An Operating System (OS) serves as an interface between users and computer hardware, managing processes, memory, and information. Its main functions include scheduling processes, managing memory allocation, and ensuring security and error prevention. Additionally, it differentiates between computer worms and viruses, outlining their characteristics and impacts on systems.
An Operating System (OS) serves as an interface between users and computer hardware, managing processes, memory, and information. Its main functions include scheduling processes, managing memory allocation, and ensuring security and error prevention. Additionally, it differentiates between computer worms and viruses, outlining their characteristics and impacts on systems.
Q.1.What is an Operating System ? all running programs, called as sources. 3.
One should be extremely
Write its function. Ans. An Operating processes. careful about picking up free, System is a program, which acts as an 3. Operating system has to schedule all unreliable or illegal software. interface between the user of processes and will have to dispatch 4. Frequent back-ups and running of computer and the computer them (i.e. run or execute) one after the monitoring programs also help in hardware. The operating system can other. 4. While doing so, it gives an detection, and thus subsequent be viewed as a set of software impression to user that he has the full prevention of different viruses. programs, normally supplied along control of the CPU. Some of the Q.4.Differentiate between computer with hardware for the effective and system calls in PM are listed below: worms and computer viruses. easy use of the machine. The main 1.Block a process. 2. Ready a process. Ans.: Computer worms: functions of an operating system 3. Dispatch a process.4. Suspend a i) A computer worm is a are:i)The primary aim of the process.5. Resume a process. complete program. operating system is to make the 6. Delay a process. ii) A computer worm can act hardware convenient to use. ii) To iii) Memory management (MM): independently. help users to execute programs. iii) 1. The services provided under Iii) Generally it do not cause direct To control execution of program to memory management are directed to harm to the computer system. iv)It just prevent errors and improper use of keeping track of memory and goes on spreading on to network and computer system. iv) To make allocating / deallocating it to various consumes network resources to a larg provision for security of information processes. I extent to users. v) To eliminate duplicate 2. The operating system keeps a list of Computer viruses: errors by number of programmers in free memory locations. i) A computer virus is not a development of complicated 3. Before a program is loaded in the complete program, but a part of routines. vi) It provides facility to share memory from the disk, the MM program. the same hardware among the users. consults this free list, allocates the ii) A computer virus can not act vii) Proper scheduling of resources memory to the process and updates independently. among users. the list of free memory. iii)It causes direct harm to the Q.2 Which are the three main areas in 4. The memory allocated to process computer system. It has been written which the operating system divides its depends on the program size. with clear intention infecting others services? Give examples System calls in Memory Management iv)A computer virus corrupts code and Ans.:The O.S. divides its services in the a. To allocate a chunk of memory to a data. Q.5. What a function of file following three main areas: process. b. free chunk of memory system and device management i) Information Management (IM) from a process. system?Ans: ii) Process Management (PM) Q.3.Discuss virus detection, removal Function of file system are: iii) Memory Management (MM) and prevention philosophies. 1.It allows the user to define files and Operating System i)Virus detection: 1)Normally, a virus directories and allocated/deallocate i) Information management: detection program checks the the disk space to each file.2. It stores 1. Information management (IM) integrity of the binary files 2)The data or information.3.Arrange various refers to a set of services used for program maintains a check sum on file of same type under one directory. storing. retrieving, modifying or each file. A mismatch in it indicates 4.Function of device management or removing the information on various virus.3)Some programs reside in the device driver are: 1.Writtenspecial devices. 2. These system services memory and continuously monitor subroutine for each I/O device such manages the organization of certain memory and I/0 operations subroutine is called device driver.2. It information in terms of directories and for guarding against any suspicious moves data from driver to terminal. files, allocating and deallocating the behavior. Q.Virtual Memory:- sectors to various files, ensuring right (ii) Virus removal: 1. A generalized • Virtual memory is a technique which people have access to the information virus removal program is very difficult allows execution of processes that may and driving various devices. Some of to imagine due to the multiplicity of not be completely in memory. Some the system calls in IM are listed the viruses and the creativity with part of program can be on disk below: which they are constructed. 2 • The main advantages of this is that 1. Create a file.2. Create a directory. However, for some viruses, bit pattern the user programs can be larger than 3. Open a file (for read,4. Close a file in code can be predicted. 3. In this physical memory 5. Move the file pointer. 6. Create a case virus removal program scans the • Virtual memory is difficult to link. disk for the patterns of known viruses. implement and it decreases ii) Process management (PM): On detection, it removes them. 4.But, performance 1. In multi user operating system, a if the virus has already damaged data, • They can be implemented by paging, number of users located at different then recovery of data is almost segmentation or combined scheme terminals run the same or different impossible. (iii) Virus prevention: 1. • A program is divided into pages and programs. A computer has only one User cannot cure the data (recover) some pages are loaded in memory CPU and it can execute only one after viral affection. Hence the best when rest remains on disk instruction belonging to any one of all way is to prevent viruses. 2.For this • Whenever they are required they are these programs. 2. In such a case, the user must buy official, legal copies of loaded in memory. operating system has to keep track of software from reliable stores or