wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Objectives and functions of Operating System...

profile
Uday Bharadwa
Jul 04, 2024
0 Likes
0 Discussions
31 Reads

What are the objectives of operating system?
• To make the computer system convinent to use in an efficient manner.
• To manage the resources of a computer system.
• To provide users a convinent interface to use the computer system.


What are the functions of Operating system?
The operating system can be considered to be a collection of programs or services categorised under following heads:


1.) Process Management -- A process or application under execution is called as process. A process includes the execution context. A program gets executed in main memory. So it should be transferred from disk to memory. Activities Performed -- Creating and deleting both user and system processes, suspending and resuming processes, etc..


2.) Main Memory Management -- The services provided under Memory Management (MM) are directed to keeping track of memory and allocating it to various processes. The main memory is central to the operation a modern computer system. Main memory is a large array of words or bytes ranging in size from hundreds of thousands to billions. Each word or byte has its own address. Main memory is a storage of quickly accessible data stored by the CPU and I/O devices. Activities Performed -- keeping track of which parts of memory are currently being used and by whom, allocating and deallocating memory space as needed.


3.) File Management -- A file is a collection of related information defined by its user. The data cannot be written directly to secondary storage unless they are within a file. Processes can then read information from the file. Activities Performed -- file security, maintain backup of files, creation and deletion of files and directories.

 
4.) I/O Management -- As we know that I/O is one of the main functions of an operating system and is used to control the entire computer's input output devices. Basically it should have to issue commands to the devices, catch interruptes and handle errors. It includes storage devices (disks, tapes), transmission devices (network cards, modems), and human interface devices (screen, keyboard, mouse).


5.) Secondary Storage Management -- The main purpose of a computer system is to execute programs. Those programs with the data they access must be in main memory or primary storage during execution. Since main memory is too small to accommodate all data and programs and because the data that it holds are lost when power is lost i.e they are volatile, hence system is provided secondary Storage to backup main memory. Most modern computer systems use disks as the online storage medium, for both programs and data. Most program includes compilers, assemblers, sort routines, editors are stored on a disk until loaded into memory and then use the disk as both the source and destination of their processing.


Comments ()


Sign in

Read Next

How to use open SSL for web server - browser communication

Blog banner

Answer

Blog banner

FREE VERSION OF G-MAIL

Blog banner

Big Data Architecture

Blog banner

child Labour

Blog banner

SQL Injection

Blog banner

MUTUAL EXCLUSION

Blog banner

How To Invest in Indian Stock Market For Beginners. ~ Tutorial 2 (NSDL And CSDL) Continued...

Blog banner

Why You Need 2FA (Two-Factor Authentication) On Your Email And Other Online Accounts

Blog banner

Quality check in IT services

Blog banner

Stay Close To Adventure In Arcadia, Florida At Oak Tree Hotel

Blog banner

Corporate Discipline.

Blog banner

Blog name

Blog banner

Decrypting Cryptocurrency: Tracing Transactions in Cyber Investigations

Blog banner

Different Types of Data

Blog banner

Raid and levels of raid.

Blog banner

Article on team management software

Blog banner

Service Operation

Blog banner

HubSpot

Blog banner

Embedded Operating System

Blog banner

Memory Management

Blog banner

Threads

Blog banner

Types of threads

Blog banner

Difference Between Classification And Clustering

Blog banner

VIRTUAL MACHINES

Blog banner

Business-to-Business

Blog banner

INTERNET SECURITY

Blog banner

Blog on health and fitness

Blog banner

The Role of cryptography in cyber security

Blog banner

RAID_142

Blog banner

Best password managers: Reviews of the top products

Blog banner

Mental Health

Blog banner

Traveling

Blog banner

Deadlock

Blog banner

Exploring Virtual Machines and Computer Forensic Validation Tools

Blog banner

Texting is actually better than talking in person

Blog banner

BUFFER OVERFLOW_142

Blog banner

Note on Process, Process creation and Process termination

Blog banner

SMARTSHEET

Blog banner

Introduction to Virtual Memory - 080

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

Number Guessing game --lisp

Blog banner