Question:
Detail about operating system in computers?
Asiya S
2006-10-31 09:07:09 UTC
what are the operating system ,it definition,types of operating system ,what are the operating system used in different fields.its uses.
Six answers:
anonymous
2006-10-31 09:14:39 UTC
For a computer to work, we need system software, what's called an Operating System (OS). Operating Systems are basically the software installed within the computers, acting as a Graphical User Interface (GUI), aiding the user on using the computer, and using various tools/utilities supplied within the OS. The OS basically makes using computers for non-programmers much easier. It provides a decent look, and easy operating. That is the job of an operating system. The OS (which can be called the System Software) controls the computer's internal functioning and also it controls other devices connected to the computer. It unites the applications and hardware and makes them work together. It also manages nearly everything on the computer, from hardware to applications. Operating Systems contain programmes and schedules that organize actions and processes, translate data from the inputs and output devices, order data storage in memory, divide certain tasks to a variety of processors, and also provide functions/utilities that assist programmers to program. The most widely used OS on the planet is the Microsoft Windows Operating System.
grooovish
2006-10-31 09:15:25 UTC
O/S is interface between user and computer hardware.



Broadly 2 types.



GUI based - Windows, Mac, OS/2, Linux, some falvors of Unix etc.

CUI based - Linux, Unix, Solaris etc



Used:



GUI based - every where.

CUI based - only specific technical areas like web servers.
?
2016-12-05 14:52:33 UTC
Hm... i'm not one hundred% particular in case you are able to "improve" from XP to 7 by the abode windows 7 disk like you are able to from Vista - what I recommend the following is once you've abode windows Vista, you may want to easily pop the abode windows 7 disk in and hit "improve". in case you won't be able to improve from XP, i guidance you decrease back each and every thing up because chance is, you'll want to do a sparkling installation - a sparkling installation is even as one thoroughly wipes there puzzling pressure, loosing each and every thing on it. to attempt this (when you decrease back up photos, archives, and so on. and so on.), you'll placed your W7 disk in, and restart the computer. in the course of the "initiate", it really is going to assert someplace "Press F6 besides from CD/DVD". - it may't be those perfect words, or F6 for that count number, because it really is different for each motherboard, even although, F6, F8, and F12 are the most difficulty-loose - The 'F' keys are those ones above the traditional numbers, in case you hit the right one, you'll comprehend, because the "abode windows Installer" will open. If not something takes position, restart and in basic terms again and again press yet another one. From there, it really is quite instantly ahead and it really is going to be achieved with none difficulty in any respect. desire this helps, - Cody
Bharath
2006-10-31 09:30:14 UTC
OS is a software used to interact with the machine..may be that is yr computer,cell phone( like nokia uses symbian )..or many high end machines..
Geek Girl
2006-10-31 09:16:06 UTC
GOOGLE......
anonymous
2006-10-31 09:14:43 UTC
An operating system (OS) is a computer program that manages the hardware and software resources of a computer. At the foundation of all system software, the OS performs basic tasks such as controlling and allocating memory, prioritizing system requests, controlling input and output devices, facilitating networking, and managing files. It also may provide a graphical user interface for higher level functions.



Introduction

A typical vision of a computer architecture as a series of abstraction layers: hardware, firmware, assembler, kernel, operating system and applications (see also Tanenbaum 79).

Enlarge

A typical vision of a computer architecture as a series of abstraction layers: hardware, firmware, assembler, kernel, operating system and applications (see also Tanenbaum 79).



Modern general-purpose computers, including personal computers and mainframes, have an operating system (a general purpose operating system) to run other programs, such as application software. Examples of operating systems for personal computers include Microsoft Windows, GNU/Linux, and Mac OS.



The lowest level of any operating system is its kernel. This is the first layer of software loaded into memory when a system boots or starts up. The kernel provides access to various common core services to all other system and application programs. These services include, but are not limited to: task scheduling, memory management, disk access, and access to hardware devices.



Services



[edit] Process management



Every action on a computer, be it background services or applications, is run inside a process. As long as a von Neumann architecture is used to build computers, only one process per CPU can be run at a time. Older OS such as MS-DOS did not attempt any artifacts to bypass this limit and in fact only one process could be run under them (although DOS itself featured TSR as a very partial and not too easy to use solution). Modern operating systems are able to simulate execution of many processes at once (multi-tasking) even under a single CPU. Process management is an operating system's way of dealing with running multiple processes. Since most computers contain one processor with one core, multi-tasking is accomplished by simply switching processes quickly. As a user runs more processes, all timeshares become smaller. On many systems, this can eventually lead to problems such as skipping of audio or jittery mouse movement (this is called thrashing, a state in which OS related activity becomes the only thing a computer does). Process management involves the computation and distribution of "timeshares". Most operating systems allow a process to be assigned a process priority which impacts its timeshare. Interactive operating systems also employ some level of feedback in which the task with which the user is working receives a priority boost.



[edit] Memory management



According to Parkinson's law "Programs expand to fill the memory available to hold them". Thus the programmers like a memory of infinite size and infinite speed. Nowadays most of the computer's memory is arranged in a hierarchical manner, starting from fastest registers, cache, RAM and disk storage. The memory manager in an OS coordinates the memories by tracking which one is available, which is to be allocated or deallocated and how to swap between the main memory and secondary memories. This activity which is usually referred to as virtual memory management greatly increases the amount of memory available for a process (typically 4GB, even if the physical RAM available is less). This however comes at a speed penalty which is usually low, but can become very high in extreme cases and, again, lead to thrashing.



Another important part of memory management activity is managing virtual addresses, with help from the CPU. If multiple processes are in memory at once, they must be prevented from interfering with each other's memory (unless there is an explicit request to share for a limited amount of memory and in controlled ways). This is achieved by having separate address spaces. Each process in fact sees the whole virtual address space (typically, from address 0 up to the maximum size of virtual memory) as uniquely assigned to it (ignoring the fact that some areas are OS reserved). What actually happens is that the CPU stores some tables to match virtual addresses to physical addresses.



By creating a separate address space for each process, it is also simple for the operating system to free all of the memory that was used by a particular process. If a process does not free memory, this is unimportant once the process ends and the memory is all released.



[edit] Disk and file systems



Operating systems have a variety of native file systems. Linux has a greater range of native file systems, those being: ext2, ext3, ReiserFS, Reiser4, GFS, GFS2, OCFS, OCFS2, NILFS and Google File System. Linux also has full support for XFS and JFS, along with the FAT file systems, and NTFS. Windows on the other hand has limited file system support which only includes: FAT12, FAT16, FAT32, and NTFS. The NTFS file system is the most efficient and reliable of the four Windows systems. All the FAT systems are older than NTFS and have limitations on the partition and file size that can cause a variety of problems.



For most of the above file systems there are two ways it can be allocated. Each system can be journaled or non-journaled. Journaled being the safer alternative under the circumstances of a system recovery. If a system comes to an abrupt stop, in a system crash scenario, the non-journaled system will need to undergo an examination from the system check utilities where as the journaled file systems recovery is automatic. Microsoft's NTFS is journaled along with most Linux file systems, except ext2, but including ext3, reiserfs and JFS.



Every file system is made up of similar directories and subdirectories. Along with the operating systems file system similarities there are the subtle differences. Microsoft separates its directories with a back slash and its file names aren't case sensitive whereas Unix-derived operating systems (including Linux) use the forward slash and their file names generally are case sensitive.



[edit] Networking



Most current operating systems are capable of using the now-universal TCP/IP networking protocols. This means that one system can appear on a network of the other and share resources such as files, printers, and scanners.



Many operating systems also support one or more vendor-specific legacy networking protocols as well, for example, SNA on IBM systems, DECnet on systems from Digital Equipment Corporation, and Microsoft-specific protocols on Windows. Specific protocols for specific tasks may also be supported such as NFS for file access.



[edit] Security



Many operating systems include some level of security. Security is based on the two ideas that:



* The operating system provides access to a number of resources, directly or indirectly, such as files on a local disk, privileged system calls, personal information about users, and the services offered by the programs running on the system;

* The operating system is capable of distinguishing between some requestors of these resources who are authorized (allowed) to access the resource, and others who are not authorized (forbidden). While some systems may simply distinguish between "privileged" and "non-privileged", systems commonly have a form of requestor identity, such as a user name. Requestors in turn divide into two categories:



* Internal security: an already running program. On some systems, a program once it is running has no limitations, but commonly the program has an identity which it keeps and is used to check all of its requests for resources.

* External security: a new request from outside the computer, such as a login at a connected console or some kind of network connection. To establish identity there may be a process of authentication. Often a username must be quoted, and each username may have a password. Other methods of authentication such as magnetic cards or biometric data might be used instead. In some cases, especially connections from the network, resources may be accessed with no authentication at all.



In addition to the allow/disallow model of security, a system with a high level of security will also offer auditing options. These would allow tracking of requests for access to resources (such as "who has been reading this file"?)



Security of operating systems has long been a concern because of highly sensitive data held on computers, both of a commercial and military nature. The United States Government Department of Defense (DoD) created the Trusted Computer System Evaluation Criteria (TCSEC), which is a standard that sets basic requirements for assessing the effectiveness of security. This became of vital important to operating system makers, because the TCSEC was used to evaluate, classify and select computer systems being considered for the processing, storage and retrieval of sensitive or classified information.



[edit] Internal security



Internal security can be thought of as protecting the computer's resources from the programs already running on the computer. Most operating systems set programs running natively on the computer's processor, so the problem arises of how to stop these programs doing the same task, and having the same privileges, as the operating system, which is after all just a program too? Processors used for general purpose operating systems generally have a hardware concept of privilege. Generally less privileged programs are automatically blocked from using certain hardware instructions, such as those to read or write from external devices like disks. Instead, they have to ask the privileged program (operating system) to read or write. The operating system therefore gets the chance to check the program's identity and allow or refuse the request.



An alternative strategy, and the only strategy available where the operating system and user programs have the same hardware privilege, is that the the operating system does not run user programs as native code, but instead either emulates a processor or provides a host for a p-Code based system such as Java.



Internal security is especially relevant for multi-user systems; it allows each user of the system to have private files that the other users cannot tamper with or read. Internal security is also vital if auditing is to be of any use, since if a program can bypass the operating system it can also bypass auditing.



[edit] External security



Typically an operating system offers (hosts) various services to other network computers and users. These services are usually provided through ports or numbered access points beyond the operating systems network address. Typically services include offerings such as file sharing, print services, email, web sites, and file transfer protocols. At the front line of security are hardware devices known as firewalls. At the operating system level there are various software firewalls. A software firewall is configured to allow or deny traffic to a service running on top of the operating system. Therefore one can install and be running an insecure service, such as Telnet or FTP, and not have to be threatened by a security breach because the firewall would deny all traffic trying to connect to the service on that port.



[edit] Graphical user interfaces



Today, most modern operating systems contain Graphical User Interfaces (GUIs, pronounced gooeys). A few older operating systems tightly integrated the GUI to the kernel—for example, the original implementations of Windows and Mac OS. More modern operating systems are modular, separating the graphics subsystem from the kernel (as is now done in Linux, and Mac OS X, and to a limited extent Windows).



Many operating systems allow the user to install or create any user interface they desire. The X Window System in conjunction with GNOME or KDE is a commonly found setup on most Unix and Unix derivative (BSD, Linux, Minix) systems.



GUIs tend to change with time. For example, Windows has modified its GUI every time a new major version of Windows is released and the Mac OS GUI changed dramatically with the introduction of Mac OS X.



[edit] Device drivers



A device driver is a specific type of computer software developed to allow interaction with hardware devices. Typically this constitutes an interface for communicating with the device, through the specific computer bus or communications subsystem that the hardware is connected to, providing commands to and/or receiving data from the device, and on the other end, the requisite interfaces to the operating system and software applications. It is a specialized hardware dependent computer program which is also operating system specific that enables another program, typically an operating system or applications software package or computer program running under the operating system kernel, to interact transparently with a hardware device, and usually provides the requisite interrupt handling necessary for any necessary asynchronous time-dependent hardware interfacing needs.



The key design goal of device drivers is abstraction. Every model of hardware (even within the same class of device) is different. Newer models also are released by manufacturers that provide more reliable or better performance and these newer models are often controlled differently. Computers and their operating systems cannot be expected to know how to control every device, both now and in the future. To solve this problem, OSes essentially dictate how every type of device should be controlled. The function of the device driver is then to translate these OS mandated function calls into device specific calls. In theory a new device, which is controlled in a new manner, should function correctly if a suitable driver is available. This new driver will ensure that the device appears to operate as usual from the operating systems' point of view.


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Loading...