Explain the key management tasks carried out by the Operating System

5.1 Operating Systems – Key Management Tasks

1️⃣ Process Management

The OS is like a traffic controller for all the programs (processes) running on a computer. It decides who gets to use the CPU, when, and for how long.

  • Creation & Termination – Starting a new process (e.g., opening a game) and ending it when finished.
  • Scheduling – Choosing which process runs next. Think of it as a queue at a cafeteria where the OS gives each process a turn.
  • Context Switching – Storing a process’s state and restoring another’s. It’s like switching between different phone apps without losing your place.
  • Synchronization & Deadlock Avoidance – Preventing processes from stepping on each other’s toes.

2️⃣ Memory Management

The OS acts as a smart librarian for the computer’s memory. It keeps track of who owns which memory blocks and ensures no one borrows too much.

  1. Allocation – Assigning memory to processes (e.g., a game needs 512 MB).
  2. Deallocation – Releasing memory when a process ends.
  3. Virtual Memory – Using hard‑disk space as an extension of RAM. Imagine borrowing a book from the library’s reserve shelf.
  4. Paging & Segmentation – Dividing memory into fixed or variable-sized chunks.

3️⃣ Device Management

Devices (printers, keyboards, Wi‑Fi cards) are like remote-controlled toys. The OS sends commands and interprets responses.

  • Device Drivers – Software that knows how to talk to each device.
  • Input/Output (I/O) Scheduling – Deciding the order of device requests.
  • Interrupt Handling – Responding instantly when a device signals it’s ready.

4️⃣ File System Management

The OS is the file manager of the whole computer. It organizes files into folders, keeps track of where data lives, and controls who can read or write.

File Size Permissions
/home/user/notes.txt 12 KB rw‑‑
/etc/passwd 4 KB r‑‑

5️⃣ Security & Protection

Think of the OS as a security guard at a school. It checks IDs, keeps intruders out, and ensures everyone follows the rules.

  • Authentication – Verifying who you are (username/password).
  • Authorization – Determining what you can do (read, write, execute).
  • Encryption – Scrambling data so only authorized users can read it.
  • Audit Trails – Logging actions for later review.

6️⃣ CPU Utilisation – A Quick Math Example

The CPU utilisation tells us how busy the processor is. It’s calculated as:

$U = \dfrac{\sum_{i=1}^{n} C_i}{T} \times 100\%$

Where $C_i$ is the CPU time for process $i$ and $T$ is the total time considered. If $U$ is high, the CPU is busy; if it’s low, the CPU is idle.

📌 Summary

The Operating System is the brain that manages processes, memory, devices, files, and security. It ensures everything runs smoothly, just like a well‑organized classroom where everyone knows their role and follows the rules. 🚀

Revision

Log in to practice.

1 views 0 suggestions