Module 3
Module 3
Module 3
Windows is a graphical operating system developed by Microsoft. It allows users to view and store
files, run the software, play games, watch videos, and provides a way to connect to the internet. It
was released for both home computing and professional works.
It was released for both home computing and professional functions of Windows on November
1983. Later, it was released on many versions of Windows as well as the current version, Windows
10.
Editions of Windows
Microsoft has produced several editions of Windows, starting with Windows XP. These versions have
the same core operating system, but some versions included advance features with an additional
cost. There are two most common editions of Windows:
Windows Home
Windows Home is basic edition of Windows. It offers all the fundamental functions of Windows, such
as browsing the web, connecting to the Internet, playing video games, using office software,
watching videos. Furthermore, it is less expensive and comes pre-installed with many new
computers.
Windows Professional
Windows Professional is also known as Window Pro or win Pro. It is an enhanced edition of
Windows, which is beneficial for power users and small to medium-size businesses. It contains all
features of Windows Home as well as the following:
Remote Desktop: Windows Professional editions allow users to create a remote desktop connection.
It provides users the option to connect with another computer remotely, including share the control
of its mouse, keyboard, and view display. It is mainly accessed with the help of port 3389.
Additionally, we can also use the TeamViewer or VNC application to create a remote desktop
connection.
Trusted Boot: It provides security as encrypting to the boot loader and protects the computer from
rootkits (Collection of software tools that allow users to enter another computer through an
unauthorized way known as rootkits).
Bitlocker: It allows users to encrypt a storage drive by using AES (Advanced Encryption Standard)
algorithm. This feature is present in Windows 7, and Windows Vista (Only ultimate and Enterprise
versions), including Windows Server 2008.
It is used to display the files and folders which are on the computer. It is also known as Windows
Explorer. It gives users the ability to browse data on the hard drive, SSD, and other inserted
removable disks. It allows the user to manage the content according to their preference such as a
user can delete or rename a file, and search and transfer data.
4. Internet Browser
One of the major use of computers is to access the web/internet. Therefore, an internet browser is
very necessary to search for anything, view pages, do online shopping, play games, etc. There is a
pre-installed internet browser available in the Windows operating system. From Windows 10
onwards, the Edge internet browser is the default browser, while earlier internet explorer used to be
the default browser.
5. Disk Cleanup
One of the major tasks of an operating system is to perform cleanup operations. Disk Cleanup is a
feature of the Windows operating system that is used to free up disk space by deleting unnecessary
files or temporary files no longer required. It helps increase the system's performance and boosts
storage space to download programs and documents. We can open disk cleanup by using the
following steps:
Right-click on any of the disk drives and click on the properties option from the drop-down menu.
6. Speed
Aside from the incompatibilities and other concerns that many users had with Vista, one of the most
obvious was performance — it simply felt too slow in comparison to XP, even on high-end hardware.
Windows 7 feels more quick and sprightly, and Microsoft spent a lot of time and effort perfecting the
Start Menu reaction. Microsoft has also identified the need for enhanced desktop responsiveness,
which creates the appearance that the machine is responding to the user and that the user is in
charge – something that Vista frequently lacked.
7. Hardware Requirements
Vista has a reputation for making even the most powerful hardware appear mundane. Windows 7,
on the other hand, will function smoothly on older systems, making the switch from Windows XP
easier. Microsoft is promoting Windows 7 for netbooks as well. This could be a modern alternative
for Windows XP, which has resurfaced as the preferred operating system displacing Linux. The
disadvantage is that Windows 7 Starter Edition, as it will be known, will only allow three applications
to run at once.
8. Search and Organization
One of the nicest features of Windows 7 is the upgraded search function, which now competes with
Mac OS X's Spotlight in terms of speed and ease of use. Typing 'mouse', for example, will bring up
the mouse option in the control panel, while typing a word will display it and divide it into files,
directories, and apps nicely. The concept of Libraries is also introduced, which expands on the 'My
Documents' concept. The various Libraries, such as Documents and Pictures, will monitor multiple
locations that you can add yourself, allowing you to maintain everything in one location.
9. Compatibility
Many programs used by people and businesses on Windows XP did not work right away and required
upgrades, but with Windows 7, practically all Vista-compatible applications should still work.
10. Taskbar
At first sight, the taskbar appears to have remained largely unchanged since Vista. Taskbar icons are
now larger by default, and objects are grouped together rather than labelled with clunky text. A stack
will appear on the taskbar if you have many Word documents or Windows Explorer windows open.
When you move your cursor over the program, each Window will appear as a thumbnail. When you
hover your mouse over each thumbnail, it will become visible. Each document or window can be
closed immediately from the thumbnail, or it can be brought to the front by clicking on it. A small
arrow to the right of programs like Word in the Start menu now extends to show a list of recent
documents, which may be pinned to keep one on the list permanently. The above points make the
taskbar a significant feature of the windows operating system
11. Safety
Parents may monitor and regulate their children's actions on a device using activity reports and
safety restrictions, by Family Safety's parental controls. The new "Refresh" and "Reset"
functionalities in Windows 8 also allow for integrated system recovery, including system recovery
from a USB device. The first security patches for Windows 8 has been delivered on November 13,
2012, and included three changes that Microsoft judged "important."
12. Interface
The user interface of Windows has undergone substantial improvements, many of which are focused
on improving the experience on tablet PCs and other touchscreen devices. The new user interface is
based on Microsoft's Metro design language, and it features a Start screen similar to that of
Windows Phone for opening apps. The Start screen shows a customizable grid of tiles that link to a
variety of apps and desktop programs, some of which can display continually updated information
and content via "live tiles." Apps can be snapped to the side of a screen as a type of multitasking.
One of the most important functions of the operating system is controlling the system's health. For
this purpose, it monitors and observes the delay time between a service being requested and the
requested service being served. This delay time is reduced as much as possible to improve the overall
performance of the system.
Memory Management
In a computer system, we have primary memory, which is also called main memory, and it is made by
the sequence of bytes. Each byte in the main memory has a unique address which helps it to check if
it is occupied or not. For executing each program in its computer system, it should be in the main
memory. Operating systems can easily check which bytes of main memory are empty and which are
not. So it allocates the main memory for the program execution, and when the program is completed
or terminated, then it deallocates the memory. Operating systems also keep a record that which byte
of memory is assigned to which program.
Device Management
The operating system manages the communication between the computer system and the
peripheral devices connected to the I/O port of the system. Peripheral devices use their respective
drivers to communicate with the system. The operating system determines which program or process
is accessed by which connection and device. It also makes sure when a program is executed or
terminated, it will stop the communication between the device and the computer system.
There is other software in the system which is coordinated by the operating system so that users can
access them efficiently, like assemblers, compilers, etc.
Process Management
The process is a program under the execution. The operating system manages all the processes so
that each process gets the CPU for a specific time to execute itself, and there will be less waiting time
for each process. This management is also called process scheduling.
First Come First Serve (FCFS) Algorithm: In this algorithm, which comes first is served first by the
CPU until it is completed. It is a non-preemptive algorithm which means it cannot be terminated
without completing it.
Shortest Job First (SJF) Algorithm: The process which has the shortest burst time (execution time)
that will be served first by the CPU.
Longest Job First (LJF) Algorithm: This algorithm is based on the phenomenon that the process that
has the longest execution time will be served first by the processor.
Round Robin Algorithm: In this algorithm, there is a specific time quanta assigned for each process.
If the process is not executed in time quanta, it is sent to the waiting queue for its next turn.
Priority Scheduling Algorithm: Processes are given the priority based on different criteria and
scheduled according to the highest priority. Criteria can be burst time or arrival time etc.
Resource Allocation
The operating system manages all the resources of the computer system. It ensures the use of all the
resources by managing which resource is used by which process and for how much time.
All the data and information available on the machine are protected by the operating system. If any
external resource tries to attack the computer resource and steal the data, then the operating
system helps to prevent the attack.
Input/output devices like mouse, keyboards, printers etc., are external I/O devices, and there are
different natures of each device. The operating system appropriately manages the input and output
operation of these devices.
Job Priority:
The work of job priority is creation and promotion. It determines what action should be done first in
a computer system.
The operating systems make automatic changes to the task through specific control programs. These
programs are called Special Control Program.
The operating system prepares the list of tasks to be performed for the device of the computer
system. The operating system decides which device to use for which task. This action becomes
complicated when multiple tasks are to be performed simultaneously in a computer system. The
scheduling programs of the operating system determine the order in which tasks are completed. It
performs these tasks based on the priority of performing the tasks given by the user. It makes the
tasks available based on the priority of the device.
Security:
Computer security is a very important aspect of any operating system. The reliability of an operating
system is determined by how much better security it provides us. Modern operating systems use a
firewall for security. A firewall is a security system that monitors every activity happening in the
computer and blocks that activity in case of any threat.
Monitoring activities:
The operating system takes care of the activities of the computer system during various processes.
This aborts the program if there are errors. The operating system sends instant messages to the user
for any unexpected error in the input/output device. It also provides security to the system when the
operating system is used in systems operated by multiple users. So that illegal users cannot get data
from the system.
Job accounting:
It keeps track of time & resources used by various jobs and users.
File management serves as the intermediary layer between applications and the underlying storage
hardware, providing a logical and organized structure for storing and retrieving data. It involves
managing file metadata, which includes attributes such as file name, file size, creation date, access
permissions, ownership, and file type.
1. File organization: To provide a logical and efficient way of organizing files and folders, so that
they can be easily located and accessed by users.
2. Data security: To protect files from unauthorized access, accidental deletion, or modification
and provide a mechanism for data recovery.
3. Data sharing: To enable multiple users to access and edit the same file simultaneously or
share files with other devices on a network.
4. File backup: To create copies of important files to prevent data loss in case of hardware
failure or other issues.
5. File compression: To reduce the size of files to save disk space or to make them easier to
transfer over the internet.
6. File encryption: To protect files from unauthorized access by encrypting them with a
password or other security measures.
7. File retrieval: To provide an efficient way of searching and retrieving files based on keywords,
file attributes, or other parameters.
8. Space management: To manage the storage space efficiently by allocating and deallocating
space as required by the files and folders.
9. File versioning: To maintain multiple versions of a file, so that previous versions can be
accessed and compared if needed.
10. File Auditing: To provide a mechanism to trace the files and folder access and modification
history.
1. File creation: Creating new files and folders for storing data.
2. File organization: Organizing files and folders in a logical and efficient manner, such as
grouping related files together in a common folder.
3. File backup: Creating copies of important files to prevent data loss in case of hardware
failure or other issues.
4. File search: Finding files quickly and easily by searching for keywords or file attributes such
as date created or file size.
5. File compression: Reducing the size of files to save disk space or to make them easier to
transfer over the internet.
6. File encryption: Protect files from unauthorized access by encrypting them with a password
or other security measures.
7. File sharing: Allowing multiple users to access and edit the same file simultaneously or share
files with other devices on a network.
8. File deletion: Removing files or folders from the storage device to free up space.
9. File recovery: Restoring files that have been accidentally deleted or lost due to system
crashes or other issues.
10. File permissions: Setting access controls for files and folders to determine who can read,
write, or execute them.
Types of File Management in Operating System
There are several types of file management in operating systems, including:
1. Sequential File Management: In a sequential file management system, files are stored on
storage devices in a sequential manner. Each file occupies a contiguous block of storage
space, and accessing data within the file requires reading from the beginning until the
desired location is reached. This type of file management is simple but can be inefficient for
random access operations.
2. Direct File Management: Direct file management, also known as random access file
management, enables direct access to any part of a file without the need to traverse the
entire file sequentially. It utilizes a file allocation table (FAT) or a similar data structure to
keep track of file locations. This approach allows for faster and more efficient file access,
particularly for larger files.
3. Indexed File Management: Indexed file management utilizes an index structure to improve
file access efficiency. In this system, an index file is created alongside the main data file,
containing pointers to various locations within the file. These pointers allow for quick
navigation and direct access to specific data within the file.
4. File Allocation Table (FAT) File System: The FAT file system is commonly used in various
operating systems, including older versions of Windows. It employs a table, known as the file
allocation table, to track the allocation status of each cluster on a storage device. The FAT file
system supports sequential and random access to files and provides a simple and reliable file
management structure.
5. New Technology File System (NTFS): NTFS is a more advanced file system commonly used in
modern Windows operating systems. It offers features such as enhanced security, file
compression, file encryption, and support for larger file sizes and volumes. NTFS utilizes a
complex structure to manage files efficiently and provides advanced file management
capabilities.
6. Distributed File Systems: Distributed file systems allow files to be stored across multiple
networked devices or servers, providing transparent access to files from different locations.
Examples include the Network File System (NFS) and the Server Message Block (SMB)
protocol used in network file sharing.
1. Windows Explorer on Windows OS: Windows Explorer is the default file management system
on Windows operating systems. It allows users to organize and manage files and folders and
search for and access files.
2. Finder on macOS: Finder is the default file management system on macOS. It allows users to
organize and manage files and folders and search for and access files.
3. File Manager on Linux: Linux operating systems often come with a default file manager such
as Nautilus, Dolphin, or PCManFM that allows users to organize and manage files and
folders, as well as search for and access files.
4. Network-attached storage (NAS) systems are specialized file management systems that can
store and manage files on a network, allowing multiple users to access and edit files
simultaneously.
5. Cloud-based file storage services: Services like Dropbox, Google Drive, and OneDrive provide
a file management system that allows users to store and manage files in the cloud, allowing
access from multiple devices and collaboration with other users.
6. Content management systems (CMS): These are specialized file management systems that
allow users to manage and organize digital assets like images, videos, and documents, and
also provide options for versioning and tagging.
7. Source code management systems: These are specialized file management systems for
managing source code, for example, Git, CVS and SVN.
8. Database management systems: These are specialized file management systems that allow
users to manage and organize large amounts of structured data, for example, MySQL,
MongoDB, and PostgreSQL.