470 likes | 796 Views
System software and computer management . Module 1.5 . System software and computer management . Module 1.5 . Content. Operating systems Operating system utilities Security tools Factors influencing performance Troubleshooting using utility software Test and improve your knowledge.
E N D
System software and computer management Module 1.5
System software and computer management Module 1.5
Content • Operating systems • Operating system utilities • Security tools • Factors influencing performance • Troubleshooting using utility software • Test and improve your knowledge
Operating systems System software that controls all activities that take place in a computer
The role of the operating system Multitasking: ability of the operating system to load and process multiple tasks at the same time
The Task Manager • Provides some information about the computer’s performance and the applications and processes running. • Most often used to terminate a process or program that is not responding.
Single‑user versus multi‑user operating systems • Single‑user operating system • Can only be used by a single user at a time • Multi‑user operating systems • Allows multiple users to access a computer system at the same time
Written module activity • Read pages 61 – 63 • Study first section of summary on page 72 (until Task Manager) • Complete questions 1 – 11 on page 74
Operating system utilities Programs that perform system maintenance and administration tasks
File management • Naming files
File management • Information about files
File management • File manager functions
Updates We update software to • download patches and service packs to fix errors or bugs in our programs • close security loopholes • add new features and improvements
Updates Most software publishers will automatically notify you when an update or new version of a program is available. This is normally done via the Internet.
Updates Many programs such as the Windows operating system can be scheduled to check for updates at fixed intervals (as specified by you).
Scheduling • Why schedulers are useful: • automatically check for updates • set schedulers to run at off‑peak times
Printer management View information about the documents waiting to print and manage by • restarting the tasks (paper jam) • pausing the tasks • deleting tasks
Backup – why? • files can be accidentally overwritten or deleted • hardware failures – a disk drive crashes • hardware can be stolen • disasters – fires, earthquakes and floods can destroy hardware • files can be corrupted by power fluctuations • files can be deleted or corrupted by viruses, etc.
Backup Backup software • Most operating systems provide backup utilities. • Third‑party vendors have specialised backup programs • scheduling when to back up the files • choosing to do a full backup of all the files or just those that have been changed since the last backup • compressing the files to save space on the backup media, etc.
Backup Backup tips • Use software that automatically manages your backup process. • Only back up your data not programs. • Back up your files onto external portable media. • Keep the backups off‑site. • Perform ‘housekeeping’. • Consider archiving large files. • Check that the backups are actually working.
Written module activity • Read pages 64 – 68 • Study Operating system utilities in summary (page 72, 73) • Complete questions 12 – 26 on Page 74 – 76
Security tools Security measures and facilities to help control and prevent the spread of malware.
Access control • Access control means that the operating system specifically asks your permission before any software can be installed. • The purpose of access control is to try to make it impossible for malware to be secretly installed on your computer without your knowledge.
Firewall • A firewall is software or hardware that acts as a barrier between your computer and the Internet. • Built into the operating system.
Security • Action/Security Center in Windows operating systems warns you about settings that could make your system insecure. You can check settings for • firewall • Windows automatic updates • anti-malware (virus and spyware) software settings.
Memory (RAM) • Programs and data need to be loaded from disk into RAM (memory). • If memory is full, parts of the data/programs that the computer is not currently busy with are stored on an area on the hard disk. • These have to be loaded back into memory again when needed – slows down the computer. The more memory you have available, the better. Adding more RAM is often the cheapest and most effective upgrade.
Memory (RAM) • Caching • Cache memory is built into various components on a computer, including the processor. • It stores frequently or recently accessed data, based on the assumption that it will probably be accessed again soon. • This memory is more expensive, because it is faster than normal memory (RAM) but it can increase the overall performance of a computer quite dramatically.
Hard drive • Data and programs need to be loaded from disk into memory. • Changes to files need to be written back to disk. • A ‘faster’ hard drive can improve the overall performance of a computer system. • Remember also:When a hard drive is fragmented, the files will take longer to retrieve.
Influence of malware • Malware can slow your computer down by using up resources such as free memory and hard drive space. • Spyware can slow your Internet connection down if it frequently connects to the Internet.
Disk scanning • Generally, it is not recommended that you repair a hard drive that you suspect is faulty unless you are sure you know how to do it. • Problems on flash drives can be fixed quite easily by running a disk scanner.
Disk defragmentation • A disk defragmenter is a tool that reorganises the parts of files and speeds your computer up again. • Defragmentation does not free up disk space. • Possible to schedule the running of a defrag operation.
Disk filling up (too little space) • Windows - Disk CleanupWizard: • Removes temporary files downloaded from the Internet or temporary files created by Windows. • Removes installed programs that you no longer or seldom use.
Written module activity • Read pages 68 – 72 • Study last section from summary on page 73 (Security tools to the end) • Complete questions 27 – 35 on page 76