CHAPTER 2 Hardware Software Concept
CHAPTER 2 Hardware Software Concept
Processor Management:
This deals with management of the Central Processing Unit (CPU).
The operating system takes care of the allotment of CPU time to different processes. This is
called scheduling.
How do we classify operating System?
Types of Operating System OS are classified into the following types depending on their capability of
processing
Single User and Single Task OS: It is used on a standalone single computer for performing a
single task. Operating systems for Personal Computers (PC) are single-user OS. Single user OS
are simple operating system designed to manage one task at a time. MS-DOS is an example of
single user OS.
Multiuser OS is used in mini computers or mainframes that allow same data and applications to
be accessed by multiple users at the same time. The users can also communicate with each
other. Linux and UNIX are examples of multiuser OS.
Multiprocessing OS have two or more processors for a single running process. Processing
takes place in parallel and is also called parallel processing. Each processor works on different
parts of the same task, or, on two or more different tasks. Since execution takes place in parallel,
they are used for high speed execution, and to increase the power of computer. Linux, UNIX and
Windows 7 are examples of multiprocessing OS.
Time sharing Operating System: It allows execution of more than one tasks or processes
concurrently. For this, the processor time is divided amongst different tasks. This division of time
is also called time sharing. The processor switches rapidly between various processes. After the
stipulated time is over, the CPU shifts to next task in waiting,
Real Time Operating System: It is a multitasking operating system designed for real time
applications like robotics. In this type of operating system, the tasks have to be done within a
fixed deadline. System performance is good if task is finished within this deadline. If it is not
done, the situation is called Deadline Overrun. Lesser the deadline over run, better is the system
efficiency. Hence Real Time operating systems depend not only on the logical result of the
computation but also on the time in which the results are produced.
Distributed Operating System: On a network data is stored and processed on multiple
locations. The Distributed Operating System is used on networks as it allows shared data/files to
be accessed from any machine on the network in a transparent manner. We can insert and
remove the data and can even access all the input and output devices. The users feel as if all
data is available on their workstation itself.
Interactive Operating System: This is the operating system that provides a Graphic User
Interface (GUI) through which the user can easily navigate and interact. The computer responds
almost immediately after an instruction has been entered, and the user can enter new
instructions after seeing the results of the previous instructions.
File Virus: A file virus generally attacks executable files. They can attach to various locations of the
original file, replace code, fill in open spaces in the code, or create companion files to work with an
executable file. Most of the file viruses are memory resident and wait in the memory until the user runs
another program. While another program is running, the virus replicates.
Macro Virus: This virus infects an important file called normal.dot of MS Word. As soon as the
application is opened the virus gets activated. It damages the formatting of documents and even may not
allow editing or saving of documents.
Trojan Horse: It is a code generally hidden in games or spreadsheets. Since they are hidden, the
program seems to function as the user wants but actually it is destroying the program. A Trojan horse
does not require a host program to embed itself. It is a complete program. Its main objective is to cause
harm to the data. They can create bad sectors on the disk, destroy file allocation tables and cause the
system to hang.
Worm: Worm is a program capable of replicating itself on a computer network. A worm also does not
require a host as it is a self contained program. They generally travel from one computer to another
across communication links on a network. They generally disrupt routine services.
Disk Defragmenter The memory is used in small chunks randomly. Sometimes when a memory
chunk of appropriate size is not available, the operating system breaks or fragments the files resulting in
slower access to files. A disk defragmenter scans the hard disk for fragmented files and brings all the
fragments together.
Backup Utility This utility is used to create the copy of the complete or partial data stored in a
disk or CD on any other disk. In case the hard disk crashes or some other system failure occurs, the files
can be restored using backup software.
Compression Utility This utility is used to compress largeDisk Cleaner This utility scans for file
that have not been accessed/used since long. Such files might be occupying huge amount of memory
space. In that case the Disk Cleaner utility prompts the user to delete such files so as to create more
space on the disk. If the files are important, the user might take a backup before deleting them.
File Management Tools This utility helps the user in storing, indexing, searching and sorting
files and folders on the system. The most commonly used tool is the Windows Explorer and Google
Desktop.
An application software is bought by the user to perform specific applications or tasks, say for example
making a document or making a presentation or handling inventory or managing the employee database.
An application software can be of two types –
General Purpose Application Software
Customized Application software.
General Purpose Application Software Some of the application software is made for the common
users for day to day applications and uses. These are also referred as Office Tools. The users may use
them in the manner they want. Some of the popular types of general purpose application software are
discussed below:
Word Processor, Presentation Tools, Spreadsheet Packages, Database Management System
Customized Software Customized Software is one which is tailor made as per the user’s requirement.
Such type of software is customer specific. It is made keeping in mind the individual needs of the user
and so are also referred as Domain Specific Tools. Such software cannot be installed and used by any
other user/customer since the requirements may differ. Some examples of customized software are
discussed below: Inventory Management System & Purchasing System , School Management System,
Payroll System, Financial Accounting, Reservation System, Weather Forecasting system
******