wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Operating system

profile
Sumit Raj Bera
Jul 12, 2023
0 Likes
0 Discussions
156 Reads

An operating system (OS) is system software that manages computer hardware and software resources, and provides common services for computer programs.

Time-sharing operating systems schedule tasks for efficient use of the system and may also include accounting software for cost allocation of processor time, mass storage, printing, and other resources.

For hardware functions such as input and output and memory allocation, the operating system acts as an intermediary between programs and the computer hardware, although the application code is usually executed directly by the hardware and frequently makes system calls to an OS function or is interrupted by it. Operating systems are found on many devices that contain a computer – from cellular phones and video game consoles to web servers and supercomputers.

The dominant general-purpose personal computer operating system is Microsoft Windows with a market share of around 74.99%. macOS by Apple Inc. is in second place (14.84%), and the varieties of Linux are collectively in third place (2.81%). In the mobile sector (including smartphones and tablets), Android's share is 70.82% in the year 2020.According to third quarter 2016 data, Android's share on smartphones is dominant with 87.5 percent with a growth rate of 10.3 percent per year, followed by Apple's iOS with 12.1 percent with per year decrease in market share of 5.2 percent, while other operating systems amount to just 0.3 percent. Linux distributions are dominant in the server and supercomputing sectors. 

 

.


Comments ()


Sign in

Read Next

Different types of scam frauds

Blog banner

Should you be using a mouthwash? Know from the experts

Blog banner

Social engineering in cyber security

Blog banner

The Bold Digital Marketing Moves That Made Durex India’s Second-Largest Condom Brand

Blog banner

Socket Programming in Java

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

Cache Memory in Operating Systems

Blog banner

Why Inconel 625 and Monel 400 Remain Unbeatable in Refinery Applications?

Blog banner

E-Governance

Blog banner

First love

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

Memory

Blog banner

Deadlock

Blog banner

SECURITY TOOLS

Blog banner

Child labour

Blog banner

Memory management

Blog banner

Raid

Blog banner

Different types of scam Fraud

Blog banner

Kernel in Operating System

Blog banner

Deadlocks

Blog banner

The launch of UniMap by HERE

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

Mobile Transport Layer – Traditional TCP

Blog banner

How College Events Build Real-world Skills You Can’t Learn From Textbooks

Blog banner

USPS mail

Blog banner

Memory Management

Blog banner

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner

Deadlock in operating system

Blog banner

Memory Management

Blog banner

Understanding Univariate, Bivariate, and Multivariate Analysis in Data Science

Blog banner

Old age lifestyle

Blog banner

memory cache

Blog banner

Note on Process, Process creation and Process termination

Blog banner

DNS Cache

Blog banner

File management In Operating System

Blog banner

What is Data, Information and Knowledge?

Blog banner

THE ACTORS LIFE

Blog banner

The Khan mehtab transforming the modular switches

Blog banner

VIRUS

Blog banner

Operating System

Blog banner

USES OF WHATSAPP

Blog banner