Explain the typical functions of operating systems, Computer Engineering

Assignment Help:

List the typical functions of operating systems.

Classical functions of operating system are given as:

(1) Process management: A process is a program throughout execution. This is the job that is currently being executed through the processor. In its execution a process would need certain system resources as processor, time, main memory and files etc. Operating system supports many processes concurrently. The process management module of the operating system takes care of the creation and termination of the processes, allocating resources to the processes, scheduling processor time to various processes and communication among processes.

(2) Memory management module: This takes care of the allocation and de-allocation of the main memory to the different processes. It also allocates main and secondary memory to the system or user program and data. To execute a program, binary image of it, should be loaded into the main memory.

Operating System decides:

(a) A part of memory are being currently utilized and by whom.

(b) Which one process to must be allocated memory.

(c) Allocation and de-allocation of memory space.

(3) Input/outputs management: such type module of the operating system co-ordinates and assigns various I/O devices namely printers, terminals, disk drives and tape drives etc. This controls all I/O devices, continues track of I/O request, issues command to such devices.

I/O subsystem consists of:

(i) Memory management component which includes buffering, caching and spooling.

(ii) Device driver interface

(iii) Device drivers exact to hardware devices.

(4) File management: Data is stored in a computer system as files. Such module of the operating system would handle files held on various storage devices and transfer of files from one device to the other. This module takes care of creation, organization, naming, storage, sharing, back-up and protection of various files.

(5) Scheduling: The operating system also establishes and enforces process priority. It is determines and preserves the order wherein the jobs are to be executed through the computer system. It is so because the most significant job must be executed initially followed through less important jobs.

(6) Security management: This module of the OS ensures data security and integrity. It protects data and program from destruction and unauthorized access. This keeps different programs and data which are executing concurrently into the memory in such a way which they do not interfere along with each other.

(7) Processor management: Operating system assigns processor to the different task that should be performed through the computer system. If the computer has more than one processor idle, one of the processes waiting to be executed is allocated to the idle processor.

OS keeps internal time clock and log of system usage for all the users. This also creates error message and their debugging and error detecting codes for correcting programs.


Related Discussions:- Explain the typical functions of operating systems

State and prove demorgan’s first theorems, State and prove Demorgan’s First...

State and prove Demorgan’s First theorems: Ans. Statement of First Theorem of De Morgan: = A‾. B‾   Proof: The two sides of the equation i.e. = is represented with logic

Develop a calculator in masm, Assignment:  develop a calculator in MASM. ...

Assignment:  develop a calculator in MASM. Text chapters covered:  1 through 4, 5.4, 5.5, 6.3, 7.4 You will develop a "calculator" algorithm in MASM using reverse-polish nota

Selection - artificial intelligence, Selection - artificial intelligence: ...

Selection - artificial intelligence: However the first step is to choose the individuals that will have a shot at becoming the parents of the next generation. Hence this is kn

What are the various layers of a file system, What are the various layers o...

What are the various layers of a file system? The file system is composed of lots of dissimilar levels. Each level in the design uses the characteristic of the lower levels to

Determine the benefits of mainframe computers, Determine the benefits of ma...

Determine the benefits of mainframe computers Government agencies, large businesses, and universities usually use this type of computer. So: This computer is common t

Elaborate protected mode memory addressing in brief, Elaborate protected mo...

Elaborate protected mode memory addressing in brief. Protected mode interrupt: In protected mode, interrupts have exactly the same assignments as in real mode though int

What are modes of operation of centralized spc, What are modes of operation...

What are modes of operation of centralized SPC? In about all the present day electronic switching systems utilizing centralized control, only a two-processor configuration is

Explain j2ee, With respect to security, which one is the better choice? ...

With respect to security, which one is the better choice? .Net or J2EE? Explain? As per majority programmers .NET is the best one which have single vendor compare to, the

Direct mapped cache - computer architecture, Direct Mapping: In this p...

Direct Mapping: In this particular technique, block j of the primary memory maps onto block j modulo 128 of the cache. The primary memory blocks 0,128,256,...is loaded

Components of magnetic disk, Q. Components of magnetic disk? Disk itsel...

Q. Components of magnetic disk? Disk itself is mounted in a disk drive that comprises arm which is a shaft that rotates disk and the electronics required for input and output b

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd