You are on page 1of 24

GROUP 5

BRITNEY GRACE S. CALULOT


BSCS 3A
TOPIC (SLIDE NO.) CITATIONS
It is the central component of an operating system that
Module 1 – Slide 13 manages operations of computer and hardware. It basically manages
Components of OS: operations of memory and CPU time. It is core component of an
Kernel operating system. Kernel acts as a bridge between applications and
data processing performed at hardware level using inter-process
communication and system calls (GeeksforGeeks, 2022). [1]
Kernel loads first into memory when an operating system is
loaded and remains into memory until operating system is shut
down again. It is responsible for various tasks such as disk
management, task management, and memory management.
Objectives of Kernel:
 To establish communication between user level
application and hardware.
 To decide state of incoming processes.
 To control disk management.
 To control memory management.
 To control task management.
A. Kernel is described a computer program that is the heart and
core of an Operating System. Since the Operating System has
control over the system so, the Kernel also has control over
everything in the system. It is the most important part of an
Operating System. Whenever a system starts, the Kernel is the
first program that is loaded after the bootloader because the
Kernel has to handle the rest of the thing of the system for the
Operating System. The Kernel remains in the memory until the
Operating System is shut-down. (AfterAcademy, 2019) [3]
Functions of a Kernel:
 Access Computer resource: A Kernel can access
various computer resources like the CPU, I/O devices
and other resources. It acts as a bridge between the user
and the resources of the system.
 Resource Management: It is the duty of a Kernel to
share the resources between various processes in such a
way that there is uniform access to the resources by
every process.
 Memory Management: Every process needs some
memory space. So, memory must be allocated and
deallocated for its execution. All these memory
management is done by a Kernel.
 Device Management: The peripheral devices
connected in the system are used by the processes. So,
the allocation of these devices is managed by the
Kernel.
B. Williams (2022) described that the kernel is the central
component of a computer operating systems. The only job
performed by the kernel is to manage the communication
between the software and the hardware. A Kernel is at the
GROUP 5

nucleus of a computer. It makes the communication between the


hardware and software possible. While the Kernel is the
innermost part of an operating system, a shell is the outermost
one. [4]
Features of Kernel:
 Low-level scheduling of processes
 Inter-process communication
 Process synchronization
 Context switching

2 most popular Kernels:


 Monolithic – Is a single code or block of the program. It
provides all the required services offered by the
operating system. It is a simplistic design which creates a
distinct communication layer between the hardware and
software.
 Microkernels – manages all system resources. In this
type of kernel, services are implemented in different
address space. The user services are stored in user
address space, and kernel services are stored under kernel
address space. So, it helps to reduce the size of both the
kernel and operating system.
C. Similarly, Shidling (2022) stated that a kernel is computer
software that runs at the heart of a computer’s operating system
and controls everything in it. It’s the part of the operating system
code that’s always in memory and helps hardware and software
interact.  It is is one of the first programs to load on most
computers when they power up (after the bootloader). It takes
care of the rest of the startup process, as well as memory,
peripherals, and software requests for input/output (I/O),
converting them into data-processing instructions for the central
processor unit. The execution of programs is the responsibility of
this essential component of a computer system. The kernel is in
charge of choosing which of the numerous running applications
should be assigned to the processor or processors at any one time.
[2]
Moreover, Shidling (2022) listed five different types
of kernel.
 Monolithic Kernel – where all operating system services
run in kernel space. Before in this type of kernel
architecture, all the basic system benefits like process
and memory administration, interrupt handling, etc.
existed packaged into a single module in kernel space.
 Microkernel – take a minimalist approach. It has a
thread scheduling and virtual memory.
 Hybrid Kernel – it combines the monolithic kernel’s
performance and design with the modularity and stability
of a microkernel
 Exo Kernel – it follows the end-to-end principle. It uses
the fewest possible hardware abstractions. It assigns
GROUP 5

physical resources to different applications.


 Nano Kernel – provides hardware abstraction but
doesn’t provide services. Because the Microkernel lacks
system services, the Microkernel and Nano Kernel have
become interchangeable.
Summary

A computer operating system's kernel is the most important


component. The kernel's sole responsibility is to coordinate software-
hardware connection. It allows hardware and software to
communicate with each other (GeeksforGeeks, 2022 &
AfterAcademy, 2019; Williams, 2022 & Shilding, 2022). It is said to
have five different types of kernel, the Monolithic, Microkernel,
Hybrid, Exo and the Nano Kernel (Shidling, 2022). On the other
hand, there are 2 most popular types of kernel namely Monolithic and
Microkernel (AfterAcademy, 2019).
TOPIC (SLIDE NO.) CITATIONS
In the personal computing environment, there is a single
Module 1 – Slide 20 computer system. All the system processes are available on the
Computing Environments: computer and executed there. The different devices that constitute a
Personal Computing personal computing environment are laptops, mobiles, printers,
Environment computer systems, scanners etc. (Onsman, 2018). [2]
A. According to Taylor (2021), a Personal Computing
Environment includes a single machine. Moreover, it
incorporates complete programs on a computer and performs
it. For example, machines like laptops, mobiles, printers, etc. are
a part of the Personal Computing Environment. As a result, this
type of computing environment is for single users to run tasks at
home or offices. [3]
B. From GeeksforGeeks (2020) stated that in personal
computing environment there is a stand-alone machine.
Complete program resides on computer and executed there.
Different stand-alone machines that constitute a personal
computing environment are laptops, mobiles, printers, computer
systems, scanners etc. That we use at our homes and offices. [1]
C. In StuDocu (2017), a Personal computing is a stand-alone
machine. In a personal computing environment, the complete
program resides on the stand-alone machine and executed from
the same machine. Laptops, mobile devices, printers, scanners
and the computer systems we use at home, office are the
examples for the personal computing environment. [4]
Summary

Personal Computing Environment, it consist of only one


machine. It also runs entire programs on a computer. Examples
includes laptops, mobiles, printers, computer systems, scanners etc.
that are used at home or offices (Taylor, 2021; GeeksforGeeks,
2020 & StuDuco n.d.).
GROUP 5

SOSA, MHELHIZA JOY T.


BSCS 3A
TOPIC (SLIDE NO.) CITATIONS
According to William L. (2022), the process management
Module 1 – Slide 14 component is a procedure for managing the many processes that are
Components of OS: running simultaneously on the operating system. Every software
Process Management application program has one or more processes associated with them
when they are running. However, all these processes should be
managed by process management, which keeps processes for running
efficiently. It also uses memory allocated to them and shutting them
down when needed. [4]
A. Shukla A. (2017) said that process managements involve the
execution of various tasks such as creation of processes,
scheduling of processes, management of deadlock, and
termination of processes. It is responsibility of operating system
to manage all the running processes of the system. Operating
system manages processes by performing tasks such as resource
allocation and process scheduling. When a process runs on
computer device memory and CPU of computer are utilized. The
operating system also has to synchronize the different processes
of computer system. [3]
B. On JavaTpoint (n.d.), it is stated that in order to accomplish
its task, process needs the computer resources. There may exist
more than one process in the system which may require the same
resource at the same time. Therefore, the operating system has to
manage all the processes and the resources in a convenient and
efficient way. [2]
C. According to CompuHoy (2018), operating system manages
processes by performing tasks such as resource allocation and
process scheduling. When a process runs on computer device
memory and CPU of computer are utilized. The operating system
also has to synchronize the different processes of computer
GROUP 5

system. [1]
Summary

Process management is a procedure for managing the many


processes that are running simultaneously on the operating system.
(William L., 2022; see also Shukla A., 2017; JavaTpoint, n.d.;
CompuHoy, 2018). It is the role of the operating system to handle all
the system's ongoing processes. Processes are managed by the
operating system, which performs duties like as resource allocation
and process scheduling. When a process runs on a computer, the
machine's RAM and CPU are used. The operating system is also
responsible for synchronizing the various computer processes.
TOPIC (SLIDE NO.) CITATIONS
On TutorialsPoint (n.d.), it is said that the time-sharing
Module 1 – Slide 20 computing environment allows multiple users to share the system
Computing Environments: simultaneously. Each user is provided a time slice and the processor
Time Sharing Computing switches rapidly among the users according to it. Because of this,
Environment each user believes that they are the only ones using the system. [4]
A. According to GeeksforGeeks (2020), a time shared
operating system uses CPU scheduling and multi-programming
to provide each with a small portion of a shared computer at
once. Each user has at least one separate program in memory. A
program loaded into memory and executes, it performs a short
period of time either before completion or to complete I/O. This
short period of time during which user gets attention of CPU is
known as time slice, time slot or quantum. [2]
B. The Techopedia (2017) stated that time-sharing is the
distribution of a computing resource to many users via
multiprogramming or multitasking. This was introduced in the
1960s when computers were still too expensive to be prolific, so
the solution was to allow many users to make use of one
computer by affording each one time-shares, a specific amount of
time that a user could access the computer. This allowed many
people to use a computer, which most people could not afford,
without actually owning one. This is now only a historical way of
using computers as there is no need to queue up users since
modern computers, even the smallest ones, are able to cater to
multiple users because of fast processors and multi-tasking
operating systems. [3]
C. Er R S Banger (2020) pointed out that, time sharing means
to share time into multiple slots in several processes. Time
sharing system allowing multiple clients for getting access to
specific system resources at once from different remotely
locations and it is a logical extension of multi programming
system. In this technique, time of single processor is shared in
among of multiple users over the entire network system
simultaneously. [1]
Summary

In time-sharing computing environment, multiple users are


GROUP 5

allowed to share the system simultaneously. (TutorialsPoint, n.d.; see


also GeeksforGeeks, 2020; Techopedia, 2017; Er R S Banger, 2020).
It means that time-shared operating system uses CPU scheduling and
multi-programming to provide each user with a small portion of a
shared computer at once. Each user has at least one separate program
in memory. This was introduced in the 1960s when computers were
still too expensive to be prolific.

SORIANO, MABELYN
BSCS-3A
TOPIC (SLIDE NO.) CITATIONS

I/O Device Management According to (Williams, 2022), I/O Device Management is one of the
[Module 1, slide no. 12, important use of an operating system that helps to hide the variations of
Components of OS] specific hardware devices from user.

A. On (DataFlair, 2021), it is stated that I/O device management


hides the variations of some hardware devices from the user.

B. One of the purposes of an operating system is to hide the


peculiarities of specific hardware devices from the user. For
example, in Unix, the peculiarities of I/O devices are hidden
from the bulk of the operating system itself by the I/O system.
The I/O system is consists of a buffering caching system, a
general device driver code, and drivers for specific hardware
devices. (cis2, n.d.)

C. According to (TutorialsandExample, 2020), the operating system


is responsible to hide the details of the hardware devices from
the user. One of the functions of I/O Management is that it offers
a general device driver code. It also provides buffer caching
system and drivers for a specific hardware device.

The role of operating system in computer I/O is to manage and control


I/O operations and I/O devices. It is mainly responsible in hiding the
details of a specific hardware devices from the user (William L, 2022;
DataFlair , 2021; Cis2, n.d.; Tutorial and Example, 2020). Devices
connected to the computer (I/O devices) vary so widely in their function
and speed and therefore, different methods are needed to control them.

TOPIC (SLIDE NO.) CITATIONS


GROUP 5

Cloud Computing (Onsman, 2018) stated that in cloud computing environment, the
Environment computing is moved away from individual computer systems to a
[Module 1 Slide no. cloud of computers in cloud computing environment. The cloud
21, Types of users only see the service being provided and not the internal
Computing details of how the service is provided. This is done by pooling all
Environment] the computer resources and then managing them using a software.
Types of cloud computing includes Public, Private, and Hybrid.

A. On (GeeksforGeeks, 2020), it is stated that in cloud


computing environment, computer system resources such
as processing and storage are available on demand. Here,
computing is done in a cloud of computers, where all
required resources are provided by cloud vendor, rather
than individual technology or computers. It is primarily
made up of three services namely software-as-a-service
(SaaS), infrastructure-as-a-service (IaaS) and platform-as-
a-service (PaaS).

B. (Ambojia, 2018) defined cloud computing as a type of


computing that delivers computing, storage, and even
applications as a service across a network.
Customers can subscribe to computing services like
servers, application, tools, storage, and databases in the
cloud and can use them anywhere, at any time over internet
(Kumar, 2022).

C. According to (Ranger, 2022), Cloud Computing is the


delivery of on-demand computing services, from
applications to storage and processing power, typically
over the internet and on a pay-as-you-go basis. He also
stated that in Cloud Computing, rather than owning
computing infrastructures or data centers, companies can
rent access to anything from applications to storage from a
cloud service provider.

Cloud computing is a method of providing computing services to


customer using cloud (Kumar, 2022; Ranger, 2022; Ambojia,
2018) In Cloud Computing, components like system resources and
advanced services help deliver tasks using internet connections.
Further, it runs tasks on third party servers and enables the ability
to access data from multiple locations. It also provides a cost-
efficient solution and is more user-friendly.
GROUP 5
GROUP 5
GROUP 5
GROUP 5

VIVERLYN O. UBERITA
BSCS 3A
TOPIC (SLIDE NO.) CITATIONS
 William L. (2022) it states Interrupt latency is not considered
Module 1 – Slide 15 as important as in RTOS
Components of OS:  Interrupt lag is minimal, which is measured in a few
Interrupt microseconds. [4]
A. Javatpoint (n.d), Interrupts are signals emitted by software
or hardware when a process or event requires immediate
attention. Because both hardware and software generate these
signals, they are referred to as the hardware, and the software
interrupts. A hardware device produces an interrupt. Interrupts
can be caused by a USB device, a NIC card, or a keyboard.
Interrupts happen asynchronously, and they may happen at any
time. [2]
B. Tim Bower (2015) Interrupts are signals sent to the CPU by
external devices, normally I/O devices. They tell the CPU to stop
its current activities and execute the appropriate part of the
operating system. [3]
C. ElProCus(2020)- In the operating systems, iterrupts are
essential because they are a reliable technique for the OS to
communicate and react to their surroundings. [1]
Summary

An interrupt is nothing but one kind of signal between device


as well as computer system otherwise from a program in the
computer that requires the OS to leave and decide accurately what to
do subsequently (ElProCus(2020). Interrupts happen
asynchronously, and they may happen at any time.( javatpoint(n.d))

TOPIC (SLIDE NO.) CITATIONS


Tutorialspoint stated that the clustered computing
Module 1 – Slide 22 environment is similar to parallel computing environment as they
Computing Environments: both have multiple CPUs. However a major difference is that
Cluster Computing clustered systems are created by two or more individual computer
Environment systems merged together which then work parallel to each other. [2]
A. WatElectronics (2021), Cluster computing refers that many
of the computers connected on a network and they perform like a
single entity. Each computer that is connected to the network is
called a node. Cluster computing offers solutions to solve
complicated problems by providing faster computational speed,
and enhanced data integrity. The connected computers execute
operations all together thus creating the impression like a single
system (virtual machine). [3]
B. EDUCBA (2021) Cluster Computing is the process of
sharing the computations tasks among those computers or
machines form the cluster. It works on the distributed system
with the networks.

Several types of cluster computing are used based upon the


GROUP 5

business implementations, performance optimization , and


architectural preference such as load balancing clusters, high
availability(HA) clusters, high performance(HP) clusters. [1]
C. EDUCBA (2021), Clusters are widely used with the respect
to the criticality of the data or content handled and the processing
speed expected. Sites and applications which expect extended
availability without downtime and expecting heavy load
balancing ability to use these cluster concepts to a large extent.
[1]
Summary

Clusters are widely used with the respect to the criticality of the
data or content handled and the processing speed expected EDUCBA
(2021) computing refers that many of the computers connected on a
network and they perform like a single entity. WatElectronics
(2021). It works on the distributed system with the networks.
EDUCBA (2021).
GROUP 5

EJ L. IDULAN
BSCS 3A
TOPIC (SLIDE NO.) CITATIONS
William L. (2022) stated that Network management is the
Module 1 – Slide 15 process of administering and managing computer networks. It
Components of OS: includes performance management, fault analysis, provisioning of
Network Management networks, and maintaining the quality of service. [4]

A. According to Daniels, D. (2021), network management is


the process of keeping your network healthy, which keeps
your business healthy. [2]

B. Techopedia, Inc. (2017) stated that Network


management is a broad range of functions including
activities, methods, procedures and the use of tools to
administrate, operate, and reliably maintain computer
network systems.
Strictly speaking, network Management does not include
terminal equipment (PCs, workstations, printers, etc.). Rather,
it concerns the reliability, efficiency and capacity/capabilities
of data transfer channels. [3]

C. As stated by Buhrkuhl, C. (2021). There are five areas of


function in network management. This is defined by the ISO,
The International Organization for Standardization. The five
areas are:

 Fault management: the process to identify and fix any


errors in the system. The problem is identified, the
source of the problem is identified, the problem is
fixed, and the process is documented. 

 Configuration management: the process to monitor and


maintain devices and network configurations.
Configurations can change with new programs and
updates, so this needs to be monitored at all times.

 Accounting management: Accounting is also called


administration. This process includes granting access or
authority to users.

 Performance management: Performance management


keeps track of the devices and network and how it's
performing. When devices run too slowly, it can be an
indication that they need to be updated or that there's a
possible issue.

 Security management: Security management


encompasses a great deal and is growing. There are
many tools to help your network management verify the
GROUP 5

information and monitor the network to maintain


cybersecurity standards. [1]

Summary

Network management is the process of administering and


managing computer networks. (William L., 2022; see also
Buhrkuhl, C., 2021; Daniels, D., 2021; Technopedia, 2017)
network management is the process of keeping your network
healthy, which keeps your business healthy. Terminal
equipment is not included in network management. It is more
concerned with the dependability, efficiency, and
capacity/capabilities of data transfer channels. To ensure rapid
and consistent progress on network management functions,
ISO has grouped the management functions into five areas: (1)
Fault management, (2) Configuration management, (3)
Accounting management, (4) Performance management, (5)
Security management.
TOPIC (SLIDE NO.) CITATIONS
According to Onsman, A. (2018), In client server
Module 1 – Slide 20 computing, the client requests a resource and the server provides
Computing Environments: that resource. A server may serve multiple clients at the same time
Client Server Computing while a client is in contact with only one server. Both the client
Environment and server usually communicate via a computer network but
sometimes they may reside in the same system. [3]
A. Keracheva, E. (2021) stated that Numerous applications
run in a client server architecture. This means that client
computers (computers forming part of the network) contact
a server that provides services to the client computers. These
services are programs that provide data such as the time, files,
a connection, etc. [1]
B. According to Upadhyay, R. (2020), A client-
server environment is occupied by the client and the server.
Client systems are typically single-user workstations or
computers that provide a highly user-friendly interface for
the end user. [4]
C. Oluwatosin, H. S. (2014) stated that client- server is a
system that performs both the functions of client and server so
as to promote the sharing of information between them. It
allows many users to have access to the same database at the
same time, and the database will store much information. [2]
Summary

In client server computing, the client requests a resource


and the server provides that resource. (Onsman, A., 2018; see also
Keracheya, E., 2021; Upadhyay, R., 2020; Oluwatosin, H. S., 2014)
This means that client computers (computers connected to a
network) communicate with a server, which provides services to the
client computers. Client systems are typically single-user
workstations or computers that provide the end user with a highly
GROUP 5

user-friendly interface. It allows many users to have access to the


same database at the same time, and the database will store much
information.

LORENCE A. TABAREJO
BSCS 3A
TOPIC (SLIDE NO.) CITATIONS
Main Memory is a large array of storage or bytes, which has
Module 1 – Slide 13 an address. The memory management process is conducted by using
Components of OS: a sequence of reads or writes of specific memory addresses.
Main Memory Management In order to execute a program, it should be mapped to
absolute addresses and loaded inside the Memory. The selection of a
memory management method depends on several factors.
A. William, Lawrence. (2022, March 05) “Components of
Operating System.” He states that main memory is a large array
of storage or bytes, which has an address. The memory
management process is conducted by using a sequence of reads
or writes of specific memory addresses. In order to execute a
program, it should be mapped to absolute addresses and loaded
inside the Memory. The selection of a memory management
method depends on several factors. However, it is mainly based
on the hardware design of the system. Each algorithm requires
corresponding hardware support. Main Memory offers fast
storage that can be accessed directly by the CPU. It is costly and
hence has a lower storage capacity. However, for a program to be
executed, it must be in the main Memory

B. JavaTpoint, Community (2011-2021). “Components of


Operating System” It states that min memory is a large array of
storage or bytes, which has an address. The memory management
process is conducted by using a sequence of reads or writes of
specific memory addresses.
It should be mapped to absolute addresses and loaded
inside the memory to execute a program. The selection of a
memory management method depends on several factors.

C. Mahatma Ghandi University (2018-2019). “Components of


Operating System” it states that main memory is a large array of
storage or bytes, which has an address. The memory management
process is conducted by using a sequence of reads or writes of
specific memory addresses. It should be mapped to absolute
addresses and loaded inside the memory to execute a program.
The selection of a memory management method depends on
several factors.

Summary

William, L. (2022, March 05) “Components of Operating


GROUP 5

System.” He states that main memory is a large array of storage or


bytes, which has an address. In order to execute a program, it should
be mapped to absolute addresses and loaded inside the Memory.
However, it is mainly based on the hardware design of the system.
Each algorithm requires corresponding hardware support.
“Components of Operating System” It states that min memory is a
large array of storage or bytes, which has an address. “Components
of Operating System” it states that main memory is a large array of
storage or bytes, which has an address. It should be mapped to
absolute addresses and loaded inside the memory to execute a
program.
TOPIC (SLIDE NO.) CITATIONS
A distributed computing environment contains multiple
Module 1 – Slide 21 nodes that are physically separate but linked together using the
Computing Environments: network. All the nodes in this system communicate with each other
Distributed Computing and handle processes in tandem. Each of these nodes contains a small
Environment part of the distributed operating system software.
A. Onsman , Alex (2018 August 23,). “Types of Computing
Environments” he stated that distributed computing environment
contains multiple nodes that are physically separate but linked
together using the network. All the nodes in this system
communicate with each other and handle processes in tandem.
Each of these nodes contains a small part of the distributed
operating system software.
B. Kirinyaga University College (2022). “Lecture- Computing
Environment-and C++ Syntax.pdf -” It states that a distributed
computing environment contains multiple nodes that are
physically separate but linked together using the network. All the
nodes in this system communicate with each other and handle
processes in tandem. Each of these nodes contains a small part of
the distributed operating system software.
C. What are the components of distributed system? “Romaine
Neupauer (2020, January 11th)”A distributed system is a system
whose components are located on different networked computers,
which communicate and coordinate their actions by passing
messages to one another. The components interact with one
another in order to achieve a common goal.
Summary

Onsman stated that distributed computing environment


contains multiple nodes that are physically separate but linked
together using the network. “Lecture- Computing Environment-and
C++ Syntax. pdf -” It states that a distributed computing environment
contains multiple nodes that are physically separate but linked
together using the network. What are the components of distributed
system? “Romaine Neupauer (2020, January 11th)”A distributed
system is a system whose components are located on different
networked computers, which communicate and coordinate their
actions by passing messages to one another.
GROUP 5

STELA MARIE M. CABALZA


BSCS 3A
TOPIC (SLIDE NO.) CITATIONS
According to William (2022), this Memory of the
Module 1 – Slide 16 computer is very small to store all data and programs permanently.
Components of OS: The computer system offers secondary storage to back up the main
Secondary-Storage Memory. Today modern computers use hard drives/SSD as the
Management primary storage of both programs and data. However, the
secondary storage management also works with storage devices,
like a USB flash drive, and CD/DVD drives. [4]
A. Meador (2018) stated that secondary storage devices are
non-volatile devices where the data is stored for long-term
storage. Disks are the mainly used secondary storage devices.
They provide the bulk of secondary storage in operating
systems today. [2]
B. Research has shown that secondary storage is important to
users in its OS support for file systems. Secondary storage
delivers high density and nonvolatility for long-term storage.
The OS also uses secondary storage to buffer processes for
future scheduling, or sometimes when swapping jobs in and
out of memory systems. (Sterling and Brodowicz , 2018) [3]
C. Clarke (2019), said that The operating system is
responsible for the activities in connection with disk
management, including free space management, storage
allocation and scheduling. Since main memory (primary
storage) is volatile and too small to accommodate all data and
programs permanently, a computer system must provide
secondary storage to back up main memory. [1]
Summary

According to the three authtors in citation a to c, memory


of a computer is volatile and too small to store all data
permanently. Computer system must provide secondary storage to
back up main memory. Secondary storage delivers high density
and nonvolatility for long-term storage. Operating system
responsible for disk management, including free space
management, allocation and scheduling.
TOPIC (SLIDE NO.) CITATIONS
According to Elprocus (2013), a GUI or user interface
Module 1 – Slide 18 (UI) is the part of an OS that permits an operator to get the
Components of OS: information. A user interface based on text displays the text as
User Interface well as its commands which are typed over a command line with
the help of a keyboard. The main components of an OS mainly
include kernel, API or application program interface, user
interface & file system, hardware devices and device drivers. [1]

A. According to University of Helsinki – orientation (2 sp),


a user interface (UI) refers to the part of an operating system,
program, or device that allows a user to enter and receive
information. A text-based user interface (see the image to the
GROUP 5

left) displays text, and its commands are usually typed on a


command line using a keyboard. With a graphical user
interface (see the right-hand image), the functions are carried
out by clicking or moving buttons, icons and menus by means
of a pointing device. [4]
B. Priya (2021) said that the user and operating system are
connected with each other with the help of interface, so
interface is used to connect the user and OS. However, the
GUI is one of the necessary interfaces because only by using
the user can clearly see the picture, play videos. So we need
GUI for computers and this can be done only with the help of
an operating system. [3]
C. According to Indeed Editorial Team (2021), The user
interface (UI) is the point at which human users interact with a
computer, website or application. The goal of effective UI is to
make the user's experience easy and intuitive, requiring
minimum effort on the user's part to receive maximum desired
outcome. [2]

Summary

A GUI or user interface (UI) is the part of an OS that


permits an operator to get the information. (Elprocus, 2013; see
also University of Helsinki – orientation (2 sp); Bhanu Priya,
2021; Indeed Editorial Team,2021) The user interface (UI) is the
point at which human users interact with a computer, website or
application. The goal of effective UI is to make the user's
experience easy and intuitive. A text-based user interface displays
text, and commands are usually typed on a keyboard.

Mae A. Teaño
BSCS 3A
TOPIC (SLIDE NO.) CITATIONS
William L. (2022) states security management various
Module 1 – Slide 18 processes in an operating system need to be secured from each
Components of OS: other’s activities. For that purpose, various mechanisms can be
Security Management used to ensure that those processes which want to operate files,
memory CPU, and other hardware resources should have proper
authorization from the operating system. For example, Memory
addressing hardware helps you to confirm that a process can be
executed within its own address space. The time ensures that no
process has control of the CPU without renouncing it. Lastly, no
process is allowed to do its own I/O, to protect, which helps you to
keep the integrity of the various peripheral devices. [4]
A. Jain, P. (2018), states the security management function
of an operating system helps in implementing mechanisms
GROUP 5

that secure and protect the computer system internally as well


as externally. Therefore an operating system is responsible for
securing the system at two different levels which are internal
security and external security. Internal security refers to the
protection of activities of one process from the activities of
another process. External security refers to the implementation
of a mechanism for securing the data and programs stored in
the computer system as well as the various resources of the
computer system against unauthorized access. [1]
B. According to Jaiswal, S. (2020), the various processes in
an operating system need to be secured from other activities.
Therefore, various mechanisms can ensure those processes
that want to operate files, memory CPU, and other hardware
resources should have proper authorization from the operating
system. Security refers to a mechanism for controlling the
access of programs, processes, or users to the resources
defined by computer controls to be imposed, together with
some means of enforcement. [2]
C. Patil, V. (2021) said that the different methods can be
used for the purpose of protecting different processes of the
operating system from each other’s activity to ensure that the
processes that want to run the file, memory, and other
hardware resources. It must have the appropriate authorization
from the operating system. Finally, no process is allowed to
perform its own I / O, which is for protection that helps you
maintain the integrity of different peripheral devices. [3]
Summary

Separate approaches can be used to protect different


operating system processes from one other's activity in order to
ensure that the processes that want to run the file, memory, and
other hardware resources are protected from each other's
activity(Jain, P. et al.,2018; Jaiswal, S. et al., 2020; Patil V. et
al.,2021)
The development of this technique is to protect the data and
programs stored in the computer system, as well as the computer
system's numerous resources, from unwanted access. As a result,
an operating system is in charge of securing the system on two
levels: internal security and exterior security.
TOPIC (SLIDE NO.) CITATIONS
According to Samit, M. (2019), System Calls are
Module 1 – Slide 18 programmatic way in which a computer a service from the colonel
Components of OS: of the operating system it is executed on. A system called is a way
System Calls for programs to interact with the operating system. He added, a
computer program makes a system call when it makes a request to
the operating systems kernel. System call provides a services of
the operating system to the user programs free application
program interface (API). [3]

A. According to Bower T. (2015) the system call provides an


GROUP 5

interface to the operating system services. Application


developers often do not have direct access to the system calls,
but can access them through an application programming
interface (API). The functions that are included in the API
invoke the actual system calls. By using the API, certain
benefits can be gained: Portability: as long a system supports
an API, any program using that API can compile and run. Ease
of Use: using the API can be significantly easier than using the
actual system call. [1]
B. According to Jaiswal S. (2020), a system call is a way for
a user program to interface with the operating system. The
program requests several services, and the OS responds by
invoking a series of system calls to satisfy the request. A
system call can be written in assembly language or a high-
level language like C or Pascal. System calls are predefined
functions that the operating system may directly invoke if a
high-level language is used. [2]

C. William L. (2022), state that a system call is a mechanism


that provides the interface between a process and the operating
system. It is a programmatic method in which a computer
program requests a service from the kernel of the OS.

System call offers the services of the operating system to


the user programs via API (Application Programming Interface).
System calls are the only entry points for the kernel system. [4]
Summary

According to the three authtors in citation a to c, a GUI or


user interface (UI) is the part of an OS that permits an operator to
get the information. The user interface (UI) is the point at which
human users interact with a computer, website or application. The
goal of effective UI is to make the user's experience easy and
intuitive. A text-based user interface displays text, and commands
are usually typed on a keyboard.
GROUP 5

REFERENCES

GeeksforGeeks. (2022, March 8). Kernel in operating system. Retrieved from


https://bit.ly/3COTxzY

Shidling, C. (2022, February 21). What is kernel, why it is needed, purpose of kernel, types. CS
Electrical & Electronics. Retrieved from https://bit.ly/3tgYdeS

AfterAcademy. (2019, November 11). What is kernel in operating system and what are the
various types of kernel? Retrieved from https://bit.ly/3wlAGv9

Williams, L. (2022, February 5). What is operating system? explain types of os, features and
examples. Guru99. Retrieved from https://bit.ly/366tkB2

GeeksforGeeks. (2020, October 15). Computing environments. Retrieved from


https://bit.ly/3Isgg6k

Onsman, A. (2018, August 23). Types of Computing Environments. Types of computing


environments. Retrieved from https://bit.ly/3qeO2Wn

Taylor, K. (2021, October 14). Learn more about computing environment and its different types.
HitechNectar. Retrieved from https://bit.ly/3KX38I2

StuDocu. (2017). UNIT1 - nice - computing environments what is computing environment?


when we want to solve a problem. Retrieved from https://bit.ly/3qbZdPh

CompuHoy (2018). How is a process manage by an Operating System? Retrieved from


https://bit.ly/36vQWPv

JavaTpoint (n.d.). Process Management in OS. Retrieved from https://bit.ly/37v9MGM

Shukla A. (2017). Process Management of Operating System. Retrieved from


https://bit.ly/3uanCWK

William L. (2022). Components of Operating Systems. Guru99. Retrieved from


https://bit.ly/3KYitbf
Er R S Banger (2020). What is Time Shared Operating System: Examples, Advantages,
Disadvantages. Retrieved from https://bit.ly/3wfJGSq

GeeksforGeeks (2020). Time Sharing Operating System. Retrieved from https://bit.ly/3CVivh5


Techopedia (2017). Time-Sharing. Retrieved from https://bit.ly/3MZ6YlE
TutorialsPoint (n.d.). Types of Computing Environments. Retrieved from
https://bit.ly/3whYxMd

Williams, L. (2022, 03 05). Components of Operating System. Retrieved from


https://bit.ly/3tjNqQW
GROUP 5

DataFlair. (2021). Components of Operating Sytem. Retrieved from https://bit.ly/3IpOSFQ

cis2. (n.d.). Operating system components. Retrieved from https://bit.ly/361gswc


TutorialsandExample. (2020, 09 27). Components of Operating System. Retrieved from
https://bit.ly/36mIHoJ

Onsman, A. (2018, 08 23). Types of Computing Environments. Retrieved from


https://bit.ly/3uaH9Gw

GeeksforGeeks. (2020). Computing Environments. Retrieved from https://bit.ly/3COZgWu

Ambojia, K. W. (2018, 11 21). Retrieved from https://bit.ly/3wdyVQN

Kumar, D. A. (2022, 01 10). CLOUD COMPUTING ENVIRONMENT 101. Retrieved from


https://bit.ly/3ifb1fo

Ranger, S. (2022, 02 26). What is cloud computing? Everything you need to know about the
cloud explained. Retrieved from https://bit.ly/3CS5oNM

ElProCus. (2020, February 10). Operating system components and their services.
Retrieved from https://bit.ly/3inOhK5

Javatpoint. (n.d.). Trap vs interrupt in operating system. Retrieved from


https://bit.ly/3qelPi8

Tim Bower (2015) 1.7. Basics of How Operating Systems Work - Operating Systems
Study Guide. (n.d.). 1.7. basics of how operating systems work. Retrieved from
https://bit.ly/3u7HEkJ

Williams, L. (2022, March 5). Real-time operating system (RTOS): Components, types,
examples. Guru99. Retrieved from https://bit.ly/3u5U4tm

EDUCBA. (2021, March 5). What is cluster computing: A concise guide to cluster computing.
Retrieved from https://bit.ly/3tl5DOd

Tutorialspoint (n.d.). Types of computing environments. Retrieved from https://bit.ly/3CQ4K3p

WatElectronics (2021, September 26). Cluster computing : Definition, types, Advantages &
Applications. Retrieved from https://bit.ly/3KQwOq0
Keracheva, E. (2021). Client/Server Environment. CCM.
Retrieved from https://bit.ly/3whxn8o

Oluwatosin, H. S. (2014). Client-Server Model. IOSR Journal of Computer Engineering (IOSR-


JCE), 16(1), 67. Retrived from https://bit.ly/3tjPSXE

Onsman, A. (2018). Types of Computing Environments. Tutorialspoint.


GROUP 5

Retrieved from https://bit.ly/3KTj51D

Upadhyay, R. (2020, April 22). Client-server Computing and its Terminologies.


GeeksforGeeks. Retrieved from https://bit.ly/3tkoXes

Buhrkuhl, C. (2021, April 7). Network Management | A Guide and Best Practices. Office1 Blog.
Retrieved from https://bit.ly/3COVoVy

Daniels, D. (2021, June 10). What Is Network Management, and Why Is It Important? Gigamon
Blog. Retrived from https://bit.ly/3KTpFoP
Network Management. (2017). Techopedia. Retrieved from
https://bit.ly/3CQZwnM

Williams, L. (2022). Components of Operating Systems. Guru99. Retrieved


from https://bit.ly/3wgFfXD

Components of operating system - javatpoint. www.javatpoint.com. (n.d.). Retrieved from


https://www.javatpoint.com/components-of-operating-system

Components of O-WPS office - components of operating system an operating system is a large


and. StuDocu. (n.d.). Retrieved from https://www.studocu.com/in/document/mahatma-
gandhi-university/operating-systems/components-of-o-wps-office/22833091

Types of computing environments. (n.d.). Retrieved from


https://www.tutorialspoint.com/Types-of-Computing-Environments

Lecture- computing enviroment-and C++ Syntax.pdf - computing environments a computer


system uses many devices, arranged in different ways to solve: Course hero. Lecture-
Computing Enviroment-and C++ Syntax.pdf - COMPUTING ENVIRONMENTS A
computer system uses many devices, arranged in different ways to solve | Course Hero.
(n.d.). Retrieved from https://www.coursehero.com/file/127384540/Lecture-Computing-
Enviroment-and-C-Syntaxpdf/

What are the components of distributed system? (n.d.). Retrieved from


https://findanyanswer.com/what-are-the-components-of-distributed-system

Clarke (2019) Operating-System Structures. Retrieved from t.ly/LDrp


Meador (2018) Major Activities of an Operating System with Regard to Secondary Storage
Management. Retrieved from t.ly/1V54

Sterling and Brodowicz (2018) Operating Systems. Retrieved from t.ly/7jUm

Williams (2022) Components of Operating System. Retrieved from t.ly/v818


Elprocus (2013) What is an Operating System and Its Components. Retrieved from t.ly/84GE

Indeed Editorial Team (2021) What Is a User Interface? (Definition, Types and Examples)
GROUP 5

Retrieved from t.ly/NDIa

Priya (2021) What is the user interface and operating system interface? Retrieved from
t.ly/ioGu

University of Helsinki (n.d.) Operating System and User Interface. Retrieved from t.ly/Z710
Jain, P. (2018, June 28). Device and Security Management in Operating System.
Device and security management in operating system. Retrieved from
https://bit.ly/3JtviKo
Jaiswal, S. (2020). Components of operating system. javatpoint. Retrieved from
https://bit.ly/3KSUTwy

Patil, V. (2021, September 12). What is an operating system (OS)?: Components of


Operating System. ElectricalGang. Retrieved from https://bit.ly/3KYpEAd

Williams, L. (2022, March 5). Components of operating systems. Guru99.


Retrieved from https://bit.ly/3uauAuS

Bower, T. (2015). 1.13. System calls. 1.13. System Calls - Operating Systems Study
Guide. Retrieved from https://bit.ly/3tjSo02

Jaiswal, S. (2020). System calls in operating system. javatpoint. Retrieved from


https://bit.ly/3u5T08Q

Samit, M. (2019, August 16). Introduction of system call. GeeksforGeeks. Retrieved from
https://bit.ly/3tmB1fq

Williams, L. (2022, March 5). System calls in OS (operating system): What is, types and
examples. Guru99. Retrieved from https://bit.ly/3uanVB1

You might also like