Page 49 - IT_V1.0_Class10
P. 49

  Unix: A family of multitasking, multiuser computer operating systems that are known for their stability,
                   security, and networking capabilities. They are widely used in servers, mainframes, and high-performance
                   computing environments due to their robustness and scalability. It is a portable operating system.
                   Linux: A family of open-source Unix-like operating systems based on the Linux kernel. Popular
                   distributions (distros) include Ubuntu, Debian, Fedora, Slackware, BOSS, Linux Mint, SUSE and CentOS,
                   among others. Linux is highly customisable, supports a wide range of hardware architectures, and is
                   renowned for its security, stability, and scalability. It is widely used in servers, embedded systems, and as
                   a desktop OS.
                   Android: Developed by Google, primarily for touchscreen mobile devices such as smartphones and
                   tablets. Android is based on the Linux kernel and is open-source. It is highly customisable, supports a
                   vast array of apps through the Google Play Store, and integrates deeply with Google services like Gmail,
                   Maps, and Drive. Android 15 is the latest version of Android OS.

                 Functions of an Operating System
                 The operating system performs the following functions in a device:

                   Device Management: OS directly controls the operation of the input-output devices, like controlling the
                   action of the printer, or the CD-ROM drive.

                   Process Management: OS handles the scheduling and synchronisation of processing, suspension and
                   resumption of processes. OS independently prioritises jobs for processing inside a computer.

                   Memory Management: OS co-ordinates and controls the use of memory in a computer.
                   Security Management: OS protects information and resources against destruction and unauthorised
                   usage.
                   File Management: Helps organise, find, and protect files on the computer.
                   User Interface: Provides a way for users to interact with the computer and its programs easily.


                   STARTING A COMPUTER

                 When you start your day, you likely follow a routine, like brushing your teeth and getting ready before
                 you begin working. Similarly, a computer also follows a series of steps before it’s ready for use. To start a
                 computer, simply press the power button on the CPU. This will turn on the operating system and display
                 the main screen or desktop. The computer goes through some initial processes to prepare itself to accept
                 commands and perform tasks.

                   BASIC FUNCTIONS PERFORMED WHEN A COMPUTER STARTS

                 As soon as we switch on the power button, a computer automatically runs a basic program called Basic
                 Input/Output  System  (BIOS).  The  BIOS  performs  a  self-test  to  check  if  all  essential  components  of  the
                 computer, such as memory, keyboard, and storage devices, are functioning properly. If the self-test is
                 successful, the BIOS proceeds to load the OS from the computer’s storage drive. BIOS plays a crucial role in
                 initialising hardware components and ensuring they communicate effectively with each other. It configures
                 settings that allow the computer to boot up smoothly and prepares the system for the user to interact with
                 the Operating System and applications.

                 Logging In

                 Logging in into a computer means entering your username and password to access the system. The username
                 identifies you, and the password acts like a key to a lock, making sure only you can open and use the computer.
                 This process verifies your identity and grants you permission to use the operating system and applications.


                                                                                                      ICT Skills-II  47
   44   45   46   47   48   49   50   51   52   53   54