The document provides an introduction to operating systems, describing their general definition and history. It defines an OS as a program that acts as an interface between users and computer hardware, managing resources like memory, processors, and I/O devices. Early computers required manual programming, but OS development improved usability. Early systems included ENIAC, which was large and manually programmed. Over time, hardware evolved and new OS features emerged like multiprogramming, time-sharing, and support for networked systems.
Through this PPT you may learned about Operating System, Types of OS, History of OS, Operating System Software, Gives detailed information about Device Management, Memory Management, File Management
SA_IT241_3
WHAT ARE THE SECURITY VIOLATION CATEGORIES?
1. Breach of confidentiality: unauthorized reading of data.
2. Breach of integrity: unauthorized modification of data.
3. Breach of availability: unauthorized destruction of data.
4. Theft of service: unauthorized use of resources.
5. Denial of Service(DOS): Prevention of legitimate use.
WHAT ARE THE SECURITY VIOLATION METHODS?
1. Masquerading (authentication breach): pretending to be an authorized user.
2. Replay Attack: Replaying the same message or adding a modification to it.
3. Man-in-the-middle attack: intruder sits in data flow, masquerading as sender to receiver and vice versa.
4. Session hijacking: intercepting a session which is already on going to by-pass authentication.
5. Privilege escalation: A really Common attack, access of resources that a user is not supposed to have.
WHAT ARE THE OTHER VARIATIONS OF HYPERVISORS?
1. Paravirtualization: guest OS is modified to work with VMM.
2. Programming-environment virtualization: VMMS do not virtualize hardware which creates optimized virtual system (Used by Oracle Java and Microsoft.Net).
3. Emulators: Allows applications written for one hardware to run on different hardware environments.
4. Application Containment: Not virtualization but, provides features like it by segregating application making them more secure and manageable.
Oracle Solaris Zones, BSD Jails, IBM AIX WPARs.
• Much variation is due to breadth, depth, and importance of virtualization.
WHAT ARE THE STEPS OF LIVE MIGRATION?
1. VMM start connection with the target VMM.
2. Target created a new guest (by creating a new VCPU).
3. VMM sends read-only files to target VMM.
4. VMM sends read-write files to target VMM.
5. Repeat 4 unit done as not all read-write data can be sent (could be a dirty read).
6. If step 4 and 5 becomes very short then, VMM freezes guest, send remaining stuff.
7. Target starts running the freezed guest.
WHAT ARE THE REASONS FOR DISTRIBUTED SYSTEMS?
1. Resource sharing
Sharing files, information, printing.
Using remote GPUs.
2. Computation speedup
dsitribute processing needed to multicomputers.
Load balancing: moving jobs to more lightly-laoded sites.
3. Reliability: detect and recover failurs.
WHAT ARE THE WIDELY USED ARCHITECTURES?
1. Client-server model.
2. Cluster-based model.
WHAT ARE THE CHALLENGES?
1. Naming and transparency.
2. Remote file access.
3. Caching and caching consistency.
WHAT WAS GFS WAS INFLUNECNED BY?
1. Hardware failure should be expected routinely.
2. Most files are changed by appending new data (rather than overwriting existing data).
3. Modularized software layer MapReduce sit on top of GFS to carry out large-scale parallel computations.
WHAT ARE THE ADVANTAGES OF DISK CACHES?
1. Reliable
2. Cached data kept on disk do not need to be fetched again while recovery.
ADVANTAGES OF MAIN MEMORY CACHES?
1. Can make workstations diskless.
2. Quicker data access.
3. Performance speed up in bigger memories.
4. Server c
Introduction to OS, Operating system functions, evaluation of O.S., Different types of O.S.,
Batch multi programmed, Time-sharing, Real-time, Distributed, Parallel.
Through this PPT you may learned about Operating System, Types of OS, History of OS, Operating System Software, Gives detailed information about Device Management, Memory Management, File Management
SA_IT241_3
WHAT ARE THE SECURITY VIOLATION CATEGORIES?
1. Breach of confidentiality: unauthorized reading of data.
2. Breach of integrity: unauthorized modification of data.
3. Breach of availability: unauthorized destruction of data.
4. Theft of service: unauthorized use of resources.
5. Denial of Service(DOS): Prevention of legitimate use.
WHAT ARE THE SECURITY VIOLATION METHODS?
1. Masquerading (authentication breach): pretending to be an authorized user.
2. Replay Attack: Replaying the same message or adding a modification to it.
3. Man-in-the-middle attack: intruder sits in data flow, masquerading as sender to receiver and vice versa.
4. Session hijacking: intercepting a session which is already on going to by-pass authentication.
5. Privilege escalation: A really Common attack, access of resources that a user is not supposed to have.
WHAT ARE THE OTHER VARIATIONS OF HYPERVISORS?
1. Paravirtualization: guest OS is modified to work with VMM.
2. Programming-environment virtualization: VMMS do not virtualize hardware which creates optimized virtual system (Used by Oracle Java and Microsoft.Net).
3. Emulators: Allows applications written for one hardware to run on different hardware environments.
4. Application Containment: Not virtualization but, provides features like it by segregating application making them more secure and manageable.
Oracle Solaris Zones, BSD Jails, IBM AIX WPARs.
• Much variation is due to breadth, depth, and importance of virtualization.
WHAT ARE THE STEPS OF LIVE MIGRATION?
1. VMM start connection with the target VMM.
2. Target created a new guest (by creating a new VCPU).
3. VMM sends read-only files to target VMM.
4. VMM sends read-write files to target VMM.
5. Repeat 4 unit done as not all read-write data can be sent (could be a dirty read).
6. If step 4 and 5 becomes very short then, VMM freezes guest, send remaining stuff.
7. Target starts running the freezed guest.
WHAT ARE THE REASONS FOR DISTRIBUTED SYSTEMS?
1. Resource sharing
Sharing files, information, printing.
Using remote GPUs.
2. Computation speedup
dsitribute processing needed to multicomputers.
Load balancing: moving jobs to more lightly-laoded sites.
3. Reliability: detect and recover failurs.
WHAT ARE THE WIDELY USED ARCHITECTURES?
1. Client-server model.
2. Cluster-based model.
WHAT ARE THE CHALLENGES?
1. Naming and transparency.
2. Remote file access.
3. Caching and caching consistency.
WHAT WAS GFS WAS INFLUNECNED BY?
1. Hardware failure should be expected routinely.
2. Most files are changed by appending new data (rather than overwriting existing data).
3. Modularized software layer MapReduce sit on top of GFS to carry out large-scale parallel computations.
WHAT ARE THE ADVANTAGES OF DISK CACHES?
1. Reliable
2. Cached data kept on disk do not need to be fetched again while recovery.
ADVANTAGES OF MAIN MEMORY CACHES?
1. Can make workstations diskless.
2. Quicker data access.
3. Performance speed up in bigger memories.
4. Server c
Introduction to OS, Operating system functions, evaluation of O.S., Different types of O.S.,
Batch multi programmed, Time-sharing, Real-time, Distributed, Parallel.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
2. 1.1 General Definition
• An OS is a program which acts as an interface between computer
system users and the computer hardware.
• It provides a user-friendly environment in which a user may easily
develop and execute programs.
• Otherwise, hardware knowledge would be mandatory for computer
programming.
• So, it can be said that an OS hides the complexity of hardware from
uninterested users.
3. 1.1 General Definition
• In general, a computer system has some resources which may be
utilized to solve a problem. They are
• Memory
• Processor(s)
• I/O
• File System
• etc.
5. 1.1 General Definition
The OS manages these resources and allocates them to specific
programs and users.
With the management of the OS, a programmer is rid of difficult
hardware considerations.
An OS provides services for
Processor Management
Memory Management
File Management
Device Management
Concurrency Control
6. 1.1 General Definition
• Another aspect for the usage of OS is
that; it is used as a predefined library
for hardware-software interaction.
• This is why, system programs apply to
the installed OS since they cannot
reach hardware directly.
Application Programs
System Programs
Operating System
Machine Language
HARDWARE
7. 1.1 General Definition
• In an OS installed machine, since we have an intermediate layer, our
programs obtain some advantage of mobility by not dealing with
hardware.
• For example, the above program segment would not work for an
8086 machine, where as the
“c = a + b ;”
syntax will be suitable for both.
8. 1.1 General Definition
A simple program
segment with no
hardware
consideration
A more
sophisticated
program segment
with hardware
consideration
Hardware
response
OS Machine
Language
9. 1.1 General Definition
• In a more simplistic approach, in fact, OS itself is a program.
• But it has a priority which application programs don’t have.
• OS uses the kernel mode of the microprocessor, whereas other
programs use the user mode.
• The difference between two is that; all hardware instructions are
valid in kernel mode, where some of them cannot be used in the user
mode.
10. 1.2 History of Operating Systems
• It all started with computer hardware in about 1940s.
ENIAC 1943
11. 1.2 History of Operating Systems
• ENIAC (Electronic Numerical Integrator and Computer), at the U.S.
Army's Aberdeen Proving Ground in Maryland.
• built in the 1940s,
• weighed 30 tons,
• was eight feet high, three feet deep, and 100 feet long
• contained over 18,000 vacuum tubes that were cooled by 80 air blowers.
12. 1.2 History of Operating Systems
• Computers were using vacuum tube technology.
ENIAC’s vacuum tubes
14. 1.2 History of Operating Systems
Programs were loaded into memory manually using switches, punched
cards, or paper tapes.
ENIAC : coding by cable connections
18. 1.2 History of Operating Systems
Babbage’s analytical engine
(designed in 1840’s by Charles Babbage, but cold not be constructed by him.
An earlier and simpler version is constructed in 2002, in London )
http://www.computerhistory.org/babbage/
19. 1.2 History of Operating Systems
• Ada Lovalence (at time of Charles Babbage) wrote code for analytical
engine to compute Bernulli Numbers
20. 1.2 History of Operating Systems
• As time went on, card readers, printers, and magnetic tape units
were developed as additional hardware elements.
• Assemblers, loaders and simple utility libraries were developed as
software tools.
• Later, off-line spooling and channel program methods were
developed sequentially.
22. 1.2 History of Operating Systems
• Finally, the idea of multiprogramming came.
• Multiprogramming means sharing of resources between more than
one processes.
• By multiprogramming the CPU time is not wasted, because, while
one process moves on some I/O work, the OS picks another process
to execute till the current one passes to I/O operation.
23. 1.2 History of Operating Systems
• With the development of interactive computation in 1970s, time-
sharing systems emerged.
• In these systems, multiple users have terminals (not computers)
connected to a main computer and execute her task in the main
computer.
24. 1.2 History of Operating Systems
Terminals are connected
to the main computer and
used for input and output.
No processing is made.
They do not have CPUs.
Main computer; having a CPU
executing processes by
utilization of the OS, (e.g. UNIX).
25. 1.2 History of Operating Systems
• Another computer system is the multiprocessor system having
multiple processors sharing memory and peripheral devices.
• With this configuration, they have greater computing power and
higher reliability.
26. 1.2 History of Operating Systems
• Multiprocessor systems are classified into two as tightly-coupled and
loosely-coupled (distributed).
• In the tightly-coupled one, each processor is assigned a specific duty
but processors work in close association, possibly sharing the same
memory.
• In the loosely coupled one, each processor has its own memory and
copy of the OS.
27. 1.2 History of Operating Systems
• Use of the networks required OSs appropriate for them.
• In network systems, each process runs in its own machine but the
OS have access to other machines.
• By this way, file sharing, messaging, etc. became possible.
• In networks, users are aware of the fact that s/he is working in a
network and when information is exchanged. The user explicitly
handles the transfer of information.
28. 1.2 History of Operating Systems
Each is a computer having its own
CPU, RAM, etc. An OS supporting
networks is installed on them.