P19-24 Flashcards
What makes a computer
- Software programs are made up of data and instructions.
- Software programs are stored in secondary storage which is persistent but slow to read and write.
- Programs are copied into the memory (which is volatile) but have a high read and write speed.
- Then the CPU performs the fetch decode execute cycle to carry out each instruction.
Software
- Two types: system and application
- System software - programs that enable a computer to function. They include the operating system and utility programs.
- Application software - programs that the user interacts with most.
The OS
The Operating System
-Its main function is to provide a platform for other software, so that this software can interact with the computer hardware.
What is an operating system?
Its job is to provide an interface between the hardware and other software, and the user.
main tasks of OS
1) Process management: organising instructions in memory so that they can be processed.
2) File management: organising the contents of secondary storage.
3) User management: providing a user interface and access levels.
4) Peripheral management: interfacing with device drivers to control physical devices.
allocating space
- The OS is responsible for allocating space on the hard disk.
- Files are broken into blocks.
- Each block of a file is placed into an empty sector. Blocks may not be placed into contiguous sectors.
- If the whole sector is not filled, then wasted (slack) space is left.
processes
- When a program is run, it is copied from the secondary storage into the memory so that it can be executed by the CPU.
- Programs in the memory that are being executed (or waiting) are called processes
virtual memory
- When many processes are running a computer’s RAM may become full.
- When this happens, the OS needs to temporarily move some of the contents of the RAM to a space on the hard drive.
- The part of the hard drive designated as an extension to the main memory is called virtual memory.
- The OS moves the pages of memory associated with a process in RAM to the hard disk therefore freeing up memory.
- When the process is ready to be executed again, the OS moves the page from virtual memory back into RAM.
summary
-Processes are moved out of RAM into virtual memory. They are moved in units called pages. This is done to free up space for new processes.
FIFO
This processes the queue in the order that items arrive.
-Low overhead - task switching only happens when a process has been completed.
- Processes are never starved of CPU time.
- Throughput may be low as longer processes may cause wait time to be high.
- Response and completion times depend on the state of the queue.
- There is no prioritisation of tasks.
Shortest job first
The process which is closest to being completed goes first.
-Average wait time is low.
- Response time for short processes is very fast.
- Lower overhead as there may be less switching.
- Longer processes may be starved of processing time.
- Execution time must be known ahead of time.
round robin
Processes are allocated a time slice.
If the process is not complete at the end of its time, it returns to the queue.
Higher priority tasks are given more time slices.
-Balanced throughput (number of processes completed over time).
-Average response time is good if the number of processes is high.
- Processes can never be starved of access to hardware.
- There is some overhead (wasted time) involved in switching between processes.
-Processes may have to wait a long time to complete, especially if there are many waiting.
peripheral device
- The word peripheral means ‘on the edge’ or ‘secondary to something else’.
- Peripheral devices are additional hardware connected to a computer.
- Peripherals can be inside or outside the computer case itself.
Devices speaking the same language
- Devices have specialist pieces of software called drivers that are installed on the hard disk.
- The driver provides an interface between the peripheral device and the OS so they are able to communicate.
GUIs
Most GUIs use the WIMP format.
Windows - programs that open in frames that can be moved around and overlaid.
Icons - pictures to represent programs you can execute or actions you can do.
Menus - lists of options to choose from
Pointer - using a mouse to click on items.
CLIs
-CLIs are commonly used by people who need to control the function of a computer, server or network.
-There are no icons or pointers in a CLI.
The user can only interact with the computer by typing in commands to be executed.
-CLIs give the user more control over the function of the computer.
-It’s quicker.
Utility software
- Adds functionality to a computer, improves its performance, or helps maintain its hardware or other software.
- Performs specific management tasks such as backup and recovery, disk cleanup, compression or archiving.
-File repair/recovery software:
for when files may have become corrupted due to malfunction if cyberattack.
-Backup/recovery software:
to save a copy of the system in another place in cases of hardware failure or attack, so that the most recent state of the system can be recovered later.
-File compression software:
to reduce file sizes in order to save space on a hard drive or for transmission.
-Disk defragmentation software:
to move fragmented files into contiguous space on the disk in order to free up larger blocks of continuous space and speed up file access.
data compression
Data compression
To reduce the size of a file so as to free up storage space and speed up data transfer across networks.
Repackages (lossless) or removes(lossy) some of a file’s data to reduce its size.
Backup and recovery
To backup data and recover it in the event of data loss or damage
Backup copies of files are made at regular intervals and stored on a separate
device in a different location to the live working environment – possibly in the cloud.
File repair
To repair and
recover data from a
file that has
become corrupted.
It scans the damaged file, extracts as much data from it as possible and stores it in a new usable file.
Disk defragmentation
To speed up disk access and improve performance.
Files stored on a hard drive are rearranged so that they are stored in contiguous blocks rather than being
spread out across the disk.
File encryption
To improve the security of a file so that it is impossible for unauthorised people to decode and read its contents
Uses an algorithm to
scramble the data in a
file. Only a recipient
with the correct key is able to unscramble it.