wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Operating Systems Overview

profile
Aryan Kasurde
Jul 12, 2023
0 Likes
0 Discussions
128 Reads

Operating systems are those programs that interface the machine with the applications programs. 

Briefly, the OS typically provides services in the following areas: 

• Program development: The OS provides a variety of facilities and services,such as editors and debuggers, to assist the programmer in creating programs. 

• Program execution: A number of steps need to be performed to execute a program. Instructions and data must be loaded into main memory, I/O devices and files must be initialized,

• Access to I/O devices: Each I/O device requires its own peculiar set of instructions or control signals for operation.

• Controlled access to files: For file access, the OS must reflect a detailed understanding of not only the nature of the I/O device (disk drive, tape drive) but also the structure of the data contained in the files on the storage medium. 

Simple Batch Systems

 Early computers were very expensive, and therefore it was important to maximize processor utilization. The wasted time due to scheduling and setup time was unacceptable.To improve utilization, the concept of a batch OS was developed. It appears that the first batch OS (and the first OS of any kind) was developed in the mid-1950s by General Motors for use on an IBM 701 [WEIZ81]. The concept was subsequently refined and implemented on the IBM 704 by a number of IBM customers. By the early 1960s, a number of vendors had developed batch operating systems for their computer systems. IBSYS, the IBM OS for the 7090/7094 computers, is particularly notable because of its widespread influence on other systems.The central idea behind the simple batch-processing scheme is the use of a piece of software known as the monitor.

 


Comments ()


Sign in

Read Next

How Unstructured Play Helps Children Become Creative Thinkers

Blog banner

Evolution of the Microprocesor

Blog banner

differentiate thinking humanly and rationally

Blog banner

Deadlocks in Operating System

Blog banner

Why we fail after giving 100% ?

Blog banner

From Procrastinator to Performer: How to Beat the Last-Minute Rush

Blog banner

Memory management

Blog banner

c

Blog banner

GraphQL

Blog banner

The Sunny Side of Instagram

Blog banner

The Procedural Framework for Corporate High-Tech Investigations

Blog banner

COMPUTER FORENSICS AND GRAPHICS

Blog banner

Security issues in Sensor Networks and gathering admissible evidence in Network Forensics

Blog banner

Virtual Memory

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

Cloud Computing: Threats and Vulnerabilities

Blog banner

Memory Management

Blog banner

Visualization in Data Science

Blog banner

Modern Operating System

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

ODOO

Blog banner

10 Amazing facts about Tokyo Ghoul

Blog banner

Cyber Crime Investigation In The Era Of Big Data

Blog banner

How Schools Can Reduce Exam Stress in Students?

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

Threat management

Blog banner

Mental Health

Blog banner

Deming’s Process

Blog banner

Top 5 Post-Wedding Skin Care Tips

Blog banner

Memory hierarchy

Blog banner

Cache memory

Blog banner

A little bit of salt is all the hash needs!

Blog banner

Can a Water Flosser Replace Manual Flossing? Here’s What Dentists Say

Blog banner

Direct Memory Access

Blog banner

SPEM

Blog banner

I/O Buffering

Blog banner

Unlocking the Secrets: Basic Operations of Computer Forensic Laboratories

Blog banner

Emerging threats in cyber Forensics

Blog banner

Microsoft Windows Overview

Blog banner

Interrupts in operating system.

Blog banner

HACKING MOBILE PLATFORM

Blog banner

IP ADDRESS

Blog banner