Explain how the operating system performs job/process scheduling/management
What is utility software?
Why must operating system be installed in a computer before any other program
Which files are backed up in an incremental backup scheme?
Identify and describe four roles of the operating system when managing the resources of a personal computer.
Manages memory (RAM)
Ensures programs/data do not corrupt each other: Ensures all programs and data including itself is stored in correct memory locations
Manages processes: Ensures different processes can utilise the CPU and do not interfere with each other or crash •
Allows a user to run programs : On a multi-tasking O/S ensure that all tasks appear to run simultaneously
State Examples of utility programs
Encryption software
Defragmentation s/w
(Data) compression s/w
Anti-virus / anti-malware s/w
Disk analysis and repair s/w
Auto-update
Firewall
...over a network/external source
(b) The computer needs an operating system and utility software.
(i) The operating system controls the scheduling of processes.
Describe how the operating system uses scheduling to allocate processor time.
Describe four features of the operating system when providing a graphical user interface on a personal computer. Give a suitable example of each feature.
Windows for example a word processing application and a spreadsheet
Menus, for example, allow the user to perform operations or run applications such as right-click to create a new folder
Icons for example a picture of linked computers for networking
Pointers(mouse or touchscreen) for example to select items/trigger events
Shortcuts for example to frequently used applications for example having a shortcut to your mail client on your desktop
File navigation for example when searching the hard disc for a file/folder using a browser
copying / deleting / moving/sorting/naming/searching of files or folders for example copying of a file from the hard drive to a USB pen drive (File handling)
Desktop customisation for example changing the colours and background image
Copy and paste for example between applications e.g. copying a graph from a spreadsheet to a word processor
Error messages for example provide users with error/warning/help messages for example ‘printer out of paper’
State ways of identifying illegal copies of an operating system
Describe how the database can be recovered from a system failure
Describe two possible causes of computer failure. In each case state how it could have been prevented
Social engineering is where someone is tricked or manipulated into providing secure information or access to a secure system. Describe each of the following social engineering techniques.
Blagging
Phishing
Shouldering
List two types of disaster recovery tools.
What is data encryption?
Briefly describe the information Security principles or CIA triads
Confidential information about the students is to be stored on the computer system. Explain the measures that can be taken to ensure that such information remains confidential.
- Passwords
- Hierarchy
- Only allow some staff to access student files
- Only some machines able to access
- Physical location of these machines
- Physical lock on machines
- Encrypted data in files
- Firewall if connected to the Internet
State two effects of a computer virus
State two ways of protecting computers against viruses.
Define Data Security
State two data protection rules that should be obeyed by all staff in a hospital.