Computer Systems and Operating Systems
Computer Systems and Operating Systems
Introduction
- The term system can be defined as a collection of independent entities that collectively work together
to achieve a desired goal.
- Computer system refers to a collection of entities that work together to process and manage
information using computers.
- A computer system consists of three main components namely the hardware, the software and the
computer user (liveware).
COMPUTER HARDWARE
- Hardware may be classified into four categories namely:
(i) Input devices
(ii) Central processing unit
(iii) Output devices
(iv) Storage devices
INPUT DEVICES
- Are hardware components that convert user input which is in human readable form to machine form
that a computer can process.
- Input devices can be classified according to how they are used to enter data. This includes:
Keying devices
- A keying device converts typed numbers, letters and special characters into machine readable form
before processing takes place.
3. Joystick: A joystick is an input device that looks like a car gear lever which can be moved sideways,
upwards or downwards to control the position of the cursor. It is purposely used for playing video
games.
4. Stylus: It is a pen-like pointing device used to write on a touch sensitive screen of devices like
smartphones and tablets.
5. Trackball: A trackball works just like the mouse but instead of moving it on a flat surface, a ball
fixed on its top is rolled using the index finger. As the ball rotates, it moves a pointer on the screen;
one can then click its button to execute the selected command.
Scanners
- Scanning means capturing data from an object and converting it into digital format.
- Scanners are devices that enter (capture) data into the computer directly.
- Scanners can be classified according to the technology they use to capture data. These are optical
scanners and magnetic scanners.
Optical scanners
- These types of scanners capture data using light.
- A special type of concentrated beam of light is passed over the object, image or text which needs to
be entered into the computer. The scanner converts the data into digital form and then passes it to the
computer for processing.
- There are three types of optical scanners:
2|Page
1. Optical mark recognition (OMR)
- These types of scanners detect marks made on a piece of paper using a soft pen or pencil. The reader
scans the marks with a special type of light called infrared light. Where there are no marks, a strong
light is reflected than where one exists.
- OMRs are used in marking multiple choice questions, analyzing response from questionnaires and
selecting of number combinations in lottery tickets.
Magnetic Scanners
- These types of scanners are used to capture data written using magnetic ink or coded onto a magnetic
strip.
- Common examples of magnetic scanners are Magnetic Ink Character recognition (MICR) and
card readers.
3|Page
Speech recognition or voice input
- Voice recognition is a type of input method where a microphone is used to enter data in form of
spoken words into the computer.
- This method is mostly suitable for the handicapped especially those with impaired hands.
- Although this is a fast and easier method, it has some disadvantages.
Digitizers
- A digitizer also known as graphic tablet allows the user to directly draw an image using a stylus.
- The image drawn does not appear on the tablet but on the computer screen.
- Digitizers are mostly used for architectural and engineering designs.
Digital cameras
- A digital camera stores its images in digital form. These images can then be streamed (entered)
directly into a computer for editing or printing by connecting the camera to a computer using a
special cable.
- There are two types of digital cameras: One that can take still images i.e. photographs and another
that takes motion pictures (video).
Smartboard
- It is an interactive whiteboard that is connected to a computer.
- Smartboards are used in places such as classrooms, corporate boardrooms, seminars and
broadcasting studios.
4|Page
Functional elements of CPU
- The CPU has three different functional units called Arithmetic and Logic Unit (ALU), Control
Unit (CU) and the main memory.
Control unit
- The control unit coordinates all processing activities of the CPU.
- It also determines which operational or instruction is to be executed next.
- To coordinate these activities, the control unit uses a system clock that sends command signals
similar to the way traffic lights coordinates road users.
- The system clock determines the speed of a microprocessor. The faster the clock pulses, the
faster the CPU hence the faster the computer can process data.
5|Page
- The arithmetic operations performed by ALU includes addition, subtraction, multiplication and
division.
- Logic operations involve comparison of two or more values using operators like equals to (=),
greater than (>) and less than (<).
- In order for the ALU to be able to process data, it has special temporary storage locations called
registers, which holds the data just before processing. It also holds the results after processing.
Types Of ROM
- Depending on permanence of the instructions or data written on it, there are four types of read only
memory namely:
1. Mask read only memory: Once the content is written on it by the manufacturer, it cannot be changed.
2. Programmable read only memory (PROM): This allows the user to alter it only once after the
content is written on it.
3. Erasable programmable read only memory (EPROM): It has a transparent quartz window through
which its contents, can be erased by exposing it to ultra violet (UV) light, and then reprogrammed
for another use.
4. Electrically erasable programmable read only memory (EEPROM): This type of ROM can be erased
and reprogrammed using electricity. An example of EEPROM is the memory that stores the basic
input/output system (BIOS).
6|Page
2. RAM is a temporary (volatile) storage because its content disappears when the computer is switched off.
3. Its content is user defined i.e. the user dictates what is to be contained in the RAM.
Types of RAM
- There are two types of-RAM namely, static RAM (SRAM) and dynamic RAM (DRAM).
- Static RAM is very fast compared to dynamic RAM and holds its content as long as there is power.
- Static RAM is more expensive. It is mostly used to make special types of memories.
- Dynamic RAM on the other hand can only hold its content for a short while even when power is on.
To maintain the content of dynamic RAM, the memory chip is designed in a way that its content is
refreshed (automatically rewritten) severally per second.
- Dynamic RAM is cheaper compared to Static RAM.
Buffers
- Buffers are special memories found in input or output devices.
- Because the CPU is very fast compared to the input or output devices, buffers provide temporary
storage so that the CPU is set free to carry out other activities instead of waiting for all data to be
entered or information to be output.
- For example, since a printer cannot work at the speed of a CPU, the printer buffers temporarily hold
the output to be printed hence freeing the CPU to perform other functions.
- Buffers can hold more than one piece of data at a time.
Registers
- As opposed to buffers, registers hold one piece of data at a time and are inside the CPU.
- Examples of registers are:
1. An accumulator: This temporarily holds the results of the last processing step of the ALU.
2. Instruction register: This temporarily holds an instruction just before it is interpreted into a
form that CPU can understand it.
3. An address register: This temporarily holds the next piece of data waiting to be processed.
4. Storage register: This temporarily holds a piece of data that is on its way to and from the CPU
and the main memory.
Cache Memory
- Most modern processors incorporate small high-speed type of SRAM called cache memory.
- The purpose of cache memory is to allow the processor to access data and instructions even faster
than it would have taken to fetch it from the relatively slow DRAM.
7|Page
2. Level 2 cache – L2 cache is also known as external cache. It may be installed inside the processor or
between the processor and DRAM.
3. Level 3 cache – L3 cache is installed on the motherboard to support L2 cache in enhancing system
performance in terms of processing speed.
Memory capacities
- Memory and storage capacity is measured in special units called bytes.
- A byte is equivalent to a single character. Characters can be a number from 0 to 9, letters A to Z or a
special symbol. For example, a number like 2545 has four bytes while the words, My Home has
seven bytes since, the space between them is considered as a character of one byte.
The figure below shows a summary of the overall organization of the CPU and how it controls other computer
components:
8|Page
Types of processors and their clock speeds
- Processors may be classified into two broad categories depending on instruction set, and the
processing speed.
9|Page
- Quantities of the clock speed can be expressed in:
OUTPUT DEVICES
- Output devices are peripheral devices that a computer uses to give out information produced
after the processing operations.
- There are two types of output devices namely the softcopy and the hardcopy output devices.
- Softcopy refers to the intangible output mainly displayed on the screen or through other
output devices such as speakers.
10 | P a g e
- A hardcopy is a tangible output produced mostly on papers by devices such as printers.
Monitors
- A monitor or a video display unit (VDU) is the most common output device.
- It displays information on its screen thus helping the user to monitor operations carried out by the computer.
Types of monitors
1. Cathode Ray Tube monitors
- For a long time, monitors have been designed using a long tube called the cathode ray tube (CRT
that emits light.
- The screen of a cathode ray tube is curved slightly outward forming a convex shape.
- However, new flat displays have come which do not use CRT technology. These include liquid Crystal
Display (LCD), Light Emitting Diode (LED), and Gas Plasma Display (GPD) monitors.
- Flat displays are more comfortable to use, portable and do not consume a lot of power compared to CRT.
LCD technologies
- There are two technologies used to make LCDs, Passive matrix and Active matrix.
- In Passive matrix, LCDs create images by scanning the entire screen. This type of LCDs requires
little power but have poor clarity.
- Active-matrix displays are made using Thin Film Transistor (TFT) hence consumes more power
than passive matrix but offer better clarity.
11 | P a g e
- Unlike LCDs, images displayed by GPDs do not suffer from angle distortion.
- The technology is currently being used to produce High-Definition TVs (HDTV).
Display terminologies
1. Pixel: Stands for picture elements. Are tiny dots which are used to form the images displayed on the
screen. In color monitors, a pixel has three primary colors namely red, green and blue.
2. Color depth: Refers to number of colors that by be displayed by a pixel. It is measured in binary digits
(bits).
3. Resolution: This is the number of pixels per inch. It is usually given in dots per inch (dpi) or bits.
The higher the resolution, the more the number of pixels per square inch, hence the clearer the
images on the screen.
4. Refresh rate: Since CRT monitors do not hold an image for a long time, image in the video RAM
is used to constantly refresh the one on the screen as long as necessary. If a screen has a low refresh rate,
images tend to flicker hence causing eyestrain.
5. Display size: The size of the display is measured in inches across the diagonal. Common display
sizes are 10 inch, 12 inch, 15 inch, 19 inch and 21 inch.
Sound output
- Speakers are used to output sound from a computer. Sound may be in form of music, warning, video,
interactive communication with a computer etc.
Projectors
- Are used for displaying soft copy output from a computer onto a plain screen or wall.
- It is a creative way of presenting computer output to an audience in class, theater and conference halls.
12 | P a g e
units, LED indicators indicate when the device is on using red or green color.
- Red indicators on the system unit may imply that the system is faulty.
Printers
- Printers produce a hard copy of information on papers.
- The quality of the hardcopy depends on the printer’s printing mechanism.
- There are two types of printers namely impact and non-impact printers.
Impact printers
- They print using striking mechanism. The printing head strike the paper in order to form an imprint on it.
- The two widely used impact printers are dot matrix and daisy-wheel printers.
Daisy-wheel printer
- It has a wheel with petals on which characters are mounted.
- It is so called because it resembles a daisy flower.
- When printing, the wheel rotates allowing the petals to hit a ribbon with different characters as they
are received from the computer.
Non-impact printers
- These printers do not use the striking mechanism to produce characters on a piece of paper.
- They do not hammer the ribbon hence they are much quieter.
- The major non-impact printers are inkjet, thermal, laser and photo printers.
Inkjet printers
- Inkjet printers form characters by spraying ink from tiny nozzles through an electrical field that
arranges the charged ink particles into characters.
- Inkjets are cheap to buy but expensive to run because of the high cost of ink cartridges.
Thermal printers
Thermal printers use heat to transfer characters onto a piece of paper i.e. they bond characters onto a piece
of paper by using hot pins which presses against a special ribbon. They are inexpensive alternative to
inkjets.
Laser printers
13 | P a g e
- Laser printers print by passing a laser beam back and forth over a rotating drum.
14 | P a g e
- The laser beam draws the image on the drum by static electricity.
- The charged areas pick up the ink toner from a cartridge, and press it onto the paper.
- Although these printers are more expensive to buy, they are faster, and cheaper to run than the inkjets.
Photo printers
- They are used to high quality image printouts from sources such as memory cards, optical disks
and digital cameras.
Plotters
- A plotter is a special type of printer used for printing large format hardcopy outputs like
geographical maps, architectural drawings, and billboards.
Magnetic tapes
- A magnetic tape is a ribbon of Mylar (plastic-like) material coated with a thin layer of iron oxide.
- The tape resembles the music cassette used in home tape recorders.
- In order to read/write data records on the tape, the tape must be inserted in a tape drive that rotates the
tape allowing a read/write head to perform the operation.
Magnetic disks
- They have a magnetic disk platter that stores data.
15 | P a g e
- A floppy disk or simply a diskette is one of the earliest magnetic disks.
- A floppy disk is made up of a flexible disk covered in a plastic package.
- Floppy disks were popular in 1980s and 90s.
- A standard 3.5-inch floppy disk stored up to 1.44 MB.
- Other higher capacity magnetic disks included zip disks, jaz disks, and high-capacity floppy disk
(HiFD)
NB: Most of these magnetic disks have become obsolete due to increasing demand for higher storage
capacity for programs and digital data like movies.
Optical disks
- An optical disk is a storage medium onto which data is written and read using low-powered laser beam.
- The three common types of optical disks are Compact Disk (CD), Digital Versatile Disk (DVD), and
Blu-ray disks.
NB: Both CD-ROMs and CD-Rs are referred to as WORM (Write Once Read Many) because they allow the
user to record data on them once but read the data as often as necessary.
16 | P a g e
Digital versatile disks (DVD's)
- Digital versatile disks also known as digital video disks resemble compact disks in every aspect
but the only difference is that they have higher storage capacity of up to 17GB which is equivalent
to approximately twenty-six 640MB CDs.
- They are suitable for recording motion pictures such as video because they offer better sound and
picture quality than the CDs.
Blu-ray disk
- It is a high-capacity optical storage used for storage and playing back high-definition audio and video
content.
- Blu-ray disk gets its name from the blue-violet laser beam used to read the storage media.
- Compared to a DVD, a Blu-ray disk supports higher resolution and higher storage of up to 50 GB.
1. A video graphic array or higher super video graphic array (SVGA) graphics card and monitor.
2. A sound card.
3. Compact disk or digital video disk drives.
4. 32 MB RAM or higher.
17 | P a g e
Fixed Storage Media
- These are the storage devices that are housed inside the personal computer’s system unit. An example
is the hard disk. However, it is important to note that some hard disks especially those used in small
computers such as laptops are removable.
- As the disk rotates, the read/write head moves in and out over the surface to record or read data.
18 | P a g e
2. Switch off the computer using the correct procedure. This allows the read/write head to move off the disk
surface before power is switched off. Improper procedure would risk heads crashing on rotating disks hence
scratching
them.
19 | P a g e
- USB supports a wide range of peripheral devices ranging from external storage drives to digital
cameras.
Interface
- Audio interface is used to connect speakers, microphone (mic), and other audio output devices.
20 | P a g e
{Assessment exercise 2.5 on Pg 67}
- Before attempting to carry out any setup activity, observe the following precautions should be
observed.
1. Disconnect all devices from power source before starting to work on them.
2. Do not work on any peripheral device without the guidance of the teacher.
3. Never work alone because you may need help in case of an emergency.
4. Discharge any static electricity that might have built up on the hands by touching an earthed metallic
object and then wearing an anti-static wrist member. This is because your body can hold as much as 200
volts of static charge that can damage sensitive components on the motherboard.
21 | P a g e
Connecting peripheral devices
- To connect a device to the system unit, you need to identify its port and interface cable.
1. Gently and carefully connect the interface cable of each device to the correct port and to the device if it
is not already fixed permanently.
2. Connect the computer to the power source and switch it on.
3. Observe boot up information on the screen to see whether power on-self test (POST) displays any
error message.
4. A successful boot means that the computer was properly setup.
NB: If the computer is completely new, programs have to be copied (installed) on the hard disk.
COMPUTER SOFTWARE
- As mentioned earlier, the term software refers to a set of computer programs.
- Its function is to guide the computer in its operations.
- Software can be classified according to purpose or acquisition.
SYSTEM SOFTWARE
- System software performs a variety of fundamental operations that avails computer resources to
the user. These functions include:
1. Booting the computer and making sure that all the hardware elements are working properly.
2. Performing operations such as retrieving, loading, executing and storing application programs.
3. Storing and retrieving files.
4. Performing a variety of system utility functions.
22 | P a g e
Firmware
- Firmware, also referred to as stored logic is a combination of both the software and hardware
recorded permanently on electronic chips.
- Usually, a firmware is a read-only memory chip that is mounted or plugged into the motherboard.
- Firmware may hold an operating system, utility programs, language processors etc.
Utility software
- Utility software is a special program that performs commonly used services that make certain aspects
of computing to go on more smoothly.
- Such services include sorting, copying, file handling, disk management etc.
- The two basic types of utility software are:
1. System-level utility software: These help the user to work with the operating system and its functions. For
example, a utility software tells the user when he/she enters a wrong command and gives suggestions how
the error can be corrected.
2. Application-level utility software: These make the use of an application program smoother and efficient.
These utility programs are commonly purchased separately or may be part of an operating system.
Networking software
- This type of software is mostly used to establish communication between two or more computers by
linking them using a communication channel like cables to create a computer network.
- Networking software enables the exchange of data in a network as well as providing data security.
- Network software may come as independent software or integrated in an operating system.
- An example of networking software is novel Netware.
APPLICATION SOFTWARE
- Application software, also called application packages are programs that are designed to help the
user accomplish specific tasks.
Application packages
- The table below gives examples and uses of common application packages
Software Uses Examples
Word processors Typing documents like Microsoft Word, Lotus
letters. WordPro, WordStar.
Spreadsheets Manipulation of numeric data
Microsoft Excel, Lotus 1 2
e.g. calculating 3
budgets.
Desktop Designing publications Adobe PageMaker,
Publisher like newspapers, books. Microsoft publisher,
Adobe InDesign
Computer aided Technical drawing. AutoCAD, ArchiCAD
Design
Databases Keeping records and Microsoft Access,
MySQL, Oracle,
Foxbase, Paradox.
files.
Graphics software Creating and Corel Draw, Adobe
manipulating pictures. Photoshop.
23 | P a g e
SOFTWARE ACQUISITION METHODS
- Generally, computer programs can be classified according to how they are obtained as open
source software and
Open source software refers to software whose source code is freely available to the public. Here are some
characteristics of open source software:
Source code availability: Open source software provides access to its source code, allowing users to view,
modify, and distribute it.
Community-driven development: Open source software is often developed and maintained by a community of
volunteers who collaborate to improve the software.
Flexibility and customization: Users can modify open source software to suit their specific needs and
preferences.
Transparency and security: The availability of source code allows for transparency, enabling users to identify
and fix security vulnerabilities.
Cost: Open source software is typically free to use, although some projects may offer paid support or additional
features.
Off-the-Shelf Software
Off-the-shelf software, also known as proprietary software, refers to software that is commercially developed
and sold as a packaged product. Here are some characteristics of off-the-shelf software:
Closed source: The source code of off-the-shelf software is not accessible to users, limiting their ability to
modify or customize it.
Ease of use: Off-the-shelf software is designed to be user-friendly and ready to use without requiring extensive
customization or development.
Vendor support: Users of off-the-shelf software can typically rely on vendor support for bug fixes, updates, and
technical assistance.
Cost: Off-the-shelf software is usually sold at a price, and users may need to purchase licenses for each user or
device.
Advantages of Off-the-shelf software
1. They can easily be installed and run.
2. They are cheaper than the cost of developing in-house software.
3. They are readily available for almost any task.
4. Minor or no errors since they are thoroughly tested.
5. They can easily be modified (customized) to meet user’s needs.
25 | P a g e
- Examples of open-source software include Linux operating system, OpenOffice, Mozilla Firefox
browser, Thunderbird e-mail software Apache web server, and MySQL database management
system.
3. Freeware: This software category allows for free of charge acquisition, use, making copies and
distribution of copyrighted software for unlimited time.
- Examples of Freeware software include Adobe Reader, and Google Talk.
4. Shareware: consists of licensed software that allow users to freely make and distribute copies of the
software.
- Examples of shareware include Winzip, Adobe Acrobat Professional Edition, Internet Download
Manager (IDM), and CloneDVD
HARDWARE CONSIDERATIONS
- Some factors considered when selecting computer hardware are:
1. Processor speed
- The processing power and speed of a computer mainly depends on the processor speed. A good
computer must have high processor speed.
- For example, a few years ago, processors used to have speeds of less than 100MHz. However, today
s Pentium processors are operating at very high clock speeds of over 4 GHz.
2. Memory capacity
- As earlier mentioned, primary memory, mainly random-access memory (RAM) is measured in
megabytes (MB).
- For example, a computer may have 32MB of RAM. Although, a computer may have a very fast
processor, it may not perform as expected if it has low memory capacity.
- Therefore, before one buys a memory module for the computer the following factors have to be
considered:
1. The type of module supported by the computer s motherboard.
2. Does the motherboard have an empty memory slot?
3. Will the module work well (be compatible) with the other existing modules on the motherboard?
4. What is the capacity of the module?
3. Warranty
- A warranty is an agreement between the buyer and the seller that spells out terms and conditions of,
after selling a product in case of failure or malfunction.
- The most important consideration to make is whether the seller is ready to actually provide after
sales services. On top of the actual cost of the item, most manufacturers and suppliers include a
certain percentage charge to cover the warranty.
26 | P a g e
A good warranty should cover the following points:
1. Scope of cover for example six months, one year etc.
2. Callout response and liability agreement. For example how long should the supplier take to repair a fault
or replace the product, and if he/she delays who bears the cost.
3. Preventive maintenance for example regularity of service, at intervals etc.
4. Cost
- The cost of a computer system depends on:
6. Portability
- The size of electronic devices including computers has become a major consideration
because smaller devices enhance mobility.
7. User needs
- When selecting computer hardware, consider the unique needs of the user.
- For example, if the users have special disability like inability to use their hands, consider buying
input devices that capture data through voice input.
Other considerations
- Other considerations for selecting computer hardware are:
1. Monitor
- Depending on preference, your choice for a monitor may depend on size, resolution and the
technology used to make it.
- Currently flat panel displays have become a new market standard quickly replacing the cathode ray
tube (CRT).
2. Multimedia capability
- This is the combination of video, audio, text and images to provide an interactive, creative and
effective way of producing and communicating information.
- A multimedia system should have speakers, CD/DVD drive, sounds card and a SVGA monitor. It
should also have software that supports multimedia capability (multimedia software).
27 | P a g e
SOFTWARE CONSIDERATIONS
- Although one may have a good computer with the best hardware, the actual real determinant of a
computer’s value to the user is the software in it that can run to solve the day-to-day data and
information processing needs.
- The following factors should be considered when selecting software:
1. Authenticity
- The term authenticity refers to genuineness, validity and or legitimacy of an item.
- When you acquire software from the vendor, make sure it is an original copy that is accompanied by
the developer’s license and certificate of authenticity.
- This is because some people illegally produce pirated copies which is an offence.
2. Documentation
- It refers to the manuals prepared by the developer having details on how to install, use and maintain
the software.
- These include installation guide, maintenance guide and a user guide.
- The documentation enables the user to work with the software with minimum guidance.
3. User needs
- The needs of the user determine the type of operating system and application programs that should
be considered for acquisition.
- For example, if the user needs to type documents most often, he/she would go for a word-processor.
- People with disability will require software that recognizes other forms of input like voice and
natural sound.
- A good example is software used in mobile phones to store voice and allow the user to make a call
by just calling a name instead of keying in the number.
5. User friendliness
- One of the most important features normally considered when using a computer program is its user-
friendliness.
- This is a measure of how easily the users can be able to operate the computer. Some programs are
more user- friendlier than others.
- A lot of research and effort has been dedicated in trying to come up with more user-friendly software.
The ease of use of a program will most likely influence whether the user will prefer it or not.
6. Cost
- The cost of software is perhaps one of the most controversial issues that must be considered
carefully. One cannot just go for software because it is cheap. Many other factors may force a person
to buy far much more expensive software even with cheaper alternatives available. However, it is
illogical to buy expensive software if there is a reliable cheaper alternative that will meet ones
28 | P a g e
needs.
29 | P a g e
- In case the off- the-shelf software does not fit the needs of the users it would be advisable to develop
in-house software solutions even though they may be a bit more expensive.
8. Portability
- Portability in this aspect refers to whether a program can be copied or installed in more than one
computer.
- Although, most software in the market today are portable some developers produce software which
can be installed on one machine only. This means that if one has twenty computers, one should buy a
license for each.
30 | P a g e
TOPIC 3: OPERATING SYSTEMS (OS)
The processor
- The processor is a scarce resource. It executes tasks called processes. At any one time several tasks
may require processing hence creating competition.
- The operating system arranges the tasks according to priority and has the ability to stop a particular
task to allow the processor to service another one.
- Because the operating system is large and very important, it is usually installed on the hard disk but
must be loaded to RAM during the booting process.
- Not all the operating system can fit in RAM so a small special part that contains the most necessary
commands and procedures called the kernel is the one that is loaded.
31 | P a g e
Secondary storage devices
- The operating system manages the storage and retrieval of data on secondary storage devices.
- It also utilizes the free space on hard disk to enhance the performance of the computer by
temporarily holding tasks on it that were in RAM ready for processing but have to wait for some
time.
3. Input/output handling
- Every computer has many input and output devices (I/O). Like a skilled traffic officer, the operating
system coordinates between these various I/O and other peripheral devices such as auxiliary storage
devices, making sure that data flows properly between them and sorting out any possible confusion.
- For example, when printing, the CPU directs its attention to the printing function. The operating
system searches for the printer, chooses the correct one, translates the name for the CPU and finally
the CPU sends the document to the printer. This then makes the CPU available for other activities.
4. Memory management
- All data and instructions must be temporarily held in the main memory before and after processing.
The operating system may organize the main memory into blocks of sizes called partitions. It
constantly assigns main memory storage partitions to data and instructions. To access a piece of data
32 | P a g e
or instruction, the operating system knows where to find each piece of data as long as the correct
address of the partition is used.
5. Error handling
- The operating system has many ways of alerting the user, of errors he or she makes. Many operating
system usually express what the error is, and where possible make suggestions on how to correct the
error.
- The operating system does this by monitoring the status of the computer system and performing error
checks on both hardware and the software.
6. Job sequencing
- The operating system keeps a list of jobs or tasks currently being run and clocks them in and out of
the processor. It also arranges them in a particular order to make it easy for the processor to execute
them and to know how and when to fetch instructions and data for each task.
7. Interrupt handling
- An interrupt is a break from the normal sequential processing of instructions in a program. An
external request causes the processor to stop executing the current task, and do something else
before returning the control back to the program that was interrupted.
8. Network Management
- The operating system is responsible for facilitating connectivity and managing
communication protocols. The term protocol refers to utility software that defines how
devices are to communicate to each other on the network.
33 | P a g e
- The CPU switches its attention between programs as it receives requests for processing, executing
statements from one program, and then from another using the concept of giving a time slice to each
application.
NB: The user must press the enter key for the command to be executed.
- Examples of command line interface are the early versions of MS DOS, PC DOS, OS/2, and UNIX.
34 | P a g e
- GUI has become a very common type of interface because of its user friendliness.
35 | P a g e
- Examples of GUI-based operating systems are Microsoft Windows, Linux, Apple Macintosh,
Apple’s iOS and Android.
FILES
- A file is a collection of related data given a unique name for ease of access, manipulation and storage
on secondary storage.
- In windows, a file has details that indicate the following:
1. A file name and extension. The filename and extension are separated by a period (.) e.g. a file named
JUNE.DOC has the filename attribute JUNE and DOC extension denoting that the file is a word processor
document. The extension usually suggests the type of information held by the file e.g. DOC suggests that it
is a document file created in an application program called Microsoft Word.
Extension File type Description
.doc Document A Microsoft Document file.
.txt Text A plain text file created using
notepad or DOS editor.
36 | P a g e
.tif Image A graphic file such as picture
taken using digital camera or
created using applications such as
Adobe photoshop.
.exe Application The file that launches a particular
application, e.g. Winword.exe,
PM.to.exe, etc.
.bat Batch file File containing a series of
commands loaded during bootup.
.sys System file System files that perform
fundamental operations in a
computer.
2. attributes denoting the file sizes, date and time the file was created or modified.
- There are two types of files namely: system files and application files.
System files
- These files contain information that is critical for the operation of the computer. For example, all
hardware devices are tested and made ready (initialized) during boot up by having the computer read
information from special system files. These files in Windows would have name extensions like .sys,
.ini and .dll
- An example of a system file is system.ini
Application files
- They are also called program files because they hold programs or application files. They may
have extensions such as .exe.
- When naming files, it is important to give meaningful names and extensions that suggest its content.
For example, when saving a letter written to John, give it a name such as Johnletter. The name
extension is automatically added by the application being used.
Folders
- A folder or a directory is a named storage area where the user can store related files to enable easy
access.
- Like with an ordinary file cabinet, a folder is meant to help the user divide a large storage media into
small manageable storage locations.
Subfolders
- A large folder may be divided into smaller units called subfolders. Therefore, a subfolder or
subdirectory is folder/directory within another folder/directory.
- In Windows, folders and subfolder icons mostly appear in yellow color while file icons are mostly
white with a fold at the top right-hand corner.
37 | P a g e
Drive
- In windows, a drive denotes logical storage location usually associated with a physical storage
device like the hard disk drive.
- The drives are labelled using letters of the alphabet A-Z with drive C denoting the hard disk drive
onto which windows operating system is installed.
- The table below gives a summary of how Microsoft operating systems categorizes drives:
Windows desktop
- Once you switch on the computer, Windows is automatically loaded into the main memory and a
mostly empty screen called the desktop appears. This shows that the computer is ready for use.
Desktop features
- Windows 10 desktop consists of background, icons, and the taskbar.
Desktop Background
- Background is the work space on the desktop on which icons and running tasks are placed.
- Most computers come with a preselected background but you can change it by applying your favorite
themes and wallpapers.
Icons
- An icon is a graphic representation of an application.
- Icons are mostly manipulated using a pointing device e.g. the mouse.
- Some of the common icons on the desktop are My Computer; Recycle bin, Internet Explorer, and
My Documents.
38 | P a g e
The taskbar has at least three main parts
- Start button: The leftmost button on the taskbar that the user clicks to display the start menu.
- Task manager: This is the plain stripe that displays buttons of all currently running tasks.
- System tray: This is at the right most part of the taskbar. It has icons of tasks running in the
background put are not displayed on the screen. Examples are the time and calendar, an antivirus
program, volume control etc. To display such a task, simply double click its icon.
Programs
- This menu displays a list of all programs installed in the computer. The menu has a small solid arrow.
When you point at it, another list of menus called a sidekick menu will be displayed.
File explorer
Windows explorer lets the user display the drives and folders in a hierarchy or tree structure. The computer
tree is an up side down structure with the highest level being the root. The explorer divides the window into
two panes. The left pane displays a tree of drives and folders while the right pane displays a list of files and
sub folders contained in a particular open drive or folder.
To display the Windows explorer in some versions of Windows, carry out the following procedure:
1. Click the start button then
2. Point to the programs menu
3. From the Programs go to the sidekick menu, click windows explorer
This method of displaying the explorer window has been adopted as the standard way of displaying the explorer
window throughout this book to take care of various versions of Windows operating systems.
39 | P a g e
Using My computer
Double clicking on my computer icon, gives you a graphical view of what is inside the computer. This
includes the drives, the control panel and other resources.
To display files and folders from a particular drive proceed as follows:
1. Double click a drive icon. A window appears displaying files and folders stored in the root of the drive in
question. The root is considered to be the highest level of the directory tree where all directories/folders
start.
2. Double click a folder to display its contents.
3. Double click the hard disk (drive C). Its content will be displayed.
4. From this window you can start manipulating your files and folders.
40 | P a g e
Features of an application Window
1. Title bar
- This is a bar across the top of the window that displays the name of the current application
program or task.
- On the right of the title bar are three tiny buttons namely:
Minimize button: It reduces a window by pressing a button which is placed on the taskbar.
The restore/maximize button: It stretches the window to cover the entire desktop or restore it to its original size.
The close button: It is used to exit an application.
2. Menu ribbon
- Provides a list of commands that can be used to manipulate a task. For example, to save a
document, click file and then save.
3. Work area
- This is the working area where you can create your documents.
4. Status bar
- This is an interactive strip at the bottom of the application window that acts as a communication link
between the user and the operating system. Such interactive activities include saving, opening a file,
printing, cursor position etc.
5. Scroll buttons and arrows
- Scrolling is the moving up, down, left or right of a document window on the screen if it is too large
to fit. Scroll buttons and arrows are horizontal and vertical buttons at the borders of a window used to
scroll through long document.
1. Click the File Explorer to display the folders on the content pane.
2. Right click the file or folder to display the shortcut menu.
3. Click Rename command, and then type a new file/folder name, then press the return key.
- The recycle bin is a default icon on the desktop therefore it cannot be removed.
41 | P a g e
Warning
1. One should not attempt to delete system and application files from the hard disk.
2. Items deleted from removable storage are not held in the recycle bin and are completely lost.
1. Using File explorer or This PC, display the folder or files to be deleted.
2. Right click the file or folder, then click Delete on the shortcut menu. A message appears on the screen
asking whether you want to delete the item.
3. Confirm deletion by clicking yes.
1. Double click the recycle bin icon to display its content window.
2. Right click the file or folder, then click Restore on the shortcut menu.
NB: You can also delete selected items in the Recycle Bin by clicking file then delete.
42 | P a g e
To move a file or a folder proceed as follows:
1. Select the file or folder to be moved to another location.
2. Right click the file or folder, then click Cut on the shortcut menu.
3. Right click the destination drive or folder, and then click Paste. The move progress screen may be
displayed depending on the size of the file or folder.
- If you want to select all files in an open folder, click edit then select all. This will highlight all files
in the folder. To manipulate the selected items, use the menu bar or the shortcut.
43 | P a g e
2. Type the name of the file or folder to be searched. The result pane is displayed.
1. Disk formatting
- Disk formatting is the process of preparing a storage media such as a hard disk, flash disk or
memory card for first time use.
- Storage media containing data may also be formatted to make it compatible with another operating
systems or blank for reuse.
2. Disk partitioning
- Partitioning a disk refers to the process of subdividing a large physical storage media into two
or more partitions called logical drives.
- A logical drive is a drive that can be accessed as if it is a separate disk but in actual sense, it is a
partition of one large physical disk.
1. When the user intends to install more than one operating systems on the same disk. Install each on
a separate partition.
2. For purposes of backup on the same disk but different partitions so that if one partition fails, the other will
still be working.
44 | P a g e
3. Disk defragmentation
- Disk defragmenter is a tool that is used to rearrange scattered folders and files on a storage
media in order to speed up access to files and folders. This enables the read/write head not to waste
time looking for the same item all over the disk. Notice that the fragmented disk has related data
elements spread all over it but the defragmented one has related data consolidated close to each
other.
4. Disk diagnostics
- Windows has a disk management tool called the scan disk that helps the user checkup and repair
minor storage problems, such as lost storage locations, or damaged surface.
5. Disk Compressing
- Disk compression is a utility used to store files in compressed format to save on disk space.
- In order to compress a drive, it must be an NTFS (New Technology file system) and the user
must have logged on as an Administrator.
6. Backing up Data
- Windows comes with a utility called backup. It enables the user to create copies of data and
programs (on separate storage device) to avoid losing important data and program files in
case the storage device or the computer fails.
- It is good practice to keep backups away from the computer room to ensure security of
the information in case of a calamity such as fire.
Virus: harmful program that attaches itself on removable drives and causes damage to a computer
system such as deleting system files, data or application files.
Worm: Malware that does not attach itself to a program but it self-replicates hence clogging
a computer storage and memory hence reducing the performance of the computer.
Trojan horse: Harmful program that masquerades as genuine programs yet it is a carrier of viruses or
worms. Trojan horses may come in form in form of games and screen savers
3. Use the device manager found in System properties dialog box to check on the devices that are causing
problems. You get system properties dialog box by right clicking my computer then properties
4. Reinstall the operating system if the problems above persist. In case the problem is beyond repair.
46 | P a g e