wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Operating Systems Overview

profile
Aryan Kasurde
Jul 12, 2023
0 Likes
0 Discussions
128 Reads

Operating systems are those programs that interface the machine with the applications programs. 

Briefly, the OS typically provides services in the following areas: 

• Program development: The OS provides a variety of facilities and services,such as editors and debuggers, to assist the programmer in creating programs. 

• Program execution: A number of steps need to be performed to execute a program. Instructions and data must be loaded into main memory, I/O devices and files must be initialized,

• Access to I/O devices: Each I/O device requires its own peculiar set of instructions or control signals for operation.

• Controlled access to files: For file access, the OS must reflect a detailed understanding of not only the nature of the I/O device (disk drive, tape drive) but also the structure of the data contained in the files on the storage medium. 

Simple Batch Systems

 Early computers were very expensive, and therefore it was important to maximize processor utilization. The wasted time due to scheduling and setup time was unacceptable.To improve utilization, the concept of a batch OS was developed. It appears that the first batch OS (and the first OS of any kind) was developed in the mid-1950s by General Motors for use on an IBM 701 [WEIZ81]. The concept was subsequently refined and implemented on the IBM 704 by a number of IBM customers. By the early 1960s, a number of vendors had developed batch operating systems for their computer systems. IBSYS, the IBM OS for the 7090/7094 computers, is particularly notable because of its widespread influence on other systems.The central idea behind the simple batch-processing scheme is the use of a piece of software known as the monitor.

 


Comments ()


Sign in

Read Next

What is Packet Filtering?

Blog banner

Synchronization

Blog banner

MoSCoW METHOD IN DATA SCIENCE

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

A Journey By Train

Blog banner

Security and E-mail

Blog banner

Virtual Memory

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner

Mariana Trench: The deepest depths

Blog banner

Smartsheet

Blog banner

Data Acquisition in Cyber Forensics

Blog banner

Regression Analysis

Blog banner

DNS Cache

Blog banner

Twisted world

Blog banner

MD5 Collisions and the impact on computer forensics

Blog banner

Strengthening Active Directory Security

Blog banner

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

The Everyday Parenting Dilemma: Safety Vs Independence

Blog banner

Virtual Machine

Blog banner

Visualization in Data Science

Blog banner

The Difference Between Plaque and Tartar Explained Simply

Blog banner

Sweet and Sour Mango Pickle (Gol Keri)

Blog banner

Rain bow

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

LIMITED EDITION

Blog banner

Game Theory in Blockchain

Blog banner

Webmail

Blog banner

Data Analytics in Data Science

Blog banner

differentiate thinking humanly and rationally

Blog banner

The Role of Cyber Forensics in Criminology

Blog banner

Veg/Non-veg/Egg Tiffin Meals That Are Nutritious and Filling

Blog banner

Autonomy Vehicles: Future Ki Gadiya

Blog banner

Windows Operating System

Blog banner

Constrains in service design

Blog banner

JUSTICE FOR EVERY “BEZUBAAN ANIMAL”

Blog banner

E-Governance

Blog banner

Importance Of Education.

Blog banner

The Real Reason Patola Outfits Come at a Premium Cost

Blog banner

INTERNET

Blog banner

Virtual memory

Blog banner

Compromising Mobile Platforms

Blog banner

DATA SCIENCE IN BUSINESS AND MARKETING

Blog banner