Regardless of the type of operating system, all computer operating systems performs the following main tasks:
Process Management
Memory Management
File System Management
Device Management
Process management
Process is defined as an instant of a computer program that is being executed or in other words a program in execution. Application software being executed by user or a printing task carried out by the system are considered as processes.
Below is the image of processes running on windows operating system:
All processes go through 5 states described as:
Initiation – the creation stage of the process.
Ready – the stage where all the necessary resources required to execute the process are available and waiting for the CPU to start
…show more content…
When the process ends all the system resources are freed up.
Most modern computer operating systems runs multiple processes at one time in comparison to earlier ones which supported only one program at one time by allowing the CPU to switch from one process to another, and this method is known as context switching.
Since most modern computer operating systems supports multiple processes, in a place where more than one program run concurrently, the need for further allocation of system resources led to the problem of deadlock. Deadlock is defined permanent blocking of a set of processes that are competing for computer resources.
The four factors that led to deadlock are:
Mutual exclusion; this occurs when one process is using system resources at a time.
Hold and wait; this occurs when a process holds the resources allocated to it while waiting for further resources to be allocated to
…show more content…
It’s a technique that co-ordinate activities in which multiple processes compete for system resources. A semaphore is an integer value which define wait and signal operations. Depending on the value, the process can either use resources or wait for a period of time before accessing them. When a process uses the resources or finish using the resources changes the value to reflect it to others semaphore users.
Memory management
Main memory is fundamental to the running of most computer systems as CPU can only load instructions from here for program to run. Main memory also referred to as Random Access Memory or RAM acts as a source data for CPU and other devices. Since main memory is volatile and can not hold data permanent, programs must be loaded and re-loaded when not in use.
In relation to memory management, operating system keeps records of the part of the memory that is being used and the program that use it and decide which program to move in and out of memory and therefore assigning and freeing up of memory space.
Operating system is responsible for mapping out the logical addresses and physical addresses when assigning memory space to programs. There are several mechanisms that the operating system uses in memory
This tells the program to supply 0 volts the LED, resulting in it turning off. Finally, the delay instruction again causes the program to delay for 1000 milliseconds so that the LED remains unlit for that amount of time. Since there isn’t an instruction that makes the program exit the loop, the program will continue to run to run the instructions in the loop function
Trap is a synchronous interrupt caused by an exceptional condition. Like invalid memory access. A trap usually results in a switch to kernel mode, wherein the operating system performs some action before returning control to the originating process 3. How can multiprogramming
The Goldfish is a virtual CPU on the Android kernel. The Goldfish is responsible for input and output services. The second category of files changed is the Scheduler. Here, it is claimed five files were changed and the differences between original Scheduler on the Linux kernel and the Scheduler on the Android kernel are time-keeping algorithms. The third category is the power management category (discussed in detail section 3.2.3) where it is claimed five files were changed.
Addressing: • We can assign byte address across words in two ways. • Big-endian addressing assigns lower addresses to more significant (leftmost) bytes of word. • Little-endian addressing uses opposite order. • Commercial computers use either approach, and some can support both approach Memory Space: In each memory location, we can store 1 byte(8-Bits).Memory Locations are numbered as Big_endian order below.
1. Give an example in which the operating system would use a bitmap to manage resource. Answer: Windows, Android like operating systems uses bitmap to manage resources. 2.
x x Physical Design x This underlines the importance of the instruction set architecture. There are two prevalent
Rootkit: It inject malware to the computer in order to get root access to computer or other device. Sandboxing: It is a computer security term referring to when a program is set aside from other programs in a separate environment so that if errors or security issues occur, those issues will not inject to other areas on the computer.
Unit 2 – P3 and D1 Intro: Throughout this assignment, I will be discussing about how to manage and maintain an operating system for e.g. removing files that may contain viruses and cleaning files that are unnecessary in the operating system. I will also be talking about the benefits and drawbacks of each software utilities and I will be explaining and defining what each of the definitions actually mean. There are four essential categories that I will be focusing on and this will be explained later on. Security
Introduction The Department of Veteran Affairs (VA), in accordance with the Government Performance Results Act (GPRA) of 2010, in partnership with the Office of Management and Budget (OMB) has committed to making the VA performance more transparent and accessible. In order to achieve the strategic goals, objectives of the VA and the nested goals of Veterans Benefits Administration (VBA), the Undersecretary for Benefits (USB) has directed implementation of an initiative with the goal of eliminating the use of the current End Product (EP) code system as a method of tracking the workload within VBA. Business Case Currently, VBA Manual 21-4, dated July 24, 2015 prescribes the use of an End Product (EP) system to facilitate accurate control
The second is storage the fees of a memory process referring to the retention of information. The third phase is the retrieval the process
Software routines will handle traffic that is coming in from different sources and that will choose where it will end up. Towards the end it will work out where it need to go and which devices will take the data. Also devices and software such as for interface card for the device driver. This is allowing the data to handle incoming packets from various locations and it select the last place it travels to. Error handling and diagnostics is when a device is allowed to access a network layer locally.
Describe different types of business documents that may be produced and the format to be followed for each. There are many different types of business documents that are used daily in business environments, for example; Emails- The fastest way to send documents and information and follow the format of recipient and subject. Spreadsheets- These are used to store information electronically.
Moderators are used in junction with control rods, moderators is a material that used to slows down
Incarceration refers to the constitutional deprivation of an offender the capacity to commit crimes by detaining them in prisons. The United States has the highest incarceration rate of any free nation. The U.S incarcerates five times more people than the United Kingdom, nine times more than Germany and twelve times more than Japan (Collier, 2014, p.56). Incarceration has several objectives. One of these is to keep persons suspected of committing a crime under secure control before a court of competent jurisdiction determines whether they are guilty or innocent.
1. What factors in the WorldCom case support the conclusion that CEO Bernie Ebbers Knew about the financial statement fraud? What factors support his defense that he did not know about the fraud? Bernie Ebbers Knew about the financial statement fraud because he was the one who encourage others to go into financial fraud because of the stock prices were going down, which was affecting his marginal loan. For that reason, he was trying to sell his stock, but the board of Directors lent him $341 million, along with 2% interest rate.