wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Functions Of Operating Systems

profile
Abdul Khalique Mistry
Jul 04, 2024
0 Likes
0 Discussions
72 Reads

Functions of an Operating System

 1. Memory Management

  An Operating System performs the following activities for Memory Management:

 • It keeps track of primary memory, i.e., which bytes of memory are used by which user program. The memory addresses that have already been allocated and the memory addresses of the memory that has not yet been used.

  • In multiprogramming, the OS decides the order in which processes are granted memory access, and for how long.

  • It Allocates the memory to a process when the process requests it and deallocates the memory when the process has terminated or is performing an I/O operation.

 

  2. Process Management

 An Operating System performs the following activities for Processor Management:

 • An operating system manages the processor’s work by allocating various jobs to it and ensuring that each process receives enough time from the processor to function properly.

 • Keeps track of the status of processes. The program which performs this task is known as a traffic controller.

• Allocates the CPU that is a processor to a process. De-allocates processor when a process is no longer required.

 

 3. Device Management

 An OS manages device communication via its respective drivers. It performs the following activities for device management:

 • Keeps track of all devices connected to the system. Designates a program responsible for every device known as the Input/Output controller.

• Decide which process gets access to a certain device and for how long.

• Allocates devices effectively and efficiently. Deallocates devices when they are no longer required.

• There are various input and output devices. An OS controls the working of these input-output devices.

 

 4. File Management

 A file system is organized into directories for efficient or easy navigation and usage. These directories may contain other directories and other files. An Operating System carries out the following file management activities:

  • It keeps track of where information is stored, user access settings, the status of every file, and more. These facilities are collectively known as the file system.

  • An OS keeps track of information regarding the creation, deletion, transfer, copy, and storage of files in an organized way.

  • It also maintains the integrity of the data stored in these files, including the file directory structure, by protecting against unauthorized access.

 

  5. Protection and Security Management

  The operating system uses password protection to protect user data and similar other techniques. it also prevents unauthorized access to programs and user data. The operating system provides various techniques which assure the integrity and confidentiality of user data. The following security measures are used to protect user data:

 • Protection against unauthorized access through login.

 • Protection against intrusion by keeping the firewall active.

• Protecting the system memory against malicious access.

 • Displaying messages related to system vulnerabilities.


Comments ()


Sign in

Read Next

Outlook.com

Blog banner

Challenges and risks in service operations

Blog banner

evolution of operating system - Disha Parekh

Blog banner

Memory Management in an Operating System

Blog banner

10 Types of Friends in every friend group

Blog banner

Fault Tolerance in an Operating System

Blog banner

Way to make your meal healthier.

Blog banner

How to kiss

Blog banner

operating system

Blog banner

Pilgrimage at LOC: A privilege and a paradox

Blog banner

IS CONVERTING AMBITION INTO PROFESSION?

Blog banner

Operating System

Blog banner

"Life as a Part-time Student"

Blog banner

What is a Dumpster Diving Attack?

Blog banner

JUSTICE FOR EVERY “BEZUBAAN ANIMAL”

Blog banner

Busted : Common Web Security Myths

Blog banner

Open Source Project By Google

Blog banner

Deadlocks

Blog banner

10 Unsolved Mysteries all over the world

Blog banner

Uber

Blog banner

Service Operation

Blog banner

What Makes Patola the Queen of Silk?

Blog banner

Dudhasagar waterfall ?

Blog banner

Types of E-Commerce

Blog banner

Education?

Blog banner

Importance Of Blockchain

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

Decoding the Weave — How to Identify Original Patola Art on a Fabric

Blog banner

Financial Stress and Mental Health

Blog banner

Data Science & AI

Blog banner

Cyber Security in Data Breaching

Blog banner

How return on investment is defined in IT services

Blog banner

Cache memory

Blog banner

The Role of cryptography in cyber security

Blog banner

Therapy Myths That Need to End in 2025

Blog banner

Tea, Coffee, Red Wine, and Teeth: A Stain Survival Guide

Blog banner

Remote Work in 2026

Blog banner

Linux VServer Architecture

Blog banner

Deadlock

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

Embracing the power of Modern Machine UNIX

Blog banner

Memory Management

Blog banner