2024 - ICT Skills - X

Download as pdf or txt
Download as pdf or txt
You are on page 1of 27

BASIC ICT SKILLS

Basic ICT Skills Class 10 MCQ


Q1.The concept of ICT refers to ...........
A) storing digital information.
B) recording digital information.
C) sending digital information
D) All of the above
Answer (D)

Q2. Which of the following ways are used to record or store information?
A) handwritten on paper
B) written using a typewriter
C) typed in computer
D) All of the above
Answer (D)

Q3. Deleted files and folders are stored in _______________


A) Recycle bin
B) My Computer
C) Control Panel
D) None of the above
Answer (A)

Q4. Which icon allows the user to access all drives, files, and folders on the
computer.
A) Recycle Bin
B) Computer
C) Application
D) Start button
Answer (B)

Q5. Bar present at the bottom of the desktop is called ____________


A) Status bar
B) Scroll bar
C) Taskbar
D) None of the above
Answer (C)

Q6. Start button is present on _________ side of the Taskbar.


A) right
B) left
C) top
D) bottom
...
Show Answer

Q7. What are the small pictures on the desktop called?


A) Desktop
B) Symbols
C) Icons
D) Pictures
Answer (C)

Q8. The first screen that appears on monitor after loading OS is called
________________
A) Icons
B) Desktop
C) Wallpaper
D) None of the above
Answer (B)

Q9. Software piracy refers to


A) Stealing software and distributing the unlicensed copies
B) Opensource software
C) Gain access to a website and perform illegal activity
D) Selling software online with a proper license key
Answer (A)

Q10. Which of the following is one of the security measures that monitor incoming
and outgoing data?
A) Firewall
B) Firewall
C) Device Manager
D) Google Chrome
Answer (A)

Q11. Choose the strong password out of the following:


A) 12345
B) Aprfd@2021!
C) hello123
D) password
Answer (B)
Q12. The virus replicates itself and spread all files once they attack the computer
and very difficult to remove them. This virus is known as...........
A) Trojan Horse
B) File Virus
C) WORM
D) Ransomware
Answer (C)

Q13. Rakesh received a call and was informed about the lottery for winning a huge
amount. This type of activity is considered as............
A) Trojan Horse
B) Online Predator
C) Internet Scams
D) Encryption
Answer (C)

Q14. What type of care should be taken while transacting online?


A) Always lock your computer when you are going away
B) Give credit card and debit card or UPI information on secured sites
C) Save the passwords on the cloud
D) Use pirated software
Answer (B)

Q15. Which of the following trap small children into inappropriate relations?
A) Online predators
B) Worms
C) Trojan Horse
D) Anti-Virus
Answer (A)

Q16. Examples of Mobile operating Systems is :


A) Android
B) Symbian
C) iOS
D) All of the above
Answer (D)

Q17. All of the above


A) Graphical User Interface
B) Graphical User Interaction
C) Graphical User Interactive
D) None of the above
Answer (A)

Q18. ________________ operating system is an example of an interactive operating


system.
A) Windows
B) DOS
C) Linux
D) None of the above
Answer (A)

Q19. Which of the following is Microsoft Product?


A) DOS
B) Windows
C) Android
D) Linux
Answer (B)

Q20. DOS stands for ______________


A) Disk Operating System
B) Dot Operating System
C) Disk Open System
D) Disk Operating Secure
Answer (A)

Q21. Which part of the computer system should be cleaned so that it can work
properly?
A) Internal
B) External
C) Both internal and external
D) None of the above
Answer (C)

Q22. Disk defragmentation help to


A) remove the virus from the system
B) use the disc space at an optimal level.
C) Both of the above
D) None of the above
Answer (B)

Q23. We should never spray any liquid cleaner directly on


A) Keyboard
B) Monitor
C) Mouse
D) All of the above
Answer (D)

Q24. Regular maintenance of the system includes


A) installing updates of the software
B) check the security of the system
C) taking backups of important files and documents
D) All of the above
Answer (D)

Q25. Characteristics of computer virus is :


A) it makes copies of itself
B) it makes the system slow.
C) it may get activated at a certain date and time.
D) All of the above
Answer (D)

Q26. How can an anti-virus protect your device?


A) It can protect it from over-heating.
B) It can increase its performance.
C) It can protect against the virus
D) It can backup data.
Answer (C)

Q27. Which of the following is an Antivirus?


A) Norton AntiVirus
B) Quick Heal
C) McAfee VirusScan
D) All of the above
Answer (D)

Q28. A computer virus cannot ____


A) infect files on CD or DVD, if they are closed for writing.
B) infect computer hardware like, keyboard, mouse, etc.
C) Both of the above
D) None of the above
Answer (C)

Q29. A _________ is a software program that attaches itself to other programs and
alters their behaviour.
A) Cookie
B) Computer virus
C) Firewall
D) None of the above
Answer (B)

Q30. Press ______ to select all files.


A) Ctrl + S
B) Ctrl + A
C) Ctrl + D
D) Ctrl + P
Answer (B)

Q31. Identify which of the following is a temporary file?


A) flower.jpg
B) temporary.doc
C) temporary.docx
D) web.tmp
Answer (D)

Q32. . ___________ are small files which are stored on a user’s computer when a user
visit a website on the internet.
A) Image
B) Cookies
C) Firewall
D) None of the above
Answer (B)

Q33. To open Temp folder type ____________ in Run dialog box.


A) temp%
B) %temp%
C) #temp#
D) None of the above
Answer (B)

Q34. ________ key helps to move the cursor to the beginning of a new line.
A) Ctrl + Home
B) Ctrl + End
C) Enter
D) None of the above
Answer (C)
Q35. Pressing ____________ key opens the Start menu.
A) Windows
B) Alt + Windows
C) Ctrl + Windows
D) None of the above
Answer (A)

Q36. The short cut key to open a new file in notepad is


A) ctrl + e
B) ctrl + n
C) ctrl + w
D) alt + n
Answer (B)

Q37. The ________ function key is used to get help in most programs.
A) F12
B) F2
C) F3
D) F1
Answer (D)

Q38. Enter your username and password, I allow opening your computer to work
upon
A) Power On Self Test
B) Welcome Screen
C) Desktop
D) Login Screen
Answer (D)

Q39. Which of the following programs starts as soon as the computer gets turned
on?
A) MS Office
B) Text Editor
C) Text Editor
D) Windows Explorer
Answer (C)

Q40. Which of the following is considered as ICT device?


A) Smart TV
B) FM radio
C) Tablet
D) Multimeter
Answer (C)

Q41. Shortcut to save file is ________________


A) Ctrl + S
B) Ctrl + F1
C) Alt + S
D) None of the above
Answer (A)

Q42. A __________ is a location where a group of files can be stored.


A) folder
B) main file
C) super file
D) none of the above
Answer (A)

Q43. The extension of image file is _____________


A) .xls
B) .jpg
C) .doc
D) .docx
Answer (B)

Q44. Electronic files in computer can be ____________


A) Copied
B) Moved
C) Rename
D) All of the above
Answer (D)

Q45. We can ___ a file by mouse by double click on file.


A) Close
B) Save
C) Open
D) Delete
Answer (C)

Q46. A _____________ is a device that you can use to move, select and open items on
your computer screen.
A) Mouse
B) Joystick
C) Scanner
D) None of the above
Answer (A)

Q47. Navigation keys are


A) Arrow Keys
B) Page Up
C) Page down
D) All of the above
Answer (D)

Q48. Keys labeled from F1 to F12 are __________ keys


A) Input
B) System
C) Function
D) Help
Answer (C)

Q49. Which of the following is an output device?


A) Monitor
B) Speaker
C) Printer
D) All of the above
Answer (D)

Q50. BIOS stands for


A) Basic Input/Output System
B) Base Input/Output System
C) Basic Input and Output Systematic
D) None of the above
Answer (A)
SECTION 2

Session 1: Basic Computer Operations


1. What is ICT?

Answer – Information and Communication Technology (ICT) is an acronym


for information and communication technology.

ICT helps in the proper sharing, receiving, and processing of information, and
an ICT device is a device that is used for processing, storing, and delivering
information to others.
Examples of ICT devices are – Laptop, Desktop, Tablets and Smartphones.

2. Objectives of Information and communication technology?


Advantages and disadvantages of ICT.

Answer – Full form of ICT is Information and communication technology. The


goal of ICT is to bridge the gap between parents, educators, and students by
encouraging sustainable, cooperative, and transparent communication
methods.

Advantages of ICT
a. Enhanced the modes of communication
b. Independent learning platforms Cost – efficient
c. Enhanced data and information security
d. Paperless – Eliminate the usage of paper
e. Better teaching and learning methods
f. Web – based LMS tools

Disadvantages of ICT
a. Traditional books and handwritten methods are at risk.
b. Managing courses online is difficult
c. Teachers require experience to handle ICT
d. Risk of cyber attacks and hacks
e. Misuse of technology

3. Difference between Hardware and Software?

Answer – A computer system consists of two main parts – Hardware and


Software

a. Hardware – Hardware is a physical part of a computer system. We can feel


and touch the hardware devices. example – CPU, Mother Board, Hard Disk,
Keyboard, Mouse, Printer etc.

b. Software – Software related to the programs which perform different types


of tasks on the computer system. Program is a collection of Instructions. It
also helps the computer to perform the specific task. Example – Open Office
Base, Spreadsheet, Presentation etc.

4. What is BIOS?

Answer – BIOS stands for Basic Input/ Output System, It helps the computer
system to identify (Self-test) the paraperaphal devices which are connected to
the computer system and helps computers to load Operating System properly.
5. What are the different types of keys in Keyboard?

Answer –
a. Function keys – F1 to F12 are function keys in the keyboard, function keys
are used for specific purposes.

b. Control keys – SHIFT, CONTROL (CTRL),ALT, SPACEBAR, TAB AND


CAPS LOCK are known as a control key, these keys are used as per the
demand.

c. Enter key – ENTER or RETURN keys are known as Enter key, depending
on the brand of computer that you are using.

d. Punctuation keys – It includes keys for punctuation marks, such as colon


(:), semicolon (;), question mark (?), single quotation marks (‘ ’), and double
quotation marks (“ ”).

e. Navigation keys – END, HOME, PAGE DOWN, PAGE UP and Arrow keys
are known as navigation keys, these keys are used to move up, down, left or
right in the document.

f. Command keys – BACKSPACE, INSERT (INS) and DELETE(DEL) are


known as command keys. INSERT key allows you to overwrite characters to
the right side.

The DELETE command key and BACKSPACE key are used to remove typed
text, character, or any other objects from the right and left side of the cursor.

g. Windows key – Windows key is used to open the Start menu.

6. What is the purpose of Mouse?

Answer – The purpose of the mouse is –

a. Roll Over or Hover – Whenever we bring the mouse over the files, it
shows the details of the file.

b. Click or Double Click – Mouse allows you to select, open or delete files
and folders from the computer system.

c. Drag and Drop – Click on the file and drag and drop your file where you
want.

Basic ICT Skills Class 10 Questions and Answers


Session 2: Performing Basic File Operations
7. What are files and folders in a computer system?

Answer –
a. File – File is a collection of information different types of files store different
types of information. Every file has a file name and extension that identifies
the type of file.

b. Folder – Folder is a collection of files or a group of files.

Basic ICT Skills Class 10 Questions and Answers

Session 3: Computer Care and Maintenance


8. How to maintain a computer system?

Answer – Some simple ways to take care of computer system are –

a. Keeping a Device Clean – Always keep a device clean, such as the


keyboard, the screen, and the mouse. Handle your gadget with care, keep it
cool, and don’t overload your battery.

b. Prepare a Maintenance Schedule – Make a schedule for computer


maintenance.

Daily Maintenance

a. Clean up your email inbox

b. Save Important attachments and save in folder

Weekly Maintenance

a. Clean your Keyboard, monitor, CPU and printer

b. Backup your data

Monthly Maintenance

a. Clean unused photographs


b. Clean up Download folder

c. Uninstall unused programs

d. Run full system virus scan

e. Run disk – cleaner software

Yearly / Annual Maintenance

a. Clean up social media accounts

b. Clean up e-mail contact list

c. Update your operating System

9. How to increase Computer performance?

Answer – We frequently install a large number of applications, which slows


down the computer. Always attempt to uninstall unnecessary applications,
temporary files, and antivirus software updates.

Basic ICT Skills Class 10 Questions and Answers

Session 4: Computer Security and Privacy


10. What is a Security Break?

Answer – Security break is leakage of information stored in a computer.

Your personal information can be lost or leaked in two ways –

We are not cautious when it comes to disclosing personal information via the
internet. We share our account information and passwords on unsafe
websites.

A person gets unauthorized access to our computer. This can happen at work
if we don’t log out before leaving the computer.

11. What are the threats ?


Answer – Threats are ways in which personal information from a computer
can be released without our knowledge.

a. Theft – Theft means stealing of information or hardware. These maybe of


three types:

i. Physical – Where a person may steal your desktop computer or laptop.

ii. Identity – A hacker gets your personal information and uses it to


impersonate you. The hacker can use this fake identity to get access to your
account information or engage in illegal activity.

b. Software Piracy – This is stealing of software and includes using or


distributing unlicensed and unauthorized copies of a computer program or
software.

i. Virus – Viruses are computer programmes that can corrupt data and
software applications, as well as steal data from computers. Worms and
Trojan Horses are two major forms of viruses.

ii. Worms – Worms are viruses that replicate and spread to all files on a
computer once they attack a computer. This makes it very difficult to remove
them.

A Trojan Horse appears to be a useful software programme, but once it


reaches a computer, it begins to behave like a virus and destroys the data.

iii. Online Predator – Online predators are persons who use the internet
to trap you into unhealthy relationships. They could be older people appearing
as your age who harass you into doing unlawful things online.

iv. Internet Scams – You may occasionally receive highly appealing


offers claiming that you have won a large sum of money in a lottery and that
you can claim your win by depositing a specific amount of money. When you
deposit money with a credit card or through online banking, you not only lose
the deposit money but your card / account information may be misused later.

12. How can we protect our data?

Answer – To protect our data from theft and viruses we can take the following
measures –

a. Use Strong password in your account – Make your passwords difficult to


guess. When creating a new password, attempt to use a combination of
• Small Character
• Capital Character
• Special Character
• Numbers
b. Install Antivirus and Firewall –Anti-virus software and a firewall protect
your data from virus and from hackers.

c. Encrypt your data – Keep your information in an encrypted format to keep


it safe from unauthorized users.

d. Open only secure site – Before visiting a website, make sure the address
begins with https://. A website that begins with https:// is a secure website.

Basic ICT skills MCQ class 10

PART 1
1. ICT stands for
o Information and Contact Technology
o Information and Connection Technology
o Information and Communication Technology
o Information and Call Technology
2. All the methods, tools, concepts related to storing, recording and sending
digital information is called _____________
o ICT
o IT
o ITC
o ITS
3. The information can be recorded or stored through
o handwritten on paper
o written using type writer
o soft copy on computer
o all of the above
4. When the information is stored or recorded on electronic devices, refers to
____________
o raw form
o digital form
o paper form
o paper back form
5. Which of the following is considered as ICT device?
o Smart TV
o FM radio
o Tablet
o Multi meter
6. ICT helps everyone to
o stay connected with each other
o run the business smoothly
o share the knowledge on public domain
o all of the above
7. Aryan is confused about hardware and software. Which of the following you
suggest to clear his confusion:
o Any device which tangible and can be touched is hardware and a
program that makes hardware function is software
o Any device that is very hard is hardware and any device that is very
soft is software
o A device used on a hard surface is hardware and a device used on a
soft surface is software
o A program is very hard to understand is hardware and a program is
very easy to understand is software
8. Which of the following is hardware?
o Opera
o Notepad
o Monitor
o Cleaner
9. Which of the following is software?
o Printer
o Projector
o Hard Disk
o Ccleaner
10. Read the following statements:
o Statement A: The software and hardware both are required to work
upon ICT devices
o Statement B: All ICT devices are very small in size and can be carried
anywhere
▪ Statement A is True but statement B is False
▪ Statement B is True but statement A is False
▪ Both are False
▪ Both are True
11. Which of the following programs starts as soon as computer gets turned
on?
o MS Office
o Text Editor
o Operating System
o Windows Explorer
12. Which of the following in one of the mobile operating system?
o Linux
o Unix
o Mac OS
o iOS
13. Recognize me: When the computer is started, I perform some basic
processes/functions to check all the devices are running properly or not
o Power On Self Test
o Welcome Screen
o Desktop
o Login Screen
14. Enter your username and password, I allow to open your computer to work
upon
o Power On Self Test
o Welcome Screen
o Desktop
o Login Screen
15. I am capable to store and display all icons available in PC
o Power On Self Test
o Welcome Screen
o Desktop
o Login Screen
16. What is responsible for performing the POST (Power On Self Test)?
o The User
o Operating System
o Desktop
o BIOS
17. Identify the operating system out of the following:
o Google Chrome
o Adobe Photoshop
o Microsoft Windows
o Adobe Dreamweaver
18. Which of the following item is not present on desktop?
o Folder
o Disk drive
o Icon
o Taskbar
19. The login screen appears after
o POST
o Welcome Screen
o Windows Start Screen
o BIOS Screen
20. The ________ function key is used to get help in most programs.
o F12
o F2
o F3
o F1
21. Manisha pressed a key on keyboard that moved the cursor to the beginning
of a new line. But she did not know which key has been presses by her.
Identify the key pressed by her:
o Enter
o Shift
o Ctrl
o Windows
22. Rekha wants to move the cursor to the begining of the line to the left side.
Select a key which she should press:
o Left Arrow
o End
o Home
o Page Up
23. Which of the following statement is correct for delete and backspace key?
o Any key can be used to remove the text from center
o Delete erases characters from left side where as Backspace erases
characters from right side
o Delete erases characters from right side where as Backspace erases
characters from left side
o Anyone can overwrite the content selected by use
24. When the mouse is dragged on the file or icon it displays the information
about the file. This process is known as
o Left Click
o Right Click
o Mouse Hover
o Drag and Drop
25. Each file stored in the computer has
o Filename and Extension
o Data and Information
o Particular Size and Location
o All of these
26. The filename and extension are separated by
o . (Period)
o , (Comma)
o _ (Underscore)
o ‘ (Single Quote)
27. A _________ is location or container in which the files can be stored.
o Folder
o Recycle Bin
o Library
o Utility
28. The shortcut key to open run command is :
o ctrl + r
o shift + r
o ctrl + r
o windows + r
29. The shortcut key to copy the file or folder is
o ctrl + c
o window + c
o alt + c
o shift + c
30. The short cut key to open a new file in notepad is
o ctrl + e
o ctrl + n
o ctrl + w
o alt + n
31. Which command is used to reverse the previous work done by the user?
o Redo
o Undo
o Paste
o Cut
32. You should always protect your computer from
o dust and damage
o not to use more that 2 or 3 hours
o not install a software
o not to turn on in the morning or late night
33. To clean the keyboard, you can
o use ashing Powder and Water then wash it
o keep a soft brush to remove crumbs and dust particles
o use wet cloth and wipe on it
o use acid to clean it
34. How to remove the finger marks from the screen?
o wipe the screen with soft cloth
o use wet cloth and wipe it
o keep water and glass near to computer and wash it as and when
needed
o use colin or harpik and spray it on the screen
35. Which of the following can be followed to keep the laptop cool?
o Keep snow around the laptop
o Use external Cooling fan
o Keep the laptop inside freezer
o Keep the room cool then start the laptop
36. Running to many programs at a time can cause
o computer can become slow and crash
o damage the hard disk
o generate lots of heat
o computer can work efficiently
37. Which of the following is one of the process for daily maintenance?
o download email attachments in to the folders
o backup your data
o full system virus scan
o update operating system
38. How can an anti-virus protect your device?
o It can protect it from over-heating.
o It can increase its performance.
o It can protect against the virus
o It can backup data.
39. What happens if you leave a device plugged in even after it is charged 100%?
o It can break.
o It can stop functioning.
o It can over-heat.
o Data can get corrupt.
40. Which of the following trap small children into inappropriate relations?
o Online predators
o Worms
o Trojan Horse
o Anti-Virus
41. What type of care should be taken while transacting online?
o Always lock your computer when you are going away
o Give credit card and debit card or UPI information on secured sites
o Save the passwords on cloud
o Use pirated software
42. A hacker can try to misuse your data and information and perform illegeal
activity. This is considered as
o Physical Theft
o Identity theft
o Software Piracy
o Virus
43. Manoj received a call and informed about lottery for winning huge amount.
This type of activity is considered as
o Trojan Horse
o Online Predator
o Internet Scams
o Encryption
44. The virus which replicates themselves and spread all files once they attack
on computer and very difficult to remove them. This virus is known as
o Trojan Horse
o File Virus
o WORM
o Ransomware
45. A __________ is seems useful software but reacts like a virus and destroying
data.
o Trojan Horse
o File Virus
o WORM
o Ransomware
46. Choose the strong password out of the following:
o 12345
o Aprfd@2021!
o hello123
o password
47. Which of the following is one of the security measures that monitor
incoming and outgoing data?
o Firewall
o Windows Login
o Device Manager
o Google Chrome
48. Bit locker is an example of
o Backup and restore
o Firewall
o Encryption
o Ransomware
49. The identity of secure websites are
o Indicates a lock in front of the URL and begins https:
o Asks to login using OTP
o Asks to login using email id and password
o Website requires biometrics to login
50. Software piracy refers to
o Stealing software and distributing the unlicensed copies
o Opensource software
o Gain access of a website and perform illegal activity
o Selling software online with a proper license key

Important ICT Skills short answer Questions

[1] Expand and Define: ICT.

Ans.: ICT Stands for Information and Communication Technology.


ICT refers to all the methods, tools, concepts related to storing, recording and
sending digital information.

[2] Gunjan is class 10 student. Her teacher asked her to make a list of ways
to store and record information. Assist her to accomplish her task.

Ans.: The different ways to store and record information are as follows:
1) Handwritten records on paper
2) Typerwriter written records
3) Computerised Records

[3] What is a digital record? Enlist some popular ICT devices.

Ans.: When information is stored and recorded on electronic devices, it takes on a


‘digital’ form. This digital form is known as digital record.
Few popular ICT devices are as follows: Tablets, smartphones, computer and
laptops

[4] How ICT is helpful to us?

Ans.: ICT skills help us to communicate, run our business and stay connected with
our family and friends. Hence, every person needs to acquire ICT skills and build
them to stay updated with the latest software and applications (apps).

[5] Define: hardware and software

Ans.: The physical parts that can be seen and touch are called hardware. It is
machinery of a computer such as keyboard, monitor, CPU etc.
The programs that cannot be touched and make the hardware work the way as the
user wants are termed as software. For example MS Excel, MS Word etc.

[6] What is Operating System? Write a few examples.

Ans.: Operating System is a software that provides an interface between hardware,


software and user. It provides platform to run computer peripherals and other
programs. Examples are Windows, Linux, Unix, Android, Mac etc.

Q. What is an operating system. Explain its types.

An Operating System performs all the basic tasks like managing files,
processes, and memory. Thus operating system acts as the manager of all
the resources, i.e. resource manager. Thus, the operating system becomes
an interface between the user and the machine. It is one of the most required
software that is present in the device.
Operating System is a type of software that works as an interface between
the system program and the hardware. There are several types of Operating
Systems in which many of which are mentioned below. Let’s have a look at
them.

Types of Operating Systems


There are several types of Operating Systems which are mentioned below.
• Batch Operating System
• Multi-Programming System
• Multi-Processing System
• Multi-Tasking Operating System
• Time-Sharing Operating System
• Distributed Operating System
• Network Operating System
• Real-Time Operating System
1. Batch Operating System
This type of operating system does not interact with the computer directly.
There is an operator which takes similar jobs having the same requirement
and groups them into batches. It is the responsibility of the operator to sort
jobs with similar needs.
Advantages of Batch Operating System
• It is very difficult to guess or know the time required for any job to
complete. Processors of the batch systems know how long the job
would be when it is in the queue.
• Multiple users can share the batch systems.
• The idle time for the batch system is very less.
• It is easy to manage large work repeatedly in batch systems.
Disadvantages of Batch Operating System
• The computer operators should be well known with batch systems.
• Batch systems are hard to debug.
• It is sometimes costly.
• The other jobs will have to wait for an unknown time if any job fails.
Examples of Batch Operating Systems: Payroll Systems, Bank Statements,
etc.

2. Multi-Programming Operating System

Multiprogramming Operating Systems can be simply illustrated as more


than one program is present in the main memory and any one of them can
be kept in execution. This is basically used for better execution of resources.
Advantages of Multi-Programming Operating System
• Multi Programming increases the Throughput of the System.
• It helps in reducing the response time.
Disadvantages of Multi-Programming Operating System
• There is not any facility for user interaction of system resources with
the system.

3. Multi-Processing Operating System

Multi-Processing Operating System is a type of Operating System in which


more than one CPU is used for the execution of resources. It betters the
throughput of the System.
Advantages of Multi-Processing Operating System
• It increases the throughput of the system.
• As it has several processors, so, if one processor fails, we can
proceed with another processor.
Disadvantages of Multi-Processing Operating System
• Due to the multiple CPU, it can be more complex and somehow
difficult to understand.

4. Multi-Tasking Operating System

Multitasking Operating System is simply a multiprogramming Operating


System with having facility of a Round-Robin Scheduling Algorithm. It can
run multiple programs simultaneously.
Advantages of Multi-Tasking Operating System
• Multiple Programs can be executed simultaneously in Multi-Tasking
Operating System.
• It comes with proper memory management.
Disadvantages of Multi-Tasking Operating System
The system gets heated in case of heavy programs multiple times.

5. Time-Sharing Operating Systems


Each task is given some time to execute so that all the tasks work smoothly.
Each user gets the time of the CPU as they use a single system. These
systems are also known as Multitasking Systems. The task can be from a
single user or different users also. The time that each task gets to execute is
called quantum. After this time interval is over OS switches over to the next
task.
Advantages of Time-Sharing OS
• Each task gets an equal opportunity.
• Fewer chances of duplication of software.
• CPU idle time can be reduced.
• Resource Sharing: Time-sharing systems allow multiple users to
share hardware resources such as the CPU, memory, and
peripherals, reducing the cost of hardware and increasing efficiency.
• Improved Productivity: Time-sharing allows users to work
concurrently, thereby reducing the waiting time for their turn to use
the computer. This increased productivity translates to more work
getting done in less time.
• Improved User Experience: Time-sharing provides an interactive
environment that allows users to communicate with the computer
in real time, providing a better user experience than batch
processing.
Disadvantages of Time-Sharing OS
• Reliability problem.
• One must have to take care of the security and integrity of user
programs and data.
• Data communication problem.
• High Overhead: Time-sharing systems have a higher overhead than
other operating systems due to the need for scheduling, context
switching, and other overheads that come with supporting multiple
users.
• Complexity: Time-sharing systems are complex and require
advanced software to manage multiple users simultaneously. This
complexity increases the chance of bugs and errors.
• Security Risks: With multiple users sharing resources, the risk of
security breaches increases. Time-sharing systems require careful
management of user access, authentication, and authorization to
ensure the security of data and software.
Examples of Time-Sharing OS with explanation
• IBM VM/CMS: IBM VM/CMS is a time-sharing operating system
that was first introduced in 1972. It is still in use today, providing a
virtual machine environment that allows multiple users to run their
own instances of operating systems and applications.
• TSO (Time Sharing Option): TSO is a time-sharing operating
system that was first introduced in the 1960s by IBM for the IBM
System/360 mainframe computer. It allowed multiple users to
access the same computer simultaneously, running their own
applications.
• Windows Terminal Services: Windows Terminal Services is a
time-sharing operating system that allows multiple users to access
a Windows server remotely. Users can run their own applications
and access shared resources, such as printers and network storage,
in real-time.
6. Distributed Operating System
These types of operating system is a recent advancement in the world of
computer technology and are being widely accepted all over the world and,
that too, at a great pace. Various autonomous interconnected computers
communicate with each other using a shared communication network.
Independent systems possess their own memory unit and CPU. These are
referred to as loosely coupled systems or distributed systems. These
systems’ processors differ in size and function. The major benefit of working
with these types of the operating system is that it is always possible that
one user can access the files or software which are not actually present
on his system but some other system connected within this network i.e.,
remote access is enabled within the devices connected in that network.

Advantages of Distributed Operating System


• Failure of one will not affect the other network communication, as
all systems are independent of each other.
• Electronic mail increases the data exchange speed.
• Since resources are being shared, computation is highly fast and
durable.
• Load on host computer reduces.
• These systems are easily scalable as many systems can be easily
added to the network.
• Delay in data processing reduces.
Disadvantages of Distributed Operating System
• Failure of the main network will stop the entire communication.
• To establish distributed systems the language is used not well-
defined yet.
• These types of systems are not readily available as they are very
expensive. Not only that the underlying software is highly complex
and not understood well yet.
Examples of Distributed Operating Systems are LOCUS, etc.
7. Network Operating System
These systems run on a server and provide the capability to manage data,
users, groups, security, applications, and other networking functions. These
types of operating systems allow shared access to files, printers, security,
applications, and other networking functions over a small private network.
One more important aspect of Network Operating Systems is that all the
users are well aware of the underlying configuration, of all other users within
the network, their individual connections, etc. and that’s why these
computers are popularly known as tightly coupled systems.

Advantages of Network Operating System


• Highly stable centralized servers.
• Security concerns are handled through servers.
• New technologies and hardware up-gradation are easily integrated
into the system.
• Server access is possible remotely from different locations and
types of systems.
Disadvantages of Network Operating System
• Servers are costly.
• User has to depend on a central location for most operations.
• Maintenance and updates are required regularly.
Examples of Network Operating Systems are Microsoft Windows Server
2003, Microsoft Windows Server 2008, UNIX, Linux, Mac OS X, Novell
NetWare, BSD, etc.
8. Real-Time Operating System
These types of OSs serve real-time systems. The time interval required to
process and respond to inputs is very small. This time interval is
called response time.
Real-time systems are used when there are time requirements that are very
strict like missile systems, air traffic control systems, robots, etc.
Types of Real-Time Operating Systems
• Hard Real-Time Systems:
Hard Real-Time OSs are meant for applications where time
constraints are very strict and even the shortest possible delay is
not acceptable. These systems are built for saving life like
automatic parachutes or airbags which are required to be readily
available in case of an accident. Virtual memory is rarely found in
these Advantages of RTOS
• Maximum Consumption: Maximum utilization of devices and
systems, thus more output from all the resources.
• Task Shifting: The time assigned for shifting tasks in these
systems is very less. For example, in older systems, it takes about
10 microseconds in shifting from one task to another, and in the
latest systems, it takes 3 microseconds.
• Focus on Application: Focus on running applications and less
importance on applications that are in the queue.
• Real-time operating system in the embedded system: Since the
size of programs is small, RTOS can also be used in embedded
systems like in transport and others.
• Error Free: These types of systems are error-free.
• Memory Allocation: Memory allocation is best managed in these
types of systems.
Disadvantages of RTOS
• Limited Tasks: Very few tasks run at the same time and their
concentration is very less on a few applications to avoid errors.
• Use heavy system resources: Sometimes the system resources
are not so good and they are expensive as well.
• Complex Algorithms: The algorithms are very complex and
difficult for the designer to write on.
• Device driver and interrupt signals: It needs specific device
drivers and interrupts signal to respond earliest to interrupts.
• Thread Priority: It is not good to set thread priority as these
systems are very less prone to switching tasks.
Examples of Real-Time Operating Systems are Scientific experiments,
medical imaging systems, industrial control systems, weapon systems,
robots, air traffic control systems, etc.

You might also like