wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

evolution of operating system - Disha Parekh

profile
Disha Parekh
Jul 03, 2024
0 Likes
0 Discussions
126 Reads
  • The interface between hardware and user is an operating system .
  • An Operating system is also known as a resource manager as it handles critical functions of the computer.
  • OS can be compared to the government, Just as the government has authority over everything, the operating system has authority over all resources.
  • Tasks like file management, task management, garbage management, memory management, process management, disk management, I/O management, peripherals management, etc. are handled by OS.
  • There are 4 types of generation in the operating system namely 
         1.  The First Generation (1940 to early 1950s)
     Early computer users had complete control over the device and wrote programs in pure machine language for every task, a programmer could merely execute and solve basic mathematical calculations. an operating system is not needed for these computations.
         2. The Second Generation (1955 – 1965)
    GMOSIS, the first operating system (OS) was developed in the early 1950s. For the IBM Computer, General Motors has created the operating system. Because it gathers all related jobs into groups or batches and then submits them to the operating system using a punch card to finish all of them, the second-generation operating system was built on a single-stream batch processing system.
         3. The Third Generation (1965 – 1980)
     The second-generation operating system was based on a single-stream batch processing system. Control is transferred to the operating system upon each job’s completion, be it routinely or unexpectedly. The operating system cleans up after every task before reading and starting the subsequent job on a punch card. Large, professionally operated machines known as mainframes were introduced after that.
         4. The Fourth Generation (1980 – Present Day)
    The fourth generation of personal computers is the result of these PDPs. There are similarities in third-generation minicomputers and personal computers. At that time, minicomputers were only slightly more expensive than personal computers, which were highly expensive. The Generation IV (1980–Present)The evolution of the personal computer is linked to the fourth generation of operating systems
  • Operating systems started with manual setups, then automated batch systems made things easier.
  • Later, time-sharing and multi-programming enhanced resource use. Now, modern OS with GUIs and multitasking offer user-friendly experiences.

Comments ()


Sign in

Read Next

american greatines

Blog banner

MULTITHREADING:ENHANCEING PERFORMANCE AND EFFICIENCY IN COMPUTING

Blog banner

Digital Forensics Challenges and Tools

Blog banner

Blockchain technology: security risk and prevention

Blog banner

Virtual Memory

Blog banner

Honeypot in cyber security

Blog banner

Service stratergy principles

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

Why am I never satisfied with my Life?

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

Data Mining

Blog banner

Self-love: Being the reason of your own smile

Blog banner

Proton mail

Blog banner

Business-to-Business

Blog banner

Memory Hierarchy

Blog banner

Malware

Blog banner

Buffer Overflow

Blog banner

HACKING MOBILE PLATFORM

Blog banner

MEMORY FORENSIC ACQUISITION AND ANALYSISOF MEMORY AND ITS TOOLS COMPARISON

Blog banner

Memory managment

Blog banner

Operating system

Blog banner

A small world of Sockets

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

indian premier league

Blog banner

Virtual memory in os

Blog banner

SAVE TREES

Blog banner

Computer security techniques

Blog banner

ONLINE NEWSROOMS

Blog banner

Im Photographer

Blog banner

Steganography and Steganalysis

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

The evolution of OS

Blog banner

What is Minting & Mining

Blog banner

Mobile Transport Layer – Traditional TCP

Blog banner

IT service level agreement

Blog banner

John Titor: The Time Traveler

Blog banner

Virtual Machine

Blog banner

The Laws of Karma

Blog banner

Odoo

Blog banner

Financial Fraud Detection

Blog banner