Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Operating System


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Operating System

  1. 1. It is a set of program that provide an interface between hardware, software and users and manages all the resources and provide platform where user can execute all application/program easily.
  2. 2. Device configuration Controls peripheral devices connected to the computer File management Operating System Transfers files between main memory and secondary storage, manages file folders, backup of file ,recovery of file, protection of file. Memory management Allocation and deallocation of memory space. Decide which process load onto memory when memory Space become available. Interface platform Provide the interface b/w hardware, software and users.
  3. 3.  Network Operating System  UNIX / Linux / MS Windows2000 Server  Desktop Operating System  MS Windows 9X/Me / Mac OS / DOS  Mobile Operating System  Palm OS and Pocket PC
  4. 4.  Batch processing  Real time processing  Time sharing processing
  5. 5. •Immediate response is needed. •For example anti-missile defense system airplane landing control system interrupt error in computer system
  6. 6.  efficient  time spent to execute its programs should be short  small in size  memory occupied should be as small as possible  reliable
  7. 7.      multi-tasking multi-programming parallel processing buffering spooling
  8. 8. Without multiprocessing with multiprocessing Job 4 Job 3 Job 4 Job 3 Time Job 1 CPU 1 Job 2 time Job 1 Job 2 CPU 2 CPU 1
  9. 9. Kernel: Core components of the OS Process scheduler  Determines when and for long each process executes  Memory manager  Determines when and how memory is allocated to processes  Decides what to do when main memory is full  File system  Organizes named collections of data in persistent storage  Networking  Enables processes to communicate with one another  
  10. 10. There are various types of intruders Naïve Users – These are kind of people who have a long nose and have nothing to do. They know less but keep on checking out places for other people’s data (Mails etc.). Skilled Users – These are people like inquisitive students who are more or less skilled and try out ways to access things they are not meant to just for fun or to learn. Purposeful Intruders – These people do nasty jobs on purpose – e.g. Hacking the Military Data of enemy nation, Hacking confidential data of the rival company, etc.
  11. 11.    Viruses Trojans worms
  12. 12. Passwords – Good passwords – Mixture of numbers, letters of different case is a good security measure. Passwords ideally should not carry any personal information. These steps make it difficult to guess passwords. Periodically changing passwords – Some systems allow us to specify passwords and specify some period within which the password will have to be changed. Recursive Passwords – This is a technology in which each time a password is used, it is re-encrypted or changed automatically. The user is given a list of passwords for a period of time. If that list is secured, the user’s data is secured.
  13. 13.     Operating system book by galvin