wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Evolution of Operating system

profile
Yakin Shah
Jul 03, 2024
0 Likes
0 Discussions
119 Reads

An operating system is a type of software that acts as an interface between the user and the hardware. It is responsible for handling various critical functions of the computer and utilizing resources very efficiently so the operating system is also known as a resource manager. The operating system also acts like a government because just as the government has authority over everything, similarly the operating system has authority over all resources. Various tasks that are handled by OS are file management, task management, garbage management, memory management, process management, disk management, I/O management, peripherals management, etc. 

generation of minicomputers saw a new phase of growth and development.

There are 4 type of generation in operating system 

  1. The First Generation (1940 to early 1950s)

In 1940, an operating system was not included in the creation of the first electrical computer. Early computer users had complete control over the device and wrote programs in pure machine language for every task. During the computer generation, a programmer can merely execute and solve basic mathematical calculations. an operating system is not needed for these computations.

 

2. The Second Generation (1955 – 1965)

GMOSIS, the first operating system (OS) was developed in the early 1950s. For the IBM Computer, General Motors has created the operating system. Because it gathers all related jobs into groups or batches and then submits them to the operating system using a punch card to finish all of them, the second-generation operating system was built on a single-stream batch processing system.

 

3. The Third Generation (1965 – 1980)

Because it gathers all similar jobs into groups or batches and then submits them to the second generation operating system using a punch card to finish all jobs in a machine, the second-generation operating system was based on a single stream batch processing system. Control is transferred to the operating system upon each job’s completion, whether it be routinely or unexpectedly. The operating system cleans up after each work is finished before reading and starting the subsequent job on a punch card. Large, professionally operated machines known as mainframes were introduced after that.

4.The Fourth Generation (1980 – Present Day)

The fourth generation of personal computers is the result of these PDPs. The Generation IV (1980–Present)The evolution of the personal computer is linked to the fourth generation of operating systems. Nonetheless, the third-generation minicomputers and the personal computer have many similarities. At that time, minicomputers were only slightly more expensive than personal computers, which were highly expensive.


Comments ()


Sign in

Read Next

Multicore CPUs

Blog banner

OS assignment 3

Blog banner

The Importance of Data Quality Management in Data Science

Blog banner

A little bit of salt is all the hash needs!

Blog banner

Telegram and it's features

Blog banner

Maharashtrian culture: Tradition, Art, Food

Blog banner

Article on IT development trends

Blog banner

Business-to-Business

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

EMAIL INVESTIGATION

Blog banner

Some web vulnerabilities

Blog banner

Asana

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

HUBSPOT

Blog banner

Direct Memory Access

Blog banner

Meshoo

Blog banner

What is Packet Filtering?

Blog banner

Dudhasagar waterfall ?

Blog banner

LinkedIn: Watch out for these 7 upcoming updates in 2023

Blog banner

Critical success factors

Blog banner

What is Email? Uses of Emails

Blog banner

SMARTSHEET MANAGEMENT SOFTWARE

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

Security in Cloud Computing

Blog banner

"Geographic Information Systems (GIS) and its Applications in Urban Planning"

Blog banner

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner

THREADS (assignment 1)

Blog banner

Data Visualization – Importance and tools (Tableau, Power BI)

Blog banner

Microsoft powerpoint presentation

Blog banner

Microsoft Windows Overview

Blog banner

Virtual memory

Blog banner

Mumbai

Blog banner

TECHNOLOGY : BOON OR CURSE ?

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

Pandas Matrix Applications

Blog banner

INTRODUCTION

Blog banner

E-security systems | CCTV

Blog banner

Buffer overflow

Blog banner

Virtual Machine

Blog banner

Koinex is shutting down and here is how you can withdraw...

Blog banner

Cache Memory

Blog banner