wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Evolution of Operating system

profile
Dhruvi Bhatt
Jul 03, 2024
0 Likes
0 Discussions
322 Reads

An operating system is software that acts as an interface between the user and the hardware. It is responsible for handling various critical functions of the computer and utilizing resources very efficiently so the operating system is also known as a resource manager. The operating system also acts like a government because just as the government has authority over everything, the operating system has authority over all resources.  
 There are 4 types of generation in operating system 
  1.  The First Generation (1940 to early 1950s)
In 1940, an operating system was not included in the creation of the first electrical computer. Early computer users had complete control over the device and wrote programs in pure machine language for every task. During the computer generation, a programmer can merely execute and solve basic mathematical calculations. an operating system is not needed for these computations.

2. The Second Generation (1955 – 1965)
GMOSIS, the first operating system (OS) was developed in the early 1950s. For the IBM Computer, General Motors has created the operating system. Because it gathers all related jobs into groups or batches and then submits them to the operating system using a punch card to finish all of them, the second-generation operating system was built on a single-stream batch processing system.

3. The Third Generation (1965 – 1980)
Because it gathers all similar jobs into groups or batches and then submits them to the second generation operating system using a punch card to finish all jobs in a machine, the second-generation operating system was based on a single stream batch processing system. Control is transferred to the operating system upon each job’s completion, whether it be routinely or unexpectedly. The operating system cleans up after each work is finished before reading and starting the subsequent job on a punch card. Large, professionally operated machines known as mainframes were introduced after that.

4.The Fourth Generation (1980 – Present Day)
The fourth generation of personal computers is the result of these PDPs. The Generation IV (1980–Present)The evolution of the personal computer is linked to the fourth generation of operating systems. Nonetheless, the third-generation minicomputers and the personal computer have many similarities. At that time, minicomputers were only slightly more expensive than personal computers, which were highly expensive.


Comments ()


Sign in

Read Next

Electronic Evidence in Cyber Forensics

Blog banner

Understanding Business Layer in Data Science

Blog banner

Data Visualization in Decision-Making

Blog banner

What is Password Cracking ? and it's Techniques.

Blog banner

Starvation

Blog banner

How To Setup DVWA Using XAMPP on Windows

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

"Audit" In Data Science

Blog banner

Save Girl Child

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

How to write a cover letter

Blog banner

Operating system

Blog banner

What is Spyware?

Blog banner

THE INPACT OF SOCIAL MEDIA!

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

Modern Operating system

Blog banner

Electronic Funds Transfer

Blog banner

Theads

Blog banner

Dr. Venkadavarahan

Blog banner

Digital Marketing

Blog banner

Uniprocessor scheduling

Blog banner

The Features of Blockchain

Blog banner

MENDELEY

Blog banner

Meshoo

Blog banner

Getting into anime My anime suggestions

Blog banner

Policies for Service Transition

Blog banner

RSA (Rivest-Shamir-Adelman) Algorithm

Blog banner

Modern Operating Systems

Blog banner

INTERNET

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

Reclaim Your Bite and Beauty: All About Dental Restorative Treatments

Blog banner

Booting Process In Operating System

Blog banner

Types of Threads

Blog banner

Virtual Memory

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

Data Acquisition in Cyber Forensics

Blog banner

BUFFER OVERFLOW_142

Blog banner

Why Data Privacy Is Changing Online Advertising

Blog banner

Blog on health and fitness

Blog banner

BharatPe

Blog banner