What is Programmed I/O

Bhanu Priya
Updated on 30-Nov-2021 10:57:30

11K+ Views

It is one of the simplest forms of I/O where the CPU has to do all the work. This technique is called programmed I/O.Consider a user process that wants to print the Nine-character string ‘‘TUTORIALS’’ on the printer with the help of a serial interface.The software first assembles the string in a buffer in user space, as shown in the figure −ExplanationStep 1 − The user process acquires the printer for writing by using a system call to open it.Step 2 − If the printer is currently in use by another process, this system call fails and returns an error ... Read More

What is a Client-Server System?

Bhanu Priya
Updated on 30-Nov-2021 10:41:22

1K+ Views

Communication in client-server can communicate using shared memory and message passing.These techniques can be used for communication in client-server systems.Strategies for CommunicationWe can explore three other strategies for communication in client-server systems which are as follows −SocketsA socket is defined as an end point for communication. A pair of processes communicating over network employees or a pair of sockets, one for each process.A socket is identified by an IP address connected with a port number. In general, sockets use client server architecture. The server waits for incoming client requests by listening to a specified port.Once a request is received, the ... Read More

Differentiate Between Shared Memory and Message Passing Model in OS

Bhanu Priya
Updated on 30-Nov-2021 10:38:48

23K+ Views

Shared memory system is the fundamental model of inter process communication. In a shared memory system, in the address space region the cooperating communicate with each other by establishing the shared memory region.Shared memory concept works on fastest inter process communication.If the process wants to initiate the communication and it has some data to share, then establish the shared memory region in its address space.After that, another process wants to communicate and tries to read the shared data, and must attach itself to the initiating process’s shared address space.Message Passing provides a mechanism to allow processes to communicate and to ... Read More

Trends in Data Mining

Ginni
Updated on 30-Nov-2021 10:38:22

833 Views

The trends in data mining are as follows −Application exploration − Early data mining applications targeted generally on helping businesses gain a competitive edge. The exploration of data mining for businesses continues to expand as e-commerce and e-marketing have become mainstream components of the retail market.Data mining is increasingly used for the exploration of applications in several areas, including financial analysis, telecommunications, biomedicine, and science. Emerging software areas contain data mining for counterterrorism (including and beyond intrusion detection) and mobile (wireless) data mining. As generic data mining systems can have limitations in dealing with application-specific issues, it can view a ... Read More

Features of Data Mining

Ginni
Updated on 30-Nov-2021 10:33:46

4K+ Views

There are various features of data mining that are as follows −Data types − Most data mining systems that are accessible in the industry handle formatted, record-based, relational-like data with statistical, categorical, and symbolic attributes. The data can be in the form of ASCII text, relational database data, or data warehouse data. It is essential to test what exact format(s) each system it is treating can handle.Some types of data or applications can require specialized algorithms to search for patterns, and so their requirements cannot be managed by off-the-shelf, generic data mining systems. Rather than, specialized data mining systems can ... Read More

Areas Where Data Mining Technology Can Be Applied

Ginni
Updated on 30-Nov-2021 10:31:25

186 Views

The following are areas in which data mining technology can be used or created for intrusion detection which are as follows −Development of data mining algorithms for intrusion detection − Data mining algorithms can be used for misuse detection and anomaly detection. In misuse detection, training information is labeled as either “normal” or “intrusion.” A classifier can then be changed to detect known intrusions.There is multiple research in this area that has contained the application of classification algorithms, association rule mining, and cost-sensitive modeling. Anomaly detection constructs models of normal behavior and automatically detects significant deviations from it and supervised ... Read More

IPC Implementation in Android, Mac, and Windows Operating Systems

Bhanu Priya
Updated on 30-Nov-2021 10:30:54

676 Views

Inter-process communication is a technique of exchanging data between two or more processes for performing some action on that data. These processes may be present on the same computer or at remote locations.The reasons for Inter-process communication are as follows −Sharing information between processesSpeed up the computation of some processIncreasing the modularity in the applicationNow, let us learn about the type of inter-process communication implemented in the following OS.AndroidAndroid OS uses the following method for sharing data between two or more processes.BindersIt is one of the ways of passing data between processes in the android operating system. The communication between ... Read More

Components of User Interface in Windows Operating System

Bhanu Priya
Updated on 30-Nov-2021 10:27:23

4K+ Views

The user interface components of the windows operating system are explained below.The main components are GUI (Graphical user interface). It is made of four parts as follows −WindowsIconsMenusPointerThe common windows controls are as follows −MinimizingMaximizingExit tabsGUI basic components are as follows −Start menu and programming groups.Task-bar shows running programs.Desktop shows icons and shortcuts.The outlines of windows operating system are, it is developed by Microsoft Corporation, interface provides multitasking capability, provides virtual memory etc.Now let us discuss some of the components of GUI which are as follows −Pointer − A symbol that appears on the screen and that you move to ... Read More

Components and Shells of UNIX

Bhanu Priya
Updated on 30-Nov-2021 10:26:00

1K+ Views

Components of UNIXGenerally, a computer system consists of four main components, called hardware, application programs, operating system, and users.Hardware − Physical devices are nothing but which we can touch and feel.Operating system − It allows the user to communicate with the hardware.Application − There are software programs which give some functionality to the user.User − One who gives instructions to the computer to perform an operation and accepts the result from the computer.If there is no hardware, the system does not have computing capability.If there is no operating system, the user cannot connect to the hardware parts to perform the ... Read More

How Intrusion Can Be Detected

Ginni
Updated on 30-Nov-2021 10:25:50

199 Views

The security of our computer systems and information is at constant risk. The extensive growth of the web and increasing accessibility of tools and tricks for intruding and attacking networks have prompted intrusion detection to become an important element of network administration. An intrusion can be represented as any set of events that threaten the integrity, confidentiality, or availability of a network resource (including user accounts, file systems, system kernels, etc).Some commercial intrusion detection systems are limiting and do not support a whole solution. Such systems generally employ misuse detection approaches. Misuse detection searches for designs of program or user ... Read More

Advertisements