wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Modern operating system

profile
Khushi Kuvadiya
Jul 12, 2023
1 Like
0 Discussions
68 Reads

Modern operating systems provide a general-purpose mechanism for processing data larger than available main memory called virtual memory.some examples of operating systems include Apple macOS, Microsoft Windows, Google's Android OS, Linux Operating System, and Apple iOS.

Some characteristics of modern operating system are as follows:

1.Object-Oriented Design:Object-Oriented Design is the largest trend in designing the operating system. In which the OS creates the objects for each facility, and each object has a set of operations.

2.Multi-threading:An application or program divided into several smaller tasks. These tasks executed by the processor concurrently. These smaller tasks are called threads. A thread is a lightweight process or a dispatchable unit of work. A thread has some of the characteristics of a process. The number of independent threads in an application executed by the processor at the time says Multi-threading.

3. Multi-Processing:If a computer has more than one processor, these processors can share the memory and Input/Output facilities. These processors share the same job for execution then the system is called Systematic Multi-Processor System. The operating system designed for Systematic processing is called ‘ Systematic Multi-Processing Operating System’

 4.Distributed Operating System:A Distributed Operating System is an operating system that runs on a network of computers. The operating system, memory files shared by the number of users in the network from the server. In a Distributed Operating System, each user thinks that running on a single large system with one operating system. The users don’t need to know where the files are in the network.

5.Micro-Kernel Architecture:A Micro-Kernel Architecture is a minimal operating system that performs only the essential functions of an operating system. System processes perform all other operating system functions. Here the system processes mean Servers. A system that contains the server is called the Client-Server Model.


Comments ()


Sign in

Read Next

Threads

Blog banner

Computer Forensics and its Impact in Business Environment

Blog banner

Importance Of Time

Blog banner

The “High” of ‘likes’, ‘follows’, and ‘views’ – and how I decided to respond to them myself.

Blog banner

MODERN OPERATING SYSTEM

Blog banner

The Future of Cybersecurity: Trends, Challenges, and Strategies

Blog banner

Natural Language Processing(NLP)

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

E-commerce

Blog banner

E-Governance

Blog banner

Device driver

Blog banner

CYBER FORENCIS: PAST, PRESENT AND FUTURE.

Blog banner

All you need to know about “On-page SEO”

Blog banner

Data Analytics in Data Science

Blog banner

ProofHub

Blog banner

RAID

Blog banner

LIFEHACKER

Blog banner

Interrupts in operating system.

Blog banner

Memory Management

Blog banner

The Laws of Karma

Blog banner

Direct Memory Access

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

Google App Engine

Blog banner

Operating system

Blog banner

Stories Woven in Silk: The Meaning Behind Patola Motifs

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

Os Virtual Memory

Blog banner

Health and fitness

Blog banner

Why Mumbai Professionals Are Switching Back to Home-Style Tiffin Meals

Blog banner

OS DESIGN CONSIDERATIONS FOR MULTIPROCESSOR

Blog banner

Remote Work in 2026

Blog banner

How Cyber Forensics help prevent Crimes

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

What is OS Fingerprinting?

Blog banner

Android Application Components and Activity Lifecycle

Blog banner

Challenges and risks in service operations

Blog banner

WORKFRONT SOFTWARE

Blog banner

In the world of Technology...

Blog banner

Top 5 Benefits of Artificial Intelligence

Blog banner

Network Footprinting in Cybersecurity

Blog banner

Types of E-Commerce

Blog banner

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner