SlideShare una empresa de Scribd logo
1 de 79
Part2: Computer Systems Chapter 2: Basic Software
File Management ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],File Management
File Management ,[object Object],[object Object],[object Object],[object Object],[object Object]
File Management ,[object Object],[object Object],[object Object],[object Object],[object Object]
File Concept
File Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
File Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
File Management ,[object Object]
File Management ,[object Object],. DIR 1 DIR 2 DIR N FILE 1 FILE 2 FILE N DIR 2.1 DIR 2.N FILE 2.1 FILE 2.N
Roles in File Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Roles in File Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Management ,[object Object]
Aims of Security Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Failure Management ,[object Object],[object Object]
Failure Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Failure Management Normal operation Retry Malfunction System  reconstruction Malfunction Normal operation Failure management program Failure management program The failure circumstances are recorded The location where the failure occurred is separated Instruction retry and failure management program
Supervisor ,[object Object],[object Object],[object Object]
Where to Get More Information ,[object Object],[object Object],[object Object],[object Object]
Operating System System disk Printer System constants and parameters Interrupt handler routines Command processor I/O Control system File system Transient area The components of a typical microcomputer operating system Resident operating system
OS Categories ,[object Object],[object Object],[object Object],[object Object],[object Object]
Real-time OS ,[object Object],[object Object],[object Object],[object Object]
Single-user, Single-task OS ,[object Object],[object Object],[object Object]
Single-user, Multi-task OS ,[object Object],[object Object],[object Object]
Network OS ,[object Object],[object Object],[object Object],[object Object],[object Object]
Multi-user OS ,[object Object],[object Object],[object Object],[object Object],[object Object]
Types of OS ,[object Object],[object Object],[object Object],[object Object],[object Object]
Multiple Virtual Storage (MVS) ,[object Object],[object Object],[object Object]
MVS Configuration
Multiple Virtual Storage (MVS) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
UNIX ,[object Object],[object Object],[object Object]
UNIX Configuration
UNIX ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
UNIX ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Unix Family Tree UNICS (Uniplexed Operating and Computing System) 7 th  Edition [1978] BSD (Berkeley Software Distribution) [1969] 5 th  Edition [1973] 6 th  Edition [1976] SVR5 (System V) [1979] [1983] Sun  OS 5.x/Solaris HP  HP-UX IBM  AIX SGI  IRIX DEC  Digital UNIX (formerly OSF/1) Sun  OS 4.x DEC  Ultrix Canon  NextStep Apple  OS X
Why UNIX? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Unix Cold Boot Power-On Self Test (POST) Probing the bus for boot device ROM Reading the boot program Read in the boot kernel Initialize the system Start dummy system processes Start  init Execute startup scripts
Unix Shut Down ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Unix Security Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Unix Job Management ,[object Object],[object Object],[object Object],[object Object],[object Object]
Unix Job Management ,[object Object],[object Object],[object Object],Unix commands Interpret requests Execute requests User Shell Kernel
Unix Structure Shell File System Kernel Device Drivers Process Memory
Unix Commands UNIX DOS REMARKS tar1 backup tape archive cd cd change directory fsck chkdsk file system check clear cls clear screen cmp compare compare files cp copy copy a file date date set/show date and time rm del remove a file ls dir list directory grep find global regular expression print format format format disk mkdir md make directory more more show file page at a time lp print line printer rmdir rd remove directory set set show/set environment variables sort sort sort a file cat type concatenate a file
Unix File Management ,[object Object],[object Object],/ var lib dev bin usr
Unix Process Management ,[object Object],text data bss user stack kernel stack program's instructions initialized program's variables uninitialized program's variables variables allocated locally and parameters passed to functions in the program
Unix Process Management ,[object Object],[object Object],[object Object],[object Object]
Unix Process Management ,[object Object],[object Object],[object Object],[object Object]
Unix Process Management ,[object Object],[object Object],[object Object],[object Object],[object Object]
Unix Memory Management ,[object Object],[object Object],[object Object],[object Object]
Unix Memory Management ,[object Object],[object Object],[object Object]
Unix Memory Management ,[object Object],[object Object],[object Object],[object Object]
Unix Memory Management ,[object Object],[object Object],[object Object]
Unix Memory Management ,[object Object],[object Object],[object Object],[object Object],[object Object]
Windows ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Win2K
Win9x configuration
Windows ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Windows .Net Boot-up Power On Bootstrap Loader Load OS & Device drivers Launch startup Power-On Self Test Reset Initialize hardware
Windows .Net Security Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Windows .Net Security Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Windows .Net Job Management ,[object Object],[object Object],[object Object],[object Object]
Windows .Net File Management ,[object Object],[object Object],[object Object],[object Object]
Windows .Net Disk Management ,[object Object],[object Object],[object Object],[object Object]
Windows .Net Process Management ,[object Object],[object Object],[object Object]
Windows .Net Memory Management ,[object Object],[object Object],[object Object],[object Object],[object Object]
Windows .Net Failure Management ,[object Object],[object Object]
MacOS ,[object Object],[object Object]
MacOS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OS X Interface
OS X ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Linux ,[object Object],[object Object],[object Object]
Network OS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Middleware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Database Management System ,[object Object],[object Object],[object Object],[object Object],[object Object]
Communication  Management System ,[object Object],[object Object],[object Object],[object Object],[object Object]
Software Development  Support Tool ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Operation Management Tool ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Object Request Broker ,[object Object],[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

services and system calls of operating system
services and system calls of operating system services and system calls of operating system
services and system calls of operating system Saurabh Soni
 
Chapter 2: Operating System Structures
Chapter 2: Operating System StructuresChapter 2: Operating System Structures
Chapter 2: Operating System StructuresShafaan Khaliq Bhatti
 
Operating System 3
Operating System 3Operating System 3
Operating System 3tech2click
 
OS Components and Structure
OS Components and StructureOS Components and Structure
OS Components and Structuresathish sak
 
Structure of operating system
Structure of operating systemStructure of operating system
Structure of operating systemGayathriS578276
 
Processes Control Block (Operating System)
Processes Control Block (Operating System)Processes Control Block (Operating System)
Processes Control Block (Operating System)Imdad Ullah
 
OS - Ch2
OS - Ch2OS - Ch2
OS - Ch2sphs
 
OS Functions and Services
OS Functions and ServicesOS Functions and Services
OS Functions and Servicessgpraju
 
Operating-System Structures
Operating-System StructuresOperating-System Structures
Operating-System StructuresCloudbells.com
 
Operating system structures
Operating system structuresOperating system structures
Operating system structuresMohd Arif
 
system calls, single user, multiuser os ...
system calls, single user, multiuser os                                      ...system calls, single user, multiuser os                                      ...
system calls, single user, multiuser os ...myrajendra
 
Operating System Concepts Presentation
Operating System Concepts PresentationOperating System Concepts Presentation
Operating System Concepts PresentationNitish Jadia
 
Operating System Lecture Notes
Operating System Lecture NotesOperating System Lecture Notes
Operating System Lecture NotesFellowBuddy.com
 
Chapter 2 - Operating System Structures
Chapter 2 - Operating System StructuresChapter 2 - Operating System Structures
Chapter 2 - Operating System StructuresWayne Jones Jnr
 
Bba203 unit 2 operating system concepts
Bba203   unit 2 operating system conceptsBba203   unit 2 operating system concepts
Bba203 unit 2 operating system conceptskinjal patel
 

La actualidad más candente (20)

services and system calls of operating system
services and system calls of operating system services and system calls of operating system
services and system calls of operating system
 
Chapter 2: Operating System Structures
Chapter 2: Operating System StructuresChapter 2: Operating System Structures
Chapter 2: Operating System Structures
 
App A
App AApp A
App A
 
Operating System 3
Operating System 3Operating System 3
Operating System 3
 
OS Components and Structure
OS Components and StructureOS Components and Structure
OS Components and Structure
 
Structure of operating system
Structure of operating systemStructure of operating system
Structure of operating system
 
Processes Control Block (Operating System)
Processes Control Block (Operating System)Processes Control Block (Operating System)
Processes Control Block (Operating System)
 
OS - Ch2
OS - Ch2OS - Ch2
OS - Ch2
 
OS Functions and Services
OS Functions and ServicesOS Functions and Services
OS Functions and Services
 
Complete Operating System notes
Complete Operating System notesComplete Operating System notes
Complete Operating System notes
 
Operating-System Structures
Operating-System StructuresOperating-System Structures
Operating-System Structures
 
System calls
System callsSystem calls
System calls
 
Operating system structures
Operating system structuresOperating system structures
Operating system structures
 
system calls, single user, multiuser os ...
system calls, single user, multiuser os                                      ...system calls, single user, multiuser os                                      ...
system calls, single user, multiuser os ...
 
Operating System Concepts Presentation
Operating System Concepts PresentationOperating System Concepts Presentation
Operating System Concepts Presentation
 
OS Structure
OS StructureOS Structure
OS Structure
 
Operating System Lecture Notes
Operating System Lecture NotesOperating System Lecture Notes
Operating System Lecture Notes
 
System call
System callSystem call
System call
 
Chapter 2 - Operating System Structures
Chapter 2 - Operating System StructuresChapter 2 - Operating System Structures
Chapter 2 - Operating System Structures
 
Bba203 unit 2 operating system concepts
Bba203   unit 2 operating system conceptsBba203   unit 2 operating system concepts
Bba203 unit 2 operating system concepts
 

Destacado

12. Computer Systems Hardware 2
12. Computer Systems   Hardware 212. Computer Systems   Hardware 2
12. Computer Systems Hardware 2New Era University
 
Vtoc, Use Case, Activity Diagram
Vtoc, Use Case, Activity DiagramVtoc, Use Case, Activity Diagram
Vtoc, Use Case, Activity DiagramNew Era University
 
Linux Kernel Security: Adapting 1960s Technology to Meet 21st Century Threats
Linux Kernel Security: Adapting 1960s Technology to Meet 21st Century ThreatsLinux Kernel Security: Adapting 1960s Technology to Meet 21st Century Threats
Linux Kernel Security: Adapting 1960s Technology to Meet 21st Century ThreatsJames Morris
 
Unix features, posix and single unix specification
Unix features, posix and single unix specificationUnix features, posix and single unix specification
Unix features, posix and single unix specificationsudha rani
 
Operating Systems 1 (3/12) - Architectures
Operating Systems 1 (3/12) - ArchitecturesOperating Systems 1 (3/12) - Architectures
Operating Systems 1 (3/12) - ArchitecturesPeter Tröger
 
Chapter 01
Chapter 01Chapter 01
Chapter 01llmeade
 
14b. Computer Systems Extra Output
14b. Computer Systems   Extra Output14b. Computer Systems   Extra Output
14b. Computer Systems Extra OutputNew Era University
 
Operating system security (a brief)
Operating system security (a brief)Operating system security (a brief)
Operating system security (a brief)cnokia
 
13a.Computer Systems Extra Input
13a.Computer Systems   Extra Input13a.Computer Systems   Extra Input
13a.Computer Systems Extra InputNew Era University
 
Intro to MATLAB GUI
Intro to MATLAB GUIIntro to MATLAB GUI
Intro to MATLAB GUIAsjad Ali
 
Chapter 04
Chapter 04Chapter 04
Chapter 04llmeade
 
Chapter 03
Chapter 03Chapter 03
Chapter 03llmeade
 
Linea del tiempo de los sistemas operativos
Linea del tiempo de los sistemas operativosLinea del tiempo de los sistemas operativos
Linea del tiempo de los sistemas operativosEduardo Reza
 
27. Computer Applications Business And Engineering
27. Computer Applications   Business And Engineering27. Computer Applications   Business And Engineering
27. Computer Applications Business And EngineeringNew Era University
 
Storage Virtualization Introduction
Storage Virtualization IntroductionStorage Virtualization Introduction
Storage Virtualization IntroductionStephen Foskett
 

Destacado (20)

12. Computer Systems Hardware 2
12. Computer Systems   Hardware 212. Computer Systems   Hardware 2
12. Computer Systems Hardware 2
 
Vtoc, Use Case, Activity Diagram
Vtoc, Use Case, Activity DiagramVtoc, Use Case, Activity Diagram
Vtoc, Use Case, Activity Diagram
 
Linux Kernel Security: Adapting 1960s Technology to Meet 21st Century Threats
Linux Kernel Security: Adapting 1960s Technology to Meet 21st Century ThreatsLinux Kernel Security: Adapting 1960s Technology to Meet 21st Century Threats
Linux Kernel Security: Adapting 1960s Technology to Meet 21st Century Threats
 
OSCh3
OSCh3OSCh3
OSCh3
 
Cs1 3-operating systems
Cs1 3-operating systemsCs1 3-operating systems
Cs1 3-operating systems
 
Unix features, posix and single unix specification
Unix features, posix and single unix specificationUnix features, posix and single unix specification
Unix features, posix and single unix specification
 
Operating Systems 1 (3/12) - Architectures
Operating Systems 1 (3/12) - ArchitecturesOperating Systems 1 (3/12) - Architectures
Operating Systems 1 (3/12) - Architectures
 
OS Security 2009
OS Security 2009OS Security 2009
OS Security 2009
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
14b. Computer Systems Extra Output
14b. Computer Systems   Extra Output14b. Computer Systems   Extra Output
14b. Computer Systems Extra Output
 
Operating system security (a brief)
Operating system security (a brief)Operating system security (a brief)
Operating system security (a brief)
 
13a.Computer Systems Extra Input
13a.Computer Systems   Extra Input13a.Computer Systems   Extra Input
13a.Computer Systems Extra Input
 
Intro to MATLAB GUI
Intro to MATLAB GUIIntro to MATLAB GUI
Intro to MATLAB GUI
 
Chapter 04
Chapter 04Chapter 04
Chapter 04
 
Chapter 03
Chapter 03Chapter 03
Chapter 03
 
Linea del tiempo de los sistemas operativos
Linea del tiempo de los sistemas operativosLinea del tiempo de los sistemas operativos
Linea del tiempo de los sistemas operativos
 
Plan 9: Not (Only) A Better UNIX
Plan 9: Not (Only) A Better UNIXPlan 9: Not (Only) A Better UNIX
Plan 9: Not (Only) A Better UNIX
 
27. Computer Applications Business And Engineering
27. Computer Applications   Business And Engineering27. Computer Applications   Business And Engineering
27. Computer Applications Business And Engineering
 
Storage Virtualization Introduction
Storage Virtualization IntroductionStorage Virtualization Introduction
Storage Virtualization Introduction
 
Animated presentation
Animated presentationAnimated presentation
Animated presentation
 

Similar a 16. Computer Systems Basic Software 2

Unix Operating System
Unix Operating SystemUnix Operating System
Unix Operating Systemsubhsikha
 
operating system structure
operating system structureoperating system structure
operating system structureHAMZA AHMED
 
01. english version operating system
01. english version   operating system01. english version   operating system
01. english version operating systemJimmi Sitorus
 
Operating System 2
Operating System 2Operating System 2
Operating System 2tech2click
 
ch3 - operating system structures.ppt
ch3 - operating system structures.pptch3 - operating system structures.ppt
ch3 - operating system structures.pptdivyang32
 
Lecture_02_Operating System Structures Operating Systems
Lecture_02_Operating System Structures Operating SystemsLecture_02_Operating System Structures Operating Systems
Lecture_02_Operating System Structures Operating SystemsArnoyKhan
 
OS UNIT 1 PPT.pptx
OS UNIT 1 PPT.pptxOS UNIT 1 PPT.pptx
OS UNIT 1 PPT.pptxPRABAVATHIH
 
chapter 3 opreating system lecture note and its is impaortamt concept for mn
chapter 3 opreating system  lecture note and its is impaortamt concept for mnchapter 3 opreating system  lecture note and its is impaortamt concept for mn
chapter 3 opreating system lecture note and its is impaortamt concept for mndejenehundaol91
 
LinuxOS-1 (1).ppt
LinuxOS-1 (1).pptLinuxOS-1 (1).ppt
LinuxOS-1 (1).pptSavitha74
 
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya JyothiIntroduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya JyothiSowmya Jyothi
 
Unix operating system architecture with file structure
Unix operating system architecture with file structure Unix operating system architecture with file structure
Unix operating system architecture with file structure amol_chavan
 
01 operating systems final
01 operating systems final01 operating systems final
01 operating systems finalAman Garg
 
Section02-Structures.ppt
Section02-Structures.pptSection02-Structures.ppt
Section02-Structures.pptJamelPandiin2
 

Similar a 16. Computer Systems Basic Software 2 (20)

Unix Operating System
Unix Operating SystemUnix Operating System
Unix Operating System
 
operating system structure
operating system structureoperating system structure
operating system structure
 
Unix case-study
Unix case-studyUnix case-study
Unix case-study
 
01. english version operating system
01. english version   operating system01. english version   operating system
01. english version operating system
 
Operating System 2
Operating System 2Operating System 2
Operating System 2
 
Ch2
Ch2Ch2
Ch2
 
ch3 - operating system structures.ppt
ch3 - operating system structures.pptch3 - operating system structures.ppt
ch3 - operating system structures.ppt
 
Lecture_02_Operating System Structures Operating Systems
Lecture_02_Operating System Structures Operating SystemsLecture_02_Operating System Structures Operating Systems
Lecture_02_Operating System Structures Operating Systems
 
OS UNIT 1 PPT.pptx
OS UNIT 1 PPT.pptxOS UNIT 1 PPT.pptx
OS UNIT 1 PPT.pptx
 
operating system structure
operating system structureoperating system structure
operating system structure
 
Introduction to Unix
Introduction to UnixIntroduction to Unix
Introduction to Unix
 
chapter 3 opreating system lecture note and its is impaortamt concept for mn
chapter 3 opreating system  lecture note and its is impaortamt concept for mnchapter 3 opreating system  lecture note and its is impaortamt concept for mn
chapter 3 opreating system lecture note and its is impaortamt concept for mn
 
LinuxOS-1 (1).ppt
LinuxOS-1 (1).pptLinuxOS-1 (1).ppt
LinuxOS-1 (1).ppt
 
Ch3
Ch3Ch3
Ch3
 
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya JyothiIntroduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
 
Unix operating system architecture with file structure
Unix operating system architecture with file structure Unix operating system architecture with file structure
Unix operating system architecture with file structure
 
01 operating systems final
01 operating systems final01 operating systems final
01 operating systems final
 
Section02-Structures.ppt
Section02-Structures.pptSection02-Structures.ppt
Section02-Structures.ppt
 
CH02.pdf
CH02.pdfCH02.pdf
CH02.pdf
 
Operating system
Operating systemOperating system
Operating system
 

Más de New Era University

Sample Narrative report for seminars
Sample Narrative report for seminarsSample Narrative report for seminars
Sample Narrative report for seminarsNew Era University
 
Vtoc, Use Case, Activity Diagram
Vtoc, Use Case, Activity DiagramVtoc, Use Case, Activity Diagram
Vtoc, Use Case, Activity DiagramNew Era University
 
17. Computer System Configuration And Methods
17. Computer System   Configuration And Methods17. Computer System   Configuration And Methods
17. Computer System Configuration And MethodsNew Era University
 
14c. Computer Systems Extra Storage
14c. Computer Systems   Extra Storage14c. Computer Systems   Extra Storage
14c. Computer Systems Extra StorageNew Era University
 
14. Computer Systems Output Devices
14. Computer Systems   Output Devices14. Computer Systems   Output Devices
14. Computer Systems Output DevicesNew Era University
 
13. Computer Systems Input And Output Architecture
13. Computer Systems   Input And  Output Architecture13. Computer Systems   Input And  Output Architecture
13. Computer Systems Input And Output ArchitectureNew Era University
 
11. Computer Systems Hardware 1
11. Computer Systems   Hardware 111. Computer Systems   Hardware 1
11. Computer Systems Hardware 1New Era University
 

Más de New Era University (8)

Sample Narrative report for seminars
Sample Narrative report for seminarsSample Narrative report for seminars
Sample Narrative report for seminars
 
Vtoc, Use Case, Activity Diagram
Vtoc, Use Case, Activity DiagramVtoc, Use Case, Activity Diagram
Vtoc, Use Case, Activity Diagram
 
17. Computer System Configuration And Methods
17. Computer System   Configuration And Methods17. Computer System   Configuration And Methods
17. Computer System Configuration And Methods
 
14c. Computer Systems Extra Storage
14c. Computer Systems   Extra Storage14c. Computer Systems   Extra Storage
14c. Computer Systems Extra Storage
 
14. Computer Systems Output Devices
14. Computer Systems   Output Devices14. Computer Systems   Output Devices
14. Computer Systems Output Devices
 
13. Computer Systems Input And Output Architecture
13. Computer Systems   Input And  Output Architecture13. Computer Systems   Input And  Output Architecture
13. Computer Systems Input And Output Architecture
 
31. Multimedia System
31. Multimedia System31. Multimedia System
31. Multimedia System
 
11. Computer Systems Hardware 1
11. Computer Systems   Hardware 111. Computer Systems   Hardware 1
11. Computer Systems Hardware 1
 

Último

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Último (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

16. Computer Systems Basic Software 2

  • 1. Part2: Computer Systems Chapter 2: Basic Software
  • 2.
  • 3.
  • 4.
  • 5.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. Failure Management Normal operation Retry Malfunction System reconstruction Malfunction Normal operation Failure management program Failure management program The failure circumstances are recorded The location where the failure occurred is separated Instruction retry and failure management program
  • 19.
  • 20.
  • 21. Operating System System disk Printer System constants and parameters Interrupt handler routines Command processor I/O Control system File system Transient area The components of a typical microcomputer operating system Resident operating system
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 31.
  • 32.
  • 34.
  • 35.
  • 36. Unix Family Tree UNICS (Uniplexed Operating and Computing System) 7 th Edition [1978] BSD (Berkeley Software Distribution) [1969] 5 th Edition [1973] 6 th Edition [1976] SVR5 (System V) [1979] [1983] Sun OS 5.x/Solaris HP HP-UX IBM AIX SGI IRIX DEC Digital UNIX (formerly OSF/1) Sun OS 4.x DEC Ultrix Canon NextStep Apple OS X
  • 37.
  • 38. Unix Cold Boot Power-On Self Test (POST) Probing the bus for boot device ROM Reading the boot program Read in the boot kernel Initialize the system Start dummy system processes Start init Execute startup scripts
  • 39.
  • 40.
  • 41.
  • 42.
  • 43. Unix Structure Shell File System Kernel Device Drivers Process Memory
  • 44. Unix Commands UNIX DOS REMARKS tar1 backup tape archive cd cd change directory fsck chkdsk file system check clear cls clear screen cmp compare compare files cp copy copy a file date date set/show date and time rm del remove a file ls dir list directory grep find global regular expression print format format format disk mkdir md make directory more more show file page at a time lp print line printer rmdir rd remove directory set set show/set environment variables sort sort sort a file cat type concatenate a file
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56. Win2K
  • 58.
  • 59. Windows .Net Boot-up Power On Bootstrap Loader Load OS & Device drivers Launch startup Power-On Self Test Reset Initialize hardware
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.

Notas del editor

  1. Instruction Retry A function that automatically retries the execution of an instruction when a malfunction occurs Failure Management Program Records the failure circumstances, (if malfunction repeats) isolates location where failure occurred and reconstructs the system
  2. Refer to Text Page 109 & 110 for MVS Configuration and it’s Characteristics
  3. Refer to Text Page 110 & 111 for UNIX Configuration and it’s Characteristics
  4. Refer to Text Page 111 & 112 for Windows Configuration and it’s Characteristics
  5. Linux - a Unix-like operating system named for its author, Linus Torvalds. Linux was designed to provide personal computer users a free or very low-cost operating system comparable to traditional and usually more expensive UNIX systems. Although copyrights are held by various creators of Linux's components, Linux is distributed using the Free Software Foundation's copyleft stipulations that mean any copy is in turn freely available to others. Unlike Windows and other proprietary systems, Linux is publicly open and extendible by contributors. It is considered fast and reliable as both a Web server and a workstation and runs on many different kinds of hardware, including the Alpha, Amiga, Atari, IBM, Intel, PowerPC/Macintosh, SGI, and Sun Sparc platforms. Some vendors do sell collections, or distributions, of the Linux kernel, plus Linux drivers, applications, and utilities for a price. Linux is sometimes suggested as a possible publicly-developed alternative to the desktop predominance of Microsoft Windows. Although Linux is popular among users already familiar with UNIX, it remains far behind Windows in numbers of users.
  6. NetWare, made by Novell, is the most widely-installed network server operating system . Initially very successful in installing its products in large and small office local area networks (LANs), Novell has redesigned (or at least refeatured) NetWare to work successfully as part of larger and heterogeneous networks, including the Internet. NetWare's primary competitor is the Microsoft Windows NT operating system.