SlideShare a Scribd company logo
1 of 28
Download to read offline
Operating System
General
DIT Part 1
Lecture 4
Major Parts of Operating System
• The parts of an operating system all exist in
order to make the different parts of a
computer work together.
• All user software needs to go through the
operating system in order to use any of the
hardware, whether it be as simple as a mouse
or keyboard or as complex as an Internet part.
Copyrights By Tanveer Malik
Kernel
• This has the task of loading the application into memory.
• Making sure they do not interfere with one another and
allowing them to share use of the CPU efficiently.
• The kennel also handles file storage to and from secondary
storage devices such as hard disk and optical drives.
• In other words the kernel handles
• Loading/unloading application from memory.
• Scheduling tasks to run on the CPU.
• Memory management.
• File management.
• Data security.
Copyrights By Tanveer Malik
Copyrights By Tanveer Malik
Device Drivers
• Every piece of hardware that makes up the
computer or connected to it.
• Will have a device driver that allows the
operating system to control and communicate
with it.
• There could be hundreds of devices drivers
pre-installed with the operating system, and
the right one for that particular computer set-
up is loaded on boot-up.
Copyrights By Tanveer Malik
Device Drivers
• The exact detail of which device driver is needed by the
operating system is kept in a file- in window the file is called
is called ''registry' and in Linux the details will be stored as a
number of 'configuration files'.
• Makers of printers, graphic tablets, scanner, digital cameras
and so on, will normally provide device drivers for each
make of operating system.
• A device driver for window xp is different from the device
driver of Linux this is why if u remove an operating system
such as vista from a hard disk and install Linux instead, u
will need to make sure u have all the correct drivers
available for each piece of hardware.
Copyrights By Tanveer Malik
Device Drivers
Copyrights By Tanveer Malik
User interface
(Graphic User Interface)
• This part of operating system that user will see on
screen (via the device driver) and reacting to your
key presses and other inputs.
• The user interface could be the basic command line
interface, as u might find on a server, or it might be a
full blown Graphical User Interface (GUI) such as
perhaps gnome on lunix, window vista, or xp.
• Graphical user interfaces, such as Microsoft Windows
and the one used by the Apple Macintosh, feature the
following basic components:
Copyrights By Tanveer Malik
User interface
(Graphic User Interface)
Copyrights By Tanveer Malik
Pointer
• A symbol that appears on the display screen and
that you move to select objects and commands.
• Usually, the pointer appears as a small angled
arrow.
• Text processing applications, however, use an I-
beam pointer that is shaped like a capital I.
• The pointer is controlled by a pointing device
such as a mouse, trackball, joysticks, touchpad’s,
and light pens.
Copyrights By Tanveer Malik
Copyrights By Tanveer Malik
Icons
• Small pictures that represent commands, files,
or windows.
• By moving the pointer to the icon and
pressing a mouse button, you can execute a
command or convert the icon into a window.
• You can also move the icons around the
display screen as if they were real objects on
your desk.
Copyrights By Tanveer Malik
Icons
Copyrights By Tanveer Malik
Desktop
• The area on the display screen where icons
are grouped is often referred to as the
desktop because the icons are intended to
represent real objects on a real desktop.
Copyrights By Tanveer Malik
Windows
• You can divide the screen into different areas. In
each window, you can run a different program or
display a different information You can move
windows around the display screen, and change
their shape and size at will.
• Menus: Most graphical user interfaces let you
execute commands by selecting a choice from a
menu.
• Folders: Graphical representation of a directory.
Copyrights By Tanveer Malik
Modes
• Modern CPUs support multiple modes of
operation. CPUs with this capability use at least
two modes:
• Protected mode and supervisor mode.
• The supervisor mode is used by the operating
system's kernel for low level tasks that need
unrestricted access to hardware, such as
controlling how memory is written and erased,
and communication with devices like graphics
cards.
Copyrights By Tanveer Malik
Modes
• Protected mode, in contrast, is used for almost
everything else.
• Applications operate within protected mode, and
can only use hardware by communicating with
the kernel, which controls everything in
supervisor mode.
• CPUs might have other modes similar to
protected mode as well, such as the virtual
modes in order to emulate older processor types,
such as 16-bit processors on a 32-bit one, or 32-
bit processors on a 64-bit one
Copyrights By Tanveer Malik
Program execution
• The operating system provides an interface between an
application program and the computer hardware, so that
an application program can interact with the hardware only
by obeying rules and procedures programmed into the
operating system.
• The operating system is also a set of services which simplify
development and execution of application programs.
• Executing an application program involves the creation of a
process by the operating system kernel which assigns
memory space and other resources, establishes a priority
for the process in multi-tasking systems, loads program
binary code into memory, and initiates execution of the
application program which then interacts with the user and
with hardware devices
Copyrights By Tanveer Malik
Copyrights By Tanveer Malik
Interrupts
• Interrupts are central to operating systems, as
they provide an efficient way for the operating
system to interact with and react to its
environment.
• The alternative — having the operating system
"watch" the various sources of input for events
(polling) that require action — can be found in
older systems with very small stacks (50 or 60
bytes) but are unusual in modern systems with
large stacks. Interrupt-based programming is
directly supported by most modern CPUs.
Copyrights By Tanveer Malik
Interrupts
• Interrupts provide a computer with a way of
automatically saving local register contexts,
and running specific code in response to
events.
• Even very basic computers support hardware
interrupts, and allow the programmer to
specify code which may be run when that
event takes place.
Copyrights By Tanveer Malik
Interrupts
• When an interrupt is received, the computer's
hardware automatically suspends whatever
program is currently running, saves its status, and
runs computer code previously associated with
the interrupt; this is analogous to placing a
bookmark in a book in response to a phone call.
• In modern operating systems, interrupts are
handled by the operating system's kernel.
Interrupts may come from either the computer's
hardware or from the running program.
Copyrights By Tanveer Malik
Interrupts
Copyrights By Tanveer Malik
Interrupts
Copyrights By Tanveer Malik
Security
• A computer being secure depends on a
number of technologies working properly.
• A modern operating system provides access to
a number of resources, which are available to
software running on the system, and to
external devices like networks via the kernel.
Copyrights By Tanveer Malik
Security
• The operating system must be capable of
distinguishing between requests which should be
allowed to be processed, and others which
should not be processed. While some systems
may simply distinguish between "privileged" and
"non-privileged", systems commonly have a form
of requester identity, such as a user name.
• To establish identity there may be a process of
authentication.
• Often a username must be quoted, and each
username may have a password
Copyrights By Tanveer Malik
Assignment
– .
Lecture 4

More Related Content

What's hot

Embedded systems
Embedded systemsEmbedded systems
Embedded systemsMinal21
 
Embedded systems
Embedded systemsEmbedded systems
Embedded systemsAshok Raj
 
Operating Systems FYBSC IT UNIT I- Introduction to Operating Systems
Operating Systems FYBSC IT UNIT I- Introduction to Operating SystemsOperating Systems FYBSC IT UNIT I- Introduction to Operating Systems
Operating Systems FYBSC IT UNIT I- Introduction to Operating SystemsArti Parab Academics
 
Introduction to operating system
Introduction to operating systemIntroduction to operating system
Introduction to operating systemAsif ALI
 
Chapter 09 Operating Systems
Chapter 09 Operating SystemsChapter 09 Operating Systems
Chapter 09 Operating Systemsxtin101
 
Operating Systems A-Z
Operating Systems A-ZOperating Systems A-Z
Operating Systems A-ZRavinJ
 
Introduction to embedded system
Introduction to embedded systemIntroduction to embedded system
Introduction to embedded systemajitsaraf123
 
A presentation on system software
A presentation on system software A presentation on system software
A presentation on system software Ankit Sangwan
 
Types of Operating System
Types of Operating SystemTypes of Operating System
Types of Operating SystemSayam Asjad
 
Operating Systems 1 (3/12) - Architectures
Operating Systems 1 (3/12) - ArchitecturesOperating Systems 1 (3/12) - Architectures
Operating Systems 1 (3/12) - ArchitecturesPeter Tröger
 
Operating Systems As a Product
Operating Systems As a ProductOperating Systems As a Product
Operating Systems As a ProductHarshit Srivastava
 

What's hot (19)

Embedded systems
Embedded systemsEmbedded systems
Embedded systems
 
Operating systems
Operating systems Operating systems
Operating systems
 
Embedded systems
Embedded systemsEmbedded systems
Embedded systems
 
Operating Systems FYBSC IT UNIT I- Introduction to Operating Systems
Operating Systems FYBSC IT UNIT I- Introduction to Operating SystemsOperating Systems FYBSC IT UNIT I- Introduction to Operating Systems
Operating Systems FYBSC IT UNIT I- Introduction to Operating Systems
 
Operating system
Operating system Operating system
Operating system
 
Week 6
Week 6Week 6
Week 6
 
Introduction to operating system
Introduction to operating systemIntroduction to operating system
Introduction to operating system
 
Embedded systems
Embedded systems Embedded systems
Embedded systems
 
Chapter 09 Operating Systems
Chapter 09 Operating SystemsChapter 09 Operating Systems
Chapter 09 Operating Systems
 
Operating Systems A-Z
Operating Systems A-ZOperating Systems A-Z
Operating Systems A-Z
 
operating system
operating systemoperating system
operating system
 
Introduction to embedded system
Introduction to embedded systemIntroduction to embedded system
Introduction to embedded system
 
A presentation on system software
A presentation on system software A presentation on system software
A presentation on system software
 
Types of Operating System
Types of Operating SystemTypes of Operating System
Types of Operating System
 
Operating Systems 1 (3/12) - Architectures
Operating Systems 1 (3/12) - ArchitecturesOperating Systems 1 (3/12) - Architectures
Operating Systems 1 (3/12) - Architectures
 
Embedded systems
Embedded systemsEmbedded systems
Embedded systems
 
Operating Systems As a Product
Operating Systems As a ProductOperating Systems As a Product
Operating Systems As a Product
 
K04 software
K04 softwareK04 software
K04 software
 
Ch 2
Ch 2Ch 2
Ch 2
 

Similar to Lecture 4

Chapter one_oS.ppt
Chapter one_oS.pptChapter one_oS.ppt
Chapter one_oS.pptmiki304759
 
Foundation of information system - Software
Foundation of information system - SoftwareFoundation of information system - Software
Foundation of information system - Softwarerh8g7p44p7
 
HARDWARE AND SOFTWARE.pptx
HARDWARE AND SOFTWARE.pptxHARDWARE AND SOFTWARE.pptx
HARDWARE AND SOFTWARE.pptxKhushiSinghal52
 
operating systems
operating systemsoperating systems
operating systemschukey
 
operating systems 6
operating systems 6operating systems 6
operating systems 6chukey
 
operating systems
operating systemsoperating systems
operating systemschukey
 
Chapter 05 os dan utility program csc & tts
Chapter 05 os dan utility program csc & ttsChapter 05 os dan utility program csc & tts
Chapter 05 os dan utility program csc & ttsHisyam Rosly
 
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdfConnecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdfEYOHAICTMEDIA
 
avicHomphs-150226100804-conversion-gate01 (1)(1).pdf
avicHomphs-150226100804-conversion-gate01 (1)(1).pdfavicHomphs-150226100804-conversion-gate01 (1)(1).pdf
avicHomphs-150226100804-conversion-gate01 (1)(1).pdfRajDhrub
 
computer hardware and software
computer hardware and softwarecomputer hardware and software
computer hardware and softwareavinash gupta
 
Lecture 4.pptx
Lecture 4.pptxLecture 4.pptx
Lecture 4.pptxsara591850
 
pre phd class 1.pptx
pre phd class 1.pptxpre phd class 1.pptx
pre phd class 1.pptxRbiGradeB
 

Similar to Lecture 4 (20)

OPERATING SYSTEM
OPERATING SYSTEMOPERATING SYSTEM
OPERATING SYSTEM
 
Fundamentals of Computing Chapter 7
Fundamentals of Computing Chapter 7Fundamentals of Computing Chapter 7
Fundamentals of Computing Chapter 7
 
Chapter one_oS.ppt
Chapter one_oS.pptChapter one_oS.ppt
Chapter one_oS.ppt
 
Foundation of information system - Software
Foundation of information system - SoftwareFoundation of information system - Software
Foundation of information system - Software
 
HARDWARE AND SOFTWARE.pptx
HARDWARE AND SOFTWARE.pptxHARDWARE AND SOFTWARE.pptx
HARDWARE AND SOFTWARE.pptx
 
operating systems
operating systemsoperating systems
operating systems
 
Device Drivers
Device DriversDevice Drivers
Device Drivers
 
Week 01.pdf
Week 01.pdfWeek 01.pdf
Week 01.pdf
 
operating systems 6
operating systems 6operating systems 6
operating systems 6
 
operating systems
operating systemsoperating systems
operating systems
 
System structure
System structureSystem structure
System structure
 
Chapter 05 os dan utility program csc & tts
Chapter 05 os dan utility program csc & ttsChapter 05 os dan utility program csc & tts
Chapter 05 os dan utility program csc & tts
 
Types of software
Types of softwareTypes of software
Types of software
 
OPERATING SYSTEM
OPERATING SYSTEMOPERATING SYSTEM
OPERATING SYSTEM
 
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdfConnecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
 
systems_software
systems_softwaresystems_software
systems_software
 
avicHomphs-150226100804-conversion-gate01 (1)(1).pdf
avicHomphs-150226100804-conversion-gate01 (1)(1).pdfavicHomphs-150226100804-conversion-gate01 (1)(1).pdf
avicHomphs-150226100804-conversion-gate01 (1)(1).pdf
 
computer hardware and software
computer hardware and softwarecomputer hardware and software
computer hardware and software
 
Lecture 4.pptx
Lecture 4.pptxLecture 4.pptx
Lecture 4.pptx
 
pre phd class 1.pptx
pre phd class 1.pptxpre phd class 1.pptx
pre phd class 1.pptx
 

More from Tanveer Malik

Lecture 12 security policy
Lecture 12 security policyLecture 12 security policy
Lecture 12 security policyTanveer Malik
 
Lecture 11 active directory
Lecture 11 active directoryLecture 11 active directory
Lecture 11 active directoryTanveer Malik
 
Lecture 10 i pv4 & ipv6
Lecture 10 i pv4 & ipv6Lecture 10 i pv4 & ipv6
Lecture 10 i pv4 & ipv6Tanveer Malik
 
Lecture 9 file system
Lecture 9 file systemLecture 9 file system
Lecture 9 file systemTanveer Malik
 
Lecture 8 disk management
Lecture 8 disk managementLecture 8 disk management
Lecture 8 disk managementTanveer Malik
 
Lecture 6 internet services in network
Lecture 6 internet services in networkLecture 6 internet services in network
Lecture 6 internet services in networkTanveer Malik
 
Lecture 5 software to control network
Lecture 5 software to control networkLecture 5 software to control network
Lecture 5 software to control networkTanveer Malik
 
Lecture 4 sharing of resources on network
Lecture 4 sharing of resources on networkLecture 4 sharing of resources on network
Lecture 4 sharing of resources on networkTanveer Malik
 
Lecture 3 transmission media
Lecture 3 transmission mediaLecture 3 transmission media
Lecture 3 transmission mediaTanveer Malik
 
Lecture 2 protocol details
Lecture 2 protocol detailsLecture 2 protocol details
Lecture 2 protocol detailsTanveer Malik
 
Lecture 1 networking types roles
Lecture 1 networking types rolesLecture 1 networking types roles
Lecture 1 networking types rolesTanveer Malik
 

More from Tanveer Malik (20)

Lecture 12 security policy
Lecture 12 security policyLecture 12 security policy
Lecture 12 security policy
 
Lecture 11 active directory
Lecture 11 active directoryLecture 11 active directory
Lecture 11 active directory
 
Lecture 10 i pv4 & ipv6
Lecture 10 i pv4 & ipv6Lecture 10 i pv4 & ipv6
Lecture 10 i pv4 & ipv6
 
Lecture 9 file system
Lecture 9 file systemLecture 9 file system
Lecture 9 file system
 
Lecture 8 disk management
Lecture 8 disk managementLecture 8 disk management
Lecture 8 disk management
 
Lecture 6 internet services in network
Lecture 6 internet services in networkLecture 6 internet services in network
Lecture 6 internet services in network
 
Lecture 5 software to control network
Lecture 5 software to control networkLecture 5 software to control network
Lecture 5 software to control network
 
Lecture 4 sharing of resources on network
Lecture 4 sharing of resources on networkLecture 4 sharing of resources on network
Lecture 4 sharing of resources on network
 
Lecture 3 transmission media
Lecture 3 transmission mediaLecture 3 transmission media
Lecture 3 transmission media
 
Lecture 2 protocol details
Lecture 2 protocol detailsLecture 2 protocol details
Lecture 2 protocol details
 
Lecture 1 networking types roles
Lecture 1 networking types rolesLecture 1 networking types roles
Lecture 1 networking types roles
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Lecture 10
Lecture 10Lecture 10
Lecture 10
 
Lecture 9
Lecture 9Lecture 9
Lecture 9
 
Lecture 8
Lecture 8Lecture 8
Lecture 8
 
Lecture 7
Lecture 7Lecture 7
Lecture 7
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Lecture 4
Lecture 4Lecture 4
Lecture 4
 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

Lecture 4

  • 2. Major Parts of Operating System • The parts of an operating system all exist in order to make the different parts of a computer work together. • All user software needs to go through the operating system in order to use any of the hardware, whether it be as simple as a mouse or keyboard or as complex as an Internet part. Copyrights By Tanveer Malik
  • 3. Kernel • This has the task of loading the application into memory. • Making sure they do not interfere with one another and allowing them to share use of the CPU efficiently. • The kennel also handles file storage to and from secondary storage devices such as hard disk and optical drives. • In other words the kernel handles • Loading/unloading application from memory. • Scheduling tasks to run on the CPU. • Memory management. • File management. • Data security. Copyrights By Tanveer Malik
  • 5. Device Drivers • Every piece of hardware that makes up the computer or connected to it. • Will have a device driver that allows the operating system to control and communicate with it. • There could be hundreds of devices drivers pre-installed with the operating system, and the right one for that particular computer set- up is loaded on boot-up. Copyrights By Tanveer Malik
  • 6. Device Drivers • The exact detail of which device driver is needed by the operating system is kept in a file- in window the file is called is called ''registry' and in Linux the details will be stored as a number of 'configuration files'. • Makers of printers, graphic tablets, scanner, digital cameras and so on, will normally provide device drivers for each make of operating system. • A device driver for window xp is different from the device driver of Linux this is why if u remove an operating system such as vista from a hard disk and install Linux instead, u will need to make sure u have all the correct drivers available for each piece of hardware. Copyrights By Tanveer Malik
  • 8. User interface (Graphic User Interface) • This part of operating system that user will see on screen (via the device driver) and reacting to your key presses and other inputs. • The user interface could be the basic command line interface, as u might find on a server, or it might be a full blown Graphical User Interface (GUI) such as perhaps gnome on lunix, window vista, or xp. • Graphical user interfaces, such as Microsoft Windows and the one used by the Apple Macintosh, feature the following basic components: Copyrights By Tanveer Malik
  • 9. User interface (Graphic User Interface) Copyrights By Tanveer Malik
  • 10. Pointer • A symbol that appears on the display screen and that you move to select objects and commands. • Usually, the pointer appears as a small angled arrow. • Text processing applications, however, use an I- beam pointer that is shaped like a capital I. • The pointer is controlled by a pointing device such as a mouse, trackball, joysticks, touchpad’s, and light pens. Copyrights By Tanveer Malik
  • 12. Icons • Small pictures that represent commands, files, or windows. • By moving the pointer to the icon and pressing a mouse button, you can execute a command or convert the icon into a window. • You can also move the icons around the display screen as if they were real objects on your desk. Copyrights By Tanveer Malik
  • 14. Desktop • The area on the display screen where icons are grouped is often referred to as the desktop because the icons are intended to represent real objects on a real desktop. Copyrights By Tanveer Malik
  • 15. Windows • You can divide the screen into different areas. In each window, you can run a different program or display a different information You can move windows around the display screen, and change their shape and size at will. • Menus: Most graphical user interfaces let you execute commands by selecting a choice from a menu. • Folders: Graphical representation of a directory. Copyrights By Tanveer Malik
  • 16. Modes • Modern CPUs support multiple modes of operation. CPUs with this capability use at least two modes: • Protected mode and supervisor mode. • The supervisor mode is used by the operating system's kernel for low level tasks that need unrestricted access to hardware, such as controlling how memory is written and erased, and communication with devices like graphics cards. Copyrights By Tanveer Malik
  • 17. Modes • Protected mode, in contrast, is used for almost everything else. • Applications operate within protected mode, and can only use hardware by communicating with the kernel, which controls everything in supervisor mode. • CPUs might have other modes similar to protected mode as well, such as the virtual modes in order to emulate older processor types, such as 16-bit processors on a 32-bit one, or 32- bit processors on a 64-bit one Copyrights By Tanveer Malik
  • 18. Program execution • The operating system provides an interface between an application program and the computer hardware, so that an application program can interact with the hardware only by obeying rules and procedures programmed into the operating system. • The operating system is also a set of services which simplify development and execution of application programs. • Executing an application program involves the creation of a process by the operating system kernel which assigns memory space and other resources, establishes a priority for the process in multi-tasking systems, loads program binary code into memory, and initiates execution of the application program which then interacts with the user and with hardware devices Copyrights By Tanveer Malik
  • 20. Interrupts • Interrupts are central to operating systems, as they provide an efficient way for the operating system to interact with and react to its environment. • The alternative — having the operating system "watch" the various sources of input for events (polling) that require action — can be found in older systems with very small stacks (50 or 60 bytes) but are unusual in modern systems with large stacks. Interrupt-based programming is directly supported by most modern CPUs. Copyrights By Tanveer Malik
  • 21. Interrupts • Interrupts provide a computer with a way of automatically saving local register contexts, and running specific code in response to events. • Even very basic computers support hardware interrupts, and allow the programmer to specify code which may be run when that event takes place. Copyrights By Tanveer Malik
  • 22. Interrupts • When an interrupt is received, the computer's hardware automatically suspends whatever program is currently running, saves its status, and runs computer code previously associated with the interrupt; this is analogous to placing a bookmark in a book in response to a phone call. • In modern operating systems, interrupts are handled by the operating system's kernel. Interrupts may come from either the computer's hardware or from the running program. Copyrights By Tanveer Malik
  • 25. Security • A computer being secure depends on a number of technologies working properly. • A modern operating system provides access to a number of resources, which are available to software running on the system, and to external devices like networks via the kernel. Copyrights By Tanveer Malik
  • 26. Security • The operating system must be capable of distinguishing between requests which should be allowed to be processed, and others which should not be processed. While some systems may simply distinguish between "privileged" and "non-privileged", systems commonly have a form of requester identity, such as a user name. • To establish identity there may be a process of authentication. • Often a username must be quoted, and each username may have a password Copyrights By Tanveer Malik