The programmed input
output referred to the data transferred. The data transfer method is initiated
by CPU under the control driver software. The software can be used to Access
Memory or registers in the device. Initially CPU issue the command and then
wait for IO operations to be completed. In this computer system the CPU is
faster as compared to IO module and it is programmed to work with transmission
of data. The steps of IO basic programming include CPU request for I/O
operation, I/O module performance, bits of status set for I/O, evaluation of
CPU BITS in periodic way, no significant and direct impact of I/O module on
CPU, and no interruption of I/O module with CPU.
In the interrupt process,
CPU issues the command to I/O module. The process undergoes normal working
without interrupted I/O device with the completion of the work. In case of
input device interrupter with CPU and new data would arrive on that end. The
performance of actual actions depends upon I/O port and memory mapping process.
In case of output, device delivers without any interaction with new data. DAM
and memory mapping process are used for generation of interrupts and System
becomes capable to do buffering. The CPU interrupted depend upon devices and it
could be insignificant in data transfer process at large amount. The CPU must
transfer the whole data between memory and I/O module. The basic operations of
interrupt include issue of commands through CPU, parallel connection of CPU and
data transfer through I/O module, interaction of I/O module with CPU, request
of data transfer by CPU, and data transfer by IO module.
In case of direct memory
access, CPU is capable to grant authority for IO module. The authority is to
write or read from the memory without having any involvement. DAM module is
capable to control the whole transferring process of data between IO devices and
memory. DAM devices transfer data correctly and directly in the memory under
different condition of CPU. Open DAM process system increases concurrently with
the performance of CPU. DAM controller and CPU share the memory in the
controlled system.
List, describe, and
analyze the most common data storage systems in terms of size, speed, error
handling, and cost.
The storage devices are
used in computer to store the data. The core function of modern computer is to
store the data and to transfer the data. The data storage process is improved
with use of digital technology. There are four different types of data storage
procedures including primary storage, secondary storage, tertiary storage, and
offline storage of the data. In case of primary storage, the main memory is
directly or indirectly connected with the central processing unit (CPU). In
this process, CPU read the instruction provided by the primary storage (Computer
hope. com, 2019). The primary storage depends upon the working of memory bus.
CPU continuously read instructions is stored in the primary storage and then
execute them on the basis of requirement. The primary storage devices are of
different types including ROM, ram and cache. Primary storage is also known as
main memory. Random access memory work to store the data. There are two types
of random-access memory including dynamic random-access memory and static
random-access memory (Orthopedic. com, 2019).
One of the common types
of physical data storage process is random access memory that is associated
with storage of data in the integrated circuits. Different types of new
technologies are working to promote the expansion and data storage capability.
Cloud services are new form of data storage services, it can be used to enhance
the capacity of devices and provide additional data storage in the devices. The
primary storage devices provide medium to hold the memory for short interval of
time. Cache and random-access memory are example of primary storage
devices (Orthopedic. com, 2019).
Primary storage devices
are directly accessible by CPU as their volatile and non-removable memory used
in this process. The secondary storage devices are nonvolatile
table devices that hold data written until it is overwritten or deleted. There
are two magnitude orders of secondary storage as compared to the primary
storage. For instance, hard drive is this slower SOD. It could be used as
secondary storage while the primary storage is faster for instance PIE and
SOD. The examples of secondary storage include solid state drive, USB thumb
drive, SD card, CD, floppy disk, tape drive, and hard drive (Computer hope.
com, 2019).
Describe the functional
components of an operating system, including kernels, modules, application
program interfaces, and other services.
The operating system can
be defined as a software that provide interface between the computer hardware
and the end user. In every computer, one operating system is essentially
required to run the programs such as games, MS word and chrome. Operating
system provide complete environment that run and perform different tasks. The
main process of the operating system is to communicate the instruction of user
and the processes in the computer (Hand, 2010).
The OS work to
communicate with the computer and the user without even knowing the computer
language. There are different types of OS such as Windows, android, iOS, Mac
OS, Linux, Windows phone OS, and chrome OS. There are different types of
features used in the operating systems such as protection and the supervisor
mode of work, program execution, allowing the disk for access and the
networking security for the file systems, management of program with the
virtual memory and multitasking process, handling of the I/O operations,
detection and handling of errors, resource and information protection, and
manipulation of files in the computers (Hand, 2010).
The central part of
computer operating system is Kernel, that perform to manage communication
between the hardware and the software. The nucleus of computers is Kernel and
it provide shell to the outermost system. The features of Kennel include low
level process of scheduling, process synchronization, inter-process
communication, and context switching. The popular kernels include monolithic
kernel and micro kernels. Application program interface include tools,
protocols, and routines for the application of software. The basic API
specifies the wide range of components that interact accordingly (Hand,
2010).
Describe and compare the
traditional Operating Systems: Linux, Windows, and Mac OS.
The operating system
provides a software packages that communicate directly with the hardware. the
operating system lies different application between computer and the software.
confectionery the operating system provides intermediate regarding the process
Software and Hardware. there are three operating systems mainly including Linux
Mac and Windows operating system. these three operating systems are dominating
the world of computers. the windows series of operating system are providing
more benefits to the users. there are majority of Software Hardware and support
provided by windows for the higher compatibility and work ability. most often
the Software Hardware as well as the support are provided and designed
according to Windows operating system. the primary concern of the operating
system is to provide compatibility with the services. Windows operating system
have changed the GUI and OS system. The main advantage is our inverter
consideration about maintenance of high-level performance. Windows operating
system is highly secure system that provide range of applications to the users.
LINUX operating system is
another type of operating system that is widely used by uses. benefit of Linux
system is to provide resources per information and to worth as work as a
developer get provide information and system for the customers and community
between the user’s applications and the system best valuable as compared to
Windows operating system. the variable properties of Linux operating system
include incredible frequency of work security and enhanced stability of
operations. LINUX operating system is one of the most customer-oriented system
that consider person needs of customers and customize the system according to them.
mac rating system provide series of graphical operation that are developed
according to the requirements of the system. there are different types of
timeline and key features of Mac Operating System. some of the
Operating
systems with the release dates are mentioned below,
1) 2000-2001:
The Early Days of Mac OS X. ...
2) 2002:
Mac OS X 10.2, Jaguar. ...
3) 2003:
Mac OS X 10.3, Panther. ...
4) 2005:
Mac OS X 10.4, Tiger. ...
5) 2007:
Mac OS X 10.5, Leopard. ...
6) 2009:
Mac OS X 10.6, Snow Leopard. ...
7) 2011:
Mac OS X 10.7, Lion. ...
8) 2012:
OS X Mountain Lion.
Compare mobile SOs
including iOS and Android.
Mobile phones of modern
era are using different types of IONS and Android systems. The first series of
Android in on as a t mobile was introduced by America. Mobile
devices are gaining increased popularity in the common uses. Whereas the
competition of device is becoming intensity due to android system and IONS
system. IONS devices include iPhone iPad and iPod Touch. While on the
other hand Android system include Motorola, Galaxy Nexus and other digital
mobile phones. According to the statistical report the iOS and Android devices
are getting more attention from the customers and 79% of the mobile devices are
working according to Android system (Shift web Solutions, 2011).
The Android operating
system is similar to Linux, but it is based upon a mobile phone application.
The developer of Android release date under Apache open source license. The
system was developed by open handset alliance and Google. The condition is
fruitful for the communication software as well as hardware systems. The
company subsequently acquired installed variety of Android for the smartphones
that boost up the manufacturing process and customer satisfaction with the
services (Shift web Solutions, 2011).
. One of the major
differences between Android and IS is development language. IONS based apps are
using swift data that is associated with inter corporate java system. iOS
developers use X code developing scheme to produce environment that provide
huge amount of functionality and data debugging. The use of code is productive
for the environment. One of the major differences between these two systems is
design philosophy. The designing principles include resolution and screen
sizes, navigation, and menus (Shift web Solutions, 2011).
Differentiate between the
logical and the physical views of file systems.
The physical file system
contains actual data that is mainly stored on the system. The description of
physical files included the data process that a presentation, receiving of the
program, and processing of the program. The local file does not contain any
kind of data, but the description of record is different for both. The logical
view is mainly concerned with the representation of things and physical view is
concerned with realization of the things. The logical view represents technical
description about the implementation of logical view for the customers any two
condition and the system development procedure.
The physical view
considered information, system development staff, communication between logical
view terms and procedures, translation of logical view and changes in the
physical file. The logical view focus is on the functional requirements and
data modelling process. The relationship between physical and logical data view
is quality element direct one to one relation (Computer hope. com, 2019).
The physical view includes physical data for index optimization, materialized
view, and demoralization of the performance. While on the other hand the
logical view is concerned with the whole schematic of elements, it represents
how all the things are connected with each other (Computer hope. com,
2019).
The database scientific
and entities are used for the protection of data quality. The denationalization
of the support performance is to protect the quality of data. In the logical
view the physical view is also considered initially for that schematic process.
The elements and things are realized in the development of physical and logical
view. In case of logical file system, it is possible to remap the file from the
distributed file system. The physical files contain main and actual data while
logical file contain description of this recorded data. The physical file work
under the key sequence program in different fields.
Describe the functions
and purposes of the file directory.
Directory find
application in storing the files in different locations of the computer. Some
of the most well-known computer directories are in the hierarchical file system
all instances Unix, OS, Linux, and MS-DOS. The main purpose of using directory
is to store and organize the data in separate files. The directory can store information
in form of pictures and documents. The specific type of file folders used in
the directory are normal file folder of computer (Computer hope. com,
2018). Directories use different places to store the program. For instance, for
installing the program in computer directory use dozens of related files in the
c drive. Storing the programs into specific directory help to prevent files
from getting overwritten deleted or modified by any kind of program.
Directories can contain any kind of files and even store other directories with
their own files (Computer hope. com, 2018).
The main purpose of using
directory is to catalog the file structure along with the reference of other
computer files. Many times, in the computer system the directories
are named as folded or drawers. The traditional analogous of the folders is a
benchmark. In directories the files are organized in specific type
of structures such as tree like structure. The directory contains inside
directory that is known as sub directory (Computer hope. com, 2018). The
file structure of sub directories considerate top-level directory, different
types of programs associated with working directory, user as towards the
folders, and reference location to the directory that is also known as part of
the folder. In different types of operating systems, the programs are mainly
associated with working directory and it can be executed. Typically,
different types of files reside in the main folder. The operating system
restricts the access of users for the home directory or project directory and
isolate their activities from other users of the same system. The root
directory is used in the UNIX system (Shift web Solutions, 2011).
Categorize various file
protection systems, and provide a few examples from current operating systems.
The file protection
system is a specific process to protect the files. The file protection system
provides specified and additional form of protection as provided to the system.
The common type of file protection system is related to the encryption and
there are two types of primary encryption that provide protection to the file
system. The file protection system is commonly associated with the process that
consider different steps to protect the files from any type of outsourcing.
File protection system is a professional solution that provide protection to
the personal data of the user. The application can be used to encrypt data in
different folders components to deal with the cyber defense system (Dube
& Gulati, 2005).
The file protection
system enables the user to develop a reliable and confidential information
exchange system. The application provide opportunity to the user to
choose Encryption Algorithm. The Encryption Algorithm can be defined by using
digital objects and password. The encrypted files can be stored in the local
disk or server or any type of external storage such as a cloud system. The
protection layer is doubled with application code in the development procedure.
The application complies with different requirements of general data protection
regulation. The general data protection regulation defines standard Encryption
Algorithm. The whole development process complies with different
requirements (Dube & Gulati, 2005). The file protector system is
convertible to any kind of computer with the same type of Windows operating
system. The file protection system can be installed as extremely powerful
chipper machine with different government Agencies and special services. File
protection system conceited protection of file from copying, tempering, and
loss. The encrypted folder is trusted by using VP provider (Dubhe &
Gulati, 2005).
Describe CPU scheduling;
how it works and why we need it.
CPU scheduling is a
well-defined process that enable one process to be used along with the
execution of another process on the hold. The CPU scheduling process is
considered it to define resource usage with IO module. The main objective of
CPU scheduling is to develop system that is highly efficient, fair, and fast.
In some situations when computer becomes idle the operating system is select
one process to be executed and one on the hold (Study tonight. com, 2016).
This selection process is carried out by short time scheduling and select
different type of process is in the memory that can be executed with allocation
of CPU. The CPU scheduling depends upon function of dispatcher. Dispatcher is
basically a module that control the processes of CPU in short term scheduling.
The function in this process involve switching contexts, switching off user
mode, jumping from an improper location towards the proper location in the user
program, and to restart the program at the most convenient time. The dispatcher
used for standing possible procedure known as dispatch latency. The different
types of CPU scheduling that work under four types of circumstances (Study
tonight. com, 2016).
1) The
process switching from running status towards the waiting state.
2) The
process is switching from running state it towards the ready state.
3) The
process is switching from waiting state towards the ready state
4) Termination
of the process under different circumstances and initiation of new procedure to
be executed.
The criteria of CPU
scheduling depend upon CPU utilization, throughput, turnaround time, load
average, waiting time, and response time. There are different algorithms that
can be used for CPU utilization and CPU scheduling. These processes are
associated with execution of computer algorithms and the defend algorithms are
mentioned below,
1) First
Come First Serve (CFC) Scheduling
2) Multilevel
Feedback Queue Scheduling
3) Shortest-Job-First
(SF) Scheduling
4) Round
Robin (RR) Scheduling
5) Priority
Scheduling
6) Multilevel
Queue Scheduling
Explain virtual memory.
In case of computer
operations only secondary storage is used in the operating system and hardware
drivers. The secondary storage considered installed programs and
data required for the secondary storage. Virtual memory is imaginary memory
that is supported by operating system such as Windows. The operating system
work in conjunction with the hardware the virtual memory can be used as
alternate set of memory to address. Virtual memory can be defined as a memory
management a capability of the operating system that use combined efficiency of
affair and hardware. Virtual memory considered a physical memory storage with
the temporary casting of data and random-access memory towards the disk
storage. Virtual memory work under developed physical memory of RAM. The system
loads larger about of programs and run multiple programs at the same time that
lead to infinite memory of Random-Access Memory. The copy of virtual memory
towards the physical memory can be used to swap the files and to fix number
addresses. There are two types of virtual memory such as segmented virtual
memory and paged visual memory (Rouse, Peterson, Lelii, & Regev,
2016).
References of an I/O device for each access method
Computerhope. com. (2018,
05 21). Directory. Retrieved from www.computerhope.com:
https://www.computerhope.com/jargon/d/director.htm
Computerhope. com. (2019,
06 30). Storage device. Retrieved from computerhope.com:
https://www.computerhope.com/jargon/s/stordevi.htm
Dube, D. P., &
Gulati, V. P. (2005). Information System Audit and Assurance. Tata McGraw-Hill
Education.
Hand, S. (2010). Operating
Systems. Retrieved from www.cl.cam.ac.uk:
https://www.cl.cam.ac.uk/teaching/1011/OpSystems/os1a-slides.pdf
Rouse, M., Peterson, S.,
Lelii, S., & Regev, H. (2016). virtual memory. Retrieved from
searchstorage.techtarget.com:
https://searchstorage.techtarget.com/definition/virtual-memory
Shiftweb Solutions.
(2011, 11 02). The Differences Between Mac, Windows, and Linux. Retrieved
from shiftwebsolutions.com:
https://shiftwebsolutions.com/the-differences-between-mac-windows-and-linux/
Studytonight. com.
(2016). What is CPU Scheduling? Retrieved from www.studytonight.com:
https://www.studytonight.com/operating-system/cpu-scheduling
Techopedia. com.
(2019). Data Storage. Retrieved from www.techopedia.com:
https://www.techopedia.com/definition/23342/data-storage