wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Major achievement

profile
Manya Shah
Jul 12, 2023
0 Likes
0 Discussions
67 Reads

Major Achievements of OS manages computer hardware and software resources. Major Achievements of OS are given as follows:

1. Process

2. Memory Management

3. Information Protection & Security

4. System Structure

Process:

A process is a program at the time of execution. The term ‘process‘ was first used by Daley and Dennis.R in 1960. At the time of developing multi-programming, time-sharing and real-time systems some problems are raised due to the timing and synchronization.

Memory Management:

Here memory means main memory (RAM), and the term memory management specifies how to utilize the memory efficiently. So, the main task of memory management is ‘efficient memory utilization and efficient processor utilization.

(i) Process isolation: It simply means that controlling one process interacts with the data and memory of another process.

(ii) Automatic allocation and management: Memory should be allocated dynamically based on the priorities of the process. Otherwise, the process waiting time will increase, which decreases CPU utilization and memory utilization.

(iii) Protection and access control: Do not apply protection techniques and access control to all the processes, better to apply to the important application only. It will save execution time.

(iv) Long-term Storage: Long-term storage of process reduces memory utilization

Information protection and security:

Here the term protection means that secure the resources and information from unauthorized persons. The operating system follows a variety of methods for protection and security.

(i) Access control: The operating system provides access permissions to the users about important files and applications.

(ii) Information flow control: The operating system regulates the flow of data within the system.

(iii) Certification: The operating system provides the priorities and hierarchies to the resources using this then we can control unauthorized processes.

System Structure:

In the Olden Days, the code for an operating system is very few. Later more and more features have been added to the operating systems. The code of the operating system is generally increased.

 


Comments ()


Sign in

Read Next

Tiranga - Abbas Haveliwala

Blog banner

Importance of business process documentation

Blog banner

Deadlock and Starvation

Blog banner

PHISHING

Blog banner

Operating system evolution

Blog banner

Malware Detection Techniques for Mobile Devices

Blog banner

Boxing

Blog banner

File system

Blog banner

Deadlock and Starvation

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

Os(Computer security threats)

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

Uniprocessor scheduling

Blog banner

Evolution of Operating Sytems

Blog banner

Man In The Middle Attack

Blog banner

10 Signs your Computer has Virus

Blog banner

Street foods

Blog banner

Carrot Pickle With Raisins (lagan Nu Achar)

Blog banner

Linux Memory Management

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

Memory

Blog banner

Simple STEM Activities for Toddlers That Spark Curiosity

Blog banner

USES OF WHATSAPP

Blog banner

How covid-19 impacted Social media ad spend forecast globally

Blog banner

WAKE UP ITS FOOD o'CLOCK...!!!!!

Blog banner

Metasploit

Blog banner

Social Media Marketing Trends 2022

Blog banner

Python as a tool for data analysis

Blog banner

OS Assignment 3

Blog banner

Rain bow

Blog banner

SQL Injection Techniques

Blog banner

Memory Management

Blog banner

My Favorite Country

Blog banner

MACHINE LEARNING

Blog banner

Power of words

Blog banner

Introduction to Virtual Memory - 080

Blog banner

What is OS Fingerprinting?

Blog banner

Article on different management system

Blog banner

Financial Fraud Detection

Blog banner

Population

Blog banner

Benefits and drawback of web security.

Blog banner