Programs of various types are included in the system security program. Vikoristan literature. Principles of operation of operating systems

What is the computer hardware? The whole thing, monitor, processor, video card. Overhauled devices do not work on their own. To combine them and bring them into action, you need a system security program or service software. This includes components that need to interact with a computer and other human programs.

Operating system

Go to the “My Computer” section and open drive C. Create a folder called Windows. It knows your operating system, or OS. This software is designed to interact with the processor, RAM, and other computer hardware.

The OS is included in the system software warehouse and is its base part. It is a set of programs that controls the hardware of the machine, launches utilities and add-ons. The OS controls connected input/output devices and the overall operation of the computer. In a word, this is the place where software and software come together.

Types of operating systems

UNIX, Windows-98/XP/Vista or Mac OS are types of operating systems that are included in the system software package. This is what you read when you start the computer and stay with it. Let there be a difference between the OS name and the vendor company.

  1. Real time operating systems: FreeRTOS, KeilRTX and QNX based on Unix. Vykoristovuyutsya in the industry, for the production of machines, scientific devices, automated conveyors. They are distinguished by a minimal interface of the back office and a variety of utilities of the end back box. Intended for execution of processes not in a logical, but in a real hour, so that each task has its own deadline.
  2. Single-player and single-tasking operating systems: PALM, MS-DOS. Systems in which it is allowed to vacate at one time or more than one task for a single koristuvach. This type of OS was developed until 2009 for Palm computers.
  3. Single-system, multitasking operating systems: Windows, MacOS. Enter the warehouse of system software for the security of most current computers. Allow one user to sign up at a time on a PC or laptop. For example, you can work in a text editor and listen to music instantly.
  4. Covered with a wide variety of OS: Linux, VMS. A number of users are allowed to use the resources of one computer at a time without affecting the hour. Access is available from other computers or terminals.
  5. Mobile OS: Android, iOS. There is a significant increase in software for personal computers. Mobile devices have no cable management. Therefore, the system is limited by energy resources. Mobile platforms have a different user interface, since control is performed not with a mouse, but with an additional touch screen. They can also support the functions of network communication, GPRS and Wi-Fi.

Merezha operating system Network OS

Enter the warehouse of system software for servers, firewalls, routers and other edge devices. Vikorystvayasya for client PCs, so the difference between the distributed and border OS is not always noticeable.

Merezhe OS contains the following functions:

  • file and sign exchange;
  • administration of cloud records of corporate clients;
  • security of data.

Merger operating systems are shared on a peer-to-peer basis, without relying on a centralized connection node or client-server. The list of the most popular Network OS includes the following security programs:

  • Cumulus Networks – Linux distribution;
  • Switch Light;
  • Open Network Linux;
  • PICA8 for switches;
  • Dell Systems;
  • NX-OS is a premium and highly productive OS, developed by Cisco.

Operating membrane

The warehouse of the system software for the desktop PC includes the OS shell. This is a visual indication of the interface’s interaction with the operating system. And a complex of programs for the operating system.

All information in the computer is located in a sequence of 0 and 1. The shell is required in order to allow people to interact with the machine through programming. Vaughn interprets it as translating operating system commands from a reasonable, savvy view.

There are two types:

  1. Text shell and command row. You can find it in the additional start menu. In the field with the inscription "Know programs and files" enter cmd.exe. and press the introduction. It appears unattractively with a black background and English writing - this is the text operation shell. Click on it with a bear. You also understand special characters, scripts and language programming.
  2. Graphic shells. These are the windows, icons, and menus on the desktop that you use to control your computer mouse. Working with a graphical shell is much easier, which is what most current operating systems do.

Utilities

The system software warehouse includes programs that support additional solutions to additional tasks. This is a special service software. If the operating system is not capable of shutting down any highly specialized robot, such as rechecking a disk, utilities are turned on.

The work of the utilities is completely focused on the computer infrastructure. Services programs are responsible for disk space, RAM and storage. Tse is the duration of applied PP.

Utilities do not play music, do not display photos, and are not oriented towards users. Most of them rely on high-tech jobs and rely on people with advanced computer knowledge.

See the functions of utilities

The transfer of service programs is included in the storage of system software. They won't be interested in solving the riddle right away from the OS. Only people in the world can consume it or use it themselves. The list of running utilities can be seen in the "Watch Manager" window.

Installed utilities are located on the hard drive and have the following functions:

  • archiving and compression of files;
  • disk defragmentation, cleaning and troubleshooting;
  • disk space manager;
  • diagnostics of computer equipment;
  • robot with additional features, and reinstallation;
  • security guard;
  • cleaning the registry;
  • keruvannya with avtozavantazhenya programs;
  • Intermediate utilities for setting up the Internet and connecting.

Additional security software

There are several utilities included in the PC system software package, including additional service software. It is downloaded and installed from third-party resources. It greatly expands the capabilities of the operating system and makes it easier to work with files:

  1. Antivirus is not a basic software utility. Of course, Microsort Corporation says that Windows users are protected by Windows Defender. But the practically vaunted antivirus is not enough. After an hour of testing in the laboratories of AV-TEST Defender from Microsoft, missing 20% ​​of threats. Therefore, for complete security, you need to install Avast, AVG or another software package that suits you.
  2. CCleaner is a simple and cost-free utility with a user-friendly interface. Intended for cleaning the registry, cache, robots and programs.
  3. The software package includes system browsers. For Windows there is the complex Internet Explorer or Edge, Safari for Mac OS. You can always replace them with Firefox, Opera and Google. It is enough to download the installation file from the official website and replace the browser in settings.

Drivers

This security program, in addition to the operating system and other software, will deny access before entering the computer. Every device has its own driver. These systems are installed independently, without the participation of a contractor. For example, drivers for bears, keyboards, webcams with the “Window and Play” technology.

Printers, scanners, video cards require installation of drivers, which means the device comes with a factory-installed device. For the sound card, processor and other system elements, the installation drivers are written by the motherboard driver on the adjacent disk.

Drivers that are part of the system software must be updated. You can install automatic update installations using DriverPack or Driver Booster. If the driver is only in order on one device, then you need to do it manually.

Incorporated programs

Computers, telephones and digital devices create a basic I/O system for hardware setup. A set of microprograms or firmware with a simple interface. The most common software is the BIOS.

The BIOS on the motherboard is located on a special chip. You can wait until you start your computer by pressing F1. The program will reset all low-level machine parameters and instructions. Without it, we don’t know the PC, how can we work.

DBMS

The warehouse of advanced system software includes a DBMS. This is a set of programs that ensure interaction between the end server, other programs and a database for collecting and processing information. The DBMS consists of three elements:

  1. Physical database: collection of files from data.
  2. Saving subsystem: a security program that provides access and modification to the database.
  3. Database schema: a specification of the logical structure of data like a database.

A DBMS is required to save information. A simple example - typing documents on a work computer. To avoid creating chaos from videos, photographs, and books, the clerk sorts and organizes all documents into folders. You can always find the required file at any time.

The DBMS works in a similar way to the description of the file system, but is much more effective. Functions of the database management system:

  • optimization and storage of duplicate information;
  • quick search for data;
  • security and confidentiality of information, subject to restricted access;
  • backup and update;
  • integrity and usability of the data structure;
  • description of the data.

There are different types of control systems that provide a way for the user to interact with information. Database managers and single-party or desktops are also insured for a large number of clients.

So, why enter the warehouse of system software? Archives, Bios, antiviruses, these are service software that will ensure the operation of the entire computer system. Intellectually listed components are divided into three groups. First - this is the basic software, including the operating system, utilities, drivers and shell. Another - firmware for a computer or digital device. The remaining group is an intermediate security program that consists of database management systems.

Operating systems

Basic ideas of the OS

The predecessor of the OS was to include service programs (scanners and monitors), and create libraries of frequently used subprograms that began to develop with the advent of universal computers of the 1st generation (late 1940- x). Service programs minimized the physical manipulations of the operator with possessions, and libraries allowed for the most one-time programming of these actions (these operations of input-output, calculation of mathematical functions, etc.).

Incorporated programs

Basic functions of the DBMS

  • storing data in external memory (on disks);
  • storing data in RAM and disk cache;
  • logging changes, backing up and updating the database after failures;
  • support of language database (language acquisition of data, language manipulation of data).

Classification of DBMS by method of access to the database

  • File servers

In file server DBMSs, data files are centralized on the file server. The DBMS core is located on the client computer. Access to the data is provided through a local network. Synchronization of reading and updating is supported by file blocking. The advantage of the architecture is the low demand on the server CPU, and not so much the high demand on the local network.

Currently, DBMS file servers are considered obsolete.

Such DBMS consists of a client part (including the application program warehouse) and a server part (div. Client-server).

Div. also

Literature

Vasilyev V.G.

Posilannya


Wikimedia Foundation. 2010. Glossary of business terms

system software- - Topics of electrical connections, basic concepts EN systems software ...

system software- 3.41 system software: Part of the software of a control system that is created for a specific computer or family of devices with the method of facilitating the development, operation and modification of these objects and related...

system software- The software supplied by the robot control system is designed to organize its functioning. Polytechnic terminological dictionary

The PlayStation Portable system software has been updated with official firmware for the PlayStation Portable. Updates add new capabilities and make security corrections to prevent programs from running without... ... Wikipedia

The PlayStation®3 system software is the official firmware for the PlayStation 3. It is controlled by the XMB graphical interface. The update data is 100 192 MB in size and is stored together.

Part of the basic software of a digital switching station (node), which ensures the distribution of control and transmission resources of the switching system. [GOST 28704 90] Topics of electrical connections, basic concepts and common terms. Adviser of technical translation

System software for digital switching station (node)- 30. System software for a digital switching station (node) Part of the basic software for a digital switching station (node), which ensures the distribution of resources for control and transmission of the switching system. Glossary of terms of normative and technical documentation

System software for digital switching station (node)- 1. Part of the basic software of a digital switching station (node), which ensures the distribution of control resources and transmission of the switching system Vikorist in the document: GOST 28704 90 Unified system of switching functions… Telecommunications dictionary

Computer software is a set of programs, procedures, instructions, as well as the technical documentation associated with them, which allows you to use the EOM to achieve the required tasks.

Click on the security software:

Ensure the effectiveness of the EOM;

Ensure the relationship between the customer and the EOM;

Expand the resources of the computational system;

Promote the effectiveness of promotional resources;

Increase the productivity and vibrancy of your work.

There is a close relationship between other mathematical and software programs of the computer system, as well as between its nodes and blocks. Such interconnection is ensured by the division of the PZ between several mutual levels. The skin's underlying rhubarb, based on the rhubarb safety program below, promotes the functionality of the entire system.

Interactions between the levels and programs of the system PZ can be submitted using additional schemes (Fig. 3.1).

Small 3.1. Rivni and system software security programs

Basic security software occupies a special place in computer architecture. On one side, it can be seen as a storage unit of hardware, on the other side, it is one of the software modules of the operating system.

The basis of system software is made up of programs that are included in the operating systems (OS) of computers. The purpose of such programs is to control the operation of all devices of the computer system and organize the interaction of various processes such as the computer is running programs. This includes programs that ensure the display of information on the display for manual viewing, dialog programs for compiling surrounded natural language, as well as broadcast systems that can be translated by machine Howl programs, written language programming.



Another complex of software and services. There are a wide variety of service programs that are used during computer maintenance and repair work - editors, editors, diagnostic programs, archivers, anti-virus programs and other additional programs. These programs can easily communicate with your computer. They are supplemented with programs that ensure the operation of computers at the edge. They implement network protocols for exchanging information between machines, working with shared databases, and teleprocessing information.

The entire set of programs that run the software in which the computer operates is called system software. And the richer the system software, the more productive the work on the computer becomes.

However, in the middle of the program, several programs can enter that destroy its work. There are a variety of programs for unauthorized access to data and programs, computer viruses and other software features that “break” the security of the software core.

Let's look at the report on the programs that go into the computer's system software.

Basic security software. The base software, or BIOS, is a program that is responsible for managing all the components installed on the motherboard. In fact, the BIOS is an invisible stock system board and can therefore be classified as a special category of computer components that occupy an intermediate position between hardware and software.

The abbreviation BIOS stands for Basic Input/Output System – basic input/output system. Previously, in the IBM PC system, the main purpose of the BIOS was to support the function of entering and exiting the structure of the OS interface for interacting with hardware. In the meantime, its functions have expanded significantly.

Another important function of the BIOS is the testing procedure (POST - Power On Self Test) of all equipment installed on the motherboard (besides additional expansion cards) after turning on the computer.

Before the testing procedure includes:

Checking the feasibility of the electrical heating system;

Initialization of system resources and microcircuit registers;

Random access memory testing;

Keyboard connections;

Testing of ports;

Initialization of controllers, identification and connection of hard drives.

During the process of initialization and testing of the BIOS, the same system configuration data with information that is stored in CMOS - a special non-volatile memory - is removed on the system board. Data storage in CMOS is supported by a special battery, and the information is updated whenever any BIOS settings are changed. This memory itself saves the remaining information about system components, the exact date and time, as well as the password to enter the BIOS or the settings of the operating system (as in installations). When the battery is damaged, damaged or removed, all data in the CMOS memory is reset to zero.

The third important function, as the BIOS differs from the IBM PC clock, is the modification of the OS. Current BIOS allow you to install the operating system not only from a disk or hard drive, but also from CD-ROM, ZIP, LS-120, and SCSI controllers. Having identified the type of device being downloaded, the BIOS starts searching for programs to download the OS on the device or redirects the request for downloading to the BIOS of another device. Once the confirmation is removed, the downloaded program is placed in RAM, and information about the downloaded system configuration and device drivers of the operating system is obtained.

With the advent of Pentium processors, the BIOS began to add another function - power-up, and with the advent of motherboards of the form factor (standardized sizes) ATX (Advanced Technology extended) - the function of enabling and disabling the driver ate life according to ACPI specification ( Advanced Configuration and Power Interface - advanced configuration and power management interface). There is also a specification for APM (Advanced Power Management - push the control of heavy power). Their importance lies in the fact that ACPI is determined primarily by the characteristics of the OS, and workstation - by the characteristics of the BIOS.

There are very few companies that are engaged in the development of software for BIOS. There are three prominent ones: Award Software (Award BIOS), American Megatrends, Inc. (AMI BIOS) and Microid Research (MR BIOS). However, most computers today are running different BIOS versions from Award Software. The user interface of different versions and different BIOS versions may vary greatly, but system calls are strictly standardized.

Fіzichno BIOS is known in the yergonalizhniye flash -pam'yati, prying, Yaka inserts into the specially a block on the mother’s plate (on the MIKROSCHEMICA є Yaskrava, the sticker with the logo of the FIRMI - the ROZORBOLIK PZ for BIOS).

Operating system- A whole complex of core programs that act as an interface between the components of a personal computer and ensure the efficient use of EOM resources. The operating system ensures interconnections and control of all computer elements and embedded programs. The maintenance of the operating system occurs when the computer is turned off. We will look at the operating system in more detail in section 3.2.

Operating shells (file managers)- These are programs that allow you to perform actions by managing computer resources within a more sophisticated, manual and intuitive user interface. These are software products that make it more comfortable for a computer to work with a computer. These are independent programs, which make it easier to work with the operating system, directories and files.

Essentially, all file managers combine similar functions - operations with files: copying, moving, deleting, renaming, viewing, sorting, aligning and many other operations. It is also possible to perform group operations on files. It is up to the manager to ensure the ease of work, comfort, and therefore the productivity of the employee. There are few advantages between such programs, and the advantage of one or the other is determined by the qualification of a correspondent.

Norton Commander This is the first and most popular file manager in the 1980s, created by the world-famous company Symantec. For the time being, I stood like a stare in front of the computer center. Ale progress without standing alone. With the development of the computer industry and the emergence of more sophisticated technology, and obviously new software, Norton gave up his positions to other managers, functional and thorough.

Far manager Created by the author of the famous WinRar archiver Evgen Roshal. It was created specifically for the Windows operating system and works regardless of the installed version of Windows. The program understands long file names, which works correctly with Russian letters. Until then, this program will be deprived of one of the most popular managers.

Windows Commander Along with Far, it is the same popular program that has recently become known as Total Commander. The program is deeply integrated into the operating system and allows you to deny access to almost any file, can add a lot of capabilities, and allows you to increase your capabilities by installing additional extensions.

There are many similarities between Far manager and Total Commander; they completely cover the basic keyboard commands. The benefits lie mainly in the current appearance of the windows, the frame, and the current color design.

Movie programming. Obviously, there are tens of thousands of ready-made programs that traders may need so that they don’t hesitate or don’t bother with ready-made programs. In such cases, for the development of new programs, programming systems are used - a set of programs that are used to automate the process of developing programs.

Language programming - I will write down a program for EOM. The first languages ​​used to program languages ​​were Algol, Fortran, BASIC, Pascal.

At this time, your programming can be expanded to four groups. It should be noted that there is no such language that would satisfy all areas of programming and the interests of all programmers. Such a language in a skin situation has to be chosen by the distributor of programs based on the level of qualifications and power advantages.

Low level movie programming. Low-level movie programming - ce machine movies - (Assembler movies). Commands of such language are more intelligent to the processor, less expensive. Language Assembler is intended for writing system programs, and is used mainly by system programmers, such as decomposing programs, controlling the robot of a computing machine, and automating the process of decomposing application programs.

The fragments of the commands of different processors are different, then when choosing such systems we have to use them for each specific process. For these reasons, written programs cannot be transferred to another processor. Currently, low language languages ​​are used to write mainly device drivers and stock operating systems for personal computers and supercomputers. Before such language there is language Assembler and before the singing world C.

Movie programming of high level. Movie programming of a high level - not non-machine language. They made it clear to us that they don’t have computers, so they don’t care about creating almost all programs for personal computers on them. High-level programming makes it easier for many programmers who have important functions, which require thousands of rows of code to create at a low level.

My greatest respect is for Basic, which evolved from the 1960s as a basic language. Available versions of Visual Basic7 and QBasic. Our Pascal programming was developed by N.Virt, the founder of many programming ideas dating back to the 1970s. Pascal has the ability to create large projects, but can also successfully implement small programs. Delphi2006 is currently the most intense visual medium of Pascal.

To mov high level lie:

Procedurally oriented movies. I will especially record the procedures and algorithms for processing information for the singing class. They come in languages ​​such as Fortran, BASIC, C(C), Pascal.

Problem-oriented movies. In connection with the constant expansion of the sphere of stagnation of computational technology and the emergence of entire classes of new tasks, it was necessary to find solutions. Before them lie the language - Lisp, Prologue.

Object-oriented movies. Є development of versions of procedural and problematic languages. Programming with the help of this group is simple and straightforward. This group should be assigned to – Visual Basic, Delphi, Visual Fortran, З++(З), Prolog.

For the Windows operating system, Microsoft created the Visual Basic family of computers in the mid-1990s as a basic method for developing software for personal computers.

Movi Web-programming. The development of Internet calls before the emergence of clearly new movs - mov programming for merezhs:

The main and most important language of this class is HTML, the language for forming a document. What is important is the number of Internet users that obey its rules and abide by the new ones.

Java Java is a non-machine-dependent language programming for EOM corporate networks, created by Sun.

Javascript is a network of hypertext subprograms (scripts) that can be accessed by browsers of any personal EOM, connected to a local or global EOM network. This language is recognized by the international standard for language scripts for all browsers.

PHP is the most popular interpreted Internet language. There are a lot of websites based on it. It’s simple, it allows you to solve the problem of the system with websites.

Perl. In terms of tightness, it is significantly different from type C. It has introduced a personal function for working with rows, arrays, and all sorts of ways to transform data.

Movie database programming. Relational databases are sets of tables with rows and columns. Each table has a fixed number of columns that can be specified in their descriptions, and a variable number of rows that can be changed during the hour of work with the database.

In other types of programming, our programming of databases is divided into their own tasks - databases. The language of SQL queries is structured into a single work with databases. This being said, be it a database management system (DBMS), other than that, many DBMSs also have their own unique language, focusing on this DBMS itself and not being transferred to others.

The main types of queries in Movi SQL are:

Creation of tables and databases;

Selecting information from databases;

Editing information from the database;

Database administration.

As there is a lot of programming, SQL has many varieties. So, My SQL is a comprehensive SQL center, focusing mainly on Web-based developments, but you can also use it as a standard database.

Interpreting and compiling films. It’s difficult to create a program using a machine program. To make this process easier, non-machine languages ​​were broken down - high-level language programs that work behind additional broadcast programs.

There are two types of translators:

1. Programs - interpreters are used for direct, command-by-command generation of programs for EOM without translating them into machine language. They scan and verify the output code with the program. The interpreter initially scans the skin operator with the method of reading together, and then concludes the entered operation. The interpreter is always ready before handing over the program with a method to control the correctness of its actions. Tsomu has program advantages. A short program will clean the low fluidity of the robot. All comments and other formal details are constantly stored in the computer’s memory and take up a lot of space there, a lot of time is spent on doing what needs to be done, and not just done. Interpreters cannot be added to the programs they run on.

2. Programs - compilers - this program will translate programs for EOM by machine language. This is the translator of the machine text. The program evaluates the text according to the syntactic structure of the language and transfers it to machine language. The compiler does not convert the program's tasks, it breaks it down itself. After running the program, there is no need for compilers. The main advantage of compilers over interpreters lies in the significantly shorter runtime of programs.

Drivers and utilities. This is a group of programs that will ensure the highest level of technical maintenance and service interaction between devices and the provision of basic services.

There are a lot of hardware options for computing technology, and it is impossible to describe all the options for their interaction. In order to install a software control device, the driver will ensure the necessary flexibility of the hardware and software configurations of the computing systems.

Device drivers are programs that enable interaction with specific devices.

Whenever releasing any device, retailers add up to a new number of drivers for the main operating systems (they are added to the device before selling the hardware on the disk). Thus, the operating system can retrieve drivers obtained from device vendors, or drivers from a data base, or downloaded from the Internet. Drivers provide an entry point for interaction with application programs. The creation of such programs can be configured manually or automatically.

System utilities– these programs, which operate on the system level, expand the capabilities of operating systems and operating shells (for example, connecting new peripheral devices, encoding information and managing computer resources).

System utilities will provide:

Diagnostics of a personal computer - checking the configuration of the computer and the usefulness of its devices;

Optimization of disks – to ensure full access to information that is stored on the hard disk;

Cleaning disks – ensures the recovery and removal of unnecessary information;

Accelerating access to data on the disk by organizing RAM cache buffers to accommodate frequently abused parts of the disk;

Dynamically compressing disks – increasing the amount of information that is saved on the hard drive by reducing compression;

Packing data on a hard disk using special methods of compressing information.

System software (System Software) - these programs and software complexes for computer robots and telecommunications equipment. System Software acts as a “transfer-synchronist” between the computer system and the hardware. One of the classifications before the system software is the service (service) software program, and the other classification of software is the domestic software program, which consists of the base and service software.

How it is possible to bring those and other security programs to the system level depends on the needs prescribed for a specific context. A different point of view (more broadly) is considered if you consider both the basic software (not to be confused with the BIOS) and the service software before the system software (SPO). These operating systems, shells, utilities, drivers, programming systems, database management systems, software.

SPO serve:

  • for the creation of an operational center for the work of other programs;
  • to ensure reliable and efficient operation of the computer and telecommunications network;
  • for diagnostics of computer equipment and measurements;
  • for data archiving, copying, updating files, database programs, etc.

The system software “organizes” the operation of all components of the computer, as well as connections to new peripheral devices.

Respect 1

System software is reliable, technologically advanced, user-friendly and effective in Vikoristan. The software products of this group are distributed mainly to computer professionals: network administrator, system programmer, application programmer, operator. Tim no less, knowledge of the basic technology of work and open software is required by qualified personal computer technicians, who, as a rule, independently create maintenance programs for the data on the computer, and not just work on their own mi programs.

The open source software is developed on the base and service.

Basic security software. This includes:

  • operating system (OS) and drivers in this warehouse;
  • operational (interface) text and graphic shells for interaction between the computer and the OS, as well as the file storage system;
  • a back-to-back operational system that provides clients with various types of back-office services (e-mail, file sharing, back-office processes, etc.).

Service software − programs and software complexes that give more capabilities to the basic software and organize a powerful middle ground for work. Such programs are often called utilities (in addition to antiviruses, this term is not related to them).

Malyunok 1.

Viznachennya 1

Utilities− programs that are used for maintaining computers or for performing additional data processing operations, such as diagnosing hardware and software problems, optimizing disk space, updating stored information on a magnetic This disk is the same.

Main purposes of utilities− automation works from verification, adjustment and adjustment of the computer system.

This set of service programs, which can be additionally installed, can be classified according to the following rank (behind the functional sign):

  • drivers for specific and special devices (not supplied from the OS warehouse);
  • installation monitors, designed to control the installation of the software;
  • the means of control (monitoring) that allow monitoring of the processes that take place in the system;
  • methods of diagnosing computer performance; They are used to optimize the operation of the computer system, and to troubleshoot problems, for example, the Disk Defragmentation utility allows data that belongs to one file and is located in different segments of the disk to be combined into one single file. in the data area;
  • Computer security methods, including active and passive protection of data in the event of any tampering, unauthorized access, revision and/or change of data:
    • o the features of active protection - anti-virus programs, which are necessary to ensure the protection of the computer, detect and detect infected files;
    • o features of passive protection - disk maintenance programs, which ensure control of the security of the file system on the logical and physical levels, check the acidity of the surface of a magnetic disk, create backup copies of disks, backup external data x noses, squeeze the discs then.
  • Data archiving programs are designed for creating archives, which will make it easier to save files without changing the amount of memory. Most popular archivers WinZip, WinRAR, 7Zip;
  • file managers that are required for most operations related to the maintenance of the file system: navigate the file structure, create directories (folders), select remote files and directories, copy , move and rename files, delete search files. The most popular for Windows OS are Total Commander (more than Windows Commander) and FAR Manager, for Linux – Midnight Commander;
  • servicing programs. These are communication methods that allow you to establish connections with remote computers, participate in teleconferences, serve the transmission of electronic mail, etc. The basic software program, as a rule, comes with the computer, and the service software can be added additionally.

Another classification of system software

Open source software traditionally includes:

  • system maintenance programs,
  • system details of programs.

System support programs organize the correct operation of all system devices. These, as a rule, are resident programs (they reside in the main memory), which form the OS kernel. Curious programs that focus on the riddle immediately before the puzzle are called transitive.

Basic functions of system core programs− management of computational complexes, management of computational processes and work with internal OS data.

System hardware programs are supplied by vendors and distributors in the form of OS installation packages and drivers for special devices.

System components are categorized as special applications and add-ons. They are most often supplied with distribution packages that include security programs.

Software security– the totality of programs ready for release that are stored in the computer’s RAM and external memory.

The entire activity related to the design and development of the software is also included in the software support (PS). :

  • software design technology (for example, low-level design, structural and object-oriented design, etc.);
  • program testing methods;
  • methods for proving the correctness of programs;
  • analysis of the cost of robotic programs;
  • documentation of programs;
  • development and development of software features to facilitate the process of software design, and much more.

The security software of today's computers includes millions of programs, ranging from gaming to scientific ones.

See software security

There are three main types of software security: system, application and instrumental.

Application program or else supplement- a program designed for the selection of singing departments of the koristuvach and is designed for full cooperation with the koristuvach. In most operating systems, application programs cannot access computer resources directly or interact with the resources. for additional operating system help. Also in my simple way - additional programs.

Representatives of applied software:

Text and graphic editors

Programs with electronic tables

Database management systems

Please take a look at the web pages

Basic systems, electronic encyclopedias, games

Specialized software systems are designed for automation of a wide range of professional activities, for example, banking systems.

Security software- software intended for development during design, development and support of programs, for the management of application and system software.

p align="justify"> When developing software, it is necessary to present algorithms in a form accessible to the computer. Therefore, complexes of programs are being developed, called programming systems. They are the basis of instrumental software.

Before instrumental programs, for example, you should:

  • editors;
  • design the program layout;
  • nalagodzhuvalni programs, then. programs, which help you know and obtain benefits from the program;
  • additional programs that implement system actions that are often abused;
  • graphic software packages etc.

System software- this is a set of programs that ensure effective management of the components of a computer system, such as a processor, RAM, input-output devices, edge devices, acting as an “interface”, hardware on one side, and core accessories on the other Istuvaca . In addition to application software, the system does not control specific application tasks, does not ensure the operation of other programs, manages the hardware resources of the computing system, etc.

The system software is intended for:

  • creation of an operational middle ground for the functioning of other programs (in other words, for the organization of programs);
  • automation of development (creation) of new programs;
  • ensuring reliable and efficient operation of the computer itself and the calculation system;
  • carrying out diagnostics and prevention of computer equipment and computational measures;
  • implementation of additional technological processes (copying, archiving, updating program files and databases, etc.).

System software is decomposed so that the computer can efficiently install application programs.

An application program is a specific program that solves a particular problem within a given problem area.

Application programs can be of a malicious nature, for example, to ensure the storage and management of documents.

The system software includes drivers - programs that run input-output devices and other devices that allow you to configure the parameters of their devices. This also includes antivirus and programs related to computer maintenance. System programs are often called utilities (lat. utilis - brown).

Utilities either expand and add various capabilities of the operating system, or carry out independent important tasks. We will briefly describe the different types of utilities:

  • control programs, testing and diagnostics, which are used to verify the correct functioning of computer devices and identify malfunctions in the operating process; indicate the reason and place of malfunction;
  • driver programs that expand the capabilities of the operating system with hardware input-output devices, RAM, etc.; with the help of additional drivers, you can connect new devices to your computer or use non-standard devices;
  • Packer programs (archivers) that allow you to record information on larger disks, as well as combine copies of several files into one archive file;
  • anti-virus programs designed to stop infection by computer viruses and eliminate the legacy of virus infection;
  • programs for optimization and control of disk space;
  • programs for updating information, formatting, data protection;
  • communication programs that organize the exchange of information between computers;
  • programs for memory management that will protect your memory;
  • programs for burning CD-ROM, CD-R and many others.

The most important part of the system software is the operating system.

An operating system is a set of software components that ensures the management of the computer hardware and application programs, as well as their interaction with each other and the computer.

The operating system is the basic and essential storage of computer software.

The operating system ensures the maintenance of all hardware components of the computer.

Structure:

  1. Kernel - transfers commands from your program to the language of “machine codes”, which is sent to the computer.
  2. Drivers are programs that support devices.
  3. The interface is a shell that allows the user to connect to the computer.

OS features:

  • Memory management;
  • Controlling access to I/O devices;
  • File system management;
  • Managing the interaction of processes; process dispatching;
  • management of local resources;
  • The inclusion of programs in RAM is the same;
  • Interface from the correspondent;
  • Inter-machine interaction (interference);
  • Protection of the system itself, data and programs;
  • Differentiation of access rights and insurance coverage for the richly regulated work regime.

The operating system includes the following functions:

Securing the interface of the user, so that the software facilitates the dialogue between a person and a computer;

Managing the software of other programs on the computer, including organizing their access to devices (processor, memory, input-output devices);

Manage saved information on your computer using a hierarchical folder system such as storing files.

The functions of the operating system include:

  • development of dialogue with koristuvach;
  • data entry, display and management;
  • planning and organization of the program development process;
  • division of resources (RAM and cache, processor, external devices);
  • launching a wiki program;
  • all additional maintenance operations;
  • transfer of information between various internal devices;
  • software support for the operation of peripheral devices (display, keyboard, disk drives, printer, etc.).

The main reason for the need for an operating system lies in the fact that basic operations for working with computer devices and managing computer resources are operations of a very low level, such as those that are necessary for computers. their programs, there are hundreds and thousands of such elementary operations.

The operating system receives unnecessary details from the machine and provides a manual interface for operation. It also includes various additional activities, such as copying or other files. The operating system now takes control of the RAM of all programs, transfers control to the start of their work, changes various actions to power the compiled programs and saves the RAM that the program is occupied by. mothers, when they are completed.

The axis is the name of the most advanced operating systems for personal computers: MS-DOS, Windows, Linux.

The operating systems are different, but their meanings and functions are the same. The operating system is the basic and essential software of the computer; without it, the computer cannot operate in principle.