ICT - OPERATING SYSTEMS


KINANGO TECHNICAL & VOCATIONAL COLLEGE

P O BOX 6-80120

SAMBURU- MOMBASA

 

 

MANAGE OPERATING SYSTEMS NOTES

TRAINER:  MR MWASI

EMAIL(assigN):teachermwasi8@gmail.com 

FOR MORE NOTES VISIT

BLOG SITE: http://tmwasi.blogspot.com

 

 

 

 

UNIT CODE: IT/OS/ICT/CR/6/5                                         

UNIT DESCRIPTION

This unit covers the competencies required to select, install and usage of manage operating system

ELEMENTS AND PERFORMANCE CRITERIA 

ELEMENT  

PERFORMANCE CRITERIA

(Bold and italicised terms are elaborated in the Range)

1. Identify fundamentals of Operating system

1.1  Definition of Operating system is done

1.2 Concepts of operating system are identified.

1.3 Structures of operating system are described.

1.4 Types of operating system are identified.

1.5 Functions of operating system are identified.

2. Identify process management concepts

2.1 Concepts of processing are identified and explained

2.2 Process states are described

2.3 Definition of Concurrency control and types is done.

2.4 Explanation of Process scheduling and types of schedulers is done.

2.5 Definition of Deadlocks. 

3. Identify concepts of memory management

3.1 Definition of memory management is done.

3.2 Objectives of memory management are identified.

3.3 Memory management techniques are identified.

3.4 Memory management policies are identified.

 

4. Identify concepts of Input and Output devices management.

4.1 Definition of input and output devices is done.

4.2 Objectives of input/output device management are identified.

4.3 Concepts of input and output devices are identified.

4.4 Input/output devices software are explained.

4.5 Description of disk and disk operations are done. 

4.6 Explanation of computer clock system is done.

4.7 Computer terminals are identified.

4.8 Virtual devices are defined. 

5. Identify concepts of file management 

5.1 Definition of file system management is done.

5.2 File system concepts are identified.

ELEMENT  

PERFORMANCE CRITERIA

(Bold and italicised terms are elaborated in the Range)

 

5.3 Objectives of file management are identified.

5.4 File access methods are identified.

5.5 Description of directory implementation is done

5.6 File allocation techniques are identified.

5.7 File protection and security are identified.

 

6. Identify Emerging trends in Operating system

6.1 Explanation of emerging trends is done.

6.2 Challenges of emerging trends are identified.

6.3 Ways of coping with emerging trends are identified.

 

Variable

Range

May include but is not limited to:

1. Concepts of operating system

q  Characteristics

q  Objectives

q  Kernel

q  System code

q  shell

2. Structures of operating system

q  Monolithic

q  Layered

q  Virtual

q  Client server model

3. Types of operating system

q  Real time 

q  Normal

q  Batch

q  Time sharing

4. Concurrency control

q  Inter-process communication

q  Synchronization

 

5. Memory management techniques

q  Partitions

q  Virtual

q  

6. Memory management

policies

q  Fetch

q  Placement

q  Replacement

q  cleaning

7. File access methods

q  Sequential

q  Random

q  Indexed sequential

RANGE

 

 

 

 

REQUIRED KNOWLEDGE AND UNDERSTANDING

The individual needs to demonstrate knowledge and understanding of: 

1.1

Types of operating systems

Roles of operating system

Objectives of memory management

Input/output devices software

Computer clock system

Objectives of file management

File allocation techniques

File access methods

Challenges of emerging trends in operating systems.

 

 

FOUNDATION SKILLS

The individual needs to demonstrate the following foundation skills:

      Communications (verbal and written);

      Proficient in ICT; 

      Time management;

      Analytical

      Problem solving;

      Planning; 

      Decision making; 

      Report writing; 

 

 

 

 

EVIDENCE GUIDE  

This provides advice on assessment and must be read in conjunction with the performance criteria, required knowledge and understanding and range.

 

Critical

Aspects of

Competency

Assessment requires evidence that the candidate:

1.               Defined operating system

2.               Identified Types of operating systems

3.               Explained structures of operating systems 4. Identified functions of operating systems 5. Installed operating system.

6.      Defined memory management

7.      Identified memory management and allocation techniques.

8.      Differentiated the input and output devices.

9.      Defined computer clock system.

10.  Explained the hardware concept of input/output device

11.  Identified file management objectives

12.  Identified file allocation techniques, access and protection methods.

13.  Identified emerging trends in operating system, challenges and how to cope with them.

 

 

Resource

Implications

The following resources must be provided:

Resources the same as that of workplace are advised to be applied Computers, Software, Data and People

Methods of Assessment

Competency may be assessed through:

1.      Oral test

2.      Observation 

3.      Practical demonstration 

 

Context of Assessment

Competency may be assessed individually in the actual workplace or through a simulated work place setting

Guidance information for assessment

Holistic assessment with other units relevant to the industry sector, workplace and job role is recommended.

 

1.1 Definition of Operating System

An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs. It acts as an intermediary between users and the computer hardware, facilitating the execution of applications.

1.2 Concepts of Operating System

Key concepts of an OS include:

       Processes: Instances of executing programs.

       Threads: Smaller units of process.

       Scheduling: Determining the order in which processes are executed.

       Memory Management: Handling of primary memory or RAM.

       File System: Managing files on storage devices.

       I/O Systems: Managing input and output operations.

       Security and Protection: Ensuring data integrity and access control.

1.3 Structures of Operating System

Operating system structures can be described in several ways:

       Monolithic: Single large kernel with all OS services.

       Microkernel: Minimal kernel with basic functions, other services run in user space.

       Modular: Core kernel with dynamically loadable modules.

       Layered: OS divided into layers, each built on top of lower layers.

       Hybrid: Combines aspects of monolithic and microkernel designs.

1.4 Types of Operating System

Common types of operating systems include:

       Batch Operating Systems: Execute jobs in batches without user interaction.

       Time-Sharing Systems: Multiple users can interact with the system simultaneously.

       Distributed Operating Systems: Manage a group of distinct computers to appear as a single system.

       Real-Time Systems: Provide immediate processing and response.

            Embedded Systems: Specialized OS for specific hardware.

 

 

 

1.5 Functions of Operating System

The primary functions of an OS include:

               Process Management: Creating, scheduling, and terminating processes.

               Memory Management: Allocating and deallocating memory space.

               File System Management: Managing files and directories.

               Device Management: Controlling and interfacing with hardware devices.

               Security and Access Control: Protecting data and resources. 

1.6 Concepts of Processing

Processing concepts involve:

               Process: A program in execution.

               Thread: The smallest unit of processing that can be scheduled.

               Context Switching: Saving and loading process states to switch execution.

               Multi-tasking: Running multiple processes concurrently.

               Multi-threading: Running multiple threads within a process.

1.7 Process States

Process states include:

       New: The process is being created.

       Ready: The process is waiting to be assigned to a processor.

       Running: The process is being executed.

       Waiting: The process is waiting for some event to occur.

       Terminated: The process has finished execution.

1.8 Definition of Concurrency Control and Types

Concurrency control ensures correct results for concurrent operations:

               Pessimistic Concurrency Control: Locks resources to prevent conflicts.

               Optimistic Concurrency Control: Assumes conflicts are rare and checks for conflicts before committing. 

1.9 Explanation of Process Scheduling and Types of Schedulers

Process scheduling determines the order in which processes are executed:

               Long-term Scheduler: Decides which processes are admitted to the system.

               Short-term Scheduler: Decides which process to execute next.

               Medium-term Scheduler: Swaps processes in and out of memory.

1.10 Definition of Deadlocks

A deadlock is a situation where a set of processes are blocked because each process is holding a resource and waiting for another resource held by another process.

1.11 Definition of Memory Management

Memory management is the process of controlling and coordinating computer memory, assigning blocks to various running programs to optimize overall system performance.

1.12 Objectives of Memory Management

Objectives include:

               Efficiency: Maximizing the use of memory.

               Relocation: Moving programs in memory to utilize space efficiently.

               Protection: Ensuring processes do not interfere with each other.

               Sharing: Allowing multiple processes to use the same memory space. 

1.13 Memory Management Techniques

Techniques include:

               Paging: Dividing memory into fixed-sized pages.

               Segmentation: Dividing memory into variable-sized segments.

               Virtual Memory: Using disk space to extend physical memory.

               Contiguous Allocation: Allocating consecutive memory blocks. 

1.14 Memory Management Policies

Policies include:

               First-Fit: Allocating the first sufficient memory block.

               Best-Fit: Allocating the smallest sufficient memory block.

               Worst-Fit: Allocating the largest available memory block.

1.15 Definition of Input and Output Devices

Input devices are peripherals used to provide data to a computer (e.g., keyboard, mouse). Output devices present data from a computer to the user (e.g., monitor, printer).

 

 

1.16 Objectives of Input/Output Device Management

Objectives include:

               Efficiency: Ensuring quick and efficient data transfer.

               Fairness: Ensuring equitable access to I/O resources.

               Device Independence: Abstracting hardware specifics from the user. 

1.17 Concepts of Input and Output Devices

Concepts involve:

               Device Controllers: Interface between the device and the computer.

               Drivers: Software that communicates with hardware devices.

               Buffers: Temporary storage for data during transfer.

1.18 Input/Output Devices Software

I/O device software includes:

               Device Drivers: Control specific hardware devices.

               Interrupt Handlers: Manage interrupts generated by I/O devices.

               Device-Independent I/O Software: Provides a uniform interface for device access.

1.19 Description of Disk and Disk Operations

Disks are storage devices that use magnetic or solid-state technology to store data. Operations include:

       Read/Write: Accessing and modifying data on the disk.

       Seek: Moving the read/write head to the correct location.

       Formatting: Preparing the disk for data storage.

1.20 Explanation of Computer Clock System

The computer clock system keeps track of time and synchronizes processes. It generates periodic interrupts that help the OS manage time slices for process execution.

1.21 Computer Terminals

Computer terminals are devices used for entering data into and displaying data from a computer, typically consisting of a keyboard and a display screen.

 

 

1.22 Virtual Devices

Virtual devices are software simulations of physical devices, allowing programs to interact with hardware without needing direct access to the hardware.

1.23 Definition of File System Management

File system management involves organizing, storing, retrieving, and managing data on storage devices, ensuring data integrity and access control.

1.24 File System Concepts

File system concepts include:

       Files: Units of data storage.

       Directories: Organizational units for files.

       Paths: Addressing files and directories.

File Descriptors: References to open files. 

1.25 OBJECTIVES OF FILE MANAGEMENT

Objectives include:

               Organization: Efficient data organization and retrieval.

               Access Control: Ensuring authorized access.

               Data Integrity: Maintaining data accuracy and consistency. 

1.26 File Access Methods

Access methods include:

               Sequential: Accessing files in a sequential order.

               Direct: Accessing files at specific locations. 

Indexed: Using an index to access files. 

1.27 Description of Directory Implementation

Directories can be implemented using:

               Single-level: One directory for all files.

               Two-level: Separate directories for each user.

               Tree-structured: Hierarchical organization.

               Acyclic-graph: Directories that can share subdirectories and files.

 


1.28 File Allocation Techniques

File allocation techniques include:

               Contiguous Allocation: Storing files in contiguous blocks.

               Linked Allocation: Linking blocks scattered across the disk.

               Indexed Allocation: Using an index block to manage file storage. 

1.29 File Protection and Security

File protection and security involve:

               Access Control Lists (ACLs): Defining permissions for users and groups.

               Encryption: Securing data from unauthorized access.

               Backups: Protecting data from loss.

1.30 Explanation of Emerging Trends

Emerging trends in operating systems include:

               Cloud Computing: Leveraging remote servers for computing power and storage.

               Virtualization: Running multiple virtual machines on a single physical machine.

               IoT: Operating systems for interconnected smart devices.

               Security Enhancements: Improving OS security against new threats.

  1.31 Challenges of Emerging Trends

Challenges include:

               Scalability: Managing increased loads and data.

               Security: Protecting against sophisticated threats.

               Interoperability: Ensuring compatibility between diverse systems.

               Resource Management: Efficiently managing resources in complex environments. 

1.32 Ways of Coping with Emerging Trends

Ways to cope include:

               Regular Updates: Keeping software up-to-date with the latest security patches.

               Training: Educating users and administrators about new technologies.

               Advanced Security Measures: Implementing multi-factor authentication and encryption.       Adopting Standards: Following industry standards for interoperability and security.

 

 of 11


Comments

Popular posts from this blog

ICT- MICROSOFT TOOLS

ICT CLASS - USAGE OF INTERNET SKILLS.