Professional Documents
Culture Documents
Booting is a process of switching on the computer and starting the operating system. When a
computer is switched on, the boot process loads the operating system into main memory
(RAM) installed inside it. Types of computer booting are Cold Booting and Warm Booting.
Cold Boot: when the user switches on a computer after it has been power off
completely,
Warm Boot: when the user restarts the computer.
1
Step 2: The Power-On-Self-Test (POST)
After all this process, the user interface starts, enabling user interaction with the computer
and its programs.
Q3. Write the difference between mac OS X and Unix operating system?
2
There are few differences:
File system – Mac OS X prefer to use HFS+ file system with slightly modified
directory location.
X11 vs Aqua – Most UNIX system use X11 for graphics. Mac OS X uses Aqua for
graphics.
Q4. Discuss the semaphore and consumer, dining philosopher, banker algorithm, and
producer algorithm?
Semaphores: are integers variables that are used to solve the critical section problem by
using two atomic operations wait and signal that are used for process synchronization.The
wait operation decrements the value of its argument if it is positive. And also a variable or
abstract data type used to control access to a common resource by multiple processes and
avoid critical section problems in a concurrent system such as a multitasking operating
system.
There are 3-types of semaphores namely Binary, Counting and Mutex semaphore. Binary
semaphore exists in two states I e. Acquired(Take), Released(Give). Binary semaphores have
no ownership and can be released by any task or ISR regardless of who performed the last
take operation. The correct use of a semaphore is for signalling from one task to another. A
mutex is meant to be taken and released, always in that order, by each task that uses the
shared resource it protects. By contrast, tasks that use semaphores either signal or wait—not
both
What is consumer OS
Computer Science MCA Operating System. The producer consumer problem is a
synchronization problem. There is a fixed size buffer and the producer produces items and
enters them into the buffer. The consumer removes the items from the buffer and consumes
them.
Dining philosophers
A problem states that there are 5 philosophers sharing a circular table and they eat and think
alternatively. There is a bowl of rice for each of the philosophers and 5 chopsticks. A
philosopher needs both their right and left chopstick to eat.
Potential solutions for the dining philosopher's problem for this are:
A philosopher must be allowed to pick up the chopsticks only if both the left and right
chopsticks are available.
Allow only four philosophers to sit at the table. That way, if all the four philosophers
pick up four chopsticks, there will be one chopstick left on the table.
Banker's algorithm
Is a resource allocation and deadlock avoidance algorithm that tests for safety by simulating
the allocation for predetermined maximum possible amounts of all resources, then makes an
“s-state” check to test for possible activities, before deciding whether allocation should be
allowed to continue.
3
Example of Bankers Algorithm
1. File Management
Operating system is used to manage files of computer system.a file is collection of specific
information stored in the memory of computer system. File management is defined as the
process of manipulating files in computer system, it management includes the process of
creating, modifying and deleting the files.
4
2. Process Management.
The three major jobs of a computer are Input, Output, and Processing. The primary role of the
operating system in computer Input / Output is to manage and organize I/O operations and all
I/O devices. In this chapter, you will learn about the various uses of input output devices
concerning the operating system.
4. Network Management
6. Secondary-Storage Management
Secondary storage is the non-volatile repository for (both user and system) data and
programs. As (integral or separate) part of an operating system, the file system manages this
information on secondary storage.
7. Security Management