wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Functions of operating system

profile
Tanisha Joshi
Jul 03, 2024
0 Likes
0 Discussions
166 Reads

The operating system is a connecting medium between the user and the hardware. It helps the users to access the hardware in an efficient manner. It also makes sure that all the computer resources will be used in an efficient and smooth way without any problems

******The operating system provides various functionalities, which are discussed below:****

Controlling System Performance One of the most important functions of the operating system is controlling the system's health. For this purpose, it monitors and observes the delay time between a service being requested and the requested service being served. This delay time is reduced as much as possible to improve the overall performance of the system.

***Memory Management****

In a computer system, we have primary memory, which is also called main memory, and it is made by the sequence of bytes. Each byte in the main memory has a unique address which helps it to check if it is occupied or not. For executing each program in its computer system, it should be in the main memory. Operating systems can easily check which bytes of main memory are empty and which are not. So it allocates the main memory for the program execution, and when the program is completed or terminated, then it deallocates the memory. Operating systems also keep a record that which byte of memory is assigned to which program

****Device Management*****

The operating system manages the communication between the computer system and the peripheral devices connected to the I/O port of the system. Peripheral devices use their respective drivers to communicate with the system. The operating system determines which program or process is accessed by which connection and device. It also makes sure when a program is executed or terminated, it will stop the communication between the device and the computer system.

 

*****Coordination between other software and the user******

There is other software in the system which is coordinated by the operating system so that users can access them efficiently, like assemblers, compilers, etc.

 

 

******Process Management******

 

The process is a program under the execution. The operating system manages all the processes so that each process gets the CPU for a specific time to execute itself, and there will be less waiting time for each process. This management is also called process scheduling.


Comments ()


Sign in

Read Next

Health and fitness

Blog banner

Virtual Memory

Blog banner

Carrot Pickle With Raisins (lagan Nu Achar)

Blog banner

History of Money

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

Top 5 Post-Wedding Skin Care Tips

Blog banner

RAID_142

Blog banner

Electronic Funds Transfer

Blog banner

Facebook marketing

Blog banner

Cyber Forensics in Healthcare: Protecting Patient Data and Preventing Breaches

Blog banner

undefined

Blog banner

Memory management

Blog banner

Malware

Blog banner

Types Of scheduling

Blog banner

MOVEMBER

Blog banner

Preparing Students for Higher Education: How International Schools Shape Future Success

Blog banner

Memory Management

Blog banner

Why is ITSM important in IT organization?

Blog banner

What are the different types of E-mail crime and process of email forensic?

Blog banner

Twisted world

Blog banner

Be kind person

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

operating system

Blog banner

Types of E-Commerce

Blog banner

What are NFT s?

Blog banner

Why we fail after giving 100% ?

Blog banner

6 Digital Marketing Trends You Must Watch Out For In 2022

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

Raising Emotionally Intelligent Students: The Classroom Beyond Academics

Blog banner

I Personally

Blog banner

LinkedIn: Watch out for these 7 upcoming updates in 2023

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

Digital Balance: Keeping Children Mindful in the Screen Age

Blog banner

Cyber Security in Data Breaching

Blog banner

What is a Malware ?

Blog banner

What is Influencer Marketing and its Trends

Blog banner

Question

Blog banner

Password Generator - Lisp

Blog banner

Jio .....A Revolution ?? ??

Blog banner

What is process

Blog banner

Linux Memory Management

Blog banner

Starvation

Blog banner