Computers Operating Systems The Operating Term Paper

Computers

Operating Systems

The operating system is a necessity for the computer to work. It organizes the hardware and software on the computer so they know how to interact with each other. How does it work? The operating system is the first thing the computer sees when you turn it on. It basically tells the other programs you are using when to run and what to do. The operating system is sophisticated enough to be able to prioritize commands and "interrupts" so the user can complete tasks quickly and easily.

In multi-tasking systems like many users utilize, the operating system has to prioritize more commands at the same time, and do it seamlessly, so the user cannot see any slowdown or change in their usage. The CPU can only do one thing at a time, so the operating system has to handle literally thousands of command at a time, and make them all work perfectly. The operating system uses its own memory to help control the processes, which use several other functions in the computer to help make this happen. Processes use registers, stacks, and queues in the operating memory and the CPU to "stack" commands on top of one another so they run successfully in sequence. The operating system uses cycles that use one process and then the other, but this is not apparent to the user. The operating system also makes copies of the registers, stacks, and queues and remembers where one process paused, then reloads all of the registers, stacks, and queues that the next process needs. This process of copying and reloading takes places with each process, and makes the entire computer multi-task so quickly that the user has no idea what is happening.

When the processes switch between each other, the operating system keeps track of what is happening with each one with a "process control block," which contains information about the process and its' status. Each process control block "comes alive" when the process is in use, and is "suspended" when the process is not running. The operating system also manages the memory, such as the cache and the main memory, in the computer and how the CPU uses it. Essentially, the operating system is a traffic cop of sorts, and it uses many other tools in the computer to make sure traffic is always running smoothly.

Cite this Document:

"Computers Operating Systems The Operating" (2005, November 02) Retrieved April 16, 2024, from
https://www.paperdue.com/essay/computers-operating-systems-the-operating-69178

"Computers Operating Systems The Operating" 02 November 2005. Web.16 April. 2024. <
https://www.paperdue.com/essay/computers-operating-systems-the-operating-69178>

"Computers Operating Systems The Operating", 02 November 2005, Accessed.16 April. 2024,
https://www.paperdue.com/essay/computers-operating-systems-the-operating-69178

Related Documents

Besides that, there are massive sections on system components and even "holistic issues" regarding systems, such as cost, installation, set-up, and much more. This could be the ultimate reference tool for any systems technician, and it seems that the information here is invaluable for just about anyone involved with computers at any level. It would seem that the information here is so detailed that just about anyone could find

New Computer System for the 21st Century Business Office It is impossible to imagine that any business can be run in the 21st century without an adequate computer system. And yet therein lies the rub: Determining what computer system is adequate for any business purpose is in fact a complex and difficult process in many cases. All too often what happens when a manager is faced with choosing a new

Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of

Retrieved from http://books.google.co.ke/books?id=3Tla6d153uwC&printsec=frontcover&dq=Encyclopedia+of+computer+science+and+technology&hl=en&sa=X&ei=dZH_UNjcIcHQhAeRg4C4Bw&ved=0CCwQ6AEwAA Kizza, J.M. (2005). Computer Network Security. New York, NY: Springer. Retrieved from http://books.google.co.ke/books?id=HsawoKBLZOwC&printsec=frontcover&dq=Computer+Network+Security&hl=en&sa=X&ei=uZH_UJn-NMbNhAeWroDYCA&ved=0CCwQ6AEwAA#v=onepage&q=Computer%20Network%20Security&f=false Musumeci, G.-P. D., & Loukides, M. (2002). System performance tuning: [help for Unix system administrators]. Beijing [u.a.: O'Reilly. Retrieved from http://books.google.co.ke/books?id=L4oyNrsFBbsC&printsec=frontcover&dq=System+performance+tuning&hl=en&sa=X&ei=C5L_UKjmNonMhAen8ICoBw&ved=0CDIQ6AEwAA Adelstein, T., & Lubanovic, B. (2007). Linux system administration. Sebastopol, Calif: O'Reilly. Retrieved from http://books.google.co.ke/books?id=- jYe2k1p5tIC&printsec=frontcover&dq=Advanced+system+administration&hl=en&sa=X &ei=fpP_UM6EN8HMhAff9YC4DQ&ved=0CD0Q6AEwBA#v=onepage&q=Advanced %20system%20administration&f=false Verma, D.C. (2009). Principles of computer systems and network management. Dordrecht: Springer. Retrieved http://books.google.co.ke/books?id=dUiNGYCiWg0C&printsec=frontcover&dq=Principles+of+computer+systems+and+network+management&hl=en&sa=X&ei=i5T_UIG3IMaBhQfF2YD4Bg&ved=0CDQQ6AEwAA#v=onepage&q=Principles%20of%20computer%20systems%20and%20network%20management&f=false Whyte, E. (2004, Feb 09). Be a system

Without the consent of the user, the program will never be elevated to administrator privilege. The MIC or integrity levels is again a new security concept with Vista OS. This feature is controlled by the Access control entry (ACE) in the System Access control List (SACL) of a file, process or a registry key. By associating every process with an integrity level, the OS limits privilege escalation attacks. [Matthew

7 billion by 2008 establishing the fact that Linux is no more a fringe player but rather a mainstream. IDC admitted that Linux is not being used just on new hardware only. As an alternative customers frequently reinstall existing servers to run Linux. While considering for such use as also the use of Linux for secondary OS, IDC forecasts for servers running Linux to remain 26% larger in 2008. Evidently,