Professional Documents
Culture Documents
By
Dr. Ahmed Taha
Lecturer, Computer Science Department,
Faculty of Computers & Informatics,
Benha University
1
LOGO
LOGO
Book Title:
New Perspectives on Computer Concepts,
2014, Comprehensive
Authors:
June Jamrich Parsons, Dan Oja
Publisher:
Course Technology;
Edition:
16 edition (January 30, 2013)
LOGO
Book Contents
#
Chapter Title
Computer Hardware
Computer Software
The Internet
Digital Media
10
11
Databases
12
Computer Programming
LOGO
Contents
1
File Basics
File Management
LOGO
Operating System
Basics
LOGO
Machine or Device
Microsoft Windows
IBM-compatible computers
Mac OS
Linux
LOGO
10
LOGO
11
LOGO
12
LOGO
13
LOGO
One Clock
Cycle
14
LOGO
15
LOGO
16
LOGO
LOGO
Managing Memory
The operating system allocates a specific
area of RAM for each program that is
open and running.
The operating system is itself a program,
so it requires RAM space.
Sometimes an application requests
memory but never releases ita condition
called a memory leak.
18
LOGO
19
LOGO
20
LOGO
Single-user
OS
Multiuser
OS
Server
OS
21
Desktop
OS
Mobile
OS
LOGO
LOGO
23
LOGO
24
LOGO
Booting Process
The boot process refers to the sequence of events that
occurs between the time that you turn on a computer and
the time that it is ready for you to issue commands.
The bootstrap program is built into ROM circuitry housed
in the computers system unit. When the computer is
turned on, the ROM circuitry receives power and begins
the boot process by executing the bootstrap program.
25
LOGO
Booting Process
Power
up
Identify
peripheral
devices
The computer
identifies any
peripheral devices
that are connected
and checks their
settings.
Start
boot
program
Load
operating
system
The
microprocessor
begins to execute
the bootstrap
program that is
stored in ROM
If necessary, the
operating system is
copied from the
hard disk to RAM
26
Poweron selftest
The computer
performs
diagnostic tests
of several crucial
system
components
Check
configuration
and
customization
The microprocessor
reads configuration
data and executes
any customized
startup routines
specified by the
user
LOGO
LOGO
UserInterfaces
A user interface can be defined as the combination of
hardware and software that helps people and computers
communicate with each other.
A personal computers user interface includes a display
device, mouse, and keyboard that allow the user to view
and manipulate the computing environment.
It also includes software elements, such as icons, menus,
and toolbar buttons.
28
LOGO
LOGO
LOGO
Todays Operating
Systems
31
LOGO
32
LOGO
MS-DOS
33
LOGO
MS-DOS
34
LOGO
MS-DOS
MS-DOS (Microsoft Disk Operating System) is a nongraphical command line operating system derived from
86-DOS that was created for IBM compatible computers.
MS-DOS allows the user to navigate, open, and otherwise
manipulate files on their computer from a command line
instead of a GUI like Windows.
Today, MS-DOS is no longer used; however, the
command shell, more commonly known as the Windows
command line is still used by many users.
35
LOGO
Microsoft
Windows
36
LOGO
Microsoft Windows
Microsoft Windows is the worlds most popular and bestselling operating system.
It is installed on more than 80% of the worlds personal
computers.
Windows operating system was designed to run on Intel or
Intel-compatible microprocessors.
To create Microsoft Windows, developers used the DOS
kernel, but added a point-and-click graphical user interface.
37
LOGO
Microsoft Windows
38
LOGO
Microsoft Windows
39
LOGO
Microsoft Windows
40
LOGO
Microsoft Windows
Release
date
Version
2015
Windows 10
2012
Windows 8
2009
Windows 7
2007
Windows Vista
Main Features
2001
Windows XP
2000
Windows Me
2000
Windows 2000
Microsoft Windows
Release
date
Version
Main Features
Windows 98
1995
Windows 95
1993
Windows NT
1992
Windows for
Workgroups
1998
42
LOGO
Microsoft Windows
Release
date
Version
1992
Windows 3.1
1990
Windows 3.0
1987
Windows 2.0
Windows 1.0
1985
Main Features
43
LOGO
LOGO
Strengths of Windows
1. The number and variety of programs that run on Windows
are unmatched by any other operating system
2. Comprehensive tutorials and troubleshooting guides can
be found online and on the shelves of most bookstores.
3. Windows computer owners can select from a vast array of
peripheral devices. Many of the fastest graphics cards and
the coolest joysticks are offered exclusively for the
Windows platform.
45
LOGO
Weaknesses of Windows
Windows has been criticized for two major weaknesses:
reliability and security
1. Slow system response, programs that stop working, and error
messages can be symptoms of a Windows malfunction.
Rebooting usually clears the error condition and returns a
computer to normal functionality.
2. Windows has the reputation for being the most vulnerable to
viruses, worms, and other attacks. One reason for Windows
vulnerability is because its huge user base makes it the biggest
target for hackers.
46
LOGO
Mac OS
47
LOGO
Mac OS
Mac OS stands for Macintosh Operating System and it is
the operating system designed for Apples Macintosh line
of computer systems.
48
LOGO
Apples Macintosh
49
LOGO
Mac OS
Release
date
Version
2015
Mac OS X 10.11
(El Capitan)
2015
Mac OS X 10.10
(Yosemite)
2014
Mac OS X 10.9
(Mavericks)
2012
Mac OS X 10.8
(Mountain Lion)
2011
Mac OS X 10.7
(Lion)
2009
Mac OS X 10.6
(Snow Leopard)
Main Features
50
LOGO
Mac OS
Release
date
Version
Main Features
2007
Mac OS X 10.5
(Leopard)
2006
Mac OS X 10.4.4
(Tiger Intel)
2001
51
LOGO
52
LOGO
53
LOGO
54
LOGO
Strengths of Mac OS
1. Mac OS X has a reputation for being an easy-to-use,
reliable, and secure operating system
2. The operating system kernel of Mac OS X is based on
UNIX. Hence, Mac OS X inherited a strong security
foundation from UNIX that tends to limit the number of
security holes and the damage that can be done by
hackers who manage to slip in.
55
LOGO
Weaknesses of Mac OS
The weaknesses of Mac OS include a somewhat limited
selection of software and its use of resource forks:
1. A decent collection of software is available for computers that run
Mac OS, although the selection is not as vast as the Windows
collection.
2. Resource forks can incur a problem when files are transferred to
other platforms. When you copy a file from a Mac to a Windows
computer, for example, you end up with two files: one for the data
fork and one for the resource fork. The resource fork begins with a
period and can usually be ignored or deleted from the Windows
directory
56
LOGO
iOS
57
LOGO
iOS
Apple developed iOS as an operating system for the Apple
iPhone, which launched in 2007.
iOS was subsequently used for the iPod Touch and iPad.
58
LOGO
iOS
iOS limits the user selection of apps to those provided by
the online Apple App store.
Unlike full desktop operating systems, iOS does not
include a file manager. The only way to access a data file
is through the app that was used to create it.
59
LOGO
Android
60
LOGO
Android
Android is a mobile operating system that is a popular
platform for tablet computers, smartphones, and ebook
readers.
Android was developed by a consortium of technology
companies and unveiled in 2007.
It is an open source operating system under the project
leadership of Google.
Android gives you access to the file system and provides a
utility that lets you view the files stored internally or on
external SD cards.
61
LOGO
62
LOGO
LOGO
LOGO
Linux Distributions
A Linux distribution is a collection of software applications
built on top of the Linux kernel and operating system.
There are many variations between distributions, as each
strives to provide a unique user experience.
Because Linux is open source software, the number of
discrete Linux distributions is hard to know for sure. But a
short list of major distributions account for the lions share of
commercial Linux deployments: Red Hat Enterprise Linux
(RHEL), CentOS, Fedora, Ubuntu, Debian, and OpenSuse.
65
LOGO
Blackberry
66
LOGO
Blackberry
BlackBerry OS is a proprietary
operating system produced by
RIM, the Canadian company
that developed the BlackBerry
smartphone.
A key feature of BlackBerry OS
is its ability to work with
corporate e-mail software
systems produced by Microsoft
and IBM.
67
LOGO
Blackberry
BlackBerry devices can be integrated into a wireless
platform designed for corporate-wide secure exchange of
encrypted e-mail, calendars, and text messages.
The exchange is handled by the BlackBerry Enterprise
Server, a software package that can be deployed by
independent corporations.
68
LOGO
Blackberry
RIM also offers direct Internet connections, which dont
require a third-party carrier, such as AT&T or Verizon.
As with the enterprise platform, data is encrypted before
being sent over secure connections.
The significance of encrypted data is that it cannot be
intercepted by corporate spies or government censors.
69
LOGO
70