Show the services which provided by operating system, Operating System

Assignment Help:

Q. Show the services which provided by operating system?

A) Resource Allocation:

  • If there are more than one user or jobs running at the same instance then resources should be allocated to every one of them. Operating system manages various types of resources require special allocation code i.e.CPU cycles, main memory and file storage.
  • There are a number of resources that require only general request and release code. For allocating CPU, CPU scheduling algorithms are used for better utilization of CPU. CPU scheduling routines consider the speed of CPU and number of available registers as well as other required factors.

B) Accounting :

  • Logs of every user should be kept. It is also essential to keep record of which user how much and what types of computer resources. This log is used for accounting purposes.
  • The accounting data can be used for statistics or for the billing. It is also used to improve system efficiency.

C) Protection:

  • Protection involves ensuring that all access to system resources is controlled. Security starts with each user having to authenticate to system typically by means of a password. External I/O devices should be also protected from invalid access attempts.
  • In protection all the access to the resources is controlled. In multiprocess environment it's possible that one process to interface with the other or with operating system so protection is required.

 


Related Discussions:- Show the services which provided by operating system

Vehicle tasks using semaphores, Gopher Gallery consists of a shopping mall ...

Gopher Gallery consists of a shopping mall and a cart ride that covers  the 150 acre habitat. There are m visitors and n single-person vehicles. Visitors  stroll around the mall at

What is meant by arm-stickiness, What is meant by arm-stickiness? If on...

What is meant by arm-stickiness? If one or a few processes have a high access rate to data on single track of a storage disk, then they might be monopolizing the device by repe

Deadlock-avoidance safety algorithm, Q. Presume that you have coded the de...

Q. Presume that you have coded the deadlock-avoidance safety algorithm as well as now have been asked to implement the deadlock-detection algorithm. Can you do thus by simply usin

Demand-paging system, Consider a demand-paging system with the following ti...

Consider a demand-paging system with the following time-measured utilizations: CPU utilization: 10%, Paging disk: 98%, Other I/O devices: 5%. What does this imply? How to improv

Explain the tlsalloc (void) - tls function call, Explain the TlsAlloc (VOID...

Explain the TlsAlloc (VOID) This function is used to allocate a TLS index.Any subsequent TLS function calls will require  the handle returned  from TlsAlloc to be passed. The i

Memory hierarchy, Difference between cache and associate memory

Difference between cache and associate memory

Sharing memory, As we have discussed, page tables map virtual page addresse...

As we have discussed, page tables map virtual page addresses to physical page addresses. One of the advantages of using virtual addresses is that we can achieve complete separation

Explain kernel activity for ults, KERNEL ACTIVITY FOR ULTS: The kernel...

KERNEL ACTIVITY FOR ULTS: The kernel isn't aware of thread activity but it is still managing process activity. When a thread compose a system call the whole process will be bl

Explain load balancing client server components, Explain Load Balancing Cli...

Explain Load Balancing Client Server Components When migration functionality from the client - only model to the client - server model, care must be taken not over-or underutil

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd