SlideShare a Scribd company logo
1 of 31
Page 1
CHAPTER 5
(Operating System)
Page 2
• OS is an example of
system software –
software that controls
the system’s hardware,
and which interacts
with the user and
application software.
• In short, the operating
system is the
computer’s master
control program.
OPERATING SYSTEM
Page 3
THE OPERATING SYSTEM PERFORMS
THE FOLLOWING FUNCTIONS
• Provides the instructions to display the on-screen
elements with which you interact. Collectively, these
elements are known as the user interface.
• Loads programs (such as word processing and
spreadsheet programs) into the computer’s memory
so that you can use them.
• Coordinates how programs work with the CPU, RAM,
Keyboard, mouse, printer, and other hardware, as
well as with other software.
• Manages the way information is stored on the
received from disks.
Page 4
OPERATING SYSTEMS CYCLE
Page 5
RUNNING PROGRAMS
• The operating system
provides a consistent
interface between those
programs and other
computer resources such
as memory, a printer, or
another program.
• Programmers write
computer programs with
built – in instructions –
called SYSTEM CALLS – that
request services from the
operating system.
Page 6
Page 7
EXAMPLES OF
OPERATING SYSTEM
Page 8
MICROSOFT WINDOWS
• Microsoft Windows is a
family of proprietary
operating systems most
commonly used on
personal computers.
• It is the most common
family of operating
systems for the
personal computer,
with about 90% of the
market share
Page 9
• Ken Thompson wrote B,
mainly based on BCPL,
which he used to write
Unix, based on his
experience in the MULTICS
project.
• B was replaced by C, and
Unix developed into a
large, complex family of
inter-related operating
systems which have been
influential in every
modern operating system
UNIX / LINUX
Page 10
BSD / DESCENDANTS
• A subgroup of the Unix
family is the
Berkeley Software Distribution
family, which includes
FreeBSD, NetBSD, and
OpenBSD.
• These operating systems
are most commonly
found on webservers,
although they can also
function as a personal
computer OS.
Page 11
MAC / OS
• Mac OS X is a line of
partially proprietary
graphical operating
systems developed,
marketed, and sold
by Apple Inc., the
latest of which is pre-
loaded on all
currently shipping
Macintosh computers.
Page 12
CONTINUATION:
• Mac OS X is the successor to the original
Mac OS, which had been Apple's primary
operating system since 1984.
• Unlike its predecessor, Mac OS X is a UNIX
operating system built on technology that
had been developed at NeXT through the
second half of the 1980s and up until Apple
purchased the company in early 1997
Page 13
PLAN 9
• Programmers at
Bell Labs went on to
develop Plan 9 and
Inferno, which were
engineered for
modern distributed
environments.
Page 14
• Plan 9 was designed from the start to be a
networked operating system, and had
graphics built-in, unlike Unix, which added
these features to the design later.
• It is currently released under the
Lucent Public License. Inferno was sold to
Vita Nuova Holdings and has been released
under a GPL/MIT license.
CONTINUATION:
Page 15
LINUX AND GNU
• Linux is the generic name
for a UNIX like operating
system that can be used on
a wide range of devices
from supercomputers to
wristwatches. The Linux
kernel is released under
an open source license, so
anyone can read and
modify its code. It has
been modified to run on a
large variety of electronics
Page 16
GOOGLE CHROME OS
• Chrome is an O.S. based on
the Linux kernel and
designed by Google. Chrome
targets computer users that
spend most of their time on
the internet—it is technically
only a web browser with no
other applications, and relies
on internet applications used
in the web browser to
accomplish tasks such as
word processing and media
viewing.
Page 17
COMPONENTS OF AN
OPERATING SYSTEM
Page 18
USER INTERFACE
• Computer receives some
sort of human input
needs a user interface,
which allows a person
to interact with the
computer. While devices
like keyboards, mice
and touch screens make
up the hardware end of
this task, the user
interface makes up the
software for it.
Page 19
CONTINUATION:
• The two most common forms of a user
interface have historically been the
Command-line interface, where computer
commands are typed out line-by-line, and
the Graphical user interface, where a visual
environment (most commonly with windows,
buttons, and icons) is
Page 20
GRAPHICAL USER INTERFACES
• Most of the modern
computer systems support
graphical user interfaces
(GUI), and often include
them.
• In some computer
systems, such as the
original implementations
of Microsoft Windows and
the Mac OS, the GUI is
integrated into the kernel
.
Page 21
THE KERNEL
• With the aid of the
firmware and
device drivers, the
operating system
provides the most
basic level of
control over all of
the computer's
hardware devices.
Page 22
CONTINUATION:
• It manages memory access for programs in
the RAM, it determines which programs get
access to which hardware resources, it sets
up or resets the CPU's operating states for
optimal operation at all times, and it
organizes the data for long-term
non-volatile storage with file systems on such
media as disks, tapes, flash memory, etc.
Page 23
PROGRAM EXECUTION
• The operating system acts as an interface between
an application and the hardware. The user
interacts with the hardware from "the other
side".
• The operating system is a set of services which
simplifies development of applications. Executing
a program involves the creation of a process by
the operating system. The kernel creates a
process by assigning memory and other
resources, establishing a priority for the process
(in multi-tasking systems), loading program code
into memory, and executing the program.
Page 24
INTERRUPTS
• Interrupts are central to operating systems,
as they provide an efficient way for the
operating system to interact with and react
to its environment.
• Interrupt-based programming is directly
supported by most modern CPUs. Interrupts
provide a computer with a way of
automatically saving local register contexts,
and running specific code in response to
events
Page 25
MODES
• Modern CPUs support
multiple modes of
operation.
• CPUs with this
capability use at least
two modes: protected
mode and supervisor
mode.
Page 26
CONTINUATION:
• The supervisor mode is used by the
operating system's kernel for low level tasks
that need unrestricted access to hardware,
such as controlling how memory is written
and erased, and communication with
devices like graphics cards.
• Protected mode, in contrast, is used for
almost everything else.
Page 27
MEMORY MANAGEMENT
• System of memory management is almost never
seen anymore, since programs often contain
bugs which can cause them to exceed their
allocated memory.
• If a program fails it may cause memory used by
one or more other programs to be affected or
overwritten. Malicious programs, or viruses may
purposefully alter another program's memory or
may affect the operation of the operating system
itself. With cooperative memory management it
takes only one misbehaved program to crash the
system.
Page 28
VIRTUAL MEMORY
• The use of virtual
memory addressing
(such as paging or
segmentation) means
that the kernel can
choose what memory
each program may use
at any given time,
allowing the operating
system to use the same
memory locations for
multiple tasks.
Page 29
DEVICE DRIVER
• A device driver is a specific type of computer
software developed to allow interaction with
hardware devices.
• Typically this constitutes an interface for
communicating with the device, through the
specific computer bus or communications
subsystem that the hardware is connected to,
providing commands to and/or receiving
data from the device, and on the other end,
the requisite interfaces to the operating
system and software applications.
Page 30
NETWORKING
• Currently most operating systems support a variety of
networking protocols, hardware, and applications
for using them.
• This means that computers running dissimilar
operating systems can participate in a common
network for sharing resources such as computing,
files, printers, and scanners using either wired or
wireless connections. Networks can essentially allow
a computer's operating system to access the
resources of a remote computer to support the same
functions as it could if those resources were
connected directly to the local computer.
Page 31
SECURITY
• A computer being secure depends on a number of
technologies working properly. A modern operating
system provides access to a number of resources,
which are available to software running on the
system, and to external devices like networks via the
kernel.
• External security involves a request from outside the
computer, such as a login at a connected console or
some kind of network connection. External requests
are often passed through device drivers to the
operating system's kernel, where they can be passed
onto applications, or carried out directly.

More Related Content

What's hot

computer software
computer softwarecomputer software
computer softwareAhsan Khan
 
COMPUTER SYSTEM AND ITS COMPONENTS
COMPUTER SYSTEM AND ITS COMPONENTSCOMPUTER SYSTEM AND ITS COMPONENTS
COMPUTER SYSTEM AND ITS COMPONENTSSHIVALI NEGI
 
Application software
Application softwareApplication software
Application softwareshalivale
 
Basics of the Computer System
Basics of the Computer SystemBasics of the Computer System
Basics of the Computer SystemAhsan Rahim
 
Computer software
Computer softwareComputer software
Computer softwareManeesh Singh
 
Types of computer
Types of computerTypes of computer
Types of computerFrya Lora
 
Introduction To Computer 1
Introduction To Computer  1Introduction To Computer  1
Introduction To Computer 1Amit Chandra
 
Computer hardware
Computer hardwareComputer hardware
Computer hardwareMuhammad Anees
 
Chapter 1 Introduction To Computers
Chapter 1 Introduction To ComputersChapter 1 Introduction To Computers
Chapter 1 Introduction To Computersnorzaini
 
Types of software
Types of softwareTypes of software
Types of softwareSameen Fatima
 
Introduction to Computer System
Introduction to Computer System Introduction to Computer System
Introduction to Computer System sonykhan3
 
The different components of a computer system
The different components of a computer system The different components of a computer system
The different components of a computer system Subagini Manivannan
 
Difference Between Software and hardware
Difference Between Software and hardwareDifference Between Software and hardware
Difference Between Software and hardwareZeeshan Ilyas
 
Introduction to computer hardware
Introduction to computer hardwareIntroduction to computer hardware
Introduction to computer hardwareMirea Mizushima
 
Types and components of computers
Types and components of computersTypes and components of computers
Types and components of computersCik Na Shohaili
 
Computer Hardware and software
Computer Hardware and softwareComputer Hardware and software
Computer Hardware and softwareVisualBee.com
 
operating system
operating systemoperating system
operating systemKadianAman
 

What's hot (20)

computer software
computer softwarecomputer software
computer software
 
COMPUTER SYSTEM AND ITS COMPONENTS
COMPUTER SYSTEM AND ITS COMPONENTSCOMPUTER SYSTEM AND ITS COMPONENTS
COMPUTER SYSTEM AND ITS COMPONENTS
 
Application software
Application softwareApplication software
Application software
 
Basics of the Computer System
Basics of the Computer SystemBasics of the Computer System
Basics of the Computer System
 
Computer software
Computer softwareComputer software
Computer software
 
operating system
operating system operating system
operating system
 
Types of computer
Types of computerTypes of computer
Types of computer
 
COMPUTER SYSTEM
COMPUTER SYSTEMCOMPUTER SYSTEM
COMPUTER SYSTEM
 
Introduction To Computer 1
Introduction To Computer  1Introduction To Computer  1
Introduction To Computer 1
 
Computer hardware
Computer hardwareComputer hardware
Computer hardware
 
Chapter 1 Introduction To Computers
Chapter 1 Introduction To ComputersChapter 1 Introduction To Computers
Chapter 1 Introduction To Computers
 
Types of software
Types of softwareTypes of software
Types of software
 
Introduction to Computer System
Introduction to Computer System Introduction to Computer System
Introduction to Computer System
 
The different components of a computer system
The different components of a computer system The different components of a computer system
The different components of a computer system
 
Operating system basics
Operating system basicsOperating system basics
Operating system basics
 
Difference Between Software and hardware
Difference Between Software and hardwareDifference Between Software and hardware
Difference Between Software and hardware
 
Introduction to computer hardware
Introduction to computer hardwareIntroduction to computer hardware
Introduction to computer hardware
 
Types and components of computers
Types and components of computersTypes and components of computers
Types and components of computers
 
Computer Hardware and software
Computer Hardware and softwareComputer Hardware and software
Computer Hardware and software
 
operating system
operating systemoperating system
operating system
 

Similar to OPERATING SYSTEM

Foundation of information system - Software
Foundation of information system - SoftwareFoundation of information system - Software
Foundation of information system - Softwarerh8g7p44p7
 
operating systems
operating systemsoperating systems
operating systemschukey
 
Operating systems
Operating systemsOperating systems
Operating systemsSrishti Gupta
 
Operating System PPT
Operating System PPTOperating System PPT
Operating System PPTRajneesh Chaubey
 
operating systems 6
operating systems 6operating systems 6
operating systems 6chukey
 
operating systems
operating systemsoperating systems
operating systemschukey
 
Lecture 4.pptx
Lecture 4.pptxLecture 4.pptx
Lecture 4.pptxsara591850
 
systems_software
systems_softwaresystems_software
systems_softwareBrian Shonhiwa
 
system software and operating System
system software and operating Systemsystem software and operating System
system software and operating Systemimtiazalijoono
 
ICT Presentation operating system and types.pptx
ICT Presentation operating system and types.pptxICT Presentation operating system and types.pptx
ICT Presentation operating system and types.pptxShehlafaiz1
 
Operating system
Operating systemOperating system
Operating systemPratyush Ray
 
Operating system by aman kr kushwaha
Operating system by aman kr kushwahaOperating system by aman kr kushwaha
Operating system by aman kr kushwahaAMAN KUMAR KUSHWAHA
 
avicHomphs-150226100804-conversion-gate01 (1)(1).pdf
avicHomphs-150226100804-conversion-gate01 (1)(1).pdfavicHomphs-150226100804-conversion-gate01 (1)(1).pdf
avicHomphs-150226100804-conversion-gate01 (1)(1).pdfRajDhrub
 
computer hardware and software
computer hardware and softwarecomputer hardware and software
computer hardware and softwareavinash gupta
 

Similar to OPERATING SYSTEM (20)

Foundation of information system - Software
Foundation of information system - SoftwareFoundation of information system - Software
Foundation of information system - Software
 
operating systems
operating systemsoperating systems
operating systems
 
Operating systems
Operating systemsOperating systems
Operating systems
 
It
ItIt
It
 
Operating System PPT
Operating System PPTOperating System PPT
Operating System PPT
 
operating systems 6
operating systems 6operating systems 6
operating systems 6
 
operating systems
operating systemsoperating systems
operating systems
 
Lecture 4
Lecture 4Lecture 4
Lecture 4
 
Lecture 4.pptx
Lecture 4.pptxLecture 4.pptx
Lecture 4.pptx
 
systems_software
systems_softwaresystems_software
systems_software
 
system software and operating System
system software and operating Systemsystem software and operating System
system software and operating System
 
Operating systems
Operating systems Operating systems
Operating systems
 
Itc chapter # 9
Itc   chapter # 9Itc   chapter # 9
Itc chapter # 9
 
ICT Presentation operating system and types.pptx
ICT Presentation operating system and types.pptxICT Presentation operating system and types.pptx
ICT Presentation operating system and types.pptx
 
Operating system
Operating systemOperating system
Operating system
 
Information sheet 1
Information sheet 1Information sheet 1
Information sheet 1
 
Operating system by aman kr kushwaha
Operating system by aman kr kushwahaOperating system by aman kr kushwaha
Operating system by aman kr kushwaha
 
avicHomphs-150226100804-conversion-gate01 (1)(1).pdf
avicHomphs-150226100804-conversion-gate01 (1)(1).pdfavicHomphs-150226100804-conversion-gate01 (1)(1).pdf
avicHomphs-150226100804-conversion-gate01 (1)(1).pdf
 
computer hardware and software
computer hardware and softwarecomputer hardware and software
computer hardware and software
 
OPERATING SYSTEM
OPERATING SYSTEMOPERATING SYSTEM
OPERATING SYSTEM
 

More from Yanne Evangelista

STAFF PLANNING AND LABOR COST CONTROL
STAFF PLANNING AND LABOR COST CONTROLSTAFF PLANNING AND LABOR COST CONTROL
STAFF PLANNING AND LABOR COST CONTROLYanne Evangelista
 
REVENUE AND CASH HANDLING CONTROL
REVENUE AND CASH HANDLING CONTROLREVENUE AND CASH HANDLING CONTROL
REVENUE AND CASH HANDLING CONTROLYanne Evangelista
 
INVENTORY CONTROL POLICIES
INVENTORY CONTROL POLICIESINVENTORY CONTROL POLICIES
INVENTORY CONTROL POLICIESYanne Evangelista
 
STORAGE / STOREROOM CONTROL
STORAGE / STOREROOM CONTROLSTORAGE / STOREROOM CONTROL
STORAGE / STOREROOM CONTROLYanne Evangelista
 
RECEIVING CONTROL POLICIES
RECEIVING CONTROL POLICIESRECEIVING CONTROL POLICIES
RECEIVING CONTROL POLICIESYanne Evangelista
 
PURCHASING CONTROL POLICIES
PURCHASING CONTROL POLICIESPURCHASING CONTROL POLICIES
PURCHASING CONTROL POLICIESYanne Evangelista
 
EVENTS MANAGEMENT ROOM SETUP
EVENTS MANAGEMENT ROOM SETUPEVENTS MANAGEMENT ROOM SETUP
EVENTS MANAGEMENT ROOM SETUPYanne Evangelista
 
EVENT PLANNER QUALITIES AND SKILLS
EVENT PLANNER QUALITIES AND SKILLSEVENT PLANNER QUALITIES AND SKILLS
EVENT PLANNER QUALITIES AND SKILLSYanne Evangelista
 
INTRODUCTION TO COST CONTROL
INTRODUCTION TO COST CONTROLINTRODUCTION TO COST CONTROL
INTRODUCTION TO COST CONTROLYanne Evangelista
 
BARTENDING AND FLAIRTENDING
BARTENDING AND FLAIRTENDINGBARTENDING AND FLAIRTENDING
BARTENDING AND FLAIRTENDINGYanne Evangelista
 
DEVELOPMENTAL PSYCHOLOGY
DEVELOPMENTAL PSYCHOLOGYDEVELOPMENTAL PSYCHOLOGY
DEVELOPMENTAL PSYCHOLOGYYanne Evangelista
 
KITCHEN BRIGADE SYSTEM
KITCHEN BRIGADE SYSTEMKITCHEN BRIGADE SYSTEM
KITCHEN BRIGADE SYSTEMYanne Evangelista
 
PROFESSIONAL CHEF'S UNIFORM
PROFESSIONAL CHEF'S UNIFORMPROFESSIONAL CHEF'S UNIFORM
PROFESSIONAL CHEF'S UNIFORMYanne Evangelista
 
INTRODUCTION TO CULINARY
INTRODUCTION TO CULINARYINTRODUCTION TO CULINARY
INTRODUCTION TO CULINARYYanne Evangelista
 
GAMING AND CASINO MANAGEMENT
GAMING AND CASINO MANAGEMENTGAMING AND CASINO MANAGEMENT
GAMING AND CASINO MANAGEMENTYanne Evangelista
 
TOURISM PLANNING AND DEVELOPMENT
TOURISM PLANNING AND DEVELOPMENTTOURISM PLANNING AND DEVELOPMENT
TOURISM PLANNING AND DEVELOPMENTYanne Evangelista
 
CRUISE OPERATIONS MANAGEMENT
CRUISE OPERATIONS MANAGEMENTCRUISE OPERATIONS MANAGEMENT
CRUISE OPERATIONS MANAGEMENTYanne Evangelista
 

More from Yanne Evangelista (20)

STAFF PLANNING AND LABOR COST CONTROL
STAFF PLANNING AND LABOR COST CONTROLSTAFF PLANNING AND LABOR COST CONTROL
STAFF PLANNING AND LABOR COST CONTROL
 
REVENUE AND CASH HANDLING CONTROL
REVENUE AND CASH HANDLING CONTROLREVENUE AND CASH HANDLING CONTROL
REVENUE AND CASH HANDLING CONTROL
 
INVENTORY CONTROL POLICIES
INVENTORY CONTROL POLICIESINVENTORY CONTROL POLICIES
INVENTORY CONTROL POLICIES
 
ISSUANCE CONTROL
ISSUANCE CONTROLISSUANCE CONTROL
ISSUANCE CONTROL
 
STORAGE / STOREROOM CONTROL
STORAGE / STOREROOM CONTROLSTORAGE / STOREROOM CONTROL
STORAGE / STOREROOM CONTROL
 
RECEIVING CONTROL POLICIES
RECEIVING CONTROL POLICIESRECEIVING CONTROL POLICIES
RECEIVING CONTROL POLICIES
 
PURCHASING CONTROL POLICIES
PURCHASING CONTROL POLICIESPURCHASING CONTROL POLICIES
PURCHASING CONTROL POLICIES
 
EVENTS MANAGEMENT ROOM SETUP
EVENTS MANAGEMENT ROOM SETUPEVENTS MANAGEMENT ROOM SETUP
EVENTS MANAGEMENT ROOM SETUP
 
EVENT PLANNER QUALITIES AND SKILLS
EVENT PLANNER QUALITIES AND SKILLSEVENT PLANNER QUALITIES AND SKILLS
EVENT PLANNER QUALITIES AND SKILLS
 
INTRODUCTION TO COST CONTROL
INTRODUCTION TO COST CONTROLINTRODUCTION TO COST CONTROL
INTRODUCTION TO COST CONTROL
 
BARTENDING AND FLAIRTENDING
BARTENDING AND FLAIRTENDINGBARTENDING AND FLAIRTENDING
BARTENDING AND FLAIRTENDING
 
DEVELOPMENTAL PSYCHOLOGY
DEVELOPMENTAL PSYCHOLOGYDEVELOPMENTAL PSYCHOLOGY
DEVELOPMENTAL PSYCHOLOGY
 
CHILD DEVELOPMENT
CHILD DEVELOPMENTCHILD DEVELOPMENT
CHILD DEVELOPMENT
 
KITCHEN BRIGADE SYSTEM
KITCHEN BRIGADE SYSTEMKITCHEN BRIGADE SYSTEM
KITCHEN BRIGADE SYSTEM
 
PROFESSIONAL CHEF'S UNIFORM
PROFESSIONAL CHEF'S UNIFORMPROFESSIONAL CHEF'S UNIFORM
PROFESSIONAL CHEF'S UNIFORM
 
INTRODUCTION TO CULINARY
INTRODUCTION TO CULINARYINTRODUCTION TO CULINARY
INTRODUCTION TO CULINARY
 
GAMING AND CASINO MANAGEMENT
GAMING AND CASINO MANAGEMENTGAMING AND CASINO MANAGEMENT
GAMING AND CASINO MANAGEMENT
 
EVENTS MARKETING
EVENTS MARKETINGEVENTS MARKETING
EVENTS MARKETING
 
TOURISM PLANNING AND DEVELOPMENT
TOURISM PLANNING AND DEVELOPMENTTOURISM PLANNING AND DEVELOPMENT
TOURISM PLANNING AND DEVELOPMENT
 
CRUISE OPERATIONS MANAGEMENT
CRUISE OPERATIONS MANAGEMENTCRUISE OPERATIONS MANAGEMENT
CRUISE OPERATIONS MANAGEMENT
 

Recently uploaded

Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 

Recently uploaded (20)

Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 

OPERATING SYSTEM

  • 2. Page 2 • OS is an example of system software – software that controls the system’s hardware, and which interacts with the user and application software. • In short, the operating system is the computer’s master control program. OPERATING SYSTEM
  • 3. Page 3 THE OPERATING SYSTEM PERFORMS THE FOLLOWING FUNCTIONS • Provides the instructions to display the on-screen elements with which you interact. Collectively, these elements are known as the user interface. • Loads programs (such as word processing and spreadsheet programs) into the computer’s memory so that you can use them. • Coordinates how programs work with the CPU, RAM, Keyboard, mouse, printer, and other hardware, as well as with other software. • Manages the way information is stored on the received from disks.
  • 5. Page 5 RUNNING PROGRAMS • The operating system provides a consistent interface between those programs and other computer resources such as memory, a printer, or another program. • Programmers write computer programs with built – in instructions – called SYSTEM CALLS – that request services from the operating system.
  • 8. Page 8 MICROSOFT WINDOWS • Microsoft Windows is a family of proprietary operating systems most commonly used on personal computers. • It is the most common family of operating systems for the personal computer, with about 90% of the market share
  • 9. Page 9 • Ken Thompson wrote B, mainly based on BCPL, which he used to write Unix, based on his experience in the MULTICS project. • B was replaced by C, and Unix developed into a large, complex family of inter-related operating systems which have been influential in every modern operating system UNIX / LINUX
  • 10. Page 10 BSD / DESCENDANTS • A subgroup of the Unix family is the Berkeley Software Distribution family, which includes FreeBSD, NetBSD, and OpenBSD. • These operating systems are most commonly found on webservers, although they can also function as a personal computer OS.
  • 11. Page 11 MAC / OS • Mac OS X is a line of partially proprietary graphical operating systems developed, marketed, and sold by Apple Inc., the latest of which is pre- loaded on all currently shipping Macintosh computers.
  • 12. Page 12 CONTINUATION: • Mac OS X is the successor to the original Mac OS, which had been Apple's primary operating system since 1984. • Unlike its predecessor, Mac OS X is a UNIX operating system built on technology that had been developed at NeXT through the second half of the 1980s and up until Apple purchased the company in early 1997
  • 13. Page 13 PLAN 9 • Programmers at Bell Labs went on to develop Plan 9 and Inferno, which were engineered for modern distributed environments.
  • 14. Page 14 • Plan 9 was designed from the start to be a networked operating system, and had graphics built-in, unlike Unix, which added these features to the design later. • It is currently released under the Lucent Public License. Inferno was sold to Vita Nuova Holdings and has been released under a GPL/MIT license. CONTINUATION:
  • 15. Page 15 LINUX AND GNU • Linux is the generic name for a UNIX like operating system that can be used on a wide range of devices from supercomputers to wristwatches. The Linux kernel is released under an open source license, so anyone can read and modify its code. It has been modified to run on a large variety of electronics
  • 16. Page 16 GOOGLE CHROME OS • Chrome is an O.S. based on the Linux kernel and designed by Google. Chrome targets computer users that spend most of their time on the internet—it is technically only a web browser with no other applications, and relies on internet applications used in the web browser to accomplish tasks such as word processing and media viewing.
  • 17. Page 17 COMPONENTS OF AN OPERATING SYSTEM
  • 18. Page 18 USER INTERFACE • Computer receives some sort of human input needs a user interface, which allows a person to interact with the computer. While devices like keyboards, mice and touch screens make up the hardware end of this task, the user interface makes up the software for it.
  • 19. Page 19 CONTINUATION: • The two most common forms of a user interface have historically been the Command-line interface, where computer commands are typed out line-by-line, and the Graphical user interface, where a visual environment (most commonly with windows, buttons, and icons) is
  • 20. Page 20 GRAPHICAL USER INTERFACES • Most of the modern computer systems support graphical user interfaces (GUI), and often include them. • In some computer systems, such as the original implementations of Microsoft Windows and the Mac OS, the GUI is integrated into the kernel .
  • 21. Page 21 THE KERNEL • With the aid of the firmware and device drivers, the operating system provides the most basic level of control over all of the computer's hardware devices.
  • 22. Page 22 CONTINUATION: • It manages memory access for programs in the RAM, it determines which programs get access to which hardware resources, it sets up or resets the CPU's operating states for optimal operation at all times, and it organizes the data for long-term non-volatile storage with file systems on such media as disks, tapes, flash memory, etc.
  • 23. Page 23 PROGRAM EXECUTION • The operating system acts as an interface between an application and the hardware. The user interacts with the hardware from "the other side". • The operating system is a set of services which simplifies development of applications. Executing a program involves the creation of a process by the operating system. The kernel creates a process by assigning memory and other resources, establishing a priority for the process (in multi-tasking systems), loading program code into memory, and executing the program.
  • 24. Page 24 INTERRUPTS • Interrupts are central to operating systems, as they provide an efficient way for the operating system to interact with and react to its environment. • Interrupt-based programming is directly supported by most modern CPUs. Interrupts provide a computer with a way of automatically saving local register contexts, and running specific code in response to events
  • 25. Page 25 MODES • Modern CPUs support multiple modes of operation. • CPUs with this capability use at least two modes: protected mode and supervisor mode.
  • 26. Page 26 CONTINUATION: • The supervisor mode is used by the operating system's kernel for low level tasks that need unrestricted access to hardware, such as controlling how memory is written and erased, and communication with devices like graphics cards. • Protected mode, in contrast, is used for almost everything else.
  • 27. Page 27 MEMORY MANAGEMENT • System of memory management is almost never seen anymore, since programs often contain bugs which can cause them to exceed their allocated memory. • If a program fails it may cause memory used by one or more other programs to be affected or overwritten. Malicious programs, or viruses may purposefully alter another program's memory or may affect the operation of the operating system itself. With cooperative memory management it takes only one misbehaved program to crash the system.
  • 28. Page 28 VIRTUAL MEMORY • The use of virtual memory addressing (such as paging or segmentation) means that the kernel can choose what memory each program may use at any given time, allowing the operating system to use the same memory locations for multiple tasks.
  • 29. Page 29 DEVICE DRIVER • A device driver is a specific type of computer software developed to allow interaction with hardware devices. • Typically this constitutes an interface for communicating with the device, through the specific computer bus or communications subsystem that the hardware is connected to, providing commands to and/or receiving data from the device, and on the other end, the requisite interfaces to the operating system and software applications.
  • 30. Page 30 NETWORKING • Currently most operating systems support a variety of networking protocols, hardware, and applications for using them. • This means that computers running dissimilar operating systems can participate in a common network for sharing resources such as computing, files, printers, and scanners using either wired or wireless connections. Networks can essentially allow a computer's operating system to access the resources of a remote computer to support the same functions as it could if those resources were connected directly to the local computer.
  • 31. Page 31 SECURITY • A computer being secure depends on a number of technologies working properly. A modern operating system provides access to a number of resources, which are available to software running on the system, and to external devices like networks via the kernel. • External security involves a request from outside the computer, such as a login at a connected console or some kind of network connection. External requests are often passed through device drivers to the operating system's kernel, where they can be passed onto applications, or carried out directly.