Sunday, 8 September 2013

 SCL 3: OPERATING SYSTEM AND FILE MANAGEMENT
List down all the operating system used in a desktop/laptop today and find good descriptions of how operating systems work? Hence, state their advantages and disadvantages.

How operating systems work?

The operating system acts as an interface between an application and the hardware. The user interacts with the hardware from "the other side". The operating system is a set of services which simplifies development of applications. Executing a program involves the creation of a process by the operating system. The kernel creates a process by assigning memory and other resources, establishing a priority for the process (in multi-tasking systems), loading program code into memory, and executing the program. The program then interacts with the user and/or other devices performing its intended function.




Operating System  Advantages and Disadvantages.

Disadvantages.
Operating System
Advantages
1. The first main disadvantage of the windows 7 is the hardware configuration. Windows 7 needs RAM capacity of at least 1 GB.
2.Windows 7 cannot be easily upgraded from windows XP. It has the drawbacks in upgrading the operating system in the easy manner.
3. Only the advanced users are convenient with the windows 7. New users find it difficult to use windows 7 and they switch back to windows XP itself.
3. Sometimes driver support is not providing for the old systems and the old version of motherboard. This disables some of the features in the windows 7.
Windows 7












1.Easy to use, especially for beginners
2. faster than Vista, and in most cases, faster than XP
3. has a lot of new and very nice features that aren't in other versions.
4. Sticky notes and the gadgets of the windows 7
5.Windows update feature for all the software and components.
1. Take some time to learn.
2. Fewer computer programs, games and utilities are available for Linux
3.There are still some manufacturers that do not offer hardware support for Linux OS, although there are fewer every year.
3. Some of the latest and greatest hardware that is being produced is not compatible with Linux
Linux






1. Most software can be obtained without cost for Linux.
2. Linux has the advantage of the code being in the public domain. This can be a double-edged sword; while you can look at the code, and developers can fix holes rapidly, it also means hackers can find bad code.
3. If you have used other operating systems, once you have made the switch to Linux, you will notice that Linux has an edge over Windows
1. Mac OS is difficult to theme (in Tiger, you can purchase Shape Shifter, in Leopard, you may use Magnifique
2. Mac OS is also more limited in preferences than Windows, but there are plenty of 3rd party applications to tweak the operating system, and there is the Terminal application that can also tweak other system settings.
3. MAC OS are more expensive generally than others.
4.Fewer computer programs and games are available for MAC
Mac OS





1. 1. High quality hardware: Macs may be expensive, but they're worth it. Macs are very tough and take a lot of abuse, also they last a long time if you treat them well. My mac is a Titanium PowerBook G4, and 7 years old. It's still working great! (except for the old outdated Mac OS [10.2.8] and lack of enough RAM)
2. Ease of use: Mac OS has always been a highly user friendly operating system.
3. Mac OS has been around longer than Windows, and has had a lot of improvements made to it
4. MAC is a much more secure OS, and rarely being attacked by viruses and malware



prepared by:
hafizd and aziz

SCL 2 : Computer Software (Question 2)

Type of Malware Function How can it be repaired or removed

Spyware

Spyware monitors your movements on the Internet, sending information back to a central computer that then targets you with advertising.
  1. Download and install a free removal tool such as Lavasoft Ad Aware, Spybot Search & Destroy (S&D). 
  2. Run the tool to scan your computer for spyware and other unwanted software.
  3. Review the files discovered by the tool for spyware and other unwanted software. 
  4. Select suspicious files for removal by       following the instructions the software       provides.

Trojan

The Trojan program is a malware that masquerades as a legitimate program. The program may have a legitimate function, but it carries ulterior motives. Trojans can delete data, compromise security, relay spam, and otherwise infect your computer.
  1. Recognize the Trojan so that it is easier to remove them.
  2. Stop the function of system restore so that it will not restore the file you deleted.
  3. Restart you computer using F8 and select safe mode.
  4. Go to Add or Remove Programs to remove the programmes affected by Trojan horse.
  5. Remove extensions in order to delete all files of a programme from Widows system folder.

Virus

A computer virus infects your computer, taking control over some or all of its functions. The virus destroys data or looks for things like passwords, credit card numbers, or other sensitive data.

If you update your computer and use free antivirus software such as Microsoft Security Essential, you can help permanently remove unwanted software and prevent installation in the first place.

Worm

A worm is a virus that replicates itself over a network that arrive via email. Worms are used to deliver viruses, or the worm itself might be a virus, because the terms are interchangeable.

If you think you have a computer worm, use one or both of these tools to scan your computer and help get rid of it. The tools are Microsoft Safety Scanner and Microsoft Software Removal Tool.


comparison operating system of smartphone between android and window 8

Android

Comparison
Windows 8

Open screen
600,000+
Apps
100,000+

Linux
Core
Windows NT
open source software
Mobile option
only few manufacturers with limited handsets.

Android boasts detailed notifications, including music controls, toggles, etc
Notification centre
Windows Phone 8 mobile operating system does not provide a central notification centre, which means users can only access controls from the home screen through live tiles.
has a provision to protect devices when stolen has no feature to protect stolen phones.

Password Protect Reset
has no feature to protect stolen phones.

has unlock by swiping to the right and also other applications can be opened by swiping left
Lock screen
can play different apps at the background, numeric password and notification of different apps