wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

The functions of operating system

profile
Dhruv Koladiya
Jul 01, 2024
0 Likes
0 Discussions
91 Reads

    
THE operating  system is program controls the execution of application programs and 
act as interface between applications and the computer hardware.

>>  THE operating system as a user/compute interface

1)  memory management
>>. memory management refers  to primary memory and main memory
     . The operating system handles the responsibility of storing any data,
        system programs, and user programs in memory.
      .when  programs is executed, it has to be present in the main memory.
       .main memory provides a  fast storage the can be accessed directly by the cpu.
                             
     > OS does the following activities  for memory management

      .allocates and   deallocates the memory space
       .keeps a record of which part  of primary memory is used by whom  and  how  much 
       .de-allocates the memory when a process no longer need it.
                   
         > TYPE  OF Memory Allocation
            1. Fixed size of partition Allocation:
   --In this of memory alloction , equal memory is provided to each process.
            2. variable  size partition allocation:
 -- in this type of memory alloction, space in main memory is allocated strictly according to the need of process 

2)   process management
  >>.every software or program that runs on a computer , whether in the background or in the frontend, is a process.
.TO complete any task, any process requires some important resources like CPU time ,memory, file, I/O devices,etc.
. these resource are allocated to any process by operating system

                >TYPE OF PROCESSES
  1. Operating system process
  -Operating system process execute system code.
  2.User process
  -While user process excute user code

3  )  Deice management
  >>. an operating system manages device communication via their repective drivers.
        1.keep record of all devices attached to the computer .
         2. allocates the device in the efficient way.
         decides which device to be  allocated to which process and for how time .
        3. de_allocates devices when they are not required.

 

 


Comments ()


Sign in

Read Next

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner

STARVATION

Blog banner

Processing Crime and Incident Scenes

Blog banner

Animal’s have my heart

Blog banner

Digital Marketing

Blog banner

Virtual memory

Blog banner

All you need to know about Cassandra

Blog banner

My Favorite Sportsperson

Blog banner

Coping with Diagnosis Shock

Blog banner

A-B-C of Networking: Part-3 (Topology [Bus & Star])

Blog banner

Process in OS

Blog banner

Importance of Network Security Risk

Blog banner

Service design process in ITSM

Blog banner

Python as a tool for Data science task & project

Blog banner

Hello World

Blog banner

Hosting basics

Blog banner

Is Pursuing a Dance Career in India Worth it?

Blog banner

The most common internet security threats

Blog banner

Deadlock and Starvation

Blog banner

Google App Engine

Blog banner

EVOLUTION OF MICROPROCESSOR

Blog banner

Note on Process, Process creation and Process termination

Blog banner

How to use GIT & GITHUB

Blog banner

GUIDE TO GIS

Blog banner

CYBER FORENCIS: PAST, PRESENT AND FUTURE.

Blog banner

Security issues

Blog banner

Teenagers of Today

Blog banner

Memory Management

Blog banner

Network Forensics Tools and Techniques

Blog banner

Theads

Blog banner

10 Problems you face if you are an Otaku

Blog banner

How to Find the Right Therapist For Me?

Blog banner

Social Engineering Deceptions and Defenses

Blog banner

Social engineering in cyber security

Blog banner

Daycare Centres Help Children Transition into Structured Learning

Blog banner

I/O Buffering

Blog banner

RSA (Rivest-Shamir-Adelman) Algorithm

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

In the world of Technology...

Blog banner

Electronic Evidence in Cyber Forensics

Blog banner

Financial Fraud Detection

Blog banner

Twisted world

Blog banner