Preview

Essential Properties of Operating Systems

Good Essays
Open Document
Open Document
2381 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Essential Properties of Operating Systems
Chapter-1: Exercise Solution
1.1 In a multiprogramming and time-sharing environment, several users share the system simultaneously. This situation can result in various security problems. a. What are two such problems? b. Can we ensure the same degree of security in a time-shared machine as in a dedicated machine? Explain your answer.

Answer: a. Stealing or copying one’s programs or data; using system resources (CPU, memory, disk space, peripherals) without proper accounting. b. Probably not, since any protection scheme devised by humans can inevitably be broken by a human, and the more complex the scheme, the more difficult it is to feel confident of its correct implementation.

1.2 The issue of resource utilization shows up in different forms in different types of operating systems. List what resources must be managed carefully in the following settings: a. Mainframe or minicomputer systems b. Workstations connected to servers c. Handheld computers Answer: a. Mainframes: memory and CPU resources, storage, network bandwidth. b. Workstations: memory and CPU resouces c. Handheld computers: power consumption, memory resources.

1.3 Under what circumstances would a user be better off using a timesharing system rather than a PC or single-user workstation? Answer: When there are few other users, the task is large, and the hardware is fast, timesharingmakes sense. The full power of the system can be brought to bear on the user’s problem. The problemcan be solved faster than on a personal computer. Another case occurs when lots of other users need resources at the same time. A personal computer is best when the job is small enough to be executed reasonably on it and when performance is sufficient to execute the program to the user’s satisfaction. 1.4 Which of the functionalities listed below need to be supported by the

operating system for the following two settings: (a) handheld devices and (b) real-time systems. a. Batch programming b. Virtual memory c. Time sharing

You May Also Find These Documents Helpful

  • Good Essays

    1. For the desktop stations, you should consider Physical Ram for running the programs, Space on the hard drive for the software they would need to store, and processor strength for test running and for debugging.…

    • 7085 Words
    • 29 Pages
    Good Essays
  • Satisfactory Essays

    (True/False) 9. ________involves the allocating and de-allocating memory, CPU scheduling in case of multi-process. Self Assessment Questions 10. __________ are computers or groups of computers that provides services to other computers, connected via network.…

    • 4533 Words
    • 19 Pages
    Satisfactory Essays
  • Powerful Essays

    3.b What kinds of hardware and software would you recommend, why would you recommend it?…

    • 692 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Protection is the next requirement to be satisfied. Protection deals with security against unwanted interference by other processes. Programs from other process should not be able to access memory locations in a process for reading or writing Purposes without permission. The processor must be able to abort such instructions at the point of execution.…

    • 573 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Week 5 Pos 355

    • 2010 Words
    • 9 Pages

    Operating systems were not in existence before the 1960s. The definition of operating systems is a program designed to run other programs on the computer and is the most important program. In the past, computers were built to execute a series of single task similar to a calculator. In the 1960s came the MCP (Master Control Program) for the B5000 mainframe computer created by the company Burroughs/Unisys. The MCP was the first OS written exclusively in a high-level language. As the years progressed, OS giants were starting to form such as Windows, Linux, and Mac. In, this paper, these 3 tech OS giants will be examined thoroughly while covering memory management, process management, file management, and security.…

    • 2010 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    IT 282 sylabus

    • 2660 Words
    • 11 Pages

    University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality.…

    • 2660 Words
    • 11 Pages
    Satisfactory Essays
  • Good Essays

    4. Give an example of how hardware can influence the operating system and software and vice versa.…

    • 816 Words
    • 3 Pages
    Good Essays
  • Better Essays

    When considering which operating system for a home or business office computer or network of computers, it is important to evaluate all areas of the different operating systems options. When evaluating Microsoft Windows XP, Microsoft Windows Server 2008, and Linux operating systems it is important to consider the system requirements, the different editions available, security features, system features, updates and support, user interface, and cost effectiveness. Depending on what a person’s or organization’s needs are will determine which operating system is best fit.…

    • 4523 Words
    • 19 Pages
    Better Essays
  • Good Essays

    1. When determining the appropriate hardware components of a new information system, what role must the user of the system play?…

    • 1937 Words
    • 8 Pages
    Good Essays
  • Satisfactory Essays

    Operating Systems

    • 1023 Words
    • 5 Pages

    9)A monolithic kernel is implemented as a single process with all elements sharing the same address space. (True)…

    • 1023 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Hacking is commonly used to refer to forms of trespass against a computer belonging to someone else. As per Infosec, a website devoted to information security – "Hacking means illegally accessing other people's computer systems for destroying, disrupting or carrying out illegal activities on the network or computer systems". Digitalguards defines it as, "Unauthorized use, or attempts to circumvent or bypass the security mechanisms of an information system or network".…

    • 2842 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Memory protection requirements are to be satisfied by the hardware rather than the operating system. The software is unable to anticipate all of the references made by the programs. Read and write restrictions are made to control this area.…

    • 392 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Tsl061

    • 568 Words
    • 3 Pages

    OPERATING SYSTEMS AND UTILITY PROGRAMS  System software  Operating System Functions  Types of…

    • 568 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    As machines became more powerful, the time needed for a run of a program diminished and the time to hand off the equipment became very large by comparison. Accounting for and paying for machine usage went from checking the wall clock to using the computer to do the timing. Run queues went from being people waiting at the door to stacks of media waiting on a table to using the hardware of the machine such as switching which magnetic tape drive were online or stacking punch cards on top of the previous jobs cards in the reader. Operating the computer went from a task performed by the program developer to a job for full time dedicated machine operators. When commercially available computer centers found they had to deal with accidental or malicious tampering of the accounting information, equipment vendors were encouraged to enhance the properties of the runtime libraries to prevent misuse of the systems resources. Accounting…

    • 1225 Words
    • 5 Pages
    Good Essays
  • Better Essays

    2. It optimally manages the hardware resources of the computer which may include CPU, main memory, hard disks, I/O devices, network interface card, etc.…

    • 1213 Words
    • 5 Pages
    Better Essays