All posts by Mr Stratton

Computing teacher and a PT at Coltness High School.

Utility Programs

Definition of a utility  program

Utility programs are those programs that are used to enhance the operating system. The Format utility is a good example of a utility program that we use often.

Description of virus checker

This will be covered in next weeks lesson.

Description of disk editor

This piece of software allows the user to access data on a disk at a very low level. This allows the user to see the RAW data and even “deleted” files.

Description of defragmenter

Hard drives can often become fragmented due to usage. Contiguous file storage helps improve the performance of the computer.

Operating Systems

The last couple of lessons have looked at operating systems. You can find revision notes here.

Description of the function of a bootstrap loader

The bootstrap loader is a small piece of the operating system that is stored in ROM. It is the first piece of software to be loaded after the computer is powered. It checks for an OS which can be located on Hard Drive, Floppy disk, Network, CD-ROM or even a USB flash drive.  It then loads this into RAM where the OS takes over.

Description and exemplification of the main functions of a single user operating system :

The operating system once loaded into RAM has 6 main functions, which allow it to manage the computer and allows the user to communicate with the hard ware.

Interpreting users commands

This is the area of the operating system that the user is most familiar with. The user controls the OS using a keyboard, mouse or other input device. These inputs are then passed to the correct part of the OS. Example clicking the save icon.

File management

The OS controls access to the backing storage devices, it maintains an index of the physical location on the backing storage of all the files. It controls access to these files on network operating systems. hierarchical filing systems can store files in Directories.

Memory  management

Each program can only be executed while in RAM. This part of the OS is responsible for making sure there is enough RAM  to store the program.  It also makes sure that programs do not use the same part of RAM. Areas of the hard drive are often used for virtual memory, this would be controlled by this and the I/O management.

Input/output management

This uses device drivers to allow communication with each device attached to the computer. It is responsible for the actual transfer of data and issues the appropriate control signals to the devices.

Resource allocation

Two processes can not use the same device at the same time. This section of the OS allows competing processes access to devices once they become available.

Managing processes

By allowing processes to share processor time, the OS can give the impression of multitasking. The state of each process is known and processor time can be give processes that require it.

Computer software – Arrangements

  • Description of the function of a bootstrap loader
  • Description and exemplification of the main functions of a single user operating system :
    • interpreting users commands,
    • file management,
    • memory  management,
    • input/output management,
    • resource allocation,
    • managing processes
  • Definition of a utility  program
  • Description of utility  programs including:
    • virus checker
    • disk editor
    • defragmenter
  • Description of the standard file formats for graphics files:
    • jpeg
    • gif
    • TIFF
  • Description of  a suitable selection of software to support typical tasks including:
    • production of  a multimedia catalogue
    • setting up a LAN in a school
    • development of a school website
  • Description and exemplification of software compatibility  issues
    • including memory and storage requirements
    • OS compatibility
  • Classification of viruses by type of file infected:
    • file virus
    • boot  sector virus
    • macro virus
  • Description of  the following  virus code actions :
    • replication
    • camouflage
    • watching
    • delivery
  • Distinction between
    • a virus
    • a worm
    • a Trojan horse
  • Description of anti-virus software detection techniques:
    • use of checksum
    • searching for virus signature
    • heuristic detection
    • memory  resident monitoring

Prelim Breakdown

Have a look at the questions you got wrong  and prioritize your study.

Question Unit Topic
1 Computer Systems Peripherals
2 Computer Systems Data Representation
3 Computer Systems Data Representation
4 Computer Systems Networks
5 Computer Systems Data Representation
6 Software Development Design
7 Software Development Constructs
8 Software Development Constructs
9 Software Development Languages and Environments
10 Computer Systems Structure
11 Software Development SD Process
12 Software Development Languages and Environments
13 Computer Systems Peripherals
14a Software Development SD Process
14b Software Development SD Process
14c Software Development Standard Algorithms
14d Computer Systems Networks
15a Computer Systems Data Representation
15b Computer Systems Data Representation
15c Computer Systems Peripherals
15d Computer Systems Peripherals
16a Software Development Constructs
16b Software Development Constructs
16c Software Development SD Process
16d Software Development Languages and Environments
19a Computer Systems Software
19b Computer Systems Structure
20a Software Development SD Process
20b Software Development SD Process

A day made of glass 2

[kml_flashembed movie="http://www.youtube.com/v/X-GXO_urMow" width="425" height="344" allowfullscreen="true" fvars="fs=1" /]

Now remember that this is an advert for a glass manufacturer. However the technology on display is pretty cool.

Think about the technology that would need to be embedded in the glass as well as the networking technology that is used.

As a counter point though I would like to offer another series of choices. What about projector technology?

[kml_flashembed movie="http://www.youtube.com/v/TUo3yFRxYSw" width="425" height="344" allowfullscreen="true" fvars="fs=1" /]

Or Augmented Reality Contact Lenses?

[kml_flashembed movie="http://www.youtube.com/v/XrLLddIppCU" width="425" height="344" allowfullscreen="true" fvars="fs=1" /]

All this technology is quite a way from everyday use, but 20 years ago (1992) students didn’t have mobile phones, no one had the Internet in their pocket and the World Wide Web was one year old.