• Programs To Access System Resources

  • CHAPTER TWO -- [Total Page(s) 13]

    Page 10 of 13

    Previous   6 7 8 9 10 11 12 13    Next
    • DIAGRAM OF DISK PLATTER

      Accessing a raw disk involves the data, the disk drive, the track location(s), and the sector location(s) within the corresponding tracks.
      However, at the application level, at programmer may prefer to specify a file and the location of updates, without worrying about the underlying physical complexity of the disk.
       3.2    COORDINATION
      A simple of coordination is protection. An operating system needs to protect different application from each other and crashing the operating system.
      Preventing applications from crashing each other is mainly achieved by making instances of applications run in different address spaces. Literally, an address space defines all memory address that an instance of application can touch.
      Preventing applications from crashing the operating system is commonly achieved by having dual-mode operations. When the operating system is running (e.g., the CPU is running under the user-mode), an application can only access states within its own address space.
      Note that if the operating system is dedicated to single application, dual- mode operations are not required.
      3.3    TYPES OF OPERATING SYSTEM
      a)    SINGLE AND MULTI-TASKING: A single-tasking system can only run one program at a time, while a multi-tasking operating system allows more than one program to be running in concurrency. This is achieved by time-sharing, dividing he available processor time between multiple processes which are each interrupted repeatedly in time-slices by a task scheduling subsystem of operating system. Multi-tasking may be characterized in pre-emptive and co-operative types. In pre-emptive multitasking, the operating system slices the CPU time and dedicates a slot to each of the programs. UNIX-like operating systems, e.g., Solaris, Linux, as well as AMIGAS operating system supports pre-emptive multi-tasking. Cooperative multitasking is achieved by relying on each process to provide time to the process in a defined manner. 16-bit version of Microsoft Windows used cooperative multitasking. 32-bit versions of both Windows NT and Win9x, used pre-emptive multi-tasking.
      b)    SINGLE AND MULTI-USER: Single-user operating systems have no facilities to distinguish users, but may allow multiple to run in tandem. A multi-user operating system extends the basic concept of multi-tasking with facilities that identify processes and resources, such as disk space, belonging to multiple users, and the system permits multiple users to interact with the system at the same time. Time-sharing operating systems schedules tasks for efficient use of the system and may also include accounting software for cost allocation of processor time, mass storage, printing, and other resources to multiple users.

  • CHAPTER TWO -- [Total Page(s) 13]

    Page 10 of 13

    Previous   6 7 8 9 10 11 12 13    Next
    • ABSRACT - [ Total Page(s): 1 ]Abstract coming soon ... Continue reading---

         

      CHAPTER ONE - [ Total Page(s): 8 ]POWER SUPPLY UNIT A supply unit (PSU) converts main AC to low-voltage regulated DC power for the internal components of a computer. Modern personal computer universally use a switched-mode power supply. Some power supplies have a manual selector for input voltage, while other automatically adapt to the supply voltage. ... Continue reading---

         

      CHAPTER THREE - [ Total Page(s): 5 ] CHAPTER THREE3.0    DETAILED REVIEW ON THE THEORIES AND PRINCIPLE OF OPERATING SYSTEMAn operating system is the largest and the most complicated software running on most machines. By knowing how operating system work, we learn how to organize a large piece of software (system design), how to hide complexity (abstraction), how to tune a large system (performance), and how to share software and hardware components i ... Continue reading---

         

      CHAPTER FOUR - [ Total Page(s): 27 ]CHAPTER FIVE5.0    SUMMARYThe project uses five chapter to run the cloning of and installation of Linux (OS the problem areas related to Digital Forensic techniques, Linux OS Digital Forensic issues, and Linux OS feature issues were identified. The review were narrowed down to review the gap in research in one area.The chapter one deal with the introduction, Linux OS operating system features of Linux OS, cloning, Hardware component and their function.Chapter two (2) deals with the review of ... Continue reading---

         

      CHAPTER FIVE - [ Total Page(s): 1 ]CHAPTER FIVE5.0    SUMMARYThe project uses five chapter to run the cloning of and installation of Linux (OS the problem areas related to Digital Forensic techniques, Linux OS Digital Forensic issues, and Linux OS feature issues were identified. The review were narrowed down to review the gap in research in one area.The chapter one deal with the introduction, Linux OS operating system features of Linux OS, cloning, Hardware component and their function.Chapter two (2) deals with the review of ... Continue reading---

         

      REFRENCES - [ Total Page(s): 1 ]5.3    REFERENCESRose.S.L (2013). “Linux Ubuntu End of Support is Right Around The Corner” Springboard Series Blog. Linux. Retrieved 27 March 2013.Cifaldi, F. (2015). “ EA and Zynga settle The Ville copycat case out of court”.Gamastra. Retrieved 15 September, 2015. Neowin Publishers.Linux Technology Overview ... Continue reading---