Search Header Logo
Lesson 10 System Software

Lesson 10 System Software

Assessment

Presentation

Computers

11th - 12th Grade

Easy

Created by

Ryan Mordey

Used 5+ times

FREE Resource

8 Slides • 7 Questions

1

Lesson 10 System Software

By Ryan Mordey

2

Categorize

Options (14)

Physical address of device

Built into the NIC

Added during manufacturing

48 bits long

Uses denary numbers

Each value separated by full stops

Each value can be between 0-255

143.12.42.97

Increased the amount of possible addresses

128 bits long

8 groups of four hex numbers

  • 5A6D:01FF:A7B3:6D9E:0054:FFAA:0000:21CD

12 hex digits

5A:7B:FF:06:67:ED

Organize these options into the right categories

MAC Address
IPV4
IPV6

3

Categorize

Options (9)

Forwards data packets within a network

Directs data packets to devices

Directs data across networks

WPA2 is used for encryption

Umanaged devices

Managed devices

Provided by your Internet Service Provider

Connects devices in a LAN.

Connects your LAN to the WAN

Connect the correct characteristics to the device.

Router
Switch

4

Big Picture

Discussed how storage devices can cause security implications.

Past

Describe how a range of OS can be used and any security implications with each.

Evaluate the effectiveness of using an OS within a specific area.

Present

Future

Careers: Software engineer, OS developer, Software Solutions.

5

media

All computers have an operating system that provides a range of facilities to support both the hardware and the user. There are different types of operating system's that help support the use of different computers.

You need to know about the
security implications that software can have on a network. All operating systems have what is known as the Kernel which acts as the core of your operating system, ensuring smooth operation for most of the tasks your OS is responsible for such as:

System Software

  • Folder management

  • User management

  • Device Driver management

  • Memory management

6

The primary purpose of this OS to provide facilities that support network users. They also need to allow system managers to administer and control client server networks.

Sever/Network OS

  • User management, allows you to create and manage user accounts on the network.

  • File and folder permissions, allows you to control which users have access to specific folders and files and the level of access they have.

  • Group policy, allows the administrator to control the configuration use for groups of users on the network, this can be used to restrict what users can do.

  • Monitoring tools, are used to review the performance and status of the network.

7

Drag and Drop

The primary purpose of a server ​
to provide facilities that support ​
users. They also need to allow system ​
to ​
and control ​
networks.
Drag these tiles and drop them in the correct blank above
network
administer
client server
operating system
managers
employees
peer to peer
device
hardware
connect

8

Match

Connect the server OS responsibility to its description.

Allows you to create and manage accounts accessing the network.

Allows to control which users have access to files stored on the server

Allows to configure settings for a range of user accounts, restricting their access to the network or what they are able to do.

Can review the performance, status and use of the network.

User management

File and folder permission

Group Policies

Monitoring tools.

9

Device based operating systems

There are two types of IP addresses that can be assigned with different formats.

  • Multi-functional/desktop are designed around the end users to provide facilities to allow them run a range of application. A graphical user interface is provided to the to help them control the software, and manage their files. The popularity of desktop OS systems like Windows makes them an easy target for hackers.

  • Mobile OS, is a single user system that runs on portable devices like smartphones and tablets. The OS provides a facilities to run a huge range of applications although this poses security concerns for open source applications that have been developed. This type of OS should be frequently updated to repair vulnerabilities that can be taken advantage of.

10

media

This is an operating that is required to respond to events within a limited time frame. An example of where this OS would be used is in controlling a driverless video, aviation systems or medical equipment.

Real time OS are often used in embedded systems or IoT devices, to respond to data from sensors almost immediately. There is less focus on user based features here, but more on processing time using priority scheduling.

Because of their use in critical applications such as transport control, industrial processes and media systems security is very important because the consequences of a security breach could be devastating.

Real Time OS

11

Categorize

Options (12)

Provides a graphical user interface

Provides advanced folder management

Windows is an example of this OS

OS used in embedded systems and IoT devices

Less focus on user experience but more on priority scheduling

Used within automated(driverless) car systems

Single user operating system

Designed for portable devices using touch screen as method of control

Unlisted applications are a security concern

Huge target for hackers due to its popularity

Frequent updates are important to repair vulnerabilities

Security breach is likely to be more severe or disastrous

Connect the characteristic to the operating system.

Multi-Functional OS
Real Time OS
Mobile OS

12

Open Ended

Why do you think hospital equipment like a heart rate monitor would use a real time operating system? (2 marks)

13

OS Modes

When an OS is running there are two modes that instructions can be executed in:

  • Kernel Mode is used for low-level functions such as memory management, process scheduling and hardware interface access All the other functions of the OS rely on kernel mode to provide these services. Kernel mode is unrestricted so it is something can use to carry out actions that would not be possible in user mode.

  • User Mode, is where high level functions happen such as running user applications, processes are not allowed to access resources like memory and hardware directly, they request this server from the kernel. Programs running have less privilege in this mode and are more restricted.

14

Open Ended

Why is the use of kernel mode a security concern? 2 Marks

15

Main Task

Computer Task:

Compare the use of each OS in a range of different scenarios.

Explain how the features of each OS allow it to be successfully used in a specific industry/job/task.

Discuss the responsibilities of the kernel and security considerations that are needed based on the type of system you have selected.

Complete all the questions on the work sheet.

Lesson 10 System Software

By Ryan Mordey

Show answer

Auto Play

Slide 1 / 15

SLIDE