Professional Documents
Culture Documents
system. [1]
Summary
SORIANO, MABELYN
BSCS-3A
TOPIC (SLIDE NO.) CITATIONS
I/O Device Management According to (Williams, 2022), I/O Device Management is one of the
[Module 1, slide no. 12, important use of an operating system that helps to hide the variations of
Components of OS] specific hardware devices from user.
Cloud Computing (Onsman, 2018) stated that in cloud computing environment, the
Environment computing is moved away from individual computer systems to a
[Module 1 Slide no. cloud of computers in cloud computing environment. The cloud
21, Types of users only see the service being provided and not the internal
Computing details of how the service is provided. This is done by pooling all
Environment] the computer resources and then managing them using a software.
Types of cloud computing includes Public, Private, and Hybrid.
VIVERLYN O. UBERITA
BSCS 3A
TOPIC (SLIDE NO.) CITATIONS
William L. (2022) it states Interrupt latency is not considered
Module 1 – Slide 15 as important as in RTOS
Components of OS: Interrupt lag is minimal, which is measured in a few
Interrupt microseconds. [4]
A. Javatpoint (n.d), Interrupts are signals emitted by software
or hardware when a process or event requires immediate
attention. Because both hardware and software generate these
signals, they are referred to as the hardware, and the software
interrupts. A hardware device produces an interrupt. Interrupts
can be caused by a USB device, a NIC card, or a keyboard.
Interrupts happen asynchronously, and they may happen at any
time. [2]
B. Tim Bower (2015) Interrupts are signals sent to the CPU by
external devices, normally I/O devices. They tell the CPU to stop
its current activities and execute the appropriate part of the
operating system. [3]
C. ElProCus(2020)- In the operating systems, iterrupts are
essential because they are a reliable technique for the OS to
communicate and react to their surroundings. [1]
Summary
Clusters are widely used with the respect to the criticality of the
data or content handled and the processing speed expected EDUCBA
(2021) computing refers that many of the computers connected on a
network and they perform like a single entity. WatElectronics
(2021). It works on the distributed system with the networks.
EDUCBA (2021).
GROUP 5
EJ L. IDULAN
BSCS 3A
TOPIC (SLIDE NO.) CITATIONS
William L. (2022) stated that Network management is the
Module 1 – Slide 15 process of administering and managing computer networks. It
Components of OS: includes performance management, fault analysis, provisioning of
Network Management networks, and maintaining the quality of service. [4]
Summary
LORENCE A. TABAREJO
BSCS 3A
TOPIC (SLIDE NO.) CITATIONS
Main Memory is a large array of storage or bytes, which has
Module 1 – Slide 13 an address. The memory management process is conducted by using
Components of OS: a sequence of reads or writes of specific memory addresses.
Main Memory Management In order to execute a program, it should be mapped to
absolute addresses and loaded inside the Memory. The selection of a
memory management method depends on several factors.
A. William, Lawrence. (2022, March 05) “Components of
Operating System.” He states that main memory is a large array
of storage or bytes, which has an address. The memory
management process is conducted by using a sequence of reads
or writes of specific memory addresses. In order to execute a
program, it should be mapped to absolute addresses and loaded
inside the Memory. The selection of a memory management
method depends on several factors. However, it is mainly based
on the hardware design of the system. Each algorithm requires
corresponding hardware support. Main Memory offers fast
storage that can be accessed directly by the CPU. It is costly and
hence has a lower storage capacity. However, for a program to be
executed, it must be in the main Memory
Summary
Summary
Mae A. Teaño
BSCS 3A
TOPIC (SLIDE NO.) CITATIONS
William L. (2022) states security management various
Module 1 – Slide 18 processes in an operating system need to be secured from each
Components of OS: other’s activities. For that purpose, various mechanisms can be
Security Management used to ensure that those processes which want to operate files,
memory CPU, and other hardware resources should have proper
authorization from the operating system. For example, Memory
addressing hardware helps you to confirm that a process can be
executed within its own address space. The time ensures that no
process has control of the CPU without renouncing it. Lastly, no
process is allowed to do its own I/O, to protect, which helps you to
keep the integrity of the various peripheral devices. [4]
A. Jain, P. (2018), states the security management function
of an operating system helps in implementing mechanisms
GROUP 5
REFERENCES
Shidling, C. (2022, February 21). What is kernel, why it is needed, purpose of kernel, types. CS
Electrical & Electronics. Retrieved from https://bit.ly/3tgYdeS
AfterAcademy. (2019, November 11). What is kernel in operating system and what are the
various types of kernel? Retrieved from https://bit.ly/3wlAGv9
Williams, L. (2022, February 5). What is operating system? explain types of os, features and
examples. Guru99. Retrieved from https://bit.ly/366tkB2
Taylor, K. (2021, October 14). Learn more about computing environment and its different types.
HitechNectar. Retrieved from https://bit.ly/3KX38I2
Ranger, S. (2022, 02 26). What is cloud computing? Everything you need to know about the
cloud explained. Retrieved from https://bit.ly/3CS5oNM
ElProCus. (2020, February 10). Operating system components and their services.
Retrieved from https://bit.ly/3inOhK5
Tim Bower (2015) 1.7. Basics of How Operating Systems Work - Operating Systems
Study Guide. (n.d.). 1.7. basics of how operating systems work. Retrieved from
https://bit.ly/3u7HEkJ
Williams, L. (2022, March 5). Real-time operating system (RTOS): Components, types,
examples. Guru99. Retrieved from https://bit.ly/3u5U4tm
EDUCBA. (2021, March 5). What is cluster computing: A concise guide to cluster computing.
Retrieved from https://bit.ly/3tl5DOd
WatElectronics (2021, September 26). Cluster computing : Definition, types, Advantages &
Applications. Retrieved from https://bit.ly/3KQwOq0
Keracheva, E. (2021). Client/Server Environment. CCM.
Retrieved from https://bit.ly/3whxn8o
Buhrkuhl, C. (2021, April 7). Network Management | A Guide and Best Practices. Office1 Blog.
Retrieved from https://bit.ly/3COVoVy
Daniels, D. (2021, June 10). What Is Network Management, and Why Is It Important? Gigamon
Blog. Retrived from https://bit.ly/3KTpFoP
Network Management. (2017). Techopedia. Retrieved from
https://bit.ly/3CQZwnM
Indeed Editorial Team (2021) What Is a User Interface? (Definition, Types and Examples)
GROUP 5
Priya (2021) What is the user interface and operating system interface? Retrieved from
t.ly/ioGu
University of Helsinki (n.d.) Operating System and User Interface. Retrieved from t.ly/Z710
Jain, P. (2018, June 28). Device and Security Management in Operating System.
Device and security management in operating system. Retrieved from
https://bit.ly/3JtviKo
Jaiswal, S. (2020). Components of operating system. javatpoint. Retrieved from
https://bit.ly/3KSUTwy
Bower, T. (2015). 1.13. System calls. 1.13. System Calls - Operating Systems Study
Guide. Retrieved from https://bit.ly/3tjSo02
Samit, M. (2019, August 16). Introduction of system call. GeeksforGeeks. Retrieved from
https://bit.ly/3tmB1fq
Williams, L. (2022, March 5). System calls in OS (operating system): What is, types and
examples. Guru99. Retrieved from https://bit.ly/3uanVB1