Check out my Blogs!

OSI Model

According to GeeksforGeeks, OSI Model or Operating Systems Interconnection is a 7 layer architecture with each layer having specific functionality to perform. It is developed by the International Organization of Standardization in 1984. All these layers work with each other to transport data from one point to another across the globe. The 7 layers are:…

Cryptography

Searchsecurity.techtarget defines cryptography as a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it. The prefix “crypt-” means “hidden” or “vault” — and the suffix “-graphy” stands for “writing.” Sir Josh Fruhlinger of CSO also defines it as…

Malware and Friends

For today’s blog, we will discuss several threats to the security of your computer. I will introduce you to Malware. Short  As Microsoft puts it, “[malware] is a catch-all term to refer to any software designed to cause damage to a single computer, server, or computer network.” In short, any software that is made to harm…

Memory Mapped Files

A post from stackoverflow states that, memory mapped file is generally a file in the file system, which has been mapped by the operating system to some range of bytes in memory of a process. When the process writes to the memory of the process, the operating system takes care that the bytes are written…

Different Structures of the Directory in the Operating System

According to GeeksforGeeks, there are several logical structures of a directory, these are given below. Single-level directory –Single level directory is simplest directory structure. In it all files are contained in same directory which make it easy to support and understand. A single level directory has a significant limitation, however, when the number of files…

File Access Methods in Operating System

When a file is used, information is read and accessed into computer memory. There are many ways to access this information of the file.  Sequential Access – It is the simplest access method. Information in the file is processed in order, one record after the other. This mode of access is by far the most common;…

Static & Dynamic Loading | Static & Dynamic Linking

The website prepinsta.com differentiates static loading and dynamic loading in the table bellow: Static Loading Dynamic Loading The complete program is linked and complied without dependency of an external program. All the modules are loaded dynamically. The developer provides a reference to all of them and the rest of the work is done at execution…

Logical and Physical address space.

Hey guys! Lets continue the topic by delving into the logical and physical address space in the Operating System. Logical address space, also known as virtual address is generated by the CPU while the program is running. It is used as a reference to access the physical memory location by CPU. Physical address space is…

CPU Scheduling Criteria

Hey guys, lets continue our topic on CPU Scheduling. This time let us know the CPU scheduling criteria. According to StudyTonight’s post on CPU Scheduling in OS, the different CPU scheduling criteria are: CPU Utilization To make out the best use of CPU and not to waste any CPU cycle, CPU would be working most…

Preemptive vs. Non-Preemptive

I talked about CPU scheduling and CPU and I/O burst cycle in my last blog. Now, I will talk about Pre-emptive and Non Pre-emptive CPU scheduling. According to Guru99’s post about CPU Scheduling Algorithms in Operating System, Preemptive Scheduling In Preemptive Scheduling, the tasks are mostly assigned with their priorities. Sometimes it is important to…

Loading…

Something went wrong. Please refresh the page and/or try again.


Follow My Blog

Get new content delivered directly to your inbox.

Design a site like this with WordPress.com
Get started