Module 2 - Week 3 - Platform Technologies PDF
Module 2 - Week 3 - Platform Technologies PDF
Module 2 - Week 3 - Platform Technologies PDF
2. Introduction
This lesson presents the Operating System. An Operating System (OS)
acts as an intermediary between the user of a computer and computer hardware.
The purpose of an operating system is to provide an environment in which a user
can execute programs in a convenient and efficient manner. An operating system is
a software which performs all the basic tasks like file management, memory
management, process management, handling input and output, and controlling
peripheral devices such as disk drives and printers. Some popular Operating
Systems include Linux Operating System, Windows Operating System, VMS, OS/
400, AIX, z/OS, etc. Assessment tasks will be submitted on or before the scheduled
date as specified in the Course Guide.
3. Learning Outcome
After completing this module, the students should acquire the following
learning competencies:
Operating system (OS) is also referred as the intermediary between the computer
and the user. Instructions and request come from user through a peripheral or device will
be received first by the operating system then translated into a set of instruction that a
The users of a batch operating system do not interact with the computer
directly. Each user prepares his job on an off-line device like punch cards and submits
it to the computer operator. To speed up processing, jobs with similar needs are
batched together and run as a group. The programmers leave their programs with the
operator and the operator then sorts the programs with similar requirements into
batches.
The problems with Batch Systems are as follows − • Lack of interaction between
the user and the job.
- CPU is often idle, because the speed of the mechanical I/O devices is
slower than the CPU.
• Problem of reliability.
• With resource sharing facility, a user at one site may be able to use the
resources available at another.
• Speedup the exchange of data with one another via electronic mail.
• If one site fails in a distributed system, the remaining sites can potentially
continue operating.
• Better service to the customers.
A Network Operating System runs on a server and provides the server the
capability to manage data, users, groups, security, applications, and other networking
functions. The primary purpose of the network operating system is to allow shared file
and printer access among multiple computers in a network, typically a local area
network (LAN), a private network or to other networks. Examples of network operating
systems include Microsoft Windows Server 2003, Microsoft Windows Server 2008,
UNIX, Linux, Mac OS X, Novell NetWare, and BSD.
Soft real-time systems are less restrictive. A critical real-time task gets
priority over other tasks and retains the priority until it completes. Soft real-time
systems have limited utility than hard real-time systems. For example,
multimedia, virtual reality, Advanced Scientific Projects like undersea
exploration and planetary rovers, etc.
• Keeps tracks of processor and status of process. The program responsible for this
task is known as traffic controller.
• Allocates the processor (CPU) to a process.
• De-allocates processor when a process is no longer required.
• Ensuring that each process and application receives enough of the processor's
time to function properly
• Using as many processor cycles as possible for real work
Main memory provides a fast storage that can be accessed directly by the CPU. For
a program to be executed, it must in the main memory. An Operating System does the
following activities for memory management −
• Keeps tracks of primary memory, i.e., what part of it are in use by whom, what part
are not in use.
• In multiprogramming, the OS decides which process will get memory when and
how much.
• Allocates the memory when a process requests it to do so.
• Each process must have enough memory in which to execute, and it can neither
run into the memory space of another process nor be run into by another process.
• The different types of memory in the system must be used properly so that each
process can run most effectively.
• The first task requires the operating system to set up memory boundaries for types
of software and for individual applications.
Protection and security require that computer resources such as CPU, software,
memory etc. are protected. This extends to the operating system as well as the data in
the system. This can be done by ensuring integrity, confidentiality and availability in the
operating system. The system must be protected against unauthorized access, viruses,
worms etc.
Virus
Trap Door
A trap door is a security breach that may be present in a system without the
knowledge of the users. It can be exploited to harm the data or files in a system by
malicious people.
Worm
A worm can destroy a system by using its resources to extreme levels. It
can generate multiple copies which claim all the resources and don't allow any
other processes to access them. A worm can shut down a whole network in this
way.
Denial of Service
This type of attacks does not allow the legitimate users to access a system.
It overwhelms the system with requests so it is overwhelmed and cannot work
properly for another user.
Authentication
This deals with identifying each user in the system and making sure they
are who they claim to be. The operating system makes sure that all the users are
authenticated before they access the system. The different ways to make sure that
the users are authentic are:
• Username/ Password
Each user has a distinct username and password combination and they need
to enter it correctly before they can access the system.
• User Key/ User Card
The users need to punch a card into the card slot or use they individual
key on a keypad to access the system.
• User Attribute Identification
Different user attribute identifications that can be used are fingerprint,
eye retina etc. These are unique for each user and are compared with the
existing samples in the database. The user can only access the system if there
is a match.
• Secret Key
A hardware device can create a secret key related to the user id for
login. This key can change each time.
a. Start
b. Fail
c. Continue
d. None
6. It refers to management of Primary Memory or Main Memory
a. Processor management
b. Device management
ISUE–CCSICT –IM-092 - Instruction Material Page 15
ISUE__ __ Syl ___
Revision: 02
Effectivity: August 1, 2020
c. Memory management
d. None
7. What does an operating system consist of?
a. A set of users
b. A set of programs
c. A form of time sharing
d. None
8. Which of the following is the disadvantages of Time-sharing operating
system?
9. References (at least 3 references preferably copyrighted within the last 5 years,
alphabetically arranged)
Operating System. Retrieved from https://www.tutorialspoint.com/
operating_system/
Operating System. Retrieved from https://www.geeksforgeeks.org/types-
ofoperating-systems/
Abeeda SK, Lectures notes on Operating System 2018-2019. Retrieved from
https://www.crectirupati.com
https://www.tutorialspoint.com/Protection-and-Security-in-Operating-
System#:~:text=Protection%20and%20security%20requires%20that,CPU
%2C%20softwares%2C%20memory%20etc.&text=This%20can%20be%2
0done%20by,access%2C%20viruses%2C%20worms%20etc.