wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Functions of Operating System

profile
Jeet Ved
Jul 04, 2024
0 Likes
0 Discussions
85 Reads

Operating System(OS)

 

An operating system (OS) is software that controls computer hardware and provides services to computer applications. It acts as an intermediary between applications and computer hardware, communication and resource management.

 

Functions of OS

 

1.Memory Management:

 

 It keeps track of primary memory, i.e., which bytes of memory are used by which user program. The memory addresses that have already been allocated and the memory addresses of the memory that has not yet been used.

 

 It Allocates the memory to a process when the process requests it and deallocates the memory when the process has terminated or is performing an I/O operation.

 

2. Security and Protection:

 

The OS enforces security measures to protect system resources from unauthorized access and ensure data availability.

 

It provides user identification mechanisms, access controls, and encryption to protect sensitive information and system functionality.

 

3.File Management:

 

The OS manages file storage, organization, and access through a hierarchical file system structure. It supports operations like file creation, deletion, reading, writing, and modification.

 

It handles file permissions and manages disk space allocation to optimize storage efficiency.

 

4.Process Management:

 

An operating system controls the workload of the processor by allocating various tasks to it and ensuring that each process gets enough time from the processor to run efficiently.

 

It stores the state of the systems. The program that performs this function is known as traffic controller.

 

 The processor that runs the CPU distributes the process. Deallocates the processor when the system is no longer needed.

 

5.Device Management:

 

It keeps track of all devices connected to the system. Designates a program responsible for every device known as the Input/Output controller.

 

 It decide which process gets access to a certain device and for how long.

 

 It Allocates devices effectively and efficiently. Deallocates devices when they are no longer required.


Comments ()


Sign in

Read Next

File Organization and Access

Blog banner

Starvation

Blog banner

Different Types of Data

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

"Geographic Information Systems (GIS) and its Applications in Urban Planning"

Blog banner

Data Mapping

Blog banner

Mumbai Metro 3

Blog banner

The Right way of cooking

Blog banner

My Favorite Country

Blog banner

The Golden Temple , Amritsar

Blog banner

The Sunny Side of Instagram

Blog banner

Direct Memory Access

Blog banner

Blockchain technology: security risk and prevention

Blog banner

IOT Hacking Techniques

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

Predictive Analysis - Ek Overview

Blog banner

Uber

Blog banner

Different types of scam Fraud

Blog banner

SMARTSHEET MANAGEMENT SYSTEM

Blog banner

KASHMIR TRIPS

Blog banner

Deadlocks in Operating Systems

Blog banner

Virtual memory

Blog banner

Disk scheduling

Blog banner

MACHINE LEARNING

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

Jio .....A Revolution ?? ??

Blog banner

rupee

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

LinkedIn

Blog banner

Music helps reduce stress

Blog banner

Proof-of-Stake (PoS)

Blog banner

Os Virtual Memory

Blog banner

Disk scheduling

Blog banner

Malware Defense

Blog banner

Flipkart

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

What are Tenders its various types

Blog banner

MoSCoW METHOD IN DATA SCIENCE

Blog banner

INTERNET SECURITY

Blog banner

Game via listing method

Blog banner

Cloud Security: Trends and Innovations

Blog banner