Download DCF Chapter 04 IM

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
Discovering Computers & Microsoft Office 2010 Instructor’s Manual
Page 1 of 12
Discovering Computers Chapter 4
Operating Systems and Utility Programs
A Guide to this Instructor’s Manual:
We have designed this Instructor’s Manual to supplement and enhance your teaching experience through classroom
activities and a cohesive chapter summary.
This document is organized chronologically, using the same heading in rreedd that you see in the textbook. Under each
heading you will find (in order): Lecture Notes that summarize the section, Figures and Boxes found in the section, if
any, Teacher Tips, Classroom Activities, and Lab Activities. Pay special attention to teaching tips, and activities geared
towards quizzing your students, enhancing their critical thinking skills, and encouraging experimentation within the
software.
In addition to this Instructor’s Manual, our Instructor’s Resources CD also contains PowerPoint Presentations, Test
Banks, and other supplements to aid in your teaching experience.
For your students:
Our latest online feature, CourseCasts, is a library of weekly podcasts designed to keep your students up to date with
the latest in technology news. Direct your students to http://coursecasts.course.com, where they can download the
most recent CourseCast onto their mp3 player. Ken Baldauf, host of CourseCasts, is a faculty member of the Florida
State University Computer Science Department where he is responsible for teaching technology classes to thousands of
FSU students each year. Ken is an expert in the latest technology and sorts through and aggregates the most pertinent
news and information for CourseCasts so your students can spend their time enjoying technology, rather than trying to
figure it out. Open or close your lecture with a discussion based on the latest CourseCast.
TTaabbllee ooff CCoonntteennttss
Chapter Objectives
270: System Software
271: Operating Systems
272: Operating System Functions
279: Types of Operating Systems
280: Stand-Alone Operating Systems
282: Server Operating Systems
283: Embedded Operating Systems
284: Utility Programs
End of Chapter Material
Glossary of Key Terms
1
2
2
2
4
4
7
7
8
10
11
CChhaapptteerr O
Obbjjeeccttiivveess
Students will have mastered the material in Chapter Seven when they can:
 Define system software and identify the
 Describe each of these functions of an
two types of system software
operating system: starting and shutting
Discovering Computers & Office 2010 Instructor’s Manual
down a computer, providing a user
interface, managing memory, coordinating
tasks, configuring devices, establishing an
Internet connection, monitoring
performance, providing file management
and other utilities, updating automatically,
controlling a network, and administering
security
 Summarize the features of several standalone operating systems: Windows, Mac
OS, UNIX, and Linux
 Identify various server operating systems
 Briefly describe several embedded operating
systems: Windows Embedded CE, Windows
Page 2 of 12
Phone, Palm OS, iPhone OS, BlackBerry,
Google Android, Embedded Linux, and
Symbian OS
 Explain the purpose of several utility
programs: file manager, search utility,
image viewer, uninstaller, disk cleanup,
disk defragmenter, backup and restore
utilities, screen saver, personal firewall,
antivirus programs, spyware and adware
removers, Internet filters, file compression,
media player, disc burning, and personal
computer maintenance
227700:: SSyysstteem
m SSooffttw
waarree
LECTURE NOTES
 Define system software
 Introduce the two types of system software: operating systems and utility programs
227711:: O
Oppeerraattiinngg SSyysstteem
mss
LECTURE NOTES
 Define operating system (OS)
 Use Figure 7-1 to list functions performed by an operating system
 Define platform and cross-platform program
FIGURE: 7-1
227722:: O
Oppeerraattiinngg SSyysstteem
m FFuunnccttiioonnss
LECTURE NOTES
 Define booting and differentiate between a cold boot and a warm boot
 Define sleep mode, hibernate, and user interface
 Define kernel and memory resident, and explain how a memory resident portion of the OS is
different from nonresident portions of the operating system
 Use Figures 7-3a and 7-3b to differentiate between command-line interfaces and graphical user
interfaces (GUIs)
 Discuss Windows Aero
 Describe the following kinds of operating systems: single user/single tasking, single
user/multitasking, multiuser, and multiprocessing
 Describe what a fault-tolerant computer is
 Define memory management, virtual memory, and Windows ReadyBoost
 Define buffer, spooling, queue, and print spooler
 Explain the function of a driver, and describe Plug and Play technology
 Describe the function of a performance monitor
 List capabilities provided by operating systems
 Discuss automatic update and service pack
Discovering Computers & Office 2010 Instructor’s Manual


Page 3 of 12
Define server operating system and administrator account
Explain what the following terms mean: log on, user name (user ID), and password
FIGURES: 7-2, 7-3a, 7-3b, 7-4, 7-5, 7-6, 7-7
BOXES
1. Web Link: Spooling. Encourage students to visit the Web site mentioned for more information.
2. Web Link: Plug and Play. Encourage students to visit the Web site mentioned for more information.
3. Looking Ahead 8-1: Contact Lenses Monitor Glaucoma. Ask students to brainstorm other advanced
uses of technology like the one described in the text, and encourage students to visit the Web site
mentioned for more information.
4. FAQ 7-1: What are the guidelines for selecting a good password? Review the suggestions (and
prohibitions) mentioned and encourage students to visit the Web site mentioned for more information.
5. Quiz Yourself 7-1: In addition to answering the questions in the text, as a quick review, have students
visit the Computer Concepts CourseMate Web site at www.cengagebrain.com, navigate to the Chapter
7 Quiz Yourself resource for this book, and then click Objectives 1 – 2.
TEACHER TIPS
Because it is easy to learn and use, a GUI often is called user-friendly. As an example of this userfriendly nature, consider how a relatively simple task, such as deleting a file, is performed with a
command-line interface and with a graphical user interface file manager. With a command-line
interface, a user might have to type del followed by the file name in quotation marks. Therefore, the
user must remember the command, type it correctly, and use the proper syntax. On the other hand,
with a GUI a user need only select (click) the file name in the file manager window and then click the
Delete command on a menu or the Delete button on a toolbar. Point out that many GUIs incorporate
browser-like features. Windows is a good example of an interface with browser-like features.
Two points to make on the subject of scheduling jobs: The term spooling comes from the observation
that placing print jobs temporarily in a buffer is somewhat like winding thread onto a spool so that it
can be used at a later time. When you define the term queue, explain that while U.S. students may be
unfamiliar with the word, it is used commonly in Britain to mean a line of waiting people or vehicles.
CLASSROOM ACTIVITIES
1. Group Activity: Graphical user interfaces use icons, or small images, to represent programs,
instructions, files, or some other object. Developing icons for a graphical user interface is not an easy
task. Although a good icon need not be a work of art, it must be a memorable symbol of the task or
object it represents. According to Susan Kare, creator of the icons used with many popular GUIs, “The
best icons are more like traffic signs than graphic illustrations.” Have students choose two of the utilities
described later in this chapter and, using two sheets of graph paper, create an icon to represent each
utility. Let each square on the graph paper stand for a pixel on a monitor screen. Color the appropriate
squares on the graph paper to create the image for each icon. On the back of the graph paper, have
students explain why the icon is suitable for the utility they chose.
Discovering Computers & Office 2010 Instructor’s Manual
Page 4 of 12
2. Quick Quiz:
1) How is a program in the foreground different from programs in the background? (Answer: A
program in the foreground is the active program currently being used, and a program in the
background is running but not in use.)
3. Critical Thinking: Some organizations require a user’s password to be several characters long, or to
contain a number. They also enforce a limit on the number of password entry attempts. Ask students for
their opinions of these security measures. Longer passwords are more difficult to guess, but they also are
more difficult to remember. Is the additional security worth the bother? Why or why not? Should the
number of entry attempts be limited? Why or why not?
227799:: TTyyppeess ooff O
Oppeerraattiinngg SSyysstteem
mss
LECTURE NOTES
 List the three basic categories of operating systems: stand-alone, server, and embedded
 Use Figure 7-8 to identify operating systems in each category
FIGURE: 7-8
BOXES
1. FAQ 7-2: Which operating systems have the most market share? Review the pie chart and encourage
students to visit the Web site mentioned for more information.
CLASSROOM ACTIVITIES
1. Assign a Project: Have students find out the operating system that is used on their, or a friend’s,
personal computer. What company publishes the operating system? What type of interface does the
operating system use? Does the operating system support multitasking? Have students refer to the
documentation that accompanied the computer or operating system to determine the operating system’s
version and release number, and the year it was published. Try to find out when the first version of the
operating system was introduced, when the next version is expected, and how much the publisher
charges for upgrades.
2. Quick Quiz:
1) What does it mean for a new version of an operating system to be backward compatible?
(Answer: It recognizes and works with application software written for an earlier version of the
operating system or platform)
228800:: SSttaanndd--A
Alloonnee O
Oppeerraattiinngg SSyysstteem
mss
LECTURE NOTES
 Define stand-alone operating system (client operating systems) and list examples
 Introduce Windows 7, and discuss the long history of the Windows operating system
 Describe Apple’s Macintosh operating system, and Mac OS X
 Describe UNIX and Linux
FIGURES: 7-9, 7-10, 7-11, 7-12
Discovering Computers & Office 2010 Instructor’s Manual
Page 5 of 12
BOXES
1. Web Link: Windows 7. Encourage students to visit the Web site mentioned for more information.
2. Web Link: Mac OS X. Encourage students to visit the Web site mentioned for more information.
3. Web Link: Linux. Encourage students to visit the Web site mentioned for more information.
4. Ethics & Issues 7-1: Closed Source vs. Open Source Operating Systems. Survey students on whether
or not open source operating systems are a good idea, and ask them to weigh the advantages and
disadvantages of open and closed source operating systems.
CLASSROOM ACTIVITIES
1. Class Discussion: Windows Millennium Edition was a result of Microsoft’s first recognition that the
needs of business and home users are different. Ask students why this realization was important. Would
students be more likely to purchase a version of Windows 7 in the Home or Professional category?
Why?
2. Class Discussion: A question that confronts companies and individuals worldwide when upgrading
computers is, “What operating system should we select”? Compatibility, usability, portability,
reliability, and cost are among the many factors that must be considered. Microsoft’s Windows
definitely has an edge as the most widely used and popular operating system. On the other hand, Mac
OS X has a reputation for being easy to use, IBM’s OS/2 is used widely among businesses, UNIX is
considered portable and reliable (it is a mature system, developed in the early 1970s, long before
Windows even existed), and Linux is available in free open-source versions. If you were buying an
operating system for a company, which one would you choose? Why? If you were purchasing an
operating system for a personal computer, what considerations do you think would be most important?
Why? What operating system would you select for a personal computer? Why?
3. Class Discussion: Linus Torvalds, one of this chapter’s Technology Trailblazers (see page 159), is the
creator of Linux. Although he may not be a household name, Forbes magazine calls Torvalds, “perhaps
the most popular programmer on the planet.” Among Internet disciples, his renown is clear: a Web
search engine returns more than 3.2 million hits when Linus Torvalds is the keyword. This secret
celebrity may be representative of a group interested in the lyrical, rather than the commercial, side of
computers. When asked what motivates him, Torvalds claims, “there’s a strong artistic element.” He
also points out that, “a big part of personal satisfaction is having your work recognized by your peers.
That’s fundamental in any human psyche.” Students may be interested in discussing the apparent
incentives for different Technology Trailblazers described in this text. Of these people who shaped the
computer industry, how many seem motivated primarily by the possibility of financial gain? How many
seem to have other motivations? What? What, if any, impact does motivation have on an individual’s
work?
4. Group Activity: The Apple — PC rivalry may be evident in your class. It is not unlikely that among
students you will find both Apple and PC adherents. The relative merits, and limitations, of each system
could form the basis for a lively debate.
Discovering Computers & Office 2010 Instructor’s Manual
Page 6 of 12
5. Assign a Project: Bill Gates, the founder of Microsoft Inc., is a modern legend. A subject of Chapter
1’s Technology Trailblazers, Gates is one of the wealthiest men in the world, and Microsoft is one of the
most influential companies in the computer industry. Not surprisingly, the fascinating story of Bill
Gates, his ideas, and his company has been told (both favorably and critically) in many books,
including: The Road Ahead (Bill Gates), Business at the Speed of Thought (Bill Gates), Bill Gates
(Jeanine M. Lesinski), Hard Drive: Bill Gates and the Making of the Microsoft Empire (James Wallace),
Bill Gates Speaks: Insight from the World’s Greatest Entrepreneur (Janet Lowe), Bill Gates: The Path to
the Future (Jonathan Gatlin), Gates: How Microsoft’s Mogul Reinvented an Industry — And Made
Himself the Richest Man in America (Stephen Manes and Paul Andrews), Overdrive: Bill Gates and the
Race to Control Cyberspace (James Wallace), Bill Gates: Billionaire and Computer Genius (Joan D.
Dickinson), Barbarians Led by Bill Gates (Jennifer Edstrom and Marlin Eller), Breaking Windows: How
Bill Gates Fumbled the Future of Microsoft (David Bank), and Accidental Empires: How the Boys of
Silicon Valley Make Their Millions, Battle Foreign Competition, and Still Can’t Get a Date (Robert X.
Cringely). Have students read one of these books, or another book on Gates and Microsoft, and write a
report on the qualities they think led to the success of the man and the company.
6. Assign a Project: Application programs are designed to be used with specific operating systems. When
software is purchased, it is important to read the program’s packaging to determine if it is compatible
with the operating system on your personal computer. Operating systems undergo frequent revisions. A
higher, or later, version number often means a more recent revision (Windows 98 is a newer version
than Windows 95), but sometimes other designations are used (for example, Windows 7 is the latest
revision of the Windows operating system). Usually, operating systems are downward compatible,
meaning that an application program written for an earlier version of an operating system will work
with a later version of the same operating system. Often, however, an application program written for a
later version of an operating system (such as Windows 7) will not work correctly with an earlier version
(such as Windows 95). Have students visit a software vendor or Web site and find four application
programs in which they are interested that require the Windows operating system. Which of the
programs could they run on their personal computer if they had Windows 95? Windows 98? Windows
XP? Windows Vista? Windows 7? What is the earliest version of Windows they would need to run all
five programs? Can they find comparable programs that would run with an earlier version of Windows?
7. Quick Quiz:
1) Which of the following is open source software?
a) Windows 7 b) Mac OS X c) Linux d) All of the above (Answer: c)
2) Which of the following editions of Windows 7 is designed for netbooks?
a) Windows 7 Home Premium b) Windows 7 Ultimate c) Windows 7 Starter d) Windows 7
Professional (Answer: c)
8. Critical Thinking: At a recent technical conference, a speaker from a noted software company told an
audience of information-technology professionals that upgrading to a new operating system would be
“seamless.” His listeners responded with uncontrolled laughter. Adopting a new operating system
seldom is easy. As a result, no matter what the benefits, people often are reluctant to give up their old
operating systems. Although reviewers agree that each new version of Windows offered several
advantages over previous versions, one of the earliest editions of the operating system, Windows 3.1,
remained popular for years. Why might people be unwilling to embrace new versions of an operating
system? How could developers hasten acceptance of a new operating system? If you generally were
Discovering Computers & Office 2010 Instructor’s Manual
Page 7 of 12
satisfied with your current operating system, would you upgrade? Why or why not?
LAB ACTIVITIES
1. Take students into the lab to see either Windows 7 if they have not used it yet, and/or machines that
are running Linux and UNIX. Ask students to write a short description of the similarities and
differences among any of the operating systems available in the lab.
2. Take students into the lab to use machines running Mac OS X. Ask students to write a short
description of the similarities and differences between the Windows and Macintosh operating systems.
228822:: SSeerrvveerr O
Oppeerraattiinngg SSyysstteem
mss
LECTURE NOTES
 Remind students that a server operating system supports a network
 Explain the relationship among the server, the client computers, and a server operating system
 Compare and contrast a server operating system with a stand-alone operating system with
networking capability
 List examples of server operating systems: Windows Server 2008, UNIX, Linux, Solaris, and Novell’s
NetWare
BOXES
1. Web Link: Ethics & Issues. Encourage students to visit the Web site mentioned for more information.
CLASSROOM ACTIVITIES
1. Class Discussion: When Microsoft released Windows 98, it claimed the new operating system was
evolutionary, not revolutionary. In other words, instead of being radically different, Windows 98 built
on the model of its predecessor, Windows 95. Of the stand-alone and server operating systems
described in this chapter — DOS, Windows XP, Mac OS X, UNIX, Linux, NetWare, and Windows
Server 2008 — which would you consider revolutionary? Why? Which would you call evolutionary?
Why? Based on your experiences with each operating system, is an operating system better off being
revolutionary or evolutionary? Why?
2. Quick Quiz:
1) What is Novell’s NetWare designed for? (Answer: Client/server networks)
228833:: EEm
mbbeeddddeedd O
Oppeerraattiinngg SSyysstteem
mss
LECTURE NOTES
 Define embedded operating system and list popular embedded operating systems: Windows
Embedded CE, Windows Phone 7, Palm OS, iPhone OS, BlackBerry, Google Android,
embedded Linux, and Symbian OS
FIGURE: 7-13
BOXES
1. Quiz Yourself 7-2: In addition to answering the questions in the text, as a quick review, have students
visit the Computer Concepts CourseMate Web site at www.cengagebrain.com, navigate to the Chapter
7 Quiz Yourself resource for this book, and then click Objectives 3 – 5.
Discovering Computers & Office 2010 Instructor’s Manual
Page 8 of 12
CLASSROOM ACTIVITIES
1. Class Discussion: Futurists claim tomorrow’s operating systems may be very different from those we
use today. Innovations such as touch-screens, speech-recognition capabilities, automatic adaptability to
individuals, and even recognition of user emotional states have been suggested. Some innovators claim
operating systems will be simpler, others think they will be more complex. What would you like to see?
Will future operating systems be single-tasking, multitasking, or multiprocessing systems? How will
they handle such tasks as memory management, configuring devices, monitoring system performance,
administering security, and managing storage media? What type of interface will they have? Of the
operating systems with which you are familiar, which is most like, or most dislike, the perfect operating
system? Why?
2. Quick Quiz:
1) What is Symbian OS? (Answer: An open source multitasking operating system designed for
smart phones)
228844:: U
Uttiilliittyy PPrrooggrraam
mss
LECTURE NOTES
 Define utility program (utility)
 Explain the function of each of the following kinds of utilities: file manager, search utility,
uninstaller, image viewer, disk cleanup, disk defragmenter, backup and restore utilities, screen
saver, and personal firewall
 Define folder and defragmenting
 Define virus, virus author, worm, Trojan horse, and antivirus program
 Differentiate between spyware and adware, and explain what spyware and adware removers are
 Define spam, phishing, zipped files, and uncompress
 Describe Internet filters, including anti-spam programs, Web filtering software, phishing filters, and
pop-up blockers
 Define each of the following: file compression utility, file conversion utility, media player, disc
burning software, and personal computer maintenance utility
FIGURES: 7-14, 7-15, 7-16, 7-17, 7-18, 7-19, 7-20, 7-21, 7-22, 7-23, 7-24
BOXES
1. Web Link: WinZip. Encourage students to visit the Web site mentioned for more information.
2. Innovative Computing 7-1: Utility Programs Locate Deleted Files. Survey students about their own
frustrating experiences with accidentally deleted files, and encourage students to visit the Web site
mentioned for more information.
3. FAQ 7-3: What steps should I take to prevent virus infections on my computer? Discuss the
suggestions about the use of antivirus software, and encourage students to visit the Web site mentioned
for more information.
4. FAQ 7-4: Where does spam originate? Discuss the origins of spam and encourage students to visit the
Web site mentioned for more information.
Discovering Computers & Office 2010 Instructor’s Manual
Page 9 of 12
5. Ethics & Issues 7-2: Should the Government Tax Media Downloads? Survey students about the
differences between taxable physical media and digital media.
6. Quiz Yourself 7-3: In addition to answering the questions in the text, as a quick review, have students
visit the Computer Concepts CourseMate Web site at www.cengagebrain.com, navigate to the Chapter
7 Quiz Yourself resource for this book, and then click Objective 6.
TEACHER TIP
Emphasize to students that viruses are not harmless pranks — the Melissa virus, as one example, cost an
estimated $80 million in damages. A virus called the Love Bug wreaked havoc worldwide. The virus,
which targeted Microsoft Outlook users, arrived as an attachment to e-mail messages, often from what
would appear to be a “trusted source,” with the subject line, “ILOVEYOU” (hence the virus’s name).
When the attachment was opened, the virus sent itself to every name in the victim’s address book,
overwrote files on the victim’s hard drive, directed the victim’s browser to a Web site that downloaded
a program to steal the victim’s password, and then e-mailed the password to the virus’s author (who
eventually was discovered and arrested).
CLASSROOM ACTIVITIES
1. Assign a Project: Encourage students to use the Web to identify other stand-alone utilities besides
those listed in the text. Some examples include: desktop enhancers that change the desktop look and
organization, allowing users to create and switch between multiple desktops; file conversion utilities
that converts from one file format to another so that a file can be used by another application; and
Internet organizers that help in the management and use of favorite Web sites, searching the Web and
reporting on site changes.
2. Assign a Project: Many utility programs are available for users of personal computers. Have students
visit a computer store, read a computer magazine, or access a vendor’s Web site and choose two utility
programs in which they are interested. Write a review of the two programs. What is the function of
each? What are the system requirements? How easy is the program to use? How much does the program
cost? In their opinion, is the utility worth the price? Why or why not? If they could buy only one of the
utility programs, which would they purchase? Why?
3. Assign a Project: Using current computer magazines and business publications, have students
research the ways in which one of the operating systems described in this chapter is being used today.
What kinds of businesses are using the operating system? Why? How much is the operating system
being used by individuals on personal computers? What are the advantages of the operating system?
What are the disadvantages? What are the system requirements and price of the operating system?
From their research, what do they think is the future of the operating system?
4. Class Discussion: New utility programs are being developed continually to meet user needs. One new
utility guards against computer theft by once a week making a silent call to a control center. If the call
emanates from an appropriate number, the call is logged. If the computer has been reported stolen,
however, the center traces the call to locate the missing computer. What other needs could be
addressed by a utility program? Identify three specific tasks (not described in this chapter) related to
managing or working with hardware, software, or files that computer users would like to have
Discovering Computers & Office 2010 Instructor’s Manual
Page 10 of 12
performed. Why would these tasks be important to a computer user? What would a utility program do
to perform each task? If you were to market the utility program, what would you call it?
5. Quick Quiz:
1) What is ghosting? (Answer: A problem with displays in which images were permanently etched
onto the screen)
2) What does it mean for a file to be fragmented? (Answer: The contents of the file are scattered
across two or more noncontiguous sectors)
6. Critical Thinking: Some users insist that there is no such thing as a “harmless” virus, because all
viruses represent an unasked for intrusion into a computer system. Ask students how they feel about
“harmless” viruses. Does it make any difference whether the virus infection is on a business or personal
computer? Why or why not?
7. Critical Thinking: Today’s operating systems include a variety of features. They support a graphical
user interface, monitor performance, and administer security. Most operating systems also include a
variety of utility programs. These utilities offer functions such as managing files, viewing images,
uninstalling programs, diagnosing problems, scanning disks, defragmenting disks, backing up files and
disks, and displaying screen savers. Do you think an operating system should include these features? Are
these features useful? What other features could be included in an operating system? If you were to
write an overview of the perfect operating system, what features would you include?
LAB ACTIVITIES
1. Ask students to go into the lab and access two or three of the utilities described in this section and
then write a short summary of their experiences using the utilities as well as the options they find in
each utility.
EEnndd ooff CChhaapptteerr M
Maatteerriiaall

Chapter Review provides a general survey of the material in the chapter. Students can use these
pages to reinforce their achievement of the chapter objectives.

Key Terms allows students to use these terms from the text to prepare for tests and quizzes.

Checkpoint exercises review key terms and concepts presented in the chapter. Have students
complete the Multiple Choice, Matching, and Short Answer exercises.

In the Problem Solving exercises, students expand their knowledge by solving practical computer
problems. Encourage students to visit the forum to discuss the Problem Solving exercises in this
chapter with other students.

The Learn How To exercises apply to students’ every day life what they learn in each chapter. These
hands-on activities solidify the concepts presented in the chapter with practical application.

Learn It Online exercises offer students additional information, resources, and activities related to
the topics presented in the chapter.
Discovering Computers & Office 2010 Instructor’s Manual

Page 11 of 12
In the Web Research exercises, students use various Web resources to find out more features related
to this chapter. Encourage students to use their browsers and the link in each exercise or a search
engine to complete selected exercises.
Discovering Computers & Office 2010 Instructor’s Manual
G
Glloossssaarryy ooff K
Keeyy TTeerrm
mss












































administrator account (144)
adware remover (155)
anti-spam program (155)
antivirus program (288154)
automatic update (143)
backup utility (152)
booting (138)
buffer (141)
cold boot (138)
command-line interface (139)
defragmenting (152)
disc burning software (157)
disk cleanup (152)
disk defragmenter (152)
driver (142)
embedded operating system (149)
file compression utility (156)
file manager (151)
folder (151)
graphical user interface (GUI) (139)
hibernate (138)
image viewer (151)
Linux (148)
log on (144)
Mac OS X (147)
Macintosh operating system (147)
media player (156)
memory management (141)
multiprocessing (141)
multiuser (141)
operating system (OS) (137)
password (144)
performance monitor (143)
personal computer maintenance utility
(157)
personal firewall (153)
phishing (156)
phishing filter (156)
Plug and Play (142)
pop-up blocker (156)
queue (142)
restore utility (152)
screen saver (153)
search utility (151)
server operating system (143)

























Page 12 of 12
service pack (143)
sleep mode (138)
spam (155)
spooling (141)
spyware remover (155)
stand-alone operating system (146)
system software (136)
Trojan horse (154)
uncompress (156)
uninstaller (151)
UNIX (147)
user ID (144)
user interface (138)
user name (144)
utility (150)
utility program (150)
virtual memory (141)
virus (154)
warm boot (138)
Web filtering software (156)
Windows 7 (146)
Windows Aero (139)
Windows ReadyBoost (141)
worm (154)
zipped files (156)
Top of Document