SlideShare une entreprise Scribd logo
1  sur  107
Reference Book
CLASS XI
By
Sumita Arora
Chapter 2

WORKING
WITH
OPERATING
SYSTEM
INTRODUCTION
• The Windows operating system users
both mouse and keyboard as input
devices. Interaction with Windows or a
Windows application is most efficient
when options are chosen with a mouse
and characters are entered via the
keyboard.
WHILE WORKING WITH MOUSE
• Point and click the left button to select
an item. A selected item is highlighted
in some way. Selection of an item does
not result in the initiation of a process.
• Point and double click left mouse button
to choose an item. When you choose
an item, some kind of action occurs.
Click:
Press and
release the
left mouse
button once.

Double click:
Quickly release
the left mouse
button twice

Right cick :
Press and release
the tight mouse
button once. A
shortcut menu
appears
WHILE WORKING WITH MOUSE
• Right –click (press and release the right
mouse button )to display the shortcut
menu [fig .] A shortcut menu is a menu
that shows the most frequency used
commands for that selected file or folder
for which the mouse has been right
clicked.
WHILE WORKING WITH
MOUSE
• Point and drag press mouse button and
while pressing move to another location
and then release the mouse button )to
move or resize a window on the display
screen .[fig]
Point and drag
While working with the keyboard
•

Activate the current menu by typing ALT key

• Enter the underlined letter of the menu option in
the active menu to choose that option
While working with the keyboard
• Arrow key may be used to highlight
menu options
• Shortcut keys (a key or a key
combination. E.g. alt +f4 for closing an
application )can be used to issue
commands within a particular activating
a menu .
Windows
Windows is one of the most popular
GUI operating system of today ‘s world . It
has got some very useful features that
add to its user friendliness . Let us learn
about them one by one .
The Desktop
• The word ‘desktop’ has been derived from
real life desk top where a manager puts
all the things required by her . For
instance on the desktop ,there may be a
pen stand ,notepad ,calculator , file folder
etc. lying , which are required by the
manager. The desktop of a windows also
serves the same purpose.
The Desktop
In windows operating system, the screen
upon which icons, Windows, etc… are
displayed is known as desktop. The windows
operating system desktop may contain a
background, one or more active or inactive
windows, a taskbar, and icons (fig.) A
background can be anything from a singlecolor screen to an elaborate artistic image All
windows and icons are superimposed on the
background, whatever it may be.
Window’s OS
Desktop displaying
screen
The Windows
A window is a typical rectangular area
pertaining to an application or a document
or a dialogue fig.
Example – Microsoft Word
•

Hi I am one of the
document window of
word
The Application Window
• An application window contains an open
application i.e., running application such as
Word or Paint .Several application window
can be running simultaneously ,but there is
only one active window at any given time [fig]
• A application window has many element :the
title bar ,the menu bar ,the workspace ,the
scroll bars ,and corners and borders. Each of
these is being described in the following lines.
The Title Bar
• It is the topmost horizontal bar of each
application window and it contains the title
of the open window .Apart from the title ,it
has several other elements also viz.
application icon , active file name
,minimize button , maximize /restore
button and exit button.
The Application Icon
• It is the icon representing the open
application . When
you click at
application icon ,a pull-down control
menu appears which is also called
system menu (fig ) Control menu option
vary .depending upon the type of
application being displayed in the
window
Maximize /Restore
• This button (fig) is used to restore an
enlarged window to its previous size or
vice versa.
Minimize
• This button shrinks the active window to
a button
TYPES OF SOFTWARE
• HARDWARE: It represents the physical
and tangible components of the
computer that can be seen and touch.
ex. CPU, mouse, keyboard etc.
Software: It is the set of programs that
governs the computer and make the
hardware run.
It is classified into two
categories
1.System Software
2.Application Software
System Software
• The software that controls internal
computer operations is called System
Software.
• It is further classified into two categories :
1. Operation System
2. Language Processor
OPERATING SYSTEM
• An operating system is a program which
acts as an interface between a user and
the hardware. (i.e. all computer
resources).
• It is just like our secretary. As the boss
give order the secretary does all the
work for his boss. It itself decides How to
do and what to do ?
OPERATING SYSTEM
• The primary goal of the operating
system is thus to make the computer
system convenient to use and
secondary goal is to use computer
hardware in an efficient manner.
TYPES OF OPERATING
SOFTWARE
1. Single Program OS
2. Multiprogramming OS
3.Time sharing OS
4.Real time OS
5.Multiprocessing OS
6.Interactive OS
Single Program OS & Multi
Program OS
1.Single program OS: It is single user
operating system thus one user
program can be supported and
executed at a time .
2.Multiprogram
OS:
It
supports
multiprogramming so more than one
user can be supported by it .
3.Time sharing OS
• This OS uses the time sharing
technique. Each active user program is
given a fair share of CPU time (&),if the
time elapses or an I/o operation is
requested ,CPU shifts over to the next
job waiting and the previous program is
put to wait .The active programs are
scheduled for execution using certain
job scheduling technique .
4. Real Time OS
• In real time OS ,the jobs have fixed deadlines
and the jobs have to be completed within
their deadlines .The system performance is
measured by its ability to complete its jobs
within the specified deadlines . If a fob cannot
be cannot be completed within its deadline,
this situation is called Deadline Overrun. An
efficient real Os is that which gives minimum
possible deadlines overruns .
5.Multiprocessing Os
• The multiprocessor Os is capable of handling
more than one processors as the jobs have to
be executed on more than one processor .
The multiprocessing Os should be capable of
Loadsharing in case of identical processors
so that the system’s efficiency improves. In
case
of
unidentical
processors
,the
multiprocessing Os should be able to control
the super (main ) processor and in turn
control the working of slave processors .
6.Interactive Os
• These Operating Systems are interactive
in nature . These provide GUI interface to
facilitate move and easy interaction to the
user . You will learn more about GUI
interface and a GUI operation system a
little later in this chapter .
LANGUAGE PROCESSORS
The Language processor are given below :
1.Assembler
2.Interpreter
3.Compiler
(we use interpreter and compiler because it
gives the combination for HLL (high level
language )
Application software
An application software is a set of programs
necessary to carry out operation for a specified
application .
These are the programs by programmers to
enable computer to perform a specified task
such as processing words , inventory control ,
handling calculations and figures , medical
software , etc.
It is further subdivided into
three categories :
1.Packages
2.Utilities
3.Customized software.
Packages
As applications may be numerous
(from thousands to millions of them ), it
is not feasible to design software for
each one of them. Rather some general
software are designed that may be
used by individual users in the manner
it suits their needs and requirement .
Such general-application software are
known as packages.
Some major common
categories of packages
are:
1.Word Processing Software
2.Spreadshits
3.Database Management System
4.Desktop Management System
5.Graphics, multimedia ,and presentation
applications.
1.Word Processing Software
Word Processing Package is a
package that processes textual matter
and
organized
and
flawless
documents .
2. Spreadsheets
An electronic Spreadsheet is a program
that accepts data in a tabular form (in
rows or columns ) and allows users to
manipulate/calculate/analyze data in the
desired manner.
Database Management
System ( D B M S )
A database management system
(DBMS) is a package that can handle
and manage bulk of stored data.
Desktop Publishing Software
The software that handles page
layout by combining the function of a
traditional typesetter and a layout artist
is known as Desktop Publishing
Software
Graphic software
The application software that
manipulates images is known as
Graphic software and the software
that incorporates images, text, sound,
computer
animation
and
video
sequences is known as Multimedia
Software.
Presentation Graphic Software
The application software that can create
professional looking visual aids is called
Presentation Graphic Software
Utilities
Utilities are those application program
that assist the computer by performing
housekeeping functions like backing up
disk or scanning /cleaning viruses or
arranging information etc.
Some important utilities are:
1.Text Editor.
2.Backup Utility.
3.Compression Utility.
4.Disk Defragmenter.
5.Antivirus Software.
Customized Software.
Customized software
This type of software is tailor made
software according to a user ‘s
requirement .The type of software is
developed to meet all the requirements
specified by the user.
Operating system
An operating system is a program
which acts as an interface between a
user and the hardware (i.e. all computer
resources)
Types of Services
The operating system provides certain
services to programs and to the users
of the programs. Some common
services provided by operating can be
listed as follows:
Types of Service
1.Program Execution
2.Handling Input/output operation
3.Manipulations of file system
4.Error detection and handling
5.Resource Allocation
6.Accounting
7.Information and Resource Protection
1.Program execution
The operating is responsible for
execution various programs whether
user programs or system programs i.e.
special programs required for the
machine handling .
2.Handling Input/output
Operation

The operating system is responsible for
handling various types of inputs (e.g.
inputs from keyboard, inputs from mouse
etc.) and various types of outputs in the
appropriate manner.
For instance if the input is coming
from mouse then it is different from that of
keyboard and so for others.
3.Manipulations of file system
This task involves the making of
decisions regarding the storage of files i.e.
where (whether on floppy disk or hard disk
etc.) and how a particular file is to be
stored .
4.Error Detection and
Handling
The Operating system is also
responsible for detecting and type of
error that occurs and then properly
handle it.
5.Resource Allocation
This task aims at proper use of
resources available . For example, if
multiple files are to be printed then “how
and in which order this task will take
place ?” will be decided by the operating
system.
6.Accounting
The operating system keeps an
account of what type of functioning is
taking place and what type of error have
taken occurred .
7.Information and Resource
Protection
The operating system is responsible
for ensuring that the information and
resources available on machine are
used in the correct way . The operating
system foils the attempts to use them
incorrectly .
Operating System’s Function
Operating system functions broadly fall
into three categories
• Essential Functions
• Monitoring Functions
• Service Functions.
Major OS Functions
 Process Management
 Storage (Memory) Management
 Information Management
Process Management
Managing a process or processor
i.e. the CPU. This is also termed as
CPU scheduling.
Multiprogramming , undoubtedly,
improves the overall efficiency of the
computer system by getting more
work done in less time as the CPU
may be shared among a number of
active programs which are presents in
the memory at the same time .
Process Management
While CPU is executing a job , it has
to wait for the job ;if the job requires certain
I/O operation , the CPU waits for the I/o
operation to get over and that wait time is
CPU’S idle time . In place of making CPU
sit idle , another job takes over the use of
CPU , increasing efficiency thereby and
reducing CPU idle time .
The benefits of multiprogramming
are as follows:
1.Increased CPU utilization

2.Higher total job throughput
Throughput:
It is the amount of work accomplished in a given time
interval (e.g.15 jobs per hour.
Throughput is an important measure of system
performance. It is calculated as follows:
Throughput=

The number of jobs completed
Total time taken to complete the jobs

Another important factor that influences through is
priority assign to different jobs i.e. job scheduling .
Job scheduling
Job scheduling not only assign to jobs
but also admits new jobs for processing
at appropriate times . Before we start
with job scheduling techniques , let us
first understand basic terminology.
Program
It is a set of instructions submitted to
computer . Process is a program in
execution. Job and process are the
terms
which
are
almost
used
interchangeably.
Process State
A process is a program in execution .
During execution , the process changes its
current activity . A process can have these
states :new ,active, waiting or halted (fig).
Process States
new

active

Waiting

halted
Process Control Block

Each process in the OS by a data block
called Process Control Block.
A PCB contains following
information (fig)
1.Process state
2.Program counter : It indicates the
address of next instruction to be
executed .
3.CPU register
4.Memory limits
5.List of open files
Process Control Block
Pointer

process state
process number
process counter
register
memory limits
list of open files
Scheduling Techniques
Many factors determine which
scheduling technique should be
used in order to have the best
possible results .
The criteria are as follows :
(a) CPU Utilization: There should be
maximum possible CPU utilization.
(b) Turnaround time: There should be
minimum possible turnaround time .
(c) Waiting time : System should give
fastest responsible time .
(d) Throughput: Throughput should be
maximum possible .
There are two type of
scheduling
1.Non-preemptive scheduling.
2.Preemptive scheduling.
1.Non-preemptive scheduling
In this type of scheduling , a scheduled job
always completes before another scheduling
decision is made .Therefore ,finishing order of
the jobs is also same as their scheduling
order .
Its type are:
1.First come first served (FCPS) scheduling
2.Shortest job next (SJN) scheduling .
3.Deadline scheduling
1.First Come First Served
(FCFS) scheduling
This is the simplest scheduling technique which is
managed by FIFO (First in first out) .That is , the process
, which requests the CPU first , is allocated the CPU first.
A queue is maintained called ready queue in which all
the processes , that want CPU time is entered. The CPU
executes the jobs in the ready queue one by one . Batch
processing is one obvious example of FCFS scheduling
in which all the jobs in the batch are executed one by
one .But turnaround time for the very first job in the batch
is the best and for the very last job, it is worst .
(Turnaround time is the delay between job submission
and job completion).
Shortest Job Next (SJN)
scheduling
• In SJN scheduling , whenever a new job is
to be admitted , the shortest of the arrived
jobs is selected and given to CPU time .
Throughput remain the same as in FCFS
scheduling but waiting time improves .
SJN associates with each job the length of
its next CPU burst. (CPU burst is the CPU
time requires by a job to execute its
continuous executable part.).
Deadline Scheduling
In deadline scheduling, the job with the earliest
deadline is selected for scheduling . Deadline of
a job is the time limit within which a job must be
over. If a job overshoots its deadline , it is said
to be Deadline over run . Deadline over run is
calculated as
k=c-d
Where k is deadline overrun ;c is a job
completion time and D is deadline for a job.
Erratic behavior might result if reliable deadline
data is not available .
Preemptive Scheduling
In contrast to non-preemptive scheduling , a
scheduling decision can be made even while the
job is executing whereas in non-preemptive
scheduling , a scheduling decision is made only
after job completes its execution. Therefore ,
preemptive scheduling may force a job in execution
to release the processor , so that execution of other
job can be undertaken , in order to improve
throughput considerably . The techniques which
use preemptive scheduling are:
1.Round robin scheduling
2.Response ratio scheduling
Round Robin
Scheduling
Round robin (RR) scheduling is aimed at
giving all programs equal opportunity to make
progress . This is implemented by ensuring that no
program gets a second opportunity to execute
unless all other programs have had at least one
opportunity . A small unit of time , called a time
quantum or time slice, is defined. The ready
queue (queue of programs waiting for CPU time)
is treated as a circular queue . The programs in
the ready queue is processed for the defined time
slice , one by one.
2.Response Ratio Scheduling
 Response ratio is calculated as follows:
 Response Ratio=

Elapsed Time
Execution time received

The job with highest response ratio is preferred
over others. When a short job arrives , its response
ratio is high , so it is scheduled for execution
immediately . A longer job would achieve high
enough ratio only after a subsequent wait .
STORAGE MANAGEMENT
CPU

Memory

I/O system

 Memory is a large array of words or bytes,
each with its own address. The CPU reads
from & writes to specific memory address.
 A program must be assigned some memory
area & loaded into memory in order to be
executed. When program terminates, its
memory space is declared free.
Contiguous Storage
Allocation
Each problem that is to be executed is
allocated a contiguous storage memory.
Each job step is considered as a single
independent entity for allocation of a
contiguous storage area. At every job step
initiation, OS has to ensure that enough
contiguous
area
is
available
to
accommodate it.
Non Contiguous
Storage Allocation
 A program is divided into smaller components of
equal sizes. One or more components can be
stored in non contiguous memory areas. Each
component in that particular memory area is
provided addresses 0,1,2,….n
 Say a program that requires 90k is divided into
smaller components of 10k. Then we store 4
components in 1st free memory area & 5 in next
free memory area.
Non Contiguous
Storage Allocation
 Virtual storage is a technique that
helps to execute a program even if all
of it is not loaded in memory.2 main
approaches to it are: Program-paging
 Program-segmentation
Virtual Storage Using
PAGING
 Each program is split into fixed size program components called
pages. Pages in a program & words in a page, both are numbered
from 0……n ,their logical address.
 Range of logical address is called as virtual address space or
logical address space.
 Range of main storage address is referred to as physical address
space.
 The physical or main memory is broken into fixed-size blocks called
”frames”
 For a program execution, its pages are loaded into any available
frames & the page table (also called page map table (PMT)) is
defined to translate from user pages to memory frames .
 PMT stores on entry for every program page which contain the
frame (storage block) number where the page presently resides .
Virtual Storage Using
PAGING
In order to execute a program ,
some pages of it are loaded in the main
memory depending upon the storage
availability . During its execution, the
program generation page number which
is mapped to find its physical location
and then the page is accessed .
Virtual Storage Using
PAGING
address

page 0
21,115
21,725
22,100
22,405
23,015
23,525
24,000

Page no.
1

c
D
page 1
page 2
page 3
physical memory

0

21,115

1

22,405

2

23,015

3

24,000
Page map table
(PMT)
Explanation
 When a required page is not in the main storage , an interrupt
, known as missing page interrupt is raised.
 This fault is popularly called a page fault. The Os now takes
action by bringing the required page from the secondary
storage into an empty page block , this operation is called
page in.
 After page in , PMT entry is modified and new entrant page’s
physical address is also stored in it and then the execution
resumes .
 What if no entry storage block is available ? In such a
situation , a storage block is vacated by moving out a page
from main storage to secondary storage (process called page
out). The reading and writing of pages determines page
traffic.
Virtual Storage Using
Segment

 It differs from paging because it makes the use of program
segments.
 Program segment : It is a logical unit of a program as defined
by a programmer or it is a piece of program logic which
performs a specific task.
 Responsibility lies on the programmer only for determining
how many segments a program should have or which
program units should comprise a segment.
 For accessing a particular word in the segment , its logical
address consists of two parts:
1.segment number
2.word number
Virtual Storage Using
Segment ‘segment table’
 This segment number is mapped on to
to get physical address of the segment and by the
word’s identification number , physical or actual
address of the word is found out.
 Address Transformer Unit , is responsible for
generation of actual address of the required word
within the segment .
 In the same way (as that of paging ), segments in the
memory are processed and if a segment is not
available in then memory , segment missing fault
interrupt is raised. So there is a similarity between the
both .
Virtual Storage Using
Segment

To increase the efficiency of a system

sometimes paging and segmentation is
combined. A large segments can be broken into
pages. A segment obviously would be stored in
contiguous area.
 Now within this paging can be implemented,
making ‘swapping’ possible.
Information Management
Information Management Component :
It manages the information which is an
important task of OS .
This
information
management
component of Os is structured as
follows :
1.Physical IOCS

(input-output control

system)

It
is
responsible
for
DEVICE
MANAGEMENT and for ensuring DEVICE
INDEPENDENCE. It provides a basic
capability for the programs to perform their
own IO, without involving themselves with
the intricacies of device handling.
2. Logical IOCS
It
is
responsible
for
efficient
organization and access of data on IO
devices. It provides basic capabilities
for file definition, choice of data
organization and access methods.
File system: It is responsible for
protection and controlled sharing of
files.
The Physical IOCS and IO
Organization
File system
Logical IOCS
Physical IOCS
Computer Hardware

Figure:

Hierarchy of information management modules
The Physical IOCS and
IO Organization

Each I/O channel, its control units and
devices on them in the system are given
unique codes recognized by the hardware.
Thus a device is uniquely identified by a
device address which consists of three
addresses: for I/O channel, control unit
and devices , (CH,CU, Dev). Steps in the
execution of an I/O operation are as
follows:
I/O Initiation
 It starts with issuing of a CPU instruction
called ‘start IO’. This ‘start IO’ instruction
provides the device address (ch, cu, dev) for
the required device.
 The CPU identifies the concerned channel,
control unit of the devices and the device
through the component address (ch,cu,dev)
Device Selection
 The concerned channel then checks the device to see
whether it is available or not . This process is called device
selection. If device selection is successful, success condition
code is set in PSR (register that stores CPU state) and IO
instruction’s execution starts
 If device selection fails (because of device’s non availability if
it is busy doing some other operation ,or hardware
malfunction ), ’start IO’ is terminated and ‘failure’ condition
code is set in PSR . CPU now determines which action should
be taken viz. retry the operation , cancel the program which
want IO, or switch to execution of another program.
I/O instruction execution
If the required device is available ,I/O
channel reads the I/O instructions from the
program in the main storage and then sets
up the execution of I/O operation on the
designated device.
I/O Termination

 At the end of the I/O operation's) , the designated
device raises an interrupt for the both type of ends:
Successful and unsuccessful . IO termination interrupt
provides following information on the CPU:
 (i) device address of the device raising the interrupt
condition ,
 Status flags indicating :
(a) IO termination type
(b) error message if any.
 The interrupt handling routine then takes action by
analyzing status and by invoking error recovery
procedure (if required).
CPU
I/O channel
CU
Main storage

I/O channel

D1

CU
D2

D3

CU

CU

D4

D5

CU-control unit
D’s-Devices
Role of the Physical
IOCS
Physical IOCS integrates all the Os
responsibilities like making IO sequence fort
a problem
by taking over device
management functions.
Physical IOCS provides device- level
error recovery routines which can be easily
invoked when a recoverable error occurs.
Thus , the problem has only to issue an I/O
request and rest would be handled by
Physical IOCS.
Role of the Physical
IOCS
When an I/O operation is requested by a
program (process ), physical IOCS initiates
IO in the above explained manner , marks
the process state as blocked and frees the
CPU for other computations , thus makes
multiprogramming feasible .Physical IOCS
also ensures protection to the programs from
undue interference during I/O operation is
being carried out.
Role of the Physical
IOCS
 Thus Physical IOCS makes the entire I/O
sequence operation ‘transparent’ to the
problem program.
 Transparency: It means that the only thing
to be issued by the program is the request
/order/command for it and rest all internal
operations are done by the control program
(physical IOCS in the case) without making it
visible to the problem program.
Logical IOCS

 The creation and access of the files are facilitated by
the logical IOCS through file level commands viz.
Open a file , read a record, delete a record, etc. Three
– wayed help is provided for the user.
 1. The programmer need not know physical IOCS
intricate details of I/O device, channel , control unit of
the device.
 2.The programmer need not know physical IOCS
interface, its details and handling.
 3. The programmer need not know how an I/O is to be
performed.
File System
File system’s function is to facilitate easy
creation, storage and access of files in
order to enable easy sharing of files
between programs and their protection
against illegal access.
The Major Function of a FILE
SYSTEM are given below:
It provides file naming freedom to the
users and permits controlled sharing of
files (protection).
Provides long and short term storage of
files .
Provides security against loss of
information due to system
failure(security).
THANK
YOU

Contenu connexe

Tendances

Transforming data into information
Transforming data into informationTransforming data into information
Transforming data into informationMaryam Fida
 
Introduction to Operating system CBSE
Introduction to Operating system CBSE Introduction to Operating system CBSE
Introduction to Operating system CBSE PrashantChahal3
 
Bba i-introduction to computer-u-3-functions operating systems
Bba  i-introduction to computer-u-3-functions operating systemsBba  i-introduction to computer-u-3-functions operating systems
Bba i-introduction to computer-u-3-functions operating systemsRai University
 
Fundamentals of operating system
Fundamentals of operating systemFundamentals of operating system
Fundamentals of operating systemJayesh Chauhan
 
Operating systems basics (Graphical User Interfaces (GUIs) GUI Tools Applic...
Operating systems basics (Graphical User Interfaces (GUIs)  GUI Tools  Applic...Operating systems basics (Graphical User Interfaces (GUIs)  GUI Tools  Applic...
Operating systems basics (Graphical User Interfaces (GUIs) GUI Tools Applic...Maryam Fida
 
Introduction to Operating System
Introduction to Operating SystemIntroduction to Operating System
Introduction to Operating SystemDivya S
 
Operating System-Introduction
Operating System-IntroductionOperating System-Introduction
Operating System-IntroductionShipra Swati
 
Operating system: COMPUTER
Operating system: COMPUTEROperating system: COMPUTER
Operating system: COMPUTERAbhisingh274
 
Operating system
Operating systemOperating system
Operating systemyogitamore3
 
Operating System - Types Of Operating System Unit-1
Operating System - Types Of Operating System Unit-1Operating System - Types Of Operating System Unit-1
Operating System - Types Of Operating System Unit-1abhinav baba
 
OS - Operating System
OS - Operating System OS - Operating System
OS - Operating System MaqdamYasir
 
Operating system introduction to operating system
Operating system   introduction to operating systemOperating system   introduction to operating system
Operating system introduction to operating systemjaydeesa17
 
Presentation on Operating System & its Components
Presentation on Operating System & its ComponentsPresentation on Operating System & its Components
Presentation on Operating System & its ComponentsMahmuda Rahman
 

Tendances (20)

Transforming data into information
Transforming data into informationTransforming data into information
Transforming data into information
 
Operating System
Operating SystemOperating System
Operating System
 
Introduction to Operating system CBSE
Introduction to Operating system CBSE Introduction to Operating system CBSE
Introduction to Operating system CBSE
 
Bba i-introduction to computer-u-3-functions operating systems
Bba  i-introduction to computer-u-3-functions operating systemsBba  i-introduction to computer-u-3-functions operating systems
Bba i-introduction to computer-u-3-functions operating systems
 
Types of computer
Types of computerTypes of computer
Types of computer
 
Fundamentals of operating system
Fundamentals of operating systemFundamentals of operating system
Fundamentals of operating system
 
Operating systems basics (Graphical User Interfaces (GUIs) GUI Tools Applic...
Operating systems basics (Graphical User Interfaces (GUIs)  GUI Tools  Applic...Operating systems basics (Graphical User Interfaces (GUIs)  GUI Tools  Applic...
Operating systems basics (Graphical User Interfaces (GUIs) GUI Tools Applic...
 
operating system
operating systemoperating system
operating system
 
Introduction to Operating System
Introduction to Operating SystemIntroduction to Operating System
Introduction to Operating System
 
Operating System-Introduction
Operating System-IntroductionOperating System-Introduction
Operating System-Introduction
 
Operating system: COMPUTER
Operating system: COMPUTEROperating system: COMPUTER
Operating system: COMPUTER
 
Operating system
Operating systemOperating system
Operating system
 
Operating System - Types Of Operating System Unit-1
Operating System - Types Of Operating System Unit-1Operating System - Types Of Operating System Unit-1
Operating System - Types Of Operating System Unit-1
 
OS - Operating System
OS - Operating System OS - Operating System
OS - Operating System
 
Operating system
Operating systemOperating system
Operating system
 
Operating system introduction to operating system
Operating system   introduction to operating systemOperating system   introduction to operating system
Operating system introduction to operating system
 
Types of o.s
Types of o.sTypes of o.s
Types of o.s
 
OS
OSOS
OS
 
Computer system
Computer systemComputer system
Computer system
 
Presentation on Operating System & its Components
Presentation on Operating System & its ComponentsPresentation on Operating System & its Components
Presentation on Operating System & its Components
 

En vedette

DOS Operating System
DOS Operating SystemDOS Operating System
DOS Operating SystemAnjan Mahanta
 
13a.Computer Systems Extra Input
13a.Computer Systems   Extra Input13a.Computer Systems   Extra Input
13a.Computer Systems Extra InputNew Era University
 
Fy bms- I SEM it ppt
Fy bms- I SEM it pptFy bms- I SEM it ppt
Fy bms- I SEM it pptAkash Varaiya
 
15. Computer Systems Basic Software 1
15. Computer Systems   Basic Software 115. Computer Systems   Basic Software 1
15. Computer Systems Basic Software 1New Era University
 
The Death of TV? Hardly...
The Death of TV? Hardly...The Death of TV? Hardly...
The Death of TV? Hardly...Steve Weaver
 
Fall2010 quinnedu261syllabus
Fall2010 quinnedu261syllabusFall2010 quinnedu261syllabus
Fall2010 quinnedu261syllabusPeggy Quinn
 
London2012: Learnings on How Australians Consumed The Games
London2012:  Learnings on How Australians Consumed The GamesLondon2012:  Learnings on How Australians Consumed The Games
London2012: Learnings on How Australians Consumed The GamesSteve Weaver
 
Vacanze studio edimburgo 2008
Vacanze studio edimburgo 2008Vacanze studio edimburgo 2008
Vacanze studio edimburgo 2008dany
 
Commnunication ports and memory card chapter 1
Commnunication ports and memory card chapter 1Commnunication ports and memory card chapter 1
Commnunication ports and memory card chapter 1Mukesh Thakur
 
La riforma scolastica
La riforma scolasticaLa riforma scolastica
La riforma scolasticaandymene
 
Awal sebelum membeli rumah
Awal sebelum membeli rumahAwal sebelum membeli rumah
Awal sebelum membeli rumahRahmatian Zaleh
 
LGO Presentation (25.1.2012)
LGO Presentation (25.1.2012)LGO Presentation (25.1.2012)
LGO Presentation (25.1.2012)Michael Hill
 
Palestra mercado adulto para e commerce e-show maio 2014
Palestra mercado adulto para e commerce e-show maio 2014Palestra mercado adulto para e commerce e-show maio 2014
Palestra mercado adulto para e commerce e-show maio 2014Solange Oliveira
 
ScalaDays Amsterdam - Don't block yourself
ScalaDays Amsterdam - Don't block yourselfScalaDays Amsterdam - Don't block yourself
ScalaDays Amsterdam - Don't block yourselfFlavio W. Brasil
 
Mwise Portfolio
Mwise PortfolioMwise Portfolio
Mwise Portfoliomwise921
 
Hunting snake
Hunting snakeHunting snake
Hunting snakegabitaa8
 
Social TV and the Rise of Companion Screens
Social TV and the Rise of Companion ScreensSocial TV and the Rise of Companion Screens
Social TV and the Rise of Companion ScreensSteve Weaver
 

En vedette (20)

DOS Operating System
DOS Operating SystemDOS Operating System
DOS Operating System
 
13a.Computer Systems Extra Input
13a.Computer Systems   Extra Input13a.Computer Systems   Extra Input
13a.Computer Systems Extra Input
 
Fy bms- I SEM it ppt
Fy bms- I SEM it pptFy bms- I SEM it ppt
Fy bms- I SEM it ppt
 
15. Computer Systems Basic Software 1
15. Computer Systems   Basic Software 115. Computer Systems   Basic Software 1
15. Computer Systems Basic Software 1
 
The Death of TV? Hardly...
The Death of TV? Hardly...The Death of TV? Hardly...
The Death of TV? Hardly...
 
Fall2010 quinnedu261syllabus
Fall2010 quinnedu261syllabusFall2010 quinnedu261syllabus
Fall2010 quinnedu261syllabus
 
London2012: Learnings on How Australians Consumed The Games
London2012:  Learnings on How Australians Consumed The GamesLondon2012:  Learnings on How Australians Consumed The Games
London2012: Learnings on How Australians Consumed The Games
 
Vacanze studio edimburgo 2008
Vacanze studio edimburgo 2008Vacanze studio edimburgo 2008
Vacanze studio edimburgo 2008
 
Commnunication ports and memory card chapter 1
Commnunication ports and memory card chapter 1Commnunication ports and memory card chapter 1
Commnunication ports and memory card chapter 1
 
La riforma scolastica
La riforma scolasticaLa riforma scolastica
La riforma scolastica
 
The Space Corps Vision
The Space Corps VisionThe Space Corps Vision
The Space Corps Vision
 
Awal sebelum membeli rumah
Awal sebelum membeli rumahAwal sebelum membeli rumah
Awal sebelum membeli rumah
 
LGO Presentation (25.1.2012)
LGO Presentation (25.1.2012)LGO Presentation (25.1.2012)
LGO Presentation (25.1.2012)
 
Palestra mercado adulto para e commerce e-show maio 2014
Palestra mercado adulto para e commerce e-show maio 2014Palestra mercado adulto para e commerce e-show maio 2014
Palestra mercado adulto para e commerce e-show maio 2014
 
ScalaDays Amsterdam - Don't block yourself
ScalaDays Amsterdam - Don't block yourselfScalaDays Amsterdam - Don't block yourself
ScalaDays Amsterdam - Don't block yourself
 
Mwise Portfolio
Mwise PortfolioMwise Portfolio
Mwise Portfolio
 
Horses
HorsesHorses
Horses
 
Hunting snake
Hunting snakeHunting snake
Hunting snake
 
Social TV and the Rise of Companion Screens
Social TV and the Rise of Companion ScreensSocial TV and the Rise of Companion Screens
Social TV and the Rise of Companion Screens
 
Repentance
RepentanceRepentance
Repentance
 

Similaire à 2 working with operating system

Operating Systems Basics
Operating Systems BasicsOperating Systems Basics
Operating Systems Basicsnishantsri
 
Operating Systems and windows for students
Operating Systems and windows for studentsOperating Systems and windows for students
Operating Systems and windows for studentspsaramago1
 
Operating Systems and Windows 2
Operating Systems and Windows                                2Operating Systems and Windows                                2
Operating Systems and Windows 2ManojRaghuvanshi2
 
system software and application software
system software and application softwaresystem software and application software
system software and application softwareTallat Satti
 
BASIC COMPUTER PUBLIC HEALTH.pptx
BASIC COMPUTER PUBLIC HEALTH.pptxBASIC COMPUTER PUBLIC HEALTH.pptx
BASIC COMPUTER PUBLIC HEALTH.pptxAlimamyGhassan
 
Windows 7 part 1
Windows 7 part 1Windows 7 part 1
Windows 7 part 1JAIDEVPAUL
 
LESSON-2.pptx
LESSON-2.pptxLESSON-2.pptx
LESSON-2.pptxARDEN16
 
System Softwares
System SoftwaresSystem Softwares
System Softwaresnshnt_snghl
 
Computer software and operating system.pptx
Computer software and operating system.pptxComputer software and operating system.pptx
Computer software and operating system.pptxAayushAryal2
 
System software and operating system
System software and operating systemSystem software and operating system
System software and operating systemdhruv bhandari
 
Introduction to computers 2
Introduction to computers 2Introduction to computers 2
Introduction to computers 2Heather Lambert
 
OPERATING SYSTEM.pdf
OPERATING SYSTEM.pdfOPERATING SYSTEM.pdf
OPERATING SYSTEM.pdfDOptimist1
 
C PROGRAMING AND PC
C PROGRAMING AND PCC PROGRAMING AND PC
C PROGRAMING AND PC4044uday
 

Similaire à 2 working with operating system (20)

OperatingSystem.pdf
OperatingSystem.pdfOperatingSystem.pdf
OperatingSystem.pdf
 
Operating Systems Basics
Operating Systems BasicsOperating Systems Basics
Operating Systems Basics
 
Operating Systems and windows for students
Operating Systems and windows for studentsOperating Systems and windows for students
Operating Systems and windows for students
 
ppt_os.pptx
ppt_os.pptxppt_os.pptx
ppt_os.pptx
 
ppt_os.pptx
ppt_os.pptxppt_os.pptx
ppt_os.pptx
 
Operating Systems and Windows 2
Operating Systems and Windows                                2Operating Systems and Windows                                2
Operating Systems and Windows 2
 
system software and application software
system software and application softwaresystem software and application software
system software and application software
 
BASIC COMPUTER PUBLIC HEALTH.pptx
BASIC COMPUTER PUBLIC HEALTH.pptxBASIC COMPUTER PUBLIC HEALTH.pptx
BASIC COMPUTER PUBLIC HEALTH.pptx
 
Computer Fundamental
Computer Fundamental Computer Fundamental
Computer Fundamental
 
Windows 7 part 1
Windows 7 part 1Windows 7 part 1
Windows 7 part 1
 
LESSON-2.pptx
LESSON-2.pptxLESSON-2.pptx
LESSON-2.pptx
 
C program full materials.pdf
C program  full materials.pdfC program  full materials.pdf
C program full materials.pdf
 
SOFTWARE PARADIGM
SOFTWARE PARADIGMSOFTWARE PARADIGM
SOFTWARE PARADIGM
 
System Softwares
System SoftwaresSystem Softwares
System Softwares
 
Computer software and operating system.pptx
Computer software and operating system.pptxComputer software and operating system.pptx
Computer software and operating system.pptx
 
System software and operating system
System software and operating systemSystem software and operating system
System software and operating system
 
Software 3
Software 3Software 3
Software 3
 
Introduction to computers 2
Introduction to computers 2Introduction to computers 2
Introduction to computers 2
 
OPERATING SYSTEM.pdf
OPERATING SYSTEM.pdfOPERATING SYSTEM.pdf
OPERATING SYSTEM.pdf
 
C PROGRAMING AND PC
C PROGRAMING AND PCC PROGRAMING AND PC
C PROGRAMING AND PC
 

Plus de Mukesh Thakur

C++ Data Structure PPT.ppt
C++ Data Structure PPT.pptC++ Data Structure PPT.ppt
C++ Data Structure PPT.pptMukesh Thakur
 
C++ Data Structure PPT.pptx
C++ Data Structure PPT.pptxC++ Data Structure PPT.pptx
C++ Data Structure PPT.pptxMukesh Thakur
 
Constitutional Articles_2.pptx
Constitutional Articles_2.pptxConstitutional Articles_2.pptx
Constitutional Articles_2.pptxMukesh Thakur
 
world_bank 01-11-2018.ppt
world_bank 01-11-2018.pptworld_bank 01-11-2018.ppt
world_bank 01-11-2018.pptMukesh Thakur
 
Sunil GOOD GOVERNANCE.pptx
Sunil GOOD GOVERNANCE.pptxSunil GOOD GOVERNANCE.pptx
Sunil GOOD GOVERNANCE.pptxMukesh Thakur
 
Why reading is important .pptx
Why reading is important .pptxWhy reading is important .pptx
Why reading is important .pptxMukesh Thakur
 
Presentation PFRDA.pptx
Presentation PFRDA.pptxPresentation PFRDA.pptx
Presentation PFRDA.pptxMukesh Thakur
 
PPT on Time Management.pptx
PPT on Time Management.pptxPPT on Time Management.pptx
PPT on Time Management.pptxMukesh Thakur
 
What is motivation.ppt
What is motivation.pptWhat is motivation.ppt
What is motivation.pptMukesh Thakur
 
FISCAL POLICY.of india.pptx
FISCAL POLICY.of india.pptxFISCAL POLICY.of india.pptx
FISCAL POLICY.of india.pptxMukesh Thakur
 
PUNEET GULERIA Q.NO. 14 FINAL ACCOUNTS.docx
PUNEET GULERIA Q.NO. 14 FINAL ACCOUNTS.docxPUNEET GULERIA Q.NO. 14 FINAL ACCOUNTS.docx
PUNEET GULERIA Q.NO. 14 FINAL ACCOUNTS.docxMukesh Thakur
 
microfince prem.pptx
microfince prem.pptxmicrofince prem.pptx
microfince prem.pptxMukesh Thakur
 
FINANCE COMMISSION.pptx
FINANCE  COMMISSION.pptxFINANCE  COMMISSION.pptx
FINANCE COMMISSION.pptxMukesh Thakur
 

Plus de Mukesh Thakur (20)

C++ Data Structure PPT.ppt
C++ Data Structure PPT.pptC++ Data Structure PPT.ppt
C++ Data Structure PPT.ppt
 
C++ Data Structure PPT.pptx
C++ Data Structure PPT.pptxC++ Data Structure PPT.pptx
C++ Data Structure PPT.pptx
 
Constitutional Articles_2.pptx
Constitutional Articles_2.pptxConstitutional Articles_2.pptx
Constitutional Articles_2.pptx
 
NITI AAYOG.pptx
NITI AAYOG.pptxNITI AAYOG.pptx
NITI AAYOG.pptx
 
world_bank 01-11-2018.ppt
world_bank 01-11-2018.pptworld_bank 01-11-2018.ppt
world_bank 01-11-2018.ppt
 
Sunil GOOD GOVERNANCE.pptx
Sunil GOOD GOVERNANCE.pptxSunil GOOD GOVERNANCE.pptx
Sunil GOOD GOVERNANCE.pptx
 
SEBI.pptx
SEBI.pptxSEBI.pptx
SEBI.pptx
 
Why reading is important .pptx
Why reading is important .pptxWhy reading is important .pptx
Why reading is important .pptx
 
THINKING.pptx
THINKING.pptxTHINKING.pptx
THINKING.pptx
 
Presentation PFRDA.pptx
Presentation PFRDA.pptxPresentation PFRDA.pptx
Presentation PFRDA.pptx
 
PPT on Time Management.pptx
PPT on Time Management.pptxPPT on Time Management.pptx
PPT on Time Management.pptx
 
What is motivation.ppt
What is motivation.pptWhat is motivation.ppt
What is motivation.ppt
 
FISCAL POLICY.of india.pptx
FISCAL POLICY.of india.pptxFISCAL POLICY.of india.pptx
FISCAL POLICY.of india.pptx
 
PUNEET GULERIA Q.NO. 14 FINAL ACCOUNTS.docx
PUNEET GULERIA Q.NO. 14 FINAL ACCOUNTS.docxPUNEET GULERIA Q.NO. 14 FINAL ACCOUNTS.docx
PUNEET GULERIA Q.NO. 14 FINAL ACCOUNTS.docx
 
microfince prem.pptx
microfince prem.pptxmicrofince prem.pptx
microfince prem.pptx
 
SPEED READING.pptx
SPEED READING.pptxSPEED READING.pptx
SPEED READING.pptx
 
monetry policy.pptx
monetry policy.pptxmonetry policy.pptx
monetry policy.pptx
 
FEAR.pptx
FEAR.pptxFEAR.pptx
FEAR.pptx
 
Cryptocurrency.pptx
Cryptocurrency.pptxCryptocurrency.pptx
Cryptocurrency.pptx
 
FINANCE COMMISSION.pptx
FINANCE  COMMISSION.pptxFINANCE  COMMISSION.pptx
FINANCE COMMISSION.pptx
 

Dernier

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Dernier (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

2 working with operating system

  • 3. INTRODUCTION • The Windows operating system users both mouse and keyboard as input devices. Interaction with Windows or a Windows application is most efficient when options are chosen with a mouse and characters are entered via the keyboard.
  • 4. WHILE WORKING WITH MOUSE • Point and click the left button to select an item. A selected item is highlighted in some way. Selection of an item does not result in the initiation of a process. • Point and double click left mouse button to choose an item. When you choose an item, some kind of action occurs.
  • 5. Click: Press and release the left mouse button once. Double click: Quickly release the left mouse button twice Right cick : Press and release the tight mouse button once. A shortcut menu appears
  • 6. WHILE WORKING WITH MOUSE • Right –click (press and release the right mouse button )to display the shortcut menu [fig .] A shortcut menu is a menu that shows the most frequency used commands for that selected file or folder for which the mouse has been right clicked.
  • 7. WHILE WORKING WITH MOUSE • Point and drag press mouse button and while pressing move to another location and then release the mouse button )to move or resize a window on the display screen .[fig]
  • 9. While working with the keyboard • Activate the current menu by typing ALT key • Enter the underlined letter of the menu option in the active menu to choose that option
  • 10. While working with the keyboard • Arrow key may be used to highlight menu options • Shortcut keys (a key or a key combination. E.g. alt +f4 for closing an application )can be used to issue commands within a particular activating a menu .
  • 11. Windows Windows is one of the most popular GUI operating system of today ‘s world . It has got some very useful features that add to its user friendliness . Let us learn about them one by one .
  • 12. The Desktop • The word ‘desktop’ has been derived from real life desk top where a manager puts all the things required by her . For instance on the desktop ,there may be a pen stand ,notepad ,calculator , file folder etc. lying , which are required by the manager. The desktop of a windows also serves the same purpose.
  • 13. The Desktop In windows operating system, the screen upon which icons, Windows, etc… are displayed is known as desktop. The windows operating system desktop may contain a background, one or more active or inactive windows, a taskbar, and icons (fig.) A background can be anything from a singlecolor screen to an elaborate artistic image All windows and icons are superimposed on the background, whatever it may be.
  • 15. The Windows A window is a typical rectangular area pertaining to an application or a document or a dialogue fig.
  • 16. Example – Microsoft Word • Hi I am one of the document window of word
  • 17. The Application Window • An application window contains an open application i.e., running application such as Word or Paint .Several application window can be running simultaneously ,but there is only one active window at any given time [fig] • A application window has many element :the title bar ,the menu bar ,the workspace ,the scroll bars ,and corners and borders. Each of these is being described in the following lines.
  • 18. The Title Bar • It is the topmost horizontal bar of each application window and it contains the title of the open window .Apart from the title ,it has several other elements also viz. application icon , active file name ,minimize button , maximize /restore button and exit button.
  • 19. The Application Icon • It is the icon representing the open application . When you click at application icon ,a pull-down control menu appears which is also called system menu (fig ) Control menu option vary .depending upon the type of application being displayed in the window
  • 20. Maximize /Restore • This button (fig) is used to restore an enlarged window to its previous size or vice versa.
  • 21. Minimize • This button shrinks the active window to a button
  • 22. TYPES OF SOFTWARE • HARDWARE: It represents the physical and tangible components of the computer that can be seen and touch. ex. CPU, mouse, keyboard etc. Software: It is the set of programs that governs the computer and make the hardware run.
  • 23. It is classified into two categories 1.System Software 2.Application Software
  • 24. System Software • The software that controls internal computer operations is called System Software. • It is further classified into two categories : 1. Operation System 2. Language Processor
  • 25. OPERATING SYSTEM • An operating system is a program which acts as an interface between a user and the hardware. (i.e. all computer resources). • It is just like our secretary. As the boss give order the secretary does all the work for his boss. It itself decides How to do and what to do ?
  • 26. OPERATING SYSTEM • The primary goal of the operating system is thus to make the computer system convenient to use and secondary goal is to use computer hardware in an efficient manner.
  • 27. TYPES OF OPERATING SOFTWARE 1. Single Program OS 2. Multiprogramming OS 3.Time sharing OS 4.Real time OS 5.Multiprocessing OS 6.Interactive OS
  • 28. Single Program OS & Multi Program OS 1.Single program OS: It is single user operating system thus one user program can be supported and executed at a time . 2.Multiprogram OS: It supports multiprogramming so more than one user can be supported by it .
  • 29. 3.Time sharing OS • This OS uses the time sharing technique. Each active user program is given a fair share of CPU time (&),if the time elapses or an I/o operation is requested ,CPU shifts over to the next job waiting and the previous program is put to wait .The active programs are scheduled for execution using certain job scheduling technique .
  • 30. 4. Real Time OS • In real time OS ,the jobs have fixed deadlines and the jobs have to be completed within their deadlines .The system performance is measured by its ability to complete its jobs within the specified deadlines . If a fob cannot be cannot be completed within its deadline, this situation is called Deadline Overrun. An efficient real Os is that which gives minimum possible deadlines overruns .
  • 31. 5.Multiprocessing Os • The multiprocessor Os is capable of handling more than one processors as the jobs have to be executed on more than one processor . The multiprocessing Os should be capable of Loadsharing in case of identical processors so that the system’s efficiency improves. In case of unidentical processors ,the multiprocessing Os should be able to control the super (main ) processor and in turn control the working of slave processors .
  • 32. 6.Interactive Os • These Operating Systems are interactive in nature . These provide GUI interface to facilitate move and easy interaction to the user . You will learn more about GUI interface and a GUI operation system a little later in this chapter .
  • 33. LANGUAGE PROCESSORS The Language processor are given below : 1.Assembler 2.Interpreter 3.Compiler (we use interpreter and compiler because it gives the combination for HLL (high level language )
  • 34. Application software An application software is a set of programs necessary to carry out operation for a specified application . These are the programs by programmers to enable computer to perform a specified task such as processing words , inventory control , handling calculations and figures , medical software , etc.
  • 35. It is further subdivided into three categories : 1.Packages 2.Utilities 3.Customized software.
  • 36. Packages As applications may be numerous (from thousands to millions of them ), it is not feasible to design software for each one of them. Rather some general software are designed that may be used by individual users in the manner it suits their needs and requirement . Such general-application software are known as packages.
  • 37. Some major common categories of packages are: 1.Word Processing Software 2.Spreadshits 3.Database Management System 4.Desktop Management System 5.Graphics, multimedia ,and presentation applications.
  • 38. 1.Word Processing Software Word Processing Package is a package that processes textual matter and organized and flawless documents .
  • 39. 2. Spreadsheets An electronic Spreadsheet is a program that accepts data in a tabular form (in rows or columns ) and allows users to manipulate/calculate/analyze data in the desired manner.
  • 40. Database Management System ( D B M S ) A database management system (DBMS) is a package that can handle and manage bulk of stored data.
  • 41. Desktop Publishing Software The software that handles page layout by combining the function of a traditional typesetter and a layout artist is known as Desktop Publishing Software
  • 42. Graphic software The application software that manipulates images is known as Graphic software and the software that incorporates images, text, sound, computer animation and video sequences is known as Multimedia Software.
  • 43. Presentation Graphic Software The application software that can create professional looking visual aids is called Presentation Graphic Software
  • 44. Utilities Utilities are those application program that assist the computer by performing housekeeping functions like backing up disk or scanning /cleaning viruses or arranging information etc.
  • 45. Some important utilities are: 1.Text Editor. 2.Backup Utility. 3.Compression Utility. 4.Disk Defragmenter. 5.Antivirus Software. Customized Software.
  • 46. Customized software This type of software is tailor made software according to a user ‘s requirement .The type of software is developed to meet all the requirements specified by the user.
  • 47. Operating system An operating system is a program which acts as an interface between a user and the hardware (i.e. all computer resources)
  • 48. Types of Services The operating system provides certain services to programs and to the users of the programs. Some common services provided by operating can be listed as follows:
  • 49. Types of Service 1.Program Execution 2.Handling Input/output operation 3.Manipulations of file system 4.Error detection and handling 5.Resource Allocation 6.Accounting 7.Information and Resource Protection
  • 50. 1.Program execution The operating is responsible for execution various programs whether user programs or system programs i.e. special programs required for the machine handling .
  • 51. 2.Handling Input/output Operation The operating system is responsible for handling various types of inputs (e.g. inputs from keyboard, inputs from mouse etc.) and various types of outputs in the appropriate manner. For instance if the input is coming from mouse then it is different from that of keyboard and so for others.
  • 52. 3.Manipulations of file system This task involves the making of decisions regarding the storage of files i.e. where (whether on floppy disk or hard disk etc.) and how a particular file is to be stored .
  • 53. 4.Error Detection and Handling The Operating system is also responsible for detecting and type of error that occurs and then properly handle it.
  • 54. 5.Resource Allocation This task aims at proper use of resources available . For example, if multiple files are to be printed then “how and in which order this task will take place ?” will be decided by the operating system.
  • 55. 6.Accounting The operating system keeps an account of what type of functioning is taking place and what type of error have taken occurred .
  • 56. 7.Information and Resource Protection The operating system is responsible for ensuring that the information and resources available on machine are used in the correct way . The operating system foils the attempts to use them incorrectly .
  • 57. Operating System’s Function Operating system functions broadly fall into three categories • Essential Functions • Monitoring Functions • Service Functions.
  • 58. Major OS Functions  Process Management  Storage (Memory) Management  Information Management
  • 59. Process Management Managing a process or processor i.e. the CPU. This is also termed as CPU scheduling. Multiprogramming , undoubtedly, improves the overall efficiency of the computer system by getting more work done in less time as the CPU may be shared among a number of active programs which are presents in the memory at the same time .
  • 60. Process Management While CPU is executing a job , it has to wait for the job ;if the job requires certain I/O operation , the CPU waits for the I/o operation to get over and that wait time is CPU’S idle time . In place of making CPU sit idle , another job takes over the use of CPU , increasing efficiency thereby and reducing CPU idle time .
  • 61. The benefits of multiprogramming are as follows: 1.Increased CPU utilization 2.Higher total job throughput
  • 62. Throughput: It is the amount of work accomplished in a given time interval (e.g.15 jobs per hour. Throughput is an important measure of system performance. It is calculated as follows: Throughput= The number of jobs completed Total time taken to complete the jobs Another important factor that influences through is priority assign to different jobs i.e. job scheduling .
  • 63. Job scheduling Job scheduling not only assign to jobs but also admits new jobs for processing at appropriate times . Before we start with job scheduling techniques , let us first understand basic terminology.
  • 64. Program It is a set of instructions submitted to computer . Process is a program in execution. Job and process are the terms which are almost used interchangeably.
  • 65. Process State A process is a program in execution . During execution , the process changes its current activity . A process can have these states :new ,active, waiting or halted (fig).
  • 67. Process Control Block Each process in the OS by a data block called Process Control Block.
  • 68. A PCB contains following information (fig) 1.Process state 2.Program counter : It indicates the address of next instruction to be executed . 3.CPU register 4.Memory limits 5.List of open files
  • 69. Process Control Block Pointer process state process number process counter register memory limits list of open files
  • 70. Scheduling Techniques Many factors determine which scheduling technique should be used in order to have the best possible results .
  • 71. The criteria are as follows : (a) CPU Utilization: There should be maximum possible CPU utilization. (b) Turnaround time: There should be minimum possible turnaround time . (c) Waiting time : System should give fastest responsible time . (d) Throughput: Throughput should be maximum possible .
  • 72. There are two type of scheduling 1.Non-preemptive scheduling. 2.Preemptive scheduling.
  • 73. 1.Non-preemptive scheduling In this type of scheduling , a scheduled job always completes before another scheduling decision is made .Therefore ,finishing order of the jobs is also same as their scheduling order . Its type are: 1.First come first served (FCPS) scheduling 2.Shortest job next (SJN) scheduling . 3.Deadline scheduling
  • 74. 1.First Come First Served (FCFS) scheduling This is the simplest scheduling technique which is managed by FIFO (First in first out) .That is , the process , which requests the CPU first , is allocated the CPU first. A queue is maintained called ready queue in which all the processes , that want CPU time is entered. The CPU executes the jobs in the ready queue one by one . Batch processing is one obvious example of FCFS scheduling in which all the jobs in the batch are executed one by one .But turnaround time for the very first job in the batch is the best and for the very last job, it is worst . (Turnaround time is the delay between job submission and job completion).
  • 75. Shortest Job Next (SJN) scheduling • In SJN scheduling , whenever a new job is to be admitted , the shortest of the arrived jobs is selected and given to CPU time . Throughput remain the same as in FCFS scheduling but waiting time improves . SJN associates with each job the length of its next CPU burst. (CPU burst is the CPU time requires by a job to execute its continuous executable part.).
  • 76. Deadline Scheduling In deadline scheduling, the job with the earliest deadline is selected for scheduling . Deadline of a job is the time limit within which a job must be over. If a job overshoots its deadline , it is said to be Deadline over run . Deadline over run is calculated as k=c-d Where k is deadline overrun ;c is a job completion time and D is deadline for a job. Erratic behavior might result if reliable deadline data is not available .
  • 77. Preemptive Scheduling In contrast to non-preemptive scheduling , a scheduling decision can be made even while the job is executing whereas in non-preemptive scheduling , a scheduling decision is made only after job completes its execution. Therefore , preemptive scheduling may force a job in execution to release the processor , so that execution of other job can be undertaken , in order to improve throughput considerably . The techniques which use preemptive scheduling are: 1.Round robin scheduling 2.Response ratio scheduling
  • 78. Round Robin Scheduling Round robin (RR) scheduling is aimed at giving all programs equal opportunity to make progress . This is implemented by ensuring that no program gets a second opportunity to execute unless all other programs have had at least one opportunity . A small unit of time , called a time quantum or time slice, is defined. The ready queue (queue of programs waiting for CPU time) is treated as a circular queue . The programs in the ready queue is processed for the defined time slice , one by one.
  • 79. 2.Response Ratio Scheduling  Response ratio is calculated as follows:  Response Ratio= Elapsed Time Execution time received The job with highest response ratio is preferred over others. When a short job arrives , its response ratio is high , so it is scheduled for execution immediately . A longer job would achieve high enough ratio only after a subsequent wait .
  • 80. STORAGE MANAGEMENT CPU Memory I/O system  Memory is a large array of words or bytes, each with its own address. The CPU reads from & writes to specific memory address.  A program must be assigned some memory area & loaded into memory in order to be executed. When program terminates, its memory space is declared free.
  • 81. Contiguous Storage Allocation Each problem that is to be executed is allocated a contiguous storage memory. Each job step is considered as a single independent entity for allocation of a contiguous storage area. At every job step initiation, OS has to ensure that enough contiguous area is available to accommodate it.
  • 82. Non Contiguous Storage Allocation  A program is divided into smaller components of equal sizes. One or more components can be stored in non contiguous memory areas. Each component in that particular memory area is provided addresses 0,1,2,….n  Say a program that requires 90k is divided into smaller components of 10k. Then we store 4 components in 1st free memory area & 5 in next free memory area.
  • 83. Non Contiguous Storage Allocation  Virtual storage is a technique that helps to execute a program even if all of it is not loaded in memory.2 main approaches to it are: Program-paging  Program-segmentation
  • 84. Virtual Storage Using PAGING  Each program is split into fixed size program components called pages. Pages in a program & words in a page, both are numbered from 0……n ,their logical address.  Range of logical address is called as virtual address space or logical address space.  Range of main storage address is referred to as physical address space.  The physical or main memory is broken into fixed-size blocks called ”frames”  For a program execution, its pages are loaded into any available frames & the page table (also called page map table (PMT)) is defined to translate from user pages to memory frames .  PMT stores on entry for every program page which contain the frame (storage block) number where the page presently resides .
  • 85. Virtual Storage Using PAGING In order to execute a program , some pages of it are loaded in the main memory depending upon the storage availability . During its execution, the program generation page number which is mapped to find its physical location and then the page is accessed .
  • 86. Virtual Storage Using PAGING address page 0 21,115 21,725 22,100 22,405 23,015 23,525 24,000 Page no. 1 c D page 1 page 2 page 3 physical memory 0 21,115 1 22,405 2 23,015 3 24,000 Page map table (PMT)
  • 87. Explanation  When a required page is not in the main storage , an interrupt , known as missing page interrupt is raised.  This fault is popularly called a page fault. The Os now takes action by bringing the required page from the secondary storage into an empty page block , this operation is called page in.  After page in , PMT entry is modified and new entrant page’s physical address is also stored in it and then the execution resumes .  What if no entry storage block is available ? In such a situation , a storage block is vacated by moving out a page from main storage to secondary storage (process called page out). The reading and writing of pages determines page traffic.
  • 88. Virtual Storage Using Segment  It differs from paging because it makes the use of program segments.  Program segment : It is a logical unit of a program as defined by a programmer or it is a piece of program logic which performs a specific task.  Responsibility lies on the programmer only for determining how many segments a program should have or which program units should comprise a segment.  For accessing a particular word in the segment , its logical address consists of two parts: 1.segment number 2.word number
  • 89. Virtual Storage Using Segment ‘segment table’  This segment number is mapped on to to get physical address of the segment and by the word’s identification number , physical or actual address of the word is found out.  Address Transformer Unit , is responsible for generation of actual address of the required word within the segment .  In the same way (as that of paging ), segments in the memory are processed and if a segment is not available in then memory , segment missing fault interrupt is raised. So there is a similarity between the both .
  • 90. Virtual Storage Using Segment To increase the efficiency of a system sometimes paging and segmentation is combined. A large segments can be broken into pages. A segment obviously would be stored in contiguous area.  Now within this paging can be implemented, making ‘swapping’ possible.
  • 91. Information Management Information Management Component : It manages the information which is an important task of OS . This information management component of Os is structured as follows :
  • 92. 1.Physical IOCS (input-output control system) It is responsible for DEVICE MANAGEMENT and for ensuring DEVICE INDEPENDENCE. It provides a basic capability for the programs to perform their own IO, without involving themselves with the intricacies of device handling.
  • 93. 2. Logical IOCS It is responsible for efficient organization and access of data on IO devices. It provides basic capabilities for file definition, choice of data organization and access methods. File system: It is responsible for protection and controlled sharing of files.
  • 94. The Physical IOCS and IO Organization File system Logical IOCS Physical IOCS Computer Hardware Figure: Hierarchy of information management modules
  • 95. The Physical IOCS and IO Organization Each I/O channel, its control units and devices on them in the system are given unique codes recognized by the hardware. Thus a device is uniquely identified by a device address which consists of three addresses: for I/O channel, control unit and devices , (CH,CU, Dev). Steps in the execution of an I/O operation are as follows:
  • 96. I/O Initiation  It starts with issuing of a CPU instruction called ‘start IO’. This ‘start IO’ instruction provides the device address (ch, cu, dev) for the required device.  The CPU identifies the concerned channel, control unit of the devices and the device through the component address (ch,cu,dev)
  • 97. Device Selection  The concerned channel then checks the device to see whether it is available or not . This process is called device selection. If device selection is successful, success condition code is set in PSR (register that stores CPU state) and IO instruction’s execution starts  If device selection fails (because of device’s non availability if it is busy doing some other operation ,or hardware malfunction ), ’start IO’ is terminated and ‘failure’ condition code is set in PSR . CPU now determines which action should be taken viz. retry the operation , cancel the program which want IO, or switch to execution of another program.
  • 98. I/O instruction execution If the required device is available ,I/O channel reads the I/O instructions from the program in the main storage and then sets up the execution of I/O operation on the designated device.
  • 99. I/O Termination  At the end of the I/O operation's) , the designated device raises an interrupt for the both type of ends: Successful and unsuccessful . IO termination interrupt provides following information on the CPU:  (i) device address of the device raising the interrupt condition ,  Status flags indicating : (a) IO termination type (b) error message if any.  The interrupt handling routine then takes action by analyzing status and by invoking error recovery procedure (if required).
  • 100. CPU I/O channel CU Main storage I/O channel D1 CU D2 D3 CU CU D4 D5 CU-control unit D’s-Devices
  • 101. Role of the Physical IOCS Physical IOCS integrates all the Os responsibilities like making IO sequence fort a problem by taking over device management functions. Physical IOCS provides device- level error recovery routines which can be easily invoked when a recoverable error occurs. Thus , the problem has only to issue an I/O request and rest would be handled by Physical IOCS.
  • 102. Role of the Physical IOCS When an I/O operation is requested by a program (process ), physical IOCS initiates IO in the above explained manner , marks the process state as blocked and frees the CPU for other computations , thus makes multiprogramming feasible .Physical IOCS also ensures protection to the programs from undue interference during I/O operation is being carried out.
  • 103. Role of the Physical IOCS  Thus Physical IOCS makes the entire I/O sequence operation ‘transparent’ to the problem program.  Transparency: It means that the only thing to be issued by the program is the request /order/command for it and rest all internal operations are done by the control program (physical IOCS in the case) without making it visible to the problem program.
  • 104. Logical IOCS  The creation and access of the files are facilitated by the logical IOCS through file level commands viz. Open a file , read a record, delete a record, etc. Three – wayed help is provided for the user.  1. The programmer need not know physical IOCS intricate details of I/O device, channel , control unit of the device.  2.The programmer need not know physical IOCS interface, its details and handling.  3. The programmer need not know how an I/O is to be performed.
  • 105. File System File system’s function is to facilitate easy creation, storage and access of files in order to enable easy sharing of files between programs and their protection against illegal access.
  • 106. The Major Function of a FILE SYSTEM are given below: It provides file naming freedom to the users and permits controlled sharing of files (protection). Provides long and short term storage of files . Provides security against loss of information due to system failure(security).