3. System Software
3. System Software
Software
System Software
When you purchase a personal computer, it usually has system software
installed on its hard disk.
System software consists of the programs that control or maintain the
operations of the computer and its devices. System software serves as
the interface between the user, the application software, and the
computer’s hardware.
A. Operating systems
B. Utility programs
Operating Systems
An operating system (OS) is a set of programs containing instructions that work together to
coordinate all the activities among computer hardware resources. Most operating systems
perform similar functions that include starting and shutting down a computer, providing a user
interface, managing programs, managing memory, coordinating tasks, configuring devices,
establishing an Internet connection, monitoring performance, providing file management and
other utilities, and automatically updating itself and certain utility programs. Some operating
systems also allow users to control a network and administer security.
Although an operating system can run from an optical disc and/or flash memory mobile media, in
most cases, the operating system is installed and resides on the computer’s hard disk. On
handheld computers and many mobile devices, the operating system may reside on a ROM chip.
Different sizes of computers typically use different operating systems because operating systems
generally, are written to run on a specific type of computer. For example, a mainframe computer
does not use the same operating system as a personal computer. Even the same types of
computers, such as desktop computers, may not use the same operating system.
Operating System Functions
Many different operating systems exist; however, most operating systems provide similar
functions. The operating system handles many of these functions automatically, without
requiring any instruction from a user.
4. Managing Memory
The purpose of memory management is to optimize the use of random-access
memory (RAM). RAM consists of one or more chips on the motherboard that hold
items such as data and instructions while the processor interprets and executes them.
The operating system allocates, or assigns, data and instructions to an area of memory
while they are being processed. Then, it carefully monitors the contents of memory.
Finally, the operating system releases these items when the processor no longer
requires them.
5. Coordinating Tasks
The operating system determines the order in which tasks are processed. A task, or
job, is an operation the processor manages. Tasks include receiving data from an
input device, processing instructions, sending information to an output device, and
transferring items from storage to memory and from memory to storage.
A multiuser operating system does not always process tasks on a first-come, first-
served basis. Sometimes, one user may have a higher priority than other users. In
this case, the operating system adjusts the schedule of tasks.
While waiting for devices to become idle, the operating system places items in
buffers. A buffer is a segment of memory or storage in which items are placed while
waiting to be transferred from an input device or to an output device.
The operating system commonly uses buffers with printed documents. This process,
called spooling, sends documents to be printed to a buffer instead of sending them
immediately to the printer. If a printer does not have its own internal memory or if
its memory is full, the operating system’s buffer holds the information waiting to
print while the printer prints from the buffer at its own rate of speed.
6. Configuring Devices
A driver is a small program that tells the operating system how to communicate with a
specific device. Each device on a computer, such as the mouse, keyboard, monitor,
printer, and scanner, has its own specialized set of commands and thus requires its own
specific driver. When you boot a computer, the operating system loads each device’s
driver.
If you attach a new device to a computer, such as a printer or scanner, its driver must be
installed before you can use the device. Today, most devices and operating systems
support Plug and Play. Plug and Play means the operating system automatically
configures new devices as you install them. With Plug and Play, a user can plug in a
device, turn on the computer, and then use the device without having to configure the
system manually.
UNIX
UNIX (pronounced YOU-nix) is a multitasking operating system. Several versions of this
operating system exist, each slightly different. Although some versions of UNIX have a
command line interface, most versions of UNIX offer a graphical user interface.
Linux
Linux is one of the faster growing operating systems. Linux (pronounced LINN-uks),
introduced in 1991, is a popular, multitasking UNIX-type operating system. Linux is open-
source software, which means its code is available to the public for use, modification, and
redistribution.
2. Server Operating Systems
A server operating system is an operating system that is designed specifically, to support a
network. A server operating system typically resides on a server. The client computers on
the network rely on the server(s) for resources.
Many of the stand-alone operating systems discussed in the previous section function as
clients and work in conjunction with a server operating system. Following are examples of
server operating systems:
➢ UNIX and Linux often are called multipurpose operating systems because they are
both stand-alone and server operating systems.
➢ Solaris, a version of UNIX developed by Sun Microsystems, is a server operating
system designed specifically for e-commerce applications.
➢ Novell’s NetWare is a server operating system designed for client/server networks.
Search Utility
A search utility is a program that attempts to locate a file on
your computer based on criteria you specify. The criteria
could be a word or words contained in a file, date the file
was created or modified, size of the file, location of the file,
file name, author/artist, and other similar properties. Search
utilities can look through documents, photos, music, and
other files.
Operating systems typically include a built-in search utility.
Uninstaller
An uninstaller is a utility that removes a program, as well as any
associated entries in the system files.
When you install a program, the operating system records the
information it uses to run the software in the system files. The
uninstaller deletes files and folders from the hard disk, as well as
removes program entries from the system files.
Image Viewer
An image viewer is a utility that allows users to display, copy,
and print the contents of a graphics file. With an image viewer,
users can see images without having to open them in a paint or
image editing program. Most operating systems include an image
viewer. Windows image viewer is called Windows Photo Viewer.
Disk Cleanup
A disk cleanup utility searches for and removes unnecessary files.
Unnecessary files may include downloaded program files, temporary
Internet files, deleted files, and unused program files.
Operating systems, such as Windows, include a disk scanner utility.
Disk Defragmenter
A disk defragmenter is a utility that reorganizes the files and unused
space on a computer’s hard disk so that the operating system accesses
data more quickly and programs run faster. When an operating system
stores data on a disk, it places the data in the first available sector on
the disk. It attempts to place data in sectors that are contiguous (next to
each other), but this is not always possible. When the contents of a file
are scattered across two or more noncontiguous sectors, the file is
fragmented. Fragmentation slows down disk access and thus the
performance of the entire computer.
Screen Saver
A screen saver is a utility that causes a display device’s screen to show a moving image or blank
screen if no keyboard or mouse activity occurs for a specified time. When you press a key on the
keyboard or move the mouse, the screen saver disappears, and the screen returns to the previous
state.
Screen savers originally were developed to prevent a problem called ghosting, in which images
could be etched permanently on a monitor’s screen. Although ghosting is not as severe of a
problem with today’s displays, manufacturers continue to recommend that users install screen
savers for this reason. Screen savers also are popular for security, business, and entertainment
purposes. To secure a computer, users configure their screen saver to require a password to
deactivate.
Personal Firewall
A personal firewall is a utility that detects and protects a personal computer from unauthorized intrusions.
Personal firewalls constantly monitor all transmissions to and from a computer.
When connected to the Internet, your computer is vulnerable to attacks from a hacker. A hacker is someone
who tries to access a computer or network illegally. Users with broadband Internet connections, such as
through DSL and cable Internet service, are even more susceptible than those with dial-up access because
the Internet connection always is on.
Operating systems often include a personal firewall. Windows automatically enables its built-in personal
firewall, called Windows Firewall, upon installation of the operating system.
Antivirus Programs
The term, computer virus, describes a potentially damaging computer program that affects, or infects, a
computer negatively by altering the way the computer works without the user’s knowledge or permission.
Once the virus is in a computer, it can spread throughout and may damage your files and operating system.
Computer viruses do not generate by chance. The programmer of a virus, known as a virus author,
intentionally writes a virus program.
A worm copies itself repeatedly, for example, in memory or over a network, using up system resources and
possibly shutting the system down. A Trojan horse hides within or looks like a legitimate program such as a
screen saver. Trojan horse does not replicate itself to other computers.
An antivirus program protects a computer against viruses by identifying and removing any computer
viruses found in memory, on storage media, or on incoming files. McAfee VirusScan, Norton AntiVirus, and
Windows Security are some of best Antivirus Programs.
Spyware and Adware Removers
Anti-Spam Programs:
Spam is an unsolicited e-mail message or newsgroup posting sent to many recipients.
Spam is Internet junk mail. An anti-spam program is a filtering program that attempts to
remove spam before it reaches your inbox.
Web Filters:
Web filtering software is a program that restricts access to certain material on the Web.
Some restrict access to specific Web sites; others filter sites that use certain words or
phrases.
Phishing Filters:
Phishing is a scam in which a perpetrator attempts to obtain your personal and/or financial
information. A phishing filter is a program that warns or blocks you from potentially
fraudulent or suspicious Web sites.
Pop-Up Blockers:
A pop-up ad is an Internet advertisement that suddenly appears in a new window in the
foreground of a Web page displayed in your browser. A pop-up blocker is a filtering
program that stops pop-up ads from displaying on Web pages.
File Compression
A file compression utility shrinks the size of a file(s). A compressed file takes up less
storage space than the original file. Compressing files frees up room on the storage
media and improves system performance.
Compressed files sometimes are called zipped files. When you receive or download a
compressed file, you must uncompress it. To uncompress, or unzip, a file, you restore
it to its original form. Two popular stand-alone file compression utilities are PKZIP
and WinZip.
Media Player
A media player is a program that allows you to view images and animation, listen to
audio, and watch video files on your computer. Media players may also include the
capability to organize media files, convert them to different formats, connect to and
purchase media from an online media store, download podcasts and vodcasts, burn
audio CDs, and transfer media to portable media players. Windows includes Windows
Media Player.
Disc Burning
Disc burning software writes text, graphics, audio, and video files on a recordable or
rewritable CD, DVD, or Blu-ray Disc. This software enables the home user easily to back up
contents of their hard disk on an optical disc and make duplicates of un-copy righted music or
movies. Disc burning software usually also includes photo editing, audio editing, and video
editing capabilities.
When you buy a recordable or rewritable disc, it typically includes burning software. You also
can buy disc burning software for a cost of less than $100.