Jaboneta Assignment 1 OS
Jaboneta Assignment 1 OS
Jaboneta
DCET 2-2
Operating systems have a lengthy history, dating back to the 1950s, when computers
were first designed for scientific and military applications. At the time, computer systems
were simple, consisting of a single processor that performed one function at a time.
Users had to manually download and launch each application since these early
computers lacked operating systems.
In the late 1950s and early 1960s, computer systems grew in complexity and were
employed for a broader range of applications, including business processing of data and
scientific calculations. This resulted in the development of batch processing systems,
which allowed many jobs to be done sequentially without the need for user intervention.
Initially, batch processing systems were built using simple job control language (JCL),
which indicated the sequence in which programs should be performed.
The IBM System/360 Operating System (OS/360) was developed in the mid-1960s as
the first operating system for mainframe computers. Many technologies that are now
standard in current operating systems, like as memory management, file management,
and multitasking, were introduced by OS/360.
Operating systems became more widely available and affordable in the 1970s, with the
development of the minicomputer and microcomputer. During this time, researchers at
Bell Labs created the UNIX operating system. Many innovative concepts, including as
hierarchical file systems and the use of a command line interface, were introduced by
UNIX and are still in use today.
In the 1980s, with the rise of personal computers, operating systems such as MS-DOS
and Apple's Macintosh System software became popular. MS-DOS was a command-
line operating system that was widely used in the early days of personal computing,
while the Macintosh System software introduced a graphical user interface (GUI) that
made it easier for users to interact with the computer.
The Windows operating system dominated the personal computer industry in the 1990s,
owing to its ease of use and compatibility with a wide range of hardware and software.
During this period, other prominent operating systems included MacOS and different
versions of UNIX.
With the rise of the internet and mobile computing in the 2000s, new operating systems
such as Android and iOS were created to accommodate these new platforms. These
operating systems pioneered innovative features such as touchscreen input and app
stores, which are now commonplace in modern mobile devices.
Operating systems are still evolving and adapting to new technology and user needs.
Cloud computing and virtualization have resulted in the development of new types of
operating systems that are specialized for these contexts, such as container operating
systems and cloud operating systems.
More complex design and implementation, making them slower and less efficient than
single-user systems.
Require more hardware resources, making them more expensive to operate.
May be more susceptible to security vulnerabilities due to the multiple users and
applications.
Can be more complex to design and implement, making them slower and less efficient
than single-tasking systems.
Require more hardware resources, making them more expensive to operate.
More susceptible to security vulnerabilities due to the multiple applications running
simultaneously.
More complex and expensive than other operating systems due to the additional
networking features and functionalities.
Requires specialized knowledge and training to set up and maintain the network
infrastructure and operating system.
Susceptible to network security threats and attacks, requiring regular updates and
patches to maintain security.
More complex and challenging to design and implement than other operating systems.
Requires specialized knowledge and training to set up and maintain the distributed
system.
More susceptible to network security threats and attacks, requiring regular updates and
patches to maintain security.
Limited customization options due to the specialized nature of the embedded system.
Limited hardware resources, making it challenging to run resource-intensive
applications.
Susceptible to security vulnerabilities due to the limited resources available for security
measures.