wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Operating Systems Overview

profile
Aryan Kasurde
Jul 12, 2023
0 Likes
0 Discussions
128 Reads

Operating systems are those programs that interface the machine with the applications programs. 

Briefly, the OS typically provides services in the following areas: 

• Program development: The OS provides a variety of facilities and services,such as editors and debuggers, to assist the programmer in creating programs. 

• Program execution: A number of steps need to be performed to execute a program. Instructions and data must be loaded into main memory, I/O devices and files must be initialized,

• Access to I/O devices: Each I/O device requires its own peculiar set of instructions or control signals for operation.

• Controlled access to files: For file access, the OS must reflect a detailed understanding of not only the nature of the I/O device (disk drive, tape drive) but also the structure of the data contained in the files on the storage medium. 

Simple Batch Systems

 Early computers were very expensive, and therefore it was important to maximize processor utilization. The wasted time due to scheduling and setup time was unacceptable.To improve utilization, the concept of a batch OS was developed. It appears that the first batch OS (and the first OS of any kind) was developed in the mid-1950s by General Motors for use on an IBM 701 [WEIZ81]. The concept was subsequently refined and implemented on the IBM 704 by a number of IBM customers. By the early 1960s, a number of vendors had developed batch operating systems for their computer systems. IBSYS, the IBM OS for the 7090/7094 computers, is particularly notable because of its widespread influence on other systems.The central idea behind the simple batch-processing scheme is the use of a piece of software known as the monitor.

 


Comments ()


Sign in

Read Next

MySQL

Blog banner

Disk cache

Blog banner

The Role of cryptography in cyber security

Blog banner

Electronic data interchange

Blog banner

Deadlock in operating system

Blog banner

Lucidchart

Blog banner

Annual Day Preparation for Toddlers: What Helps and What to Avoid

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

A Happier Workplace Starts with Healthy Lunches by Meal Maharaj

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

OPERATING SYSTEM

Blog banner

Deadlock

Blog banner

Modern Operating System - Khush Bagaria

Blog banner

CYBERBULLYING: Negative comments!

Blog banner

Threat management

Blog banner

PERSONAL STORIES

Blog banner

Raising Emotionally Intelligent Students: The Classroom Beyond Academics

Blog banner

Indian Culture and Tradition

Blog banner

Evolution of operating systems

Blog banner

Question

Blog banner

Mumbai famous street food

Blog banner

GIS Applications: How Different Industries are Leveraging Geospatial Data

Blog banner

Virtual machine and virtualizing

Blog banner

Improving the Accuracy of GPS and GNSS

Blog banner

FREE VERSION OF G-MAIL

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

Mobile Survey

Blog banner

Firewall in Computer Network

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

Memory Management

Blog banner

The Laws of Karma

Blog banner

Ethical Issues in Data Science and Role of Data Science in Smart Cities

Blog banner

Threads

Blog banner

DATA SCIENCE IN BUSINESS AND MARKETING

Blog banner

File System

Blog banner

Social Engineering

Blog banner

Mutual exclusion

Blog banner

Principal of concurrency

Blog banner

Dekkers Algorithm : Ensuring Safe Process Synchronization

Blog banner

Mumbai

Blog banner

Digital marketing spotlight “Dove’s Real Beauty Campaign”

Blog banner