wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Evolution of Operating system

profile
Yakin Shah
Jul 03, 2024
0 Likes
0 Discussions
119 Reads

An operating system is a type of software that acts as an interface between the user and the hardware. It is responsible for handling various critical functions of the computer and utilizing resources very efficiently so the operating system is also known as a resource manager. The operating system also acts like a government because just as the government has authority over everything, similarly the operating system has authority over all resources. Various tasks that are handled by OS are file management, task management, garbage management, memory management, process management, disk management, I/O management, peripherals management, etc. 

generation of minicomputers saw a new phase of growth and development.

There are 4 type of generation in operating system 

  1. The First Generation (1940 to early 1950s)

In 1940, an operating system was not included in the creation of the first electrical computer. Early computer users had complete control over the device and wrote programs in pure machine language for every task. During the computer generation, a programmer can merely execute and solve basic mathematical calculations. an operating system is not needed for these computations.

 

2. The Second Generation (1955 – 1965)

GMOSIS, the first operating system (OS) was developed in the early 1950s. For the IBM Computer, General Motors has created the operating system. Because it gathers all related jobs into groups or batches and then submits them to the operating system using a punch card to finish all of them, the second-generation operating system was built on a single-stream batch processing system.

 

3. The Third Generation (1965 – 1980)

Because it gathers all similar jobs into groups or batches and then submits them to the second generation operating system using a punch card to finish all jobs in a machine, the second-generation operating system was based on a single stream batch processing system. Control is transferred to the operating system upon each job’s completion, whether it be routinely or unexpectedly. The operating system cleans up after each work is finished before reading and starting the subsequent job on a punch card. Large, professionally operated machines known as mainframes were introduced after that.

4.The Fourth Generation (1980 – Present Day)

The fourth generation of personal computers is the result of these PDPs. The Generation IV (1980–Present)The evolution of the personal computer is linked to the fourth generation of operating systems. Nonetheless, the third-generation minicomputers and the personal computer have many similarities. At that time, minicomputers were only slightly more expensive than personal computers, which were highly expensive.


Comments ()


Sign in

Read Next

Deadlock and Starvation

Blog banner

Mobile Security

Blog banner

Access management

Blog banner

Odoo

Blog banner

Security issues

Blog banner

Teamwork

Blog banner

SPAM

Blog banner

VIRTUAL MACHINE

Blog banner

All you need to know about Website Traffic

Blog banner

How to make Pancakes

Blog banner

Starting Android Activity Using Intent

Blog banner

Topic: Sessions in Operating system

Blog banner

Deadlock

Blog banner

USES OF WHATSAPP

Blog banner

Clustering Techniques

Blog banner

ZOHO

Blog banner

Multithreading in Operating System

Blog banner

Southern Turkey Earthquake: Causes and Consequences of a Tragic Natural Disaster

Blog banner

Consumer to consumer business mode

Blog banner

File management -disha parekh

Blog banner

Bit Coins

Blog banner

GIS Applications: How Different Industries are Leveraging Geospatial Data

Blog banner

10 Unknown facts about India's Independence

Blog banner

Types of OS

Blog banner

Why we should do reading

Blog banner

OPERATING SYSTEM OBJECTIVES AND FAULT TOLERENCE.

Blog banner

HR Automation : Need of the hour

Blog banner

Dekkers Algorithm

Blog banner

IOT- Internet Of Things

Blog banner

Should you be using a mouthwash? Know from the experts

Blog banner

Processing Crime and Incident Scenes

Blog banner

Career v/s Job : Choose your passion

Blog banner

Deadlock in Operating System

Blog banner

Data Visualization – Importance and tools (Tableau, Power BI)

Blog banner

Virtual memory

Blog banner

SAVE TREES

Blog banner

Kafka - A Framework

Blog banner

Buffers in Operating Systems

Blog banner

Throttle engine ’Sneak peek into the future’

Blog banner

What is Minting & Mining

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner