.
An operating system software is the chief
piece of software. The portion of
computing system that manages all the
hardware and all of the other software.
IT HAS TO PERFORM SOME TASKS:
Moniter its resources continuously.
Enforces the policies.
Allocate the resources.
Deallocate the resources.
☻Process manager(CPU).
☻Memory manager(MAIN MEMORY).
☻Device manager(KEYBOARD).
☻File manager(PRORAM FILES).
♪ BATCH SYSTEM.
♪INTERACTIVE SYSTEM.
♪REAL TIME SYSTEM.
HARD REAL – TIME SYSTEM
SOFT REAL – TIME SYSTEM
♪HYBRID SYSTEM
►Eliminate access points.
►Save money in the long run.
►Improves performance.
►Reduces holes in security.
►Remove unnecessary file shares.
►Limit ideal time and sleep settings.
▲easy to use.
▲user friendly.
▲intermediate between all hardwares and
softwares of the system.
▲no need to know any technical languages.
▲Its the platform of all programs.
♦if any problems affected in OS, you
may lose all the contents which
have been stored already.
♦unwanted user can use your own
system.

operating system

  • 1.
  • 2.
    An operating systemsoftware is the chief piece of software. The portion of computing system that manages all the hardware and all of the other software. IT HAS TO PERFORM SOME TASKS: Moniter its resources continuously. Enforces the policies. Allocate the resources. Deallocate the resources.
  • 3.
    ☻Process manager(CPU). ☻Memory manager(MAINMEMORY). ☻Device manager(KEYBOARD). ☻File manager(PRORAM FILES).
  • 4.
    ♪ BATCH SYSTEM. ♪INTERACTIVESYSTEM. ♪REAL TIME SYSTEM. HARD REAL – TIME SYSTEM SOFT REAL – TIME SYSTEM ♪HYBRID SYSTEM
  • 5.
    ►Eliminate access points. ►Savemoney in the long run. ►Improves performance. ►Reduces holes in security. ►Remove unnecessary file shares. ►Limit ideal time and sleep settings.
  • 6.
    ▲easy to use. ▲userfriendly. ▲intermediate between all hardwares and softwares of the system. ▲no need to know any technical languages. ▲Its the platform of all programs.
  • 7.
    ♦if any problemsaffected in OS, you may lose all the contents which have been stored already. ♦unwanted user can use your own system.