ICT - OPERATING SYSTEMS
KINANGO TECHNICAL & VOCATIONAL COLLEGE
P O BOX 6-80120
SAMBURU- MOMBASA
MANAGE
OPERATING SYSTEMS NOTES
TRAINER: MR
MWASI
EMAIL(assigN):teachermwasi8@gmail.com
FOR MORE NOTES VISIT
BLOG SITE: http://tmwasi.blogspot.com
UNIT CODE: IT/OS/ICT/CR/6/5
UNIT
DESCRIPTION
This unit covers the
competencies required to select, install and usage of manage operating system
ELEMENTS AND PERFORMANCE CRITERIA
ELEMENT |
PERFORMANCE CRITERIA (Bold
and italicised terms are elaborated in the Range) |
1. Identify
fundamentals of Operating system |
1.1 Definition of Operating system is done 1.2 Concepts
of operating system are identified. 1.3 Structures
of operating system are described. 1.4 Types
of operating system are identified. 1.5 Functions of operating system are identified. |
2. Identify process management concepts |
2.1 Concepts
of processing are identified and explained 2.2 Process
states are described 2.3 Definition
of Concurrency
control and types is done. 2.4 Explanation
of Process scheduling and types of schedulers is done. 2.5 Definition
of Deadlocks. |
3. Identify
concepts of memory management |
3.1 Definition
of memory management is done. 3.2 Objectives
of memory management are identified. 3.3 Memory
management techniques are identified. 3.4 Memory
management policies are identified. |
4. Identify concepts of Input and Output devices management. |
4.1 Definition
of input and output devices is done. 4.2 Objectives
of input/output device management are identified. 4.3 Concepts
of input and output devices are identified. 4.4 Input/output
devices software are explained. 4.5 Description
of disk and disk operations are done. 4.6 Explanation
of computer clock system is done. 4.7 Computer
terminals are identified. 4.8 Virtual
devices are defined. |
5. Identify concepts of file management |
5.1 Definition
of file system management is done. 5.2 File
system concepts are identified. |
ELEMENT |
PERFORMANCE CRITERIA (Bold and italicised terms are elaborated in the Range) |
|
5.3 Objectives of file
management are identified. 5.4 File access methods are identified. 5.5 Description of
directory implementation is done 5.6 File allocation
techniques are identified. 5.7 File protection and
security are identified. |
6. Identify Emerging trends in Operating
system |
6.1 Explanation of
emerging trends is done. 6.2 Challenges of
emerging trends are identified. 6.3 Ways of coping with emerging trends are identified. |
Variable |
Range May include but is not limited to: |
1. Concepts
of operating system |
q Characteristics
q Objectives
q Kernel
q System
code q shell
|
2. Structures
of operating system |
q Monolithic
q Layered
q Virtual
q Client
server model |
3. Types of operating system |
q Real
time q Normal
q Batch
q Time
sharing |
4. Concurrency control |
q Inter-process
communication q Synchronization
|
5. Memory
management techniques |
q Partitions
q Virtual
q |
6. Memory management policies
|
q Fetch
q Placement
q Replacement
q cleaning
|
7. File access methods |
q Sequential
q Random
q Indexed
sequential |
RANGE
REQUIRED
KNOWLEDGE AND UNDERSTANDING
The individual needs to demonstrate knowledge and understanding
of:
1.1 |
Types of operating systems Roles of operating system Objectives of memory
management Input/output devices
software Computer clock system Objectives of file
management File allocation techniques File access methods Challenges of emerging
trends in operating systems. |
FOUNDATION SKILLS
The individual needs to demonstrate the following
foundation skills: |
|
•
Communications (verbal and written); •
Proficient in ICT; •
Time management; •
Analytical •
Problem solving; •
Planning;
|
•
Decision making; • Report
writing; |
EVIDENCE
GUIDE
This provides advice on
assessment and must be read in conjunction with the performance criteria,
required knowledge and understanding and range.
|
Critical Aspects of Competency |
Assessment requires evidence that the
candidate: 1.
Defined operating system 2.
Identified Types of operating systems 3.
Explained structures of operating systems 4. Identified
functions of operating systems 5. Installed operating system. 6.
Defined memory management 7.
Identified memory management and allocation
techniques. 8.
Differentiated the input and output devices. 9.
Defined computer clock system. 10. Explained
the hardware concept of input/output device 11. Identified
file management objectives 12. Identified
file allocation techniques, access and protection methods. 13. Identified
emerging trends in operating system, challenges and how to cope with them. |
|
Resource Implications |
The following resources must be
provided: Resources
the same as that of workplace are advised to be applied Computers, Software,
Data and People |
|
Methods of Assessment |
Competency may be assessed through: 1.
Oral test 2.
Observation
3.
Practical demonstration |
|
Context of Assessment |
Competency
may be assessed individually in the actual workplace or through a simulated
work place setting |
|
Guidance
information for assessment |
Holistic
assessment with other units relevant to the industry sector, workplace and
job role is recommended. |
1.1 Definition of Operating System
An operating system (OS) is
system software that manages computer hardware, software resources, and
provides common services for computer programs. It acts as an intermediary
between users and the computer hardware, facilitating the execution of applications.
1.2 Concepts of Operating System
Key concepts of an OS include:
• Processes: Instances of executing
programs.
• Threads: Smaller units of process.
• Scheduling: Determining the order in
which processes are executed.
• Memory Management: Handling of primary
memory or RAM.
• File System: Managing files on storage
devices.
• I/O Systems: Managing input and output
operations.
• Security and Protection: Ensuring data
integrity and access control.
1.3 Structures of Operating System
Operating system structures
can be described in several ways:
• Monolithic: Single large kernel with
all OS services.
• Microkernel: Minimal kernel with basic
functions, other services run in user space.
• Modular: Core kernel with dynamically
loadable modules.
• Layered: OS divided into layers, each
built on top of lower layers.
• Hybrid: Combines aspects of monolithic
and microkernel designs.
1.4 Types of Operating System
Common types of operating
systems include:
• Batch Operating Systems: Execute jobs
in batches without user interaction.
• Time-Sharing Systems: Multiple users
can interact with the system simultaneously.
• Distributed Operating Systems: Manage a
group of distinct computers to appear as a single system.
• Real-Time Systems: Provide immediate processing and response.
Embedded
Systems: Specialized OS for specific hardware.
1.5 Functions of Operating System
The primary functions of an OS
include:
•
Process
Management: Creating, scheduling, and terminating processes.
•
Memory
Management: Allocating and deallocating memory space.
•
File
System Management: Managing files and directories.
•
Device
Management: Controlling and interfacing with hardware devices.
• Security and Access Control: Protecting data and resources.
1.6 Concepts of Processing
Processing concepts involve:
•
Process:
A program in execution.
•
Thread:
The smallest unit of processing that can be scheduled.
•
Context
Switching: Saving and loading process states to switch execution.
•
Multi-tasking:
Running multiple processes concurrently.
•
Multi-threading:
Running multiple threads within a process.
1.7 Process States
Process states include:
• New: The process is being created.
• Ready: The process is waiting to be
assigned to a processor.
• Running: The process is being executed.
• Waiting: The process is waiting for
some event to occur.
• Terminated: The process has finished
execution.
1.8 Definition of Concurrency Control and Types
Concurrency control ensures
correct results for concurrent operations:
•
Pessimistic
Concurrency Control: Locks resources to prevent conflicts.
• Optimistic Concurrency Control: Assumes conflicts are rare and checks for conflicts before committing.
1.9 Explanation
of Process Scheduling and Types of Schedulers
Process scheduling determines
the order in which processes are executed:
•
Long-term
Scheduler: Decides which processes are admitted to the system.
•
Short-term
Scheduler: Decides which process to execute next.
•
Medium-term
Scheduler: Swaps processes in and out of memory.
1.10 Definition of Deadlocks
A deadlock is a situation where
a set of processes are blocked because each process is holding a resource and
waiting for another resource held by another process.
1.11 Definition of Memory Management
Memory management is the
process of controlling and coordinating computer memory, assigning blocks to
various running programs to optimize overall system performance.
1.12 Objectives of Memory Management
Objectives include:
•
Efficiency:
Maximizing the use of memory.
•
Relocation:
Moving programs in memory to utilize space efficiently.
•
Protection:
Ensuring processes do not interfere with each other.
• Sharing: Allowing multiple processes to use the same memory space.
1.13 Memory Management Techniques
Techniques include:
•
Paging:
Dividing memory into fixed-sized pages.
•
Segmentation:
Dividing memory into variable-sized segments.
•
Virtual
Memory: Using disk space to extend physical memory.
• Contiguous Allocation: Allocating consecutive memory blocks.
1.14 Memory Management Policies
Policies include:
•
First-Fit:
Allocating the first sufficient memory block.
•
Best-Fit:
Allocating the smallest sufficient memory block.
•
Worst-Fit:
Allocating the largest available memory block.
1.15 Definition of Input and Output Devices
Input devices are peripherals
used to provide data to a computer (e.g., keyboard, mouse). Output devices
present data from a computer to the user (e.g., monitor, printer).
1.16 Objectives of Input/Output Device
Management
Objectives include:
•
Efficiency:
Ensuring quick and efficient data transfer.
•
Fairness:
Ensuring equitable access to I/O resources.
• Device Independence: Abstracting hardware specifics from the user.
1.17 Concepts of Input and Output Devices
Concepts involve:
•
Device
Controllers: Interface between the device and the computer.
•
Drivers:
Software that communicates with hardware devices.
• Buffers: Temporary storage for data during transfer.
1.18 Input/Output Devices Software
I/O device software includes:
•
Device
Drivers: Control specific hardware devices.
•
Interrupt
Handlers: Manage interrupts generated by I/O devices.
•
Device-Independent
I/O Software: Provides a uniform interface for device access.
1.19 Description of Disk and Disk Operations
Disks are storage devices that
use magnetic or solid-state technology to store data. Operations include:
• Read/Write: Accessing and modifying
data on the disk.
• Seek: Moving the read/write head to the
correct location.
• Formatting: Preparing the disk for data
storage.
1.20 Explanation of Computer Clock System
The computer clock system keeps
track of time and synchronizes processes. It generates periodic interrupts that
help the OS manage time slices for process execution.
1.21 Computer Terminals
Computer terminals are devices
used for entering data into and displaying data from a computer, typically
consisting of a keyboard and a display screen.
1.22 Virtual Devices
Virtual devices are software
simulations of physical devices, allowing programs to interact with hardware
without needing direct access to the hardware.
1.23 Definition of File System Management
File system management involves
organizing, storing, retrieving, and managing data on storage devices, ensuring
data integrity and access control.
1.24 File System Concepts
File system concepts include:
• Files: Units of data storage.
• Directories: Organizational units for
files.
• Paths: Addressing files and
directories.
File Descriptors: References to open files.
1.25 OBJECTIVES OF FILE MANAGEMENT
Objectives include:
•
Organization:
Efficient data organization and retrieval.
•
Access
Control: Ensuring authorized access.
• Data Integrity: Maintaining data accuracy and consistency.
1.26 File Access Methods
Access methods include:
•
Sequential:
Accessing files in a sequential order.
• Direct: Accessing files at specific locations.
Indexed: Using an index to access files.
1.27 Description of Directory Implementation
Directories can be implemented
using:
•
Single-level:
One directory for all files.
•
Two-level:
Separate directories for each user.
•
Tree-structured:
Hierarchical organization.
•
Acyclic-graph:
Directories that can share subdirectories and files.
1.28 File Allocation Techniques
File allocation techniques
include:
•
Contiguous
Allocation: Storing files in contiguous blocks.
•
Linked
Allocation: Linking blocks scattered across the disk.
• Indexed Allocation: Using an index block to manage file storage.
1.29 File Protection and Security
File protection and security
involve:
•
Access
Control Lists (ACLs): Defining permissions for users and groups.
•
Encryption:
Securing data from unauthorized access.
•
Backups:
Protecting data from loss.
1.30 Explanation of Emerging Trends
Emerging trends in operating
systems include:
•
Cloud
Computing: Leveraging remote servers for computing power and storage.
•
Virtualization:
Running multiple virtual machines on a single physical machine.
•
IoT:
Operating systems for interconnected smart devices.
• Security Enhancements: Improving OS security against new threats.
1.31 Challenges of Emerging Trends
Challenges include:
•
Scalability:
Managing increased loads and data.
•
Security:
Protecting against sophisticated threats.
•
Interoperability:
Ensuring compatibility between diverse systems.
• Resource Management: Efficiently managing resources in complex environments.
1.32 Ways of Coping with Emerging Trends
Ways to cope include:
•
Regular
Updates: Keeping software up-to-date with the latest security patches.
•
Training:
Educating users and administrators about new technologies.
•
Advanced
Security Measures: Implementing multi-factor authentication and encryption.
Adopting Standards: Following industry
standards for interoperability and security.
of 11
Comments
Post a Comment