+ All Categories
Home > Documents > Software Runs the computer system Disk management...

Software Runs the computer system Disk management...

Date post: 28-Apr-2018
Category:
Upload: buiphuc
View: 219 times
Download: 5 times
Share this document with a friend
16
CIT 100 1 Software Norm Downey CIT 100 Systems vs. Application Software Controls the hardware Runs the computer system Operating systems (OS) Disk management tools System Software Provides services for people Programs to perform tasks Word processor, spreadsheets and database Application Software 2 System Software 3 System Software Includes all programs needed for a computer and its peripheral devices to function smoothly Consists of two parts Operating Systems (OS) Utilities 4
Transcript
Page 1: Software Runs the computer system Disk management …web.acd.ccac.edu/~ndowney/CIT100/Terms/SoftwareNetowrking.pdfIf your PC has 2 GB of RAM, and the OS Kernel takes up ½ a GB of

CIT 100 1

SoftwareNorm DowneyCIT 100

Systems vs. Application Software

• Controls the hardware

• Runs the computer system

• Operating systems (OS)

• Disk management tools

System Software

• Provides services for people

• Programs to perform tasks

• Word processor, spreadsheets and database

Application Software

2

System Software

3

System Software

• Includes all programs needed for a

computer and its peripheral devices

to function smoothly

•Consists of two parts

▫Operating Systems (OS)

▫Utilities

4

Page 2: Software Runs the computer system Disk management …web.acd.ccac.edu/~ndowney/CIT100/Terms/SoftwareNetowrking.pdfIf your PC has 2 GB of RAM, and the OS Kernel takes up ½ a GB of

CIT 100 2

What does an Operating System do?

• Starts computer – Booting Up

• Manages applications

• Manages computer memory

• Handles inputs and outputs

• Provides user interface

5

Booting Up

• Booting Up is the term for the process of loading the

operating system from the hard disk into RAM

• Two types of boots:

▫ Warm – PC already on – restart

▫ Cold – PC not already on

• The OS Kernel is the core part of the OS and must be

loaded in RAM memory for the computer to function

▫ RAM available = Total RAM – OS Kernel

▫ For example:

If your PC has 2 GB of RAM, and the OS Kernel takes up ½ a

GB of RAM you have 1½ GB of RAM left for other software

6

Managing Applications and Memory

• Pre-emptive Multitasking

▫ The OS controls applications access to computer memory

to ensure each has “fair” access to computer resources

• Virtual Memory

▫ Method of using a computer’s hard disk as an

extension of RAM

▫ When RAM is full, data is swapped back and forth from

RAM to the hard drive

▫ Hard drives are slower than RAM – to make any PC

faster, get as much RAM as possible

7

Managing Memory: Virtual Memory

8

Page 3: Software Runs the computer system Disk management …web.acd.ccac.edu/~ndowney/CIT100/Terms/SoftwareNetowrking.pdfIf your PC has 2 GB of RAM, and the OS Kernel takes up ½ a GB of

CIT 100 3

Providing the User Interface

•The User Interface is the part of the operating system that the user (you, the human) sees and interacts with

•User Interface allows user to:▫ Start applications

▫ Manage storage devices

▫ Shut down computer safely

9

Types of User Interfaces

• Command Line▫ Type in text commands at a prompt on the screen▫ No mouse, no icons▫ Examples of Command Line Interfaces include:

DOS Unix

• Menu

• Graphical User Interface (GUI – Pronounced “gooey”)▫ Use mouse to click icons to access files or start programs▫ More user friendly than command line operating systems▫ Examples of GUI’s include:

Windows (all varieties) Mac OS Ubuntu (a version of Linux)

10

Command Line Interface

11

Graphical User Interface: Windows 7

12

Page 4: Software Runs the computer system Disk management …web.acd.ccac.edu/~ndowney/CIT100/Terms/SoftwareNetowrking.pdfIf your PC has 2 GB of RAM, and the OS Kernel takes up ½ a GB of

CIT 100 4

Graphical User Interface: Ubuntu Linux

13

What’s Linux?

• Free operating system based on Unix

• Forms the underpinnings of Android

• Comes in several versions:

▫ Unbuntu

▫ Debian

▫ Many, many more

• So what’s Unix?

▫ An operating system created at Bell Labs in the late

‘60’s. Because Bell wasn’t allowed by law to sell

software, they gave it away for free

14

Graphical User Interface: Mac OS X

15

Not All Graphical User

Interfaces are on

Computers

Smartphones also use

GUIs

Including Android

phones, iPhones, etc.

Screen shot of Smartphone

Android OS

16

Page 5: Software Runs the computer system Disk management …web.acd.ccac.edu/~ndowney/CIT100/Terms/SoftwareNetowrking.pdfIf your PC has 2 GB of RAM, and the OS Kernel takes up ½ a GB of

CIT 100 5

System Utility Software

• Backup software

• Antivirus & Security Software

• File Managers (usually handled by Windows)

• Scanning & Defragmenting software (Norton

Utilities)

• File Compression (usually handled by

Windows)

• Accessibility Utilities (Kurzweil)

17

Other terms to know:

• Device Drivers

▫ Software that allows OS to communicate with and

control peripheral devices such as printers & scanners

• PnP – Plug and Play

▫ OS detects and configures the use of new hardware

18

Applications Software

19

Application Software

• Programs users (people) use to get work done

20

Application Software

Tailor Made

Custom Software

Packaged Software

General Purpose

See Next Slide

Page 6: Software Runs the computer system Disk management …web.acd.ccac.edu/~ndowney/CIT100/Terms/SoftwareNetowrking.pdfIf your PC has 2 GB of RAM, and the OS Kernel takes up ½ a GB of

CIT 100 6

General Purpose Software

Personal

Productivity

Multimedia &

Graphics

Internet

Programs

Home &

Education

Word ProcessingDesktop

publishingWeb Browsers Personal Finance

Spreadsheet Drawing E-mail programs Tax Preparation

Presentation Image editing Instant Messaging Home Design

Database Video editingVideo

Conferencing

Reference (maps,

encyclopedias,

etc.

Personal

Information MgmtAudio Games

21

Personal Productivity

• Word Processing (MS Word)

▫ Document production

• Spreadsheet (MS Excel)

▫ Numeric analysis software used for carrying out “what

if” scenarios.

• Presentation (MS PowerPoint)

▫ To create visual aides to accompany a presentation

• Database (MS Access)

▫ For managing and querying data records

22

Software Suites

• A collection of application software packages sold

together

• Examples:

▫ Microsoft Office

Word, Excel, PowerPoint, Access, Outlook, Visio, One

Note

▫ Adobe Creative Suite

Photoshop, Illustrator, Flash, Dreamweaver, Fireworks,

Acrobat

23

Tailor Made Software

• Custom software▫ Designed to meet specific needs

▫ Expensive

• Packaged Software▫ Designed to be used out of the box

▫ Can be customized

▫ Cheaper than Custom Software, but still expensive

24

Page 7: Software Runs the computer system Disk management …web.acd.ccac.edu/~ndowney/CIT100/Terms/SoftwareNetowrking.pdfIf your PC has 2 GB of RAM, and the OS Kernel takes up ½ a GB of

CIT 100 7

Software System Requirements

• Minimum level of computer equipment

needed for software to operate

• System Requirement specify:

▫ Platform (Operating System)

▫ Minimum CPU or processor speed

▫ Minimum amount of RAM required

▫ Minimum disk space for installation

25

Version Numbering

• Examples:

▫ Windows 7.0 (which is really 6.1)

▫ MS Office 2010 (Marketing name only – really it’s

MS Office version 14)

• X.Y

▫ X – Major program revision

▫ Y – first number after decimal – maintenance

release – bugs fix

26

Licensing

• Copyright▫ Defines rights legally granted to the creator of a

piece of software

• Software license▫ Contract distributed with software, giving the user

rights to install and use it

• Site license▫ Contract between software maker and large

organizations granting the right to install software on a large, but specified number of computers at a discounted cost

27

Software Registration

• Validation – requirement for special codes to

install software – protects against theft

• Registration

▫ Indicating, usually online, that you own the

software

▫ Entitles user to updates and product news

28

Page 8: Software Runs the computer system Disk management …web.acd.ccac.edu/~ndowney/CIT100/Terms/SoftwareNetowrking.pdfIf your PC has 2 GB of RAM, and the OS Kernel takes up ½ a GB of

CIT 100 8

One more term to know…

• Backward Compatibility

▫ Ability to run some older program on a

newer system

29

Computer Networks

Norm DowneyCIT 100

What is a network?

A group of two or

more computer

systems linked

together to

exchange data and

share resources

such as expensive

peripherals

31

Internet

Remember that TCP/IP thing?

Transmission Control

Protocol (TCP)

Divides transmitted data

into small packets for

transmission,

reassembles data packets

upon delivery into a

complete message

Includes error checking

information

Internet Protocol

(IP) Address

Numeric address that

uniquely identifies each

device on a computer

network

Four sets of numbers (0-

255) each separated by a

dot

Example: 128.30.52.38

32

All modern computer networks rely on TCP/IP Protocols

Page 9: Software Runs the computer system Disk management …web.acd.ccac.edu/~ndowney/CIT100/Terms/SoftwareNetowrking.pdfIf your PC has 2 GB of RAM, and the OS Kernel takes up ½ a GB of

CIT 100 9

33

Advantages and Disadvantages of

Networking

Advantages

Lower hardware costs

Application and

information sharing

Centralizing data

management

Connecting people

Disadvantages

Loss of autonomy(can’t install/uninstall software)

Lack of privacy

Security threats

Loss of productivity

Network Types

PANs

LANs

MANs

WANs

Intranet

Virtual Private Network (VPN)

34

PANs

Personal Area Network

The wireless interconnection of

personal information technology

devices within the range of a single

person

Mostly associated with Bluetooth

technology

35

PANs Transmission Media

36

Infrared

Wireless using light

Limited to line of sight of about 100 feet

Bluetooth

Named for 10th century Viking king

Limited to 30 feet and 8 devices

Uses radio signals – not limited to line of sight

Page 10: Software Runs the computer system Disk management …web.acd.ccac.edu/~ndowney/CIT100/Terms/SoftwareNetowrking.pdfIf your PC has 2 GB of RAM, and the OS Kernel takes up ½ a GB of

CIT 100 10

37

LANs

Local Area Network

A computer network that spans a

relatively small area.

Most LANs are confined to a single

building or group of buildings.

Home Wireless LAN

38

A typical wireless home network

uses a single wireless access

point/router to connect the

home LAN to an ISP. Each node

on the home LAN connects using

a NIC or other wireless adapters.

MANs

Metro Area Network

Bigger than LAN, smaller than WAN

Data network designed for a town or city

Usually characterized by very high-speed

connections using fiber optical cable or other

digital media

CCAC’s network connecting all campuses and

centers is an example of a MAN

39

WANs

Wide Area Network

Computer network that spans a large

geographical area. Typically, consists of

two or more (LANs)

Often connected through public

networks, such as the telephone system

The largest WAN in existence is the

Internet.

40

Page 11: Software Runs the computer system Disk management …web.acd.ccac.edu/~ndowney/CIT100/Terms/SoftwareNetowrking.pdfIf your PC has 2 GB of RAM, and the OS Kernel takes up ½ a GB of

CIT 100 11

Intranet, Domains & VPNs

Intranet

A private network that utilizes Internet and Web

protocols and software

Domains

A network composed of clients and servers under the

control of one central database stored on a server

called a domain controller

Virtual Private Network (VPN)

Designed to provides a secure, encrypted connection

to transmit the data between the remote user and a

company network41

LINKING IT ALL UP

42

Nodes

Any device (computer, printer, network

storage devices, etc.) on a network

All nodes are also known as a clients

Each node is uniquely identified on the

network using a numeric network address

Most networks use the IP protocol to identify

each node

43 44

Network Interface Card (NIC)

Expansion cards inside system unit

Can be designed to work with one or more types of cabling

Each Node on the network has some type of NIC

NIC is also known as a Network Adapter

Page 12: Software Runs the computer system Disk management …web.acd.ccac.edu/~ndowney/CIT100/Terms/SoftwareNetowrking.pdfIf your PC has 2 GB of RAM, and the OS Kernel takes up ½ a GB of

CIT 100 12

Network Devices

Routers

Device used to connect two or more networks

Determine best path to route data

Can be used to connect a LAN to Internet

Hubs & Switches

Controls flow of data between nodes within a single

network

Wireless Access Point

Allows nodes to connect wirelessly to a wired

network45 46

Networking Media

Twisted Pair

• consists of pairs of twisted wires covered with an insulating layer.

Coaxial cable

• consists of an inner conductor wire surrounded by insulation, a conductive shield (usually a layer of foil or metal braiding), and a cover.

Fiber Optic

• consists of extremely thin strands of glass or plastic bound together in a sheathing (a jacket), transmits signals with light beams.

47

Ethernet

Most popular LAN standard

Generally comes in the following speeds

10 Mbps

100 Mbps (Fast Ethernet)

Also Gigabit Ethernet (1Gbps or 1000 Mbps)

Ethernet cable plugs in to an RJ-45

connector

Firewalls

A device or software that blocks

unauthorized access to a network

48

Page 13: Software Runs the computer system Disk management …web.acd.ccac.edu/~ndowney/CIT100/Terms/SoftwareNetowrking.pdfIf your PC has 2 GB of RAM, and the OS Kernel takes up ½ a GB of

CIT 100 13

49

CELL PHONES

Can you hear

me now? Yeah, but I’m

not listening.

Telecommunications

50

The electronic transmission and reception of

signals for communications.

Convergence & Digitization

51

Convergence

Merging of disparate objects or

ideas into new combinations

Example – phone, MP3 player and PDA

Newspapers, TV & radio

Digitization

Transformation of data such as

voice, text, graphics, video and

audio into a digital format

Digitization makes convergence

possible

Cell Phone Generations

52

1G – 1981 – Analog mobile phones

2G – 1992 – Digital signal provided:

Decreased interference

Improved reception

Reduced chance of eavesdropping

2G phones are sometimes referred to as PCS

(Personal Communications Service)

3G – 2001 – Faster data transfer rates allowing

voice, data and multimedia transmissions

Page 14: Software Runs the computer system Disk management …web.acd.ccac.edu/~ndowney/CIT100/Terms/SoftwareNetowrking.pdfIf your PC has 2 GB of RAM, and the OS Kernel takes up ½ a GB of

CIT 100 14

4G & LTE

53

4G is Mobile broadband technology enabling

IP-based voice, data and multimedia

streaming at speeds between 100 Mbps and

1Gbps

LTE (Long Term Evolution) is a stepping

stone technology on the way to true 4G

VoIP – Internet Telephony

Voice over Internet Protocol

Not a cell phone technology

Uses the Internet’s packet switching

technology to send voice data “packets”

Skype & Vonage

54

NETWORK STRUCTURES

55

Peer to Peer (P2P)

All computers on

network are “equals”

Good for home use

Not good for

businesses that need

file security or for

networks of more

than 12 computers

(nodes)

56

Page 15: Software Runs the computer system Disk management …web.acd.ccac.edu/~ndowney/CIT100/Terms/SoftwareNetowrking.pdfIf your PC has 2 GB of RAM, and the OS Kernel takes up ½ a GB of

CIT 100 15

Client/Server Networks

Network includes file

servers and client

computers

Servers serve up files

and services to the

requesting client

Used in business

settings

More secure than P2P

57

Network Topologies

58

Bus Ring Star

Wireless Fidelity (Wi-Fi)

59

Year Standard Speed

1999 802.11b 11 Mbps

2003 802.11g 54 Mbps

2009 802.11n 600 Mbps

2014 802.11ac 1.33 Gbps

SSID – Service Set Identifier,

The a wireless network name

Wireless Security Protocols

WEP

Wired Equivalent Privacy

The original encryption protocol developed for wireless

networks

WPA

Wi-Fi Protected Access

Introduced as an interim security enhancement over WEP

WPA2

Wi-Fi Protected Access version 2

Significant enhancement to WPA2 over WPA

uses Advanced Encryption Standards (AES)

60

Page 16: Software Runs the computer system Disk management …web.acd.ccac.edu/~ndowney/CIT100/Terms/SoftwareNetowrking.pdfIf your PC has 2 GB of RAM, and the OS Kernel takes up ½ a GB of

CIT 100 16

Wireless Hotspots

Public location with wireless Internet

connection

Examples include Starbucks, McDonalds & CCAC

Hotspot precautions

Watch for shoulder surfers

Watch out for look-a-like or evil twin networks

Don’t transmit confidential data via public

wireless hotspots

Disable file and print sharing on laptops before

using wireless hotspots61

Other terms to know…

Network Operating System (NOS)

Multi user operating system enabling client

devices to communicate with server and each

other, share network resources and applications,

and send messages within network

Near Field Communications (NFC)

Enables devices to share data via touch

Distributed Computing

Processing of tasks across a group of computers

62

Computer Networks

Norm DowneyCIT 100


Recommended