LightBlog
Showing posts with label Computer Tricks. Show all posts
Showing posts with label Computer Tricks. Show all posts

Thursday 10 January 2019

What-is-an-Operating-System

What is an Operating System?


A program that acts as an intermediary between computer users and computer hardware
Operating System targets.

  • Perform user programs and make user's problems easier to solve
  • Facilitate computer systems to use
  • Use computer hardware in an efficient way

Computer System Structure



The computer system can be divided into four components

Hardware  - Provides Basic Computing Resources CPU, Memory, I / O Device

Operating System - Controls and coordinates the use of hardware between different applications and users

Application Program - Defines the methods in which system resources are used to solve computing
Users problems

Word processor, compiler, web browser, database system, video game

User - People, machines, other computers


What-is-an-Operating-System?
Four Components of a Computer system

Operating system Definition


  • OS is a resource allocation
  • Manages all the resources
  • Decisions between conflicting requests for efficient and appropriate resource use
  • OS is a control program
  • Controls the execution of programs to prevent computer errors and inappropriate use
  • No universally accepted definition
  • When you order an operating system, everything ships a vendor But changes wildly
  • "A program that runs on the computer at all times" is the kernel. Everything else is either System programs (ships with operating systems) or application programs
Computer Startup
  • The Boot Strap program is loaded on power-up or reboot
  • Usually stored in ROM or EPROM, commonly known as firmware
  • Starts all aspects of the system
  • Load operating system starts kernel and execution

Computer System Organization

  • Computer-system operation
  • One or more CPUs, device controllers connect via common bus providing access to shared memory
  • Concurrent performance of CPUs and devices competing for memory cycle

What-is-an-Operating-System?


Computer-System Operation

  • I / O devices and CPUs can execute concurrently
  • Each device controller is in charge of a particular device type
  • Each device controller has a local buffer
  • Captures CPU data from local memory from main memory / up to
  • From the I / O device to the local buffer of the controller
  • Device controller notifies the CPU that it has completed its operation because of an interrupt

Common Functions of interrupts

  • Interrupt transfer control routine is usually controlled through interrupt vectors, which all service routine addresses include
  • The obstructed architecture will save the address of the obstructed instructions
  • The incoming blockage is disabled while another blockage is being processed to prevent an interrupted obstruction
  • The trap is a software-generated interrupt that is caused by an error or user request
  • An operating system is interrupted

Interrupt Handling


  • Operating system protects the CPU's status by registering and storing the program counter
  • Determines what kind of interference has occurred
  • polling
  • vectored interrupt system
  • Different sections of the code determine what action should be taken for each type of interference

Interrupted Timeline

What-is-an-Operating-System?



  • System calls - requests the operating system to wait for user I / O to complete
  • The device-status table contains an entry for each I / O device that reflects its type, address and status.
  • The operating system indexes the I / O device table to determine the state of the device and modify the table entry. Include interruption

Direct Memory Access Structure

  • Used for high-speed I / O devices that are capable of transmitting information closer to memory speed
  • Device Controller transfers blocks of data from buffer storage directly into the main memory without CPU Interference
  • Instead of one per bar, only one block per block is generated

Storage Structure

  • Main memory - only large storage media that the CPU can access directly
  • Secondary storage - Expansion of main memory which provides large non-volatile storage capacity
  • Magnetic discs - Hard metal or glass platters, which are covered with the magnetic recording material
  • The surface of the disc is divided logically into tracks, which are divided into sectors
  • Disk controller determines logical interaction between device and computer

Storage Hierarchy

  • Hierarchy storage system
  • Speed
  • Cost
  • Instability

Caching  - copying information in the fast storage system; The main memory can be seen as the final cache

What-is-an-Operating-System?


Caching

  • Important principles at multiple levels (hardware, operating system, software) in a computer
  • Temporarily used in slow storage information temporarily
  • If there is information, then fast collection (cache) was checked to determine
  • If so, then information directly from the cache (faster)
  • If not, the data is copied into the cache and used there
  • Cache is smaller than cache storage
  • Cash Management Important Design Issues
  • Cash size and replacement policy

Computer System Architecture


  • Most systems use a single general purpose processor (PDA through mainframe)
  • Most systems also have special purpose processors
  • Multiprocessor systems are increasing in usage and importance
  • Also known as parallel systems, tightly-coupled systems

What-is-an-Operating-System?

What-is-an-Operating-System?
Clustered System

  • Like a multiprocessor system, but many systems are working together
  • Commonly sharing storage via the storage-area network (SAN)
  • Provides a high-availability service that avoids failures
  • There is a machine in the hot-standby mode in asymmetric clustering
  • Symmetric clustering has several nodes, which monitor each other
  • Some clusters are for high-performance computing (HPC)
  • Apps must be written to use parallelization

Operating System Architecture

  • Multiprogramming is needed for efficiency
  • A single user can not keep CPU and I / O devices busy at all times
  • Organizes multiprogramming jobs (code and data), so the CPU always has the same
  • A subset of total jobs in the system is kept in memory
  • One job is selected and run through job scheduling
  • When it has to wait (for example I / O), OS goes to another job
  • Timesharing (multitasking) is a logical extension in which CPU users are employed so often
  • Interacting with each task, creating interactive computing
  • Response time must be <1 second
  • Each user has at least one program performed in memory [process
  • f many jobs are ready to run at the same time [CPU scheduling
  • If the processes do not fit in memory, swapping takes them in and out to run them.
Virtual memory allows complete execution of processes not in memory Memory layout for the multiprogrammed system

What-is-an-Operating-System?


Operating System Operation

  • Handheld Powered by Hardware
  • Software error or request creates exceptions or traps
  • Zero division, request for operating system service
  • Other process problems include infinite loops, processes that modify one or the other operating system
  • The dual-mode operation allows OS to protect itself and other system components
  • User mode and kernel mode
  • Provided by mode bit hardware

User Transitions in Kernel Mode

  • Timer to prevent endless loop/process hogging resources
  • Set interrupt after a specific period
  • Operating system reduction counter
  • When the counter zero creates an obstacle
  • Set prior to the scheduled procedure before getting the prescribed control or eliminating the program that exceeds the allotted time.
What-is-an-Operating-System?

Operating System Function



Process Management

  • There is a program in process execution. It is a unit of work within the system. A program is a passive unit,
  • A process is an active unit.
  • The process requires resources to complete its work
  • CPU, memory, I / O, files
  • Initial data
  • The need to recover any reusable resources for the end of the process
  • In the single-threaded process, there is a program counter that is to specify the location of the next instruction to execute
  • Process sequentially executes instructions until it is completed at one time
  • In multi-threaded process per thread is a program counter
  • Usually, there are several processes in the system, some users, some operating systems are running concurrently on one or the other
  • More CPU
  • Consciousness by multiplying the CPU into processes/threads

Process Management Activities

  • The operating system is responsible for the following activities in relation to the process Management 
  • Creating and deleting both user and system processes
  • Suspend and resume processes
  • Providing mechanisms for process synchronization
  • Providing mechanisms for process communication
  • Providing mechanisms to combat deadlock

Memory Management

  • All data in memory before and after processing
  • To perform all the instructions in memory
  • Memory management determines what is in memory when
  • Optimize CPU usage and computer response for users
  • Memory management activities
  • Keep in mind, which parts of memory are currently being used and by whom it is being done
  • Decide which process (or its parts) and data to move to memory
  • Allocating and Dealing Memory Space as needed
Storage Management

  • OS provides a similar, logical approach to information storage
  • Logical storage unit physical properties - file
  • Each medium is controlled by the device (i.e., disk drive, tape drive)
  • Different properties include speed, capacity, data transfer rate, access method (sequential or). Random)
  • File system management
  • Files are usually organized in directories
  • Access control on most systems to determine who can access
  • OS activities are included
  • Creating and deleting files and directories
  • Primitives to manipulate files and diaries
  • Mapping files on secondary storage
  • Backup files on static (non-volatile) storage media

Mass Storage Management

  • Usually, the disk is used to store data that does not fit in main memory or data that should be kept for "long" The period of time
  • Proper management is of central importance
  • The full speed of computer operation lies on the disk subsystem and its algorithm
  • MASS STORAGE ACTIVITIES
  • Free space management
  • Storage allocation
  • Disk scheduling
  • Some storage is not fast enough
  • Tertiary storage includes optical storage, magnetic tape
  • Still needs to be managed
  • The change between WORM (writing-once, read multiple times) and RW (read-write)

Performance of Various Stages of Storage


What-is-an-Operating-System?

Migration in the Register from the Disk of Integer A


  • The multitasking environment should be careful to use the most recent value, no matter where it is stored in Storage hierarchy

What-is-an-Operating-System?

  • Multiprocessor environment should provide cache compatibility in hardware such as all CPUs The most recent value in their cache
  • The situation of a distributed environment is even more complex
  • Many copies of datum may be present

I / O Subsystem

  • One purpose of the OS is to hide the specificity of hardware devices from the user
  • The I / O subsystem is responsible for
  • Memory management of I / O including buffering (data is being temporarily stored while it is being transferred), Caching (storing parts of data in fast storage for display), spooling (overlapping of output) A job with the input of other jobs)
  • Common Device-Driver Interface
  • Drivers for specific hardware devices

See
: What is Database?




Wednesday 2 January 2019

How-to-Protect-Your-Computer-from-Viruses

How to Protect Your Computer from Viruses, Malware, and Hackers



Today, more and more people are using their computer for everything from communication to online banking and from investment to shopping.

As we do these things on a more regular basis, we open ourselves up to potential hackers, attackers and crackers. While some may see your personal information and identity for resale, others just want to use your computer as a platform, from which to attack other unknowable goals.

Below are some easy, cost-effective steps that you can Protect Your Computer from Viruses safer to start:

1. Always back Up important information and store it at a safe location other than your computer.

2. Update and pour your operating system, web browser and software frequently. If you have a Windows operating system, start by running the Update Wizard by going to https://www.catalog.update.microsoft.com/Home.aspx.

This program will help you find the latest patches for your Windows computer. Also, visit https://www.microsoft.com/en-us/download/office.aspx and locate a potential patch for your office programs.

3. Install a firewall. Without a good firewall, viruses, worms, trojans, malware, and adware can easily access your computer from the Internet. The advantages and disadvantages of hardware and software based firewall programs should be considered.

4. Review your browser and email settings for optimal security. Why should you do this? ActiveX and Javascript are often used by hackers

Root malicious programs into your computer. While cookies are relatively harmless in terms of safety concerns, they still track your movements on the Internet to create your profile. For at least "Internet Zone" set your security setting at high, and your "trusted sites zone" to take the media.

5. Install anti-virus software and set for automatic updates so that you get the most current version.

6. Do not open anonymous email attachments. It's simply not enough that you can identify the address from which it is generated because many viruses can spread from a familiar address.

7. Do not run programs from unknown origin. Also, do not send such programs to friends and colleagues because they contain fun or entertaining stories or jokes. They may have a Trojan horse waiting for the computer to be infected.

8. Disable hidden filename extensions. By default, the Windows operating system is set to "Hide file extensions for known file types". Disable this option so that the file extension appears in Windows. Some file extensions will continue to be hidden, by default, but you are likely to see any unusual file extensions that are not related.

9. Turn off your computer and disconnect it from the network if not using the computer. When you are a hacker can not attack your computer

Disconnected from the network or computer.

10. Consider making boot disks on floppy disks if your computer is compromised by malfunctioning or malicious programs. Obviously, you need to take this step before experiencing the hostile violation of your system.

Spam

A key point that needs to be discussed: Spam is now getting more and more numbers from other countries. These emails are hard to fight because they come from outside our country's laws and regulations. Because the Internet opens borders and thinks globally, these laws are fine and good but do not stop the problem.

Here are the Top 5 Rules to Protect Against Spam:


Number 1: What you can do to avoid having your email address on the Internet. 

There are products called "Spam Spider" which send emails to search the email on an email address. If you are interested, do a search on "Spam Spider" and be amazed at what you get. Interestingly, WebPoison.org, a site that is open source, is ready to fight Internet "Spambots" and "Spam Spider", which gives them a bogus HTML web page, which contains fake email addresses. Are there.

Some suggestions for you:

  • Use the form email, which can hide the addresses or even
  • To help fight the problem, use addresses like sales@company.com instead of your full address.
  • There are programs that encode your emails, such as jsGuard, that encode your email address on web pages so that spam spiders find it difficult or impossible to read your email address.

Number 2: Get a spam blocking software.

There are several programs for this. (For example, visit https://www.cloudmark.com/en or https://www.mailwasher.net ). You can also buy a professional version. Whatever you do, get the software. This will save you time. The software is not silly, but they really help. You'll usually have to set up some manual to block certain types of emails.

Number 3: Use multiple email address approaches.

There should be a lot of free email addresses. If you want to subscribe to newsletters, then there should be a "backup" email address. It will be like giving your phone number to your best friends and all else to get a business number.

Number 4: Attachments to people you do not know, BAD, BAD, BAD

A common problem with spam is that they have attachments and there may be viruses in the attachment. Corporations often have filters that do not let such things happen to you. There is far more "open country" for individual email spammers. A general rule of thumb: If you do not know who is sending you, then ignore this topic. Secondly, look for services offering to filter. Firewall vendors also offer this type of service.

Number 5: Email services now have "bulk-mail" baskets.

If you currently use, it does not support it, then think about going to a new gender. The concept is simple. If you know someone, they can send you an email. If you do not know them, then put them in bulk email piles and then "select" to allow them in your circle. This is a concept in spam blocking software, but additional layers seem important these days, so it is worth seeing.

Spyware and Adware

Spyware and adware are not only a growing nuisance for computer users everywhere but also a fast-growing industry.

Where does it come from?

Generally, spyware is produced in three ways. The first and most common method is when the user installs it. In this scenario, spyware is embedded, attached or bundled with freeware or shareware programs without user knowledge. The user downloads the program to his computer.

Once downloaded, the spyware program goes to collect data for the personal use of spyware authors or to sell it to a third party. Beware of several P2P file-sharing programs. They are notorious for downloads that keep spyware programs.

The user of a downloadable program should pay extra attention to the licensing agreement. Often the software publisher will warn the user that a spyware program will be installed along with the requested program.

Some agreements can provide special "opt-out" boxes that users can click to prevent spyware from being included in the download. Be sure to review the document before signing the download.

Another way is that spyware can access your computer, which can deceive you by manipulating the security features designed to stop any unwanted installation. The Internet Explorer web browser was designed to not allow websites to launch any unwanted downloads. This is the reason that the user has to start the download by clicking on a link. These links can prove confusing.

For example, pop-ups created after a standard Windows dialog box can appear on your screen. The message can ask if you want to optimize your internet access. It provides yes or no reply button, but, no matter what push you to push, a download containing a spyware program will begin. New versions of Internet Explorer are making this spyware route a bit more difficult now.

Finally, some spyware applications infect a system by attacking security holes in web browsers or other software. When a user navigates to a webpage controlled by a spyware author, the page contains a code designed to attack the browser and forces the installation of spyware programs.

What can spyware programs do?

Spyware programs can cater to a multitude of malicious tasks. Some of his work is annoying for the user; Others may be quite aggressive in nature.

Spyware can:
  • Monitor your keystrokes for reporting purposes.
  • Scan the files located on your hard drive.
  • Snoop through the app on our desktop.
  • Install other spyware programs in your computer.
  • Read your cookies.
  • Steal credit card numbers, passwords, and other personal information
  • Change the default settings on your home page web browser.

Tuesday 1 January 2019

How-to-Speed-Up-my-Computer-Running-Windows

How to Speed Up My Computer?



All Windows Computers slow down over time - this is just a fact of life, but that does not mean that you have to be with it. As a complete computer industry According to your belief, in order to keep your requests fast and responsive to your computer, you do not need to upgrade your hardware every few months, just to clean it once in a while is required.

The top ten things you can do now to Speed up your Computer:

1).   Remove unused applications
2).   Stop unnecessary programs by running on startup
3).   Defragment your hard drive
4).   Run the hard drive cleaning utility
5).   Download and run a registry cleanup tool
6).   Delete Temporary Internet Files
7).   Run a Spyware Removal Tool Regularly
8).   Close any non-essential services
9).   Close Fancy Animation  
 10). Change the number of colors in your display

Today there are countless software programs available on the Internet that will display most of these tasks for you, but they usually come with a price tag. 

These tasks can be completely done for free; It just takes a little more effort.

We are going to go through one of these paragraphs to ensure that your computer is running its full potential, step-by-step of the article. 

The key to running your computer smoothly and quickly is that you do these tasks on your computer regularly.

It is highly recommended that you make a backup of your computer before taking any of these steps. This will help to ensure that if you make a mistake, you can go back to the previous working version of your system. 

The easiest way to do this is to make a system restore point. For instructions on doing this, press F1 on your computer and search for "Create Restore Point".

Remove Unused Apps

This one item will probably promptly remove your half problems. 

Think about it, do you really need the video game that your children had installed two years ago? Removing the programs you use will free up space on your hard drive, which will give more space to your computer to work.

Here are the steps:

1) Click Start, click on "Control Panel" in the Start menu.

2) Double-click "Add or Remove Programs" in the window that opens.

3) A new window will open, listing all the programs you have installed.
computer.

4) Scroll through the list of programs, find anything that you do not recognize or which you have not used in a while and it is not needed.

5) Click the name of the program that you want to remove; This will show more detail about the extension and application.

6) On the right side of the highlighted app, there is a button called "Remove", click it.

7) You will be asked to confirm that you want to remove the selected application. Click the 'OK' or 'Yes' button.

8) Each application is different so you can be presented with an uninstall wizard. If this happens then follow the instructions of the wizard and you should be in a short time.

9) Once the application has been deleted, you may be asked to restart your computer. - Click NO 'or' Restart Later '- unless you come down to the applications that you use on a regular basis, you want to uninstall the program.

10) You should be presented with a list of pre-installed applications, but with the application, you previously deleted it with the selected list. Now you can repeat Step 4 through 9 until you remove all those applications you no longer need.

As a general rule, try to leave anything reading "Microsoft" or "Windows". There are several utilities in this list that Windows needs to work properly, 

so it is Unless you do not know to make sure that you can safely remove them from your computer, leave it alone. 

When in doubt, contact a specialist, we can help you run your computer from the comfort of your home and run it quickly.

Close Unnecessary Programs By Running on Startup

One of the biggest problems is that most users do not realize they have it when they start their computer, they are running a lot of programs. 

This is not their fault, sometimes the tools they use regularly will add programs to the startup sequence without ever asking the user. 

These programs stack up and eventually start crawling the computer, barely able to do the tasks. Fortunately, there is a simple way to fix this:

1) Click Start, then Run.

2) On the window that opens, type "msconfig" without quotes, click OK.

3) System configuration utility will open, click on the 'Startup' tab at the top - do not change anything on any other tab.

4) On the Startup tab, you will find a list of applications that run on the checkup at the startup along with the left-hand side

5) Do not start investigating the United Nations in this list. There are programs in the list that require Windows to run correctly, such as Explorer

6) There is a place for "startup", which defines the user's startup folder, you can uncheck it. You can delete anything with a name that you recognize as a program that was previously uninstalled or something that does not need you to run when your computer starts up.

7) When you are unchecking the programs you do not want to run on startup, click OK. You may be asked to restart your computer - select 'No' or 'Restart' later.

Please note that if you made any changes to the startup configuration, you will be notified of these changes when you finally restart your computer.


At this point, you should return most of your speed, but we are not staying here. We are going to bring back the performance of your computer, when you brought it home the first time, continue it

Defragment Your Hard Drive

This is one of those things which most people do not think about or do not even know about doing their computer. As time passes, you start filling up the hard drive. 

After a while, your computer tries to make the best use of the location, which is available by breaking your files into small pieces and pressing them next to other files that do not fill all their available space. 

After a while, your computer has to go through many different parts of your hard drive to open only one file. It is called fragmentation, and it can actually slow down your system.

Fortunately, there is a solution - Windows Disk Defragmenter Tool. 

This tool scans the hard drives that are looking for files that are separated and try to place pieces on the hard drive next to each other. 

It can take a lot of time to run, so this is something you usually do during your lunch break or run it at night.

1) Click Start, All Programs, Accessories, System Tools, then click Disk Defragmenter.

2) You will see a window listing of all hard drives on your system, but usually, you will only see one.

3) Make sure your primary hard drive (where Windows is installed) is selected and click on the 'defragment' button.

4) Take away a nap, grab something to eat, come back in a few hours.

5) When the process is completed, you will see two displays on your screen - before defragmentation and after defragmentation. Continuous files will be marked in blue, fragmented files in red. Hopefully, there's a lot of blue on your screen.

Not all files can be defragmented - some system files will always be locked, so they can not be changed. 

The only way to defragment a primary hard drive is to Remove it from the computer and defragment it from another computer.

Run Hard Drive Cleaning Utility

The hard drive cleaning utility is one of these devices that takes some time to run. In general, it checks to make sure that your hard drive is healthy and can repair any of the bad blocks it finds. It tries to remove any unnecessary files from your drive - old drivers, temporary internet files, and files you use in no time.

1) Click Start, All Programs, Accessories, System Tools, then Disk Cleanup.

2) You will be asked to choose which drive you want to clean, select your primary drive and click OK.

3) Now you will see a progress bar on your screen - the device is trying to determine how much space it can empty from your hard drive. After a few minutes, it will provide you with a list of the types of files that you will be able to remove from your computer, and how much space can be obtained by removing them.

4) Choose what files you want to remove - but be careful, you may actually need something. Your best bet is usually anything that has the word "temporary files".

5) When you're ready to delete the selected files, click on 'OK'

6) Once again, move away and let the system run. With this device, it is recommended that you let it run overnight.

Download and Run Registry Cleanup Tool

A registry cleanup tool is a program that searches for errors and fixes errors through your registry (a fancy name for a configuration file). 

There are many great people in the market who provide you a test, but some of them require you to buy the full package before getting the full functionality. 

We have not found any free tools that do a good job cleaning your registry, but there are some full-featured tests that will work well for the first time, which you usually need.

The registry cleaner that we recommend is again with Ace Utilities: This is called Registry Tuneup. At the time of this writing, the trial version lasts for approximately 30 days, maybe you have changed it while reading it. 

Not only this, it actually clears the registry for you, it will tell you why every registry entry that removes it does not need it. Many features are available for advanced users, but you will not usually need them.

When you run Registry Tuneup for the first time, you will be asked to create a System Restore Point - it is highly recommended. 

Generally, creating a restore point is always a good idea because if something goes wrong, you can always go back to a configuration that works - a great thing.

You will also be asked if you want to walk in specialist mode - fall Click Finish, and you will be presented with the main registry tuneup window. From here,

Follow these steps:

1) Click on the scan - you will see a registry tuneup running in the background
The little window is asking you to wait.

2) When the application is finished, you will be presented with a dialog that will ask you to remove all the bad entries which got the device. Click 'Remove'

3) There is no step three - you have done!

Delete Temporary Internet Files

As soon as you browse the internet, you download pictures, music, videos and web pages. 

How slow the image will be if you go to a web page every time you need to download those files - this will be almost unusable. 

To prevent this from occurring, you store some computers, if not all, locally on these files on your hard drive, where they can access them quickly if needed. 

So many times your computer will get rid of these temporary files, to ensure that you are viewing the most up-to-date version of the web page you are viewing. 

This is a process called caching, and it is a friend of internet users.

However, even your closest friends can bring unexpected guests to your party. 

If you visit a web page only once and never return, cached files on your system will never be removed because the browser you used did not need to be refreshed at any time. These files can prepare to slow down your computer over time.

Most of these files have been deleted when you use the Disk Cleanup Tool as mentioned above, but if you use a web browser other than Internet Explorer (Firefox, for example) Will need to manually remove We've included instructions for deleting these files in both Internet Explorer and Firefox:

Internet Explorer:

1) Click on the 'Tools' menu, then 'Internet Options'

2) On the first tab that opens, you will see a section called 'Browsing History'. In this part, there is a button called 'Delete', click it.

3) A new window will list different types of files that track the browser. You can delete Temporary Internet Files, Cookies and History without much worry. We generally do not recommend that you remove from data or passwords because they are usually very useful for the population for you.

Related: