
Computer Software & Operating Systems
Presentation
•
Computers
•
8th Grade
•
Practice Problem
•
Medium
Leslie Brazell
Used 4+ times
FREE Resource
49 Slides • 28 Questions
1
OPERATING SYTEMS (os)
2
What is an operating system?
An operating system (OS) is the primary software that runs applications and manages all the hardware, memory and other software on a computer.
Software is a set of computer instructions that tells the computer how to work.
3
Why do you need an OS?
Allows the user to communicate with the computer.
In the most basic terms, an operating system allows you to communicate with a machine or a computer. We didn’t need this with a typewriter because we were able to control its functions, but this is a necessary part of a computer since we don’t speak computer!
4
Why do you need an OS?
Allows the user to communicate with the computer.
Controls hardware and peripherals, i.e printer, keyboard, monitor
Runs applications and software
Provides a file structure for data management
Responsible for security (user accounts)
Schedules processes (updates, etc)
5
WORKSTATION OS
Microsoft Windows
Apple Macintosh
Linux
mobilE OS
Android (Linux)
iOS (Mac)
Chrome OS
Windows Phone
Blackberry
6
These are for specialized computers that handle requests.
Mail server
Web server
SERVER os
7
OTHER TYPES OF OPERATING SYSTEMS
An embedded operating system will only perform specific tasks. They typically implement higher level features and functions and are used in machines such as an ATM or a GPS system.
An embedded operating system will only perform specific tasks. They typically implement higher level features and functions and are used in machines such as an ATM or a GPS system.
Operating systems that are most commonly used to run multiple operating systems on a computer system at the same time.
Embedded OS
firmware
hypervisor
8
Multiple Choice
Which of the following is a task that the operating system is NOT responsible for?
Manages hardware such as a mouse.
Keeps track of files and folders
Supplies power to peripherals such as a printer.
Secures the computer with user accounts and passwords.
9
Multiple Choice
Which of the following is most commonly considered a mobile OS?
Apple Macintosh
Android
Microsoft Windows
Linux
10
Multiple Choice
Which type of operating system is permanently programmed into a hardware device?
Embedded OS
Firmware
Mobile OS
Hypervisor
11
Multiple Choice
Which is the most popular mobile OS out of the choices below?
Chrome OS
Blackberry
Windows Phone
Android
12
Multiple Choice
What is a server OS used for?
Handling requests and supplying responses.
Running multiple operating systems on a computer system.
Performing one task, such as in an STM machine.
Running a permanent system, like the timing controls in a washing machine.
13
comparing OPERATING SYTEMS
14
Microsoft Windows is arguably the most popular operating system. Because of this, it comes with large industry support. There are tons of applications and programs that are designed to work very well on Windows computers.
A possible downside to being so popular is that these operating systems can be a target for security exploitation. Attackers know that there are many, many people are using Windows and therefore are tempted to try to find a way in - in order to affect as many users as possible.
Microsoft Windows
15
graphical user interface (GUI)
A graphical user interface (GUI) uses interactive graphical elements such as windows, buttons, and icons.
It allows users to interact through icons instead of text.
Many operating systems now use a Graphical User Interface, or GUI, which provides a simpler way to use the system. Each graphic is a “window” of sorts where the user can view the contents of the computer instead of having to type in commands to open and run programs.
16
Apple Macintosh computers, or Macs, are also extremely popular. Their versions were first named after big cats, such as panther and mountain lion, and more recently after California landmarks.
Macs are easy to use and have really good security features. They are typically a lot more expensive than Windows systems.
10.3 - Panther
10.4 - Tiger
10.6 - Snow Leopard
10.8 - Mountain Lion
10.11 - El Capitan
10.14 - Mojave
10.15 - Catalina
Apple Macintosh OS
17
Linux
Linux kind of just does its own thing. It’s hard to compare Linux to Windows or Macs because it is very different, but still very popular! Linux is FREE and is an open source operating system. What that means is that anyone can view and change the source code to distribute their own individualized version! This is why there are so many different versions of Linux operating systems.
Because of the multitude of different versions, Linux has limited support and limited compatibility, but it has a huge user community who love to help each other out.
18
All operating systems have and use different types of file systems.
A file system is the method in which your files are stored.
Organizing files is important so that they can be easily retrieved when you need them.
Each operating system has its own prefered file system.
A file system is a method of organizing files and retrieving them from storage.
file systems
19
FAT32 (File allocation table)
Compatible with Windows, Mac, and Linux
Commonly used for USB and memory cards
Memory limit of 16 terabytes =
4,000,000 digital photos
4,000 movies or 8,000 hours of HD video
104 million document pages (Word, PDFs, PPT, etc) commonly
It’s equal to about 20,800 physical filing cabinets of paper!
20
ntfs (new technology file system)
Compatible with Windows only
Memory limit of 1 exabyte
1 exabyte = 1 million terabytes!
Each major operating system also has its own file system that can be used. NTFS is a Windows systems that comes additional features and more memory than FAT32. There really isn’t an actual memory limitation as this system holds up to 1 exabyte of memory. This is equal to 1 million terabytes which is a lot more than the 16 terabytes of FAT32!
21
ext4 (extended file system)
Compatible with Linux only
Memory limit of 1 exabytes
1 exabyte = 1 million terabytes!
22
hfs (hierarchical file system
Compatible with Mac only
Memory limit of 8 exabytes
8 exabytes = 8 million terabytes!
23
file systems of os
Compression - takes up less space on your hard drive
Compression is important to be able to save and use less memory
Encryption - protects confidential data from attackers
Permissions - sets access rights for users (read vs write)
Encryption and permissions are important for security
Journaling - keeps track of changes
Journaling is important in case you ever need to backup your system or revert to an earlier setup.
24
Multiple Choice
Which file system would be the best choice to use in a drive that will be used with both Windows 10 and macOS?
Ext4
FAT32
HFS
NTFS
25
Multiple Choice
Which OS is currently the most popular for desktops and laptops?
Microsoft Windows
Apple Mac
Linux
Penguin
26
Multiple Choice
What does GUI stand for?
Gallery Used Ideas
Gradual User Images
Graphical User Interface
Graphic Unity Icons
27
Multiple Choice
What is a disadvantage of a Mac OS?
Poor security features.
Not much memory.
Too many different active versions.
Computers that run Mac OS can be expensive.
28
Multiple Choice
Linux is an open source OS. What does "open source" mean?
It means that it is free.
It means that anyone can view, copy and then change the source code.
It means that there are over 600 versions available.
It means that it comes with unlimited support.
29
Multiple Choice
What feature of file system is responsible for keeping track of changes in the system?
Compression
Encryption
Permissions
Journaling
30
compatibility
31
Windows - Explorer
Mac - Finder
Linux - Nautilus, Dolphin, Thunar, Nemo
Each operating system has its own way of storing and viewing files.
A file manager is a program that allows you to view, open, move and rename files.
file management
32
Windows - .exe
Mac - .dmg
Linux - doesn’t depend on the extension to open the file
There are also extensions that definitely can ONLY be used on specific systems, like .exe for windows and .dmg for macs. Linux, again does its own thing here, and uses the way the file is coded to decide which program or app to use to open the file instead of looking at the extension.
.jpg
.mp3
.doc, .docx,
.pages
There are also extensions that definitely can ONLY be used on specific systems, like .exe for windows and .dmg for macs. Linux, again does its own thing here, and uses the way the file is coded to decide which program or app to use to open the file instead of looking at the extension.
all Operating systems
file types and extensions
A file extension is the suffix at the end of a filename that indicates what the type of file is.
33
32-bit vs. 64-bit processor
A processor is the electronic part of a computer that executes the instructions that are passed to it by the operating system. It’s also called a CPU, or central processing unit.
Operating systems each have their own procedures for processing information.
Some systems may need more memory to open a file or run a program.
Knowing what processor your computer has is important to make sure that your computer is strong enough to run the operating system!
34
32-bit vs. 64-bit processor
A 64-bit processor is stronger than a 32-bit processor. It can store more values and information and handle more data at one time.
A 64-bit processor has over four billion times the physical memory of a 32-bit processor.
A 32-bit processor has a limit on the amount of memory that it can use.
A 32-bit operating system can usually be run on a 64-bit processor but the reverse is not true. You won’t be able to run a 64-bit operating system on a computer with a 32-bit processor.
35
Multiple Choice
Which extension will only open on a Windows computer?
.doc
.dmg
.exe
36
Multiple Choice
Which of the following is a task for the processor?
Schedules backups and updates.
Translates between the operating system and the hardware.
Manages the antivirus software.
Determines how memory is used.
37
Multiple Choice
True of False: A 32-bit operating system can usually be run on a 64-bit processor but the reverse is not true.
True
False
38
software and applications
39
software and applications
Keyboard
Monitor
hardware
Applications
Programs
software
40
Word Processing Software
Spreadsheet Software
Presentation Software
Web Browser
productivity software
Email Client
Conferencing Software
Instant Messaging Software
Online Workspace
Document Sharing
collaboration software
Database Software
Project Management Software
Accounting Software
business software
Types of software
41
Single or Cross Platform
Cross platform applications work on multiple platforms. When this happens there are chances of compatibility issues.
cross-platform
Single-platform software only works on one platform, such as only on Android phones, or only on Mac computers. There aren’t many examples of single-platform applications since a wider range of customers can be reached if an app works on more than one platform.
Single-platform
A platform is an operating system such as Windows, Mac OS, Android or iOS.
42
Multiple Choice
Which of the following is not interchangeable with the word “application”?
App
Hardware
Program
Software
43
Multiple Choice
Which of the following is a disadvantage of a single-platform application?
The performance of the application is not optimized for the platform.
There are more bugs and issues with the application.
There may be compatibility issues when a file is shared on the same platform.
Exposure of the application is limited.
44
software licenses
45
Only grants one user the right to use the software package. You might be able to install the software on more than one machine, like if you have two computers, but it’s understood that the software belongs to you and you should be the only user.
single use
Allows the user to install the program on multiple computers at the same time. This is useful for a business or across a corporation. Many schools sign up for site licenses as well so that all student computers can access the program.
group use/site license
Allows a certain number of people to use the same login information. For example, let’s say the license allows for up to three people to use the software at the same time. If three users log in, a fourth user will be denied and not be allowed to use the program. However, once one of the users logs off, that fourth user would be allowed to use the program.
concurrent license
licensing
A software license is a document that provides legally binding guidelines for the use and distribution of software.
46
product keys and serial numbers
Before installing software, it’s best to read all of the agreements, like licenses, and to read the instructions. Some software products include product keys or serial numbers. These are used to activate the product and can usually only be used once or a specific amount of times. This key certifies that the program is original and not someone trying to resell or redistribute the program.
47
open source vs. proprietary
Owned by an individual or company
EXAMPLES:
MS Windows
Skype
proprietary
available for anyone to access and modify.
EXAMPLES:
Android
Mozilla Firefox
open source
48
subscription vs one-time purchase
The user purchases the software and never pays a monthly fee.
one-time purchase
The user is charged every month to use their software.
subscription
49
50
51
52
53
Multiple Choice
Which type of software license allows a predetermined number of people to use the account at the same time?
Single-use license
Group license
Site license
Concurrent license
54
Multiple Choice
Max pays a quarterly fee (once every 3 months) for a cloud storage account. Which describes the type of software?
Open-source, subscription
Open-source, one-time purchase
Proprietary, subscription
Proprietary, one-time purchase
55
Multiple Choice
Which application delivery method is considered to be in a two-tier pattern in which the presentation is stored on your computer and the code and data are stored on a server?
Local Installation
Local Network Hosted
Cloud Hosted
n-tier
56
application security
Replace this with a sub-header that can be in multiple lines.
57
58
software updates
Software updates are one way to ensure that your apps are secure. Hackers can target computers that have not updated their software because they will be easier to gain access to.
Can include:
Security fixes
New or improved features
Speed up the app
59
patching operating systems
Updates can exist for a specific app that you have installed and these are still important but the most important software updates are the ones for your operating system. Remember that the operating system is the primary software that tells your computer how to work.
Patches are updates that address and fix security vulnerabilities within a program or product.
60
61
62
63
64
Multiple Choice
Which security method is used by companies to fix a flaw in their application?
Software Update
Full Backup
Incremental Backup
Antivirus Software
65
Multiple Choice
Which security method is used to protect your computer from threats and warns you of possible vulnerabilities?
Software Update
Data Backup
Operating System Patch
Antivirus Software
66
Multiple Choice
Which security method is used to protect your files and the state of your computer?
Software Update
Data Backup
Operating System Patch
Antivirus Software
67
Multiple Choice
From the following choices, which would be the most important update to download?
Microsoft Word Update
Chrome Browser Update
Windows OS Update
Skype Application Update
68
Multiple Choice
True or False: An incremental backup backs up all data on your computer.
True
False
69
browser configuration
70
71
A downside to this feature is that cache can take up quite a lot of memory.
If a website makes any major changes, you might end up viewing out-of-date information.
You can clear your browser’s cache which would fix this error and would free up memory as well.
Using cache is usually not a big security concern unless you are using a public or shared computer. It would be a good idea to clear the cache on a computer where someone else would have access to these shared files and data.
cache
72
73
74
Multiple Choice
A saved collection of data and files used to improve your browsing speed is called:
client-side script
proxy
cache
certificate
75
Multiple Choice
If you would like to ensure that your site history is not recorded, you can:
clear your cache
open a window in private browsing mode
enable client-side scripting
change your proxy settings
76
Multiple Choice
Which of the following can be used to filter which sites are allowed through to the browser?
client-side scripting
private browsing mode
cache
proxy settings
77
Multiple Choice
Which of the following will not increase your browsing speed?
storing and using cache
enabling client-side scripting
using proxy settings
using private browsing mode
OPERATING SYTEMS (os)
Show answer
Auto Play
Slide 1 / 77
SLIDE
Similar Resources on Wayground
71 questions
Autumn mocks revision
Lesson
•
9th Grade
71 questions
Exponents
Lesson
•
8th Grade
73 questions
9.4 Lesson - Linear vs. Non-Linear Functions
Lesson
•
8th Grade
76 questions
KELAS 8 K13R - JKI FULL
Lesson
•
8th Grade
72 questions
Unit 1 and Unit 2 Review
Lesson
•
9th Grade
73 questions
The Byzantine Empire
Lesson
•
7th Grade
74 questions
AKS 10 Review - Electricity and Magnetism
Lesson
•
8th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade