wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Objectives and Functions of Operating System

profile
Pratham Jain 404C
Jul 11, 2023
0 Likes
0 Discussions
32 Reads

Objectives of Operating System :
The operating system acts as a bridge between the user of a computer system and the computer hardware. All of the applications required for your programs to utilize the computer hardware are located on top of the operating system.
The following are the main objectives of an operating system:
-An OS allows the computer system resources to be used in an efficient manner.
-To act as an intermediary between the hardware and its users, making it easier for the users to access and use other resources.
-The operating system coordinates communication between user programs and computer hardware.
-The operating system handles system tasks such as allocating resources to processes and resolving conflicts between different programs and users. This saves the user time and results in a more efficient result.
-To provide users a convenient interface to use the computer system.
Functions of Operating System :
Security-
To safeguard user data, the operating system employs password protection and other related measures. It also protects programs and user data from illegal access.
Coordination between Users and Other Software-
Operating systems also organise and assign interpreters, compilers, assemblers, as well as other software to computer users.
Error Detecting Aids-
The OS constantly monitors the system in order to discover faults and prevent a computer system from failing.
Memory Management-
The operating system is in charge of managing the primary memory, often known as the main memory.

 


Comments ()


Sign in

Read Next

Deadlock

Blog banner

Deadlock

Blog banner

Why Data Security Is Important

Blog banner

Networking 101: How to Build Meaningful Connections in College

Blog banner

GIS info about Bermuda Triangle

Blog banner

PODIO

Blog banner

Domain Name System

Blog banner

HubSpot

Blog banner

Palm Vein Biometric Technology; Contactless vein authentication

Blog banner

Full Disk Encryption

Blog banner

(Input/Output) in os

Blog banner

MEMORY HIERARCHY

Blog banner

memory cache

Blog banner

Virtual Memory

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

PROCESS STATE:

Blog banner

Balance

Blog banner

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

Zero-Day Attack

Blog banner

Ola

Blog banner

Evolution of Operating System

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Safeguarding Your Data: The Importance of Wireless Encryption

Blog banner

Session Hijacking Techniques

Blog banner

Place to visit in pune

Blog banner

Answer

Blog banner

Apple

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

Population

Blog banner

FIREWALL

Blog banner

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner

IT RISK

Blog banner

Modern Operating System - Khush bagaria

Blog banner

Explain the concept of ( MIS) Management information systems

Blog banner

The Power of Cyber Forensic in Solving Crimes

Blog banner

Virtual Machine

Blog banner

Deadlock in Operating System

Blog banner

Procedure For Corporate High-Tech Investigations

Blog banner

Data Visualization

Blog banner