wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Functions of Operating System

profile
Jeet Ved
Jul 04, 2024
0 Likes
0 Discussions
85 Reads

Operating System(OS)

 

An operating system (OS) is software that controls computer hardware and provides services to computer applications. It acts as an intermediary between applications and computer hardware, communication and resource management.

 

Functions of OS

 

1.Memory Management:

 

 It keeps track of primary memory, i.e., which bytes of memory are used by which user program. The memory addresses that have already been allocated and the memory addresses of the memory that has not yet been used.

 

 It Allocates the memory to a process when the process requests it and deallocates the memory when the process has terminated or is performing an I/O operation.

 

2. Security and Protection:

 

The OS enforces security measures to protect system resources from unauthorized access and ensure data availability.

 

It provides user identification mechanisms, access controls, and encryption to protect sensitive information and system functionality.

 

3.File Management:

 

The OS manages file storage, organization, and access through a hierarchical file system structure. It supports operations like file creation, deletion, reading, writing, and modification.

 

It handles file permissions and manages disk space allocation to optimize storage efficiency.

 

4.Process Management:

 

An operating system controls the workload of the processor by allocating various tasks to it and ensuring that each process gets enough time from the processor to run efficiently.

 

It stores the state of the systems. The program that performs this function is known as traffic controller.

 

 The processor that runs the CPU distributes the process. Deallocates the processor when the system is no longer needed.

 

5.Device Management:

 

It keeps track of all devices connected to the system. Designates a program responsible for every device known as the Input/Output controller.

 

 It decide which process gets access to a certain device and for how long.

 

 It Allocates devices effectively and efficiently. Deallocates devices when they are no longer required.


Comments ()


Sign in

Read Next

MPL and how its effects?

Blog banner

I/O Management and Disk Scheduling

Blog banner

Satellite Based Positioning

Blog banner

Operating system

Blog banner

Why Mumbai Professionals Are Switching Back to Home-Style Tiffin Meals

Blog banner

Some facts about Technology

Blog banner

Service Strategy In ITSM

Blog banner

Memory

Blog banner

CoWIN

Blog banner

Cross site scripting Attack

Blog banner

Harsh Rathod

Blog banner

Top Career Paths After a B.Com Degree in Mumbai: What’s Next for You?

Blog banner

Disk scheduling

Blog banner

IT security management

Blog banner

OPERATING SYSTEM

Blog banner

Crypto tax evasion

Blog banner

My Favorite Sportsperson

Blog banner

Data Analytics in Data Science

Blog banner

Health is Wealth

Blog banner

Sensory Play for Toddlers: Boosting Curiosity Through Touch, Sound, and Colour

Blog banner

MODERN OPERATING SYSTEM

Blog banner

What Makes Patola the Queen of Silk?

Blog banner

OLA

Blog banner

Importance of education

Blog banner

How Men and Women Process Pain Differently

Blog banner

Image Steganography: Hiding Secrets in Plain Sight

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

Risk factors in service transistion

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

Memory Management

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

Developments in Modern Operating Systems

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

Threads

Blog banner

"The Benefits of Using GIS in Agriculture"

Blog banner

AIS & ANN based Malware detection for Android OS - Nupur Bhatt

Blog banner

Self defence

Blog banner

ARTICAL ON MANAGEMENT SYSTEM

Blog banner

Super Garlicky Tomato Soup with Smashed White Beans

Blog banner

Anomaly Detection in Behavioral Data Using Machine Learning

Blog banner

Health and fitness

Blog banner

Modern OS

Blog banner