SlideShare a Scribd company logo
Operatin systems and their types:
An operating system, or OS, is a fundamental piece of software that manages and
controls the hardware and software resources of a computer. It provides a platform
for applications to run on and serves as the intermediary between the user and the
computer's hardware.
The basic functions of an operating system include managing memory, running
processes, handling input and output devices, managing and organizing files, and
providing security features. Without an operating system, a computer would not be
able to run applications or perform any useful tasks.
There are many different types of operating systems, each with their own unique
features and purposes. Some of the most popular operating systems include:
- Windows: Developed and distributed by Microsoft, Windows is the most widely
used operating system in the world. It is known for its ease of use, compatibility
with a wide range of hardware and software, and its extensive support for
third-party applications.
If you read more click here
https://www.dayaxwriter.com/2023/04/operatin-systems-and-their-types.html

More Related Content

Similar to Operatin systems and their types

UNIT I - Part 1.pptx
UNIT I - Part 1.pptxUNIT I - Part 1.pptx
UNIT I - Part 1.pptx
karthikaparthasarath
 
wepik-the-evolution-of-operating-systems-from-mainframes-to-modern-computing-...
wepik-the-evolution-of-operating-systems-from-mainframes-to-modern-computing-...wepik-the-evolution-of-operating-systems-from-mainframes-to-modern-computing-...
wepik-the-evolution-of-operating-systems-from-mainframes-to-modern-computing-...
dipesh845221
 
Presentation On Operating system
Presentation On Operating systemPresentation On Operating system
Presentation On Operating system
National Institute of Technology Rourkela
 
Computet scienceComputet scienceComputet science
Computet scienceComputet scienceComputet scienceComputet scienceComputet scienceComputet science
Computet scienceComputet scienceComputet science
ifrahabdikadir265
 
Types of software
Types of softwareTypes of software
Types of software
t-hah
 
Operating systems
Operating systemsOperating systems
Operating systems
Nikita Arora
 
Operating system education. technology.
Operating system education.  technology.Operating system education.  technology.
Operating system education. technology.
DevarajuBn
 
S02.W01 - Introduction to Operating Systems
S02.W01 - Introduction to Operating SystemsS02.W01 - Introduction to Operating Systems
S02.W01 - Introduction to Operating Systems
selcukca84
 
Operating-Systems
Operating-SystemsOperating-Systems
Operating-Systems
SowrabHossain
 
Operating System - I.pptx
Operating System - I.pptxOperating System - I.pptx
Operating System - I.pptx
Rahul779791
 
As media studies software and systems presentation
As media studies software and systems presentationAs media studies software and systems presentation
As media studies software and systems presentation
paddy249
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
Directioners
 
A presentation on operating system
A presentation on operating systemA presentation on operating system
A presentation on operating system
Nilratan Srakar
 
OPERATING SYSTEMS INTRODUCTION chapter 1.pptx
OPERATING SYSTEMS INTRODUCTION chapter 1.pptxOPERATING SYSTEMS INTRODUCTION chapter 1.pptx
OPERATING SYSTEMS INTRODUCTION chapter 1.pptx
natyesu
 
lecture 1 (Introduction to Operating System.)
lecture 1 (Introduction to Operating System.)lecture 1 (Introduction to Operating System.)
lecture 1 (Introduction to Operating System.)
WajeehaBaig
 
week-1-200310134908.pptx
week-1-200310134908.pptxweek-1-200310134908.pptx
week-1-200310134908.pptx
ssuser5c874e
 
operating system college
operating system collegeoperating system college
operating system college
Jitendra Rawat
 
01 operating systems final
01 operating systems final01 operating systems final
01 operating systems final
Aman Garg
 
Operating system2.pdf
Operating system2.pdfOperating system2.pdf
Operating system2.pdf
ShahAlam903708
 
Computer system software
Computer system softwareComputer system software
Computer system software
MozaSaid
 

Similar to Operatin systems and their types (20)

UNIT I - Part 1.pptx
UNIT I - Part 1.pptxUNIT I - Part 1.pptx
UNIT I - Part 1.pptx
 
wepik-the-evolution-of-operating-systems-from-mainframes-to-modern-computing-...
wepik-the-evolution-of-operating-systems-from-mainframes-to-modern-computing-...wepik-the-evolution-of-operating-systems-from-mainframes-to-modern-computing-...
wepik-the-evolution-of-operating-systems-from-mainframes-to-modern-computing-...
 
Presentation On Operating system
Presentation On Operating systemPresentation On Operating system
Presentation On Operating system
 
Computet scienceComputet scienceComputet science
Computet scienceComputet scienceComputet scienceComputet scienceComputet scienceComputet science
Computet scienceComputet scienceComputet science
 
Types of software
Types of softwareTypes of software
Types of software
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Operating system education. technology.
Operating system education.  technology.Operating system education.  technology.
Operating system education. technology.
 
S02.W01 - Introduction to Operating Systems
S02.W01 - Introduction to Operating SystemsS02.W01 - Introduction to Operating Systems
S02.W01 - Introduction to Operating Systems
 
Operating-Systems
Operating-SystemsOperating-Systems
Operating-Systems
 
Operating System - I.pptx
Operating System - I.pptxOperating System - I.pptx
Operating System - I.pptx
 
As media studies software and systems presentation
As media studies software and systems presentationAs media studies software and systems presentation
As media studies software and systems presentation
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
 
A presentation on operating system
A presentation on operating systemA presentation on operating system
A presentation on operating system
 
OPERATING SYSTEMS INTRODUCTION chapter 1.pptx
OPERATING SYSTEMS INTRODUCTION chapter 1.pptxOPERATING SYSTEMS INTRODUCTION chapter 1.pptx
OPERATING SYSTEMS INTRODUCTION chapter 1.pptx
 
lecture 1 (Introduction to Operating System.)
lecture 1 (Introduction to Operating System.)lecture 1 (Introduction to Operating System.)
lecture 1 (Introduction to Operating System.)
 
week-1-200310134908.pptx
week-1-200310134908.pptxweek-1-200310134908.pptx
week-1-200310134908.pptx
 
operating system college
operating system collegeoperating system college
operating system college
 
01 operating systems final
01 operating systems final01 operating systems final
01 operating systems final
 
Operating system2.pdf
Operating system2.pdfOperating system2.pdf
Operating system2.pdf
 
Computer system software
Computer system softwareComputer system software
Computer system software
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 

Operatin systems and their types

  • 1. Operatin systems and their types: An operating system, or OS, is a fundamental piece of software that manages and controls the hardware and software resources of a computer. It provides a platform for applications to run on and serves as the intermediary between the user and the computer's hardware. The basic functions of an operating system include managing memory, running processes, handling input and output devices, managing and organizing files, and providing security features. Without an operating system, a computer would not be able to run applications or perform any useful tasks. There are many different types of operating systems, each with their own unique features and purposes. Some of the most popular operating systems include: - Windows: Developed and distributed by Microsoft, Windows is the most widely used operating system in the world. It is known for its ease of use, compatibility
  • 2. with a wide range of hardware and software, and its extensive support for third-party applications. If you read more click here https://www.dayaxwriter.com/2023/04/operatin-systems-and-their-types.html