0% found this document useful (0 votes)
3 views

operating system with gui topics

An Operating System (OS) is a program that serves as an interface between users and computer hardware, managing processes, memory, and information. It provides essential functions such as scheduling processes, memory management, and ensuring security and error prevention. The document also discusses the differences between computer worms and viruses, methods of virus infection, and the features of various operating systems like Windows NT and Linux.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

operating system with gui topics

An Operating System (OS) is a program that serves as an interface between users and computer hardware, managing processes, memory, and information. It provides essential functions such as scheduling processes, memory management, and ensuring security and error prevention. The document also discusses the differences between computer worms and viruses, methods of virus infection, and the features of various operating systems like Windows NT and Linux.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Q.1.What is an Operating System ? all running programs, called as sources. 3.

One should be extremely


Write its function. Ans. An Operating processes. careful about picking up free,
System is a program, which acts as 3. Operating system has to schedule unreliable or illegal software.
an interface between the user of all processes and will have to dispatch 4. Frequent back-ups and running of
computer and the computer them (i.e. run or execute) one after monitoring programs also help in
hardware. The operating system can the other. 4. While doing so, it gives detection, and thus subsequent
be viewed as a set of software an impression to user that he has the prevention of different viruses.
programs, normally supplied along full control of the CPU. Some of the Q.4.Differentiate between computer
with hardware for the effective and system calls in PM are listed below: worms and computer viruses.
easy use of the machine. The main 1.Block a process. 2. Ready a process. Ans.: Computer worms:
functions of an operating system 3. Dispatch a process.4. Suspend a i) A computer worm is a
are:i)The primary aim of the process.5. Resume a process. complete program.
operating system is to make the 6. Delay a process. ii) A computer worm can act
hardware convenient to use. ii) To iii) Memory management (MM): independently.
help users to execute programs. iii) 1. The services provided under Iii) Generally it do not cause direct
To control execution of program to memory management are directed to harm to the computer system. iv)It
prevent errors and improper use of keeping track of memory and just goes on spreading on to network
computer system. iv) To make allocating / deallocating it to various and consumes network resources to a
provision for security of information processes. I larg extent
to users. v) To eliminate duplicate 2. The operating system keeps a list of Computer viruses:
errors by number of programmers in free memory locations. i) A computer virus is not a
development of complicated 3. Before a program is loaded in the complete program, but a part of
routines. vi) It provides facility to memory from the disk, the MM program.
share the same hardware among the consults this free list, allocates the ii) A computer virus can not act
users. vii) Proper scheduling of memory to the process and updates independently.
resources among users. the list of free memory. iii)It causes direct harm to the
Q.2 Which are the three main areas 4. The memory allocated to process computer system. It has been written
in which the operating system depends on the program size. with clear intention infecting others
divides its services? Give examples System calls in Memory Management iv)A computer virus corrupts code and
Ans.:The O.S. divides its services in a. To allocate a chunk of memory to a data.
the following three main areas: process. b. free chunk of memory Q.5. What are the different methods
i) Information Management (IM) from a process. by which viruses can infect other
ii) Process Management (PM) Q.3.Discuss virus detection, removal programs?
iii) Memory Management (MM) and prevention philosophies. There are five well known methods by
Operating System i) Virus detection: 1)Normally, a which a virus can infect other
i) Information management: virus detection program checks the programs:
1. Information management (IM) integrity of the binary files 2) The (i) Append:In this method the viral
refers to a set of services used for program maintains a check sum on code appends itself to the unaffected
storing. retrieving, modifying or each file. A mismatch in it indicates programs.
removing the information on various virus.3) Some programs reside in (ii) Replace:In this case, the viral code
devices. 2. These system services the memory and continuously replaces the original executable
manages the organization of monitor certain memory and I/0 program completely or partially to
information in terms of directories operations for guarding against any carry out some funny actions.
and files, allocating and deallocating suspicious behavior. (iii) Insert:In this case, the viral code is
the sectors to various files, ensuring (ii) Virus removal: 1. A generalized inserted in the body of an executable
right people have access to the virus removal program is very difficult code to carry out some funny or
information and driving various to imagine due to the multiplicity of undesirable actions.
devices. Some of the system calls in the viruses and the creativity with (iv) Delete:In this case, the viral code
IM are listed below: which they are constructed. 2 deletes some code from the
1. Create a file.2. Create a directory. However, for some viruses, bit pattern executable prog
3. Open a file (for read,4. Close a file in code can be predicted. 3. In this (v) Redirect:
5. Move the file pointer. 6. Create a case virus removal program scans the This is an advanced approach
link. disk for the patterns of known viruses. employed by the authors of
ii) Process management (PM): On detection, it removes them. 4.But, sophisticated viruses. The normal
1. In multi user operating system, a if the virus has already damaged data, control flow of a program is changed
number of users located at different then recovery of data is almost to execute some other code, which
terminals run the same or different impossible. (iii) Virus prevention: 1. could exist as an appended portion of
programs. A computer has only one User cannot cure the data (recover) a normal program.
CPU and it can execute only one after viral affection. Hence the best
instruction belonging to any one of all way is to prevent viruses. 2.For this
these programs. 2. In such a case, the user must buy official, legal copies of
operating system has to keep track of software from reliable stores or
Rather than writing the code every blocked process can not be directly
Q.6. What is a file system? time, the device driver was simply scheduled even if CPU is free,
Ans.:1. The collection of related used from the library. whereas a ready process can be
information i.e. data or programs is Q.8.Explain the internal and external scheduled if the C.P.U. is free.
called a file. fragmentation?
2. Each file has a specific name, which Ans.: Internal fragmentation: Q.13.What is paging ? Explain Page
is used to refer to that file. 1. Wastage of memory space within Map Table (PMT).
3. For convenient use of the computer partitions is called internal 1.Partitions suffer from external
system, the O.S. provides a uniform fragmentation. 2. A file consists of a fragmentation because available
logical view of information storage. number of blocks. Consider the block memory is not contiguous.
4. The operating system manages size of a O. S is 1024 bytes and a file is 2.Paging permits a program's memory
mass storage devices to implement 3499 bytes. 3. Then, when it is to be non-contiguous allowing a
the abstract concept file. loaded in memory for execution it program to be allocated physical
5. The O.S. maps files on to physical would have allocated 4 blocks. 4. memory wherever it is available.
devices such as tapes or disks. Thus the last 597 bytes would be 3.Physical memory is broken into
6. Using various data structures, the wasted. 5. This is called internal fixed-size blocks called Page Frames.
file system in IM allows users to fragmentation. 6. Larger block size 4.Logical memory is also broken into
define files and device causes more internal fragmentation. blocks of the same size called Pages.
allocate/deallocate the disk space to External fragmentation: 5.When a program is to be executed
each file. 1. Variable partitions suffer from its pages are loaded into any available
There are two types of file systems: external fragmentation. frames and the page map tables are
1. Tape-based systems 2. Suppose a job of 512 bytes is defined to translate from user pages
2. Disk-based systems. terminated and a new job of 256 to memory frames
1. Tape-based systems: bytes is loaded in the partition, then 6.The page size is defined by
a. Tape-based systems are simple but 256 bytes of memory is wasted. This is hardware. It is typically the power of 2
inefficient. called external fragmentation. Q.14.What a function of file system
b. In these systems, files are stored Q.9. Explain Running, Ready and and device management system?Ans:
onto reels of physical tapes. Blocked process states in process Function of file system are:
c. Generally one or more files are management. OR Discuss various 1.It allows the user to define files and
stored on to one tape. process states with examples. directories and allocated/deallocate
d. Tapes are used for transport of Ans.: the disk space to each file.2. It stores
data from one computer to another. In order to manage switching data or information.3.Arrange various
2. Disk-based systems: between processes, the operating file of same type under one directory.
a.The problem with tabe-base system defines three basic process 4.Function of device management or
systesm are resolved with disk based- states, which are as given below. device driver are: 1.Writtenspecial
systems. i) Running state: subroutine for each I/O device such
b. In disk-based systems, a disk is 1. There is only one process, which is subroutine is called device driver.2. It
used. executed by C.P.U. at any given moves data from driver to terminal.
c. Each disk is divided into tracks and moment. 2. This process is called a Q.15..Virtual Memory:-
each track is further divided into a running process. 3. In multiprocessor • Virtual memory is a technique which
number of sectors. systems, with multiple C.P.U, there allows execution of processes that
d. Number of tracks and size of are many running processes at a given may not be completely in memory.
sectors is variable. It varies from one moment. The operating system keeps Some part of program can be on disk
drive to another track of all of them. • The main advantages of this is that
e.A disk has a device directory, ii) Ready state: the user programs can be larger than
indicating which files are on the disk. 1. The process, which is not waiting physical memory
f.The directory lists the file name, for an external event such as an I/O • Virtual memory is difficult to
starting address, file length, type of operation, but which is not running, is implement and it decreases
file, time of last update etc. said to be in ready state. 2. Actually, a performance
Q.7.WHAT ARE DIVICE DRIVERS? process in ready state could have • They can be implemented by
Ans.:1.Device drivers are software been running. 3. But the fact that paging, segmentation or combined
programs required for each device. there is only one C.P.U., which is scheme
2.Each device will require different executing some other process, while • A program is divided into pages and
drivers as per functionality. this process is waiting for C.P.Us some pages are loaded in memory
3. A device driver knows how the attention towards it. iii) Blocked when rest remains on disk
buffers, flags, register control and state: • Whenever they are required they
status bits should be used for a 1. When a process is waiting for an are loaded in mem
particular device.4.Some device external event such as an I/O
drivers are useful for data conversion. operation, the process is said to be in
5. For simply reading a character from a blocked state.
a device involves a complex sequence 2. The major difference between
of device specification operations. 6. blocked and ready process is that
Unix-Like File System: The way files iv) Internet conferences can also be
and directories are organized and arranged.
managed in Linux follows the rules 4) More entertaining:i) Windows 98
and structure familiar to Unix supports DVD and digital audio. Users
Q.10.• GUI: • The interface which systems, which is efficient and well- can play high- quality digital movies
replaces cryptic commands by their understood by many users. and audio on the computer.
graphical representation are called Q. What are the features of Windows Q. 43 Explain memory map of single
Graphical User Interface NT? ORExplain any four features of user operating system.
Q.11• Advantages: 1. With GUI, the Windows NT operating system. Free memory
commands are replaced by graphics. The features of Windows NT are listed Process
Hence it is not necessary to below: 1) Windows NT is a Command interpreter
remember the command and its multitasking, multiuser and Kernel
meaning 2. With GUI, user can run multithreading operating system. Memory map of single user OS
several programs simultaneously 3. 2) A user will get a faster response 1) The operating system like MS-DOS
User can communicate and exchange even though multiple applications are is single user O.S.
data between programs without running. 2) The memory map of such operating
transferring or copying files 4. Easy to 3) Windows NT supports a virtual systems consists of program to
use, consistent GUI for virtually all memory management system to allow executed i.e. process, free memory
programs. Q.12 Components of gui : multiprogramming available, command interpreter and
Title bar: This horizontal line, on fop is 4) In Windows NT, symmetric kernel.
the name of the program.• multiprocessing means that the (3) The command interpreter of the
Maximize / Restore button: the system can manage different tasks by single user operating system is
window can be made full screen by using any of the CPUs available in a invoked when the computer is
clicking square button. Now this computer that has more than one started.
button gets converted into restore, It processor. (4) This O.S. loads a program to be
is indicated by double square. When 5) Windows NT is a 32-bit operating executed in main memory and assigns
we click restore, window gets its system. as much memory as possible to it. It
previous size • Close button: when 6) Windows NT uses New Technology then sets the instruction pointer and
we click close button, the window or File Systems (NTFS), which implement executes the program.
that application gets closed.•Menu fault tolerance, security and has (5) If the program is terminated, then
bar: This consist of different main support for very large files. it is removed from memory.
menus which can be used in program. Q.8 What are the features of (6) The kernel of such O.S. provides
The main menus consist of different Windows 98? basic operating systems service file
submenus. A menu can be selected by The main features of Windows98 the command interpreter interprets
clicking it areas listed below: the commands.
• Scroll bars: This allow user to scroll 1) Easier to use :
horizontally and vertically. i) Windows 98 is a single-user
Q.12 What are the features of Linux? multitasking operating system.
Multiuser Support: Many people can ii) Navigating the computer is easier in
use Linux at the same time, each with Windows 98.
their own settings and files. Runs on iii) A file can be opened with a single
Many Devices: Linux is very flexible click.
and can work on a broad range of iv) Windows 98 allows us to use
machines, from PCs to other types of multiple monitors with a single
hardware. Efficient: Linux is designed computer.
to do a lot with a little, meaning it v) New hardware can be easily
doesn't need much power or memory installed and used without restarting
to run well. It can even work on older the computer.
computers with as little as 4MB of 2) Faster:
RAM. User and Programmer i) Windows and programs open faster
Friendly:Linux offers a consistent way than in Windows 95.
users and developers to interact with ii) The computer speed and efficiency
the system, making it easier to use can be easily improved by simple
and program. Wide Range of maintenance.
Applications: There's a large variety of 3) True web integration:
software available for Linux, covering i) Windows 98 can be easily
almost any task you might want to do. connected to the internet.
Open and Free: Linux is completely ii) Web pages can be viewed in any
free to use, share, and modify. You window.
can tweak content or use it as is, iii) Using Microsoft Outlook Express,
without worrying about licensing fees. E-mails and messages can be sent to
internet newsgroups.

You might also like