SlideShare une entreprise Scribd logo
1  sur  18
OPERATING
SYSTEM
ASMA KHAN
TYPES OF
OPERATING SYSTEM
Single tasking OS
 A single-tasking system can only run one program at a
time
Multi-Tasking OS
 Multi-tasking operating system allows more than one
program to be running in concurrency. This is achieved
by time-sharing, dividing the available processor time
between multiple processes which are each
interrupted repeatedly in time-slices by a task
scheduling subsystem of the operating system.
Embedded OS
 Embedded operating systems are designed
to be used in embedded computer systems.
They are designed to operate on small
machines like PDAs with less autonomy. They
are able to operate with a limited number of
resources.
 They are very compact and extremely
efficient by design.
LOADING AN
OPERATING SYSTEM
When a user switches on a laptop, desktop it usually has no operating
system in internal memory ready to run and manage the computer.
Computer then automatically run a small firmware program to start the
process of loading the operating system into RAM, ready to take
control. In a PC or laptop this firmware is stored in flash memory.
The first firmware program performs a power-on self test (POST). The
purpose of Posting is to prevent the computer from starting to run in an
unusable state. It checks the integrity of the firmware what external
devices are connected and the size of internal memory.
Then it identifies the most promising disk drive from which to load an
operating system. The second firmware program called the ‘boot
loader’ then loads the first, tiny portion of the operating system into
RAM from a hard disk. This portion of the operating system software can
in turn load the rest of the operating system software and associated
data into RAM. This process, in which the operating system loads itself
and then takes control of the computer, is known as ‘bootstrapping’.
 Flash memory is a type of non volatile
memory that erases data in units called
blocks. A block stored on a flash memory chip
must be erased before data can be written, or
programmed, to the microchip.
 Firmware is a permanent software
programmed into a read-only memory.
BUFFER
 An operating system is often able to pass input data to
an application program far faster than an input device
can supply it.
 Similarly, it can often supply the application programs
output data far faster than an output device can accept
it.
 To compensate for the difference in rates of data
processing and allow the processor to perform other
tasks while waiting to receive or send data, system
software uses an area of memory to hold data
temporarily. Such an area in memory is called a buffer.
POLLING
Method in which operating system
periodically checks each peripheral
device for communication is called
polling.
INTERRUPTS
An interrupt is a signal sent from a
peripheral device (hardware) or
program (software) to the
processor to indicate that the
sender needs attention. This leaves
the operating system entirely free
to process other task until its
attention is needed.
HANDSHAKING
Term used to describe the process of
one computer establishing a
connection with another computer or
device.
The handshake is often the steps of
verifying the connection, the speed,
or the authorization of the computer
trying to connect to it.
UTILITY SOFTWARE
 Utility software is system software designed
to help analyse, configure, optimize or
maintain a computer.
 Virus checker
 File compressors
 File manager
 Screen saver
 Disk cleaner
 Backup
 Hardware drivers etc.
NEED FOR INTERRUPT
 https://vimeo.com/channels/zakonweb/8
4491747
ONLINE TEST
 http://www.bbc.co.uk/education/guides/
ztcdtfr/test

Contenu connexe

Tendances

Operating system and its types
Operating system and its types Operating system and its types
Operating system and its types vimal kumar arora
 
Function of Operating system
Function of Operating systemFunction of Operating system
Function of Operating systemAmit Mehla
 
Operating systems Basics
Operating systems BasicsOperating systems Basics
Operating systems BasicsSherif Mousa
 
Fundamentals of operating system
Fundamentals of operating systemFundamentals of operating system
Fundamentals of operating systemJayesh Chauhan
 
introduction To Operating System
introduction To Operating Systemintroduction To Operating System
introduction To Operating SystemLuka M G
 
Operating system.ppt (1)
Operating system.ppt (1)Operating system.ppt (1)
Operating system.ppt (1)Vaibhav Bajaj
 
Types of operating system unit 1 by Ram K Paliwal
Types of operating system  unit 1 by Ram K PaliwalTypes of operating system  unit 1 by Ram K Paliwal
Types of operating system unit 1 by Ram K PaliwalRam Paliwal
 
Operating system and its functions
Operating system and its functionsOperating system and its functions
Operating system and its functionsNamarta Chawla
 
Types of operating system
Types of operating systemTypes of operating system
Types of operating systemMohammad Alam
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating SystemsDamian T. Gordon
 
Operating Systems & Applications
Operating Systems & ApplicationsOperating Systems & Applications
Operating Systems & ApplicationsMaulen Bale
 
Classification of Computers
Classification of ComputersClassification of Computers
Classification of ComputersHarjinder Singh
 
Operating system overview concepts ppt
Operating system overview concepts pptOperating system overview concepts ppt
Operating system overview concepts pptRajendraPrasad Alladi
 
Presentation on Operating System & its Components
Presentation on Operating System & its ComponentsPresentation on Operating System & its Components
Presentation on Operating System & its ComponentsMahmuda Rahman
 

Tendances (20)

Types Of Operating Systems
Types Of Operating SystemsTypes Of Operating Systems
Types Of Operating Systems
 
Operating system and its types
Operating system and its types Operating system and its types
Operating system and its types
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
 
Function of Operating system
Function of Operating systemFunction of Operating system
Function of Operating system
 
Operating systems Basics
Operating systems BasicsOperating systems Basics
Operating systems Basics
 
Fundamentals of operating system
Fundamentals of operating systemFundamentals of operating system
Fundamentals of operating system
 
Computer software
Computer softwareComputer software
Computer software
 
introduction To Operating System
introduction To Operating Systemintroduction To Operating System
introduction To Operating System
 
Operating system.ppt (1)
Operating system.ppt (1)Operating system.ppt (1)
Operating system.ppt (1)
 
Types of operating system unit 1 by Ram K Paliwal
Types of operating system  unit 1 by Ram K PaliwalTypes of operating system  unit 1 by Ram K Paliwal
Types of operating system unit 1 by Ram K Paliwal
 
Operating system and its functions
Operating system and its functionsOperating system and its functions
Operating system and its functions
 
Types of operating system
Types of operating systemTypes of operating system
Types of operating system
 
Operating system
Operating systemOperating system
Operating system
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
Operating Systems & Applications
Operating Systems & ApplicationsOperating Systems & Applications
Operating Systems & Applications
 
Classification of Computers
Classification of ComputersClassification of Computers
Classification of Computers
 
Operating system overview concepts ppt
Operating system overview concepts pptOperating system overview concepts ppt
Operating system overview concepts ppt
 
Cpu ppt cse
Cpu ppt cseCpu ppt cse
Cpu ppt cse
 
Presentation on Operating System & its Components
Presentation on Operating System & its ComponentsPresentation on Operating System & its Components
Presentation on Operating System & its Components
 
Operating system
Operating systemOperating system
Operating system
 

Similaire à Operating system

Operating system concepts (notes)
Operating system concepts (notes)Operating system concepts (notes)
Operating system concepts (notes)Sohaib Danish
 
Fundamental concepts and_principles_of_operating_systems (2)
Fundamental concepts and_principles_of_operating_systems (2)Fundamental concepts and_principles_of_operating_systems (2)
Fundamental concepts and_principles_of_operating_systems (2)DanaAlexander13
 
OS - Operating System
OS - Operating System OS - Operating System
OS - Operating System MaqdamYasir
 
Intermediate Operating Systems
Intermediate Operating SystemsIntermediate Operating Systems
Intermediate Operating SystemsJohn Cutajar
 
SYCS OS PPT INTRODUCTION LECTURE-01.pdf
SYCS OS PPT INTRODUCTION LECTURE-01.pdfSYCS OS PPT INTRODUCTION LECTURE-01.pdf
SYCS OS PPT INTRODUCTION LECTURE-01.pdfAbhinov Shukla
 
Operating system
Operating systemOperating system
Operating systemmak120
 
operating system over view.ppt operating sysyems
operating system over view.ppt operating sysyemsoperating system over view.ppt operating sysyems
operating system over view.ppt operating sysyemsJyoReddy9
 
Operating System
Operating SystemOperating System
Operating Systemguest8b0942
 
L-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.pptL-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.pptKirti Verma
 
What is operating system
What is operating systemWhat is operating system
What is operating systemSuvithak
 
OS - Ch1
OS - Ch1OS - Ch1
OS - Ch1sphs
 
Chapter 1 - Introduction
Chapter 1 - IntroductionChapter 1 - Introduction
Chapter 1 - IntroductionWayne Jones Jnr
 

Similaire à Operating system (20)

Os by nishant raghav
Os by nishant raghavOs by nishant raghav
Os by nishant raghav
 
Operating system concepts (notes)
Operating system concepts (notes)Operating system concepts (notes)
Operating system concepts (notes)
 
Fundamental concepts and_principles_of_operating_systems (2)
Fundamental concepts and_principles_of_operating_systems (2)Fundamental concepts and_principles_of_operating_systems (2)
Fundamental concepts and_principles_of_operating_systems (2)
 
OS - Operating System
OS - Operating System OS - Operating System
OS - Operating System
 
operating system
operating systemoperating system
operating system
 
Ch1
Ch1Ch1
Ch1
 
Software concepts
Software concepts Software concepts
Software concepts
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Intermediate Operating Systems
Intermediate Operating SystemsIntermediate Operating Systems
Intermediate Operating Systems
 
SYCS OS PPT INTRODUCTION LECTURE-01.pdf
SYCS OS PPT INTRODUCTION LECTURE-01.pdfSYCS OS PPT INTRODUCTION LECTURE-01.pdf
SYCS OS PPT INTRODUCTION LECTURE-01.pdf
 
Operating system
Operating systemOperating system
Operating system
 
Operating system introduction
Operating system introductionOperating system introduction
Operating system introduction
 
operating system over view.ppt operating sysyems
operating system over view.ppt operating sysyemsoperating system over view.ppt operating sysyems
operating system over view.ppt operating sysyems
 
Ch1
Ch1Ch1
Ch1
 
Operating system
Operating   systemOperating   system
Operating system
 
Operating System
Operating SystemOperating System
Operating System
 
L-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.pptL-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.ppt
 
What is operating system
What is operating systemWhat is operating system
What is operating system
 
OS - Ch1
OS - Ch1OS - Ch1
OS - Ch1
 
Chapter 1 - Introduction
Chapter 1 - IntroductionChapter 1 - Introduction
Chapter 1 - Introduction
 

Dernier

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Dernier (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

Operating system

  • 3. Single tasking OS  A single-tasking system can only run one program at a time Multi-Tasking OS  Multi-tasking operating system allows more than one program to be running in concurrency. This is achieved by time-sharing, dividing the available processor time between multiple processes which are each interrupted repeatedly in time-slices by a task scheduling subsystem of the operating system.
  • 4. Embedded OS  Embedded operating systems are designed to be used in embedded computer systems. They are designed to operate on small machines like PDAs with less autonomy. They are able to operate with a limited number of resources.  They are very compact and extremely efficient by design.
  • 5.
  • 6.
  • 8. When a user switches on a laptop, desktop it usually has no operating system in internal memory ready to run and manage the computer. Computer then automatically run a small firmware program to start the process of loading the operating system into RAM, ready to take control. In a PC or laptop this firmware is stored in flash memory. The first firmware program performs a power-on self test (POST). The purpose of Posting is to prevent the computer from starting to run in an unusable state. It checks the integrity of the firmware what external devices are connected and the size of internal memory. Then it identifies the most promising disk drive from which to load an operating system. The second firmware program called the ‘boot loader’ then loads the first, tiny portion of the operating system into RAM from a hard disk. This portion of the operating system software can in turn load the rest of the operating system software and associated data into RAM. This process, in which the operating system loads itself and then takes control of the computer, is known as ‘bootstrapping’.
  • 9.  Flash memory is a type of non volatile memory that erases data in units called blocks. A block stored on a flash memory chip must be erased before data can be written, or programmed, to the microchip.  Firmware is a permanent software programmed into a read-only memory.
  • 10. BUFFER  An operating system is often able to pass input data to an application program far faster than an input device can supply it.  Similarly, it can often supply the application programs output data far faster than an output device can accept it.  To compensate for the difference in rates of data processing and allow the processor to perform other tasks while waiting to receive or send data, system software uses an area of memory to hold data temporarily. Such an area in memory is called a buffer.
  • 11. POLLING Method in which operating system periodically checks each peripheral device for communication is called polling.
  • 12. INTERRUPTS An interrupt is a signal sent from a peripheral device (hardware) or program (software) to the processor to indicate that the sender needs attention. This leaves the operating system entirely free to process other task until its attention is needed.
  • 13. HANDSHAKING Term used to describe the process of one computer establishing a connection with another computer or device. The handshake is often the steps of verifying the connection, the speed, or the authorization of the computer trying to connect to it.
  • 14.
  • 15. UTILITY SOFTWARE  Utility software is system software designed to help analyse, configure, optimize or maintain a computer.  Virus checker  File compressors  File manager  Screen saver  Disk cleaner  Backup  Hardware drivers etc.
  • 16.
  • 17. NEED FOR INTERRUPT  https://vimeo.com/channels/zakonweb/8 4491747