linux is open-
source software, which means its code is available to the public for use, modification, and
redistribution.
2. Server Operating Systems
A server operating system is an operating system that is designed specifically, to support a
network. A server operating system typically resides on a server. The client computers on
the network rely on the server(s) for resources.
Many of the stand-alone operating systems discussed in the previous section function as
clients and work in conjunction with a server operating system. Following are examples of
server operating systems:
➢ UNIX and Linux often are called multipurpose operating systems because they are
both stand-alone and server operating systems.
➢ Solaris, a version of UNIX developed by Sun Microsystems, is a server operating
system designed specifically for e-commerce applications.
➢ Novell’s NetWare is a server operating system designed for client/server networks.

3. Embedded Operating Systems


The operating system on most mobile devices and many consumer electronics, called an
embedded operating system, resides on a ROM chip. Popular embedded operating systems
include Windows Embedded CE, Windows Phone 7, Palm OS, iPhone OS, BlackBerry,
Google Android, embedded Linux, and Symbian OS.
Utility Programs
A utility program, also called a utility, is a type of system
software that allows a user to perform maintenance-type
tasks, usually related to managing a computer, its
devices, or its programs. Most operating systems include
several built-in utility programs. Users often buy stand-
alone utilities, however, because they offer improvements
over those included with the operating system.

Functions provided by utility programs include the


following: managing files, searching for files,
uninstalling programs, viewing images, cleaning up
disks, defragmenting disks, backing up files and disks,
setting up screen savers, securing a computer from
unauthorized access, protecting against viruses, removing
spyware and adware, filtering Internet content,
compressing files, playing media files, burning optical
discs and maintaining a personal computer.
File Manager
A file manager is a utility that performs functions related to
file management. Some of the file management functions
that a file manager performs are displaying a list of files on
a storage medium; organizing files in folders; and copying,
renaming, deleting, moving, and sorting files. A folder is a
specific named location on a storage medium that contains
related documents.
Operating systems typically include a file manager.

Search Utility
A search utility is a program that attempts to locate a file on
your computer based on criteria you specify. The criteria
could be a word or words contained in a file, date the file
was created or modified, size of the file, location of the file,
file name, author/artist, and other similar properties. Search
utilities can look through documents, photos, music, and
other files.
Operating systems typically include a built-in search utility.
Uninstaller
An uninstaller is a utility that removes a program, as well as any
associated entries in the system files.
When you install a program, the operating system records the
information it uses to run the software in the system files. The
uninstaller deletes files and folders from the hard disk, as well as
removes program entries from the system files.

Image Viewer
An image viewer is a utility that allows users to display, copy,
and print the contents of a graphics file. With an image viewer,
users can see images without having to open them in a paint or
image editing program. Most operating systems include an image
viewer. Windows image viewer is called Windows Photo Viewer.
Disk Cleanup
A disk cleanup utility searches for and removes unnecessary files.
Unnecessary files may include downloaded program files, temporary
Internet files, deleted files, and unused program files.
Operating systems, such as Windows, include a disk scanner utility.

Disk Defragmenter
A disk defragmenter is a utility that reorganizes the files and unused
space on a computer’s hard disk so that the operating system accesses
data more quickly and programs run faster. When an operating system
stores data on a disk, it places the data in the first available sector on
the disk. It attempts to place data in sectors that are contiguous (next to
each other), but this is not always possible. When the contents of a file
are scattered across two or more noncontiguous sectors, the file is
fragmented. Fragmentation slows down disk access and thus the
performance of the entire computer.

Defragmenting the disk or reorganizing it so that the files are stored in


contiguous sectors, solves this problem. Operating systems usually
include a disk defragmenter. Windows Disk Defragmenter is available
in the System Tools list.
Backup and Restore Utilities
A backup utility allows users to copy, or back up, selected files or an entire hard disk to another
storage medium such as another hard disk, optical disc, USB flash drive, or tape. During the
backup process, the backup utility monitors progress and alerts you if it needs additional media,
such as another disc. Many backup programs compress, or shrink the size of, files during the
backup process. By compressing the files, the backup program requires less storage space for the
backup files than for the original files.

Screen Saver
A screen saver is a utility that causes a display device’s screen to show a moving image or blank
screen if no keyboard or mouse activity occurs for a specified time. When you press a key on the
keyboard or move the mouse, the screen saver disappears, and the screen returns to the previous
state.
Screen savers originally were developed to prevent a problem called ghosting, in which images
could be etched permanently on a monitor’s screen. Although ghosting is not as severe of a
problem with today’s displays, manufacturers continue to recommend that users install screen
savers for this reason. Screen savers also are popular for security, business, and entertainment
purposes. To secure a computer, users configure their screen saver to require a password to
deactivate.
Personal Firewall
A personal firewall is a utility that detects and protects a personal computer from unauthorized intrusions.
Personal firewalls constantly monitor all transmissions to and from a computer.
When connected to the Internet, your computer is vulnerable to attacks from a hacker. A hacker is someone
who tries to access a computer or network illegally. Users with broadband Internet connections, such as
through DSL and cable Internet service, are even more susceptible than those with dial-up access because
the Internet connection always is on.
Operating systems often include a personal firewall. Windows automatically enables its built-in personal
firewall, called Windows Firewall, upon installation of the operating system.

Antivirus Programs
The term, computer virus, describes a potentially damaging computer program that affects, or infects, a
computer negatively by altering the way the computer works without the user’s knowledge or permission.
Once the virus is in a computer, it can spread throughout and may damage your files and operating system.
Computer viruses do not generate by chance. The programmer of a virus, known as a virus author,
intentionally writes a virus program.
A worm copies itself repeatedly, for example, in memory or over a network, using up system resources and
possibly shutting the system down. A Trojan horse hides within or looks like a legitimate program such as a
screen saver. Trojan horse does not replicate itself to other computers.
An antivirus program protects a computer against viruses by identifying and removing any computer
viruses found in memory, on storage media, or on incoming files. McAfee VirusScan, Norton AntiVirus, and
Windows Security are some of best Antivirus Programs.
Spyware and Adware Removers

Spyware is a program placed on a computer without the


user’s knowledge that secretly collects information about
the user, often related to Web browsing habits. The
spyware program communicates information it collects to
some outside source while you are online. Adware is a
program that displays an online advertisement in a banner
or pop-up window on Web pages, e-mail, or other Internet
services. Sometimes, spyware is hidden in adware.

A spyware remover is a program that detects and deletes


spyware, and similar programs. An adware remover is a
program that detects and deletes adware. Most spyware
and adware removers cost less than $50; some are
available on the Web at no cost. Some operating systems
include spyware and adware removers.
Internet Filters
Filters are programs that remove or block certain items from being displayed. Four widely used
Internet filters are anti-spam programs, Web filters, phishing filters, and pop-up blockers.

Anti-Spam Programs:
Spam is an unsolicited e-mail message or newsgroup posting sent to many recipients.
Spam is Internet junk mail. An anti-spam program is a filtering program that attempts to
remove spam before it reaches your inbox.
Web Filters:
Web filtering software is a program that restricts access to certain material on the Web.
Some restrict access to specific Web sites; others filter sites that use certain words or
phrases.
Phishing Filters:
Phishing is a scam in which a perpetrator attempts to obtain your personal and/or financial
information. A phishing filter is a program that warns or blocks you from potentially
fraudulent or suspicious Web sites.
Pop-Up Blockers:
A pop-up ad is an Internet advertisement that suddenly appears in a new window in the
foreground of a Web page displayed in your browser. A pop-up blocker is a filtering
program that stops pop-up ads from displaying on Web pages.
File Compression
A file compression utility shrinks the size of a file(s). A compressed file takes up less
storage space than the original file. Compressing files frees up room on the storage
media and improves system performance.
Compressed files sometimes are called zipped files. When you receive or download a
compressed file, you must uncompress it. To uncompress, or unzip, a file, you restore
it to its original form. Two popular stand-alone file compression utilities are PKZIP
and WinZip.

Media Player
A media player is a program that allows you to view images and animation, listen to
audio, and watch video files on your computer. Media players may also include the
capability to organize media files, convert them to different formats, connect to and
purchase media from an online media store, download podcasts and vodcasts, burn
audio CDs, and transfer media to portable media players. Windows includes Windows
Media Player.
Disc Burning
Disc burning software writes text, graphics, audio, and video files on a recordable or
rewritable CD, DVD, or Blu-ray Disc. This software enables the home user easily to back up
contents of their hard disk on an optical disc and make duplicates of un-copy righted music or
movies. Disc burning software usually also includes photo editing, audio editing, and video
editing capabilities.
When you buy a recordable or rewritable disc, it typically includes burning software. You also
can buy disc burning software for a cost of less than $100.

Personal Computer Maintenance


Operating systems typically include a diagnostic utility that diagnoses computer problems but
does not repair them. A personal computer maintenance utility identifies and fixes operating
system problems, detects and repairs disk problems, and includes the capability of improving
a computer’s performance.
Norton SystemWorks is a popular personal computer maintenance utility designed for
Windows operating systems.

You might also like