
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 2003 Articles for Operating System

329 Views
The add user command in Linux is used to add new user accounts on operating systems that resemble Unix. It is frequently used by system administrators to add new users with predetermined usernames, passwords, and other user-related information System calls Software can communicate with the kernel of the operating system, which manages system resources and provides services to user-level programs, through system calls. System calls are used in C programming to gain access to the features and services provided by the operating system, including file I/O, process management, network connectivity, and more. To interact with the operating system, C programmers ... Read More

262 Views
Introduction Microsoft Windows 10 has become the most recent version available for Microsoft Corporation's prevalent platform. It became available in the year 2015 and has since grown into one of the most popular laptop operating systems. The latest version of Windows has an adaptable user experience, sophisticated safety features, and broad integration with a wide range of both hardware and software machines. Mac OS X Mojave, on the opposing conjunction, is the most recent update to Apple Inc.'s OS. It came out in the year 2018 as well as is accessible only on devices made by Apple. Mojave, the latest ... Read More

2K+ Views
Introduction Temporary documents are data produced by calculating for storing details whereas another operation is being carried out performed. These short-term documents may build up over time and consume valuable disc space. Ubuntu is an established Linux-based operating system that includes a number of methods for cleaning temporary data and optimizing disc space The most common techniques for cleaning temporary data in Ubuntu involve employing the terminal's "clean" and "auto-remove" instructions, employing builtin tasks such as Ubuntu Janitor, and utilizing third-party programs such as Bleach Bit. These are among the simple and effective strategies for freeing up disc space and ... Read More

4K+ Views
Introduction Inter process communication (IPC) was the transfer of information and interaction between multiple processes in an electronic system. Every operation in a tasking process structure runs on its own, as well as communication between them is required if these processes require to exchange of information or coordination of what they are doing IPC is an essential part of contemporary operating systems and can be employed in a variety of applications, which include simple control-line appliances to complicated systems with distributed components. The primary goal of IPC is to make the transmission of knowledge among processes more private and effective. ... Read More

1K+ Views
Introduction Message-based communication (MBC) is a type of communication within a process (IPC) in which multiple procedures share data by sending statements to the other person. The transmission procedure structures an e-mail that included what needs to be passed on and provides it to the process of reception in this form of interpersonal interaction. In turn, the procedure for receiving gets the communication and herbal extracts whatever data is required. Utilizing memo-based interactions in IPC has multiple benefits. One of the primary benefits is that it offers a simple and adaptable way to facilitate interaction between procedures. Asynchronous programming message ... Read More

4K+ Views
Memory protection is a crucial component of operating systems which permits them to avert one method's storage from being utilized by another. Memory safeguarding is vital in contemporary operating systems since it enables various programs to run in tandem lacking tampering with their respective storage space The primary goal of safeguarding memory is to avert an application from accessing RAM without permission. Whenever an approach attempts to use memory that it does not have permission to enter, the computer's operating system will stop and end the process. This hinders the program from obtaining memory that it should not. Memory backup ... Read More

606 Views
What is a Look Aside Buffer? A Look-aside Buffer (LAB) is a type of cache memory that is used in computer systems to store frequently accessed data. The LAB is located between the CPU and the main memory, and it acts as a high-speed buffer to improve system performance. The LAB works by caching a portion of the data from the main memory that is frequently accessed by the CPU. When the CPU requests data from the main memory, the LAB first checks if the data is present in the buffer. If the data is found in the LAB, it ... Read More

842 Views
The Longest Remaining Time First (LRTF) scheduling algorithm is a variant of the Longest Job First (LJF) algorithm and is used by the operating system to schedule incoming processes. In LRTF, the process with the highest remaining execution time is given the highest priority and scheduled to be executed first. Algorithm Create a structure of process containing all necessary fields like AT (Arrival Time), BT(Burst Time), CT(Completion Time), TAT(Turn Around Time), and WT(Waiting Time). Sort the processes according to their Arrival Time (AT). Find the process with the largest Burst Time (BT) and execute it for one unit of ... Read More

1K+ Views
What is Spatial Computing? Spatial computing is a technological field that combines components of physical world and computer science to create a user interface which is more immersive and interactive. Spatial computing involves the tools and processes to record and process the three-dimensional data. The major elements of spatial computing include the advanced technology tools like virtual reality (VR), augmented reality (AR), mixed reality (MR), IoT, artificial intelligence (AI), physical controls, etc. All these components combine the digital systems and physical world together. Fundamentally, spatial computing uses technology that understand and interact with the world in spatial terms. Spatial computing ... Read More

389 Views
What is the Blue Screen of Death? Blue Screen of Death (BSOD) is an error screen which displayed due to driver error or hardware failure in a Windows OS based computer system. It is called BSOD because it is one of the critical system errors at the Windows Kernel level. Hence, the system cannot be recovered from it. The following picture depicts a Blue Screen of Death (BSOD) with a stop error code “CRITICAL_PROCESS_DIED”. Whenever the Blue Screen of Death error occurs, the system stops working and a blue screen is displayed with an error message. The error message ... Read More