Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Operating System Articles
Page 154 of 171
What is a Debugger Program?
A debugger program is one that allows the user to view another program line by line. This allows the user to identify incorrect code and find out how a program flows. The debugger lets the user see how their program is viewed by the computer.A debugger is very useful to find semantic errors in the program. So, it is necessary as it helps the programmer visualize program flow. A debugger may take practise to use, but it is well worth it as it reduces the time taken to perfect a program.Features of a Debugger ProgramDebugger programs offer basic features such ...
Read MoreGraphical User Interface (GUI)
GUI is an interface that allows users to interact with different electronic devices using icons and other visual indicators. The graphical user interfaces were created because command line interfaces were quite complicated and it was difficult to learn all the commands in it.In today’s times, graphical user interfaces are used in many devices such as mobiles, MP3 players, gaming devices, smartphones etc.The below diagram provides the position of the graphical user interface with respect to the computer system −Elements in Graphical User InterfaceGraphical User Interface makes use of visual elements mostly. These elements define the appearance of the GUI. Some ...
Read MoreApplication Programming Interface (API)
An Application Programming Interface (API) contains software building tools, subroutine definitions as well as communication protocols that facilitate interaction between systems. An API may be for a database system, operating system, computer hardware or a web-based system.An Application Programming Interface makes it simpler to use certain technologies to build applications for the programmers. API can include specifications for data structures, variables, routines, object classes, remote calls etc.A diagram that shows the API in the system is as follows −Uses of Application Programming InterfacesAPI’s are useful in many scenarios. Some of these are given in detail as follows −Operating SystemsThe interface ...
Read MoreClustered Systems
Clustered systems are similar to parallel systems as they both have multiple CPUs. However a major difference is that clustered systems are created by two or more individual computer systems merged together. Basically, they have independent computer systems with a common storage and the systems work together.A diagram to better illustrate this is −The clustered systems are a combination of hardware clusters and software clusters. The hardware clusters help in sharing of high performance disks between the systems. The software clusters makes all the systems work together .Each node in the clustered systems contains the cluster software. This software monitors ...
Read MoreComputer Storage Structure
Computer Storage contains many computer components that are used to store data. It is traditionally divided into primary storage, secondary storage and tertiary storage. Details about these storage types and devices used in them are as follows −Primary StoragePrimary storage is also known as the main memory and is the memory directly accessible by the CPU. Some primary storage devices are −ROMROM is read only memory. This memory cannot be changed, it can only be read as required. Since ROM is unchangeable memory, it is used by data and programs that are frequently required and seldom changed, like the system ...
Read MoreAsymmetric and Symmetric Clustering System
Clustering systems are similar to parallel systems as they both have multiple CPUs. However a major difference is that clustered systems are created by two or more individual computer systems merged together. There are two types of Clustering systems i.e. asymmetric and symmetric clustering systems. Details about these are given as follows −Asymmetric Clustering SystemIn this system, one of the nodes in the clustered system is in hot standby mode and all the others run the required applications. The hot standby mode is a failsafe in which a hot standby node is part of the system . The hot standby ...
Read MoreKernel Data Structures
The kernel data structures are very important as they store data about the current state of the system. For example, if a new process is created in the system, a kernel data structure is created that contains the details about the process.Most of the kernel data structures are only accessible by the kernel and its subsystems. They may contain data as well as pointers to other data structures.Kernel ComponentsThe kernel stores and organizes a lot of information. So it has data about which processes are running in the system, their memory requirements, files in use etc. To handle all this, ...
Read MoreI/O Systems and Subsystems
I/O devices are very important in the computer systems.They provide users the means of interacting with the system. So there is a separate I/O system devoted to handling the I/O devices.The different Components of the I/O systems are −I/O HardwareThere are many I/O devices handled by the operating system such as mouse, keyboard, disk drive etc. There are different device drivers that can be connected to the operating system to handle a specific device. The device controller is an interface between the device and the device driver.A diagram to represent this is −I/O Application InterfaceThe user applications can access all ...
Read MoreTraditional Computing vs Mobile Computing
Mobile Computing deals with human computer interaction using mobile devices. It contains mobile hardware and software as well as mobile computing devices. A mobile computing infrastructure usually uses ad-hoc networks and communication protocols. This is considerably different than a traditional computing structure as it uses fixed topology and protocols.An image describing mobile computing architecture is as follows −As seen above, the mobile computing architecture contains various mobile devices such as mobile phones, mobile tablets, laptops etc. These devices are connected to the mobile network which is a part of the internet. All the data is linked to cloud computing data ...
Read MoreHash Functions and Hash Tables
Hashing is the process of generating a value from a text or a list of numbers using a mathematical function known as a hash function.There are many hash functions that use numeric numeric or alphanumeric keys. Different hash functions are given below:Hash FunctionsThe following are some of the Hash Functions −Division MethodThis is the easiest method to create a hash function. The hash function can be described as −h(k) = k mod nHere, h(k) is the hash value obtained by dividing the key value k by size of hash table n using the remainder. It is best that n is ...
Read More