123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Major Achievement

Profile Picture
By Author: Wisemonkeys
Total Articles: 277
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Major Achievements of OS manages computer hardware and software resources. Major Achievements of OS are given as follows:

1. Process

2. Memory Management

3. Information Protection & Security

4. System Structure

Process:

A process is a program at the time of execution. The term ‘process‘ was first used by Daley and Dennis.R in 1960. At the time of developing multi-programming, time-sharing and real-time systems some problems are raised due to the timing and synchronization.

Memory Management:

Here memory means main memory (RAM), and the term memory management specifies how to utilize the memory efficiently. So, the main task of memory management is ‘efficient memory utilization and efficient processor utilization.

(i) Process isolation: It simply means that controlling one process interacts with the data and memory of another process.

(ii) Automatic allocation and management: Memory should be allocated dynamically based on the priorities of the process. Otherwise, the process waiting time will increase, which decreases CPU utilization and memory utilization.

(iii) ...
... Protection and access control: Do not apply protection techniques and access control to all the processes, better to apply to the important application only. It will save execution time.

(iv) Long-term Storage: Long-term storage of process reduces memory utilization

Information protection and security:

Here the term protection means that secure the resources and information from unauthorized persons. The operating system follows a variety of methods for protection and security.

(i) Access control: The operating system provides access permissions to the users about important files and applications.

(ii) Information flow control: The operating system regulates the flow of data within the system.

(iii) Certification: The operating system provides the priorities and hierarchies to the resources using this then we can control unauthorized processes.

System Structure:

In the Olden Days, the code for an operating system is very few. Later more and more features have been added to the operating systems. The code of the operating system is generally increased.

It is said that "Knowledge is Power" and Wisemonkeys(https://wisemonkeys.info/) is the ideal platform to prove this right where this blog was posted. Additionally, when knowledge is free it should be shared. Therefore, keeping this in mind Wisemonkeys an LMS platform is developed so that people can exchange their ideas, knowledge, and experiences for the wise Gen Z.

SIGN UP(https://me.wisemonkeys.info/login) TODAY and upgrade your knowledge base.

Total Views: 236Word Count: 363See All articles From Author

Add Comment

Computers Articles

1. Choose The Right Version Of Windows 10 Iot Enterprise Or Windows 10 Pro
Author: michellumb44

2. Choose The Right Edition Of Windows 10 Or Windows 10 Enterprise
Author: michellumb44

3. Tools For Designing And Developing For Modern Teams
Author: michellumb44

4. How To Pick The Best Sql Server Edition And Core Licensing For Your Workloads
Author: michellumb44

5. Balance Remote Access And Database Power: Rds User Cals And Sql Server Cores
Author: michellumb44

6. A Practical Guide For It Teams On How To Choose The Right Rds Cals
Author: michellumb44

7. The Practical Guide To Windows Server 2022 Remote Desktop Licensing
Author: michellumb44

8. Choose The Right Licensing Path: Rds Cals And Windows Server Datacenter
Author: michellumb44

9. Pick The Right Number Of Windows Server 2019 Datacenter Cores For Your Workloads
Author: michellumb44

10. Top Food Delivery Apps Data Scraping Api In Germany
Author: FoodDataScrape

11. Employee Attendance Management
Author: James

12. Budget Website Design
Author: James

13. Nfc Guard Tour System Singapore
Author: James

14. Guard Patrol Tour System
Author: James

15. Call A Specialist In Network Support To Keep Your Business Data Safe
Author: Aneesa Stein

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: