wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Major achievement

profile
Manya Shah
Jul 12, 2023
0 Likes
0 Discussions
67 Reads

Major Achievements of OS manages computer hardware and software resources. Major Achievements of OS are given as follows:

1. Process

2. Memory Management

3. Information Protection & Security

4. System Structure

Process:

A process is a program at the time of execution. The term ‘process‘ was first used by Daley and Dennis.R in 1960. At the time of developing multi-programming, time-sharing and real-time systems some problems are raised due to the timing and synchronization.

Memory Management:

Here memory means main memory (RAM), and the term memory management specifies how to utilize the memory efficiently. So, the main task of memory management is ‘efficient memory utilization and efficient processor utilization.

(i) Process isolation: It simply means that controlling one process interacts with the data and memory of another process.

(ii) Automatic allocation and management: Memory should be allocated dynamically based on the priorities of the process. Otherwise, the process waiting time will increase, which decreases CPU utilization and memory utilization.

(iii) Protection and access control: Do not apply protection techniques and access control to all the processes, better to apply to the important application only. It will save execution time.

(iv) Long-term Storage: Long-term storage of process reduces memory utilization

Information protection and security:

Here the term protection means that secure the resources and information from unauthorized persons. The operating system follows a variety of methods for protection and security.

(i) Access control: The operating system provides access permissions to the users about important files and applications.

(ii) Information flow control: The operating system regulates the flow of data within the system.

(iii) Certification: The operating system provides the priorities and hierarchies to the resources using this then we can control unauthorized processes.

System Structure:

In the Olden Days, the code for an operating system is very few. Later more and more features have been added to the operating systems. The code of the operating system is generally increased.

 


Comments ()


Sign in

Read Next

Direct Memory Access

Blog banner

Memory input output management

Blog banner

Top Career Paths After a B.Com Degree in Mumbai: What’s Next for You?

Blog banner

ACHIEVEMENTS IN OPERATING SYSTEMS

Blog banner

Booting Process In Operating System

Blog banner

Memory heirchy

Blog banner

Game via listing method

Blog banner

Firewall

Blog banner

Cache Memory(142)

Blog banner

Health is Wealth

Blog banner

LIMITED EDITION

Blog banner

How to grow followers on Instagram business account?

Blog banner

Google

Blog banner

Synchronization

Blog banner

How Does SSO Works

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

Starvation

Blog banner

How to Run your First android App

Blog banner

c

Blog banner

Memory Management

Blog banner

LEMON PICKLE SWEET AND MILD HOT

Blog banner

A-B-C of Networking: Part-2 (Components)

Blog banner

Palm Vein Biometric Technology; Contactless vein authentication

Blog banner

“Shot on iPhone” : A campaign by Apple that turned into a prodigy

Blog banner

JIRA SOFTWARE

Blog banner

KEAP MANAGEMENT SYSTEM

Blog banner

Access management

Blog banner

Uniprocessor scheduling

Blog banner

10 Interesting Facts about Attack on Titan

Blog banner

Pilgrimage at LOC: A privilege and a paradox

Blog banner

Predicting Student Performance with Data Science

Blog banner

RAID

Blog banner

Never give up

Blog banner

Evolution of Operating System

Blog banner

Components of GIS

Blog banner

The Importance of Financial Literacy for College Students

Blog banner

MODERN OPERATING SYSTEM

Blog banner

What is the point of living if we can die at any moment of our lives ?

Blog banner

Cache Memory

Blog banner

Fault tolerance

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner