wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Major achievement

profile
Manya Shah
Jul 12, 2023
0 Likes
0 Discussions
67 Reads

Major Achievements of OS manages computer hardware and software resources. Major Achievements of OS are given as follows:

1. Process

2. Memory Management

3. Information Protection & Security

4. System Structure

Process:

A process is a program at the time of execution. The term ‘process‘ was first used by Daley and Dennis.R in 1960. At the time of developing multi-programming, time-sharing and real-time systems some problems are raised due to the timing and synchronization.

Memory Management:

Here memory means main memory (RAM), and the term memory management specifies how to utilize the memory efficiently. So, the main task of memory management is ‘efficient memory utilization and efficient processor utilization.

(i) Process isolation: It simply means that controlling one process interacts with the data and memory of another process.

(ii) Automatic allocation and management: Memory should be allocated dynamically based on the priorities of the process. Otherwise, the process waiting time will increase, which decreases CPU utilization and memory utilization.

(iii) Protection and access control: Do not apply protection techniques and access control to all the processes, better to apply to the important application only. It will save execution time.

(iv) Long-term Storage: Long-term storage of process reduces memory utilization

Information protection and security:

Here the term protection means that secure the resources and information from unauthorized persons. The operating system follows a variety of methods for protection and security.

(i) Access control: The operating system provides access permissions to the users about important files and applications.

(ii) Information flow control: The operating system regulates the flow of data within the system.

(iii) Certification: The operating system provides the priorities and hierarchies to the resources using this then we can control unauthorized processes.

System Structure:

In the Olden Days, the code for an operating system is very few. Later more and more features have been added to the operating systems. The code of the operating system is generally increased.

 


Comments ()


Sign in

Read Next

Bharat Maps

Blog banner

How to kiss

Blog banner

objectives and function of operating system

Blog banner

Latest Email Marketing Techniques

Blog banner

Current Trends in GIS and Remote Sensing(Ocean Applications)

Blog banner

Blog name

Blog banner

Platonic Solids

Blog banner

Cyber Forensic in the Banking sector

Blog banner

In the world of Technology...

Blog banner

Virtual Machine's

Blog banner

Big O Notation

Blog banner

About myself

Blog banner

Modern Operating System

Blog banner

GIS info about Bermuda Triangle

Blog banner

Meshoo

Blog banner

All you need to know about Website Traffic

Blog banner

Southern Turkey Earthquake: Causes and Consequences of a Tragic Natural Disaster

Blog banner

A Survey of Anti-Forensic Techniques: Methods, Challenges, and Countermeasures

Blog banner

What is Anxiety? How to manage Anxiety?

Blog banner

Principal of concurrency

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner

Solving Problems with AI: The Power of Search Algorithms

Blog banner

Harsh Rathod

Blog banner

Linux

Blog banner

Safe Learning Spaces: Why Preschool Environment Matters More Than Ever Today

Blog banner

Virtual Machine

Blog banner

Direct memory access

Blog banner

Theads

Blog banner

Life lesson

Blog banner

Deadlock and Starvation

Blog banner

Self defence

Blog banner

Fudgy Tahini Date Chocolate Bars

Blog banner

DURGA POOJA

Blog banner

What is Virtual Memory

Blog banner

Internet of Things and cyber security

Blog banner

Old age lifestyle

Blog banner

Service Operations Principles

Blog banner

internet email and it's applications

Blog banner

Uniprocessor Scheduling

Blog banner

Thumb Sucking: When It’s Normal and When It Becomes a Dental Problem

Blog banner