Sunday, 8 September 2013

SCL 3: OPERATING SYSTEM AND FILE MANAGEMENT

Posted by Unknown

SCL 3: OPERATING SYSTEM AND FILE MANAGEMENT

1.    Operating system used in a desktop/laptop today:

-       Windows 8
-       Windows 7 (Home Premium/Professional/Ultimate)
-       Linux
-       Mac OS


How does operating systems work?

Every time when you turn on your computer, it is nice to think that you are in control. There’s the trusty computer mouse, which you can move anywhere on the screen and summoning up what you want. Although it’s awesome to feel like a director in front of your desktop or laptop, there’s a lot of things happen inside of your system which the man behind the curtain handling all the task that you gave is your operating system.
The operating system (OS) is the first thing loaded onto the computer and without the operating system, a computer is useless. If you like to think with electronic devices, you are probably pleased that operating systems can be found and needed by many devices that we use everyday.
 All desktop computers have operating systems. There are hundreds of other operating systems available for special-purpose applications, including specializations for mainframes, robotics, manufacturing, real-time control systems and so on. In any device that has an operating system, there's usually a way to make changes to how the device works. One of the reasons operating systems are made out of portable code rather than permanent physical circuits is so that they can be changed or modified without having to scrap the whole device.

There are two common things that an operating system does, which are:

1.     It manages the hardware and software resources of the system. In a desktop computer, these resources include such things as the processor, memory, disk space and more.  
  
      2.It provides a stable, consistent way for applications to deal with the hardware without having to know all the details of the hardware.

When you turn on the power to a computer, the first program that runs is usually a set of instructions kept in the computer's read-only memory (ROM). This code examines the system hardware to make sure everything is functioning properly. This power-on self test(POST) checks the CPU, memory, and basic input-output systems(BIOS) for errors and stores the result in a special memory location. Once the POST has successfully completed, the software loaded in ROM (sometimes called the BIOS or firmware) will begin to activate the computer's disk drives. In most modern computers, when the computer activates the hard disk drive, it finds the first piece of the operating system: the bootstrap loader.
The bootstrap loader is a small program that has a single function: It loads the operating system into memory and allows it to begin operation. In the most basic form, the bootstrap loader sets up the small driver programs that interface with and control the various hardware subsystems of the computer. It sets up the divisions of memory that hold the operating system, user information and applications. It establishes the data structures that will hold the myriad signals, flags and semaphores that are used to communicate within and between the subsystems and applications of the computer. Then it turns control of the computer over to the operating system.
The operating system's tasks, in the most general sense, fall into five categories:
·         Processor management
- The heart of managing the processor comes down to two related issues:
   1.  Ensuring that each process and application receives enough of the processor's time to function
        properly.
2.   Using as many processor cycles as possible for real work.
The basic unit of software that the operating system deals with in scheduling the work done by the processor is either a process or a thread, depending on the operating system.

·         Memory management and Storage management
-   When an operating system manages the computer's memory, there are two broad tasks to be accomplished:
1.   Each process must have enough memory in which to execute, and it can neither run into the memory space of another process nor be run into by another process.
2.   The different types of memory in the system must be used properly so that each process can run most effectively.
The first task requires the operating system to set up memory boundaries for types of software and for individual applications.

·         Device management
-          Managing input and output is largely a matter of managing queues and buffers, special storage facilities that take a stream of bits from a device, perhaps a keyboard or a serial port, hold those bits, and release them to the CPU at a rate with which the CPU can cope. This function is especially important when a number of processes are running and taking up processor time.
-          Managing all the resources of the computer system is a large part of the operating system's function and, in the case of real-time operating systems, may be virtually all the functionality required. For other operating systems, though, providing a relatively simple, consistent way for applications and humans to use the power of the hardware is a crucial part of their reason for existing.
·         Application interface
-          Just as drivers provide a way for applications to make use of hardware subsystems without having to know every detail of the hardware's operation, application program interfaces (APIs) let application programmers use functions of the computer and operating system without having to directly keep track of all the details in the CPU's operation.
·         User interface
-          Just as the API provides a consistent way for applications to use the resources of the computersystem, a user interface (UI) brings structure to the interaction between a user and the computer. 
-          The user interface is a program or set of programs that sits as a layer above the operating system itself. The same thing is true, with somewhat different mechanisms, of both Windows and Macintosh operating systems. The core operating-system functions -- the management of the computer system -- lie in the kernel of the operating system. The display manageris separate, though it may be tied tightly to the kernel beneath. The ties between the operating-system kernel and the user interface, utilities and other software define many of the differences in operating systems today, and will further define them in the future.


ADVANTAGES AND DISADVANTAGES

An operating system is a software program that enables  the computer hardware to communicate and cooperate with the computer software. For examples, Windows, Mac OS and Linux. These are the advantages and the disadvantages of them.


Windows:
Ø  Expensive.
Ø  Easy to be use by any stage of ages.
Ø  Theres still lags problems behind its competitors.
Ø  It has a large library of available software and applications.
Ø  Openness to virus attack.


Linux:
Ø  An open source.
Ø  A bit difficult to be use for a beginners.
Ø  Very reliable.
Ø  Rarely freezes.
Ø  Only few computer programs, applications and utilities are available for this OS.
Ø  Some manufacturers do not offer hardware that able to support Linux OS.
Ø  Allowed more advanced users to customise the code as what they wished.
Ø  Less people familiar to this operating system.


Mac OS:
Ø  Mac computers ara more expensive.
Ø  Far less open to viruses and malware.
Ø  It was very rarely to crash, lose datas and also freezes.
Ø  Less computer programs and games are available for Macs.


COMPARISON BETWEEN ANDROID AND WINDOWS 8 IN SMART PHONES



ANDROID
WINDOWS 8
v  Android is an open system that is extremely and easily to be customize.
v Each smart phone that runs on the operating system comes with a specific user interface that is generally easy to use and allows us to customize the look of our device with a variety of skins or themes, wallpapers and the ability to create widgets based on the apps we have on our phones.
v The notification bar on the Jelly Bean operating system has also been redesigned so that it is more noticeable and attractive than the older version.
v Jelly Bean has support for more languages in it’s keyboard.
v Google Now is included in Android's Jelly Bean powered smart phones
·     The user interface is simple and clean and boasts a great metro look that includes live tiles and the ability to customize our home screen with apps of our choice and making them size of our choice from small, medium and large.
·    Windows phones 8 is easy to use and also refreshing change from the other and the older operating systems found in smart phones.
·    Windows phones 8 holds over android's Jelly Bean is that phones that run on it consume considerably less battery power while windows phones provides enough juice to last the user all the day and sometimes into the next.
·    Windows phone 8 also integrates its People Hub with the most popular social networking websites and email hosts.
·    The integration is quite nice and installation of apps such as Facebook, for instance,  are not necessary as it is already built into the phones.



SCL 2: COMPUTER SOFTWARE

Posted by Unknown


SCL 2: COMPUTER SOFTWARE

1.
  •       What is Open Source Software?
  • ·         In your opinion, why people prefer open source software over proprietary alternatives nowadays?
  • ·         Name top (fives) 5 most popular open source software and compare them with similar proprietary software (e.g. Open Office versus Microsoft Office).


  • Ø  Open source software is computer software that is distributed along with its source code. The code that is used to create the software via a special software license. The license allows users to use, change and improve the software's source code, and to redistribute the software either before or after it has been modified.

  • Ø  In my opinion, people prefer open source software over proprietary alternatives because open source model is often developed in collaboration with other contributors, which you can get access and shared intellectually.

  • Ø  (Open Office versus Microsoft Office)

  • Open Office:
  • - Linux kernel
  • - Mozilla’s Firefox web browser
  • - Eclipse software development platform
  • - MySQL database system
  • - GIMP image editing software


Proprietary software is an alternative to the commercial model of software, where u need to pay for the software but you don’t get access to the source code because it is considered someone else’s intellectual property.

Meanwhile, open source software is a shared intellectual property among all who have helped develop or modify it. The high quality that results because the source code gets passed around, tested and modified to correct any bugs developers may encounter.



2. Discuss different types of threats and malicious program (malware) that can damage a computer, mobile device or disrupt any system. Search for information on current known malware program. Based on the information that you have found, create a table to list different types of malware, what it does, and how it can be repaired or removed. This information is useful for you to prevent any malware from damage your computer system.


Threats
Computer systems are vulnerable to many threats that can inflict various types of damage resulting in significant losses. This damage can range from errors harming database integrity to fires destroying entire computer centre. Losses can stem, for example, from the actions of supposedly trusted employees defrauding a system, from outside hackers, or from careless data entry clerks. Precision in estimating computer security-related losses is not possible because many losses are never discovered, and others are "swept under the carpet" to avoid unfavourable publicity. The effects of various threats varies considerably: some affect the confidentiality or integrity of data while others affect the availability of a system.

Malware
Malware is a short form of malicious software which used or programmed by attackers to disrupt a computer operation, gather sensitive information, or to gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. Malware is a general term used to refer to a variety of forms of hostile or intrusive software. Below are stated the types of malwares, their function and prevention from them.



Types of Malware
What It Does
How It Can Be Repaid Or Removed
Computer Virus
A malware when executed replicates by inserting copies of itself into other computer programs, data files, or the boot sector of hard drive. Perform some type of harmful activity on infected host.
Install an antivirus that can detect and eliminate known viruses when computer attempts to download or run an executable. Also operating system updated timely, careful Internet browsing and installation of trusted software.
Ransomware
A malware, known as crypto viral extortion, which restricts access to the computer system that it infects, and demands a ransom to paid to the creator of the malware in order for the restriction to be removed.
Keep all of the software on your computer up to date. Keep your firewall turned on. Don't open spam email messages or click links on suspicious websites.
Worms
A standalone malware that replicates itself in order to spread to other computers. Often uses a computer network to spread itself relying on security failures on the target computer to access it and cause some harm to the network
Operating system’s vendors will supply regular security updates. Users should be wary of opening unexpected email, not run attached files or programs, or visit suspicious web sites. Update regularly anti-virus or anti-spyware.
Trojan Horses
A hacking program, non-self-replicating type of malware which gains privileged access to the operating system while appearing to perform a desirable function but instead drops a malicious payload, often including backdoor.
Never run an executable file unless you are absolutely sure it comes from a trusted source. Security patches should always be downloaded directly from a vendor's website. Also, turn off computer when not used.
Root-kits
Stealthy malicious software, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer.
Apply security patches, implementing the principle of least privilege, reducing the attack surface and installing anti-virus software. Also routine monitoring is required.
Spyware
Software that aids in gathering information about a person or organization without their knowledge and that may send such information to another entity without the consumer’s consent.
Install an anti-spyware program, which provide real-time protection, which scan all incoming network data for spyware and block the threats if detected.

Saturday, 27 July 2013

SCL Questions

Posted by Unknown



List of ideal desktop or laptop hardware specification and the explaination.

  • Processor: Intel® Core™ i5-4200 U Processor 1.8 GHz with Turbo Boost Technology up to 3.00 GHz (4 MB L3 cache)
  • Memory: 8 GB DDR3 dual-channel memory
  • Storage: 1 TB Hard Drive
  • Display: 13.3" Full HD IPS (1920 x 1080) widescreen LED-backlit display
  • Graphics: Intel® HD Graphics 4400 with 128 MB of dedicated system memory; triple independent display support
  • Audio: Two built-in stereo speakers with high-definition audio; Dolby® Advanced Audio® v4 audio
  • Webcam: HD Webcam (1280 x 720)
  • Network: Intel® Centrino® Advanced-N 7260, 802.11a/b/g/n Wi-Fi CERTIFIED™
  • Bluetooth®: Bluetooth® 4.0
  • Ports: HDMI®, USB 3.0 (1 with power-off charging), Acer Converter Port (w/ Dongle - VGA, Ethernet & USB 2.0 Port)
  • Card Reader: Secure Digital (SD) card reader
  • 4-cell lithium polymer battery (6280 mAh); up to 7-hour battery life

Members of Group 6 from Physical 2 choose these specification as it will give good performance to the laptop that have all of the specifications in it. The processor is fast enough for all kind of user, although Intel® Core™ i7 is faster but the processor with the speed  of 1.8 GHz able to boost up to 3.00 GHz with the help of the Turbo Boost Technology. With the 8 GB DDR3 dual-channel memory, the laptop will always be prepared for high-end applications and lots of multitasking. The 1 TB hard drive will give a lot of space for the user to store a lot of applications, documents and files. 13.3" Full HD IPS with 1920 x 1080 screen resoluion and LED-backlit display will give a better display with a wider and bigger screen.  Intel® HD Graphics 4400 with 128 MB of dedicated system memory and also triple independent display support, will provide better perfomance when it comes to the most-demanding games and give better view when watching movie. Two built-in stereo speakers with high-definition audio which are Dolby® Advanced Audio® v4 audio will give better sound to the user when playing games, watch movies nor listening to songs. HD Webcam with 1280 x 720 resolution will provide better record while having video call nor video recording. Although, the Intel® Centrino® Advanced-N 7260, 802.11a/b/g/n Wi-Fi CERTIFIED™ was not the best product and the latest product in the market but it able to provide good enough perfomance when the user use internet. The sending nor receiving data through bluetooth will be faster as it use Bluetooth® 4.0. HDMI®, Secure Digital (SD) card reader, USB 3.0 (1 with power-off charging), Acer Converter Port (w/ Dongle - VGA, Ethernet & USB 2.0 Port) will help the user easier to send and receive data through many ways. Lastly, 4-cell lithium polymer battery (6280 mAh) which can stand up to 7-hour battery life will provide long enough energy for the user to do their work.



One of the latest hardware technology is Raspberry-Pi. The similarities and differences between these technology with your ideal computer specification.

Raspberry-Pi specification:
- SoC Broadcom BCM2835 (CPU, GPU, DSP, and SDRAM)
- CPU: 700 MHz ARM1176JZF-S core (ARM11 family)
- GPU: Broadcom VideoCore IV, OpenGL ES 2.0, 1080p30 h.264/MPEG-4 AVC high-profile decoder
- Memory RAM: 512 MB
- Video outputs: Composite RCA, HDMI
- Audio outputs: 3.5 mm jack, HDMI
- Onboard storage: SD, MMC, SDIO card slot
- 10/100 Ethernet RJ45 onboard network
- Wi-Fi with USB dongle
- Storage via SD/ MMC/ SDIO card slot
- 2 USB port
- Power: 1mA at 5V

The similarities between the technology of Raspberry-Pi and my list of ideal computer specification are: (both have)

-processor
-ram and storage
-video and audio output
-USB port
-SD card reader
-HDMI port
-power supply


There are many difference between the Raspberry-Pi and my ideal computer specifications.The Raspberry-Pi is a credit-card sized computer that plugs into your TV and a keyboard. Raspberry-Pi only able to give low perfomance for low-end applications and less task than computer. Raspberry-Pi also does not have webcam, speakers, bluetooth, converter port, screen, batteries, and a lot more.





Group that we had choosed to be compare with our specification.

After I had compare our ideal computer specification with Group 4 from Physical 2, i realize that their ideal computer specification are better than ours. We just use i5 processor meanwhile they are using i7 which is more powerful.They have choosed 2GB GDDR5 AMD Radeon HD 7970M that more powerful than than intel graphic card.The sound more perfect with   Dolby® Home Theater® v4. the screen is 17.3-inch WideFHD 1920 x 1080 60Hz WLED which is more nice and eco. Lastly, they have better computer than us.