Operating system as user interface, Operating System

Assignment Help:

Q. Operating System as User Interface?

• Every general purpose computer comprises the operating system, hardware, system programs and application programs. The hardware comprises CPU, ALU, Memory,I/O devices, peripheral device and storage device. System program comprises compilers, loaders, editors, OS etc. Application program comprises database program, business program.

1414_Operating System as User Interface.png

• Every computer should have an operating system to run other programs. Operating system and coordinates the use of hardware among numerous system programs and application program for various users. It simply offers an environment within that other programs can do useful work.

• Operating system is a set of special programs that run on a computer system which allow it to work properly. It performs basic tasks like recognizing input from the keyboard, keeping track of files and directories on the disk, sending output to display screen and controlling a peripheral devices.

• OS is designed to serve two fundamental purposes :

1. It controls the allocation as well as use of the computing system‘s resources among the various user and tasks.

2. It provides an interface between computer hardware and programmer which simplifies and makes feasible for coding, creation, debugging of application programs.

• The operating system should support the below tasks. The tasks are :

1. Provides facilities to create, modification of program as well as data files using an editor.

2. Access to the compiler for translating user program from high level language to machine language.

3. Provide a loader program to move compiled program code to computer‘s memory for execution.

4. Provide routines which handle the details of I/O programming.


Related Discussions:- Operating system as user interface

What circumstances is a token-passing network more effectual, Q. In what ci...

Q. In what circumstances is a token-passing network more effectual than an Ethernet network? Answer: A token ring is extremely effective under high sustained load as no colli

Locks - mutexes, Locks (also known as mutexes, short for mutual exclusion l...

Locks (also known as mutexes, short for mutual exclusion locks) provide mutual exclusion to shared data inside a critical session. They are implemented by means of two atomic routi

Ipc, Explain in detail about ipc in linux

Explain in detail about ipc in linux

Explain fixed partitioning, Explain fixed partitioning. Partitioning ar...

Explain fixed partitioning. Partitioning are the simpler techniques that don't involve virtual memory. Partitioning has been used in numerous variations in operating systems.

Major page fault, Major page fault: If the page is not loaded in memory a...

Major page fault: If the page is not loaded in memory at the time the fault is stated, then it is named major or hard page fault. The handler in the machine requires to search a

Why do organisations need a structure, Problem 1: (a) The grouping of o...

Problem 1: (a) The grouping of organisational activities (usually into ‘departments' or larger ‘divisions') can be done in different ways. Outline 7 criteria which can be used

Explain demand paging in virtual memory system, Question 1 Explain with di...

Question 1 Explain with diagram all possible states a process visits during the course of its execution Question 2 Discuss Inter-process Communication. What is critical-secti

Define lazy swapper, Define lazy swapper. Rather than swapping the enti...

Define lazy swapper. Rather than swapping the entire process into main memory, a lazy swapper is used. A lazy swapper never swaps a page into memory unless that page will be ne

Safety algorithm and resource request algorithm, Safety algorithm : This is...

Safety algorithm : This is to make sure if the system is in safe state or not. It may need an order of m x n2 operation to determine if the state of the system is safe or not.

Explain rehashing to handle collision, Explain Rehashing to Handle Collisio...

Explain Rehashing to Handle Collision Rehashing:  Re-hashing schemes make use of a second hashing operation while there is a collision. If there is an additional collision, we

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd