wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Evolution of Operating system

profile
Dhruvi Bhatt
Jul 03, 2024
0 Likes
0 Discussions
325 Reads

An operating system is software that acts as an interface between the user and the hardware. It is responsible for handling various critical functions of the computer and utilizing resources very efficiently so the operating system is also known as a resource manager. The operating system also acts like a government because just as the government has authority over everything, the operating system has authority over all resources.  
 There are 4 types of generation in operating system 
  1.  The First Generation (1940 to early 1950s)
In 1940, an operating system was not included in the creation of the first electrical computer. Early computer users had complete control over the device and wrote programs in pure machine language for every task. During the computer generation, a programmer can merely execute and solve basic mathematical calculations. an operating system is not needed for these computations.

2. The Second Generation (1955 – 1965)
GMOSIS, the first operating system (OS) was developed in the early 1950s. For the IBM Computer, General Motors has created the operating system. Because it gathers all related jobs into groups or batches and then submits them to the operating system using a punch card to finish all of them, the second-generation operating system was built on a single-stream batch processing system.

3. The Third Generation (1965 – 1980)
Because it gathers all similar jobs into groups or batches and then submits them to the second generation operating system using a punch card to finish all jobs in a machine, the second-generation operating system was based on a single stream batch processing system. Control is transferred to the operating system upon each job’s completion, whether it be routinely or unexpectedly. The operating system cleans up after each work is finished before reading and starting the subsequent job on a punch card. Large, professionally operated machines known as mainframes were introduced after that.

4.The Fourth Generation (1980 – Present Day)
The fourth generation of personal computers is the result of these PDPs. The Generation IV (1980–Present)The evolution of the personal computer is linked to the fourth generation of operating systems. Nonetheless, the third-generation minicomputers and the personal computer have many similarities. At that time, minicomputers were only slightly more expensive than personal computers, which were highly expensive.


Comments ()


Sign in

Read Next

File management

Blog banner

A Brief Review on Cyber Forensics and its Analysis Tool

Blog banner

Importance Of Blockchain

Blog banner

All you need to know about Website Traffic

Blog banner

Data carving - using hex editor

Blog banner

What is Amazon?

Blog banner

AutoML: The Future of Automated Data Science

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner

Disk scheduling

Blog banner

Explain Kernel in OS

Blog banner

IoT Architecture Based Security

Blog banner

SNAPCHAT

Blog banner

Dental Problems That Start Small But Should Never Be Ignored

Blog banner

THE DESIRE OF MANY

Blog banner

Raid

Blog banner

Types Of scheduling

Blog banner

Texting is actually better than talking in person

Blog banner

Mumbai

Blog banner

Koinex is shutting down and here is how you can withdraw...

Blog banner

Photography

Blog banner

Digital Marketing - The new way to reach end consumer

Blog banner

What does the Australian summer have in store for your oral health?

Blog banner

All you need to know about “Off-page SEO”

Blog banner

Never give up

Blog banner

Dos (Denial of service) Attack

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

GEOLOGY AND GEO-TECTONIC FRAME WORK OF WESTERN BASTAR CRATON

Blog banner

Types of E-Commerce

Blog banner

How To Invest in Indian Stock Market For Beginners. ~ Tutorial 2 (NSDL And CSDL) Continued...

Blog banner

What is a Malware ?

Blog banner

Mail merge

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

What is Password Cracking ? and it's Techniques.

Blog banner

Quality check in IT services

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

Process states

Blog banner

Beautiful and stunning natural phenomena worth to see

Blog banner

GIS Topography

Blog banner

Cyber Forensic in the Banking sector

Blog banner

Network Forensics Tools and Techniques

Blog banner

Artificial Intelligence (AI)

Blog banner

Health is Wealth

Blog banner