wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

The functions of operating system

profile
Dhruv Koladiya
Jul 01, 2024
0 Likes
0 Discussions
91 Reads

    
THE operating  system is program controls the execution of application programs and 
act as interface between applications and the computer hardware.

>>  THE operating system as a user/compute interface

1)  memory management
>>. memory management refers  to primary memory and main memory
     . The operating system handles the responsibility of storing any data,
        system programs, and user programs in memory.
      .when  programs is executed, it has to be present in the main memory.
       .main memory provides a  fast storage the can be accessed directly by the cpu.
                             
     > OS does the following activities  for memory management

      .allocates and   deallocates the memory space
       .keeps a record of which part  of primary memory is used by whom  and  how  much 
       .de-allocates the memory when a process no longer need it.
                   
         > TYPE  OF Memory Allocation
            1. Fixed size of partition Allocation:
   --In this of memory alloction , equal memory is provided to each process.
            2. variable  size partition allocation:
 -- in this type of memory alloction, space in main memory is allocated strictly according to the need of process 

2)   process management
  >>.every software or program that runs on a computer , whether in the background or in the frontend, is a process.
.TO complete any task, any process requires some important resources like CPU time ,memory, file, I/O devices,etc.
. these resource are allocated to any process by operating system

                >TYPE OF PROCESSES
  1. Operating system process
  -Operating system process execute system code.
  2.User process
  -While user process excute user code

3  )  Deice management
  >>. an operating system manages device communication via their repective drivers.
        1.keep record of all devices attached to the computer .
         2. allocates the device in the efficient way.
         decides which device to be  allocated to which process and for how time .
        3. de_allocates devices when they are not required.

 

 


Comments ()


Sign in

Read Next

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

Importance of Morning Routines for Students During the Festive Season

Blog banner

DURGA POOJA

Blog banner

Disk scheduling

Blog banner

Memory management

Blog banner

?Why Social and Emotional Skills Matter More Than ABCs in Early Years?

Blog banner

Cyber Security in Data Breaching

Blog banner

Cache memory

Blog banner

Teenagers of Today

Blog banner

How to setup a professional looking business account on Instagram?

Blog banner

The Evolution of the Microprocessor ~ Aditya Pai

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

Heart Fulness Meditation

Blog banner

Data Science in Mental Health Prediction

Blog banner

Things You Should Leave Behind In 2025, Whilst In 2026

Blog banner

This Windows 11 encryption bug may cause data damage

Blog banner

What is 'Multi-core and Multi-threading' ?

Blog banner

MySQL

Blog banner

Service design process in ITSM

Blog banner

GOOGLE

Blog banner

Deadlock

Blog banner

Meshoo

Blog banner

Explain Kernel in OS

Blog banner

Simple STEM Activities for Toddlers That Spark Curiosity

Blog banner

Deadlock in operating system

Blog banner

Beatbox

Blog banner

Google classroom

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Multiple-Processor Scheduling in Operating System

Blog banner

Telegram and it's features

Blog banner

How to Conquer Depression ?

Blog banner

internet email and it's applications

Blog banner

Drawing tips for a beginner

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

First-Order Logic (FOL): The Foundation of Modern Logic

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

File management in os

Blog banner

Modern operating system

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

The Peephole

Blog banner

Operating system

Blog banner

DATA VAULT

Blog banner