Professional Documents
Culture Documents
Fundamental of Operating Stystem
Fundamental of Operating Stystem
Fundamental of Operating Stystem
1. Security Management
Operating system provided security of our system from intruder and virus.
In security we secure the three goal
Basic of cryptography
Secrete key cryptography
Public-key cryptography
One way cryptography
Digital Signature
OS work is divided into process. Using multiprocessing operating system multiple process execute
simultaneously.
Thread is light weight process.
Threads is part of process when process hold resource but thread not hold resource.
Using multi-threading we implement multi-processing operating system.
3. Management and Storage Management
Memory management in an operating system is required to allocate and de-allocate processes
between system memory and external memory.
Using Memory management pegging concept we allocate the more process into secondary as well as
primary memory.
OS also provide virtual memory concept so that we execute more RAM size process in CPU.here we
use the concept of pegging for allocating space of process in memory.
Also provide different memory
Storage is use for storing the data that is also provide by operating system.
4. Resource Manager
All current computers have CPUs, storage, controllers, network interfaces, scanners, and other
devices.
In a bottom-up approach, the operating system enables the controlled and systematic allocation of
CPU, storage, and I/O devices between the various programmes..
The operating system enables the concurrent running of multiple processes in memory..
Multiplexing or sharing resources involves doing so in two separate ways: in time and in place..
Different programmes take a chance on CPU use when time multiplexed. The first person to try to
utilise the resource is followed by the next person in line who is ready, and so on. For instance:
sharing the printer successively.
With space multiplexing, each consumer receives a portion of the resource rather than taking a risk.
For instance, the running processes in main memory are separated so that each one can execute
concurrently..
5. Input-Output Operation
I/o stands for input-output Operation.
OS manage various i/o operation like Mouse, Keyboard, Printer, etc.
OS take I/o request and generate interrupt.
Reference:
3)https://www.researchgate.net/publication/313309097_Operating_Systems
4)http://www.mpbim.com/manage/images/pioneersuploads/_Analysis%20of%20features%20of
%20Operating%20System%20Products%20by%20Basanna%20Patagundi,%20Dr.%20N.S.Viswanath%20and
%20Swati%20Patagundi.pdf
Ans-2
Attack on OS
Malware
SOL injection
1. Malware
Spread,write,upload malicious on software called malware.Malware nothing but one time of virus.
Way of enter malware in OS
1. Phishing: Phishing is an internet fraud where thieves copy real emails from well-known businesses
and use them as tools to acquire sensitive data. Most of the time, victims of phishing scams are unaware
of their victimisation since the emails they get appear too real and identical to the original files.
However, after clicking on a link included in the email, they have already granted the hackers access,
allowing them to take their data without their knowledge.
2. Infected File: Documents that have been tainted with malware are referred to as infected files, and
they serve as a tool for thieves to steal data. Infected files target the codes in a copy and reorganise
them to do tasks that users do not expect them to. They are frequently acquired from malicious
websites. To keep their data safe and secure, it is crucial for everyone who has a personal computer to
regularly update their antivirus software.
3. Operating System loopholes: Operating systems are not completely secure from malware assaults,
despite what the general public believes. They can develop into one of a computer system's most
delicate components, leaving them open to cyber-attacks. But no virus or malware should sneak in and
accomplish its objective as long as consumers keep their antivirus software updated. Remember that
operating system hacks are unlikely but not impossible.
4. Malicious Website: The functioning of malicious websites is remarkably similar to that of phishing
emails used by online criminals. They have websites that have been copied, generally from well-known
businesses, and seem just like the original. Websites with harmful intent can hurt users, distribute
viruses, and include dangerous information.
Prevent:
Prevent
User authentication: Verifying user input by authenticating the user and pre-defining the input
field's length and type.
Limiting user access rights and establishing the volume of data that visitors to the database may
access. In essence, a user shouldn't be allowed to view the entire database.
Avoid using system administrator logins.
Reference:
Ans-3.
Disadvantages
If you are unknown about programming and command then it is difficult to execute program.
(ex,UNIX,linux command
If there is in spelling mistake in command then it show error or failed
Advantages
It is easy to use
It reduce the external device like keyboard,mouse,etc
It is very high durability and reliability.
Disadvantages
Accuracy problem,when icon is very small that time it very difficult to touch screen.
GUI base device consume more power or need more electricity
4) VUI(Voice user interface)
A voice user interface interact with computer using human speech.
Using speech recognition computer type the command and replay.VUI required speech
recognition and nature language understanding thechnology to convert user speech in text.
how virtual reality enhances user interface in computer games
Using voice user interface ,communication become easy
game speed and efficiency
Intuitiveness and convenience
Advantages
Disadvantages
Ans-4.
Generaly mac oprating system design for computer but ios design for mobile.mac os required
keyboard,mouse and cpu but ios device required only touch screen.
2) Reliability
Mac is less reliabale because mac vulnerable os.when ios more reliabale because os primary goal is
provided security to user.
3) Application complexity
You cannot run all application in ios devices beacusr some of the app required high RAM.
Mac os is for computer when ios os is for mobile ,you can dowanload app in mobile store but in
computer no app store available.
Ios less flexible as compare to mac.
4) Security
Mac is vulnerable os so that we need inti-virus software.when iOS provided many security features
in both hardware and software. Below are the most prominent features.
Face lock
Finger print
Two -way security
One time authentication
5) response time
Mac provide fast response because of mac defferent features.when ios provide less response time.
1) Desktop
2) Mobile
Mobile os application manager work similar as desktop but mobile base on touch user interface so
that all work done in touch screen mean that process creation and termination on screen.
In mobile application some app can not installed or dowanload because they require much Ram.,in
mobile RAM are limitaed and smaller.
Reference:
2) https://en.wikipedia.org/wiki/IOS
3) https://en.wikipedia.org/wiki/MacOS
Ans-5.
1) Audio
2) Biometric engine
FACE DETECTION SYSTEM: This system recognises a researcher's face and retrieves information
about them.
3) Data engine
CORRELATION:Defferentiate the data set base on similarity such as time and date.
GEOLOCATION:Identify media file’s origin or geographically location.
4) Speech engine
Categorize,capture and identify spoken word quickly,extracting and form structural ans
unstructural Audio or video file.
SEAKER IDENTIFICATION: Identify speaker based on recorded audio.
CONVERTION: Language translation of spoken audio or video files.
5) Text engine
Content Differentiation: Sort text and picture files according to their content.
Classify entities in text into groups like persons or locations using entity extraction.
Keyword Extraction: Locate particular words or phrases inside a text.
Language Recognition: Recognize one or more languages.
Translation: Translate into different language.
Why?
Aware first artificial intelligence based operating system. They provided text,voice,speech,biometric
transfer between system and user.
Reference:
1) https://www.veritone.com/aiware/engines/