Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Describe programmed, interrupt driven, and direct memory access. Provide an example of an I/O device for each access method.

Category: Computer Sciences Paper Type: Online Exam | Quiz | Test Reference: APA Words: 3500

The programmed input output referred to the data transferred. The data transfer method is initiated by CPU under the control driver software. The software can be used to Access Memory or registers in the device. Initially CPU issue the command and then wait for IO operations to be completed. In this computer system the CPU is faster as compared to IO module and it is programmed to work with transmission of data. The steps of IO basic programming include CPU request for I/O operation, I/O module performance, bits of status set for I/O, evaluation of CPU BITS in periodic way, no significant and direct impact of I/O module on CPU, and no interruption of I/O module with CPU.

In the interrupt process, CPU issues the command to I/O module. The process undergoes normal working without interrupted I/O device with the completion of the work. In case of input device interrupter with CPU and new data would arrive on that end. The performance of actual actions depends upon I/O port and memory mapping process. In case of output, device delivers without any interaction with new data. DAM and memory mapping process are used for generation of interrupts and System becomes capable to do buffering. The CPU interrupted depend upon devices and it could be insignificant in data transfer process at large amount. The CPU must transfer the whole data between memory and I/O module. The basic operations of interrupt include issue of commands through CPU, parallel connection of CPU and data transfer through I/O module, interaction of I/O module with CPU, request of data transfer by CPU, and data transfer by IO module.

In case of direct memory access, CPU is capable to grant authority for IO module. The authority is to write or read from the memory without having any involvement. DAM module is capable to control the whole transferring process of data between IO devices and memory. DAM devices transfer data correctly and directly in the memory under different condition of CPU. Open DAM process system increases concurrently with the performance of CPU. DAM controller and CPU share the memory in the controlled system.

 List, describe, and analyze the most common data storage systems in terms of size, speed, error handling, and cost.

The storage devices are used in computer to store the data. The core function of modern computer is to store the data and to transfer the data. The data storage process is improved with use of digital technology. There are four different types of data storage procedures including primary storage, secondary storage, tertiary storage, and offline storage of the data. In case of primary storage, the main memory is directly or indirectly connected with the central processing unit (CPU). In this process, CPU read the instruction provided by the primary storage (Computer hope. com, 2019). The primary storage depends upon the working of memory bus. CPU continuously read instructions is stored in the primary storage and then execute them on the basis of requirement. The primary storage devices are of different types including ROM, ram and cache. Primary storage is also known as main memory. Random access memory work to store the data. There are two types of random-access memory including dynamic random-access memory and static random-access memory (Orthopedic. com, 2019).

One of the common types of physical data storage process is random access memory that is associated with storage of data in the integrated circuits. Different types of new technologies are working to promote the expansion and data storage capability. Cloud services are new form of data storage services, it can be used to enhance the capacity of devices and provide additional data storage in the devices. The primary storage devices provide medium to hold the memory for short interval of time. Cache and random-access memory are example of primary storage devices (Orthopedic. com, 2019).

Primary storage devices are directly accessible by CPU as their volatile and non-removable memory used in this process.   The secondary storage devices are nonvolatile table devices that hold data written until it is overwritten or deleted. There are two magnitude orders of secondary storage as compared to the primary storage. For instance, hard drive is this slower SOD. It could be used as secondary storage while the primary storage is faster for instance PIE and SOD. The examples of secondary storage include solid state drive, USB thumb drive, SD card, CD, floppy disk, tape drive, and hard drive (Computer hope. com, 2019).

Describe the functional components of an operating system, including kernels, modules, application program interfaces, and other services.

The operating system can be defined as a software that provide interface between the computer hardware and the end user. In every computer, one operating system is essentially required to run the programs such as games, MS word and chrome. Operating system provide complete environment that run and perform different tasks. The main process of the operating system is to communicate the instruction of user and the processes in the computer (Hand, 2010).

The OS work to communicate with the computer and the user without even knowing the computer language. There are different types of OS such as Windows, android, iOS, Mac OS, Linux, Windows phone OS, and chrome OS. There are different types of features used in the operating systems such as protection and the supervisor mode of work, program execution, allowing the disk for access and the networking security for the file systems, management of program with the virtual memory and multitasking process, handling of the I/O operations, detection and handling of errors, resource and information protection, and manipulation of files in the computers (Hand, 2010).

The central part of computer operating system is Kernel, that perform to manage communication between the hardware and the software. The nucleus of computers is Kernel and it provide shell to the outermost system. The features of Kennel include low level process of scheduling, process synchronization, inter-process communication, and context switching. The popular kernels include monolithic kernel and micro kernels. Application program interface include tools, protocols, and routines for the application of software. The basic API specifies the wide range of components that interact accordingly (Hand, 2010).

 Describe and compare the traditional Operating Systems: Linux, Windows, and Mac OS.

The operating system provides a software packages that communicate directly with the hardware. the operating system lies different application between computer and the software. confectionery the operating system provides intermediate regarding the process Software and Hardware. there are three operating systems mainly including Linux Mac and Windows operating system. these three operating systems are dominating the world of computers. the windows series of operating system are providing more benefits to the users. there are majority of Software Hardware and support provided by windows for the higher compatibility and work ability. most often the Software Hardware as well as the support are provided and designed according to Windows operating system. the primary concern of the operating system is to provide compatibility with the services. Windows operating system have changed the GUI and OS system. The main advantage is our inverter consideration about maintenance of high-level performance. Windows operating system is highly secure system that provide range of applications to the users.

LINUX operating system is another type of operating system that is widely used by uses. benefit of Linux system is to provide resources per information and to worth as work as a developer get provide information and system for the customers and community between the user’s applications and the system best valuable as compared to Windows operating system. the variable properties of Linux operating system include incredible frequency of work security and enhanced stability of operations. LINUX operating system is one of the most customer-oriented system that consider person needs of customers and customize the system according to them. mac rating system provide series of graphical operation that are developed according to the requirements of the system. there are different types of timeline and key features of Mac Operating System. some of the

Operating systems with the release dates are mentioned below,

1)      2000-2001: The Early Days of Mac OS X. ...

2)      2002: Mac OS X 10.2, Jaguar. ...

3)      2003: Mac OS X 10.3, Panther. ...

4)      2005: Mac OS X 10.4, Tiger. ...

5)      2007: Mac OS X 10.5, Leopard. ...

6)      2009: Mac OS X 10.6, Snow Leopard. ...

7)      2011: Mac OS X 10.7, Lion. ...

8)      2012: OS X Mountain Lion.

Compare mobile SOs including iOS and Android.

Mobile phones of modern era are using different types of IONS and Android systems. The first series of Android in on as a t mobile was introduced by America.  Mobile devices are gaining increased popularity in the common uses. Whereas the competition of device is becoming intensity due to android system and IONS system.  IONS devices include iPhone iPad and iPod Touch. While on the other hand Android system include Motorola, Galaxy Nexus and other digital mobile phones. According to the statistical report the iOS and Android devices are getting more attention from the customers and 79% of the mobile devices are working according to Android system (Shift web Solutions, 2011).

The Android operating system is similar to Linux, but it is based upon a mobile phone application. The developer of Android release date under Apache open source license. The system was developed by open handset alliance and Google. The condition is fruitful for the communication software as well as hardware systems. The company subsequently acquired installed variety of Android for the smartphones that boost up the manufacturing process and customer satisfaction with the services (Shift web Solutions, 2011).

. One of the major differences between Android and IS is development language. IONS based apps are using swift data that is associated with inter corporate java system. iOS developers use X code developing scheme to produce environment that provide huge amount of functionality and data debugging. The use of code is productive for the environment. One of the major differences between these two systems is design philosophy. The designing principles include resolution and screen sizes, navigation, and menus (Shift web Solutions, 2011).

Differentiate between the logical and the physical views of file systems.

The physical file system contains actual data that is mainly stored on the system. The description of physical files included the data process that a presentation, receiving of the program, and processing of the program. The local file does not contain any kind of data, but the description of record is different for both. The logical view is mainly concerned with the representation of things and physical view is concerned with realization of the things. The logical view represents technical description about the implementation of logical view for the customers any two condition and the system development procedure.

The physical view considered information, system development staff, communication between logical view terms and procedures, translation of logical view and changes in the physical file. The logical view focus is on the functional requirements and data modelling process. The relationship between physical and logical data view is quality element direct one to one relation (Computer hope. com, 2019). The physical view includes physical data for index optimization, materialized view, and demoralization of the performance. While on the other hand the logical view is concerned with the whole schematic of elements, it represents how all the things are connected with each other (Computer hope. com, 2019).

The database scientific and entities are used for the protection of data quality. The denationalization of the support performance is to protect the quality of data. In the logical view the physical view is also considered initially for that schematic process. The elements and things are realized in the development of physical and logical view. In case of logical file system, it is possible to remap the file from the distributed file system. The physical files contain main and actual data while logical file contain description of this recorded data. The physical file work under the key sequence program in different fields.

Describe the functions and purposes of the file directory.

Directory find application in storing the files in different locations of the computer. Some of the most well-known computer directories are in the hierarchical file system all instances Unix, OS, Linux, and MS-DOS. The main purpose of using directory is to store and organize the data in separate files. The directory can store information in form of pictures and documents. The specific type of file folders used in the directory are normal file folder of computer (Computer hope. com, 2018). Directories use different places to store the program. For instance, for installing the program in computer directory use dozens of related files in the c drive. Storing the programs into specific directory help to prevent files from getting overwritten deleted or modified by any kind of program. Directories can contain any kind of files and even store other directories with their own files (Computer hope. com, 2018).

The main purpose of using directory is to catalog the file structure along with the reference of other computer files.  Many times, in the computer system the directories are named as folded or drawers. The traditional analogous of the folders is a benchmark.  In directories the files are organized in specific type of structures such as tree like structure. The directory contains inside directory that is known as sub directory (Computer hope. com, 2018). The file structure of sub directories considerate top-level directory, different types of programs associated with working directory, user as towards the folders, and reference location to the directory that is also known as part of the folder. In different types of operating systems, the programs are mainly associated with working directory and it can be executed.  Typically, different types of files reside in the main folder. The operating system restricts the access of users for the home directory or project directory and isolate their activities from other users of the same system. The root directory is used in the UNIX system (Shift web Solutions, 2011).

Categorize various file protection systems, and provide a few examples from current operating systems.

The file protection system is a specific process to protect the files. The file protection system provides specified and additional form of protection as provided to the system. The common type of file protection system is related to the encryption and there are two types of primary encryption that provide protection to the file system. The file protection system is commonly associated with the process that consider different steps to protect the files from any type of outsourcing. File protection system is a professional solution that provide protection to the personal data of the user. The application can be used to encrypt data in different folders components to deal with the cyber defense system (Dube & Gulati, 2005).

The file protection system enables the user to develop a reliable and confidential information exchange system.  The application provide opportunity to the user to choose Encryption Algorithm. The Encryption Algorithm can be defined by using digital objects and password. The encrypted files can be stored in the local disk or server or any type of external storage such as a cloud system. The protection layer is doubled with application code in the development procedure. The application complies with different requirements of general data protection regulation. The general data protection regulation defines standard Encryption Algorithm. The whole development process complies with different requirements (Dube & Gulati, 2005). The file protector system is convertible to any kind of computer with the same type of Windows operating system. The file protection system can be installed as extremely powerful chipper machine with different government Agencies and special services. File protection system conceited protection of file from copying, tempering, and loss. The encrypted folder is trusted by using VP provider (Dubhe & Gulati, 2005).

Describe CPU scheduling; how it works and why we need it.

CPU scheduling is a well-defined process that enable one process to be used along with the execution of another process on the hold. The CPU scheduling process is considered it to define resource usage with IO module. The main objective of CPU scheduling is to develop system that is highly efficient, fair, and fast. In some situations when computer becomes idle the operating system is select one process to be executed and one on the hold (Study tonight. com, 2016). This selection process is carried out by short time scheduling and select different type of process is in the memory that can be executed with allocation of CPU. The CPU scheduling depends upon function of dispatcher. Dispatcher is basically a module that control the processes of CPU in short term scheduling. The function in this process involve switching contexts, switching off user mode, jumping from an improper location towards the proper location in the user program, and to restart the program at the most convenient time. The dispatcher used for standing possible procedure known as dispatch latency. The different types of CPU scheduling that work under four types of circumstances (Study tonight. com, 2016).

1)      The process switching from running status towards the waiting state.

2)      The process is switching from running state it towards the ready state.

3)      The process is switching from waiting state towards the ready state

4)      Termination of the process under different circumstances and initiation of new procedure to be executed.

The criteria of CPU scheduling depend upon CPU utilization, throughput, turnaround time, load average, waiting time, and response time. There are different algorithms that can be used for CPU utilization and CPU scheduling. These processes are associated with execution of computer algorithms and the defend algorithms are mentioned below,

1)      First Come First Serve (CFC) Scheduling

2)      Multilevel Feedback Queue Scheduling

3)      Shortest-Job-First (SF) Scheduling

4)      Round Robin (RR) Scheduling

5)      Priority Scheduling

6)      Multilevel Queue Scheduling

Explain virtual memory.

In case of computer operations only secondary storage is used in the operating system and hardware drivers.  The secondary storage considered installed programs and data required for the secondary storage. Virtual memory is imaginary memory that is supported by operating system such as Windows. The operating system work in conjunction with the hardware the virtual memory can be used as alternate set of memory to address. Virtual memory can be defined as a memory management a capability of the operating system that use combined efficiency of affair and hardware. Virtual memory considered a physical memory storage with the temporary casting of data and random-access memory towards the disk storage. Virtual memory work under developed physical memory of RAM. The system loads larger about of programs and run multiple programs at the same time that lead to infinite memory of Random-Access Memory. The copy of virtual memory towards the physical memory can be used to swap the files and to fix number addresses. There are two types of virtual memory such as segmented virtual memory and paged visual memory (Rouse, Peterson, Lelii, & Regev, 2016).

References of an I/O device for each access method

Computerhope. com. (2018, 05 21). Directory. Retrieved from www.computerhope.com: https://www.computerhope.com/jargon/d/director.htm

Computerhope. com. (2019, 06 30). Storage device. Retrieved from computerhope.com: https://www.computerhope.com/jargon/s/stordevi.htm

Dube, D. P., & Gulati, V. P. (2005). Information System Audit and Assurance. Tata McGraw-Hill Education.

Hand, S. (2010). Operating Systems. Retrieved from www.cl.cam.ac.uk: https://www.cl.cam.ac.uk/teaching/1011/OpSystems/os1a-slides.pdf

Rouse, M., Peterson, S., Lelii, S., & Regev, H. (2016). virtual memory. Retrieved from searchstorage.techtarget.com: https://searchstorage.techtarget.com/definition/virtual-memory

Shiftweb Solutions. (2011, 11 02). The Differences Between Mac, Windows, and Linux. Retrieved from shiftwebsolutions.com: https://shiftwebsolutions.com/the-differences-between-mac-windows-and-linux/

Studytonight. com. (2016). What is CPU Scheduling? Retrieved from www.studytonight.com: https://www.studytonight.com/operating-system/cpu-scheduling

Techopedia. com. (2019). Data Storage. Retrieved from www.techopedia.com: https://www.techopedia.com/definition/23342/data-storage

 

 

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Top Class Engineers

ONLINE

Top Class Engineers

1218 Orders Completed

Quality Assignments

ONLINE

Quality Assignments

0 Orders Completed

Coursework Assignment Help

ONLINE

Coursework Assignment Help

63 Orders Completed