wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

OPERATING SYSTEM

profile
Hetvi Gajera
Jul 04, 2024
0 Likes
0 Discussions
41 Reads

What is Operating System and its examples?

Operating System is an integrated essential program that enables the functioning of the computer’s hardware and software resources, as well as provision of common services to various computer programs. It facilitates smooth running of tasks and resource allocation between users and computer hardware.

Functions:

Processing Management:

Enables programming scheduling and coordination.

Memory Management:

 Takes care of memory assignment and release for different processes.

File System Management:

Data storage in form of files is organized, saved, searched, and manipulated.

Device Management:

Controls and manages all types of hardware devices through drivers.

User Interface:

User interaction through CLI or GUI.

Examples:

Windows:

 This operating system was created by Microsoft has become popular on personal computers because it has a friendly graphical user interface (GUI), supports many applications; examples include Windows 10, Windows 11.


macOS:

The Macintosh Operating System developed by Apple which is known for its sleek design as well as seamless integration with other apple products; examples include macOS Ventura, macOS Monterey.


Linux:

 It is an open-source operating system known for its stability and security making it popular in servers or supercomputers; these include Ubuntu, Fedora, Debian etc.


Android:

 An OS developed by Google being the most used as a dominant server for smartphones and tablets.


Comments ()


Sign in

Read Next

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

Deadlock and Starvation

Blog banner

All you need to know about “Off-page SEO”

Blog banner

Vulnerability Assessment

Blog banner

Memory Management

Blog banner

Reconnaissance

Blog banner

Virtual memory in os

Blog banner

COMPUTER FORENSICS AND GRAPHICS

Blog banner

Different types of scam Fraud

Blog banner

Process State

Blog banner

Telegram and it's features

Blog banner

WORKFRONT SOFTWARE

Blog banner

OS Assignment 3

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

Memory management and virtual memory

Blog banner

Mutual exclusion

Blog banner

APACHE KAFKA

Blog banner

computer security

Blog banner

differentiate thinking humanly and rationally

Blog banner

Study of Backdoor and Trojan tools

Blog banner

Principles of Concurrency

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner

Fault Tolerance

Blog banner

What is metaverse?

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

Service Operations Principles

Blog banner

virtual machine

Blog banner

Who decides your overthinking, anyway?

Blog banner

I/O Management and Disk Scheduling

Blog banner

Financial Fraud Detection

Blog banner

Unlocking Success: Mastering Google Ads Strategies

Blog banner

Twisted world

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

Install Ubuntu Easily

Blog banner

Therapy Myths That Need to End in 2025

Blog banner

Satellite Based Positioning

Blog banner

Functions of Operating System

Blog banner

VIRTUAL MEMORY

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

Why You Should Not Use Free VPNs

Blog banner

Deadlock

Blog banner