Found 173 Articles for Windows

Counting Semaphore in Operating System

Arnab Chakraborty
Updated on 04-Apr-2023 15:08:18

11K+ Views

Introduction A semaphore is a synchronization mechanism used in operating systems to manage access to shared resources by multiple processes or threads. There are two semaphores − Binary Semaphore − A synchronization tool that has two states (0 or 1) and is used to signal the availability of a resource or protect critical sections of code. Counting Semaphore − Counting semaphore is a synchronization tool that is used in operating systems to control the access to shared resources. It is a type of semaphore that allows more than two processes to access the shared resource at the ... Read More

Consistency Semantics for File Sharing

Arnab Chakraborty
Updated on 04-Apr-2023 15:01:37

2K+ Views

File-sharing services have become an integral part of modern-day communication and collaboration. These services allow users to share files with others, enabling them to work together on projects and exchange information. However, with multiple users accessing and updating the same file simultaneously, the problem of data consistency arises. Data consistency refers to the correctness and reliability of data, ensuring that all users see the same view of the data at all times. Consistency semantics is a set of rules that define how data is accessed and updated by different users in a distributed system. It is important in file sharing ... Read More

Concurrency in Operating System

Arnab Chakraborty
Updated on 04-Apr-2023 14:53:46

20K+ Views

Introduction Concurrency in operating systems refers to the ability of an operating system to handle multiple tasks or processes at the same time. With the increasing demand for high performance computing, concurrency has become a critical aspect of modern computing systems. Operating systems that support concurrency can execute multiple tasks simultaneously, leading to better resource utilization, improved responsiveness, and enhanced user experience. Concurrency is essential in modern operating systems due to the increasing demand for multitasking, real-time processing, and parallel computing. It is used in a wide range of applications, including web servers, databases, scientific simulations, and multimedia processing. However, ... Read More

Concept of Address Split in OS

Arnab Chakraborty
Updated on 04-Apr-2023 14:45:12

594 Views

Introduction Address splitting is a technique used in operating systems to manage memory resources efficiently. It involves dividing the memory space into smaller logical segments, assigning unique identifiers to each segment, and allocating memory resources dynamically to processes as required. Address splitting is essential in modern operating systems as it enables improved memory utilization, increased system security, and better performance. The technique allows operating systems to manage memory resources efficiently, ensuring that each process has access to the memory resources it needs to execute efficiently. Memory Segmentation Memory segmentation is a technique used in operating systems to manage memory resources ... Read More

Web Operating System

Sumbul Gouri
Updated on 23-Mar-2023 17:17:44

3K+ Views

The web operating system is a user interface based on the internet that allows users to access computers locally and through the internet. An operating system is a software that acts as an interface between computer applications and hardware. Web operating system does not directly interact with computer hardware, it is a dummy operating system. Instead, it depends on a traditional operating system for its work. It acts as an interface for systems that are distributed, for instance, distributed cloud computing systems like a cloud. Web OS are created using AJAX and FLASH. AJAX (Asynchronous javascript And XML) ... Read More

Volatile data Collection from Window System

Sumbul Gouri
Updated on 23-Mar-2023 17:16:48

2K+ Views

Volatile data is not permanent data and this data can be lost when a computer loses its power connection or is switched off. It is usually stored in cache memory or RAM. Random access memory(RAM) is volatile memory used to hold instructions and data of currently running programs. This memory loses integrity after loss of power. Volatile memory is also referred to as temporary memory. It is the memory hardware that fetches or stores data at a high speed. RAM and cache memory are some common examples of volatile memory. Volatile information can be collected remotely or onsite. If ... Read More

Difference between Virtual Memory and Job Pool

Sumbul Gouri
Updated on 23-Mar-2023 17:15:40

596 Views

Introduction Virtual memory − Virtual memory is a mechanism used to manage memory using hardware and software. It is a part of the secondary storage that gives the user an illusion that it is a part of main memory. It helps in running multiple applications with low main memory and increases the degree of multiprogramming in systems. Job pool −Job pool is a type of data structure in a batch processing system where various jobs are queued to be implemented when all the resources are made available. When a job is executed, it is fully present in memory. Job pools ... Read More

Views of the Operating System

Sumbul Gouri
Updated on 23-Mar-2023 17:08:29

18K+ Views

The operating system can be observed from the point of view of the user or the system. This is known as the user view and system view respectively. An operating system is a framework that enables user application programs to interact with system hardware. The operating system does not perform any functions on its own, but it provides an atmosphere in which various programs and apps can do useful work. The operating system may be observed from the point of view of the user or the system, and it is known as the user view and the system view. In ... Read More

C-LOOK vs C-SCAN Disk Scheduling Algorithm

Manish Kumar Saini
Updated on 13-Mar-2023 12:39:22

4K+ Views

In computer systems, disk scheduling is required for smooth operation of the system. Disk scheduling is done by the operating system of the computer, in which it schedules I/O requests arriving on the disk. Therefore, disk scheduling is also called as I/O scheduling. In computer systems, disk scheduling or I/O scheduling is important because there could be multiple I/O requests received from the different processes at the same time, but the disk controller can serve only one request at once, and all other requests have to wait for next schedule. In operating systems, several disk scheduling algorithms used such as ... Read More

C-LOOK Disk Scheduling Algorithm

Manish Kumar Saini
Updated on 13-Mar-2023 12:36:28

3K+ Views

What is C-LOOK Disc Scheduling Algorithm? In operating systems, C-LOOK or Circular-LOOK is a type of disk scheduling algorithm which is used to increase the efficiency of accessing data on a disk. C-LOOK algorithm is basically an improved version of the LOOK disc scheduling algorithm. The main purpose of designing the C-LOOK algorithm is to reduce the seek time and improve the throughput of the system. The C-LOOK algorithm is a type of circular algorithm because it treats the disc as if it were circular. That means it has the last request in each direction being adjacent to the first ... Read More

Previous 1 ... 6 7 8 9 10 ... 18 Next
Advertisements