wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Functions of Operating System

profile
Jeet Ved
Jul 04, 2024
0 Likes
0 Discussions
85 Reads

Operating System(OS)

 

An operating system (OS) is software that controls computer hardware and provides services to computer applications. It acts as an intermediary between applications and computer hardware, communication and resource management.

 

Functions of OS

 

1.Memory Management:

 

 It keeps track of primary memory, i.e., which bytes of memory are used by which user program. The memory addresses that have already been allocated and the memory addresses of the memory that has not yet been used.

 

 It Allocates the memory to a process when the process requests it and deallocates the memory when the process has terminated or is performing an I/O operation.

 

2. Security and Protection:

 

The OS enforces security measures to protect system resources from unauthorized access and ensure data availability.

 

It provides user identification mechanisms, access controls, and encryption to protect sensitive information and system functionality.

 

3.File Management:

 

The OS manages file storage, organization, and access through a hierarchical file system structure. It supports operations like file creation, deletion, reading, writing, and modification.

 

It handles file permissions and manages disk space allocation to optimize storage efficiency.

 

4.Process Management:

 

An operating system controls the workload of the processor by allocating various tasks to it and ensuring that each process gets enough time from the processor to run efficiently.

 

It stores the state of the systems. The program that performs this function is known as traffic controller.

 

 The processor that runs the CPU distributes the process. Deallocates the processor when the system is no longer needed.

 

5.Device Management:

 

It keeps track of all devices connected to the system. Designates a program responsible for every device known as the Input/Output controller.

 

 It decide which process gets access to a certain device and for how long.

 

 It Allocates devices effectively and efficiently. Deallocates devices when they are no longer required.


Comments ()


Sign in

Read Next

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

Buffering

Blog banner

Traditional UNIX Scheduling

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

Mumbai

Blog banner

Deadlocks in operating system

Blog banner

Big Data Architecture

Blog banner

My First Trek - Sondai, Karjat - Shoaib Malik

Blog banner

Malware Defense

Blog banner

Electronic Funds Transfer

Blog banner

Understanding E-mail Servers

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

Article on Zoho Corporation

Blog banner

Beatbox

Blog banner

Water Resources are about to exhaust...

Blog banner

The Future of Web Development in 2026: Trends Every Business Must Know

Blog banner

Intrusion Detection System

Blog banner

10 Things To Do On Valentine's Day If You're Single

Blog banner

Indian Culture and Tradition

Blog banner

Short note on expert system

Blog banner

Os(Computer security threats)

Blog banner

Self managing devices

Blog banner

Modern operating system

Blog banner

Paid Email

Blog banner

Functions of operating system

Blog banner

India Digital Personal Data Protection Act, 2023

Blog banner

Sweet Mango Murabba

Blog banner

Confidence Building Activities for the New School Year

Blog banner

Getting into anime My anime suggestions

Blog banner

Deadlock

Blog banner

USES OF WHATSAPP

Blog banner

Types of Hackers

Blog banner

Internet of Things and cyber security

Blog banner

Raid and levels of raid.

Blog banner

Nature’s Brush on Silk: The Secret Behind Patola Colours

Blog banner

Hacking

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Social Media Sentiment Analysis

Blog banner

Deadlocks

Blog banner

Demystifying Cryptography: A Beginner's Guide

Blog banner

The Features of Blockchain

Blog banner

Service design process in ITSM

Blog banner