Found 2065 Articles for Operating System

What is Bitmap?

Alex Onsman
Updated on 31-Jan-2020 07:29:05

11K+ Views

A bitmap is a mapping from one system such as integers to bits. It is also known as bitmap index or a bit array.The memory is divided into units for bitmap. These units may range from a few bytes to several kilobytes. Each memory unit is associated with a bit in the bitmap. If the unit is occupied, the bit is 1 and if it is empty, the bit is zero.The bitmap provides a relatively easy way to keep track of memory as the size of the bitmap is only dependent on the size of the memory and the size ... Read More

Operating System Operations

David Meador
Updated on 31-Oct-2023 21:48:31

53K+ Views

An operating system is a construct that allows the user application programs to interact with the system hardware. Operating system by itself does not provide any function but it provides an atmosphere in which different applications and programs can do useful work.The major operations of the operating system are process management, memory management, device management and file management. These are given in detail as follows:Process ManagementThe operating system is responsible for managing the processes i.e assigning the processor to a process at a time. This is known as process scheduling. The different algorithms used for process scheduling are FCFS (first ... Read More

I/O Systems and Subsystems

Ricky Barnes
Updated on 22-Jun-2020 11:06:34

10K+ Views

I/O devices are very important in the computer systems.They provide users the means of interacting with the system. So there is a separate I/O system devoted to handling the I/O devices.The different Components of the I/O systems are −I/O HardwareThere are many I/O devices handled by the operating system such as mouse, keyboard, disk drive etc. There are different device drivers that can be connected to the operating system to handle a specific device. The device controller is an interface between the device and the device driver.A diagram to represent this is −I/O Application InterfaceThe user applications can access all ... Read More

Protection and Security in Operating System

Kristi Castro
Updated on 07-Oct-2023 01:35:24

26K+ Views

Protection and security requires that computer resources such as CPU, softwares, memory etc. are protected. This extends to the operating system as well as the data in the system. This can be done by ensuring integrity, confidentiality and availability in the operating system. The system must be protect against unauthorized access, viruses, worms etc. Threats to Protection and Security A threat is a program that is malicious in nature and leads to harmful effects for the system. Some of the common threats that occur in a system are − Virus Viruses are generally small snippets of code embedded in a ... Read More

Types of Computing Environments

Alex Onsman
Updated on 22-Jun-2020 11:07:39

18K+ Views

A computer system uses many devices, arranged in different ways to solve many problems. This constitutes a computing environment where many computers are used to process and exchange information to handle multiple issues.The different types of Computing Environments are −Let us begin with Personal Computing Environment −Personal Computing EnvironmentIn the personal computing environment, there is a single computer system. All the system processes are available on the computer and executed there. The different devices that constitute a personal computing environment are laptops, mobiles, printers, computer systems, scanners etc.Time Sharing Computing EnvironmentThe time sharing computing environment allows multiple users to share ... Read More

Kernel Data Structures

Ricky Barnes
Updated on 22-Jun-2020 11:08:15

12K+ Views

The kernel data structures are very important as they store data about the current state of the system. For example, if a new process is created in the system, a kernel data structure is created that contains the details about the process.Most of the kernel data structures are only accessible by the kernel and its subsystems. They may contain data as well as pointers to other data structures.Kernel ComponentsThe kernel stores and organizes a lot of information. So it has data about which processes are running in the system, their memory requirements, files in use etc. To handle all this, ... Read More

What is Virtualization?

David Meador
Updated on 22-Jun-2020 10:11:02

3K+ Views

Virtualization in operating system changes a normal operating system so that it can run different types of applications that may be handled on a single computer system by many users. The operating system may appear different to each user and each of them may believe they are interacting with the only operating system i.e. this does not interfere with user experience.Operating system virtualization can also be used to migrate a process from one instance of the operating system to another. However, all the processes in the system are isolated and there operations are strictly monitored so there are no discrepancies ... Read More

Hash Functions and Hash Tables

Alex Onsman
Updated on 22-Jun-2020 10:03:08

9K+ Views

Hashing is the process of generating a value from a text or a list of numbers using a mathematical function known as a hash function.There are many hash functions that use numeric numeric or alphanumeric keys. Different hash functions are given below:Hash FunctionsThe following are some of the Hash Functions −Division MethodThis is the easiest method to create a hash function. The hash function can be described as −h(k) = k mod nHere, h(k) is the hash value obtained by dividing the key value k by size of hash table n using the remainder. It is best that n is ... Read More

Traditional Computing vs Mobile Computing

Kristi Castro
Updated on 22-Jun-2020 10:05:26

1K+ Views

Mobile Computing deals with human computer interaction using mobile devices. It contains mobile hardware and software as well as mobile computing devices. A mobile computing infrastructure usually uses ad-hoc networks and communication protocols. This is considerably different than a traditional computing structure as it uses fixed topology and protocols.An image describing mobile computing architecture is as follows −As seen above, the mobile computing architecture contains various mobile devices such as mobile phones, mobile tablets, laptops etc. These devices are connected to the mobile network which is a part of the internet. All the data is linked to cloud computing data ... Read More

Mass Storage Management

Amit Diwan
Updated on 22-Jun-2020 08:30:46

7K+ Views

Disks are the mainly used mass storage devices. They provide the bulk of secondary storage in operating systems today.Disk StructureEach modern disk contains concentric tracks and each track is divided into multiple sectors. The disks are usually arranged as a one dimensional array of blocks, where blocks are the smallest storage unit.Blocks can also be called as sectors. For each surface of the disk, there is a read/write desk available. The same tracks on all the surfaces is known as a cylinder.Disk SchedulingThere are many disk scheduling algorithms that provide the total head movement for various requests to the disk. ... Read More

Advertisements