wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Evolution of Operating system

profile
Dhruvi Bhatt
Jul 03, 2024
0 Likes
0 Discussions
311 Reads

An operating system is software that acts as an interface between the user and the hardware. It is responsible for handling various critical functions of the computer and utilizing resources very efficiently so the operating system is also known as a resource manager. The operating system also acts like a government because just as the government has authority over everything, the operating system has authority over all resources.  
 There are 4 types of generation in operating system 
  1.  The First Generation (1940 to early 1950s)
In 1940, an operating system was not included in the creation of the first electrical computer. Early computer users had complete control over the device and wrote programs in pure machine language for every task. During the computer generation, a programmer can merely execute and solve basic mathematical calculations. an operating system is not needed for these computations.

2. The Second Generation (1955 – 1965)
GMOSIS, the first operating system (OS) was developed in the early 1950s. For the IBM Computer, General Motors has created the operating system. Because it gathers all related jobs into groups or batches and then submits them to the operating system using a punch card to finish all of them, the second-generation operating system was built on a single-stream batch processing system.

3. The Third Generation (1965 – 1980)
Because it gathers all similar jobs into groups or batches and then submits them to the second generation operating system using a punch card to finish all jobs in a machine, the second-generation operating system was based on a single stream batch processing system. Control is transferred to the operating system upon each job’s completion, whether it be routinely or unexpectedly. The operating system cleans up after each work is finished before reading and starting the subsequent job on a punch card. Large, professionally operated machines known as mainframes were introduced after that.

4.The Fourth Generation (1980 – Present Day)
The fourth generation of personal computers is the result of these PDPs. The Generation IV (1980–Present)The evolution of the personal computer is linked to the fourth generation of operating systems. Nonetheless, the third-generation minicomputers and the personal computer have many similarities. At that time, minicomputers were only slightly more expensive than personal computers, which were highly expensive.


Comments ()


Sign in

Read Next

Flipkart

Blog banner

child Labour

Blog banner

c

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner

Service design process in ITSM

Blog banner

Different Types of Data

Blog banner

Internet of Things and cyber security

Blog banner

Old age lifestyle

Blog banner

Mobile Survey

Blog banner

Routers

Blog banner

Tracking Emails & Email Crimes

Blog banner

USPS mail

Blog banner

Data carving - using hex editor

Blog banner

Phishing

Blog banner

Why Data Privacy Is Changing Online Advertising

Blog banner

Deadlock

Blog banner

bulk email software

Blog banner

Tomato Butter Sauce with Bucatini

Blog banner

"The Benefits of Using GIS in Agriculture"

Blog banner

Deadlock and Starvation

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

Asana

Blog banner

Drawing tips for a beginner

Blog banner

The Importance of Data Quality Management in Data Science

Blog banner

OPERATING SYSTEM

Blog banner

Impact of social media on the human life

Blog banner

Tea, Coffee, Red Wine, and Teeth: A Stain Survival Guide

Blog banner

BUSINESS MODELS OF E COMMERCE

Blog banner

?Why Social and Emotional Skills Matter More Than ABCs in Early Years?

Blog banner

Data Mining

Blog banner

Design Considerations for Disk Cache Management

Blog banner

Trends that began during the pandemic

Blog banner

IO Buffers

Blog banner

DURGA POOJA

Blog banner

Virtual machine

Blog banner

Note on Process, Process creation and Process termination

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

The Peephole

Blog banner

Indian Culture and Tradition

Blog banner

Incident management in ITSM

Blog banner

Short-Form Video Marketing: Why It's Dominating the Internet

Blog banner