0% found this document useful (0 votes)
25 views41 pages

Computer Notes 2025 Eddd3

The document provides a comprehensive overview of computers, detailing their definition, working principles, components, characteristics, advantages, limitations, and classifications. It discusses the evolution of computer generations from vacuum tubes to microcomputers, and explains the differences between analog, digital, and hybrid computers. Additionally, it covers hardware components, input devices, and various types of microcomputers, highlighting their functionalities and uses.

Uploaded by

sandhyadevit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views41 pages

Computer Notes 2025 Eddd3

The document provides a comprehensive overview of computers, detailing their definition, working principles, components, characteristics, advantages, limitations, and classifications. It discusses the evolution of computer generations from vacuum tubes to microcomputers, and explains the differences between analog, digital, and hybrid computers. Additionally, it covers hardware components, input devices, and various types of microcomputers, highlighting their functionalities and uses.

Uploaded by

sandhyadevit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 41

Introduction to Computer

 The word computer brings from the word ‘ compute ‘, that means to ‘ calculate.’
 A computer understand ‘ Binary ‘ language only.
 It produces 100 percent accurate results.
Charles Babbage is considered as the father of computer. It is believed that the Analytical Engine was the first co
mputer which was invented by Charles Babbage in 1837. It used punch cards as read-only memory.

Definition of Computer
A computer is a programmable electronic device that accepts raw data as input and processes it with a set of
instructions (a program) to produce the result as output.

Working of Computer
 A computer works on the three basic steps:-
This whole process is term as input- process- output cycle or I- P- O cycle.
Computer input is called data and the output obtained after processing it, based on user’s instructions is
called information. Raw facts and figures which can be processed using arithmetic and logical operations to
obtain information are called data.

The processes that can be applied to data are of two types −


 Arithmetic operations − Examples include calculations like addition, subtraction, differentials, square root, etc.
 Logical operations − Examples include comparison operations like greater than, less than, equal to, opposite,
etc.

The basic parts of a computer are as follows −


 Input Unit − Devices like keyboard and mouse that are used to input data and instructions to the computer are
called input unit.
 Output Unit − Devices like printer and visual display unit that are used to provide information to the user in
desired format are called output unit.
 Control Unit − As the name suggests, this unit controls all the functions of the computer. All devices or parts of
computer interact through the control unit.
 Arithmetic Logic Unit − This is the brain of the computer where all arithmetic operations and logical operations
take place.
 Memory − All input data, instructions and data interim to the processes are stored in the memory. Memory is of
two types – primary memory and secondary memory. Primary memory resides within the CPU whereas
secondary memory is external to it.

CPU
Control unit, arithmetic logic unit and memory are together called the central processing unit or CPU. Computer
devices like keyboard, mouse, printer, etc. that we can see and touch are the hardware components of a
computer. The set of instructions or programs that make the computer function using these hardware parts are
called software. We cannot see or touch software. Both hardware and software are necessary for working of a
computer.

Characteristics of a Computer
 There are 5 important characteristics of a computer which makes it a very special machine. They are as follows:-
1. Speed
2. Accuracy
3. Diligence
4. Versatility
5. Storage capacity

1. Speed
 A PC can perform operations at a very fast speed.
 It can perform thousands of mathematical operations in just a few seconds.
 The time it takes to perform these calculations is measured in the terms of nanoseconds or picoseconds.
1 second = 109 nanoseconds
and
1 seconds = 1012 picoseconds
2. Accuracy
 A PC is considered to be 100% accurate, provided the data and instructions given to it by the user are up to the
mark.
3. Diligence
 A PC can work continuously for hours without getting tired.
 The speed and accuracy level also remains the same, even after it works for many hours.
4. Versatility
 The same PC machine can be used for performing various jobs.
 It suits the needs of different kinds of people involved in different professions.
5. Storage capacity
 A PC can store huge amount of data and information in its storage, called memory.
 This stored information can be kept and used for a long time.
Advantages of Using a Computer
 To increase our productivity.
 To connects us to the internet.
 It reduce waste and can store vast amount of data.
 To improves our employment options.
 To save the time.
 To assist the physical challenged.
 Also find your love in your life.
 To keep us entertained.
 To help us automate and monitor.
 To gave you a better understanding of data.
 They help us organize, sort and search through information.
Limitations of a Computer
 There are no decision making ability.
 It has no intelligence.
 They don’t have emotions and feelings.

Functional Components of a Computer


A computer is a combination of hardware and software resources which integrate together and provides

various functionalities to the user. Hardware are the physical components of a computer

Generations of Computer
 The term ” generation ” is generally used to characterise the major developments in the field of computer
industry.Basically, the term generation is used to distinguish between different hardware technologies
developed.
 Generations of a computers are divided into five categories. They are named as:-
1. First Generation of computer
2. Second Generation of computer
3. Third Generation of computer
4. Fourth Generation of computer
5. Fifth Generation of computer

First generation computers (1946-1956): They made use of vacuum tubes to store and process information. The
tubes consumed a lot of power and generated a lot of heat (overheating). They were huge in size and occupy a
room. They used magnetic tape. Storage capacity was very low i.e. 2kb and speed of processing was also very
low. First machine in this category was ENIAC (electronic discrete variable automatic computer) and later came
UNIVAC (universal automatic computers). Their input /output capabilities were usually limited to the keyboard
and or punched card input and printer and or punched cart output.
Second generation computers (1957-1967): These computers used transistors after invention of transistors. The
transistor is smaller cheaper and produced less heat than vacuum tubes and consumed less power. The cost of
computers decreased and the speed increased. Removable disk storage units were developed for use on these
machines. The speed of these machines was described in microseconds (1/1000, 000 of a second). These
computers had programming languages whose vocabularies are close to the human natural language, English
language.
Third generation computers (1965-1980)
Introduced the use of very small electronic circuit called integrated circuits (IC) by combining several transistors
together between 3 transistors to make 1 IC. With IC you can house thousands of transistors in one IC. This
change further decreased the size, heat output and the maintenance complexity of the computers while
increasing its speed. The small circuitry that resulted improved the processing speed i.e. 10 times the past. The
speed of these machines was described in nanoseconds (1/1,000,000,000 of a second). They have higher main
memory capacity, reliable and increased processing power (have the capability of holding more than one set of
instructions and operate on them) than the second generation computers.
Fourth generation computers (1980s)
Use large scale integration circuits which housed hundreds of transistors and very large IC which are between
200,000 to 400, 000 in one IC. Memory used includes magnetic disc and optical disc. Memory size expanded up
to several MB and speed was 10 times faster. This generation marked the origin of mini computers in use today.
Fifth generation computers (1990-current)
The design of these computers was based on VLSI (very large scale integration) technology, the micro chip
technology that gave rise to the smaller computers known as the micro computers in use today. These
computers are used in networking .examples of micro computers are IBM PCs BBC micro etc. the micro
computers are usually described as PCs or stand alone or desktop computers because they were designed
primarily to serve single person at a time. The fifth generation is still a state of the art technology that relies on
predictions and further technological refinements.
Classification of Computer

Computers are classified based on


i. functionality & data presentation
ii. Size
iii. Purpose
Types of Computers according to functionality and data representation.

1. Analog Computers: Analog computers are used to process continuous data. Analog computers represent
variables by physical quantities. Thus any computer which solve problem by translating physical conditions such
as flow, temperature, pressure, angular position or voltage into related mechanical or electrical related circuits
as an analog for the physical phenomenon being investigated in general it is a computer which uses an analog
quantity and produces analog values as output.
2. Digital Computers: Digital computer represents physical quantities with the help of digits or numbers. These
numbers are used to perform Arithmetic calculations and also make logical decision to reach a conclusion,
depending on, the data they receive from the user.
3. Hybrid Computers: Various specifically designed computers are with both digital and analog characteristics
combining the advantages of analog and digital computers when working as a system. Hybrid computers are
being used extensively in process control system where it is necessary to have a close representation with the
physical world.

Classification of Computer according to size

Super computers: They are very large in size and use multiple processors and superior technology. Super
computers are biggest in size, the most expensive in price than any other is classified and known as super
computer. It can process trillions of instructions in seconds. Governments specially use this type of computer for
their different calculations and heavy jobs. Different industries also use this huge computer for designing their
products.
Mainframe computers: A mainframe is another giant computer after the super computer and can also process
millions of instruction per second and capable of accessing billions of data .They are physically very large in size
with very high capacity of main memory. This computer is commonly used in big hospitals, air line reservations
companies, and many other huge companies prefer mainframe because of its capability of retrieving data on a
huge basis.
Minicomputers: They are smaller than the main frame but bigger than minicomputers. They support concurrent
users. They can be used as servers in companies. They are slower and less costly compared to mainframe
computers but more powerful, reliable and expensive than micro computers.
Micro computers: They are of advanced technology i.e. the micro era based on large scale integration that
confines several physical components per small elements thumb size IC, hence the size reduced. It is the
smallest of the Strategy computers. They are usually called personal computers since they are designed to be
used by individuals. The micro chip technology has enabled reduction of size of computers. Microcomputers can
be a desktop, laptop, notebooks, or even palmtop

Classification of Computers according to purpose

General-Purpose computers — those built for a great variety of processing jobs. Simply by using a general
purpose computer and different software, various tasks can be accomplished, including writing and editing
(word processing), manipulating facts in a data base, tracking manufacturing inventory, making scientific
calculations, or even controlling organization’s security system, electricity consumption, and building
temperature. General purpose computers are designed to perform a wide variety of functions and operations. A
general purpose computer is able to perform a wide variety of operations because it can store and execute
different programs in its internal storage.
Special-Purpose Computers are designed to be task specific and most of the times their job is to solve one
particular problem. They are also known as dedicated computers, because they are dedicated to perfom a single
task over and over again. Such a computer system would be useful in playing graphic intensive Video Games,
traffic lights control system, navigational system in an aircraft, weather forecasting, satellite launch / tracking, oil
exploration, and in automotive industries, keeping time in a digital watch, or Robot helicopter.

Four types of Microcomputers


1. Desktop Microcomputer
The desktop microcomputer plays an important role in the users’ life because it allows them to complete several
complex tasks in a short period of time without experiencing any difficulties. This computer sits on a table and is
connected to numerous components through wires, including a monitor, keyboard, system unit, and mouse
2. Laptop
A laptop, also known as a “Notebook,” is a computer that looks like a sleek briefcase. They can also handle more
sophisticated tasks, such as a desktop computer, and they can run on their own in-built battery and a wall
socket.
3. Tablets and Smartphones
Tablets
Tablet microcomputers are compact mobile computers with touch screen displays that are smaller than laptop
computers but larger than smartphones.
Smartphones
A smartphone is a cell phone with a touch screen that can handle advanced tasks close to those of a computer,
such as installing an operating system, downloading software, accessing the internet, and more.
PDA
PDA is short for “Personal Digital Assistant,” and it is a portable device that is equivalent to a tablet, palmtop, or
smartphone in terms of portability and scale. It has a small LCD screen for both input and output functions.
4. Palmtop microcomputer
The term “pocket computer” refers to a palmtop microcomputer. It is a smaller computer than a PDA, and it
uses less power as a result of its compact scale. It is also a very lightweight laptop. Instead of using a keyboard,
palmtop computers use a stylus pen stick to enter data.

Hardware
Hardware stands for the physical that build up a computer. a computer component is hardware if you can
touch it.Hardware may be located inside a computer or outside of it connected to the computer via wires or
wirelessly.

Examples of hardware that is common to all computers are:


1. The motherboard is a board-shaped structure located inside a computer and is its main part: a computer cannot
do calculationor remember short-term information without the elements located on it. Components on the
motherboard include:
a. The CPU (Central Processing Unit): This is the brain of the computer that performs calculations.
b. The Chipset is set of usually 2 chips: the northbridge and the southbridge. These chips connect the CPU to other
components on the motherboard (because after you calculated something, you need to store it or output it to
the world!)
c. RAM (Random-Access Memory) is the short-term memory of a computer. This memory has a limited size and is
volatile (will be erased when the computer shuts down.) Therefore, you should periodically save your work on a
computer!
d. ROM (Read-Only Memory) stores a small program called BIOS that runs when the computer “boots” (turns on
or restarts.) ROM is non-volatile, and cannot be deleted, and this is the reason is it a “read-only” part.
e. Buses allow different components to communicate with each other. Buses include wires, optical fibers, and any
software that makes them operate.
f. Every computer also has a battery, usually a lithium one, that is used to feed electricity to the computer’s clock
(and other date & time configurations.)

Input Devices
Input devices are the devices that are used to send signals to the computer for performing tasks. The receiver at
the end is the CPU (Central Processing Unit), which works to send signals to the output devices. Some of the
classifications of Input devices are:
 Keyboard Devices
 Pointing Devices
 Composite Devices
 Game Controller
 Visual Devices
 Audio Input Devices
Some of the input devices are described below.

Keyboard
The keyboard is the most frequent and widely used input device for entering data into a computer. Although
there are some additional keys for performing other operations.
Keyboard
Types of Keys
 Numeric Keys: It is used to enter numeric data or move the cursor. It usually consists of a set of 17 keys.
 Typing Keys: The letter keys (A-Z) and number keys (09) are among these keys.
 Control Keys: These keys control the pointer and the screen. There are four directional arrow keys on it. Home,
End, Insert, Alternate(Alt), Delete, Control(Ctrl), etc., and Escape are all control keys (Esc).
 Special Keys: Enter, Shift, Caps Lock, NumLk, Tab, etc., and Print Screen are among the special function keys on
the keyboard.
 Function Keys: The 12 keys from F1 to F12 are on the topmost row of the keyboard.
Mouse
The most common pointing device is the mouse. The mouse is used to move a little cursor across the screen
while clicking and dragging. The left mouse button can be used to select or move items, while the right mouse
button when clicked displays extra menus.
Joystick
A joystick is a pointing device that is used to move the cursor on a computer screen. A spherical ball is attached
to both the bottom and top ends of the stick. In a socket, the lower spherical ball slides. You can move the
joystick in all four directions.
Track Ball
Track Ball is an accessory for notebooks and laptops, which works on behalf of a mouse. It has a similar structure
to a mouse. Its structure is like a half-inserted ball and we use fingers for cursor movement.
Light Pen
A light pen is a type of pointing device that looks like a pen. It can be used to select a menu item or to draw on
the monitor screen.
Scanner
A scanner is an input device that functions similarly to a photocopier. The scanner collects images from the
source and converts them to a digital format that may be saved on a disc. Before they are printed, these images
can be modified.
Optical Mark Reader (OMR)
An Optical Mark Reader is a device that is generally used in educational institutions to check the answers to
objective exams. It recognizes the marks present by pencil and pen.
Optical Character Reader (OCR)
OCR stands for optical character recognition, and it is a device that reads printed text. OCR optically scans the
text, character by character turns it into a machine-readable code, and saves it to the system memory.
Magnetic Ink Card Reader (MICR)
It is a device that is generally used in banks to deal with the cheques given to the bank by the customer.
Bar Code Reader
A bar code reader is a device that reads data that is bar-coded (data that is represented by light and dark
lines).Bar-coded data is commonly used to mark things, number books, and so on.
Web Camera
Because a web camera records a video image of the scene in front of it, a webcam is an input device. It is either
built inside the computer (for example, a laptop) or attached through a USB connection.
Digitizer
Digitizer is a device that is used to convert analog signals to digital signals. it converts signals into numeric
values. An example of a Digitizer is Graphic Tablet, which is used to convert graphics to binary data.
Microphone
The microphone works as an input device that receives input voice signals and also has the responsibility of
converting it also to digital form.

Output Devices
Output Devices are the devices that show us the result after giving the input to a computer system. Output can
be of many different forms like image, graphic audio, video, etc. Some of the output devices are described
below.
Monitor
Monitors, also known as Visual Display Units (VDUs), are a computer’s primary output device. It creates images
by arranging small dots, known as pixels, in a rectangular pattern.
Printer
Printers are output devices that allow you to print information on paper. There are certain types of printers
which are described below.
 Impact Printers
o Character Printers
o Line Printers
 Non-Impact Printers
o Laser Printers
o Inkjet Printers
Impact Printer
Characters are printed on the ribbon, which is subsequently crushed against the paper, in impact printers.
Character Printers
Character Printer has the capability to print only one character at a time. It is of two types.
 Dot Matrix Printer
 Daisy Wheel
Line Printers
Line Printers are printers that have the capability to print one line at a time. It is of two types.
 Drum Printer
 Chain Printer

Non-Impact Printers
Characters are printed without the need for a ribbon in non-impact printers. Because these printers print a full
page at a time, they’re also known as Page Printers. The following are the characteristics of non-impact printers:
Laser Printers
Laser Printers use laser lights for producing dots which will produce characters on the page.
Inkjet Printers
Inkjet printers are printers that use spray technology for printing papers. High-quality papers are produced in an
Inkjet printer. They also do color printing.

Projector
Projectors are optical devices that have the work to show visuals on both types of screens, stationary and
moving both.
Plotter
Plotter is a device that helps in making graphics or other images to give a real view. A graphic card is mandatorily
required to use these devices.

Parts of Motherboard and Their Functions


A computer’s motherboard is typically the largest printed circuit board in a machine’s chassis. It distributes
electricity and facilitates communication between and to the central processing unit (CPU), random access
memory (RAM), and any other component of the computer’s hardware.The motherboard connects different
external components of the computer, so it is also considered the backbone of a computer.
A list of motherboard components is shown below.
 RAM Slot and Chip
 Switch for dual in-line packages (DIP)
 CPU Socket and Chip
 Keyboard and mouse ports
 Chip ROM
 AGP
 South-North Bridge
 Battery for CMOS
 USB Ports
 Cooling system
 SATA and PATA Connector
 HDMI Port
 FDD Connector

RAM Slot and Chip:


RAM Slot
Random Access Memory is known as RAM. It is additionally known as the main memory. Computers and other
technological devices often have temporary data storage units called RAM (random access memory).

Switch for dual in-line packages (DIP):


The DIP may refer to the entire unit or a single switch. The DIP switch and other electronic motherboard
components are intended to be utilized together on a printed circuit board (motherboard).

CPU Socket and Chip:


A crucial part of a computer system is the CPU chip. It is present in both PC and laptop computers and serves as
the brain of the computer processing system.

North Bridge:
They are the two chips present in the motherboard’s main logic chipset. The front-side bus directly connects the
northbridge, the host bridge, or Memory Controller Hub to the CPU (FSB). It is in charge of duties demanding the
most significant level of performance. They control communication between the CPU and other motherboard
components along with the southbridge.

Southbridge:
The motherboard’s IO capability is managed and controlled by the southbridge. Unlike Northbridge, it doesn’t
have a direct line of interaction with the CPU. Due to its reduced connection speed, it mainly handles low-speed
devices. The Northbridge receives instructions from the CPU and relays them to the southbridge. It connects to
the SATA hard drive connector and the PCI bus, ISA, and IDE buses.

AGP:
Although it is mainly used for graphics cards, the AGP slot (Accelerated Graphics Port Slot)is a sort of expansion
slot comparable to a PCI slot. Being typically dark brown, this expansion slot is simple to recognize.

Cooling system:
Cooling systems employ a thermal conductor to cool the system and stop overheating of components like the
CPU, north-south bridge, etc.

PATA Connector:
PATA, or Parallel Advanced Technology Attachment, each PATA cable has two or three connections, one of
which connects to the interface of the adapter and the others to secondary memory devices. Hard drive types
include Parallel ATA (PATA) drives. An alternative name for them includes integrated drive electronics (IDE).

SATA connector:
Serial Advanced Technology Attachment might be referred to as simply Serial ATA. It is a 7-pin cable that
accomplishes the same task as the PATA connector while being stronger and shorter.

External device connector:


Data can be transferred over several communication channels simultaneously using a parallel port. One bit of
data is exchanged at a time using a serial port. The USB connector is the most frequently used port on personal
computers.

PCI:
PCI is abbreviated as a peripheral component interconnect. As the name indicates serves to connect different
additional external components to the motherboard. The PCI Local Bus Standard includes PCI, a local computer
bus that connects hardware components to computers.

USB (Universal Serial Bus)


USB is an industry standard that creates specifications for connectors, cables and protocols for connection;
power supply (interfacing) and communication among computers, computer peripherals as well as other
desktops. There are a great many USB hardware including several different connectors, of which USB-C is the
latest kind.

ISA (Industry Standard Architecture) slot

ISA is the 16-bit internal bus of IMB PC/AT and similar computers that are based on Intel 80286 and its
immediate successors during the 1980s. It was backward compatible with the 8-bit bus of the 8088-based IBM
PC largely.
Parallel port
A parallel port is a kind of interface for attaching peripherals on desktops. The name of this kind of port is
derived from the way the data is sent. That is, the parallel ports send multiple bits of data at the same time.

IDE (Integrated Drive Electronics) controller


The devices used for connecting IDE, Ethernet, FireWire, USB and other systems can be called host adapter. So,
the IDE controller refers to the host adapter.

CMOS (Complementary Metal-oxide-semiconductor) battery


CMOS battery, also called memory battery, clock battery or real-time clock (RTC), is generally a CR2032 lithium
coin cell. The lifespan of the CMOS battery is estimated to be three years when the power supply unit (PSU) is
unplugged or switch off.
Power supply connector
A power supply provides the necessary electrical power to let the computer to work. It takes standard 110-Volt
AC (Alternative Current) power to DC (Direct Current) power of 12 Volt, 5 Volt, 3.3 Volt, etc.
Jumper
A jumper is a short length of conductor that is used to close, open or bypass part of an electronic circuit.
Typically, jumpers are used to set up or configure printed circuit boards like the motherboard.

Heat sink/heatsink (cooling system)


A heat sink is a passive heat exchanger that transfers the heat generated by parts of motherboard into a fluid
medium like liquid or air.
Clock generator
A clock generator is an electronic oscillator (circuit) that produces a clock signal for usage in synchronizing a
circuit’s operation.

BIOS:
Basic Input Output System, or BIOS, is software kept on a motherboard. Since the software is non-volatile, its
settings can still be restored even after losing power. It is the application that a computer’s microprocessor runs
when the computer is turned on. Additionally, it controls the flow of information between the operating system
and any attached hardware.

Computer memory
Computer memory is any physical device, used to store data, information or instruction temporarily or
permanently. It is the collection of storage units that stores binary information in the form of bits. The memory
block is split into a small number of components, called cells. Each cell has a unique address to store the data in
memory, ranging from zero to memory size minus one. For example, if the size of computer memory is 64k
words, the memory units have 64 * 1024 = 65536 locations or cells. The address of the memory's cells varies
from 0 to 65535.
Classification of Memory
The following figure represents the classification of memory:

Primary or Main Memory


Primary memory is also known as the computer system's main memory that communicates directly within the
CPU, Auxiliary memory and the Cache memory. When a program or data is activated to execute, the processor
first loads instructions or programs from secondary memory into main memory, and then the processor starts
execution. the primary memory is volatile, which means the data in memory can be lost if it is not saved when a
power failure occurs.
The primary memory is further divided into two parts:

1. RAM (Random Access Memory)


2. ROM (Read Only Memory)
Random Access Memory (RAM)
Random Access Memory (RAM) is one of the faster types of main memory accessed directly by the CPU. It is the
hardware in a computer device to temporarily store data, programs or program results. It is used to read/write
data in memory until the machine is working. It is volatile, which means if a power failure occurs or the
computer is turned off, the information stored in RAM will be lost. All data stored in computer memory can be
read or accessed randomly at any time.
There are two types of RAM:
 SRAM
 DRAM
DRAM: DRAM (Dynamic Random-Access Memory) is a type of RAM that is used for the dynamic storage of data
in RAM. In DRAM, each cell carries one-bit information. The cell is made up of two parts: a capacitor and a
transistor. The size of the capacitor and the transistor is so small, requiring millions of them to store on a single
chip. Hence, a DRAM chip can hold more data than an SRAM chip of the same size. However, the capacitor
needs to be continuously refreshed to retain information because DRAM is volatile. If the power is switched off,
the data store in memory is lost.
Characteristics of DRAM
1. It requires continuously refreshed to retain the data.
2. It is slower than SRAM
3. It holds a large amount of data
4. It is the combination of capacitor and transistor
5. It is less expensive as compared to SRAM
6. Less power consumption
SRAM: SRAM (Static Random-Access Memory) is a type of RAM used to store static data in the memory. static
RAM is RAM in which data is stored in transistors in the form of voltage It means to store data in SRAM remains
active as long as the computer system has a power supply. However, data is lost in SRAM when power failures
have occurred.
Characteristics of Static Ram
1. It does not require to refresh.
2. It is faster than DRAM
3. It is expensive.
4. High power consumption
5. Longer life
6. Large size
7. Uses as a cache memory

Advantages of RAM
 It is a faster type of memory in a computer.
 It requires less power to operate.
 Program loads much faster
 More RAM increases the performance of a system and can multitask.
 Perform read and write operations.
 The processor can read information faster than a hard disc, floppy, USB, etc.
Disadvantages of RAM
 Less RAM reduces the speed and performance of a computer.
 Due to volatile, it requires electricity to preserve the data.
 It is expensive than ROM
 It is unreliable as compared to ROM
 The Size of RAM is limited.

Read-Only Memory (ROM)


ROM is a memory device or storage medium that is used to permanently store information inside a chip. It is a
read-only memory that can only read stored information, data or programs, but we cannot write or modify
anything. A ROM contains some important instructions or program data that are required to start or boot a
computer. It is a non-volatile memory; it means that the stored information cannot be lost even when the
power is turned off or the system is shut down.

Types of ROM
There are five types of Read Only Memory:
1. MROM (Masked Read Only Memory):
MROM is the oldest type of read-only memory whose program or data is pre-configured by the integrated
circuit manufacture at the time of manufacturing. Therefore, a program or instruction stored within the MROM
chip cannot be changed by the user.
2. PROM (Programmable Read Only Memory):
It is a type of digital read-only memory, in which the user can write any type of information or program only
once. It means it is the empty PROM chip in which the user can write the desired content or program only once
using the special PROM programmer or PROM burner device; after that, the data or instruction cannot be
changed or erased.
3. EPROM (Erasable and Programmable Read Only Memory):
It is the type of read only memory in which stored data can be erased and re-programmed only once in the
EPROM memory. It is a non-volatile memory chip that holds data when there is no power supply and can also
store data for a minimum of 10 to 20 years. In EPROM, if we want to erase any stored data and re-programmed
it, first, we need to pass the ultraviolet light for 40 minutes to erase the data; after that, the data is re-created in
EPROM.
4. EEPROM (Electrically Erasable and Programmable Read Only Memory):
The EEROM is an electrically erasable and programmable read only memory used to erase stored data using a
high voltage electrical charge and re-programmed it. It is also a non-volatile memory whose data cannot be
erased or lost; even the power is turned off. In EEPROM, the stored data can be erased and reprogrammed up
to 10 thousand times, and the data erase one byte at a time.
5. Flash ROM:
Flash memory is a non-volatile storage memory chip that can be written or programmed in small units called
Block or Sector. Flash Memory is an EEPROM form of computer memory, and the contents or data cannot be
lost when the power source is turned off. It is also used to transfer data between the computer and digital
devices.
Advantages of ROM
1. It is a non-volatile memory in which stored information can be lost even power is turned off.
2. It is static, so it does not require refreshing the content every time.
3. Data can be stored permanently.
4. It is easy to test and store large data as compared to RAM.
5. These cannot be changed accidently
6. It is cheaper than RAM.
7. It is simple and reliable as compared to RAM.
8. It helps to start the computer and loads the OS.
Disadvantages of ROM
1. Store data cannot be updated or modify except to read the existing data.
2. It is a slower memory than RAM to access the stored data.
3. It takes around 40 minutes to destroy the existing data using the high charge of ultraviolet light.

Secondary Memory

Secondary memory is a permanent storage space to hold a large amount of data. Secondary memory is also
known as external memory that representing the various storage media (hard drives, USB, CDs, flash drives and
DVDs) on which the computer data and program can be saved on a long term basis.

Unlike primary memory, secondary memory cannot be accessed directly by the CPU. Instead of that, secondary
memory data is first loaded into the RAM (Random Access Memory) and then sent to the processor to read and
update the data. Secondary memory devices also include magnetic disks like hard disk and floppy disks, an
optical disk such as CDs and CDROMs, and magnetic tapes.
Features of Secondary Memory
 Its speed is slower than the primary/ main memory.
 Store data cannot be lost due to non-volatile nature.
 It can store large collections of different types, such as audio, video, pictures, text, software, etc.
 All the stored data in a secondary memory cannot be lost because it is a permanent storage area; even the
power is turned off.
 It has various optical and magnetic memories to store data.

Types of Secondary Memory


The following are the types of secondary memory devices:
Hard Disk
A hard disk is a computer's permanent storage device. It is a non-volatile disk that permanently stores data,
programs, and files, and cannot lose store data when the computer's power source is switched off. Typically, it is
located internally on computer's motherboard that stores and retrieves data using one or more rigid fast
rotating disk platters inside an air-sealed casing. It is a large storage device, found on every computer or laptop
for permanently storing installed software, music, text documentation, videos, operating system, and data until
the user did not delete.
Floppy Disk
A floppy disk is a secondary storage system that consisting of thin, flexible magnetic coating disks for holding
electronic data such as computer files. It is also known as Floppy Diskette that comes in three sizes like 8 inches,
5.5 inches and 3.5 inches. which can store data up to 1.44 MB. Since most programs were larger, that required
multiple floppy diskettes to store large amounts of data. Therefore, it is not used due to very low memory
storage.
CD (Compact Disc)
A CD is an optical disk storage device, stands for Compact Disc. It is a storage device used to store various data
types like audio, videos, files, OS, Back-Up file, and any other information useful to a computer. The CD has a
width of 1.2 mm and 12 cm in height, which can store approximately 783 MB of data size. It uses laser light to
read and write data from the CDs.
Types of CDs
1. CD-ROM (Compact Disc Read Only Memory): It is mainly used for bulk size mass like audio CDs, software and
computer games at the time of manufacture. Users can only read data, text, music, videos from the disc, but
they cannot modify or burnt it.
2. CD-R (Compact Disc Recordable): The type of Compact Disc used to write once by the user; after that, it cannot
be modified or erased.
3. CD-RW (Compact Disc Rewritable): It is a rewritable CD disc, often used to write or delete the stored data.
DVD Drive/Disc
DVD is an optical disc storage device, stands for Digital Video Display or Digital Versatile Disc. It has the same
size as a CD but can store a larger amount of data than a compact disc. It was developed in 1995 by Sony,
Panasonic, Toshiba and Philips four electronics companies. DVD drives are divided into three types, such as DVD
ROM (Read Only Memory), DVD R (Recordable) and DVD RW (Rewritable or Erasable). It can store multiple data
formats like audio, videos, images, software, operating system, etc. The storing capacity of data in DVD is 4.7 GB
to 17 GB.

Blu Ray Disc (BD)


Blu Ray is an Optical disc storage device used to store a large amount of data or high definition of video
recording and playing other media files. It uses laser technology to read the stored data of the Blu-ray Disk. It
can store more data at a greater density as compared to CD/ DVD. For example, compact discs allow us to store
700 MB of data, and in DVDs, it provides up to 8 GB of storage capacity, while Blu-ray Discs provide 28 GB of
space to store data.
Pen Drive
A pen drive is a portable device used to permanently store data and is also known as a USB flash drive. It is
commonly used to store and transfer the data connected to a computer using a USB port. The storing capacity
of pen drives from 64 MB to 128 GB or more.
Cache Memory
It is a small-sized chip-based computer memory that lies between the CPU and the main memory. It is a faster,
high performance and temporary memory to enhance the performance of the CPU. It stores all the data and
instructions that are often used by computer CPUs. It also reduces the access time of data from the main
memory. It is faster than the main memory, and sometimes, it is also called CPU memory because it is very close
to the CPU chip. The following are the levels of cache memory.
Virtual memory
Virtual Memory is a storage allocation scheme in which secondary memory can be addressed as though it were
part of the main memory.

Software
Software is a Program commercially prepared and tested in software by one or a group of programmers and
system analyst to perform a specified task. Software is simply set of instructions that cause a computer to
perform one or more tasks. Software is also commonly called applications or programs.

Classification of software

Software can be broadly classified into system software and application software

System software
Software required to run the hardware parts of the computer and other application software are called system
software. System software acts as interface between hardware and user applications.
It Consists of programs that control operations of the computer and enable user to make efficient use of
computers.
system software is of four types −
 Operating System
 Language Processor
 Device Drivers

Language Processor
an important function of system software is to convert all user instructions into machine understandable
language.
Machine-level language − This language is nothing but a string of 0s and 1s that the machines can understand. It
is completely machine dependent.
 Assembly-level language − This language introduces a layer of abstraction by
defining mnemonics. Mnemonics are English like words or symbols used to denote a long string of 0s and 1s.
Assembly level language is machine dependent.
 High level language − This language uses English like statements and is completely independent of machines.
Programs written using high level languages are easy to create, read and understand.
Program written in high level programming languages like Java, C++, etc. is called source code.

Set of instructions in machine readable form is called object code or machine code. System software that
converts source code to object code is called language processor.
Device Drivers
System software that controls and monitors functioning of a specific device on computer is called device driver.
Each device like printer, scanner, microphone, speaker, etc. that needs to be attached externally to the system
has a specific driver associated with it. When you attach a new device, you need to install its driver so that the
OS knows how it needs to be managed.
(i) Operating system – is a complex program and most important program that runs on a computer and which
controls the operation of a computer. It perform basic tasks, such as recognizing input from the keyboard,
sending output to the display screen, keeping track of files and directories on the disk, and controlling peripheral
devices such as disk drives and printers. In general the operating system supervises and directs all the software
components and the hardware components. Examples of computers operating systems are UNIX, Microsoft
windows 95/98, Windows NT, Windows 2000, Windows XP, Windows Vista and Linux.

(ii)Service programs are programs designed for general support of the processes of a computer; "a computer
system provides utility programs to perform the tasks needed by most users". The service programs can further
be divided into;

o Development programs are used in the creation of new software. They comprise of sets of software tools to
allow programs to be written and tested. Knowledge of appropriate programming language is assumed. Tools
used here are

o Communication programs- refer to programs that make it possible to transmit data.

Utility software is also a type of a system software. Although not essential as the operating system, it helps in
analyzing the computer’s behavior, debugging errors, and optimizing its operation. Examples of utility software
are text editors, debuggers, antivirus programs, and file management programs (File Explorer, Finder, etc.)

Application software

Application software (or user application software) are all the programs that let users complete daily tasks. This
includes creating documents, playing games, listening to music, participating in online meetings, and sending
emails.
 The Office Suite (Word, PowerPoint, Excel, and Access) is Application software.

Booting Process
The booting process refers to the sequence of events that occur when a computer is powered on and loads the
operating system. Booting is the process of starting a computer and loading the operating system (OS) into the
computer's memory (RAM) from its permanent storage (e.g., hard disk or SSD).
Steps in the Booting Process
The booting process is generally divided into several stages:
1. Power-On Self-Test (POST)
 What Happens: When the power button is pressed, electricity flows into the computer, and the Power
Supply Unit (PSU) sends power to the motherboard.
 The BIOS (Basic Input/Output System) or UEFI (Unified Extensible Firmware Interface) firmware runs a
Power-On Self-Test (POST) to check the computer’s hardware components, such as the RAM,
processor, keyboard, and storage devices (HDD, SSD).
 If any issues are found, the system will produce beep codes or display an error message indicating the
problem
 Power on Self Test booting is a part of the booting cycle in a computer system. The POST is the very first
diagnostic routine that the installed hardware components undergo every time you power up your
computer to assure the presence and functionality of the devices.
 The POST tests the status of many hardware components, including the CPU, memory, storage devices,
and other peripherals.
 It watches for problems that may prevent booting. In case of a malfunction, the POST usually displays
some error message or beeps in a pattern that indicates where the problem lies. If it succeeds, the
computer starts loading the operating system and other necessary software for normal running.
2. Loading the Bootloader
 What Happens: After the POST is completed successfully, the system’s firmware (BIOS/UEFI) looks for
the bootloader, which is a small program responsible for loading the operating system.
 The BIOS/UEFI searches for a boot device, usually a hard disk, SSD, or external storage device (USB or
CD/DVD). It checks the boot order specified in the BIOS/UEFI settings.
 The bootloader is typically stored on the primary storage device (e.g., in the Master Boot Record or UEFI
partition).
The Bootstrap loader locates the kernel, loads it into main memory, and starts its execution. In some systems, a
simple bootstrap loader fetches a more complex boot program from disk, which in turn loads the kernel.
3. Initializing the Operating System
 What Happens: Once the bootloader is found and loaded into memory, it hands control over to the
operating system (OS). The OS then begins to load itself into RAM.
 The operating system kernel (the core part of the OS) is loaded first. The kernel initializes the system,
detects the hardware, and sets up necessary drivers to allow communication between the hardware
and software.
4. System Configuration and User Interface
 What Happens: After the kernel is loaded, the system starts the user interface (e.g., Windows, Linux
Desktop Environment) or presents the login screen.
 The operating system may load additional services and background processes that are required for the
proper functioning of the system. These include network connections, security processes, and other
essential system functions.
 At this point, users can log in and begin using the computer.
5. Post-Boot Activities
 What Happens: After the booting process is complete, the system is fully operational. The OS may run
background services, load system updates, or prompt the user to configure preferences or install
updates.
 The system is now ready for the user to interact with applications and execute tasks.
Boot Process in Different Operating Systems
 Windows Boot Process: Windows uses a boot manager that loads the Windows kernel into memory. It
then loads the necessary drivers and system files before displaying the login screen for user access.
 Linux Boot Process: Linux systems use the GRUB bootloader (Grand Unified Bootloader), which displays
a menu to choose the kernel version. The kernel is then loaded, followed by user-space programs.

Booting Process Steps


Step Description
Power-On Self-Test (POST) Checks hardware components and ensures they are functioning properly.
Bootloader Loads the operating system by finding and running the bootloader.
Loading the OS The operating system is loaded into memory, starting with the kernel.
System Configuration The OS initializes services and prepares the system for use.
User Interface The login screen or desktop environment appears for user interaction.

Types of Booting
There are two types of booting processes:
Cold Boot (Hard Boot): This is when the computer is powered off and turned back on. A cold boot involves the
entire boot process. In this procedure, the system undergoes a complete power-on self-test (POST) that
initializes hardware devices and loads operating systems from a storage medium into random-access memory
(RAM).
Warm Boot (Soft Boot): This occurs when the computer is restarted without switching the power off (e.g., when
you select “Restart” from the operating system). Warm reboots do skip some of the hardware initialization
processes that are done on cold booting since the hardware components have been on power and have been
initialized earlier.
Master Boot Record (MBR)
A piece that is very important in the boot process of a computer is called the Master Boot Record (MBR). This
thing is located at the very beginning on the hard disk, and it has critical details for starting up. It is composed by
division tables among other parts for different types of partitions used on disks with their respective filesystems
being identified here too. During system startup sequence or POST (Power On Self Test), following things occur:
 Firmware like BIOS (Basic Input Output System) /UEFI (Unified Extensible Firmware Interface) tries
looking for MBR from storage device used during boot up process (boot device) before running its
contents.
 Then, the bootloader is loaded by this code.
 And subsequently, the operating system is loaded by the bootloader.
 MBR is an essential cog in booting procedure wherein it starts off steps that culminate in the

Process of Booting
Dual Booting
When two operating systems are installed on a computer system, it is called dual booting. A boot loader that
understands multiple file systems and multiple operating systems can occupy the boot space. Once loaded, it
can boot one of the operating systems available on the disk. The disk can have multiple partitions, each
containing a different type of operating system. When a computer system turns on, a boot manager program
displays a menu, allowing the user to choose the operating system to use.

UEFI (Unified Extensible Firmware Interface): A modern version of BIOS with more features, such as
faster boot times and support for larger storage devices.
Bootloader: A program responsible for loading the operating system into memory after the POST.
Kernel: The core of the operating system that manages hardware resources and provides services for
other software.

BIOS
BIOS (Basic Input/Output System): The firmware that performs the POST and helps load the operating
system.
It is the program a computer's microprocessor uses to start the computer system after it is powered on. It also
manages data flow between the computer's operating system (OS) and attached devices, such as the hard disk,
video adapter, keyboard, mouse and printer.BIOS' popularity has waned in favor of a newer technology: Unified
Extensible Firmware Interface (UEFI). Intel announced a plan in 2017 to retire support for legacy BIOS systems
by 2020, replacing them with UEFI.
Uses of BIOS
The main use of BIOS is to act as a middleman between OSes and the hardware they run on. BIOS is theoretically
always the intermediary between the microprocessor and I/O device control information and data flow.
Although, in some cases, BIOS can arrange for data to flow directly to memory from devices, such as video cards,
that require faster data flow to be effective.
How does BIOS work
BIOS comes included with computers, as firmware on a chip on the motherboard .BIOS is a program that is
made accessible to the microprocessor on an erasable programmable read-only memory (EPROM) chip. When
users turn on their computer, the microprocessor passes control to the BIOS program, which is always located at
the same place on EPROM.
The 4 functions of BIOS
BIOS identifies, configures, tests and connects computer hardware to the OS immediately after a computer is
turned on. The combination of these steps is called the boot process.
These tasks are each carried out by BIOS' four main functions:
1. Power-on self-test (POST). This tests the hardware of the computer before loading the OS.
2. Bootstrap loader. This locates the OS.
3. Software/drivers. This locates the software and drivers that interface with the OS once running.
4. Complementary metal-oxide semiconductor (CMOS) setup. This is a configuration program that enable
users to alter hardware and system settings. CMOS is the name of BIOS' non-volatile memory.
Differences
There are several advantages of UEFI over BIOS as shown in the table below:
BIOS UEFI
Windows blue screen User-friendly graphical user interface
No Animation Multicolored with Animations
Can’t recognize Ethernet, Wi-Fi and Bluetooth Support Ethernet, Wi-Fi and Bluetooth connectivity
No remote diagnosis and repair support Support remote diagnosis and repair if the OS won’t boot.
No mouse support, keyboard only Keyboard and mouse support
No secure booting option Secure boot facility to stops loading malicious softwares.
Firmware program in 16-bit assembly language Firmware program in 64-bit C language
Supports 2.2 terabytes Supports drive sizes up to 9 zettabytes

Conventionally BIOS has three modes:


 Boot – Start the OS
 Setup – Configure the firmware
 Update – Update the firmware version
4. CMOS
The computer requires few settings such as the date, time, the boot sequence, and the custom settings for
devices and peripherals. These settings are retained in the CMOS chip and are volatile:
The CMOS chip is also referred to as RTC (real-time clock), NVRAM (non-volatile RAM), or CMOS RAM:
The CMOS chip requires a power supply from a CMOS battery to hold the custom settings. If the battery is
unplugged from the motherboard, the CMOS will reset the settings to the stored default settings in the BIOS
chip:
Here are some common symptoms that CMOS power supply from the battery is down:
 Date and time showing old date instead of current date and time
 Peripherals such as mouse and keyboard behaving strangely
 Drivers disappeared
 No internet connection
5. UEFI
Intel’s announcement that it won’t support traditional BIOS from 2020 led to the faster UEFI adoption by the
motherboard manufacturer. UEFI provides a lightweight operating system and interfaces the computer
hardware. UEFI is a virtual platform for running firmware programs:

Disk Formatting
Disk formatting is a process to configure the data-storage devices such as hard-drive, floppy disk and flash drive
when we are going to use them for the very first time or we can say initial usage. Disk formatting is usually
required when new operating system is going to be used by the user. It is also done when there is space issue
and we require additional space for the storage of more data in the drives. When we format the disk then the
existing files within the disk is also erased.
Disk formatting has also the capability to erase the bad applications and various sophisticated viruses.
Figure - Formatting process of disk
1. Low-level Formatting :
Low level formatting is a type of physical formatting. It is the process of marking of cylinders and tracks of the
blank hard-disk. After this there is the division of tracks into sectors with the sector markers. Now-a-days low-
level formatting is performed by the hard-disk manufactures themselves.
We have data in our hard-disk and when we perform low-level formatting in the presence of data in the hard-
disk all the data have been erased and it is impossible to recover that data.
2. High-level Formatting :
High-level formatting is the process of writing. Writing on a file system, cluster size, partition label, and so on for
a newly created partition or volume. It is done to erase the hard-disk and again installing the operating system
on the disk-drive.

Figure - Steps of High-level Formatting


Firstly High-level formatting clears the data on hard-disk, then it will generate boot information, then it will
initialise FAT after this it will go for label logical bad sectors when partition has existed.Formatting done by the
user is the high-level formatting.
drive format
Drive format refers to the process of preparing a storage device, such as a hard drive or universal serial bus
(USB) flash drive, to store and organize data. It involves creating a file system that determines how data is
stored, accessed, and managed on the drive.
it prepares the drive to be used with a specific operating system. it erases any existing data on the drive,
ensuring a clean slate for new files. formatting helps optimize the drive for better performance and reliability.
different types of drive formats
The most used drive formats are file allocation table 32 (FAT32), new technology file system (NTFS), and exFAT.
FAT32 is compatible with various operating systems but has limitations on file size and partition sizes. NTFS is
more robust and offers advanced features like file compression and encryption, primarily used in Windows
systems. exFAT, introduced by Microsoft, supports larger file sizes and is suitable for Windows.
Disk Partitioning
Disk partitioning is the process of dividing a physical disk drive into multiple logical storage units called
partitions, allowing a single hard disk to function as though it were one or more hard disks on the computer.

Partitioning is distinct from disk formatting; it is commonly applied on large disk media to change the
appearance of one large physical disk into several smaller logical disks.partitioning means divisions. Partitioning
is the process of dividing the hard-disk into one or more regions. The regions are called as partitions.
Creating multiple partitions on a storage device can improve access time for data and applications colocated on
the same partition, support the separation of user files and operating system files, provide dedicated operating
system swap or system paging file space, protect operating system files from the rapid growth of system data
files, support multibooting environments, provide a layer of isolation to protect one partition's system resources
from another, and allow the implementation of various file systems and different disk geometry strategies to
improve read and/or write performance.

formatting one partition as File Allocation Table 32 (FAT32) and another as New Technology File System (NTFS),
which allows the use of features unique to different file systems on the same computer.

Partitioning and formatting are required before a hard disk can be used; the manufacturer typically performs
low-level formatting to define the drive's geometry and divide the disk into tracks, sectors, and cylinders, while
high-level formatting prepares a logical drive for use by a specific operating system and sets up the file system
on the drive for that system.

Partitioning Schemes
Partitioning schemes include Master Boot Record (MBR) and GUID Partition Table (GPT). MBR disks store
partition information in the first sector of the disk, while GPT disks store partition information in the GPT header
and also maintain redundancy by writing the GPT header and partition table at the end of the disk.

GPT disks retain the MBR entry for compatibility. MBR disks have a wider range of compatibility, but GPT disks
support larger partition sizes. 6 When a new disk is added in Windows 7, users must choose between making it
an MBR or GPT disk.
The active partition is essential for the boot process, as the BIOS uses it to load the operating system
A file system
A file system is a structure used by an operating system to organise and manage files on a storage device such as
a hard drive, solid state drive (SSD), or USB flash drive. It defines how data is stored, accessed, and organised on
the storage device. Different file systems have varying characteristics and are often specific to certain operating
systems or devices. Here are some of the common file systems.
FAT (File Allocation Table), FAT16, FAT32
FAT is one of the oldest and simplest file systems. It was initially developed for MS-DOS and is still used in many
removable storage devices. The two major versions of this system are FAT16 and FAT32. FAT uses a file
allocation table to keep track of file locations on the disk. However, it lacks some advanced features like file
permissions and journaling, making it less suitable for modern operating systems. FAT 16 was introduces in 1987
with DOS 3.31 while FAT32 was introduced with Windows 95 OSR2(MS-DOS 7.1) in 1996.
exFAT (Extended File Allocation Table)
exFAT is a file system introduced by Microsoft as an improved version of FAT32. It addresses some of the
limitations of FAT32, allowing for larger file sizes and better performance. exFAT is commonly used for
removable storage devices, such as external SSDs, hard drives and SD cards as it provides compatibility across
multiple operating systems. It was first introduced in 2006 as part of Windows CE 6.0.
Disadvantages:
 Limited metadata support: exFAT lacks some advanced features found in other modern file systems. It
doesn’t support file-level security permissions, journaling, or file system-level encryption.
 Fragmentation: Like FAT file systems, exFAT is still susceptible to fragmentation. As files are created,
modified, and deleted, fragmentation can occur leading to decreased performance over time.
NTFS (New Technology File System)
NTFS is the default file system used by Windows NT-based operating systems, starting in 1993 with Windows NT
3.1, all the way up to and including Windows 11. It offers advanced features like file permissions, encryption,
compression, and journaling. NTFS supports large file and partition sizes, making it suitable for modern storage
devices. However, it has limited compatibility with non-Windows operating systems.
Bluetooth Technology
Bluetooth is a wireless communication technology standard designed for short-range data exchange between
devices. Operating on radio frequency (RF) within the 2.4 GHz ISM band, Bluetooth eliminates the need for
physical cables while maintaining secure and reliable connections.
Bluetooth is a short- range wireless technology standard that allows data participating up to 10 meters( 30 feet)
in utmost cases. It makes it possible for electrical devices to interact with one another wirelessly, including
tablets, computers, smartphones, headphones, and Internet of effects devices.
Key Features of Bluetooth:
 Short Range: Typically operates within 10 meters (33 feet), with some devices reaching up to 100
meters.
 Low Power Consumption: Ideal for portable and battery-operated devices.
 Secure Communication: Uses encryption and authentication to safeguard data.
 Versatile Applications: Supports audio streaming, file transfers, device control, and more.
How Does Bluetooth Work
Bluetooth technology uses low-power radio waves to transmit data between devices. Here’s a step-by-step
breakdown of its operation: Short-range wireless communication between electrical devices is made possible by
Bluetooth technology. This is a condensed description of how it functions:

1. Device Discovery
Bluetooth-enabled devices broadcast signals to find nearby compatible devices. This process is known as pairing.
2. Pairing and Authentication
Once discovered, devices exchange encryption keys to establish a secure connection. Users may need to confirm
a passcode for pairing. Prior to communicating, two Bluetooth- enabled devices need to be paired. The bias
exchange encryption keys to produce a secure connection during pairing.
3. Connection Establishment
After successful pairing, devices form a piconet — a small network where one device acts as the master, and
others function as slaves.
4. Data Transmission
Bluetooth transmits data using frequency hopping spread spectrum (FHSS), rapidly switching frequencies to
minimize interference and improve reliability.

Bluetooth Functions in Computer Networks


Bluetooth serves several critical functions in computer networks:
 Wireless Peripheral Connectivity: Enables keyboards, mice, and printers to connect without cables.
 Audio Communication: Powers wireless headsets, speakers, and conference systems.
 File Sharing: Facilitates quick transfer of files between devices.
 Networking: Creates personal area networks (PANs) for device communication.
 IoT Integration: Connects sensors and actuators in smart environments.
Applications of Bluetooth in Computer Networks
1. Consumer Electronics
Bluetooth connects smartphones, tablets, laptops, and peripherals for seamless user experiences.
2. Healthcare
Medical devices like glucose monitors and fitness trackers use Bluetooth for real-time data sharing with
healthcare systems.
3. Automotive
Bluetooth provides hands-free calling, audio streaming, and diagnostics in vehicles.
4. Industrial Automation
Industrial sensors and equipment use Bluetooth for monitoring and control in smart factories.
5. Smart Homes
Bluetooth Mesh networks enable interconnected lighting, security systems, and appliances.
Advantages of Bluetooth
1. Ease of Use: Simplifies device pairing and connectivity.
2. Cost-Effective: Offers a low-cost solution for wireless communication.
3. Energy Efficiency: Ensures prolonged battery life for connected devices.
4. Interoperability: Works across a broad range of devices and platforms.
5. Scalability: Supports diverse applications, from personal use to industrial environments.
Limitations of Bluetooth
1. Short Range: Limits usability in large spaces without additional devices.
2. Data Rate: Not suitable for high-bandwidth applications like video streaming.
3. Interference: Susceptible to interference from other wireless technologies.
4. Security Concerns: Vulnerable to attacks if not configured properly.

Wi-Fi
WiFi is a wireless technology that allows electronic devices to connect to the internet and communicate with
each other without a physical cable. This uses radio waves to transmit the data between a WiFi router and
compatible devices like smartphones, computers, and smart home gadgets. These WiFi networks are common in
homes, offices, and public spaces providing convenient internet access and local connectivity. This technology
has become an essential part of modern digital life enabling wireless internet browsing, file sharing, and device
communication in various settings.
Wireless Access Point
The WAP means a wireless access point is the networking device that allows WiFi-enabled devices to connect to
the wired network. It acts as the central hub broadcasting the Wi-Fi signal that devices can detect and join.
Access points are commonly used to extend the range of existing networks, create separate network segments,
or provide Wi-Fi connectivity in large spaces like offices, schools or public areas. They can be standalone devices
or integrated into a router and they enable multiple devices to access network resources and the internet
wirelessly within their coverage area.
Applications of Wi-Fi
 Using Wi-Fi we can access the internet in any Wi-Fi-capable device wirelessly. We can stream or cast
audio or video wirelessly on any device using Wi-Fi for our entertainment.
 We can share files, data, etc between two or more computers or mobile phones using Wi-Fi, and the
speed of the data transfer rate is also very high. Also, we can print any document using a Wi-Fi printer,
this is very much used nowadays.
 We can use Wi-Fi as HOTSPOTS also, it points Wireless Internet access for a particular range of area.
Using Hotspot the owner of the main network connection can offer temporary network access to Wi-Fi-
capable devices so that the users can use the network without knowing anything about the main
network connection.
 Also using W-Fi a whole city can provide network connectivity by deploying routers at a specific area to
access the internet. Already schools, colleges, and universities are providing networks using Wi-Fi
because of its flexibility. Wi-Fi is used as a positioning system also, by which we can detect the positions
of Wi-Fi hotspots to identify a device location.

How does a Wi-Fi work


Wi-Fi is a wireless technology for networking, so it uses Electromagnetic waves to transmit networks. We know
that there are many divisions of Electromagnetic waves according to their frequency such as X-ray, Gamma-ray,
radio wave, microwave, etc, in Wi-Fi, the radio frequency is used. For transmitting Wi-Fi signal there is three
medium,
 Base Station Network or an Ethernet(802.3) Connection: It is the main host network from where the
network connection is provided to the router.
 Access Point or Router: it is a bridge between a wired network and a wireless network. It accepts a
wired Ethernet connection and converts the wired connection to a wireless connection and spreads the
connection as a radio wave.
 Accessing Devices: It is our mobile, computer, etc from where we use the Wi-Fi and surfing internet.
Working of Wi-Fi
All the electronics devices read data in binary form, also router or our devices, here routers provide radio waves
and those waves are receive by our devices and read the waves in binary form. We know how a wave looks like
a upper pick of the wave is known as a 1 and the lower pick of the wave is known as the 0 in a binary as
mentioned below :
 SSID (Service Set Identifier): This 32 character name that identifies the Wi-Fi network and differentiates
the one Wi-Fi from a another Wi-Fi. All the devices are attempting to connect a particular SSID. A SSID is
the name of a wireless network.
 WPA-PSK (Wi-Fi Protected Access- Pre-Shared Key): The program developed by Wi-Fi Alliance Authority
to secure a wireless networks with a use of a Pre Shared Key authentication. The WPA has a 3 types such
as WPA, WPA2 and a WPA3. It is a way of encrypting a Wi-Fi signal to protect from a unwanted users.
 Wi-Fi uses Ad-Hoc networks to transmit. It is a point-to-point network without any interface.
Advantages of Wi-Fi
 The Wi-Fi allows easy cable-free connection to the internet from multiple devices. Users can access the
network from anywhere within a range enhancing mobility and flexibility.
 The Wi-Fi networks eliminate the need for extensive cabling, reducing installation and maintenance
costs. It is particularly beneficial for the businesses and a large spaces.
 The Wi-Fi networks can be easily expanded to a accommodate more devices. Adding new devices does
not require the additional infrastructure making it more scalable for the growing needs.
Disadvantages of Wi-Fi
 The WiFi networks are vulnerable to a hacking and unauthorized accesses if not secured. This can lead
to the data breaches and a privacy concerns for all the users.
 The Wi-Fi signals can be affected by the physical obstacles and a interference from other devices. This
can result in a slower speeds or dropped connections especially at a greater distances from the router.
 The Wi-Fi routers require a electricity to function. During the power outages the network becomes
inaccessible potentially disrupting the important communications or work.

Single-User/Single-Tasking OS
An operating system that allows a single user to perform only one task at a time is called a Single-User Single-
Tasking Operating System. Functions like printing a document, downloading images, etc., can be performed only
one at a time. Examples include MS-DOS, Palm OS, etc.
Advantages
 This operating system occupies less space in memory.
Disadvantages
 It can perform only a single task at a time.
Single-User/Multitasking OS
An operating system that allows a single user to perform more than one task at a time is called Single-User
Multitasking Operating System. Examples include Microsoft Windows and Macintosh OS.
Advantages
 It is time saving as it performs multiple tasks at a time yielding high productivity.
Disadvantages
 This operating system is highly complex and occupies more space.
Multiuser/Multitasking OS
It is an operating system that permits several users to utilize the programs that are concurrently running on a
single network server. The single network server is termed as "Terminal server". "Terminal client" is a software
that supports user sessions. Examples include UNIX, MVS, etc.
Advantages
 It is highly productive as it performs multiple tasks at a time.
 It is time saving as we dont have to make changes in many desktops, instead can make changes only to
the server.
Disadvantages
 If the connection to the server is broken, user cannot perform any task on the client as it is connected to
that server.
Embedded OS
An embedded operating system (OS) is an operating system designed to run on embedded systems, which are
specialized computer systems that are built into other devices or machines. Embedded systems are used in a
wide range of applications, such as automotive systems, medical devices, industrial control systems, and
consumer electronics. Here are some of the key features and components of an embedded operating system:

Structures of Directory in Operating System (DOS)


1. In DOS, the directory structure is often Windows-like. The C drive is a root directory written in the form
of a C:\
2. The directory is nested and is called a sub-directory.
3. It looks just like a tree, except the roots are at the end!!
4. The directory that hosts subdirectories is called the Parent directory. When listing directory content
using DIR, (..) it refers to the parent directory, so if we are at C:\WINDOWS\Desktop> (.) it refers to
Desktop and (..) refers to WINDOWS. A straight YES is the answer if you are wondering if the dots are
helpful. The dots are used to navigate or explore the directories.
5. If you want to switch to a WINDOWS directory and add a DIR command, you can only type CDs using the
Change Directory (CD command). For WINDOWS, go to the directory.
6. For the full list of commands and uses, go to the Use of Commands section. The CD command is very
helpful when we want to navigate through DOS. Type Desktop CD to go back to Desktop.
7. If we follow the tree structure with the directory C root at the top, type cd.. Once on the Desktop, you'll
go up one level. If you're really typing cd.. In the end, the top of the tree, the directory base, can be
entered. If you have mentioned cd.. After reaching the root directory, you will get:
8. C:\>cd.. Uh, C:
Invalid Directory
File Names on MS-DOS - important rules for naming the file in DOS
File names on MS-DOS are case-insensitive and are limited to eight characters, plus a time and three additional
characters as an option.
The rules for naming a DOS file are:
 The name of each file in the DOS operating system inside the directory where it is stored should be
special. This makes it easy to access this file in advance with a special path name in the file system.
 The file name should have a maximum length of 255 characters. The name of the file will include
numbers, letters and underscores.
 The Operating System is a sensitive case that displays a different meaning in the file names of upper and
lower case letters. Example RULES, rULes, rules These three file names, while present in the same
directory, are different file names.
 Avoid using those characters when naming files:
o Characters that should be avoided are / \ '*; -? [] ()! ~ $ { } &lt > # @ | &
o The space tab indicates a new copy of the line in MS-DOSS
 If the file name begins with a dot, the file name is secret (.)
GN120
MS-DOS Instructions

Directory Structure
Your home directory is H:\. This directory is the one you start with once you have logged in. This directory, as
with all directories, can contain files or more directories. A directory contained within another directory is called
a subdir ectory. A schematic of a directory structure is shown in Figure 1.

Figure 1. Schematic representation of a disk directory structure. Icons labeled as sub are subdirectories and
icons labeled as doc are documents. All documents and subdirectories are stored in the home directory in the
order displa yed. Note that any subdirectory can contain documents or another directory.
It is important to become familiar with the directory structure of any computer system. You will need to copy
files from your home directory to a floppy disk for backup. The floppy disk drive, A:\, is the 3.5" floppy in the PC
you are working on. Likewise, C:\ is the internal hard drive in the PC you are working on. Your home directory
H:\ is storage space allocated to you on a central disk storage system maintained by the System Administrator.
The H:\ storage is accessible from either the SUN's or the PC's. Regularly backup your important files on the A:\
drive.
Besides changing directories for the purpose of backup, there are other reasons to learn the directory structure.
Often you will end in a directory other than your home directory when exiting an application. For example,
when you exit from Windows, you will no longer be in your home directory. You will probably find yourself in C:\
WINDOWS. The C:\ part of this path indicates that your are now in a new main directory, C:\. To access files
stored in your home directory, you will need to change the dire ctory or specify a complete pathname for the
file.
Path's and Pathnames
DOS filenames can have eight (8) characters plus a three character extension. Example: NAME1234.EXT where
NAME1234 is the filename and EXT is the extension. A pathname ends with a file name. A path ends with a
directory or sub- directory name.
To switch between one directory and another, simply time the letter-colon combination for that directory . For
example, if you are currently in C:\WINDOWS, typing H: and a return will change your main directory to H:\ and
the prompt will now indicate H:\ >. If you type C: and return, you will switch back to the C:\WINDOWS sub-
directory. MS-DOS will remember your last active path in a given directory and will switch you to that path. To
change paths, see the CD command below.
Wildcards can be used to designate a group of files in a DOS command string. For example, the command DEL
*.TXT will delete all files that end with the .TXT extension. The two wildcards available are * and ?.
The * is a wildcard character that represents any group of characters. For example three files named
JOEPETE.TXT, JOEJOE.TXT, and JOEBOB.TXT can be represented as JOE*.TXT. Likewise, three files JOEPETE.TXT,
JOEJOE.XLS, and JOEBOB.DOC can be rep resented as JOE*.*. Any part of a pathname can be replaced by a
wildcard.
The ? is a wildcard character that replaces a single character in a file name. For example, the files JOE.TXT and
JOE.TXS could be represented as JOE.TX? in a DOS command string.
Commands
Note: Characters in {} braces are optional. Characters in [] brackets are not optional. Do not include either type
of brackets when entering commands.
CD
Changes from the current directory to a new directory.
Syntax: CD {dirname}
Comments: Typing CD alone simply tells you the name of the current directory. To change to a new directory, a
directory name must be specified. In the example given, the new directory is named dirname. CD will change to
the directory only if the direc tory is farther down the directory tree (i.e. dirname is a sub-directory). To change
to a directory that is at a higher level in the directory tree, specify the complete pathname which includes the
main directory, directory and all sub-directories leadin g to the final sub-directory. An example path might be
H:\classes\gn120\.
Alternatively, to change to a directory that is at a higher level in the directory tree, type CD.. (read: CD period
period ). This takes you back one directory level. Also, CD\ takes you to the root or main directory. For every
main directory, or disk drive, there is always an active path. You can specify the active path by entering CD
{path}. Then any commands, such as COPY, that have only a drive specified (Example COPY A:\FILE.TXT C:) will
use that default path. In the example given, if the path on C:\ had previously been set to C:\WINDOWS using the
command CD C:\WINDOWS, a copy of the file A:\FILE.TXT would now be found in C:\WINDOWS.
CLS
Clears the screen.
Syntax: CLS
COPY
Copies files to another disk.
Syntax: COPY [d:]pathname1 [d:]pathname2]
Comments: If both files are in the working directory, you need to replace pathnames with filenames.
DATE
Displays or sets date.
Syntax: DATE {mm-dd-yy}
Comments: Typing DATE with no optional parameters specified displays the date.
DEL
Deletes a file or files.
Syntax: DEL [d:]pathname1 {/p}
Comments: Adding /p causes DEL to ask if you want to delete each file. The wild cards * and ? can be used.
DIR
Lists the files in a directory.
Syntax: DIR [d:]pathname1 {/p}{/w}
Comments: Adding /p causes DIR to type the directory contents one page at a time and then pause. Adding /w
causes DIR to type the directory contents in a wide display format.
DISKCOPY
Copies the contents of one disk to another.
Syntax: DISKCOPY [d:1] [d:2]
FORMAT
Formats a floppy disk.
Syntax: FORMAT [d:]
Comments: Various parameters can be specified for this command to control the formatting process. If anything
other than a 1.4MB or 720K disk is used, consult a DOS manual for the proper parameters.
MD
Makes a new directory.
Syntax: MD [d:]pathname
Comments: Pathname can specify a directory to create in an existing directory. For example, if the directory
users exists, a pathname \users\pete creates a subdirectory pete in the directory users.
PRINT
Prints a text file.
Syntax: PRINT [d:]pathname
REN
Renames a file.
Syntax: REN [d:][path] filename_old filename_new
RD
Removes a directory.
Syntax: RD [d:][path]
TIME
Displays the time of day.
Syntax: TIME {hh:mm{:ss{.cc}}}
Comments: Typing TIME with no optional parameters specified displays the time. The characters hh represent
hours, mm represent minutes, ss represent seconds, and cc represent centiseconds.
TYPE
Displays a text file on the screen.
Syntax: TYPE [d:]filename
An Introduction to DOS FAT Volume and File Structure
Mark Kampe [email protected]
1. Introduction
When the first personal computers with disks became available, they were very small (a few megabytes of disk
and a few dozen kilobytes of memory). A file system implementation for such machines had to impose very little
overhead on disk space, and be small enough to fit in the BIOS ROM. BIOS stands for BASIC I/O Subsystem. Note
that the first word is all upper-case. The purpose of the BIOS ROM was to provide run-time support for a BASIC
interpreter (which is what Bill Gates did for a living before building DOS). DOS was never intended to provide the
features and performance of real timesharing systems.
Disk and memory size have increased in the last thirty years, People now demand state-of-the-art power and
functionality from their PCs. Despite the evolution that the last decades have seen, old standards die hard.
Much as European train tracks maintain the same wheel spacing used by Roman chariots, most modern OSs still
support DOS FAT file systems. DOS file systems are not merely around for legacy reasons. The ISO 9660 CDROM
file system format is a descendent of the DOS file system.
The DOS FAT file system is worth studying because:
 It is heavily used all over the world, and is the basis for more modern file system (like 9660).
 It provides reasonable performance (large transfers and well clustered allocation) with a very simple
implementation.
 It is a very successful example of "linked list" space allocation.
2. Structural Overview
All file systems include a few basic types of data structures:
 bootstrap
code to be loaded into memory and executed when the computer is powered on. MVS volumes reserve
the entire first track of the first cylinder for the boot strap.
 volume descriptors
information describing the size, type, and layout of the file system ... and in particular how to find the
other key meta-data descriptors.
 file descriptors
information that describes a file (ownership, protection, time of last update, etc.) and points where the
actual data is stored on the disk.
 free space descriptors
lists of blocks of (currently) unused space that can be allocated to files.
 file name descriptors
data structures that user-chosen names with each file.
DOS FAT file systems divide the volume into fixed-sized (physical) blocks, which are grouped into larger fixed-
sized (logical) block clusters.
The first block of DOS FAT volume contains the bootstrap, along with some volume description information.
After this comes a much longer File Allocation Table (FAT from which the file system takes its name). The File
Allocation Table is used, both as a free list, and to keep track of which blocks have been allocated to which files.
The remainder of the volume is data clusters, which can be allocated to files and directories. The first file on the
volume is the root directory, the top of the tree from which all other files and directories on the volume can be
reached.

3. Boot block BIOS Parameter Block and FDISK Table


Most file systems separate the first block (pure bootstrap code) from volume description information. DOS file
systems often combine these into a single block. The format varies between (partitioned) hard disks and
(unpartitioned) floppies, and between various releases of DOS and Windows ... but conceptually, the boot
record:
 begins with a branch instruction (to the start of the real boostrap code).
 followed by a volume description (BIOS Parameter Block)
 followed by the real bootstrap code
 followed by an optional disk partitioning table
 followed by a signature (for error checking).

3.1 BIOS Parameter Block


After the first few bytes of the bootstrap comes the BIOS parameter block, which contains a brief summary of
the device and file system. It describes the device geometry:
 number of bytes per (physical) sector
 number of sectors per track
 number of tracks per cylinder
 total number of sectors on the volume
It also describes the way the file system is layed out on the volume:
 number of sectors per (logical) cluster
 the number of reserved sectors (not part of file system)
 the number of Alternate File Allocation Tables
 the number of entries in the root directory
These parameters enable the OS to interpret the remainder of the file system.
3.2 FDISK Table
As disks got larger, the people at MicroSoft figured out that their customers might want to put multiple file
systems on each disk. This meant they needed some way of partitioning the disk into logical sub-disks. To do
this, they added a small partition table (sometimes called the FDISK table, because of the program that managed
it) to the end of the boot strap block.
This FDISK table has four entries, each capable of describing one disk partition. Each entry includes
 A partition type (e.g. Primary DOS partition, UNIX partition).
 An ACTIVE indication (is this the one we boot from).
 The disk address where that partition starts and ends.
 The number of sectors contained within that partition.
Partn Type Active Start (C:H:S) End (C:H:S) Start (logical) Size (sectors)
1 LINUX True 1:0:0 199:7:49 400 79,600
2 Windows NT 200:0:0 349:7:49 80,000 60,000
3 FAT 32 350:0:0 399:7:49 140,000 20,000
4 NONE
In older versions of DOS the starting/ending addresses were specified as cylinder/sector/head. As disks got
larger, this became less practical, and they moved to logical block numbers.
The addition of disk partitioning also changed the structure of the boot record. The first sector of a disk contains
the Master Boot Record (MBR) which includes the FDISK table, and a bootstrap that finds the active partition,
and reads in its first sector (Partition Boot Record). Most people (essentially everyone but Bill Gates :-) make
their MBR bootstrap ask what system you want to boot from, and boot the active one by default after a few
seconds. This gives you the opportunity to choose which OS you want to boot. Microsoft makes this decision for
you ... you want to boot Windows.
The structure of the Partition Boot Record is entirely operating system and file system specific ... but for DOS
FAT file system partitions, it includes a BIOS Parameter block as described above.
4. File Descriptors (directories)
In keeping with their desire for simplicity, DOS file systems combine both file description and file naming into a
single file descriptor (directory entries). A DOS directory is a file (of a special type) that contains a series of fixed
sized (32 byte) directory entries. Each entry describes a single file:
 an 11-byte name (8 characters of base name, plus a 3 character extension).
 a byte of attribute bits for the file, which include:
o Is this a file, or a sub-directory.
o Has this file changed since the last backup.
o Is this file hidden.
o Is this file read-only.
o Is this a system file.
o Does this entry describe a volume label.
 times and dates of creation and last modification, and date of last access.
 a pointer to the first logical block of the file. (This field is only 16 bits wide, and so when Microsoft
introduced the FAT32 file system, they had to put the high order bits in a different part of the directory
entry).
 the length (number of valid data bytes) in the file.
Name (8+3) Attributes Last Changed First Cluster Length
. DIR 08/01/03 11:15:00 61 2,048
.. DIR 06/20/03 08:10:24 1 4,096
MARK DIR 10/15/04 21:40:12 130 1,800
README.TXT FILE 11/02/04 04:27:36 410 31,280
If the first character of a files name is a NULL (0x00) the directory entry is unused. The special character (0xE5) in
the first character of a file name is used to indicate that a directory entry describes a deleted file. (See the
section on Garbage collection below)
Note on times and dates:
DOS stores file modification times and dates as a pair of 16-bit numbers:
 7 bits of year, 4 bits of month, 5 bits of day of month
 5 bits of hour, 6 bits of minute, 5 bits of seconds (x2).
All file systems use dates relative to some epoch (time zero). For DOS, the epoch is midnight, New Year's Eve,
January 1, 1980. A seven bit field for years means that the the DOS calendar only runs til 2107. Hopefully,
nobody will still be using DOS file systems by then :-)
5. Links and Free Space (File Allocation Table)
Many file systems have very compact (e.g. bitmap) free lists, but most of them use some per-file data structure
to keep track of which blocks are allocated to which file. The DOS File Allocation Table is a relatively unique
design. It contains one entry for each logical block in the volume. If a block is free, this is indicated by the FAT
entry. If a block is allocated to a file, the FAT entry gives the logical block number of the next logical block in the
file.
5.1 Cluster Size and Performance
Space is allocated to files, not in (physical) blocks, but in (logical) multi-block clusters. The number of clusters per
block is determined when the file system is created.
Allocating space to files in larger chunks improves I/O performance, by reducing the number of operations
required to read or write a file. This comes at the cost of higher internal fragmentation (since, on average, half
of the last cluster of each file is left unused). As disks have grown larger, people have become less concerned
about internal fragmentation losses, and cluster sizes have increased.
The maximum number of clusters a volume can support depends on the width of the FAT entries. In the earliest
FAT file systems (designed for use on floppies, and small hard drives). An 8-bit wide FAT entry would have been
too small (256 * 512 = 128K bytes) to describe even the smallest floppy, but a 16-bit wide FAT entry would have
been ludicrously large (8-16 Megabytes) ... so Microsoft compromised and adopted 12-bit wide FAT entries (two
entries in three bytes). These were called FAT-12 file systems. As disks got larger, they created 2-byte wide (FAT-
16) and 4-byte wide (FAT-32) file systems.
5.2 Next Block Pointers
A file's directory entry contains a pointer to the first cluster of that file. The File Allocation Table entry for that
cluster tells us the cluster number next cluster in the file. When we finally get to the last cluster of the file, its
FAT entry will contain a -1, indicating that there is no next block in the file.

The "next block" organization of the FAT means that in order to figure out what physical cluster is the third
logical block of ar file, must know the physical cluster number of the second logical block. This is not usually a
problem, because almost all file access is sequential (reading the first block, and then the second, and then the
third ...).
If we had to go to disk to re-read the FAT each time we needed to figure out the next block number, the file
system would perform very poorly. Fortunately, the FAT is so small (e.g. 512 bytes per megabyte of file system)
that the entire FAT can be kept in memory as long as a file system is in use. This means that successor block
numbers can be looked up without the need to do any additional disk I/O. It is easy to imagine
5.3 Free Space
The notion of "next block" is only meaningful for clusters that are allocated to a file ... which leaves us free to
use the FAT entries associated with free clusters as a free indication. Just as we reserved a value (-1) to mean
end of file we can rerserve another value (0) to mean this cluster is free.
To find a free cluster, one has but to search the FAT for an entry with the value -2. If we want to find a free
cluster near the clusters that are already allocated to the file, we can start our search with the FAT entry after
the entry for the first cluster in the file.
5.4 Garbage Collection
Older versions of FAT file systems did not bother to free blocks when a file was deleted. Rather, they merely
crossed out the first byte of the file name in the directory entry (with the reserved value 0xE5). This had the
advantage of greatly reducing the amount of I/O associated with file deletion ... but it meant that DOS file
systems regularly ran out of space.
When this happened, they would initiate garbage collection. Starting from the root directory, they would find
every "valid" entry. They would follow the chain of next block pointers to determine which clusters were
associated with each file, and recursively enumerate the contents of all sub-directories. After completing the
enumeration of all allocated clusters, they inferred that any cluster not found in some file was free, and marked
them as such in the File Allocation Table.
This "feature" was probably motivated by a combination of laziness and a desire for performance. It did,
however, have an advantage. Since clusters were not freed when files were deleted, they could not be
reallocated until after garbage colection was performed. This meant that it might be possible to recover the
contents of deleted files for quite a while. The opportunity this created was large enough to enable Peter
Norton to start a very successful company.
6. Descendents of the DOS file system
The DOS file system has evolved with time. Not only have wider (16- and 32-bit) FAT entries been used to
support larger disks, but other features have been added. The last stand-alone DOS product was DOS 6.x. After
this, all DOS support was under Windows, and along with the change to Windows came an enhanced version of
the FAT file system called Virtual FAT (or simply VFAT).
6.1 Long File Names
Most DOS and Windows systems were used for personal productivity, and their users didn't demand much in
the way of file system features. Their biggest complaints were about the 8+3 file names. Windows users
demanded longer and mixed-case file names.
The 32 byte directory entries didn't have enough room to hold longer names, and changing the format of DOS
directories would break hundreds or even thousands of applications. It wasn't merely a matter of importing files
from old systems to new systems. DOS diskettes are commonly used to carry files between various systems ...
which means that old systems still had to be able to read the new directories. They had to find a way to support
longer file names without making the new files unreadable by older systems.
The solution they came up was to put the extended filenames in additional (auxiliary) directory entries. Each file
would be described by an old-format directory entry, but supplementary directory entries (following the
primary directory entry) could provide extenstions to the file name. To keep older systems from being confused
by the new directory entries, they were tagged with a very unusual set of attributes (hidden, system, read-only,
volume label). Older systems would ignore new entries, but would still be able to access new files under their
8+3 names in the old-style directory entries. New systems would recognize the new directory entries, and be
able to access files by either the long or the short names.
The addition of long file names did create one problem for the old directory entries. What would you do if you
had two file names that differred only after the 8th character (e.g. datafileread.c and datafilewrite.c)? If we just
used the first 8 characters of the file name in the old directory entries (datafile), we would have two files with
the same name, and this is illegal. For this reason, the the short file names are not merely the first eight
characters of the long file names. Rather, the last two bytes of the short name were merely made unambiguous
(e.g. "~1", "~2", etc).
6.2 Alternate/back-up FATs
The File Allocation Table is a very concise way of keeping track of all of the next-block pointers in the file system.
If anything ever happened to the File Allocation Table, the results would be disastrous. The directory entries
would tell us where the first blocks of all files were, but we would have no way of figuring out where the
remainder of the data was.
Events that corrupt the File Allocation Table are extremely rare, but the consequences of such an incident are
catastrophic. To protect users from such eventualities, MicroSoft added support for alternate FATs. Periodically,
the primary FAT would be copied to one of the pre-reserved alternat FAT locations. Then if something bad
happened to the primary FAT, it would still be possible to read most files (files created before the copy) by using
the back-up FAT. This is an imperfect solution, as losing new files is bad ... but losing all files is worse.
6.3 ISO 9660
When CDs were proposed for digital storage, everyone recognized the importance of a single standard file
system format. Dueling formats would raise the cost of producing new products ... and this would be a lose for
everyone. To respond to this need, the International Standards Organization chartered a sub-committee to
propose such a standard.
The failings of the DOS file system were widely known by this time, but, as the most widely used file system on
the planet, the committee members could not ignore it. Upon examination, it became clear that the most
ideomatic features of the DOS file system (the File Allocation Table) were irrelevent to a CDROM file system
(which is written only once):
 We don't need to keep track of the free space on a CD ROM. We write each file contiguously, and the
next file goes immidiately after the last one.
 Because files can be written contiguously, we don't need any "next block" pointers. All we need to know
about a file is where its first block resides.
It was decided that ISO 9660 file systems would (like DOS file systems) have tree structured directory
hierarchies, and that (like DOS) each directory entry would describe a single file (rather than having some
auxiliary data structure like and I-node to do this). 9660 directory entries, like DOS directory entries, contain:
 file name (within the current directory)
 file type (e.g. file or directory)
 location of the file's first block
 number of bytes contained in the file
 time and date of creation
They did, however, learn from DOS's mistakes:
 Realizing that new information would be added to directory entries over time, they made them variable
length. Each directory entry begins with a length field (giving the number of bytes in this directory entry,
and thus the number of bytes until the next directory entry).
 Recognizing the need to support long file names, they also made the file name field in each entry a
variable length field.
 Recognizing that, over time, people would want to associate a wide range of attributes with files, they
also created a variable length extened attributes section after the file name. Much of this section has
been left unused, but they defined several new attributes for files:
o file owner
o owning group
o permissions
o creation, modification, effective, and expiration times
o record format, attributes, and length information
But, even though 9660 directory entries include much more information than DOS directory entries, it remains
that 9660 volumes resemble DOS file systems much more than they resemble any other file system format. And
so, the humble DOS file system is reborn in a new generation of products.
7. Summary
DOS file systems are very simple, They don't support multiple links to a file, or symbolic links, or even multi-user
access control. They are also and very economical in terms of the space they take up. Free block lists, and file
block pointers are combined into a single (quite compact) File Allocation Table. File descriptors are incorporated
into the directory entries. And for all of these limitations, they are probably the most widely used file system
format on the planet. Despite their primitiveness, DOS file systems were used as the basis for much newer CD
ROM file system designs.
What can we infer from this? That most users don't need alot of fancy features, and that the DOS file system
(primitive as it may be) covers their needs pretty well.
It is also noteworthy that when Microsoft was finally forced to change the file system format to get past the 8.3
upper case file name limitations, they chose to do so with a klugy (but upwards compatible) solution using
additional directory entries per file. The fact that they chose such an implementation clearly illustrates the
importance of maintaining media interchangability with older systems. This too is a problem that all (successful)
file systems will eventually face.
8. References
DOS file system information
 PC Guide's Overview of DOS FAT file systems. (this is a pointer to the long filename article ... but the
entire library is nothing short of excellent).
 Free BSD sources, PCFS implementation, BIOS Parameter block format, and (Open Solaris) FDISK table
format.
 Free BSD sources, PCFS implementation, Directory Entry format
9660 file system information
 WIkipedia Introduction to ISO 9660 file systems
 Free BSD sources, ISOFS implementation, ISO 9660 data structures.

Operating system
Every computer must have an operating system to run other programs. The operating system coordinates the
use of the hardware among the various system programs and application programs for various users. It simply
provides an environment within which other programs can do useful work.
The operating system is a set of special programs that run on a computer system that allows it to work properly.
It performs basic tasks such as recognizing input from the keyboard, keeping track of files and directories on the
disk, sending output to the display screen, and controlling peripheral devices.
Purposes and Tasks of Operating Systems
Several tasks are performed by the Operating Systems and it also helps in serving a lot of purposes which are
mentioned below. We will see how Operating System helps us in serving in a better way with the help of the
task performed by it.
Purposes of an Operating System
 It controls the allocation and use of the computing System’s resources among the various user and tasks.
 It provides an interface between the computer hardware and the programmer that simplifies and makes it
feasible for coding and debugging of application programs.
Characteristics of Operating Systems

 Device Management: The operating system keeps track of all the devices. So, it is also called the Input/Output
controller that decides which process gets the device, when, and for how much time.
 File Management: It allocates and de-allocates the resources and also decides who gets the resource.
 Job Accounting: It keeps track of time and resources used by various jobs or users.
 Error-detecting Aids: These contain methods that include the production of dumps, traces, error messages, and
other debugging and error-detecting methods.
 Memory Management: It keeps track of the primary memory, like what part of it is in use by whom, or what
part is not in use, etc. and It also allocates the memory when a process or program requests it.
 Processor Management: It allocates the processor to a process and then de-allocates the processor when it is
no longer required or the job is done.
 Control on System Performance: It records the delays between the request for a service and the system.
 Security: It prevents unauthorized access to programs and data using passwords or some kind of protection
technique.
 Convenience: An OS makes a computer more convenient to use.
 Efficiency: An OS allows the computer system resources to be used efficiently.
 Ability to Evolve: An OS should be constructed in such a way as to permit the effective development, testing,
and introduction of new system functions at the same time without interfering with service.
 Throughput: An OS should be constructed so that It can give maximum throughput (Number of tasks per unit
time).
Functionalities of Operating System
 Resource Management: When parallel accessing happens in the OS means when multiple users are accessing
the system the OS works as Resource Manager, Its responsibility is to provide hardware to the user. It decreases
the load in the system.
 Process Management: It includes various tasks like scheduling and termination of the process. It is done with
the help of CPU Scheduling algorithms.
 Storage Management: The file system mechanism used for the management of the storage. NIFS, CIFS, CFS,
NFS, etc. are some file systems. All the data is stored in various tracks of Hard disks that are all managed by the
storage manager. It included Hard Disk.
 Memory Management: Refers to the management of primary memory. The operating system has to keep track
of how much memory has been used and by whom. It has to decide which process needs memory space and
how much. OS also has to allocate and deallocate the memory space.
 Security/Privacy Management: Privacy is also provided by the Operating system using passwords so that
unauthorized applications can’t access programs or data. For example, Windows uses Kerberos authentication
to prevent unauthorized access to data.
The process operating system as User Interface:
1. User
2. System and application programs
3. Operating system
4. Hardware
Every general-purpose computer consists of hardware, an operating system(s), system programs, and
application programs. The hardware consists of memory, CPU, ALU, I/O devices, peripheral devices, and storage
devices. The system program consists of compilers, loaders, editors, OS, etc. The application program consists of
business programs and database programs.

Components of an Operating Systems


There are two basic components of an Operating System.
 Shell
 Kernel
Shell
Shell is the outermost layer of the Operating System and it handles the interaction with the user. The main task
of the Shell is the management of interaction between the User and OS. Shell provides better communication
with the user and the Operating System Shell does it by giving proper input to the user it also interprets input
for the OS and handles the output from the OS. It works as a way of communication between the User and the
OS.
Kernel
The kernel is one of the components of the Operating System which works as a core component. The rest of the
components depends on Kernel for the supply of the important services that are provided by the Operating
System. The kernel is the primary interface between the Operating system and Hardware.
Functions of Kernel
The following functions are to be performed by the Kernel.
 It helps in controlling the System Calls.
 It helps in I/O Management.
 It helps in the management of applications, memory, etc.

Difference Between 32-Bit and 64-Bit Operating Systems


32-Bit Operating System 64-Bit Operating System
32-Bit OS is required for running of 32-Bit Processors, as they 64-Bit Processors can run on any of the Operating
are not capable of running on 64-bit processors. Systems, like 32-Bit OS or 64-Bit OS.
64-Bit Operating System provides highly efficient
32-Bit OS gives a low efficient performance.
Performance.
Less amount of data is managed in 32-Bit Operating System as A large amount of data can be stored in 64-Bit
compared to 64-Bit Os. Operating System.
64-Bit Operating System can address 2^64 bytes
32-Bit Operating System can address 2^32 bytes of RAM.
of RAM.
Functions of Operating System
Some typical operating system functions may include managing memory, files, processes, I/O system & devices,
security, etc.
Below are the main functions of Operating System:
In an operating system software performs each of the function:
1. Process management: Process management helps OS to create and delete processes. It also provides
mechanisms for synchronization and communication among processes.
2. Memory management: Memory management module performs the task of allocation and de-allocation of
memory space to programs in need of this resources.
3. File management: It manages all the file-related activities such as organization storage, retrieval, naming,
sharing, and protection of files.
4. Device Management: Device management keeps tracks of all devices. This module also responsible for this task
is known as the I/O controller. It also performs the task of allocation and de-allocation of the devices.
5. I/O System Management: One of the main objects of any OS is to hide the peculiarities of that hardware
devices from the user.
6. Secondary-Storage Management: Systems have several levels of storage which includes primary storage,
secondary storage, and cache storage. Instructions and data must be stored in primary storage or cache so that
a running program can reference it.
7. Security: Security module protects the data and information of a computer system against malware threat and
authorized access.
8. Command interpretation: This module is interpreting commands given by the and acting system resources to
process that commands.
9. Networking: A distributed system is a group of processors which do not share memory, hardware devices, or a
clock. The processors communicate with one another through the network.
10. Job accounting: Keeping track of time & resource used by various job and users.
11. Communication management: Coordination and assignment of compilers, interpreters, and another software
resource of the various users of the computer systems.
Features of Operating System (OS)
Here is a list important features of OS:
 Protected and supervisor mode
 Allows disk access and file systems Device drivers Networking Security
 Program Execution
 Memory management Virtual Memory Multitasking
 Handling I/O operations
 Manipulation of the file system
 Error Detection and handling
 Resource allocation
 Information and Resource Protection
Advantage of Operating System
 Allows you to hide details of hardware by creating an abstraction
 Easy to use with a GUI
 Offers an environment in which a user may execute programs/applications
 The operating system must make sure that the computer system convenient to use
 Operating System acts as an intermediary among applications and the hardware components
 It provides the computer system resources with easy to use format
 Acts as an intermediator between all hardware’s and software’s of the system
Disadvantages of Operating System
 If any issue occurs in OS, you may lose all the contents which have been stored in your system
 Operating system’s software is quite expensive for small size organization which adds burden on them. Example
Windows
 It is never entirely secure as a threat can occur at any time

Types of Operating System (OS)


Following are the popular types of OS (Operating System):
 Batch Operating System
 Multitasking/Time Sharing OS
 Multiprocessing OS
 Real Time OS
 Distributed OS
 Network OS
 Mobile OS
Batch Operating System
Some computer processes are very lengthy and time-consuming. To speed the same process, a job with a similar
type of needs are batched together and run as a group.
The user of a batch operating system never directly interacts with the computer. In this type of OS, every user
prepares his or her job on an offline device like a punch card and submit it to the computer operator.
Multi-Tasking/Time-sharing Operating systems
Time-sharing operating system enables people located at a different terminal(shell) to use a single computer
system at the same time. The processor time (CPU) which is shared among multiple users is termed as time
sharing.
Real time OS
A real time operating system time interval to process and respond to inputs is very small. Examples: Military
Software Systems, Space Software Systems are the Real time OS example.
Distributed Operating System
Distributed systems use many processors located in different machines to provide very fast computation to its
users.
Network Operating System
Network Operating System runs on a server. It provides the capability to serve to manage data, user, groups,
security, application, and other networking functions.
Mobile OS
Mobile operating systems are those OS which is especially that are designed to power smartphones, tablets, and
wearables devices.
Some most famous mobile operating systems are Android and iOS, but others include BlackBerry, Web, and
watchOS.
1. Batch Operating System
This type of operating system does not interact with the computer directly. There is an operator which takes similar
jobs having the same requirement and groups them into batches. It is the responsibility of the operator to sort
jobs with similar needs.
Advantages of Batch Operating System
 It is very difficult to guess or know the time required for any job to complete. Processors of the batch systems
know how long the job would be when it is in the queue.
 Multiple users can share the batch systems.
 The idle time for the batch system is very less.
 It is easy to manage large work repeatedly in batch systems.
Disadvantages of Batch Operating System
 The computer operators should be well known with batch systems.
 Batch systems are hard to debug.
 It is sometimes costly.
 The other jobs will have to wait for an unknown time if any job fails.
Examples of Batch Operating Systems: Payroll Systems, Bank Statements, etc.
2. Multi-Programming Operating System
Multiprogramming Operating Systems can be simply illustrated as more than one program is present in the main
memory and any one of them can be kept in execution. This is basically used for better execution of resources.
Advantages of Multi-Programming Operating System
 Multi Programming increases the Throughput of the System.
 It helps in reducing the response time.
Disadvantages of Multi-Programming Operating System
 There is not any facility for user interaction of system resources with the system.
3. Multi-Processing Operating System
Multi-Processing Operating System is a type of Operating System in which more than one CPU is used for the
execution of resources. It betters the throughput of the System.
Advantages of Multi-Processing Operating System
 It increases the throughput of the system.
 As it has several processors, so, if one processor fails, we can proceed with another processor.
Disadvantages of Multi-Processing Operating System
 Due to the multiple CPU, it can be more complex and somehow difficult to understand.
4. Multi-Tasking Operating System
Multitasking Operating System is simply a multiprogramming Operating System with having facility of a Round-Robin
Scheduling Algorithm. It can run multiple programs simultaneously.
There are two types of Multi-Tasking Systems which are listed below.
 Preemptive Multi-Tasking
 Cooperative Multi-Tasking
Multitasking
Advantages of Multi-Tasking Operating System
 Multiple Programs can be executed simultaneously in Multi-Tasking Operating System.
 It comes with proper memory management.
Disadvantages of Multi-Tasking Operating System
 The system gets heated in case of heavy programs multiple times.
5. Time-Sharing Operating Systems
Each task is given some time to execute so that all the tasks work smoothly. Each user gets the time of the CPU as
they use a single system. These systems are also known as Multitasking Systems. The task can be from a single
user or different users also. The time that each task gets to execute is called quantum. After this time interval is
over OS switches over to the next task.
Time-Sharing OS
Advantages of Time-Sharing OS
 Each task gets an equal opportunity.
 Fewer chances of duplication of software.
 CPU idle time can be reduced.
 Resource Sharing: Time-sharing systems allow multiple users to share hardware resources such as the CPU,
memory, and peripherals, reducing the cost of hardware and increasing efficiency.
 Improved Productivity: Time-sharing allows users to work concurrently, thereby reducing the waiting time for
their turn to use the computer. This increased productivity translates to more work getting done in less time.
 Improved User Experience: Time-sharing provides an interactive environment that allows users to communicate
with the computer in real time, providing a better user experience than batch processing.
Disadvantages of Time-Sharing OS
 Reliability problem.
 One must have to take care of the security and integrity of user programs and data.
 Data communication problem.
 High Overhead: Time-sharing systems have a higher overhead than other operating systems due to the need for
scheduling, context switching, and other overheads that come with supporting multiple users.
 Complexity: Time-sharing systems are complex and require advanced software to manage multiple users
simultaneously. This complexity increases the chance of bugs and errors.
 Security Risks: With multiple users sharing resources, the risk of security breaches increases. Time-sharing
systems require careful management of user access, authentication, and authorization to ensure the security of
data and software.
Examples of Time-Sharing OS with explanation
 IBM VM/CMS: IBM VM/CMS is a time-sharing operating system that was first introduced in 1972. It is still in use
today, providing a virtual machine environment that allows multiple users to run their own instances of
operating systems and applications.
 TSO (Time Sharing Option): TSO is a time-sharing operating system that was first introduced in the 1960s by
IBM for the IBM System/360 mainframe computer. It allowed multiple users to access the same computer
simultaneously, running their own applications.
 Windows Terminal Services: Windows Terminal Services is a time-sharing operating system that allows multiple
users to access a Windows server remotely. Users can run their own applications and access shared resources,
such as printers and network storage, in real-time.
6. Distributed Operating System
These types of operating system is a recent advancement in the world of computer technology and are being widely
accepted all over the world and, that too, at a great pace. Various autonomous interconnected computers
communicate with each other using a shared communication network. Independent systems possess their own
memory unit and CPU. These are referred to as loosely coupled systems or distributed systems. These systems’
processors differ in size and function. The major benefit of working with these types of the operating system is
that it is always possible that one user can access the files or software which are not actually present on his
system but some other system connected within this network i.e., remote access is enabled within the devices
connected in that network.
Distributed OS
Advantages of Distributed Operating System
 Failure of one will not affect the other network communication, as all systems are independent of each other.
 Electronic mail increases the data exchange speed.
 Since resources are being shared, computation is highly fast and durable.
 Load on host computer reduces.
 These systems are easily scalable as many systems can be easily added to the network.
 Delay in data processing reduces.
Disadvantages of Distributed Operating System
 Failure of the main network will stop the entire communication.
 To establish distributed systems the language is used not well-defined yet.
 These types of systems are not readily available as they are very expensive. Not only that the underlying
software is highly complex and not understood well yet.
Examples of Distributed Operating Systems are LOCUS, etc.
7. Network Operating System
These systems run on a server and provide the capability to manage data, users, groups, security, applications, and
other networking functions. These types of operating systems allow shared access to files, printers, security,
applications, and other networking functions over a small private network. One more important aspect of
Network Operating Systems is that all the users are well aware of the underlying configuration, of all other users
within the network, their individual connections, etc. and that’s why these computers are popularly known as
tightly coupled systems.
Network Operating System
Advantages of Network Operating System
 Highly stable centralized servers.
 Security concerns are handled through servers.
 New technologies and hardware up-gradation are easily integrated into the system.
 Server access is possible remotely from different locations and types of systems.
Disadvantages of Network Operating System
 Servers are costly.
 User has to depend on a central location for most operations.
 Maintenance and updates are required regularly.
Examples of Network Operating Systems are Microsoft Windows Server 2003, Microsoft Windows Server 2008,
UNIX, Linux, Mac OS X, Novell NetWare, BSD, etc.
8. Real-Time Operating System
These types of OSs serve real-time systems. The time interval required to process and respond to inputs is very
small. This time interval is called response time.
Real-time systems are used when there are time requirements that are very strict like missile systems, air traffic
control systems, robots, etc.
Types of Real-Time Operating Systems
 Hard Real-Time Systems:
Hard Real-Time OSs are meant for applications where time constraints are very strict and even the shortest
possible delay is not acceptable. These systems are built for saving life like automatic parachutes or airbags
which are required to be readily available in case of an accident. Virtual memory is rarely found in these
systems.
 Soft Real-Time Systems:
These OSs are for applications where time-constraint is less strict.
Real-Time Operating System
Advantages of RTOS
 Maximum Consumption: Maximum utilization of devices and systems, thus more output from all the resources.
 Task Shifting: The time assigned for shifting tasks in these systems is very less. For example, in older systems, it
takes about 10 microseconds in shifting from one task to another, and in the latest systems, it takes 3
microseconds.
 Focus on Application: Focus on running applications and less importance on applications that are in the queue.
 Real-time operating system in the embedded system: Since the size of programs is small, RTOS can also be used
in embedded systems like in transport and others.
 Error Free: These types of systems are error-free.
 Memory Allocation: Memory allocation is best managed in these types of systems.
Disadvantages of RTOS
 Limited Tasks: Very few tasks run at the same time and their concentration is very less on a few applications to
avoid errors.
 Use heavy system resources: Sometimes the system resources are not so good and they are expensive as well.
 Complex Algorithms: The algorithms are very complex and difficult for the designer to write on.
 Device driver and interrupt signals: It needs specific device drivers and interrupts signal to respond earliest to
interrupts.
 Thread Priority: It is not good to set thread priority as these systems are very less prone to switching tasks.
Examples of Real-Time Operating Systems are Scientific experiments, medical imaging systems, industrial control
systems, weapon systems, robots, air traffic control systems, etc.
 The kernel is the core inner component that processes data at the hardware level. It handles input-output
management, memory and process management.
 The shell is the outer layer that manages the interaction between the user and the OS. The shell communicates
with the operating system by either taking the input from the user or a shell script. A shell script is a sequence of
system commands that are stored in a file.
Operating system functions
Basic functions of an operating system include:
 Booting: An operating system manages the startup of a device.
 Memory management: An operating system coordinates computer applications and allocates space to different
programs installed in the computer.
 Data security: An operating system protects your data from cyberattacks.
 Loading and execution: An operating system starts and executes a program.
 Drive/disk management: An operating system manages computer drives and divides disks.
 Device control: An operating system enables you to allow or block access to devices.
 User interface: This part of an operating system, also known as UI, allows users to enter and receive
information.
 Process management: The operating system allocates space to enable computer processes, such as storing and
sharing information.
6. Mobile OS
Mobile operating systems such as Android OS, Apple and Windows mobile OS run exclusively on small devices such
as smartphones, tablets and wearables. The system combines the features of a personal computer with
additional features useful for a handheld device.
Mobile operating systems start when a device is powered on to provide access to installed applications. Mobile
operating systems also manage wireless network connectivity. Potential advantages and disadvantages of
mobile operating systems are:
Advantages Disadvantages
Most systems are easy for users to learn and
Some mobile OS put a heavy drain on a device’s battery, requiring
operate. frequent recharging.
Some systems are not user-friendly.
Get personalized salary insights with the Indeed Salary Calculator
Common operating systems
Here are the most common operating systems in use:
Microsoft Windows
Created by Microsoft, Microsoft Windows is one of the most popular proprietary operating systems for computers
in the world. Most personal computers come preloaded with a version of Microsoft Windows. One downside of
Windows is that compatibility with mobile phones has been problematic.
Apple iOS
Apple iOS from Apple is used on smartphones and tablets manufactured by the same company. Users of this system
have access to hundreds of applications. The operating system offers strong encryption capabilities to control
unauthorized access to users' private data.
Google Android
Android from Google is the most popular operating system in the world. It's mainly used on tablets and
smartphones. It also runs on devices made by other manufacturers. Users have access to numerous mobile
applications available on the Google Play Store.
Apple macOS
Developed by Apple, this proprietary operating system runs on the manufacturer's personal computers and
desktops. All Apple and Macintosh computers come equipped with the latest version of macOS, previously
known as OS X systems. The ability to prevent bugs and fend off hackers make Apple operating systems popular
with their users.
Linux
Created by the Finnish programmer Linus Torvalds, Linux is today developed by programmer collaborators across
the world who submit tweaks to the central kernel software. Linux is popular with programmers and corporate
servers. It is available for free online.

Client/server network OS
Client/server network operating systems are those networks that contain two types of nodes, the servers, and
clients. The servers host the applications or services for users while clients use these applications. In a
client/server system, both the server and client computers must have certain software installed to connect to
each other securely over a network connection.
Client-server networks are a type of computer network in which two or more computer systems are linked through
a telecommunications network. Clients are the computers that use the network to access services provided by
the server. Servers are the computers that provide the services to the network. Client/server networks are
commonly used in business and government applications.
Advantages
 Allows companies to scale their computing resources to handle increased demand without having to buy new
hardware.
 Client-server systems can be quickly reconfigured to meet the changing needs of an organization.
 They are also more reliable and easier to maintain than dedicated server systems.
 Lower operating cost.
 More reliable and easier to maintain than dedicated server systems
Disadvantages
 These OS need more sophisticated management and networking technologies, longer startup times, and
increased vulnerability to attack.
 Less secure than dedicated server systems.
 More challenging to scale than dedicated server systems.

Features of Operating System


An operating system (OS) was developed in the late 1950s, for the first time, to organize tape storage. OS started
to utilize disks in the mid-1960s. The first version of the Unix OS was developed in the late 1960s. Microsoft
created its first OS named DOS. In 1985, the common OS used today named Windows first came into existence
when a GUI (Graphical User Interface) was built and linked with MS-DOS. There are several features of OS as
mentioned below.
1. Facilitating the protected and supervisor mode of the computer system.
2. Allowing for disk access and file systems to enable networking security of device drivers.
3. Enabling the program execution system.
4. It has a memory management facility and virtual memory multitasking system.
5. Handling Input output operations of the computer system.
6. Manipulate the file systems in the computer.
7. Handling and detecting errors if found in the computer.
8. Allocating the resources and computer data.
9. Enabling information and resource protection in the computer system.

You might also like