Explain the typical functions of operating systems, Computer Engineering

Assignment Help:

List the typical functions of operating systems.

Classical functions of operating system are given as:

(1) Process management: A process is a program throughout execution. This is the job that is currently being executed through the processor. In its execution a process would need certain system resources as processor, time, main memory and files etc. Operating system supports many processes concurrently. The process management module of the operating system takes care of the creation and termination of the processes, allocating resources to the processes, scheduling processor time to various processes and communication among processes.

(2) Memory management module: This takes care of the allocation and de-allocation of the main memory to the different processes. It also allocates main and secondary memory to the system or user program and data. To execute a program, binary image of it, should be loaded into the main memory.

Operating System decides:

(a) A part of memory are being currently utilized and by whom.

(b) Which one process to must be allocated memory.

(c) Allocation and de-allocation of memory space.

(3) Input/outputs management: such type module of the operating system co-ordinates and assigns various I/O devices namely printers, terminals, disk drives and tape drives etc. This controls all I/O devices, continues track of I/O request, issues command to such devices.

I/O subsystem consists of:

(i) Memory management component which includes buffering, caching and spooling.

(ii) Device driver interface

(iii) Device drivers exact to hardware devices.

(4) File management: Data is stored in a computer system as files. Such module of the operating system would handle files held on various storage devices and transfer of files from one device to the other. This module takes care of creation, organization, naming, storage, sharing, back-up and protection of various files.

(5) Scheduling: The operating system also establishes and enforces process priority. It is determines and preserves the order wherein the jobs are to be executed through the computer system. It is so because the most significant job must be executed initially followed through less important jobs.

(6) Security management: This module of the OS ensures data security and integrity. It protects data and program from destruction and unauthorized access. This keeps different programs and data which are executing concurrently into the memory in such a way which they do not interfere along with each other.

(7) Processor management: Operating system assigns processor to the different task that should be performed through the computer system. If the computer has more than one processor idle, one of the processes waiting to be executed is allocated to the idle processor.

OS keeps internal time clock and log of system usage for all the users. This also creates error message and their debugging and error detecting codes for correcting programs.


Related Discussions:- Explain the typical functions of operating systems

Define sr flip flop - sr latch with nor gate, Define SR Flip Flop - SR latc...

Define SR Flip Flop - SR latch with NOR Gate? The SR Flip flop neither is a circuit with two cross-coupled NOR gates or two cross-coupled NAND gates. SR

Computer network architecture, A protocol is a formal description of messag...

A protocol is a formal description of message formats and the rules two or more machines must follow to exchange those messages. Because TCP (transmission control protocol) and IP

What is an i/o interface, What is an I/O Interface? Input-output interf...

What is an I/O Interface? Input-output interface provides a method for transferring binary information among internal storage, like memory and CPU registers, and external I/O d

What is anonymous file transfer protocol, What is Anonymous File Transfer P...

What is Anonymous File Transfer Protocol? Anonymous FTP: While a FTP client contacts a server, in that case, the daemon will ask for an account number or username and it

What is open addressing, Open addressing:  The easiest way to resolve a co...

Open addressing:  The easiest way to resolve a collision is to begin with the hash address and do a sequential search by the table for an empty location. The idea is to place the

How to copy several files in one stroke, Q. How to copy several files in on...

Q. How to copy several files in one stroke? The COPY command can also be used to copy several files in one stroke by using wildcards. For example, consider the following comman

What is the draw back of micro programmed control, What is the draw back of...

What is the draw back of micro programmed control? It leads to a slower operating speed because of the time it takes to fetch microinstructions from the control store.

What is icon, An icon is a picture used to show an object. Some example obj...

An icon is a picture used to show an object. Some example objects are: data files, program files, folders, email messages, and drives. Every type of object has a dissimilar icon. T

Implement a priority queue, 1. Insert the following characters with their r...

1. Insert the following characters with their respective priorities (shown as ordered pairs) into an empty treap: (K, 17), (F, 22), (P, 29), (M, 10), (N, 15), (L, 26), (G, 13),

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd