SlideShare ist ein Scribd-Unternehmen logo
1 von 51
OOPS
Out of Present
Syllabus
Operating system (O.S)
An operating system (OS) is a set
of programs that manage computer
hardware resources and provide
common services for application
software. The operating system is the
most important type of system
software in a computer system. A
user cannot run an application
program on the computer without an
operating system, unless the
application program is self booting.
Operating Systems Services

Following are the five services provided by an operating systems

1] Program Execution
The purpose of a computer
systems is to allow the user to
execute programs. So the
operating systems provides an
environment where the user can
conveniently run programs. The
user does not have to worry
about the memory allocation or
multitasking or anything. These
things are taken care of by the
operating systems.
2] I/O Operations


Each program requires an
input and produces output.
This involves the use of I/O.
The operating systems hides
the user the details of
underlying hardware for the
I/O. All the user sees is that
the I/O has been performed
without any details. So the
operating systems by
providing I/O makes it
convenient for the users to
run programs.
3] File System Manipulation

The output of a program may
need to be written into new
files or input taken from
some files. The operating
systems provides this service.
The user does not have to
worry about secondary
storage management. User
gives a command for reading
or writing to a file and sees
his her task accomplished.
4] Communications


There are instances
where processes need to
communicate with each
other to exchange
information. It may be
between processes
running on the same
computer or running on
the different computers.
5] Error Detection


An error is one part of the
system may cause
malfunctioning of the
complete system. To avoid
such a situation the
operating system
constantly monitors the
system for detecting the
errors.
Types of Operating systems
As computers have progressed and developed so have the
operating systems.


  GUI - Short for Graphical User
  Interface, a GUI Operating System
  contains graphics and icons and is
  commonly navigated by using a
  computer mouse. Below are some
  examples of GUI Operating Systems.
  System 7.x
  Windows 98
  Windows CE
Multi-user - A multi-user operating system allows for
multiple users to use the same computer at the same time
and different times.
Linux
Unix
Windows 2000
Multiprocessing - An operating system capable of supporting and
utilizing more than one computer processor.
Linux
Unix
Windows 2000
Multitasking - An operating system that is capable of allowing
multiple software processes to run at the same time.

Unix
Windows 2000
Multithreading - Operating systems that allow different parts of
a software program to run concurrently. Operating systems that
would fall into this category are:
Linux
Unix
Windows 2000
Different Operating Systems

Microsoft Windows isn't the only operating system for personal computers, or
even the best... it's just the best-distributed. Its inconsistent behavior and an
interface that changes radically with every version are the main reasons people
find computers difficult to use.
MAC OS
The Mac OS user interface inspired the creation of Windows, and is still
the target Microsoft is trying to equal. As a popular consumer product,
there's plenty of software available for it, and it's moving beyond its
traditional niches of graphic design, education, and home use, into
general business use.etc
Ubuntu (Linux)
Linux ("LIH-nux") is a free Unix-like operating system, originally
developed by programmers who simply love the challenge of solving
problems and producing quality software. even if that means giving the
resulting product away.
Google Chrome OS

Google's Chrome OS is still vaporware so far, and it's arguably just
another flavor of Linux, but it promises to be a viable alternative to
Windows on small portable "netbooks" which will come with it
preinstalled.
Haiku
Haiku is based on BeOS, which was designed with multimedia in
mind, including the kinds of features that Microsoft is just recently
taking onto Windows.
The BSD Family
FreeBSD is commonly called "the free Unix". It's descended from the
classic 1970's Berkeley Software Distribution of Unix (from before the OS
became "UNIX"®), making it one of the most mature and stable operating
systems around.
OPENBSD

OpenBSD is "the other free Unix". It's similar to FreeBSD both in the
Berkeley code it's based on, and the licensing terms. One key advantage it
has over its BSD siblings is that it's incredibly secure from attack, as implied
by its blowfish mascot, and made explicit by their boast of only one
remotely-exploitable hole - ever - in their default installation.
NETBSD

NetBSD is "the other free Unix". It's the work of another group of
volunteer developers using the net to collaborate. Their mission is to
get the OS to run - and run well - on hardware platforms no other
Unix supports.
Syllable
Syllable is a free alternative OS for standard PCs. It uses some of the
better ideas from Unix, BeOS, AmigaOS, and others, and is compatible
enough with portable software written for Unix that many have already
been ported over to it.
And there are never ending O.S’s


Amiga      Did you know that there are a total of584+
           Operating systems in the world . And a matter of fact ,
MorphOS    there are   605 Linux distributions (Small Linux
RISC OS    based operating systems like android, symbian, Bada
           etc.)
GNU
Minix
2warp
MSDOS
A Small Talk about well known O.S

 Windows 98 (codenamed Memphis) is a graphical operating
 system by Microsoft. It is the second major release in the Windows 9x line of
 operating systems. It was released to manufacturing on 15 May 1998 and to
 retail on 25 June 1998. Windows 98 is the successor to Windows 95.
Windows NT
Windows NT is a family of operating systems produced by Microsoft, the first
version of which was released in July 1993. It was a powerful high-level-language-
based, processor-independent, multiprocessing, multiuser operating system with
features comparable to Unix. It was intended to complement consumer versions
of Windows that were based on MS-DOS.
ITS NOT LINUX ! ITS UBUNTU !

Ubuntu is an African      Ubuntu 4.10 (Warty Warthog)
                          Ubuntu 5.04 (Hoary Hedgehog)
ethic or humanist         Ubuntu 5.10 (Breezy Badger)
philosophy focusing on    Ubuntu 6.06 LTS (Dapper Drake)
                          Ubuntu 6.10 (Edgy Eft)
people's allegiances      Ubuntu 7.04 (Feisty Fawn)
and relations with each   Ubuntu 7.10 (Gutsy Gibbon)
other. The real           Ubuntu 8.04 LTS (Hardy Heron)
                          Ubuntu 8.10 (Intrepid Ibex)
meaning of “UBUNTU”       Ubuntu 9.04 (Jaunty Jackalope)
is “Humanity to           Ubuntu 9.10 (Karmic Koala)
                          Ubuntu 10.04 LTS (Lucid Lynx)
others”.                  Ubuntu 10.10 (Maverick Meerkat)
                          Ubuntu 11.04 (Natty Narwhal)
                          Ubuntu 11.10 (Oneiric Ocelot)
                          Ubuntu 12.04 LTS (Precise Pangolin)
The Birth Of Linux

In 1991, Linus Benedict Torvalds was a second year student of Computer
Science at the University of Helsinki and a self-taught hacker. The 21 year old
sandy haired soft-spoken Finn loved to tinker with the power of the
computers and the limits to which the system can be pushed.
With his legendary technical wizardry, he alone outclassed entire groups of
programmers from commercial software vendors in creating GCC, considered
as one of the most efficient and robust compilers ever created.

Linux is a Unix-like computer operating system assembled under the model
of free and open source software development and distribution. The defining
component of any Linux system is the Linux kernel, an operating system
kernel first released October 5, 1991 by Linus Torvalds. Linux system
distributions may vary in many details of system operation, configuration,
and software package selections.
The Mastermind Behind Linux
     Linus Torvalds


You are what you are. Whatever you
do, Do it for the person in the mirror.
Graphical User Interface (GUI)
A graphical user interface is a type of user
interface that allows users to interact with
electronic devices with images rather than text
commands.

GUIs can be used in computers, hand-held
devices such as MP3 players, portable media
players or gaming devices, household appliances
and office equipment .

A GUI represents the information and actions
available to a user through graphical icons and
visual indicators such as secondary notation, as
opposed to text-based interfaces, typed command
labels or text navigation.
New Features of the GUI

 Pointing device
 Icons
 Desktop
 Menus
 Folders
 Toolbar
 Attachments
 Multiple windows
 On-line Help
Beware Son,
Someone's watching!
Computer Security

Today, many people rely on computers to do homework,
work, and create or store useful information. Therefore, it
is important for the information on the computer to be
stored and kept properly. It is also extremely important for
people on computers to protect their computer from data
loss, misuse, and abuse. For example, it is crucial
for businesses to keep information they have secure so that
hackers can't access the information. Home users also need
to take means to make sure that their credit card
numbers are secure when they are participating in online
transactions.
A computer security risk is any action that could
cause loss of information, software, data,
processing incompatibilities, or cause damage to
computer hardware, a lot of these are planned to
do damage. An intentional breach in computer
security is known as a computer crime which is
slightly different from a cybercrime. A cybercrime
is known as illegal acts based on the internet and
is one of the FBI's top priorities.
There are several distinct
categories for people that cause
cybercrimes, and they are referred
to as hacker, cracker, cyber
terrorist, cyber extortionist,
unethical employee, script kiddy
and corporate spy.
“A good hacker is
known by
everyone but a
great hacker is
known by None.”
:- Kevin Mitnick
(World Most
Wanted Hacker)
“Hacking is easy as
anyone can do, but
not so easy that
everyone can do.”
:- Ankit Fadia
(Indian Hacker)
The Hacker.
The term hacker was actually known as a good word but now it has a very
negative view. A hacker is defined as someone who accesses a computer
or computer network unlawfully. They often claim that they do this to find leaks
in the security of a network.
The Cracker.
The term cracker has never been associated with something positive this refers to
someone how intentionally access a computer or computer network for evil
reasons. It's basically an evil hacker. They access it with the intent of destroying, or
stealing information. Both crackers and hackers are very advanced with network
skills.
The Cyber terrorist.
A cyber terrorist is someone who uses a computer network or the
internet to destroy computers for political reasons. It's just like a regular
terrorist attack because it requires highly skilled individuals, millions of
dollars to implement, and years of planning.
The Cyber extortionist.
The term cyber extortionist refers to someone who uses emails as an offensive
force. They would usually send a company a very threatening email stating that
they will release some confidential information, exploit a security leak, or
launch an attack that will harm a company's network. They will request a paid
sum of money to prevent the threat from being carried out, a bit like black
mailing.
The Unethical Employee.
An unethical employee is an employee that illegally accesses their company's
network for numerous reasons. One could be the money they can get from selling
top secret information, or some may be bitter and want revenge.
How basically a Hardware Key logger Works ?
The Script Kiddies.
A script kiddy is someone who is like a cracker because they may have the
intentions of doing harm, but they usually lack the technical skills. They are
usually silly teenagers that use prewritten hacking and cracking programs
The Corporate Spy.
A corporate spy has extremely high
computer and network skills and is
hired to break into a specific
computer or computer network to
steal or delete data and information.
Shady companies hire these type
people in a practice known as
corporate espionage. They do this to
gain an advantage over their
competition an illegal practice.
A Piece of Advice

Business and home users must do their best to protect or
safeguard their computers from security risks.
However, one must remember that there is no one hundred
percent guarantee way to protect your computer so becoming
more knowledgeable about them is a must during these days.
When you transfer information over a network it has a high
security risk compared to information transmitted in a business
network because the administrators usually take some extreme
measures to help protect against security risks.
Computer Worms & Viruses

A computer worm is a self-replicating malware computer
program, which uses a computer network to send copies of
itself to other nodes (computers on the network) and it may
do so without any user intervention.
Viruses
A computer virus is a computer program that can replicate itself and
spread from one computer to another. A true virus can spread from
one computer to another when its host is taken to the target
computer; for instance because a user sent it over a network or the
Internet, or carried it on a removable medium such as a floppy disk,
CD, DVD, or USB drive.
PLAY SAFE
Thanking You.
       Information researched by Mayank Rathore &
Divyendra Patil.

Presentation created by Divyendra Patil.

        Technical & Hardware material totally contributed by
Ninad Yadav.

Weitere ähnliche Inhalte

Was ist angesagt?

Operating System by cool buddy nakul
Operating System by cool buddy nakulOperating System by cool buddy nakul
Operating System by cool buddy nakul
cool buddy nakul
 
Operating System By Cool Buddy Nakul1
Operating System By Cool Buddy Nakul1Operating System By Cool Buddy Nakul1
Operating System By Cool Buddy Nakul1
cool buddy nakul
 

Was ist angesagt? (20)

What is Ubuntu - presentation
What is Ubuntu - presentationWhat is Ubuntu - presentation
What is Ubuntu - presentation
 
Linux vs windows
Linux vs windowsLinux vs windows
Linux vs windows
 
Features of windows operating system
Features of windows operating systemFeatures of windows operating system
Features of windows operating system
 
Windows7 Vs Linux
Windows7 Vs LinuxWindows7 Vs Linux
Windows7 Vs Linux
 
linux vs window
linux vs windowlinux vs window
linux vs window
 
A History of Microsoft Windows
A History of Microsoft WindowsA History of Microsoft Windows
A History of Microsoft Windows
 
Linux vs windows
Linux vs windowsLinux vs windows
Linux vs windows
 
Linux Vs Unix
Linux Vs UnixLinux Vs Unix
Linux Vs Unix
 
Linux
LinuxLinux
Linux
 
Windows operating system version
Windows operating system versionWindows operating system version
Windows operating system version
 
Unit 2 m1
Unit 2 m1Unit 2 m1
Unit 2 m1
 
Operating System by cool buddy nakul
Operating System by cool buddy nakulOperating System by cool buddy nakul
Operating System by cool buddy nakul
 
Operating System By Cool Buddy Nakul1
Operating System By Cool Buddy Nakul1Operating System By Cool Buddy Nakul1
Operating System By Cool Buddy Nakul1
 
A history of windows
A history of windowsA history of windows
A history of windows
 
Introduction to Ubantu
Introduction to UbantuIntroduction to Ubantu
Introduction to Ubantu
 
Windows Operating System
Windows Operating SystemWindows Operating System
Windows Operating System
 
windows vs Linux
windows vs Linuxwindows vs Linux
windows vs Linux
 
Operating System Presentation
Operating System PresentationOperating System Presentation
Operating System Presentation
 
History of linux
History of linuxHistory of linux
History of linux
 
windows vs linux
windows vs linuxwindows vs linux
windows vs linux
 

Andere mochten auch (7)

Oslecture1
Oslecture1Oslecture1
Oslecture1
 
презентація1
презентація1презентація1
презентація1
 
Process management
Process managementProcess management
Process management
 
φυτά και βότανα!
φυτά και βότανα!φυτά και βότανα!
φυτά και βότανα!
 
Acl 11 q4_bctc_hn
Acl 11 q4_bctc_hnAcl 11 q4_bctc_hn
Acl 11 q4_bctc_hn
 
AMA Seminars
AMA SeminarsAMA Seminars
AMA Seminars
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 

Ähnlich wie The Technology Talk

Introduction 2 linux ml
Introduction 2 linux mlIntroduction 2 linux ml
Introduction 2 linux ml
Murtala Lawal
 
(1). Computer users have an opportunity of choosing between two
(1). Computer users have an opportunity of choosing between two (1). Computer users have an opportunity of choosing between two
(1). Computer users have an opportunity of choosing between two
kendalfarrier
 

Ähnlich wie The Technology Talk (20)

Linux ppt
Linux pptLinux ppt
Linux ppt
 
Linux
LinuxLinux
Linux
 
Different types of operating systems
Different  types  of  operating  systems Different  types  of  operating  systems
Different types of operating systems
 
MS-CIT Unit 4 (slide share)
MS-CIT Unit 4 (slide share)MS-CIT Unit 4 (slide share)
MS-CIT Unit 4 (slide share)
 
Linux opearting system ppt
Linux opearting system pptLinux opearting system ppt
Linux opearting system ppt
 
Introduction 2 linux ml
Introduction 2 linux mlIntroduction 2 linux ml
Introduction 2 linux ml
 
Fundamentals of operating system maam lugas.pptx
Fundamentals of operating system maam lugas.pptxFundamentals of operating system maam lugas.pptx
Fundamentals of operating system maam lugas.pptx
 
Overview_Linux ppt
Overview_Linux pptOverview_Linux ppt
Overview_Linux ppt
 
OPERATING SYSTUM class 9 Information.pptx
OPERATING SYSTUM class 9 Information.pptxOPERATING SYSTUM class 9 Information.pptx
OPERATING SYSTUM class 9 Information.pptx
 
Introduction To Opensource And GNU/Linux
Introduction To Opensource And GNU/LinuxIntroduction To Opensource And GNU/Linux
Introduction To Opensource And GNU/Linux
 
(1). Computer users have an opportunity of choosing between two
(1). Computer users have an opportunity of choosing between two (1). Computer users have an opportunity of choosing between two
(1). Computer users have an opportunity of choosing between two
 
Linux; Operating System
Linux; Operating SystemLinux; Operating System
Linux; Operating System
 
Linux seminar
Linux seminarLinux seminar
Linux seminar
 
Operating Systems ( Os )
Operating Systems ( Os )Operating Systems ( Os )
Operating Systems ( Os )
 
Chapter 8 - nsa Introduction to Linux.ppt
Chapter 8 -  nsa Introduction to Linux.pptChapter 8 -  nsa Introduction to Linux.ppt
Chapter 8 - nsa Introduction to Linux.ppt
 
Introduction to FOSS
Introduction to FOSSIntroduction to FOSS
Introduction to FOSS
 
Module 1 introduction to Linux
Module 1 introduction to LinuxModule 1 introduction to Linux
Module 1 introduction to Linux
 
Hillel kobrovski Linux security overview for ciso
Hillel kobrovski   Linux security overview for cisoHillel kobrovski   Linux security overview for ciso
Hillel kobrovski Linux security overview for ciso
 
Module 01 Introduction to Linux
Module 01 Introduction to LinuxModule 01 Introduction to Linux
Module 01 Introduction to Linux
 
Linux operating system
Linux operating systemLinux operating system
Linux operating system
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

The Technology Talk

  • 2. Operating system (O.S) An operating system (OS) is a set of programs that manage computer hardware resources and provide common services for application software. The operating system is the most important type of system software in a computer system. A user cannot run an application program on the computer without an operating system, unless the application program is self booting.
  • 3. Operating Systems Services Following are the five services provided by an operating systems 1] Program Execution The purpose of a computer systems is to allow the user to execute programs. So the operating systems provides an environment where the user can conveniently run programs. The user does not have to worry about the memory allocation or multitasking or anything. These things are taken care of by the operating systems.
  • 4. 2] I/O Operations Each program requires an input and produces output. This involves the use of I/O. The operating systems hides the user the details of underlying hardware for the I/O. All the user sees is that the I/O has been performed without any details. So the operating systems by providing I/O makes it convenient for the users to run programs.
  • 5. 3] File System Manipulation The output of a program may need to be written into new files or input taken from some files. The operating systems provides this service. The user does not have to worry about secondary storage management. User gives a command for reading or writing to a file and sees his her task accomplished.
  • 6. 4] Communications There are instances where processes need to communicate with each other to exchange information. It may be between processes running on the same computer or running on the different computers.
  • 7. 5] Error Detection An error is one part of the system may cause malfunctioning of the complete system. To avoid such a situation the operating system constantly monitors the system for detecting the errors.
  • 8. Types of Operating systems As computers have progressed and developed so have the operating systems. GUI - Short for Graphical User Interface, a GUI Operating System contains graphics and icons and is commonly navigated by using a computer mouse. Below are some examples of GUI Operating Systems. System 7.x Windows 98 Windows CE
  • 9. Multi-user - A multi-user operating system allows for multiple users to use the same computer at the same time and different times. Linux Unix Windows 2000
  • 10. Multiprocessing - An operating system capable of supporting and utilizing more than one computer processor. Linux Unix Windows 2000
  • 11. Multitasking - An operating system that is capable of allowing multiple software processes to run at the same time. Unix Windows 2000
  • 12. Multithreading - Operating systems that allow different parts of a software program to run concurrently. Operating systems that would fall into this category are: Linux Unix Windows 2000
  • 13. Different Operating Systems Microsoft Windows isn't the only operating system for personal computers, or even the best... it's just the best-distributed. Its inconsistent behavior and an interface that changes radically with every version are the main reasons people find computers difficult to use.
  • 14. MAC OS The Mac OS user interface inspired the creation of Windows, and is still the target Microsoft is trying to equal. As a popular consumer product, there's plenty of software available for it, and it's moving beyond its traditional niches of graphic design, education, and home use, into general business use.etc
  • 15. Ubuntu (Linux) Linux ("LIH-nux") is a free Unix-like operating system, originally developed by programmers who simply love the challenge of solving problems and producing quality software. even if that means giving the resulting product away.
  • 16. Google Chrome OS Google's Chrome OS is still vaporware so far, and it's arguably just another flavor of Linux, but it promises to be a viable alternative to Windows on small portable "netbooks" which will come with it preinstalled.
  • 17. Haiku Haiku is based on BeOS, which was designed with multimedia in mind, including the kinds of features that Microsoft is just recently taking onto Windows.
  • 18. The BSD Family FreeBSD is commonly called "the free Unix". It's descended from the classic 1970's Berkeley Software Distribution of Unix (from before the OS became "UNIX"®), making it one of the most mature and stable operating systems around.
  • 19. OPENBSD OpenBSD is "the other free Unix". It's similar to FreeBSD both in the Berkeley code it's based on, and the licensing terms. One key advantage it has over its BSD siblings is that it's incredibly secure from attack, as implied by its blowfish mascot, and made explicit by their boast of only one remotely-exploitable hole - ever - in their default installation.
  • 20. NETBSD NetBSD is "the other free Unix". It's the work of another group of volunteer developers using the net to collaborate. Their mission is to get the OS to run - and run well - on hardware platforms no other Unix supports.
  • 21. Syllable Syllable is a free alternative OS for standard PCs. It uses some of the better ideas from Unix, BeOS, AmigaOS, and others, and is compatible enough with portable software written for Unix that many have already been ported over to it.
  • 22. And there are never ending O.S’s Amiga Did you know that there are a total of584+ Operating systems in the world . And a matter of fact , MorphOS there are 605 Linux distributions (Small Linux RISC OS based operating systems like android, symbian, Bada etc.) GNU Minix 2warp MSDOS
  • 23. A Small Talk about well known O.S Windows 98 (codenamed Memphis) is a graphical operating system by Microsoft. It is the second major release in the Windows 9x line of operating systems. It was released to manufacturing on 15 May 1998 and to retail on 25 June 1998. Windows 98 is the successor to Windows 95.
  • 24. Windows NT Windows NT is a family of operating systems produced by Microsoft, the first version of which was released in July 1993. It was a powerful high-level-language- based, processor-independent, multiprocessing, multiuser operating system with features comparable to Unix. It was intended to complement consumer versions of Windows that were based on MS-DOS.
  • 25. ITS NOT LINUX ! ITS UBUNTU ! Ubuntu is an African Ubuntu 4.10 (Warty Warthog) Ubuntu 5.04 (Hoary Hedgehog) ethic or humanist Ubuntu 5.10 (Breezy Badger) philosophy focusing on Ubuntu 6.06 LTS (Dapper Drake) Ubuntu 6.10 (Edgy Eft) people's allegiances Ubuntu 7.04 (Feisty Fawn) and relations with each Ubuntu 7.10 (Gutsy Gibbon) other. The real Ubuntu 8.04 LTS (Hardy Heron) Ubuntu 8.10 (Intrepid Ibex) meaning of “UBUNTU” Ubuntu 9.04 (Jaunty Jackalope) is “Humanity to Ubuntu 9.10 (Karmic Koala) Ubuntu 10.04 LTS (Lucid Lynx) others”. Ubuntu 10.10 (Maverick Meerkat) Ubuntu 11.04 (Natty Narwhal) Ubuntu 11.10 (Oneiric Ocelot) Ubuntu 12.04 LTS (Precise Pangolin)
  • 26. The Birth Of Linux In 1991, Linus Benedict Torvalds was a second year student of Computer Science at the University of Helsinki and a self-taught hacker. The 21 year old sandy haired soft-spoken Finn loved to tinker with the power of the computers and the limits to which the system can be pushed. With his legendary technical wizardry, he alone outclassed entire groups of programmers from commercial software vendors in creating GCC, considered as one of the most efficient and robust compilers ever created. Linux is a Unix-like computer operating system assembled under the model of free and open source software development and distribution. The defining component of any Linux system is the Linux kernel, an operating system kernel first released October 5, 1991 by Linus Torvalds. Linux system distributions may vary in many details of system operation, configuration, and software package selections.
  • 27. The Mastermind Behind Linux Linus Torvalds You are what you are. Whatever you do, Do it for the person in the mirror.
  • 28. Graphical User Interface (GUI) A graphical user interface is a type of user interface that allows users to interact with electronic devices with images rather than text commands. GUIs can be used in computers, hand-held devices such as MP3 players, portable media players or gaming devices, household appliances and office equipment . A GUI represents the information and actions available to a user through graphical icons and visual indicators such as secondary notation, as opposed to text-based interfaces, typed command labels or text navigation.
  • 29. New Features of the GUI Pointing device Icons Desktop Menus Folders Toolbar Attachments Multiple windows On-line Help
  • 31. Computer Security Today, many people rely on computers to do homework, work, and create or store useful information. Therefore, it is important for the information on the computer to be stored and kept properly. It is also extremely important for people on computers to protect their computer from data loss, misuse, and abuse. For example, it is crucial for businesses to keep information they have secure so that hackers can't access the information. Home users also need to take means to make sure that their credit card numbers are secure when they are participating in online transactions.
  • 32. A computer security risk is any action that could cause loss of information, software, data, processing incompatibilities, or cause damage to computer hardware, a lot of these are planned to do damage. An intentional breach in computer security is known as a computer crime which is slightly different from a cybercrime. A cybercrime is known as illegal acts based on the internet and is one of the FBI's top priorities.
  • 33.
  • 34. There are several distinct categories for people that cause cybercrimes, and they are referred to as hacker, cracker, cyber terrorist, cyber extortionist, unethical employee, script kiddy and corporate spy.
  • 35. “A good hacker is known by everyone but a great hacker is known by None.” :- Kevin Mitnick (World Most Wanted Hacker)
  • 36. “Hacking is easy as anyone can do, but not so easy that everyone can do.” :- Ankit Fadia (Indian Hacker)
  • 37. The Hacker. The term hacker was actually known as a good word but now it has a very negative view. A hacker is defined as someone who accesses a computer or computer network unlawfully. They often claim that they do this to find leaks in the security of a network.
  • 38. The Cracker. The term cracker has never been associated with something positive this refers to someone how intentionally access a computer or computer network for evil reasons. It's basically an evil hacker. They access it with the intent of destroying, or stealing information. Both crackers and hackers are very advanced with network skills.
  • 39. The Cyber terrorist. A cyber terrorist is someone who uses a computer network or the internet to destroy computers for political reasons. It's just like a regular terrorist attack because it requires highly skilled individuals, millions of dollars to implement, and years of planning.
  • 40. The Cyber extortionist. The term cyber extortionist refers to someone who uses emails as an offensive force. They would usually send a company a very threatening email stating that they will release some confidential information, exploit a security leak, or launch an attack that will harm a company's network. They will request a paid sum of money to prevent the threat from being carried out, a bit like black mailing.
  • 41. The Unethical Employee. An unethical employee is an employee that illegally accesses their company's network for numerous reasons. One could be the money they can get from selling top secret information, or some may be bitter and want revenge.
  • 42. How basically a Hardware Key logger Works ?
  • 43.
  • 44.
  • 45. The Script Kiddies. A script kiddy is someone who is like a cracker because they may have the intentions of doing harm, but they usually lack the technical skills. They are usually silly teenagers that use prewritten hacking and cracking programs
  • 46. The Corporate Spy. A corporate spy has extremely high computer and network skills and is hired to break into a specific computer or computer network to steal or delete data and information. Shady companies hire these type people in a practice known as corporate espionage. They do this to gain an advantage over their competition an illegal practice.
  • 47. A Piece of Advice Business and home users must do their best to protect or safeguard their computers from security risks. However, one must remember that there is no one hundred percent guarantee way to protect your computer so becoming more knowledgeable about them is a must during these days. When you transfer information over a network it has a high security risk compared to information transmitted in a business network because the administrators usually take some extreme measures to help protect against security risks.
  • 48. Computer Worms & Viruses A computer worm is a self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention.
  • 49. Viruses A computer virus is a computer program that can replicate itself and spread from one computer to another. A true virus can spread from one computer to another when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.
  • 51. Thanking You. Information researched by Mayank Rathore & Divyendra Patil. Presentation created by Divyendra Patil. Technical & Hardware material totally contributed by Ninad Yadav.