wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

OPERATING SYSTEM

profile
Hetvi Gajera
Jul 04, 2024
0 Likes
0 Discussions
41 Reads

What is Operating System and its examples?

Operating System is an integrated essential program that enables the functioning of the computer’s hardware and software resources, as well as provision of common services to various computer programs. It facilitates smooth running of tasks and resource allocation between users and computer hardware.

Functions:

Processing Management:

Enables programming scheduling and coordination.

Memory Management:

 Takes care of memory assignment and release for different processes.

File System Management:

Data storage in form of files is organized, saved, searched, and manipulated.

Device Management:

Controls and manages all types of hardware devices through drivers.

User Interface:

User interaction through CLI or GUI.

Examples:

Windows:

 This operating system was created by Microsoft has become popular on personal computers because it has a friendly graphical user interface (GUI), supports many applications; examples include Windows 10, Windows 11.


macOS:

The Macintosh Operating System developed by Apple which is known for its sleek design as well as seamless integration with other apple products; examples include macOS Ventura, macOS Monterey.


Linux:

 It is an open-source operating system known for its stability and security making it popular in servers or supercomputers; these include Ubuntu, Fedora, Debian etc.


Android:

 An OS developed by Google being the most used as a dominant server for smartphones and tablets.


Comments ()


Sign in

Read Next

Kernel Memory Allocation In Linux.

Blog banner

Penetration Testing

Blog banner

GEOLOGY AND GEO-TECTONIC FRAME WORK OF WESTERN BASTAR CRATON

Blog banner

Importance of education

Blog banner

Life lesson

Blog banner

Importance of Website

Blog banner

Study of Backdoor and Trojan tools

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

Mumbai Metro 3

Blog banner

LinkedIn: Watch out for these 7 upcoming updates in 2023

Blog banner

Game Theory in Blockchain

Blog banner

GUIDE TO GIS

Blog banner

Tea, Coffee, Red Wine, and Teeth: A Stain Survival Guide

Blog banner

Deadlock

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

WomenEmpowerment

Blog banner

An Overivew Of Cache Memory

Blog banner

E-Cash (Electronic Cash)

Blog banner

Note on Process, Process creation and Process termination

Blog banner

Introduction to Solidity Programming for Blockchain Development

Blog banner

Use case of K-means clustering

Blog banner

Android Application Components and Activity Lifecycle

Blog banner

Virtual memory

Blog banner

VPN

Blog banner

All you need to know about “Off-page SEO”

Blog banner

INTERNET SECURITY

Blog banner

Sweet Mango Murabba

Blog banner

GIS info about Bermuda Triangle

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

OPERATING SYSTEM

Blog banner

15 Websites that will make your life easier ...!!!

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

Deadlock

Blog banner

File sharing

Blog banner

What is Email? Uses of Emails

Blog banner

Modern Operating System

Blog banner

Memory Management

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

Payment Card Industry - Data Security Standard PCI-DSS compliance for online banking applications

Blog banner

What Function Does SEO Serve in Digital Marketing?

Blog banner

Image Steganography: Hiding Secrets in Plain Sight

Blog banner

Concurrency and memory

Blog banner