The Essentials of Computer Organization and Architecture
The Essentials of Computer Organization and Architecture
4th Edition
ISBN: 9781284045611
Author: Linda Null, Julia Lobur
Publisher: Jones & Bartlett Learning
Question
Book Icon
Chapter 8, Problem 1RETC
Program Plan Intro

Operating System:

A program that is initially loaded into the computer memory and manages all the other programs and resources of a computer is called Operating system.

  • The operating system manages the applications and the hardware, such as disk drive, memory, and peripheral devices.
  • The users interact with the operating system by using the command language or shell, and the graphical user interface.
  • An application makes the service request by the application programming interface to use the operating system.
  • Operating system performs different type of services
    • Determining the running application and its order
    • Time allotment to each application

Expert Solution & Answer
Check Mark

Explanation of Solution

Main objective of early operating systems:

  • In early days, computer system has no Operating system at all, and is characterized as serial processing. By using a serial processing technique the programs are executed.
  • Earlier, the cost of computer systems were high and because of that computer time was used efficiently without any wastage of time.
  • The time slots are reserved by the users in advance, and during the allotted period, they occupy the computer exclusively.
  • A card is used to represent the program and with the help of card readers, the programs are loaded into memory.
  • Before loading the program, the user has to load the compiler to compile the program. The user has to find errors if any and should re-punch all cards from beginning.
  • In given time, if the user failed to complete the task, then the user has to wait for long time to execute again. This was a waste of time for the user.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
I would like help to resolve the following case, thank you
I need help with the following case
Q2) by using SHI-Tomasi detector method under the constraints shown in fig. 1 below find the corner that is usful to use in video-steganography? 10.8 ...... V...... 0.7 286 720 ke Fig.1 Threshold graph. The plain test is :Hello Ahmed the key is: 3a 2x5 5b 7c 1J 55 44 2X3 [ ] 2x3
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education