Fundamental of Operating Stystem

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

Ans-1

1. Security Management

 Operating system provided security of our system from intruder and virus.
 In security we secure the three goal

1) Confidentiality: Exposure of Data

2) Integrity: Tampering With data

3) Availability: DoS attack

 List of method use by OS for security

 Basic of cryptography
 Secrete key cryptography
 Public-key cryptography
 One way cryptography
 Digital Signature

2. Process and Thread management

 OS work is divided into process. Using multiprocessing operating system multiple process execute
simultaneously.
 Thread is light weight process.
 Threads is part of process when process hold resource but thread not hold resource.
 Using multi-threading we implement multi-processing operating system.
3. Management and Storage Management
 Memory management in an operating system is required to allocate and de-allocate processes
between system memory and external memory.
 Using Memory management pegging concept we allocate the more process into secondary as well as
primary memory.
 OS also provide virtual memory concept so that we execute more RAM size process in CPU.here we
use the concept of pegging for allocating space of process in memory.
 Also provide different memory
 Storage is use for storing the data that is also provide by operating system.

4. Resource Manager
 All current computers have CPUs, storage, controllers, network interfaces, scanners, and other
devices.
 In a bottom-up approach, the operating system enables the controlled and systematic allocation of
CPU, storage, and I/O devices between the various programmes..
 The operating system enables the concurrent running of multiple processes in memory..
 Multiplexing or sharing resources involves doing so in two separate ways: in time and in place..
 Different programmes take a chance on CPU use when time multiplexed. The first person to try to
utilise the resource is followed by the next person in line who is ready, and so on. For instance:
sharing the printer successively.
 With space multiplexing, each consumer receives a portion of the resource rather than taking a risk.
For instance, the running processes in main memory are separated so that each one can execute
concurrently..
5. Input-Output Operation
 I/o stands for input-output Operation.
 OS manage various i/o operation like Mouse, Keyboard, Printer, etc.
 OS take I/o request and generate interrupt.

Given above all feature provided by operating system in work place.

Reference:

1)Modern Operating System - Tanenbaum-1

2) Operating System Concepts 9Ed (Pb 2018) Paperback – 1 January 2018

3)https://www.researchgate.net/publication/313309097_Operating_Systems

4)http://www.mpbim.com/manage/images/pioneersuploads/_Analysis%20of%20features%20of
%20Operating%20System%20Products%20by%20Basanna%20Patagundi,%20Dr.%20N.S.Viswanath%20and
%20Swati%20Patagundi.pdf

Ans-2

 Attack on OS
 Malware
 SOL injection

1. Malware
 Spread,write,upload malicious on software called malware.Malware nothing but one time of virus.
 Way of enter malware in OS
1. Phishing: Phishing is an internet fraud where thieves copy real emails from well-known businesses
and use them as tools to acquire sensitive data. Most of the time, victims of phishing scams are unaware
of their victimisation since the emails they get appear too real and identical to the original files.
However, after clicking on a link included in the email, they have already granted the hackers access,
allowing them to take their data without their knowledge.

2. Infected File: Documents that have been tainted with malware are referred to as infected files, and
they serve as a tool for thieves to steal data. Infected files target the codes in a copy and reorganise
them to do tasks that users do not expect them to. They are frequently acquired from malicious
websites. To keep their data safe and secure, it is crucial for everyone who has a personal computer to
regularly update their antivirus software.

3. Operating System loopholes: Operating systems are not completely secure from malware assaults,
despite what the general public believes. They can develop into one of a computer system's most
delicate components, leaving them open to cyber-attacks. But no virus or malware should sneak in and
accomplish its objective as long as consumers keep their antivirus software updated. Remember that
operating system hacks are unlikely but not impossible.

4. Malicious Website: The functioning of malicious websites is remarkably similar to that of phishing
emails used by online criminals. They have websites that have been copied, generally from well-known
businesses, and seem just like the original. Websites with harmful intent can hurt users, distribute
viruses, and include dangerous information.

Prevent:

 Keep your software updated: Try to use updated version of OS.


 Use Anti-virus Software: It is provide authentication of website, means if website harm your
system then they alert you.
 Be care full about opening email attachments: If unknown person send you email or attachment
then you can’t open or click on link ,and put in spam
2. SQL injection
 SQL injection is a technique for using input from web pages to access user data by injecting SQL
instructions as statements. In essence, malevolent individuals can utilise these statements to
influence the web server for the application.
 SQL injection is a method of code injection that might damage your database.
 One of the most popular online hacking methods is SQL injection.
 SQL injection is the use of malicious code entered from a web page to insert SQL statements .

Prevent
 User authentication: Verifying user input by authenticating the user and pre-defining the input
field's length and type.
 Limiting user access rights and establishing the volume of data that visitors to the database may
access. In essence, a user shouldn't be allowed to view the entire database.
 Avoid using system administrator logins.

Reference:

1) Modern Operating System - Tanenbaum-1

2) A Comparative Study of OS Security

Ans-3.

 Different types of user interface


 GUI(Graphical user interface
 CLI (Command line interface)
 Touch user interface
 VUI (Voice user interface)
1) GUI(Graphical User Interface)
 GUI is a UI of computer or phone.
 It is allowed to interact with electric device through graphical element.graphical element like start
bar,menu,etc
 User can’t interact directly with os,first it is interact with GUI and after GUI interact with os.
 How virtual reality enhances user interface in computer games.

 Visualize the process of interaction


 Make VR space comfortable for users
 Guide users along the way
 Using GUI create motion games

 Don’t expect users to read text instructions


 Virtual Reality UX design guidelines
 Using GUI 3-D game design(like frefire,mind craft,etc)

2) CLI (Command line interface)


 A CLI is a tech-base user interface.
 Command-line interface mostly use in program execution,command execution in os,etc
 Take the input from user that time command line argument use.
Advantages
 A CLI is smooth, faster and efficient than other interface.
 A CLI required less memory. Additionally, it uses less CPU processing power than other interfaces.

Disadvantages

 If you are unknown about programming and command then it is difficult to execute program.
(ex,UNIX,linux command
 If there is in spelling mistake in command then it show error or failed

3) Touch user interface


 A touch user interface is mostly use in mobile.This interface interaction possibly using physical
touch on the screen.
 Example,Mobile,Touch laptop,tablet,etc
 how virtual reality enhances user interface in computer games
 Use in battle royal game(like,free fire,pubg,etc)
 It is improve the funcationality of game
 Easy to play

Advantages

 It is easy to use
 It reduce the external device like keyboard,mouse,etc
 It is very high durability and reliability.

Disadvantages
 Accuracy problem,when icon is very small that time it very difficult to touch screen.
 GUI base device consume more power or need more electricity
4) VUI(Voice user interface)
 A voice user interface interact with computer using human speech.
 Using speech recognition computer type the command and replay.VUI required speech
recognition and nature language understanding thechnology to convert user speech in text.
 how virtual reality enhances user interface in computer games
 Using voice user interface ,communication become easy
 game speed and efficiency
 Intuitiveness and convenience

Advantages

 User can talk with friend without typing message.


 Help us to save time
 Assist in phone operation tasks
 Reduce the human physical work.
 We can communicate any where
 Can get things done fast
 VUI Technology is Evolving

Disadvantages

 Smart Home Devices are Expensive

 Speech recognition problem

 Concerns about privacy

Ans-4.

A) Compare Mobile OS to their related desktop OS

1) Friendly user Interface

 Generaly mac oprating system design for computer but ios design for mobile.mac os required
keyboard,mouse and cpu but ios device required only touch screen.

2) Reliability
 Mac is less reliabale because mac vulnerable os.when ios more reliabale because os primary goal is
provided security to user.

3) Application complexity

 You cannot run all application in ios devices beacusr some of the app required high RAM.
 Mac os is for computer when ios os is for mobile ,you can dowanload app in mobile store but in
computer no app store available.
 Ios less flexible as compare to mac.

4) Security

 Mac is vulnerable os so that we need inti-virus software.when iOS provided many security features
in both hardware and software. Below are the most prominent features.
 Face lock
 Finger print
 Two -way security
 One time authentication
5) response time

 Mac provide fast response because of mac defferent features.when ios provide less response time.

B) Describe how an OS manages applications on Desktop and on mobile devices?

1) Desktop

 An operating system handles the launch and management of every application.


 Basically os work divided into process,os provided manner of execution of process by process
scheduling algorithm.Process work on thread model.
 If any process generate i/o request then os provide i/o resources.after process generate intrupt to
os and os stop the executin of other process and execute intrupt process.
 In desktop computer keyboard,mouse,etc are i/o devices.

2) Mobile

 Mobile os application manager work similar as desktop but mobile base on touch user interface so
that all work done in touch screen mean that process creation and termination on screen.
 In mobile application some app can not installed or dowanload because they require much Ram.,in
mobile RAM are limitaed and smaller.

Reference:

1) Modern Operating System - Tanenbaum-1

2) https://en.wikipedia.org/wiki/IOS

3) https://en.wikipedia.org/wiki/MacOS

4) Mobile operating system.

Ans-5.

1) Audio

 Recognize, categorise, and detect audio signatures or significant patterns in sound.


 AUDIO IDENTIFICATION: Recognize specific speech and mp3 audio files.

2) Biometric engine
 FACE DETECTION SYSTEM: This system recognises a researcher's face and retrieves information
about them.
3) Data engine

 CORRELATION:Defferentiate the data set base on similarity such as time and date.
 GEOLOCATION:Identify media file’s origin or geographically location.

4) Speech engine
 Categorize,capture and identify spoken word quickly,extracting and form structural ans
unstructural Audio or video file.
 SEAKER IDENTIFICATION: Identify speaker based on recorded audio.
 CONVERTION: Language translation of spoken audio or video files.

5) Text engine
 Content Differentiation: Sort text and picture files according to their content.
 Classify entities in text into groups like persons or locations using entity extraction.
 Keyword Extraction: Locate particular words or phrases inside a text.
 Language Recognition: Recognize one or more languages.
 Translation: Translate into different language.

Why?

Aware first artificial intelligence based operating system. They provided text,voice,speech,biometric
transfer between system and user.

Reference:

1) https://www.veritone.com/aiware/engines/

You might also like