wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

ACHIEVEMENTS IN OPERATING SYSTEMS

profile
Shreya Mantry
Jul 04, 2024
0 Likes
0 Discussions
187 Reads

ACHIEVEMENTS OF OPERATING SYSTEMS

Operating systems are the most important development in the history of computers. with this there were many challenges which came along. As time passed more efficient alternatives started evolving n thereby decreasing the number of challenges

Majorly we have 4 theoretical advances in the development of operating systems:

  • Processes -
    • Process is a simple program which needs to be executed whenever a command is entered. it may include data stored in variables and buffers.
    • The CPU is responsible for executing these processes. OS also looks in if there is any other task awaited for execution during current process etc.
    • the components of os are data space, registers, stack, pc, and execution code.
  • Memory management - 
    • Memory management deals with the function of storing data required for the execution of the proceses. most of the data is stored in the virtual memory. a reference is created to access this.
    • OS has five principal storage management responsibilities: process isolation, automatic allocation and management, support of modular program, protection and access control, and long term storage.
    • Virtual memory is a facility that allows programs to address memory from a logical point of view.
  • Information protection and security - 
    • Withe the help of OS, some general purpose tools have been created which ensure security of the computer data. 
    • the overall workof information protection and security is divided into 4 groups namely : availabilty, confidentiality (prevents data to be read from unauthorized source), authenity (proper verfication of data and identity of users) and data integrerity (protection from unauthorized modifications).   
  • Scheduling and resource management - 
    • The  most important task of os is to mange resources and schedule their usage.
    • IT should aim to give fair n equal access to all resources.
    • OS should maximise output, minimize the time required for response and accomodate as many as users as possible. 

 


Comments ()


Sign in

Read Next

What are NFT s?

Blog banner

GUIDE TO GIS

Blog banner

Security issues

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

Data Mining

Blog banner

10 Reasons to date your best friend

Blog banner

Why we fail after giving 100% ?

Blog banner

Risk factors in service transistion

Blog banner

File system implementation

Blog banner

Virtual Machine

Blog banner

Traditional UNIX Scheduling

Blog banner

How Does SSO Works

Blog banner

NETSUITE

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

First-Order Logic (FOL): The Foundation of Modern Logic

Blog banner

10 Interesting Facts about Death Note

Blog banner

VIRTUAL MACHINES

Blog banner

Busted : Common Web Security Myths

Blog banner

Importance Of Education.

Blog banner

Social media

Blog banner

Direct Memory Access

Blog banner

Understanding Mobile Device Forensics

Blog banner

How To Setup DVWA Using XAMPP on Windows

Blog banner

HTML vs HTML5

Blog banner

What Makes Patola the Queen of Silk?

Blog banner

Next time you click on "Remind me later", think twice!

Blog banner

Top 3 Places To Stay In Vienna

Blog banner

Photorec - media recovery tool

Blog banner

Some web vulnerabilities

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

Deadlock

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

Microsoft powerpoint presentation

Blog banner

Current Trends in GIS and Remote Sensing(Ocean Applications)

Blog banner

Mumbai Metro 3

Blog banner

undefined

Blog banner

Open Source Project By Google

Blog banner

Full Disk Encryption on Digital Forensics

Blog banner

Points to consider if you're planning to visit Florida in 2026

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

Virtual memory

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner