0% found this document useful (0 votes)
67 views5 pages

Summarized Notes for revision - OS

The document is a study guide on operating systems, covering definitions, functions, types, process management, memory management, file management, device management, and security. It outlines key concepts such as process states, memory allocation techniques, and user authentication methods. Recap questions are provided at the end of each chapter to reinforce understanding.

Uploaded by

doublejj254
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views5 pages

Summarized Notes for revision - OS

The document is a study guide on operating systems, covering definitions, functions, types, process management, memory management, file management, device management, and security. It outlines key concepts such as process states, memory allocation techniques, and user authentication methods. Recap questions are provided at the end of each chapter to reinforce understanding.

Uploaded by

doublejj254
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Summarized Notes for revision

Operating System Study Guide


Chapter 1: Introduction to Operating Systems
Definition

An Operating System (OS) is system software that manages computer hardware and software
resources and provides common services for computer programs. It acts as an intermediary
between users and the computer hardware, ensuring smooth operation and resource allocation.

Functions of an Operating System

1. Process Management – Controls the execution of processes, allocates CPU time, and
ensures proper execution.
2. Memory Management – Allocates and deallocates memory space as needed.
3. File System Management – Organizes, stores, retrieves, and manages files on storage
devices.
4. Device Management – Facilitates communication between the OS and hardware
peripherals.
5. User Interface – Provides an interface (GUI or CLI) for users to interact with the system.
6. Security Management – Protects data, prevents unauthorized access, and ensures system
integrity.
7. Error Handling – Detects, reports, and resolves system errors.
8. Networking Management – Enables communication between computers over a
network.

Recap Questions:

1. What is the main role of an operating system?


2. List and briefly explain five key functions of an OS.
3. How does an OS manage security?
4. Why is process management important?

Chapter 2: Types of Operating Systems


1. Single-user vs Multi-user OS

 Single-user OS: Supports one user at a time (e.g., Windows, macOS).


 Multi-user OS: Allows multiple users to access the system simultaneously (e.g., Unix,
Linux).

2. Batch Operating System

 Executes batches of jobs without user interaction.


 Used in early mainframe systems for processing large amounts of data.

3. Time-Sharing Operating System

 Allocates CPU time to multiple users or processes.


 Uses scheduling algorithms like Round Robin.
 Example: Unix, Linux.

4. Real-Time Operating System (RTOS)

 Used in applications requiring immediate response (e.g., medical devices, aircraft control
systems).
 Two types: Hard RTOS (strict timing constraints) and Soft RTOS (flexible timing
constraints).

5. Distributed Operating System

 Manages multiple computers as a single system.


 Enables resource sharing and load balancing.
 Example: Cloud-based OS, networked servers.

Recap Questions:

1. What is the difference between a single-user and multi-user OS?


2. Define a batch OS and provide an example.
3. What is an RTOS, and where is it used?
4. Explain the concept of a distributed OS.

Chapter 3: Process Management


Definition of a Process

A process is an executing program, including code, data, and system resources assigned to it.

Process States

1. New: The process is created and awaits execution.


2. Ready: The process is waiting to be assigned CPU time.
3. Running: The process is actively being executed.
4. Waiting: The process is paused, waiting for an event (e.g., I/O completion).
5. Terminated: The process has finished execution.

Process Scheduling

Determines the order of process execution. Common scheduling algorithms include:

 First Come First Serve (FCFS): Processes are executed in the order of arrival.
 Shortest Job Next (SJN): Executes the process with the shortest execution time first.
 Round Robin (RR): Allocates fixed time slices to processes in a cyclic order.
 Priority Scheduling: Processes with higher priority are executed first.

Recap Questions:

1. What is a process in an operating system?


2. List and explain the five states of a process.
3. Name and describe two process scheduling algorithms.
4. What happens to a process when it moves to the "Waiting" state?

Chapter 4: Memory Management


Memory Types

 Primary Memory (RAM): Fast but volatile storage used for running processes.
 Secondary Memory (HDD/SSD): Slower but non-volatile storage used for permanent
data.

Memory Allocation Techniques

 Contiguous Allocation: Memory is allocated in one continuous block.


 Paging: Divides memory into fixed-size blocks (pages) that map to frames in physical
memory.
 Segmentation: Divides memory into logical sections (segments) based on program
structure.

Virtual Memory

 Uses disk storage as an extension of RAM.


 Employs swapping techniques to transfer data between RAM and disk.

Recap Questions:
1. Define primary and secondary memory.
2. How does paging differ from segmentation?
3. What is virtual memory, and how does it benefit an OS?
4. Explain how contiguous allocation works.

Chapter 5: File Management


File Attributes

 Name, Type, Size, Location, Permissions, Timestamps.

Directory Structures

1. Single-Level Directory: Simple but lacks organization.


2. Two-Level Directory: Separate directories for each user.
3. Tree-Structured Directory: Organized in a hierarchy.
4. Acyclic Graph Directory: Allows file sharing through links.

File Access Methods

 Sequential Access: Reads data in order.


 Direct Access: Allows random access to data.
 Indexed Access: Uses an index to locate files.

Recap Questions:

1. What are the main attributes of a file?


2. Compare single-level and tree-structured directories.
3. What are the three file access methods?
4. Why is an acyclic graph directory structure useful?

Chapter 6: Device Management


I/O System

 Manages communication between the OS and hardware devices.

Device Drivers

 Acts as a translator between the OS and hardware.


Interrupt Handling

 Hardware Interrupts: Generated by hardware devices (e.g., keyboard input).


 Software Interrupts: Triggered by programs requiring OS intervention.

Recap Questions:

1. What is the role of a device driver?


2. Differentiate between hardware and software interrupts.
3. How does an OS manage I/O operations?

Chapter 7: Security and Protection


User Authentication

 Methods include passwords, biometrics, two-factor authentication.

Access Control

 File permissions (Read, Write, Execute) and user roles (Admin, User, Guest).

Threats & Prevention

 Malware: Includes viruses, worms, trojans.


 Security Measures: Firewalls, encryption, antivirus software.

Recap Questions:

1. What are three authentication methods used in an OS?


2. Describe different types of malware.
3. How do access control mechanisms improve security?

You might also like