wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Operating system

profile
Sumit Raj Bera
Jul 12, 2023
0 Likes
0 Discussions
156 Reads

An operating system (OS) is system software that manages computer hardware and software resources, and provides common services for computer programs.

Time-sharing operating systems schedule tasks for efficient use of the system and may also include accounting software for cost allocation of processor time, mass storage, printing, and other resources.

For hardware functions such as input and output and memory allocation, the operating system acts as an intermediary between programs and the computer hardware, although the application code is usually executed directly by the hardware and frequently makes system calls to an OS function or is interrupted by it. Operating systems are found on many devices that contain a computer – from cellular phones and video game consoles to web servers and supercomputers.

The dominant general-purpose personal computer operating system is Microsoft Windows with a market share of around 74.99%. macOS by Apple Inc. is in second place (14.84%), and the varieties of Linux are collectively in third place (2.81%). In the mobile sector (including smartphones and tablets), Android's share is 70.82% in the year 2020.According to third quarter 2016 data, Android's share on smartphones is dominant with 87.5 percent with a growth rate of 10.3 percent per year, followed by Apple's iOS with 12.1 percent with per year decrease in market share of 5.2 percent, while other operating systems amount to just 0.3 percent. Linux distributions are dominant in the server and supercomputing sectors. 

 

.


Comments ()


Sign in

Read Next

How to kiss

Blog banner

Zoho

Blog banner

The Role of cryptography in cyber security

Blog banner

INTRODUCTION

Blog banner

Pilgrimage at LOC: A privilege and a paradox

Blog banner

?Why Social and Emotional Skills Matter More Than ABCs in Early Years?

Blog banner

Importance of business process documentation

Blog banner

Buffering

Blog banner

Security issues in Sensor Networks and gathering admissible evidence in Network Forensics

Blog banner

OPERATING SYSTEM

Blog banner

What's Better : Supervised or Unsupervised Learning

Blog banner

5 People who claimed to have Time Traveled

Blog banner

A BLOG ON MYSQL

Blog banner

Virtual memory

Blog banner

Nature’s Brush on Silk: The Secret Behind Patola Colours

Blog banner

KAHAWA TEA

Blog banner

Deadlock

Blog banner

The Bold Digital Marketing Moves That Made Durex India’s Second-Largest Condom Brand

Blog banner

What Makes Patola the Queen of Silk?

Blog banner

Safe Learning Spaces: Why Preschool Environment Matters More Than Ever Today

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

Threats To Computer System

Blog banner

Steganography and Steganalysis

Blog banner

Mutual exclusion

Blog banner

Title: Network Sniffing Techniques: Uncovering the Secrets of Data Transfer

Blog banner

Gis in agriculture and farming

Blog banner

Data Security must be your Priority!

Blog banner

Unlocking Success: Mastering Google Ads Strategies

Blog banner

EMAIL INVESTIGATION

Blog banner

RAID

Blog banner

Street foods

Blog banner

Digital Forensics Challenges and Tools

Blog banner

Having passion in life

Blog banner

EVOLUTION OF THE MIRCOPROCESSOR

Blog banner

DATA VAULT

Blog banner

Best password managers: Reviews of the top products

Blog banner

Pooja Silver

Blog banner

Lifestyle of a photographer

Blog banner

RAID - LEVELS OF RAID

Blog banner

What is Packet Filtering?

Blog banner

Understanding the 'Ambiverts'

Blog banner

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner