0% found this document useful (0 votes)
8 views16 pages

1) - Types of Operating Systems?

The document outlines various types of operating systems, including batch, time-sharing, distributed, and real-time systems, along with their popular examples. It provides a brief history of operating systems from the mainframe era to modern mobile systems, and discusses memory allocation techniques such as first-fit and best-fit, as well as concepts like virtual memory and cache memory. Additionally, it covers access control mechanisms, file manager interactions, and the characteristics of sequential access storage media.

Uploaded by

editingonly2004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views16 pages

1) - Types of Operating Systems?

The document outlines various types of operating systems, including batch, time-sharing, distributed, and real-time systems, along with their popular examples. It provides a brief history of operating systems from the mainframe era to modern mobile systems, and discusses memory allocation techniques such as first-fit and best-fit, as well as concepts like virtual memory and cache memory. Additionally, it covers access control mechanisms, file manager interactions, and the characteristics of sequential access storage media.

Uploaded by

editingonly2004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

1). Types of Operating Systems?

the main types of operating systems:

1. Batch Operating System: Executes a sequence of jobs in a batch without user interaction.

2. Time-Sharing Operating System: Allows multiple users to share the same computer resources
simultaneously.

3. Distributed Operating System: Manages a group of independent computers that appear to be a


single, cohesive system.

4. Network Operating System: Designed for use on a network of computers, allowing multiple
devices to communicate and share resources.

5. Real-Time Operating System (RTOS): Responds to inputs and events in a predictable and timely
manner, often used in applications that require strict timing constraints.

6. Mobile Operating System: Designed for mobile devices, such as smartphones and tablets,
providing a user-friendly interface and optimized for battery life.

7. Embedded Operating System: Used in embedded systems, such:choose set-tops, washing


machines, and other devices that require a minimalistic OS.

8. Multi-Processing Operating System: Supports multiple processors or cores, allowing for


increased processing power and efficiency.

9. Virtual Machine Operating System: Creates a virtualized environment, allowing multiple


operating systems to run on a single physical machine.

Some popular operating systems include:

- Windows (Microsoft)

- macOS (Apple)

- Linux (Open-source)

- Android (Google)

- iOS (Apple)

- Chrome OS (Google)

Each type of operating system has its own strengths and weaknesses, and is suited for specific use
cases and applications.
2). Brief History of Operating System?

a brief history of operating systems:

Early Years (1950s-1960s)


1. Mainframe Era: The first operating systems were developed for mainframe
computers, such as IBM's System/360.
2. Batch Processing: Early operating systems used batch processing, where
jobs were executed in a sequence without user interaction.

Development of Modern OS (1970s-1980s)


1. Unix (1971): Developed at Bell Labs, Unix became a popular operating
system for universities and businesses.
2. CP/M (1974): Control Program for Microcomputers, an early operating
system for personal computers.
3. MS-DOS (1981): Microsoft's first operating system, developed for IBM PCs.

Graphical User Interfaces (GUIs) (1980s-1990s)


1. Macintosh (1984): Apple's Macintosh computer introduced a user-friendly
GUI.
2. Windows 1.0 (1985): Microsoft's first GUI-based operating system.
3. Linux (1991): An open-source operating system developed by Linus
Torvalds.

Modern Operating Systems (2000s-present)


1. Windows XP (2001): A popular operating system for personal computers.
2. macOS (2001): Apple's operating system for Mac computers.
3. Android (2008): A mobile operating system developed by Google.
4. iOS (2007): Apple's mobile operating system for iPhones and iPads.
5. Cloud Computing: Operating systems like Chrome OS (2011) focus on
cloud-based applications and services.

This brief history highlights key milestones in the development of operating


systems, from mainframe computers to modern mobile devices.

3). Best-Fit versus First-Fit Allocation?

First-Fit Allocation

• Method: Scans memory from the beginning and allocates the first block
that is large enough.
• Pros:
o Fast allocation (less search time).
o Simple to implement.
• Cons:
o Can lead to many small fragments at the beginning of memory
(external fragmentation).
• Example: If blocks are [100KB, 500KB, 200KB, 300KB] and a 212KB
process arrives, it skips 100KB and allocates in 500KB (first suitable
one).

Best-Fit Allocation
• Method: Searches entire memory and allocates the smallest block that
fits the process.
• Pros:
o Minimizes wasted space (reduces leftover memory).
• Cons:
o Slower due to full search.
o Can create many small unusable fragments.
• Example: With the same blocks, it will allocate 300KB block (best
fitting) for the 212KB process, not 500KB.

Comparison Summary

Feature First-Fit Best-Fit

Speed Faster Slower (searches all blocks)

Memory usage May waste large blocks Tries to minimize waste

Fragmentation More at the beginning More small unusable fragments

Search Method Stops at first fit Searches entire list

4). Virtual Memory-Cache Memory?

Virtual Memory

• Definition: Virtual Memory is a portion of hard drive (secondary


storage) that acts as an extension of RAM when the actual physical
RAM is full.
• Purpose: Allows a computer to run larger applications or multiple
programs that don't fit entirely into physical RAM.
• Location: Stored on the hard drive or SSD (using a file like pagefile or
swap space).
• Working:
o When RAM is full, less-used data from RAM is moved to virtual
memory.
o This process is called paging or swapping.
• Speed: Much slower than RAM (because hard drives are slower than
memory).
Example:
If you have 4GB RAM and 6GB of programs running, the extra 2GB will use
Virtual Memory.

Cache Memory
• Definition: Cache Memory is a small, very fast memory located inside
or near the CPU.
• Purpose: Speeds up access to frequently used data and instructions.
• Location: Located inside the CPU (L1, L2, and L3 cache levels).
• Working:
o Stores copies of data from frequently used main memory
locations.
o CPU first checks Cache before accessing RAM.
• Speed: Faster than RAM (and much faster than Virtual Memory).
Example:
When a CPU needs to perform a calculation, it first looks into Cache Memory
for required data.

Comparison Summary

Feature Virtual Memory Cache Memory

Purpose Extend RAM capacity Speed up CPU access to data

Speed Slow (Hard Disk/SSD speed) Very fast (faster than RAM)

Location On Hard Disk / SSD Inside or near CPU


Feature Virtual Memory Cache Memory

Size Large (several GBs) Very small (few MBs)

Managed by Operating System Hardware (CPU)

5). Paged Memory Allocation?

What is Paged Memory Allocation?

• Paged Memory Allocation is a memory management technique where


the physical memory (RAM) is divided into fixed-size blocks called
frames, and the logical memory (process memory) is divided into
blocks of the same size called pages.
• It eliminates problems like external fragmentation and makes memory
management easier and more efficient.

How It Works:
1. Logical Memory (process) is divided into pages (say 4 KB each).
2. Physical Memory (RAM) is divided into frames of the same size (4 KB).
3. When a process is loaded, its pages are loaded into any available
frames in RAM.
4. The Page Table keeps track of which page is stored in which frame.

Important Terms:
• Page: A fixed-size block of a process.
• Frame: A fixed-size block of physical memory.
• Page Table: A table used by the operating system to map pages to
frames.
Advantages:
• No External Fragmentation: Every frame is the same size.
• Efficient Memory Usage: Memory is used fully without large unusable
holes.
• Easy Swapping: Pages can be easily moved in and out.

Disadvantages:
• Internal Fragmentation: Last page may not fill the entire frame.
• Overhead: Maintaining a page table requires additional memory and
CPU time.

Example:
Imagine a program of size 10 KB. If each page/frame is 4 KB:
• Program is divided into 3 pages:
o Page 1 → 4 KB
o Page 2 → 4 KB
o Page 3 → 2 KB (last page not fully filled).
• These pages are loaded into any 3 free frames in RAM.

Simple Diagram Idea:


less
CopyEdit
Logical Memory (Pages):
[ Page 0 ] [ Page 1 ] [ Page 2 ]

Physical Memory (Frames):


[ Frame 5 (Page 0) ] [ Frame 12 (Page 1) ] [ Frame 3 (Page 2) ]

Page Table:
Page 0 -> Frame 5
Page 1 -> Frame 12
Page 2 -> Frame 3

6). Types of Devices-Sequential Access Storage Media?

Types of Devices: Sequential Access Storage Media

What is Sequential Access?


• In Sequential Access Storage, data is read or written in order, one piece
after another, from the beginning.
• You cannot directly jump to the data you want — you must go through
previous data first.
• Think: Like a cassette tape — to get to song 5, you must pass songs 1, 2,
3, 4.

Common Sequential Access Storage Devices:

Device Description

Traditional storage used for backups and archives. Data is


Magnetic Tape stored on a long strip of plastic tape coated with magnetic
material.

Cassette Tapes Used for audio recording and storage. Access is linear.
Device Description

Data Tapes used for storing computer data, especially for backup
Cartridges purposes in businesses.

Paper Tapes Early form of data storage where holes punched into paper
(historic) tape represented data.

Key Features:
• Slow access speed (must move sequentially).
• Low cost and high storage capacity (good for backup).
• Good for archival storage — not ideal for frequent read/write
operations.
• Durable when stored properly (especially magnetic tapes).

Advantages:
• Inexpensive for storing large amounts of data.
• Very reliable for long-term storage.

Disadvantages:
• Slow data retrieval (not good for quick random access).
• Wear and tear over time (mechanical parts).

Quick Comparison:

Feature Sequential Access Storage

Access Method In order (start → end)

Speed Slow (for finding specific data)

Cost Low
Feature Sequential Access Storage

Use Cases Backup, archival storage

7). Magnetic Disk Drive Access Times?

Magnetic Disk Drive Access Times


Access Time in a magnetic disk (like a hard drive) is the total time it
takes to read or write data.
It mainly includes three parts:

1. Seek Time
• Definition: Time taken for the read/write head to move to the
correct track on the disk.
• Example: Like moving the arm of a record player to the correct
circle (track) on a vinyl record.
• Typical Value: 2 ms to 10 ms (milliseconds).

2. Rotational Latency
• Definition: After reaching the track, it is the time waiting for
the disk to rotate so that the correct sector comes under the
head.
• Depends on: Disk’s rotation speed (measured in RPM —
Revolutions Per Minute).
• Example: Waiting for a specific word on a spinning wheel to
come in front of you.
• Typical Value: Around 2 ms to 5 ms.

3. Data Transfer Time


• Definition: Time to actually read or write the data after the
correct sector is under the head.
• Depends on:
o Disk rotation speed
o Data density (bits packed in tracks)
• Typical Value: Very small compared to seek and rotational
times (in microseconds).

Total Access Time Formula:


Access Time=Seek Time+Rotational Latency+Data Transfer Time\tex
t{Access Time} = \text{Seek Time} + \text{Rotational Latency} +
\text{Data Transfer
Time}Access Time=Seek Time+Rotational Latency+Data Transfer Tim
e

Quick Example:
If:
• Seek Time = 4 ms
• Rotational Latency = 3 ms
• Data Transfer Time = 0.5 ms
Then:
Total Access Time=4+3+0.5=7.5 ms\text{Total Access Time} = 4 + 3 +
0.5 = 7.5 \, \text{ms}Total Access Time=4+3+0.5=7.5ms

Simple Diagram Idea:


Disk Access:
[Move Head (Seek)] → [Wait for Rotation] → [Read/Write Data]

Summary Table
Term Meaning Typical Time

Move head to correct


Seek Time 2–10 ms
track

Wait for sector under


Rotational Latency 2–5 ms
head

Data Transfer Time Read/write the data 0.5 ms or less

8). Access Control?

Access Control Verification Module


The Access Control Verification Module is a part of a security
system responsible for checking whether a user (or system) is
allowed to access a specific resource or operation, based on
predefined access policies or permissions.
Where it fits in Access Control System:
1. User Request →
2. Authentication (identity verification, e.g., password) →
3. Access Control Verification Module →
4. Authorization Decision →
5. Access Granted or Denied

Functions of the Access Control Verification Module:


Function Description

Confirms the user's identity has been


Checks Credentials
authenticated.

Looks up access policies (e.g., RBAC, MAC, or


Reads Access Rules
DAC rules).

Verifies if the user meets required conditions


Evaluates Conditions
(e.g., correct role, location, time).

Grants or denies access based on the above


Makes Decision
checks.

Example Use Case:


• A user tries to delete a file.
• The system first authenticates the user.
• The Access Control Verification Module checks:
o Does this user have “delete” rights for this file?
o Is the action allowed at this time or location?
• If all checks pass → access granted.
Otherwise → access denied.

Technologies That Use This Module:


• Operating Systems (Windows, Linux)
• Web Applications (Admin/user dashboards)
• Cloud Platforms (AWS IAM, Azure RBAC)
• Databases (SQL GRANT/REVOKE commands)

Summary:
Feature Description

Verifies if access should be


Role
granted

User roles, permissions,


Depends on
policies

Part of Authorization phase

OS, apps, networks, cloud,


Used in
databases

9). Interacting with the File Manager?

Interacting with the File Manager


The File Manager is a software tool (part of the operating system)
that helps users and programs to organize, access, and manage files
and folders on a storage device (like a hard drive, SSD, or USB).

Basic Interactions with the File Manager:


Operation Description

Create Make a new file or folder.

View or run a file (e.g., double-click to open a


Open
Word document).

Rename Change the name of a file or folder.

Copy / Cut / Duplicate or move files/folders from one location


Paste to another.

Remove a file or folder (send to recycle bin or


Delete
permanently delete).

Search Find files/folders by name, type, or content.

Check file size, type, date modified, permissions,


View Properties
etc.

Sort / Arrange Organize files by name, date, type, size, etc.

Common File Managers:


Operating System File Manager Name

Windows File Explorer

macOS Finder

Linux (Ubuntu) Nautilus (Files)


Operating System File Manager Name

My Files / File
Android
Manager apps

iOS Files app

Advanced Interactions:
• Set file permissions (who can read/write/execute).
• Map network drives or access cloud storage.
• Use command line for file management (e.g., cd, ls, cp, rm in
Linux).

Example Tasks:
Create a new folder
Move a photo to another directory
Delete old documents
Rename a downloaded file
Search for a file modified last week

Why It’s Important:


• Helps keep data organized and accessible
• Allows efficient storage management
• Enables user control over files and security

You might also like