0% found this document useful (0 votes)
19 views3 pages

Assignment and Revision Operating Systeem Itratia Winny 202-277 - 073516

Uploaded by

heisronnie8
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views3 pages

Assignment and Revision Operating Systeem Itratia Winny 202-277 - 073516

Uploaded by

heisronnie8
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

1. What is a file system?

An operating system uses a file system as a method and data structure to manage the storage,
organisation, and retrieval of data on storage devices like hard drives, SSDs, and USB drives.
It establishes the naming, access, and management of files, as well as the structure of
directories.

Comparison: FAT32, NTFS, and EXT4

Feature FAT32 NTFS EXT4


A new technology file Fourth Extended File
Full Form File Allocation Table 32
system System
Widely compatible Mainly Windows,
Compatibility (Windows, macOS, and limited to macOS and Primarily Linux
Linux). Linux.
Max File Size 4 GB 16 TB or more 16 TB
Max Volume
2 TB 256 TB 1 EB (Exabyte)
Size
Faster with better
Simple but slower for Optimized for modern
Performance indexing and
large files large discs.
compression
No security or Journaling, encryption, Journaling, extents,
Features
journaling. and permissions backwards compatibility
USB drives and memory
Usage Windows system drives Linux system drives
cards

2. How does the OS ensure security and protect resources?

Operating systems enforce security and resource protection through several mechanisms:

1. Authentication: Verifying user identity using credentials like passwords, biometrics,


or tokens.
2. Authorization: granting or denying permissions to users based on roles and access
control lists (ACLs).
3. Encryption: Protecting sensitive data using cryptographic algorithms.
4. Process Isolation: Preventing processes from accessing the memory or resources of
other processes.
5. File Permissions: Set read, write, and execute permissions for users and groups.
6. Firewalls block unauthorised network access.
7. Sandboxing involves running untrusted applications in isolated environments to
prevent system compromise.
3. Compare and contrast distributed operating systems with network operating
systems.

Feature Distributed OS Network OS


The system oversees a group of It facilitates communication and
Definition separate computers to make them resource sharing among numerous
appear as a single entity. computers.
There is resource sharing and task Facilitating connectivity and file
Focus
distribution across systems. sharing.
It provides a high level of
Low transparency: users see and
Transparency transparency, preventing users from
interact with individual systems.
seeing distinct systems.
Examples Amoeba, Plan 9, and Google’s Borg Windows Server, Novell NetWare
Fault High; it ensures redundancy and Lower; it depends on network
Tolerance resilience. configuration.
Complexity More complex to develop and manage. Simpler to set up and administer.

4. The role of device drivers in an operating system

Device drivers are specialised software that facilitates communication between the operating
system and hardware devices. They act as a bridge between the OS and the hardware,
translating OS-level instructions into device-specific commands.

Functions of Device Drivers:

1. Hardware Abstraction enables applications and the OS to interact with hardware


without requiring direct knowledge of its workings.
2. Command Translation is the process of converting generic OS commands into
specific instructions for a specific device.
3. Error Handling: Detects and reports hardware-related issues.
4. Resource management ensures the proper allocation and utilisation of hardware
resources.

5. Types of Operating Systems and Examples

Type Description Examples


The system executes a series of jobs without IBM OS/360,
Batch OS
manual intervention. Hercules
The system enables the simultaneous use of
Time-Sharing OS UNIX, Multics
multiple users.
Real-Time OS Provides immediate processing for time-critical
VxWorks, FreeRTOS
(RTOS) applications.
Manages resources across multiple interconnected
Distributed OS Plan 9, Amoeba
systems.
Network OS The system provides network services and manages Windows Server,
Type Description Examples
communication between systems. Linux Samba
Mobile OS Designed for mobile devices. Android, iOS
It is specifically designed for hardware in
Embedded OS RTEMS, QNX
embedded systems.

You might also like