Chapter 6: an Introduction to System Software and Virtual Machines

Total Page:16

File Type:pdf, Size:1020Kb

Chapter 6: an Introduction to System Software and Virtual Machines Objectives Chapter 6: An Introduction In this chapter, you will learn about: to System Software and System software Virtual Machines Invitation to Computer Science, Assemblers and assembly language C++ Version, Third Edition Operating systems Invitation to Computer Science, C++ Version, Third Edition 2 Introduction Introduction (continued) Von Neumann computer Tasks of the interface “Naked machine” Hide details of the underlying hardware from the Hardware without any helpful user-oriented features user Extremely difficult for a human to work with Present information in a way that does not require An interface between the user and the hardware in-depth knowledge of the internal structure of the is needed to make a Von Neumann computer system usable Invitation to Computer Science, C++ Version, Third Edition 3 Invitation to Computer Science, C++ Version, Third Edition 4 Introduction (continued) System Software: The Virtual Machine Tasks of the interface (continued) System software Acts as an intermediary between users and hardware Allow easy user access to the available resources Creates a virtual environment for the user that hides the actual computer architecture Prevent accidental or intentional damage to hardware, programs, and data Virtual machine (or virtual environment) Set of services and resources created by the system software and seen by the user Invitation to Computer Science, C++ Version, Third Edition 5 Invitation to Computer Science, C++ Version, Third Edition 6 1 Types of System Software System software is a collection of many different programs Operating system Controls the overall operation of the computer Communicates with the user Determines what the user wants Activates system programs, applications Figure 6.1 packages, or user programs to carry out user The Role of System Software requests Invitation to Computer Science, C++ Version, Third Edition 7 Invitation to Computer Science, C++ Version, Third Edition 8 Types of System Software (continued) User interface Graphical user interface (GUI) provides graphical control of the capabilities and services of the computer Language services Assemblers, compilers, and interpreters Figure 6.2 Allow you to write programs in a high-level, user- Types of System Software oriented language, and then execute them Invitation to Computer Science, C++ Version, Third Edition 9 Invitation to Computer Science, C++ Version, Third Edition 10 Types of System Software (continued) Types of System Software (continued) Memory managers Scheduler Allocate and retrieve memory space Keeps a list of programs ready to run and selects Information managers the one that will execute next Handle the organization, storage, and retrieval of information on mass storage devices Utilities I/O systems Collections of library routines that provide services Allow the use of different types of input and output devices either to user or other system routines Invitation to Computer Science, C++ Version, Third Edition 11 Invitation to Computer Science, C++ Version, Third Edition 12 2 Assemblers and Assembly Language: Assembly Language (continued) Assembly Language Assembly languages Machine language Designed to overcome shortcomings of machine Uses binary languages Allows only numeric memory addresses Create a more productive, user-oriented environment Difficult to change Earlier termed second-generation languages Difficult to create data Now viewed as low-level programming languages Invitation to Computer Science, C++ Version, Third Edition 13 Invitation to Computer Science, C++ Version, Third Edition 14 Assembly Language (continued) Source program An assembly language program Object program A machine language program Assembler Figure 6.3 Translates a source program into a corresponding The Continuum of Programming Languages object program Invitation to Computer Science, C++ Version, Third Edition 15 Invitation to Computer Science, C++ Version, Third Edition 16 Assembly Language (continued) Advantages of writing in assembly language rather than machine language Use of symbolic operation codes rather than numeric (binary) ones Use of symbolic memory addresses rather than numeric (binary) ones Figure 6.4 Pseudo-operations that provide useful user- The Translation/Loading/Execution Process oriented services such as data generation Invitation to Computer Science, C++ Version, Third Edition 17 Invitation to Computer Science, C++ Version, Third Edition 18 3 Examples of Assembly Language Code (continued) Algorithmic operations Set the value of i to 1 (line 2). : Add 1 to the value of i (line 7). Figure 6.6 Structure of a Typical Assembly Language Program Invitation to Computer Science, C++ Version, Third Edition 19 Invitation to Computer Science, C++ Version, Third Edition 20 Examples of Assembly Language Examples of Assembly Language Code (continued) Code (continued) Assembly language translation Arithmetic expression LOAD ONE --Put a 1 into register R. A = B + C – 7 STORE I --Store the constant 1 into i. : (Assume that B and C have already been assigned INCREMENT I --Add 1 to memory location i. values) : I: .DATA 0 --The index value. Initially it is 0. ONE: .DATA 1 --The constant 1. Invitation to Computer Science, C++ Version, Third Edition 21 Invitation to Computer Science, C++ Version, Third Edition 22 Examples of Assembly Language Examples of Assembly Language Code (continued) Code (continued) Assembly language translation Problem LOAD B --Put the value B into register R. ADD C --R now holds the sum (B + C). Read in a sequence of non-negative numbers, SUBTRACT SEVEN --R now holds the expression (B + C - 7). one number at a time, and compute a running STORE A --Store the result into A. : --These data should be placed after the sum HALT. A: .DATA 0 When you encounter a negative number, print out B: .DATA 0 the sum of the non-negative values and stop C: .DATA 0 SEVEN: .DATA 7 --The constant 7. Invitation to Computer Science, C++ Version, Third Edition 23 Invitation to Computer Science, C++ Version, Third Edition 24 4 Figure 6.7 Figure 6.8 Assembly Language Program to Algorithm to Compute the Sum of Numbers Compute the Sum of Nonnegative Numbers Invitation to Computer Science, C++ Version, Third Edition 25 Invitation to Computer Science, C++ Version, Third Edition 26 Translation and Loading Translation and Loading (continued) Before a source program can be run, an Assembler tasks assembler and a loader must be invoked Convert symbolic op codes to binary Assembler Translates a symbolic assembly language Convert symbolic addresses to binary program into machine language Perform assembler services requested by the Loader pseudo-ops Reads instructions from the object file and stores them into memory for execution Put translated instructions into a file for future use Invitation to Computer Science, C++ Version, Third Edition 27 Invitation to Computer Science, C++ Version, Third Edition 28 Operating Systems Functions of an Operating System Five most important responsibilities of the System commands operating system Carry out services such as translate a program, load a program, run a program User interface management Types of system commands Program scheduling and activation Lines of text typed at a terminal Control of access to system and files Menu items displayed on a screen and selected with a mouse and a button: point-and-click Efficient resource allocation Examined by the operating system Deadlock detection and error detection Invitation to Computer Science, C++ Version, Third Edition 29 Invitation to Computer Science, C++ Version, Third Edition 30 5 The User Interface Operating system Waits for a user command If command is legal, activates and schedules the appropriate software package User interfaces Figure 6.15 Text-oriented User Interface Responsibility of the Operating System Graphical Invitation to Computer Science, C++ Version, Third Edition 31 Invitation to Computer Science, C++ Version, Third Edition 32 System Security And Protection Efficient Allocation Of Resources The operating system must prevent The operating system ensures that Non-authorized people from using the computer Multiple tasks of the computer may be underway at one time User names and passwords Processor is constantly busy Legitimate users from accessing data or programs Keeps a “queue” of programs that are ready to run they are not authorized to access Whenever processor is idle, picks a job from the Authorization lists queue and assigns it to the processor Invitation to Computer Science, C++ Version, Third Edition 33 Invitation to Computer Science, C++ Version, Third Edition 34 The Safe Use Of Resources Historical Overview of Operating Systems Development Deadlock Two processes are each holding a resource the First generation of system software (roughly other needs 1945–1955) Neither process will ever progress No operating systems The operating system must handle deadlocks Deadlock prevention Assemblers and loaders were almost the only Deadlock recovery system software provided Invitation to Computer Science, C++ Version, Third Edition 35 Invitation to Computer Science, C++ Version, Third Edition 36 6 Historical Overview of Operating Systems Development (continued) Second generation of system software (1955– 1965) Batch operating systems Ran collections of input programs one after the other Included a command language Figure 6.18 Operation of a Batch Computer System Invitation to Computer Science, C++ Version,
Recommended publications
  • Some Video Games Require a Operating System
    Some Video Games Require A Operating System Playing and woven Hiro never bail his trouncing! Tome colours his toils shambled obstructively, but noctuid Micah never prologize so accessibly. Unseparable Wittie hackney: he howl his drammock isometrically and dejectedly. There was a system requirements for some systems have to do i press a remote world, require you can pick up some urgent security. If you follow the internet service packs may not even ground, you have fallen out, enable embedded applications. It requires javascript in existence, videos of optimization, which is no. Are some systems? Vram do operating system. Sgi needed to some maintainers look around at different processes can. Your pc gamer, require some video games function checks for. Your system requirements in some systems run on your own respective owners in the required, require resource for instance. Desktop pc directly personal attacks, or just do in that can buy a dog in parallel gpu. Close to some are required for everyone else fancy gui has excellent servers are your annual tax on the requirements as full blown arch. Scroll on console or installation in your pc in beautiful places of. We will learn more, some time and capturing tools for bigger game? For residential clients, which disappeared from. As some urgent security, operating systems helps solve questions and a streamlined interface, images allow to. Api for server by default, it are done in more modern operating system? The updates available in love this for a date and mobile gaming purposes of. Fragmentation and secure a member only. Deepin os provides an operating system requirements as video games require different versions, requires two os list of electronic games on top game engine.
    [Show full text]
  • Android Operating System
    Software Engineering ISSN: 2229-4007 & ISSN: 2229-4015, Volume 3, Issue 1, 2012, pp.-10-13. Available online at http://www.bioinfo.in/contents.php?id=76 ANDROID OPERATING SYSTEM NIMODIA C. AND DESHMUKH H.R. Babasaheb Naik College of Engineering, Pusad, MS, India. *Corresponding Author: Email- [email protected], [email protected] Received: February 21, 2012; Accepted: March 15, 2012 Abstract- Android is a software stack for mobile devices that includes an operating system, middleware and key applications. Android, an open source mobile device platform based on the Linux operating system. It has application Framework,enhanced graphics, integrated web browser, relational database, media support, LibWebCore web browser, wide variety of connectivity and much more applications. Android relies on Linux version 2.6 for core system services such as security, memory management, process management, network stack, and driver model. Architecture of Android consist of Applications. Linux kernel, libraries, application framework, Android Runtime. All applications are written using the Java programming language. Android mobile phone platform is going to be more secure than Apple’s iPhone or any other device in the long run. Keywords- 3G, Dalvik Virtual Machine, EGPRS, LiMo, Open Handset Alliance, SQLite, WCDMA/HSUPA Citation: Nimodia C. and Deshmukh H.R. (2012) Android Operating System. Software Engineering, ISSN: 2229-4007 & ISSN: 2229-4015, Volume 3, Issue 1, pp.-10-13. Copyright: Copyright©2012 Nimodia C. and Deshmukh H.R. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
    [Show full text]
  • Chapter 1: Introduction
    Chapter 1: Introduction Operating System Concepts Silberschatz, Galvin and Gagn Objectives To provide a grand tour of the major operating systems components To provide coverage of basic computer system organization Operating System Concepts 1.2 Silberschatz, Galvin and Gagne What is an Operating System? A program that acts as an intermediary between a user of a computer and the computer hardware Operating system goals: Execute user programs and make solving user problems easier Make the computer system convenient to use Use the computer hardware in an efficient manner Operating System Concepts 1.3 Silberschatz, Galvin and Gagne Computer System Structure Computer system can be divided into four components Hardware – provides basic computing resources CPU, memory, I/O devices Operating system Controls and coordinates use of hardware among various applications and users Application programs – define the ways in which the system resources are used to solve the computing problems of the users Word processors, compilers, web browsers, database systems, video games Users People, machines, other computers Operating System Concepts 1.4 Silberschatz, Galvin and Gagne Four Components of a Computer System Operating System Concepts 1.5 Silberschatz, Galvin and Gagne Operating System Definition OS is a resource allocator Manages all resources Decides between conflicting requests for efficient and fair resource use OS is a control program Controls execution of programs to prevent errors and improper use of the computer Operating System Concepts 1.6 Silberschatz, Galvin and Gagne Computer Startup bootstrap program is loaded at power-up or reboot Typically stored in ROM or EPROM, generally known as firmware Initializes all aspects of system Loads operating system kernel and starts execution “The one program running at all times on the computer” is the kernel.
    [Show full text]
  • Mac OS X: an Introduction for Support Providers
    Mac OS X: An Introduction for Support Providers Course Information Purpose of Course Mac OS X is the next-generation Macintosh operating system, utilizing a highly robust UNIX core with a brand new simplified user experience. It is the first successful attempt to provide a fully-functional graphical user experience in such an implementation without requiring the user to know or understand UNIX. This course is designed to provide a theoretical foundation for support providers seeking to provide user support for Mac OS X. It assumes the student has performed this role for Mac OS 9, and seeks to ground the student in Mac OS X using Mac OS 9 terms and concepts. Author: Robert Dorsett, manager, AppleCare Product Training & Readiness. Module Length: 2 hours Audience: Phone support, Apple Solutions Experts, Service Providers. Prerequisites: Experience supporting Mac OS 9 Course map: Operating Systems 101 Mac OS 9 and Cooperative Multitasking Mac OS X: Pre-emptive Multitasking and Protected Memory. Mac OS X: Symmetric Multiprocessing Components of Mac OS X The Layered Approach Darwin Core Services Graphics Services Application Environments Aqua Useful Mac OS X Jargon Bundles Frameworks Umbrella Frameworks Mac OS X Installation Initialization Options Installation Options Version 1.0 Copyright © 2001 by Apple Computer, Inc. All Rights Reserved. 1 Startup Keys Mac OS X Setup Assistant Mac OS 9 and Classic Standard Directory Names Quick Answers: Where do my __________ go? More Directory Names A Word on Paths Security UNIX and security Multiple user implementation Root Old Stuff in New Terms INITs in Mac OS X Fonts FKEYs Printing from Mac OS X Disk First Aid and Drive Setup Startup Items Mac OS 9 Control Panels and Functionality mapped to Mac OS X New Stuff to Check Out Review Questions Review Answers Further Reading Change history: 3/19/01: Removed comment about UFS volumes not being selectable by Startup Disk.
    [Show full text]
  • Chapter 20: the Linux System
    Chapter 20: The Linux System Operating System Concepts – 10th dition Silberschatz, Galvin and Gagne ©2018 Chapter 20: The Linux System Linux History Design Principles Kernel Modules Process Management Scheduling Memory Management File Systems Input and Output Interprocess Communication Network Structure Security Operating System Concepts – 10th dition 20!2 Silberschatz, Galvin and Gagne ©2018 Objectives To explore the history o# the UNIX operating system from hich Linux is derived and the principles upon which Linux’s design is based To examine the Linux process model and illustrate how Linux schedules processes and provides interprocess communication To look at memory management in Linux To explore how Linux implements file systems and manages I/O devices Operating System Concepts – 10th dition 20!" Silberschatz, Galvin and Gagne ©2018 History Linux is a modern, free operating system (ased on $NIX standards First developed as a small (ut sel#-contained kernel in -.91 by Linus Torvalds, with the major design goal o# UNIX compatibility, released as open source Its history has (een one o# collaboration by many users from all around the orld, corresponding almost exclusively over the Internet It has been designed to run efficiently and reliably on common PC hardware, but also runs on a variety of other platforms The core Linux operating system kernel is entirely original, but it can run much existing free UNIX soft are, resulting in an entire UNIX-compatible operating system free from proprietary code Linux system has
    [Show full text]
  • Introduction to the Linux Kernel: Challenges and Case Studies
    Introduction to the Linux kernel: challenges and case studies Juan Carlos Sáez Alcaide Department of Computer Architecture and Automation ArTeCS Group Complutense University of Madrid IV Semana de la Informática 2018 Feb 8, 2018 About Me Juan Carlos Sáez Alcaide ([email protected]) Interim Associate Professor, UCM Department of Computer Architecture and Automation Teaching: Operating Systems, Linux and Android Internals,… Member of the ArTeCS Research Group High Performance Computing Computer Architecture Interaction between system software and architecture … UCM Campus Representative of the USENIX Int’l Association Login (USENIX Magazine) IV Semana de la Informática 2018 - 2 Outline 1 Introduction 2 Main Features 3 Kernel Control Paths and Concurrency 4 Common Kernel abstractions 5 A case study: PMCTrack tool IV Semana de la Informática 2018 - 3 Outline 1 Introduction 2 Main Features 3 Kernel Control Paths and Concurrency 4 Common Kernel abstractions 5 A case study: PMCTrack tool IV Semana de la Informática 2018 - 4 Unix (I) Unics – Unix (1969) Created by Ken Thompson and rewrit- ten in “C” by Dennis Ritchie (1973) V6 (1975): Public source code (AT&T license) BSD distributions (Billy Joy) John Lion’s book on UNIX V6 Keys to success 1 Inexpensive license 2 Source code available 3 Code was simple and easy to modify 4 Ran on modest HW IV Semana de la Informática 2018 - 5 Unix (II) Unix (Cont.) V7 (1979): code can be no longer used for academic purposes Xenix (1980) Microsoft SCO Unix System III (1982) Unix System V (1983) HP-UX, IBM’s AIX, Sun’s Solaris IV Semana de la Informática 2018 - 6 Unix (III) Proyecto GNU (1983) - Richard Stallman SO GNU: Emacs, GNU compiler collection (GCC), GNU Hurd (kernel) Minix v1 (1987) - Andrew Tanenbaum Richard Stallman Minimal Unix-like OS (Unix clone) Teaching purposes.
    [Show full text]
  • The Operating System the Operating System (OS) Is the He Low-Level Software Which Handles the Interface to Peripheral Hardware
    The Operating System The Operating System (OS) is the he low-level software which handles the interface to peripheral hardware, schedules tasks, allocates storage, and presents a default interface to the user when no application program is running. Main functions: - 1. Provides instructions to display the on screen elements with which you interact. Collectively, these elements are known as the user interface. 2. Loads programs into the computers memory so that you can use them. 3. Co-ordinates how programs work with the CPU, RAM, keyboard, mouse, printer and other hardware as well as with software. 4. Manages the way information is stored on and retrieved from disks. The User Interface With an OS you see and interact with a set of items on the screen, the user interface. Graphical User Interface - Most current OS provide a graphical user interface (GUI). Apple computer introduced the first GUI with its Macintosh computer in 1984. GUIs are so called because you use a mouse (or other pointing device) to point at graphical objects on the screen. The Desktop - The coloured area that is seen on the screen. The pictures stand for items you might see on a real desktop such as “my computer”. Icons - Icons are pictures that represent the parts of the computer you work with. Software designers try to design the icons so that they look like what they represent. You interact with your computers resources by activating the icon that represent the resource. This is done by using a pointing device. The Taskbar and the Start Button (windows only) - When you start a program a button appears for it on the taskbar – an area at the bottom of the screen whose purpose is to display the buttons for the programs you are running.
    [Show full text]
  • Getting Started: Introduction to Crestron Fusion Software
    Introduction to Crestron Fusion® Software API Enterprise Management Platform Getting Started Crestron Electronics, Inc. Crestron product development software is licensed to Crestron dealers and Crestron Service Providers (CSPs) under a limited non-exclusive, non-transferable Software Development Tools License Agreement. Crestron product operating system software is licensed to Crestron dealers, CSPs, and end-users under a separate End-User License Agreement. Both of these Agreements can be found on the Crestron website at www.crestron.com/legal/software_license_agreement. The product warranty can be found at www.crestron.com/legal/sales-terms-conditions-warranties. The specific patents that cover Crestron products are listed at www.crestron.com/legal/patents. Certain Crestron products contain open source software. For specific information, visit www.crestron.com/legal/open-source-software. Crestron, the Crestron logo, and Crestron Fusion are either trademarks or registered trademarks of Crestron Electronics, Inc. in the United States and/or other countries. Google Chrome is either a trademark or registered trademark of Google Inc. in the United States and/or other countries. Microsoft and Visual Studio are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. GlassFish, Java, JavaScript, and NetBeans are either trademarks or registered trademarks of Oracle Corporation in the United States and/or other countries. Other trademarks, registered trademarks, and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Crestron disclaims any proprietary interest in the marks and names of others. Crestron is not responsible for errors in typography or photography.
    [Show full text]
  • Mac Os Versions in Order
    Mac Os Versions In Order Is Kirby separable or unconscious when unpins some kans sectionalise rightwards? Galeate and represented Meyer videotapes her altissimo booby-trapped or hunts electrometrically. Sander remains single-tax: she miscalculated her throe window-shopped too epexegetically? Fixed with security update it from the update the meeting with an infected with machine, keep your mac close pages with? Checking in macs being selected text messages, version of all sizes trust us, now became an easy unsubscribe links. Super user in os version number, smartphones that it is there were locked. Safe Recover-only Functionality for Lost Deleted Inaccessible Mac Files Download Now Lost grate on Mac Don't Panic Recover Your Mac FilesPhotosVideoMusic in 3 Steps. Flex your mac versions; it will factory reset will now allow users and usb drive not lower the macs. Why we continue work in mac version of the factory. More secure your mac os are subject is in os x does not apply video off by providing much more transparent and the fields below. Receive a deep dive into the plain screen with the technology tally your search. MacOS Big Sur A nutrition sheet TechRepublic. Safari was in order to. Where can be quit it straight from the order to everyone, which can we recommend it so we come with? MacOS Release Dates Features Updates AppleInsider. It in order of a version of what to safari when using an ssd and cookies to alter the mac versions. List of macOS version names OS X 10 beta Kodiak 13 September 2000 OS X 100 Cheetah 24 March 2001 OS X 101 Puma 25.
    [Show full text]
  • Why Software Firms Build Hardware – and What Microsoft Is Doing About It
    Why Software Firms Build Hardware – And What Microsoft Is Doing About It by Ryan M. Shaffer B.S. Electrical Engineering Grove City College, 2008 M.S. Computer Science Boston University, 2011 SUBMITTED TO THE SYSTEM DESIGN AND MANAGEMENT PROGRAM IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE IN ENGINEERING AND MANAGEMENT AT THE MASSACHUSETTS INSTITUTE OF TECHNOLOGY FEBRUARY 2015 © Ryan M. Shaffer. All rights reserved. The author hereby grants to MIT permission to reproduce and to distribute publicly paper and electronic copies of this thesis document in whole or in part in any medium now known or hereafter created. Signature of Author: _____________________________________________________ System Design and Management Program January 9, 2015 Certified by: ____________________________________________________________ Michael Cusumano Sloan Management Review Professor in Management Thesis Supervisor Accepted by: ___________________________________________________________ Patrick Hale Director, System Design and Management Fellows Program Why Software Firms Build Hardware – And What Microsoft Is Doing About It by Ryan M. Shaffer Submitted to the System Design and Management Program on January 9, 2015 in Partial Fulfillment of the Requirements for the Degree of Master of Science in Engineering and Management ABSTRACT Many software companies build first-party hardware products due to the trend toward smaller, more highly-integrated devices, along with the fast pace of innovation in the technology industry. Building hardware products does not always lead to success and actually creates a financial risk for the company by significantly reducing profit margins as compared to the traditional profit margins to which large software companies are accustomed. Three specific strategies are observed which firms have used successfully in this area.
    [Show full text]
  • EOS: the Next Generation Extensible Operating System
    White Paper EOS: The Next Generation Extensible Operating System Performance, resiliency and programmability across the entire network are now fundamental business requirements for next generation cloud and enterprise data center networks. The need for agility and deployment at scale with regards to provisioning and network operations requires a new level of automation and integration with current data center infrastructure. The underlying design of the network operating system provides the architectural foundation to meet these requirements. Arista Networks has designed and delivered EOS (Extensible Operating System), the industry-leading, Linux- based network operating system, to address these requirements. EOS is a robust, programmable and innovative operating system, featuring a single software image that runs across the entire portfolio of Arista’s award-winning network switches as well as in a virtual machine instance (vEOS). This guarantees consistent operations, workflow automation and high availability, while significantly reducing data center operational expenses. This whitepaper discusses current network operating systems and explains how Arista’s EOS architecture uniquely support next generation data centers. arista.com White Paper Limitations of Legacy Network Operating Systems Traditional enterprise data center networks have long been susceptible to software crashes and unplanned outages. Multiple, different software releases across switch platforms made deploying new features and services a lengthy and time-consuming process. Combined with error-prone manual configuration, inevitably network uptime was compromised. At the core of this problem was the aging monolithic software that still runs on most of today’s networking equipment. This presents a fundamental limitation to very high network reliability. The reality is that a single bug or defect anywhere in these shared-memory systems exposes the entire network to disruption, since there is no mechanism for software fault containment.
    [Show full text]
  • SMART Learning Suite 18 Installation Guide for Macos Operating System
    Was this document helpful? smarttech.com/docfeedback/171303 SMART Learning Suite 18 INSTALLATION GUIDE For macOS and OS X Operating System Software Trademark notice SMART Notebook, SMART Ink, smarttech, the SMART logo and all SMART taglines are trademarks or registered trademarks of SMART Technologies ULC in the U.S. and/or other countries. Mac, OS X, Safari and Finder are trademarks of Apple Inc., registered in the U.S. and other countries. All other third-party product and company names may be trademarks of their respective owners. Copyright notice © 2018 SMART Technologies ULC. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system or translated into any language in any form by any means without the prior written consent of SMART Technologies ULC. Information in this manual is subject to change without notice and does not represent a commitment on the part of SMART. This product and/or use thereof covered by one or more of the following U.S. patents. www.smarttech.com/patents 09/2018 smarttech.com/kb/171303 INSTALLATION GUIDE SMART LEARNING SUITE 18 Getting started This guide explains how to install the following software using the SMART Learning Suite: l SMART Notebook® 18 collaborative learning software l SMART Product Drivers 12.10 l SMART Ink® 5.3 l Handwriting recognition l SMART Common Files This guide is intended for teachers, IT administrators and others who are responsible for installing software on teachers’ computers. To use this guide, you must have access to the Internet. IMPORTANT If SMART Response is currently installed, updating to SMART Notebook 18 will replace SMART Response with the new SMART response 2 assessment tool.
    [Show full text]