Documente Academic
Documente Profesional
Documente Cultură
1. Operating System
2. Utility software
3. Applications software
CS Topic 5 - Computer Software v2
1. Operating system
2. Utility software
3. Applications software
1. Operating system
2. Utility software
3. Applications software
1. Operating system
2. Utility software
3. Applications software
Input/Output Management
Managing Processes
Resource Allocation
CS Topic 5 - Computer Software v2
File Management 1
This part of the OS manages file
operations and backing storage
allocation.
File Management 2
File Management uses its index to
work out exactly where on the disk
the file is stored. e.g. Track 10,
Sector 4.
Memory Management 1
Memory Management decides
where programs and data are to
be placed in RAM.
Memory Management 2
It makes sure that programs do
not access RAM space allocated
to other programs
Input/Output Management 1
It is the task of Input/Output
Management to do all the actual data
transfers and issue the appropriate
control signals to the peripheral
devices.
10
Input/Output Management 2
Different types of peripheral
devices work in different ways.
11
Managing Processes 1
A process is defined as being an
instance of a sequence of code in
execution
12
Managing Processes 2
At any give time, the OS has to
decide:
13
Resource Allocation
The competing processes
require access to resources.
14
1. Operating system
2. Utility software
3. Applications software
15
1. Operating system
2. Utility software
3. Applications software
16
Disk Editor
A disk editor is a utility program that lets
the user read, edit, and write the low-level
raw data on a disk.
Disk editor
Defragmenter
Virus checker
17
Defragmenter 1
Magnetic disks are organised so that they
store data in blocks of a fixed size.
Depending on its size, a file will typically
occupy several blocks.
Disk editor
Defragmenter
Virus checker
18
Defragmenter 2
When new files are saved the blocks may
be on different parts of the disk. It then
takes longer to access these files.
Disk editor
Defragmenter
Virus checker
19
Virus Checker
A virus is a program or programming code
that replicates by being copied or initiating
its copying to another program, computer
boot sector or document.
Disk editor
Defragmenter
Virus checker
20
file virus
boot sector virus
macro virus
Viruses can be classified by the type
of file which they infect.
file virus
A file virus attaches itself to an executable file (program
which you can run). e.g. Word, Photoshop, FIFA09.
boot sector virus
A boot sector virus infects the system files that your
computer uses when the bootstrap loader begins to
load in the operating system from disk.
CS Topic 5 - Computer Software v2
21
file virus
macro virus
What is a macro ?
22
file virus
macro virus
macro virus
A macro virus contains instructions which may damage a
document or other software.
It causes a sequence of actions to be performed automatically
when the application is started or something else triggers it.
Once a macro virus gets onto your machine, it can embed
itself in all future documents you create with the application.
This is how a macro virus spreads.
CS Topic 5 - Computer Software v2
23
replication
camouflage
watching
delivery
replication
A virus makes copies of itself into other program files.
camouflage
Virus program writers can have fake code within the program
to prevent virus checkers from spotting the patterns of
instructions which are commonly used in virus programs.
24
replication
camouflage
watching
delivery
watching
Some virus programs remain dormant in a computer until a
particular event triggers them into action. This can be a
certain date, time or the running of a specific application.
delivery
This is the term used for when the virus executes and carries
out its intended actions.
25
NO
A virus is a program or programming code that replicates
itself into another program or document.
A virus cannot be spread without a human action, (such as
running an infected program) to keep it going.
26
NO
Worms spread from computer to computer and, unlike a virus,
have the ability to travel without any help from a person
A worm does not alter files but resides in active memory and
replicates. Worms use parts of an operating system that are
automatic and usually invisible to the user.
27
NO
Due to the copying nature of a worm and its ability to travel
across networks the end result in most cases is that the worm
consumes too much system memory (or network bandwidth).
28
NO
Trojan horses do not reproduce by infecting other files
nor do they self-replicate.
29
NO
Some Trojans are designed to be more annoying than
malicious (like changing your desktop, adding silly active
desktop icons) or they can cause serious damage by deleting
files and destroying information on your system.
Trojans can also create a backdoor on your computer that
gives malicious users access to your system, allowing
confidential or personal information to be compromised.
CS Topic 5 - Computer Software v2
30
31
Use of checksum
The anti-virus software scans an
uninfected file and calculates a
checksum by adding up all the
binary codes in the file.
Use of checksum
Heuristic detection
32
Use of checksum
Heuristic detection
33
Heuristic detection
The term heuristics comes from a
Greek word meaning to find.
Use of checksum
Heuristic detection
34
Memory resident
monitoring
This type of anti-virus software is
loaded into RAM on start up and
remains in operation constantly for
as long as the computer is left on.
Use of checksum
Heuristic detection
35
There are many standard file formats for graphic files. Each
has its own advantages and disadvantages and users
should choose formats carefully depending on the purpose
for the graphic file.
Compression
Graphics files, particularly bit-mapped graphics, can
generate very large file sizes.
It is possible to analyse the data in the file and cut down on
the data which needs to be stored. This is known as
compression.
CS Topic 5 - Computer Software v2
36
Lossy Compression
This technique cuts down on the amount of data which
needs to be stored by discarding some of the data. This
means that the quality of the image is affected.
CS Topic 5 - Computer Software v2
37
jpeg
jpeg
gif
TIFF
JPEG is designed for compressing either full-colour or greyscale images of natural, real-world scenes. It works well on
photographs, naturalistic artwork, and similar material; not so
well on lettering, simple cartoons, or line drawings
38
jpeg
gif
TIFF
39
gif
jpeg
gif
TIFF
40
TIFF
jpeg
gif
TIFF
41
42