You are on page 1of 4

COLLEGE OF ENGINEERING

DEPARTMENT OF COMPUTER ENGINEERING


ENENGINEERING

DAZA, Lindsay Mae D.


BS – CpE 3-1

Discuss the different computing environments and


the operating system appropriate for each
environment.

• Traditional Computing
o As computing has matured, the lines separating many of the traditional computing environments
have blurred. Consider the “typical office environment.” Just a few years ago, this environment
consisted of PCs connected to a network, with servers providing file and print services

• Mobile Computing
o Two operating systems currently dominate mobile computing: Apple iOS and Google
Android. iOS was designed to run on Apple iPhone and iPad mobile devices.

• Peer to Peer Computing


Peer-to-peer networks gained widespread popularity in the late 1990s with several file-sharing
services, such as Napster and Gnutella, that enabled peers to exchange files with one another.

• Cloud Computing
o type of computing that delivers computing, storage, and even applications as a service across a network.
In some ways, it’s a logical extension of virtualization, because it uses virtualization as a base for its
functionality. For example, the Amazon Elastic Compute Cloud (ec2) facility has thousands of servers,
millions of virtual machines, and petabytes of storage available for use by anyone on the Internet. Users
pay per month based on how much of those resources they use.
In multiprogramming what operating system
features are needed to increase CPU utilization?

Definition: In the multiprogramming system, one or multiple programs can


be loaded into its main memory for getting to execute. It is capable only one
program or process to get CPU for executes for their instructions, and other
programs wait for getting their turn.

- Resource allocation
o When there are multiple processes running at the same time, resources must be allocated to
each of them. The operating system manages many different types of resources. Some (such
as CPU cycles, main memory, and file storage) may have special allocation code, whereas
others (such as I/O devices) may have much more general request and release code. For
instance, in determining how best to use the CPU, operating systems have CPU-scheduling
routines that take into account the speed of the CPU, the process that must be executed, the
number of processing cores on the CPU, and other factors. There may also be routines to
allocate printers, USB storage drives, and other peripheral devices.

- Error detection
o The operating system needs to be detecting and correcting errors constantly. Errors may
occur in the CPU and memory hardware (such as a memory error or a power failure), in I/O
devices (such as a parity error on disk, a connection failure on a network, or lack of paper in
the printer), and in the user program (such as an arithmetic overflow or an attempt to access
an illegal memory location). For each type of error, the operating system should take the
appropriate action to ensure correct and consistent computing. Sometimes, it has no choice
but to halt the system. At other times, it might terminate an error-causing process or return
an error code to a process for the process to detect and possibly correct

- Memory Management
o To improve both the utilization of the CPU and the speed of the computer’s response to its
users, general-purpose computers must keep several programs in memory, creating a need
for memory management.
Describe the tasks performed by the operating system
and formulate solutions that can be used when a user
encounters a problem related to the task.

The operating system's tasks are:


• Processor management
• Creating and deleting both user and system processes
• Scheduling processes and threads on the CPUs
• Suspending and resuming processes
• Providing mechanisms for process synchronization
• Providing mechanisms for process communication

• Memory management
• Keeping track of which parts of memory are currently being used and which process is using them
• Allocating and deallocating memory space as needed
• Deciding which processes (or parts of processes) and data to move into and out of memory

• File system management


• Creating and deleting directories to organize files
• Supporting primitives for manipulating files and directories
• Mapping files onto mass storage
• Backing up files on stable (nonvolatile) storage media

• Mass-storage management
• Mounting and unmounting
• Free-space management
• Storage allocation
• Disk scheduling
• Partitioning
• Protection
4. How does the distinction between kernel mode
and user mode function as a rudimentary form of
protection (security) system?

The operating system component running on the computer at all times after system boot.
Certain instructions could be executed only when the CPU is in kernel mode. Similarly, hardware
devices could be accessed only when the program is executing in kernel mode.

Wherein user mode a CPU mode for executing user processes in which some instructions are
limited or not allowed.

5. Consider the various definitions of operating system. Consider


whether the operating system should include applications such as
Web browsers and mail programs. Argue both that it should and
that it should not, and support your answer.

Point
In today's computer systems, applications like web browsers and emails are becoming
increasingly in demand. They should be included as part of the operating system to perform
this purpose. Since OS task is to manages computer hardware, software resources, and
provides common services for computer programs. Why not include the safer web.
Counterpoint
The operating system may struggle to manage system resources effectively. Furthermore,
we expand the operating system's size, increasing the chance of system breakdowns, errors
and security.

REFERENCES:

Silberschatz, A. (2018). Operating system concepts. John Wiley & Sons, Inc.

You might also like