Free Essay

Comparison of Some Os Booting

In:

Submitted By special
Words 2846
Pages 12
International Journal of Research in Computer and Communication Technology, Vol 2, Issue 11, November- 2013

ISSN (Online) 2278- 5841 ISSN (Print) 2320- 5156

Windows, Linux and Mac Operating system Booting Process: a Comparative Study
Prof. Amar Rajendra Mudiraj Assistant Professor MIT (E), Aurangabad,Maharashtra, India. Email:amarmudiraj@gmail.com

Abstract This paper presents a comparative study of Booting Paradigm of Windows, Linux and Mac, the three popular operating systems. Booting process is the essential and first step perform by the OS after this process execution all other processes can get the chance to execute , so we may say that booting is the first process because of which all other OS processes can execute. This experimental study gives an overview on the similarity and difference in Booting Process. As every operating system have to initially do the booting and as every OS providing different feature of each others, the paper is highlighting those micro and essential similarities and differences having by the operating systems during the Booting Process. Keywords: Booting, Cold booting, Worm booting, Linux Booting, Windows Booting, Mac Booting.

In Worm Booting the computer get restart without shutdown the system, in which the system application and memory just get cleared and then reloading the operating system in primary memory. With the above two booting types we also have some other flavor in the computer booting like Sleep, Hibernate.
Power - ON

Load Instruction from ROM

Detect OS from HDD

1. Introduction

Find Attached H/W

Booting Process is the first step gets happened in the computer system when you switch on the computer. In computing, booting is the initial set of operations that a computer system performs when electrical power to the CPU is switched on. The process begins when a computer is turned on for the first time or is re-energized after being turned off, and ends when the computer is ready to perform its normal operations. Booting includes four main steps in computer including power On and secondly it load the initial instructions from the ROM memory next it detect the operating system in the Hard-disk and finding other hardware attached to computer Finally it start the certain essential computer application as per the default setting done by the operating system or by the computer user The most general types of computer booting are Cold Booting and Warm Booting , The Cold Booting is the booting when the computer since to be off over a period of time. In which all the primary memory and internal setting completely cleared. www.ijrcct.org

Start Initial Computer Application

2. Operating system overview:

Figure 1: Computer Booting Steps

Operating system is the program which operates all other program in the computer system. Whenever we want to interact with the computers we must have an operating system on it. The operating system was developed for the better computer usage and providing better platform to the users application. According to the betterment and demands of the user the operating systems are get grow right from simple operating system like Command oriented (DOS), and Some GUI based Operating system Like Windows , Linux, Mac. The mention operating system are also create the differences according to their features like Number of user can work on the operating system at a simultaneously Page 1123

1124

(Single-user or Multi-user, Multi-processing, programming, Network, Distributed, Real Time)

Multi-

2.1 Windows
The most popular operating system now a day in all over the world. The operating system comes in very different format like single user, multi-user, network operating system etc. Windows was developed by Microsoft Corporation in 1980s. The first GUI operating system developed by Microsoft was Windows 3.0 in 1989. The organization also developed on command based and most popular operating system named as MS-DOS (MicrosoftDisk Operating System) in 1981. Windows XP was the most popular and widely using operating system till date, because of user-friendliness and easy to operate the operating system still use by most of the people in the word. The latest version of Windows in market is Windows 8 launched commercially in Oct 2012.

Which stored on first sector of the hard disk from where the operating system start it’s loading in Primary memory. It also provide the Booting partition information Step 03: Now the BIOS knows the MBR and Booting Partition where the operating system loads the small system software called KERNEL into main memory. Finding NTLDR (NT Loader) who will load the partitions in the computer system and try to identifying other partition other than primary partitions. In same step boot.inf file check the partitions for other Operating system existence, where the user will select the operating system loading into memory Step 04: Other important booting support file line win.sys, NTOSKERNEL.exe, HAL.DLL, system.ini, win.ini, sysedit.exe, config.exe, autoexec.BAT, MSCONFIG.exe these file are help in different system software installation for which the application oriented environment has to get implemented and Microsoft Corporation developed some standard configuration done while booting the system.

2.1.1 Booting in Windows
The booting process in windows is very easy just like its user friendly features. There are four basic steps are there in Windows operating system while booting. The first process starting when you turn on your computer is BIOS i.e., Basic Input Output System.

2.2 Linux
Linux is free open source operating system allowing the free distribution and licensed by GNU (General Public license. Any developer can try to modify the system codes as long as he/she will not going to sale the code. Linux is the first multitasking and platform portable operating system. The main benefit of the Linux operating system is its free to use and its open source operating system which make it user level modifying operating system which make more user oriented than windows operating system. The Linux also provide the inbuilt utilities like system drivers, antivirus, reliability feature which make them more nonstop works on the client server environment without having reboot of the system. Now days the Linux operating system used as one of the most secure and anti threats operating system which is the one of the best protection mechanism providing operating system.

Figure 2:- windows booting Steps Step 01: In First step POST stands for Power On SelfTest, which is initially inventory step and very critical step, where hardware configuration and detection has been perform, by looking and listen the errors and diagnosis reports e.g. Error codes, beeps codes, numeric codes Step 02: Now BIOS will look for the Booting Priority, like from where the computer will get the operating system e.g. from hard-disk, floppy disk, or network. This record in booting process is called MBR (Master Boot Record). www.ijrcct.org

2.2.1 Booting in Linux
The booting process in Linux is quite different than windows except the BIOS and MBR features. There are four basic steps in Linux operating system while booting. The first process starting when you turn on your computer is BIOS i.e., Basic Input Output System.

Page 1124

1125

Step04: Other important booting support file like /sbin//init, /etc/inittb, /etc/rc.local, /runlevel These file are help in different system software installation for which the application oriented environment has to get implemented, which help to create the GUI or Console base environment for the user to use the operating system.

2.3 Mac
Mac operating system was developed by the apple in 1984 by the Apple Inc. The Apple Inc. Produce proprietary hardware and software for better integration of the OS and the hardware s increase the fastest and smoothest way to handle and use of operating system by the end-users. Macintosh computers used the Motorola PowerPC Chip set with an advanced architecture enhanced for graphics and multimedia interface and usability. Since 2005 the Apple Mac line of computers are Intel-based, but the Mac OS is only licensed to run on an Apple Mac which is the first multitasking operating system. The preferred file system for Mac OS X is HFS, HFS+, a robust file system that includes support for file permissions, but it also supports other file systems. Macintosh OSs was strictly GUI environments, with no command-line option. Mac OS X, with its UNIX origins, gives you the option of a character-based interface Apple Computers is the only manufacturer of Macintosh computers. Mac Operating system is Hardware oriented which has its own keyboard and mouse where mouse is only has one button as left and right click button like normal mouse use in other operating system. As compare to the other operating systems the MAC operating system is expensive because it’s not only OS but also it’s an entire (Specific) system expected to purchase by the consumer to run the MAC operating system. Mac OS X Tiger 10.4, the newest version of the operating system apple released in the year 2006 and then apple introduced the latest version of OS X version of Mac was Snow Leopard (10.6) in the year 2010.

Figure 3 :- Linux Booting Steps Step01: In First step POST stands for Power On Self-Test, which is initially inventory step and very critical step, where hardware configuration and detection has been perform, by looking and listen the errors and diagnosis reports e.g. Error codes, beeps codes, numeric codes. Will take care of identifying the Master boot record for the initializing the booting process. Step02: Now BIOS will look for the Booting Priority, like from where the computer will get the operating system e.g. from hard-disk, floppy disk, or network. This record in booting process is called MBR (Master Boot Record). Which stored on first sector of the hard disk from where the operating system start it’s loading in Primary memory. Some time it may stores in some ware else like floppy, bootable Compact disk (CD), or flash drive. It also provide the Booting partition information from where the operating system starts its loading on the computer. Step03: after getting the idea about the primary partition the first bootstrap loader load into the memory is GRUB (Grand Unified Boot Loader) or LiLo (Linux Loader) which try to load the operating system feature form the supporting resources the initial loading file is initrd (Initial RAM-DISK) which take care to create the ramdisk initialization for the keep ready the RAM disk for the loading the operating system from the sources. one of the most important function of the GRUB is load the Kernel into the memory during the booting by loading LinuxRC which stands for Linux Run Command for initializing the basic hardware for necessary during the booting process during this configuration nest phase is un-mount the initrd un-mounting so that the basic information is stored in the RamDisk and now the real disk can be use by the operating system for further. The finally the Grub complete is part by initializing the file system mounting though INIT root directory by mounting the initial file system for further activity of loading other supporting file of Linux operating system . www.ijrcct.org

2.3.1 Booting in Mac
One of the most unique feature of the Mac operating system booting process is it does not support the BIOS instead of having the BIOS it support the firmware utility call BootROM When the power to a Macintosh computer is turned on, the BootROM firmware is activated. BootROM (which is part of the computer’s hardware) has two primary responsibilities: it initializes system hardware and it selects an operating system to run.

Page 1125

1126

Figure 4: Mac Booting Steps Step01: BootROM work on two function for Mac system to help it carry out the boot process : First is POST (Power-On Self Test), where it initializes hardware interfaces and verifies the sufficient availability of the memory and EFI which verifying the basic hardware initialization and selects which operating system suppose to use. If there are multiple installations of OS X are available, BootROM check the previous booting process and choose the one that was last selected by the Startup Disk System Preference process. The user can override this choice while the computer boots, which causes EFI to display a screen for choosing the boot volume. Step02: Once BootROM is finished and an OS X partition has been selected, control passes to the boot.efi boot loader. The fundamental job of the boot loader is load the kernel into the memory. If full-disk encryption is enabled, the boot loader is responsible for drawing the login UI and prompting for the user’s password, which needed to access the encrypted disk to boot from it. The boot loader can be found in the /System/Library/CoreServices directory on the root partition, in a file named boot.efi. Step03: Once the kernel and all drivers necessary for booting are loaded, the boot loader starts the kernel’s initialization procedure. At this point, enough drivers are loaded for the kernel to find the root device. The kernel initializes the Mach and BSD data structures and then initializes the I/O Kit. The I/O Kit links the loaded drivers into the kernel, using the device tree to determine which drivers to link As used here, the term “root” refers to mounting a partition as the root, or toplevel, file system. Boot≠Root is a technology that allows the system to boot from a partition other than the root partition. Boot≠Root uses a helper partition to store the files needed to boot, such as the kernel cache. www.ijrcct.org

Step04: now the mandatory file are get loaded during the booting process now the turn on for the supporting and the system software who also have equal importance in the operating system for make operating system workable like the mach_init and init processes have been replaced by "launchd" . "launchd" is now the root system process. "launchd" then also replace and handle Various system script including /etc/rc, Run starts up items, Prepare the system for the user, Coordinate the launching of system daemons in an orderly manner. "launchd" frees up memory and other resources associated with the daemon. "launchd" starts SystemStarter, "loginwindow" is a program that controls several aspects of user sessions and coordinates the display of the login window and the authentication users.

3. Comparative chart of Windows, Linux and Mac Booting Process
OS Features

Windows

Linux

Mac

BIOS POST Boot Loader Kernel Supporting Files

Yes Yes NLTDR NTOSKERNEL win.sys, HAL.DLL, system.ini,sysedi t.exe,config.exe, autoexec.BAT, MSCONFIG.exe

Yes Yes GRUB or LiLo INIT , initrd /sbin//init, /etc/inittb /etc/rc.local , /runlevel

No Yes BootX or boot.efi mach_init , launchd mkextcache, launchd, loginwindow , /System/Libra ry/CoreServic es

Table 1 :- Comparative Chart of Booting Features of Different Operating System

4. Future Scope
This experiment also give the motivation to the comparative study of other operating systems like android, Solaris, server operating system where advance features of the operating system also include the new and advance Page 1126

1127

steps in the booting process than the existing step which this experiment covered.

5. Conclusion
In the paper we compare the booting aspects with respect to the different operating system scenario such as windows, Linux and Mac operating system. The experiments give the idea about the booting process difference and similarities in these operating system. The experiment give the conclusion that every Operating system (Considered in this research paper) has same POST step common and first step the operating system must processed during the booting process. This experiment also shows the Mac is the only operating system which does not support any BIOS kind mechanism while booting, it has its own mechanism such as BootROM where it has its operating system boot loader called BootX or Boot.efi . This experiment also gives the idea about the different boot loader and kernel used by the operating system during the booting process of individual. References [01]. Silberschatz, A., P.B. Galvin and G. Gagne; Operating Systems Concepts.7th Edn. ; John Wiley and Sons, (2004) [02]. Stallings W.: Operating Systems Internals and Design Principles; 5thedn. Prentice Hall, (2004). [03]. Andrew S. Tanenbaum; Modern Operating System ; 3rd Edn. PHI Learning Private Limited (2012). [04]. Dhananjay M. Dhamdhere; Operating System A Concept- Based Approach; 3rd Edn. ; TMH Edn. (2012). [05]. Richard Petersen; The Complete Reference RedHat Linux; 6.2 Version; TMH Edn (2001). [06]. Robin Williams; The Robin Williams Mac OS X Book Jaguar Edition. [07]. Darby Tober;”Introduction to Macs for PC Users”; University of Texas at Austin (2005). [08]. Joe Cabrera; “Linux vs. Windows: A comparative study “Technical Writing – N4 Spring 2009. [09].http://www.csus.edu/trainning/handouts/workshop/Ma c_OS_Xhandout.pdf. [10].http://en.wikipedia.org/wiki/Comparison_of_boot_loa ders. [11]. Apple: http://www.apple.com/macosx. [12]. MacWorld: http://www.macworld.com. [13]. http://en.wikipedia.org/wiki/Linux_startup_process. [14]..http://zalloc.blogspot.in/2010/08/mac-os-x-bootprocess.html.

www.ijrcct.org

Page 1127

Similar Documents

Premium Essay

Unit 3 P1 Research Paper

...With this platform you can solve a lot of problems almost automatically. To access the troubleshooter in Windows 7, go to the control panel and then change the “view by” to either large or small icons then scroll down to find troubleshooting, or simply type troubleshooting in the search bar in the start menu. After you have open the appropriate troubleshooter, just follows the instructions on the screen to solve the problem. Comparing operating system – Mac OS X vs Windows (M1) How much does it cost? Mac OS X tends to be more expensive compared to windows, this is because apple has less users compared to the amount of people who uses computers with a version of the windows operating installed. Neither of the two operating systems are free. Does the operating system let you customize the layout? Both windows and mac operating systems allow the user to customize the layout of their computers, however this is much easier to do on windows compared to mac. Also many mac users choose not to customize the layout as apple makes the operating system look very professional. How secure is the operating...

Words: 2372 - Pages: 10

Free Essay

Study Guide Computer Chapter 1,2 3 & 4

...CSC-105 NE Spring 2016 Study Guide – Chapters 1, 2, 3 & 4 &Videos Chapter 1: Introduction to Information Technology: The Future Now 1. Robots – automatics devices that perform functions ordinarily performed by human beings 2. Online learning (Distance learning) - is designed to provide students with additional learning opportunities & instructors with additional teaching tools (e-learning) 3. Telemedicine, Campus Cruiser (portals) – medical care via telecommunications - 4. Computer / IT uses 5. Cyberspace – encompasses not only the online world & the Internet in particular but also the whole wired & wireless world of communications in general 6. Internet – is a worldwide computer network that connects hundreds of thousands of smaller networks/ World wide web – often called the web – an interconnected system of internet computers (servers) that support specially formatted documents in multimedia form 7. Multimedia files – technology that presents information in more than one medium, such as texts, still images, moving images & sound. 8. Networks A. Client – are linked by a wired or wireless network. The entire network is called client server network / Server Networks – is a central computer that holds collections of data (databases) & programs for connecting or supplying services to PC’s workstations & other devices which are called clients B. Peer to Peer Network 9. Hardware - consists of all the machinery & equipment in a computer system (Keyboard, screen)/ Software – (programs)...

Words: 1784 - Pages: 8

Premium Essay

Opertaing System

...What is an operating system? An operating system (sometimes abbreviated as "OS") is the program that, after being initially loaded into the computer by a boot program, manages all the other programs in a computer. The other programs are called applications or application programs. The application programs make use of the operating system by making requests for services through a defined application program interface (API). In addition, users can interact directly with the operating system through a user interface such as a command language or a graphical user interface (GUI ). An operating system performs these services for applications: In a multitasking operating system where multiple programs can be running at the same time, the operating system determines which applications should run in what order and how much time should be allowed for each application before giving another application a turn. It manages the sharing of internal memory among multiple applications. It handles input and output to and from attached hardware devices, such as hard disks, printers, and dial-up ports. It sends messages to each application or interactive user (or to a system operator) about the status of operation and any errors that may have occurred. It can offload the management of what are called batch jobs (for example, printing) so that the initiating application is freed from this work. On computers that can provide parallel processing, an operating system can manage how...

Words: 2126 - Pages: 9

Free Essay

Laptop Level-1

...An ISO 9001:2008 Certified Company LAPTOP Level-1 SERVICE TRAINING - COURSE SYLLABUS Day1 INTRODUCTION 1. What is laptop? 2. History of laptop 3. How work laptop? 4. Advantages of laptop instead of desktop 1. CARD LEVEL SERVICE [Hard Ware] 2. CHIP LEVEL SERVICE [Motherboard] 5. Difference between laptop and desktop LAPTOP MANUFACTURING COMPANIES-Acer /Apple /Compaq /Dell -etc. 6. How to buy a laptop? 7. Operating System review &laptop uses & laptop booting process 8. Guide to purchase of second hand laptop Day2 TOOLS AND TESTING EQUIPMENTS 1. LAPTOP HARDWARE TOOLS  Screw Driver Kit  Laptop Casing Opener  Nose Pliers  Cutter  Electric Screw Driver  Tweezer  Anti Static Wrist Band  PCB Cleaning Brush & etc 2. LAPTOP CHIP LEVEL TOOLS  Micro Soldering Iron  Tip Soldering Iron  Hot Air Blower  Magnifying Lenz with Lamp  Liquid Flux  Dry Flux & etc 3. TESTING EQUIPMENT  1.Anolog Mutimeter  Digittal Mutimeter  Battery Booster  Universal AC adapter  Debug card  SATA to USB convertor  IDE to USB convertor 4. OTHER HARDWARE SPARES  External Monitor  External DVD Drive  Usb Keyboard / Mouse&etc Day3 Day4 Day5 Day6 Day7 Day8 5. ACCESSORIES  Laptop bag  LCD Screen Card  LCD Cleaner & etc 6. ADVANCED TOOLS  BGA Rework Machine  Reballing Kits  Infrared IC Heater  PCB Scanner  Oscilloscope [CRO]  SMD IC Extractor  PTH Desoldering Machine  RCL Meter SMT ELECTRONICS INTRODUCTION RESISTOR CAPACITOR INDUCTOR & TRANSFOEMER LAPTOP PARTS VIEW & KEYBOARD & TOUCH...

Words: 2886 - Pages: 12

Premium Essay

Introduction of Computer

...UNIT 1 A Introduction to computers Unit 1 WUC 117/03 Introduction to Computing and Internet Introduction to Computers B WAWASAN OPEN UNIVERSITY WUC 117/03 Introduction to Computing and Internet COURSE TEAM Course Team Coordinator: Mr. Kevin Tan Pooi Soo Content Writer: Ms. Parasathy Daivasigamani Instructional Designer: Ms. Jeanne Chow Academic Members: Mr. Chandarasageran a/l Natarajan and Mr. Ishan Sudeera Abeywardena COURSE COORDINATOR Mr. Kevin Tan Pooi Soo EXTERNAL COURSE ASSESSOR Associate Professor Norhaziah Md Salleh PRODUCTION Editor: Mr. Terence Too Yang-Yau In-house Editor: Ms. Jeanne Chow Graphic Designers: Ms. Patsy Yap and Ms. Leong Yin Ling Wawasan Open University is Malaysia’s first private not-for-profit tertiary institution dedicated to adult learners. It is funded by the Wawasan Education Foundation, a tax-exempt entity established by the Malaysian People’s Movement Party (Gerakan) and supported by the Yeap Chor Ee Charitable and Endowment Trusts, other charities, corporations and members of the public. The course material development of the university is funded by Yeap Chor Ee Charitable and Endowment Trusts. © 2008 Wawasan Open University First revision S1 2011 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior written permission from WOU. Wawasan Open...

Words: 26839 - Pages: 108

Premium Essay

Notes

...COMPUTER EDUCATION YEAR 11 2014 Technology and Employment Skills Training Ministry of Education, Fiji. 28th November 2013 Year 11 Computer Education 1 Preface This text book has been written to cater for the new Year 11 Computer Education syllabus trialed in Fiji secondary school for the year 2014. It is a new text book and the first of its kind to be written locally. It is hoped that this book will be useful in implementing the syllabus but it should be understood that it is not the syllabus. The syllabus is the framework for the teacher to follow while this text book is a resource for the student. Therefore departure to other resource materials for more information will be acceptable. The text book is not the perfect piece of work as it has been prepared in a very short time, therefore suggestions for amendments will be welcomed. It is anticipated that this book will minimize the amount of time for teachers in lesson preparation and more time will be devoted to actual classroom teaching and learning. There may be a variety of opinion about the content of the topics, but for the beginner it is the best which gives the time and opportunity to become familiar with the basics before pursuing further into the field of study in greater detail at the upper secondary level Ministry of Education, Suva. Fiji Islands 28th November 2013. Year 11 Computer Education 2 Acknowledgement This textbook for year 11 Computer Education has been produced by the Computer...

Words: 20027 - Pages: 81

Premium Essay

Computer

...Computer A computer is a programmable machine that receives input, stores and manipulates data, and provides output in a useful format. A computer can process data, pictures, sound and graphics. They can solve highly complicated problems quickly and accurately. Block Diagram Input Unit: Computers need to receive data and instruction in order to solve any problem. Therefore we need to input the data and instructions into the computers. The input unit consists of one or more input devices. Keyboard is the one of the most commonly used input device. Other commonly used input devices are the mouse, floppy disk drive, magnetic tape, etc. All the input devices perform the following functions.  Accept the data and instructions from the outside world.  Convert it to a form that the computer can understand.  Supply the converted data to the computer system for further processing. Storage Unit: The storage unit of the computer holds data and instructions that are entered through the input unit, before they are processed. It preserves the intermediate and final results before these are sent to the output devices. It also saves the data for the later use. Memory Size: All digital computers use the binary system, i.e. 0’s and 1’s. Each character or a number is represented by an 8 bit code. The set of 8 bits is called a byte. A character occupies 1 byte space. A numeric occupies 2 byte space. Byte is the space occupied in the memory. The size of the primary storage...

Words: 9444 - Pages: 38

Free Essay

Fsfdfdfd

...Oracle VM VirtualBox R User Manual Version 5.0.0 c 2004-2015 Oracle Corporation http://www.virtualbox.org Contents 1 First steps 1.1 Why is virtualization useful? . . . . . . . . . . . . . . . 1.2 Some terminology . . . . . . . . . . . . . . . . . . . . . 1.3 Features overview . . . . . . . . . . . . . . . . . . . . . 1.4 Supported host operating systems . . . . . . . . . . . . 1.5 Installing VirtualBox and extension packs . . . . . . . . 1.6 Starting VirtualBox . . . . . . . . . . . . . . . . . . . . 1.7 Creating your first virtual machine . . . . . . . . . . . 1.8 Running your virtual machine . . . . . . . . . . . . . . 1.8.1 Starting a new VM for the first time . . . . . . 1.8.2 Capturing and releasing keyboard and mouse 1.8.3 Typing special characters . . . . . . . . . . . . 1.8.4 Changing removable media . . . . . . . . . . . 1.8.5 Resizing the machine’s window . . . . . . . . 1.8.6 Saving the state of the machine . . . . . . . . 1.9 Using VM groups . . . . . . . . . . . . . . . . . . . . . 1.10 Snapshots . . . . . . . . . . . . . . . . . . . . . . . . . 1.10.1 Taking, restoring and deleting snapshots . . . 1.10.2 Snapshot contents . . . . . . . . . . . . . . . . 1.11 Virtual machine configuration . . . . . . . . . . . . . . 1.12 Removing virtual machines . . . . . . . . . . . . . . . . 1.13 Cloning virtual machines . . . . . . . . . . . . . . . . . 1.14 Importing and exporting virtual machines . . . . . . . 1.15 Global Settings . . . . . . . . . . . . . . . . . . . . . ....

Words: 143714 - Pages: 575

Free Essay

Examination

...COMPUTER CAPSULE Dear Readers, We are presenting you the Computer Capsule. As per our commitments towards the needs of every student, this capsule contains all the important facts and details that can be asked in the Upcoming Exams IBPS Exams. We are starting this with the introduction of the Syllabus. Let us begin now : Syllabus of The Computer Section 1. Fundamentals of the Computer : i) Hardware and Software ii) Memory and Memory Units iii) Number System 2. Internet 3. Microsoft Office (MS-Office) 4. Networking 5. DBMS (Database Management System) 6. Programming Languages 7. Full Forms/Abbreviations and Important Terms 8. Shortcut Keys 9. Miscellaneous (Latest in Computers and Mobile Technology) Distribution Of Marks In IBPS Exams 1. Fundamentals 2. MS-Office 3. 4. Full Forms/Abbreviations Important Terms 5. Shortcut Keys 6. Internet 7. Networking 8. DBMS 9. Programming Languages Miscellaneous 10. www.bankersadda.com | www.careerpower.in 16-17 Marks 3-4 Marks | www.sscadda.com Page 1 COMPUTER FUNDAMENTALS  A Computer is a general purpose device that can be programmed to carry out a set of arithmetic or logical operations automatically. Since a sequence of operations can be readily changed, the computer can solve more than one kind of problem.  A general purpose computer has four main components: the arithmetic logic unit (ALU), the control unit, the memory, and the...

Words: 11667 - Pages: 47

Premium Essay

Itsc

...Learning Objectives After completing this chapter, you will be able to: 1. Define operating system. 2. Define enhancements. 3. Explain the function and purpose of OS version numbers. 4. List some of the types of system configurations. 5. Explain the need and procedure for booting the system. 6. Explain the function of disk files. 7. Explain the function of and rules for file specifications. 8. List and explain the importance of the two types of computer files. 9. Describe the function and purpose of commands. 10. Compare and contrast internal and external commands. 11. Explain the function and purpose of the DIR, VER, and CLS commands. 12. Explain the purpose of and the procedure for using the DATE and TIME commands. 13. Explain the legal and ethical ramifications of copying disks that were not purchased. 14. Explain the purpose and function of the DISKCOPY command. 15. Explain the necessary steps to end a work session. Student Outcomes 1. Identify your system configuration. 2. Boot the system. 3. Use the DIR command to display the files on the screen. 4. Use the VER command to determine which version of Windows is being used. 5. Use the CLS command to clear the screen. 6. Use the DATE and TIME commands to set or change the date and time on the computer. 7. Make a copy of a disk. 8. End a computer work session. Chapter Overview Most people who use computers are really interested in application software. They want programs that are easy to use and that help them solve specific...

Words: 73166 - Pages: 293

Free Essay

Spyware

...consent, or that asserts control over a computer without the consumer's knowledge.[1] "Spyware" is mostly classified into four types: system monitors, trojans, adware, and tracking cookies.[2] Spyware is mostly used for the purposes of tracking and storing Internet users' movements on the Web and serving up pop-up ads to Internet users. Whenever spyware is used for malicious purposes, its presence is typically hidden from the user and can be difficult to detect. Some spyware, such askeyloggers, may be installed by the owner of a shared, corporate, or public computer intentionally in order to monitor users. While the term spyware suggests software that monitors a user's computing, the functions of spyware can extend beyond simple monitoring. Spyware can collect almost any type of data, including personal information like Internet surfing habits, user logins, and bank or credit account information. Spyware can also interfere with user control of a computer by installing additional software or redirecting Web browsers. Some spyware can change computer settings, which can result in slow Internet connection speeds, un-authorized changes in browser settings, or changes to software settings. Sometimes, spyware is included along with genuine software, and may come from a malicious website. In response to the emergence of spyware, a small industry has sprung up dealing in anti-spyware software. Running anti-spyware software has become a widely recognized element of computer security practices...

Words: 5182 - Pages: 21

Premium Essay

Computer

...This page intentionally left blank Copyright © 2008, New Age International (P) Ltd., Publishers Published by New Age International (P) Ltd., Publishers All rights reserved. No part of this ebook may be reproduced in any form, by photostat, microfilm, xerography, or any other means, or incorporated into any information retrieval system, electronic or mechanical, without the written permission of the publisher. All inquiries should be emailed to rights@newagepublishers.com ISBN (13) : 978-81-224-2631-1 PUBLISHING FOR ONE WORLD NEW AGE INTERNATIONAL (P) LIMITED, PUBLISHERS 4835/24, Ansari Road, Daryaganj, New Delhi - 110002 Visit us at www.newagepublishers.com This page intentionally left blank Table Of Contents PART I (Computer Application Theory) 1 Introduction To Computer .........................................................1 History Of Computer .................................................................................................. 1 Generations Of Computer ........................................................................................... 7 First Generation Computers........................................................................... 7 Second Generation Computers ...................................................................... 7 Third Generation Computers ......................................................................... 8 Fourth Generation Computers .......................................................

Words: 60713 - Pages: 243

Premium Essay

Policy Planning

...Master Your Mac simple ways to tweak, customize, and secure os x MAT T CONE Master Your Mac Master Your Mac Simple Ways to Tweak, Customize, and Secure OS X MAT T CONE MASTER YOUR MAC. Copyright © 2013 by Matt Cone. All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. First printing 16 15 14 13 12 123456789 ISBN-10: 1-59327-406-8 ISBN-13: 978-1-59327-406-1 Publisher: William Pollock Production Editor: Serena Yang Cover Design: Serena Yang Cover Photo: Kazuya Minami Interior Design: Octopod Studios Developmental Editor: Tyler Ortman Technical Reviewer: Wayne Linder Copyeditor: Paula L. Fleming Compositor: Serena Yang Proofreader: Ward Webber Indexer: Nancy Guenther For information on book distributors or translations, please contact No Starch Press, Inc. directly: No Starch Press, Inc. 38 Ringold Street, San Francisco, CA 94103 phone: 415.863.9900; fax: 415.863.9950; info@nostarch.com; http://www.nostarch.com/ Library of Congress Cataloging-in-Publication Data A catalog record of this book is available from the Library of Congress. No Starch Press and the No Starch Press logo are registered trademarks of No Starch Press, Inc. My New is a trademark of No Starch Press, Inc. Other product and company names mentioned herein...

Words: 82954 - Pages: 332

Premium Essay

Intro to Linux

...A Practical Guide to Linux Commands, Editors, and Shell Programming SECOND EDITION ® Mark G. Sobell Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact: U.S. Corporate and Government Sales (800) 382-3419 corpsales@pearsontechgroup.com For sales outside the United States, please contact: International Sales international@pearson.com Visit us on the Web: informit.com/ph Library of Congress Cataloging-in-Publication...

Words: 228961 - Pages: 916

Free Essay

Test

...HP 3PAR StoreServ Storage Concepts Guide HP 3PAR OS 3.1.2 MU2 Abstract This guide is for all levels of system and storage administrators who plan storage policies, configure storage resources, or monitor the storage usage of HP 3PAR storage systems. HP Part Number: QR482-96384 Published: June 2013 © Copyright 2007, 2013 Hewlett-Packard Development Company, L.P. Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.21 and 12.212, Commercial 1 Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. Acknowledgements Microsoft® and Windows® are U.S. registered trademarks of Microsoft Corporation. Oracle is a registered trademarks of Oracle and/or its affiliates. UNIX® is a registered trademark of The Open Group. Warranty To obtain a copy of the warranty for this product, see the warranty information website: http://www.hp.com/go/storagewarranty Contents 1 Overview..............................................................

Words: 36581 - Pages: 147