2. Operating system (O.S)
An operating system (OS) is a set
of programs that manage computer
hardware resources and provide
common services for application
software. The operating system is the
most important type of system
software in a computer system. A
user cannot run an application
program on the computer without an
operating system, unless the
application program is self booting.
3. Operating Systems Services
Following are the five services provided by an operating systems
1] Program Execution
The purpose of a computer
systems is to allow the user to
execute programs. So the
operating systems provides an
environment where the user can
conveniently run programs. The
user does not have to worry
about the memory allocation or
multitasking or anything. These
things are taken care of by the
operating systems.
4. 2] I/O Operations
Each program requires an
input and produces output.
This involves the use of I/O.
The operating systems hides
the user the details of
underlying hardware for the
I/O. All the user sees is that
the I/O has been performed
without any details. So the
operating systems by
providing I/O makes it
convenient for the users to
run programs.
5. 3] File System Manipulation
The output of a program may
need to be written into new
files or input taken from
some files. The operating
systems provides this service.
The user does not have to
worry about secondary
storage management. User
gives a command for reading
or writing to a file and sees
his her task accomplished.
6. 4] Communications
There are instances
where processes need to
communicate with each
other to exchange
information. It may be
between processes
running on the same
computer or running on
the different computers.
7. 5] Error Detection
An error is one part of the
system may cause
malfunctioning of the
complete system. To avoid
such a situation the
operating system
constantly monitors the
system for detecting the
errors.
8. Types of Operating systems
As computers have progressed and developed so have the
operating systems.
GUI - Short for Graphical User
Interface, a GUI Operating System
contains graphics and icons and is
commonly navigated by using a
computer mouse. Below are some
examples of GUI Operating Systems.
System 7.x
Windows 98
Windows CE
9. Multi-user - A multi-user operating system allows for
multiple users to use the same computer at the same time
and different times.
Linux
Unix
Windows 2000
10. Multiprocessing - An operating system capable of supporting and
utilizing more than one computer processor.
Linux
Unix
Windows 2000
11. Multitasking - An operating system that is capable of allowing
multiple software processes to run at the same time.
Unix
Windows 2000
12. Multithreading - Operating systems that allow different parts of
a software program to run concurrently. Operating systems that
would fall into this category are:
Linux
Unix
Windows 2000
13. Different Operating Systems
Microsoft Windows isn't the only operating system for personal computers, or
even the best... it's just the best-distributed. Its inconsistent behavior and an
interface that changes radically with every version are the main reasons people
find computers difficult to use.
14. MAC OS
The Mac OS user interface inspired the creation of Windows, and is still
the target Microsoft is trying to equal. As a popular consumer product,
there's plenty of software available for it, and it's moving beyond its
traditional niches of graphic design, education, and home use, into
general business use.etc
15. Ubuntu (Linux)
Linux ("LIH-nux") is a free Unix-like operating system, originally
developed by programmers who simply love the challenge of solving
problems and producing quality software. even if that means giving the
resulting product away.
16. Google Chrome OS
Google's Chrome OS is still vaporware so far, and it's arguably just
another flavor of Linux, but it promises to be a viable alternative to
Windows on small portable "netbooks" which will come with it
preinstalled.
17. Haiku
Haiku is based on BeOS, which was designed with multimedia in
mind, including the kinds of features that Microsoft is just recently
taking onto Windows.
18. The BSD Family
FreeBSD is commonly called "the free Unix". It's descended from the
classic 1970's Berkeley Software Distribution of Unix (from before the OS
became "UNIX"®), making it one of the most mature and stable operating
systems around.
19. OPENBSD
OpenBSD is "the other free Unix". It's similar to FreeBSD both in the
Berkeley code it's based on, and the licensing terms. One key advantage it
has over its BSD siblings is that it's incredibly secure from attack, as implied
by its blowfish mascot, and made explicit by their boast of only one
remotely-exploitable hole - ever - in their default installation.
20. NETBSD
NetBSD is "the other free Unix". It's the work of another group of
volunteer developers using the net to collaborate. Their mission is to
get the OS to run - and run well - on hardware platforms no other
Unix supports.
21. Syllable
Syllable is a free alternative OS for standard PCs. It uses some of the
better ideas from Unix, BeOS, AmigaOS, and others, and is compatible
enough with portable software written for Unix that many have already
been ported over to it.
22. And there are never ending O.S’s
Amiga Did you know that there are a total of584+
Operating systems in the world . And a matter of fact ,
MorphOS there are 605 Linux distributions (Small Linux
RISC OS based operating systems like android, symbian, Bada
etc.)
GNU
Minix
2warp
MSDOS
23. A Small Talk about well known O.S
Windows 98 (codenamed Memphis) is a graphical operating
system by Microsoft. It is the second major release in the Windows 9x line of
operating systems. It was released to manufacturing on 15 May 1998 and to
retail on 25 June 1998. Windows 98 is the successor to Windows 95.
24. Windows NT
Windows NT is a family of operating systems produced by Microsoft, the first
version of which was released in July 1993. It was a powerful high-level-language-
based, processor-independent, multiprocessing, multiuser operating system with
features comparable to Unix. It was intended to complement consumer versions
of Windows that were based on MS-DOS.
25. ITS NOT LINUX ! ITS UBUNTU !
Ubuntu is an African Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
ethic or humanist Ubuntu 5.10 (Breezy Badger)
philosophy focusing on Ubuntu 6.06 LTS (Dapper Drake)
Ubuntu 6.10 (Edgy Eft)
people's allegiances Ubuntu 7.04 (Feisty Fawn)
and relations with each Ubuntu 7.10 (Gutsy Gibbon)
other. The real Ubuntu 8.04 LTS (Hardy Heron)
Ubuntu 8.10 (Intrepid Ibex)
meaning of “UBUNTU” Ubuntu 9.04 (Jaunty Jackalope)
is “Humanity to Ubuntu 9.10 (Karmic Koala)
Ubuntu 10.04 LTS (Lucid Lynx)
others”. Ubuntu 10.10 (Maverick Meerkat)
Ubuntu 11.04 (Natty Narwhal)
Ubuntu 11.10 (Oneiric Ocelot)
Ubuntu 12.04 LTS (Precise Pangolin)
26. The Birth Of Linux
In 1991, Linus Benedict Torvalds was a second year student of Computer
Science at the University of Helsinki and a self-taught hacker. The 21 year old
sandy haired soft-spoken Finn loved to tinker with the power of the
computers and the limits to which the system can be pushed.
With his legendary technical wizardry, he alone outclassed entire groups of
programmers from commercial software vendors in creating GCC, considered
as one of the most efficient and robust compilers ever created.
Linux is a Unix-like computer operating system assembled under the model
of free and open source software development and distribution. The defining
component of any Linux system is the Linux kernel, an operating system
kernel first released October 5, 1991 by Linus Torvalds. Linux system
distributions may vary in many details of system operation, configuration,
and software package selections.
27. The Mastermind Behind Linux
Linus Torvalds
You are what you are. Whatever you
do, Do it for the person in the mirror.
28. Graphical User Interface (GUI)
A graphical user interface is a type of user
interface that allows users to interact with
electronic devices with images rather than text
commands.
GUIs can be used in computers, hand-held
devices such as MP3 players, portable media
players or gaming devices, household appliances
and office equipment .
A GUI represents the information and actions
available to a user through graphical icons and
visual indicators such as secondary notation, as
opposed to text-based interfaces, typed command
labels or text navigation.
29. New Features of the GUI
Pointing device
Icons
Desktop
Menus
Folders
Toolbar
Attachments
Multiple windows
On-line Help
31. Computer Security
Today, many people rely on computers to do homework,
work, and create or store useful information. Therefore, it
is important for the information on the computer to be
stored and kept properly. It is also extremely important for
people on computers to protect their computer from data
loss, misuse, and abuse. For example, it is crucial
for businesses to keep information they have secure so that
hackers can't access the information. Home users also need
to take means to make sure that their credit card
numbers are secure when they are participating in online
transactions.
32. A computer security risk is any action that could
cause loss of information, software, data,
processing incompatibilities, or cause damage to
computer hardware, a lot of these are planned to
do damage. An intentional breach in computer
security is known as a computer crime which is
slightly different from a cybercrime. A cybercrime
is known as illegal acts based on the internet and
is one of the FBI's top priorities.
33.
34. There are several distinct
categories for people that cause
cybercrimes, and they are referred
to as hacker, cracker, cyber
terrorist, cyber extortionist,
unethical employee, script kiddy
and corporate spy.
35. “A good hacker is
known by
everyone but a
great hacker is
known by None.”
:- Kevin Mitnick
(World Most
Wanted Hacker)
36. “Hacking is easy as
anyone can do, but
not so easy that
everyone can do.”
:- Ankit Fadia
(Indian Hacker)
37. The Hacker.
The term hacker was actually known as a good word but now it has a very
negative view. A hacker is defined as someone who accesses a computer
or computer network unlawfully. They often claim that they do this to find leaks
in the security of a network.
38. The Cracker.
The term cracker has never been associated with something positive this refers to
someone how intentionally access a computer or computer network for evil
reasons. It's basically an evil hacker. They access it with the intent of destroying, or
stealing information. Both crackers and hackers are very advanced with network
skills.
39. The Cyber terrorist.
A cyber terrorist is someone who uses a computer network or the
internet to destroy computers for political reasons. It's just like a regular
terrorist attack because it requires highly skilled individuals, millions of
dollars to implement, and years of planning.
40. The Cyber extortionist.
The term cyber extortionist refers to someone who uses emails as an offensive
force. They would usually send a company a very threatening email stating that
they will release some confidential information, exploit a security leak, or
launch an attack that will harm a company's network. They will request a paid
sum of money to prevent the threat from being carried out, a bit like black
mailing.
41. The Unethical Employee.
An unethical employee is an employee that illegally accesses their company's
network for numerous reasons. One could be the money they can get from selling
top secret information, or some may be bitter and want revenge.
45. The Script Kiddies.
A script kiddy is someone who is like a cracker because they may have the
intentions of doing harm, but they usually lack the technical skills. They are
usually silly teenagers that use prewritten hacking and cracking programs
46. The Corporate Spy.
A corporate spy has extremely high
computer and network skills and is
hired to break into a specific
computer or computer network to
steal or delete data and information.
Shady companies hire these type
people in a practice known as
corporate espionage. They do this to
gain an advantage over their
competition an illegal practice.
47. A Piece of Advice
Business and home users must do their best to protect or
safeguard their computers from security risks.
However, one must remember that there is no one hundred
percent guarantee way to protect your computer so becoming
more knowledgeable about them is a must during these days.
When you transfer information over a network it has a high
security risk compared to information transmitted in a business
network because the administrators usually take some extreme
measures to help protect against security risks.
48. Computer Worms & Viruses
A computer worm is a self-replicating malware computer
program, which uses a computer network to send copies of
itself to other nodes (computers on the network) and it may
do so without any user intervention.
49. Viruses
A computer virus is a computer program that can replicate itself and
spread from one computer to another. A true virus can spread from
one computer to another when its host is taken to the target
computer; for instance because a user sent it over a network or the
Internet, or carried it on a removable medium such as a floppy disk,
CD, DVD, or USB drive.
51. Thanking You.
Information researched by Mayank Rathore &
Divyendra Patil.
Presentation created by Divyendra Patil.
Technical & Hardware material totally contributed by
Ninad Yadav.