123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Major Achievement

Profile Picture
By Author: Wisemonkeys
Total Articles: 277
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Major Achievements of OS manages computer hardware and software resources. Major Achievements of OS are given as follows:

1. Process

2. Memory Management

3. Information Protection & Security

4. System Structure

Process:

A process is a program at the time of execution. The term ‘process‘ was first used by Daley and Dennis.R in 1960. At the time of developing multi-programming, time-sharing and real-time systems some problems are raised due to the timing and synchronization.

Memory Management:

Here memory means main memory (RAM), and the term memory management specifies how to utilize the memory efficiently. So, the main task of memory management is ‘efficient memory utilization and efficient processor utilization.

(i) Process isolation: It simply means that controlling one process interacts with the data and memory of another process.

(ii) Automatic allocation and management: Memory should be allocated dynamically based on the priorities of the process. Otherwise, the process waiting time will increase, which decreases CPU utilization and memory utilization.

(iii) ...
... Protection and access control: Do not apply protection techniques and access control to all the processes, better to apply to the important application only. It will save execution time.

(iv) Long-term Storage: Long-term storage of process reduces memory utilization

Information protection and security:

Here the term protection means that secure the resources and information from unauthorized persons. The operating system follows a variety of methods for protection and security.

(i) Access control: The operating system provides access permissions to the users about important files and applications.

(ii) Information flow control: The operating system regulates the flow of data within the system.

(iii) Certification: The operating system provides the priorities and hierarchies to the resources using this then we can control unauthorized processes.

System Structure:

In the Olden Days, the code for an operating system is very few. Later more and more features have been added to the operating systems. The code of the operating system is generally increased.

It is said that "Knowledge is Power" and Wisemonkeys(https://wisemonkeys.info/) is the ideal platform to prove this right where this blog was posted. Additionally, when knowledge is free it should be shared. Therefore, keeping this in mind Wisemonkeys an LMS platform is developed so that people can exchange their ideas, knowledge, and experiences for the wise Gen Z.

SIGN UP(https://me.wisemonkeys.info/login) TODAY and upgrade your knowledge base.

Total Views: 263Word Count: 363See All articles From Author

Add Comment

Computers Articles

1. Modern Software At Scale: A Practical Guide To Microservice Development
Author: Tech Gazebos

2. The Financial Cost Of Ignoring Computer Repairs: A Westlake Case Study
Author: Arun Singh

3. Cloud Computing Companies In India | Cloud Hosting Service Providers In India | Sathya Technosoft
Author: Sathya Technosoft

4. Embedded Systems Advantages And Disadvantages
Author: Embeddedhash

5. Why Essae Pos Machines Are Ideal For Retail Growth
Author: pbs

6. Best Wordpress Development Companies In India For Business Growth
Author: Web Panel Solutions

7. How Enterprises Leverage It Consulting Companies In The Usa For Cybersecurity
Author: Abiel

8. Cash Drawer Security Tips For Retailers | Prime Poskart
Author: prime poskart

9. Successful Vb6 Migration And Upgrade
Author: Tech Gazebos

10. Soluzioni Complete Per La Stampa In Ufficio: Assistenza, Noleggio E Manutenzione Professionale
Author: Mihai Filip

11. Cheap Vps Hosting & Dedicated Server Solutions – Fast, Secure & Affordable | Rackoona
Author: Rackoona

12. Reliable Temperature Monitoring Solutions Enhancing Drug Safety And Freezer Storage Compliance By Tempgenius
Author: Chris Miller

13. Spark Matrix™: Evaluating Security Information And Event Management (siem) Solutions For Scalable And Intelligent Security Operations
Author: Umangp

14. How To Get In Touch With Bellsouth Customer Service By phone?
Author: frank rayan

15. Bca In Cyber Security Online: Curriculum, Labs, And 2025 Modules
Author: UniversityGuru

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: