Thursday, 13 October 2011

TUGASAN OPERASI SISTEM

 TUGASAN 1

 Memory management

Memory management is the act of managing computer memory. In its simpler forms, this involves providing ways to allocate portions of memory to programs at their request, and freeing it for reuse when no longer needed. The management of main memory is critical to the computer system.
Virtual memory systems separate the memory addresses used by a process from actual physical addresses, allowing separation of processes and increasing the effectively available amount of RAM using paging or swapping to secondary storage. The quality of the virtual memory manager can have a big impact on overall system performance.


Objectives Memory Management 
  • To provide a detailed description of various ways of
  • Memory management allows you to make sure that precious memory space isn't taken up by objects that no longer have a purpose in your application, and that objects that are still needed continue to exist. After an object has been created and you finish using it, it will need to be disposed of so that memory isn't taken up needlessly.
  • When an object becomes detached from an application's control without being "de-allocated," memory is wasted.
  • including paging and segmentation.

Concept Memory Management 
  • Protection of memory required to ensure correct operation.
  • Memory is central to the operation of a modern computer System. Memory consists of a large array of words or bytes each with its own address. The CPU fetches instructions from memory according to the value of the program counter. These instructions may cause additional loading from and storing to specific memory addresses. I have discussed a typical instruction-execution cycle in the previous article. In this article I will discuss on basic hardware issues, the binding of symbolic memory addresses to actual physical addresses and distinguishing between logical and physical addresses.

virtual memory implementation
In computing, virtual memory is a memory management technique developed for multitasking kernels. This technique virtualizes a computer architecture's various forms of computer data storage (such as random-access memory and disk storage), allowing a program to be designed as though there is only one kind of memory, "virtual" memory, which behaves like directly addressable read/write memory (RAM).

  • use hardware memory more efficiently than do systems without virtual memory
  • the program has, by default, sole access to this virtual RAM module as the basis for a  contiguous working memory.

 Segmentation
  • Memory-management scheme that supports user view of memory
  • A program is a collection of segments. A segment is a logical unitsuch as:
            main program
-                            procedure
-                    function
-                    method

PAGING
  • ·         Logical address space of a process can be noncontiguous; process is allocated physical        memory whenever the latter is available
  • ·         Divide logical memory into blocks of same size called pages
  • ·         Keep track of all free frames
  • ·         To run a program of size n pages, need to find n free frames and load program
  • ·      The main advantage of paging is that it allows the physical address space of a process to be  noncontiguous

Explain memory relocation of paging system

In computer operating systems, paging is one of the memory-management schemes by which a computer can store and retrieve data from secondary storage for use in main memory. In the paging memory-management scheme, the operating system retrieves data from secondary storage in same-size blocks called pages. The main advantage of paging is that it allows the physical address space of a process to be noncontiguous. Before the time paging was used, systems had to fit whole programs into storage contiguously, which caused various storage and fragmentation problems.



TUGASAN 2

INPUT & OUTPUT MANAGEMENT

  • Management Data Input/Output (MDIO), or also Media Independent Interface Management (MIIM), is a serial bus defined for the Ethernet family of IEEE 802.3 standards for Media Independent Interface, or MII. The MII connects Media Access Control (MAC) devices with Ethernet physical layer (PHY) circuits.
  • The plug and play manager dynamicaly recognizes when new devices are added to the system and allocates and deallocates resources,such as input & output ports or DMA channels, to them.
  • input output management also becomes one of the primary responsibilities of an operating system. In this chapter we shall examine the role of operating systems in managing IO devices.

Elaborate the concept of buffering 

  • The program is so complex, sehinnga programmers themselves do not know the weaknesses of the program 
  • The paradigm of "buffering" is used increasingly for the description of diverse "systemic" phenomena encountered in evolutionary genetics, ecology, integrative physiology, and other areas.
  • The units allow either the time-independent, "static" buffering properties or the time-dependent, "dynamic" ones to be measured. Analogous to this "resistance to change", one can define and measure the "conductance to change"; this quantity corresponds to "set-point tracking" in feedback-control systems.
  • Relies on external data to control the program



Recognize spooling technique
  • Spooling is useful because devices access data at different rates. The buffer provides a waiting station where data can rest while the slower device catches up.
  • Spooler or print management software may allow priorities to be assigned to jobs, notify users when they have printed, distribute jobs among several printers, allow stationery to be changed or select it automatically, generate banner pages to identify and separate print jobs, etc.
  • This temporary working area would normally be a file or storage device.
  •  
     
TUGASAN 3

Also referred to as simply a file system or file system.
  • For example, a hierarchical file system is one that uses directories to organize files into a tree structure. 
  • A file system (filesystem) is a means to organize data expected to be retained after a program terminates by providing procedures to store, retrieve and update data, as well as manage the available space on the device(s) which contain it. A file system organizes data in an efficient manner and is tuned to the specific characteristics of the device. 
  • There is usually a tight coupling between the operating system and the file system. Some filesystems provide mechanisms to control access to the data and metadata. Ensuring reliability is a major responsibility of a filesystem. Some filesystems provide a means for multiple programs to update data in the same file at nearly the same time.
  • These systems interact smoothly with the operating system but provide more features, such as improved backup procedures and stricter file protection.  

 
 
File Sharing


  • File sharing is the practice of distributing or providing access to digitally stored information, such as computer programs, multimedia (audio, images, and video), documents, or electronic books. It may be implemented through a variety of ways
  • Network File System (NFS) is a common distributed file-sharing method
  • file sharing include manual sharing using removable media  
 
Directory Structure
  • Directory structure is the way an operating system's file system and its files are displayed to the user.
  • Backups of these two structures are kept on tapes
  • A collection of nodes containing information about all files.
  • Files are typically displayed in a Hierarchical tree structure
File Mapping
  • These mapping files were created for converting data to Unicode.
  • A file view is the portion of virtual address space that a process uses to access the file's contents. 
  • The first step in mapping a file is to open the file by calling the CreateFile function. To ensure that other processes cannot write to the portion of the file that is mapped, you should open the file with exclusive access.
  • Processes can also manipulate the file view with the Virtual Protect function.

    TUGASAN 4
Recognize security policy and mechanism.
  •    In computer science, protection mechanisms are built into a computer architecture to        support the enforcement of security policies. A simple definition of a security policy 
       set who may use what information in a computer system.Mechanism for controlling the   
       access of programs, processes, or users the resources defined by the computer
       system. the protentation mechanism ensures the enforcement of a certain policy.
     
    Password
    • ·         A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password should be kept secret from those not allowed access.
    • A completely different approach to authorization is to check to see
             if the user has some item, normally a plastic card with a magnetic stripe on it.
             The card is inserted into the terminal, which then checks to see whose card it is.
    • Another technique is signature analysis. The user sign his name with a special
             pen connected to the terminal and the computer compares it to a known
            specimen stored online

Biometric Technique
  • Yet another approach is to measure physical characteristic that are hard to forge. For example a finger print or a voiceprint reader in the terminal could verify the users identity (it make the search go faster if the user tells the computer who he is, rather then making the computer compare the given fingerprint to the entire database) Finger length analysis is surprisingly practical. When this is used each terminal has a device. The user inserts his hand into it and the length of all his finger is measured and check against the database.

Elaborate protection concept and access control.


  •         For your PC security suite is now available a variety of programs that promise more often than full protection from malware, with acontrol virus and malware, but also with some research andcomplex in real time. 
  •         Major challenge for all manufacturers areoffering solutions that are effective yet easy to use, and if you do not require excessive resources to the system.
  •         At the time all the leading manufacturers of security software suite that provides a guide as well as the traditional functions of malwaredetection and protect your PC also features accessories forprotection of data and optimization of the operating system. 
  •         The concept of security was also extended to the area where this malware is not in the strict sense. But, in a sense, a proper backup data fall within the concept of security
 TUGASAN 5

Install or Format Windows 7


  •  Insert your Windows Vista DVD. The DVD is bootable so after you restart your PC          (with the DVD inside) the Windows Vista Setup will begin loading ( if the setup            doesn’t start automatically, make another restart and press F2, or F8 after the                boot screen and select boot from DVD ). 
  •    The first screen of the Format Windows Vista sequence will show up. At this point you need to select your Language and Time and currency format (click the image to enlarge). Press Next.
  •  Press Install Now
  •  After a min you will be asked for your Product Key. Enter your product key.
  •  Accept the Microsoft Windows User License Terms and press Next
  •  Dialog – “Which type of installation do you want ?”
  •  If you already have another operating system installed (ex. Windows XP) you will   have the Upgrade option enabled.But if you want to format your drive, deleting the old system and installing fresh Windows Vista copy.
  •    Select the drive you want to install and click next
  •    The installation process will begin.
  •     After Windows Vista Setup finishes, the computer will reboot.
  • Windows Vista files are copied , and now setup will configure Windows Vista for your PC. 
  •  Insert your User Name and Password for user account 
  •  Select your preferred security settings. If this computer is not behind a firewall, the best          option is the ” Use Recommended settings”.
  • Select your time zone and location.
  • Network Configuration – Select your computer location. This settings sets your network permissions.
  • The installation of Windows Vista has completely finished

Sunday, 11 September 2011

PERMAINAN TRADISIONAL BATU SEREMBAN

 











 PENGENALAN
Batu seremban adalah antara satu permainan tradisional yang saya gemari. Saya terpengaruhi dengan permainan ini apabila terlihat saudara-mara saya bermain semasa bulan puasa. Mari saya menceritakan sedikit tentang sejarahnya.


Tahukah anda bahawa batu seremban juga digelar sebagai Batu Serembat atau Permainan Selambut. Permainan ini digemari oleh budak-budak kecil ataupun kanak-kanak perempuan, walaubagaimanapun, dewasa-dewasa dan kanak-kanak lelaki tetap bermain batu seremban.


Batu Seremban diperbuat daripada kain yang dijahit dan berbentuk seperti segi tiga. Ia diisi dengan benda yang kecil yang dimuatkan ke dalam kain tersebut seperti benih kacang hijau, batu kecil dan sebagainya. Seketul batu seremban dikenali sebagai buah. Pada zaman dahulu, orang-orang melayu menggunakan benda yang kecil untuk dijadikan buah. Antara objek-objek yang digunakan adalah biji getah dan ketulan batu kerikil sederhana besar.


Permainan ini sering dimain oleh kanak-kanak zaman dahulu pada masa lapang mereka di tanah yang lapang, serambi rumah atau dimana-mana sahaja mereka mahu bermain. Kini, permaianan ini jarang dimain oleh kanak-kanak zaman sekarang kerana teknologi semakin hari, semakin canggih. Mereka bermain dengan PSP, Nintendo DS dan sebagainya.


Batu Seremban ada caranya untuk bermain tetapi untuk sekarang, kami cuma memberikan lebih informasi tentang permainan Batu Seremban.






Batu Seremban juga dikenali sebagai permainan Selambut atau Serembat. Kanak-kanak perempuan gemar memainkannya secara individu dan kebiasaannya dimainkan secara berkumpulan seramai dua hingga empat orang atau lebih.
Guli kaca, biji getah, ketulan batu kerikil sederhana besar atau ketulan-ketulan objek lain berbentuk bulat biasanya digunakan oleh kanak-kanak dalam permainan ini sebanyak lima biji. Objek-objek ini dikenali sebagai buah.
Permainan ini sering dimainkan diwaktu lapang, di serambi rumah, di dalam rumah atau dimana sahaja yang mereka gemari dengan memerlukan permukaan yang rata dan bersih. Para pemain hendaklah duduk di atas lantai, dengan cara begini memudahkan permainan tersebut dimainkan.

Menentukan Giliran

Sebelum permainan dimulakan, seorang demi seorang pemain dikehendaki menimbang buah, bagi mendapatkan mata sebagai penentuan siapa yang akan bermain dahulu sebagai pemain pertama, kedua, ketiga dan seterusnya. Cara menimbang buah adalah dengan kesemua buah diletakkan di atas tapak tangan dan dilambung keudara, kemudiannya hendaklah disambut pula dengan belakang tapak tangan. Jumlah buah yang dapat disambut itu adalah dikira sebagai mata.
 
Cara Bermain

Dalam bermain Batu Seremban ini terdapat beberapa peringkat atau cara sambutan buah yang berlainan. Bermula dengan peringkat pertama yang mudah dengan menggunakan sebiji buah yang dinamakan sebagai buah satu hinggalah kepada peringkat lebih tinggi atau peringkat yang teratas dinamakan buah tujuh.
Buah Satu
Kesemua buah hendaklah diselerakkan dengan cara menabur di atas lantai, berkeadaan buah-buah itu tidak bersentuhan antara satu dengan yang lain. Sebiji buah diambil untuk dijadikan ibu, dan ibu hendaklah dilambungkan keudara, dalam masa yang sama sementara buah ibu masih berada diudara, sebiji lagi buah hendaklah dikutip. Dalam masa yang sama pemain hendaklah menyambut buah ibu, apabila telah disambut sebiji buah hendaklah digenggam di dalam tangan yang sebelah lagi. Perlakuan begini dibuat berterusan sehingga kesemua buah di atas lantai itu habis dilambung dan disambut.

Buah Dua
Cara buah dua dimainkan adalah serupa seperti buah satu, tetapi buah yang dikutip mestilah dengan dua biji serentak, ini bermakna hanya dua kali lambungan buah ibu dilakukan.

Buah Tiga
Buah tiga pula terdapat sedikit perbezaan. Langkah pertama adalah dengan mengutip sebiji buah dahulu, pada lambungan kali kedua pemain hendaklah mengutip tiga biji buah serentak.

Buah Empat
Pemain mengutip kesemua empat biji buah di atas lantai dan dalam masa yang sama hendaklah menyambut buah ibu yang telah dilambungkan.

Buah Lima
Diperingkat ini urutan dari memainkan buah empat, sementara di dalam tangan tergenggam lima biji buah, sebiji dari buah hendaklah dilambungkan dan empat biji buah baki hendaklah diletakkan di atas lantai pula serta menyambut buah ibu sahaja.

Buah Enam
Ditahap buah enam terdapat perbezaan, ianya juga dinamakan buah tukar dimana dua biji buah dijadikan buah ibu. Apabila sebiji daripadanya dilambungkan ke udara maka sebiji lagi buah ibu itu hendaklah ditukarkan dengan buah lain yang terdapat di atas lantai, sehingga selesai.

Buah Tujuh
Buah tujuh adalah urutan dari peringkat permainan buah enam. Dua biji buah yang masih berada di dalam tangan hendaklah dilambungkan serantak. Sementera itu sebiji buah hendaklah dikutip. Buah ibu hendaklah disambut dengan kedua belah tangan, sebiji disebelah kanan dan sebiji lagi disebelah kiri. Pada buah ibu yang terakhir dilambungkah hendaklah juga disambut.
Menimbang
Setelah selesai kesemua peringkat dilalui, pemain hendaklah menimbang buah untuk mendapatkan mata. Menimbang buah diperingkat ini ada dua kaedah. Cara pertama sama seperti permulaan menentukan pemain, mata dikira hanya mengikut bilangan biji buah yang dapat ditimbang. Tetapi jika buah yang ditimbang itu disambut dengan cara mencangkuk, maka mata dikira sekali ganda dari jumlah biji buah yang dapat disambutnya.
Sekiranya pemain dapat bermain sehingga keperingkat menimbang dengan memperolehi mata, maka pemain tersebut boleh meneruskan permainan semula, buah satu dan seterusnya sehingga mati.

Mati Permainan

Sekiranya ibu tidak dapat disambut atau semasa mengutip buah di atas lantai tangan mengenai biji buah yang lain atau tidak dapat mengutip buah sehingga ibu jatuh atau semasa menimbang buah dan pemain tidak dapat walau sebiji buah ianya dikira mati (permainan ditamatkan) dan permainan akan diserahkan kepada pemain seterusnya.


 

GaMbAr BaTu SeReMbAn