
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 2003 Articles for Operating System

3K+ Views
An operating system (OS) is a piece of software that controls and manages the hardware and software resources of a computer while also giving users a simple way to interact with the system. By serving as a conduit between the user and the computer hardware, it makes it easier for different system parts to coordinate and communicate with one another. In this article, we will explore different operating systems along with their latest versions and features as well. Top Operating Systems Today's systems use a variety of operating systems. Here are a few of them − macOS Microsoft Windows ... Read More

4K+ Views
Introduction Linux, the popular open-source operating system, comes with a set of useful tools and commands that you can leverage for everyday tasks. One such task is file compression, and Linux provides various methods to zip or compress files and directories. This guide will walk you through how to zip a file in Linux using commands like 'gzip', 'zip', and 'tar'. Using the 'gzip' Command 'gzip' (GNU zip) is a widely-used command for file compression in Linux. Here is an example of how to use it − gzip filename.txt This command will compress the file 'filename.txt' and rename it ... Read More

228 Views
Awk is a powerful text-processing language named after its three original authors: Alfred Aho, Peter Weinberger, and Brian Kernighan. It's a versatile language primarily used for pattern scanning and processing. Awk is a staple of Unix scripting and is commonly used for tasks like data extraction, reporting, and data transformation. Awk scripts are quick to write and perform well for small to medium-sized tasks. In this article, we will introduce you to the basics of writing scripts using the Awk programming language. Basic Syntax An Awk program consists of a sequence of pattern-action pairs, written as − pattern { action ... Read More

1K+ Views
Introduction The disc scheduling method N-Step-SCAN (also called N-Step-LOOK) determines the sequence whereby disc requests for input/output are handled. It is a development for the SCAN (Elevator) method, which functions by moving the disc arm in a particular direction and responding to demands there as long as it receives no more inquiries or requests from that guidance, at which point it switches directions. The N-Step-SCAN algorithm adds an option, N, that specifies how many requests must be handled in a particular direction beforehand transforming. N-Step-SCAN support N demands in a particular direction, irrespective of whether or not there are still ... Read More

4K+ Views
Operating systems use the Not Recently Used (NRU) page replacement algorithm as a fundamental page replacement tactic to control memory. Its major goal is to locate and remove pages from memory that haven't been accessed in a while. In this article, we will be discussing the NRU page replacement algorithm, the classes in it, the steps involved, the use cases, and also its benefits. The NRU algorithm Classes Based on their usage or reference bit, pages are divided into four classes by the NRU algorithm − Class 0 − Since they were loaded into memory, pages cannot be referenced (accessed) ... Read More

1K+ Views
Operating systems assign memory to processes using the memory management strategy known as non-contiguous allocation. This method divides memory into fixed-size blocks or partitions, and each partition can be assigned to a process according to its needs in terms of size. The non-contiguous allocation permits a process's memory to be dispersed among several regions in the main memory, in contrast to the contiguous allocation, where a process occupies a single block of memory. When working with processes of varying sizes, this strategy offers greater flexibility and effective memory utilization. In this article, we will be exploring what is Non-Contiguous Memory ... Read More

744 Views
Operating systems use the scheduling algorithm non-preemptive priority scheduling to choose the sequence in which processes are carried out. Each process is given a priority value based on specific criteria, and the procedure with the highest priority is carried out first. In this article, we will be discussing Non-Preemptive Priority, the much-needed Process of Prioritization with some examples, and some strategies to prevent starvation in terms of Non-Preemptive Priority. What is Non-Preemptive Priority? A process in non-preemptive priority scheduling keeps running until it is finished or voluntarily enters a waiting state. A higher-priority process is not halted by the scheduler ... Read More

8K+ Views
Introduction Named pipes, also referred to as FIFOs (First In, First Out), constitute essential IPC systems in software systems. They offer a quick and effective method for successfully transferring information between processes. Specialized kinds of files known as named pipes serve as a means for interaction among unconnected procedures that operate on an identical structure as well as on separate ones. First-in, first-out (FIFO) named pipes ensure that information composed to the line by a single procedure is read from the pipe by another course in the identical order. Therefore, They are particularly advantageous when processes must communicate independently without ... Read More

880 Views
Introduction A traditional approach to solving the critical section issue in programming simultaneously for both procedures is Peterson's algorithm. But since you said "N" processes, I presume you mean an altered Peterson's method that can manage over two procedures. Mutual exclusion is guaranteed by the initial Peterson's method for two distinct processes, yet it can't be immediately expanded to support N methods. Lamport's bakery algorithm, for example, is a deviation and an extra period of Peterson's algorithm which may be applied to N processes. The N process Peterson Algorithm Peterson's algorithm which can cope with N processes is called ... Read More

6K+ Views
Introduction To avoid information loss and discrepancies, it is essential to make certain that discussed assets are obtained in an organized way when using concurrent programming methods, in which numerous threads or methods operate simultaneously. Mutual exclusion, which ensures that just a single string or procedure has access to a crucial area or resource that everyone shares at any point in time, is how this is accomplished. In this article, we will be talking about Mutual Exclusion in Synchronization, its various techniques, use cases, and example implementation through Python. What is Mutual Exclusion in Synchronization? A key component of synchronizing ... Read More