a. The creation and deletion the both user and system processesb. The suspension and resumption of processesc. The supplication of instrument for process synchronizationd. The delivery of mechanisms for procedure communicatione. The provision of mechanisms for deadlock handling
a. Save track of which components of storage are at this time being used and also by whom.b. Decision which procedures are to be loaded into memory as soon as memory an are becomes available.c. Allocate and de-allocate memory room as needed.

You are watching: What are the five major activities of an operating system with regard to file management?

What space the three significant activities of an operating device in regard come secondary-storage management?
The creation and deletion that files• The creation and also deletion of directories• The support of primitives because that manipulating files and directories• The mapping of records onto secondary storage• The back-up of papers on stable (nonvolatile) storage media
It reads regulates from the user or indigenous a record of commandsand executes them, commonly by transforming them into one or much more system calls. The is typically not part of the kernel because the command interpreter is topic to changes.
List five services provided by an operating system. Explain how each provides convenience come the users. Explain additionally in which cases it would be difficult for user-level program to administer these services.
a. Routine execution. The operation system lots the components (or sections) that a record into memory and begins that execution. A user level program could not be trusted to properly allocate CPU time.b. I/O operations. Disks, tapes, serial lines, and also other gadgets must be communicated with at a an extremely low level. The user require only point out the device and the operation to execute on it, while the mechanism converts that request into device- or controller-specific commands. User-level programs cannot be reliable to access only devices they should have access to and to access them only when they space otherwise unused.c. File-systemmanipulation. There aremany details in record creation, deletion, allocation, and also naming that users have to not need to perform. Blocks of disk space are supplied by files and also must it is in tracked. Deleting a file requires remove the name record information and releasing the allocated blocks. Protections must likewise be confirm to assure proper record access. User programs could neither ensure follow to protection techniques nor be reliable to clues only free blocks and also deallocate blocks on document deletion.d. Communications. Post passing in between systems calls for messages to it is in turned into packets of information, sent to the network controller, sent throughout a communications medium, and reassembled by the destination system. Packet ordering and also data correction have to take place. Again, user programs might not coordinate accessibility to the network device, or they might receive packets destined for various other processes.e. Error detection. Error detection wake up at both the hardware and also software levels. In ~ the hardware level, all data transfers need to be inspected come ensure that data have actually not to be corrupted in transit. Every data ~ above media have to be checked to be certain they have not changed since castle were created to the media. At the software application level, media have to be confirm for data consistency; because that instance, whether the variety of allocated and also unallocated blocks of storage match the total number on the device. There, errors are frequently process-independent (for instance, the corruption of data on a disk), so there need to be a worldwide program (the operating system) the handles all types of errors. Also, by having actually errors processed by the operating system, processes require not contain password to catchand correct all the errors possible on a system.
What is the purpose of device calls?
System calls allow user-level procedures to request solutions of the operating system.
What is the objective of device programs?
System programs can be assumed of as bundles the usefulsystem calls. Lock provide simple functionality to users so the users carry out not must write their own programs to solve usual problems.
As in all cases of modular design, creating an operatingsystem in a modular method has several advantages. The system is easier to debug and modify since changes impact only minimal sections the the device rather than touching all sections of the operating system. Details is kept only where the is needed and is easily accessible only within a characterized and minimal area, so any bugs affecting that data should belimited come a specific module or layer.
(a) adding a new service does no require editing the kernel,(b) that is much more secure as more operations room done in user setting than in kernel mode,and(c) a simpler kernel design and functionality typically results in a an ext reliableoperating system.
What is the main benefit for an operating-system designer of using a virtual-machine architecture? What is the main benefit for a user?
The basic goal that a virtual maker architecture is come share the same hardware yet operation several different execution environments. Accordingly, from the perspective of an operating device designer, a virtual maker architecture allows a complete protection the the various mechanism resources as each virtual maker is totally isolated native all other virtual machines. From the view of a user, a virtual maker architecture enables the concurrent execution of multiple execution atmospheres on a solitary machine.
The speculative Synthesis operation system has an assembler included within the kernel. To optimize system-call performance, the kernel assembles routines within kernel an are to minimization the course that the system call must take v the kernel. This method is the antithesis that the layered approach, in which the route through the kernel is extended so that building the operating device is do easier. Talk about the pros and also cons the the Synthesis strategy to kernel design and to device performance optimization.

See more: What Is 80 Celsius In Fahrenheit In Celsius? Convert 80 Celsius To Fahrenheit

Synthesis is impressive as result of the performance it achievesthrough on-the-fly compilation. Unfortunately, that is complicated to debug troubles within the kernel as result of the fluidity that the code. Also, together compilation is system specific, making Synthesis an overwhelming to harbor (a brand-new compiler should be written for every architecture).


Introduction to Algorithms3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, cutting board H. Cormen


Computer Organization and also Design MIPS Edition: The Hardware/Software Interface5th EditionDavid A. Patterson, john L. Hennessy
window.ptcouncil.net<"productClickLinkData"> = <"name":"Chapter 2 operation Systems","id":"163905738","price":"","category":"premium content","variant":"study guide","position":"","brand":"benjamin_dixon58">; QLoad("ptcouncil.net.productClickLinkData"); return;})}elsewindow.ptcouncil.net<"productClickLinkData"> = <"name":"Chapter 2 operation Systems","id":"163905738","price":"","category":"premium content","variant":"study guide","position":"","brand":"benjamin_dixon58">; QLoad("ptcouncil.net.productClickLinkData"); return;;window.location.assign("https://ptcouncil.net/163905738/chapter-2-operating-systems-flash-cards/");" id="1-163905738">
Chapter 2 operation Systems
9 terms
window.ptcouncil.net<"productClickLinkData"> = <"name":"Chapter 4 operating Systems","id":"163908224","price":"","category":"premium content","variant":"study guide","position":"","brand":"benjamin_dixon58">; QLoad("ptcouncil.net.productClickLinkData"); return;})}elsewindow.ptcouncil.net<"productClickLinkData"> = <"name":"Chapter 4 operation Systems","id":"163908224","price":"","category":"premium content","variant":"study guide","position":"","brand":"benjamin_dixon58">; QLoad("ptcouncil.net.productClickLinkData"); return;;window.location.assign("https://ptcouncil.net/163908224/chapter-4-operating-systems-flash-cards/");" id="1-163908224">
Chapter 4 operating Systems
4 terms
window.ptcouncil.net<"productClickLinkData"> = <"name":"Chapter 6 operating Systems","id":"163908744","price":"","category":"premium content","variant":"study guide","position":"","brand":"benjamin_dixon58">; QLoad("ptcouncil.net.productClickLinkData"); return;})}elsewindow.ptcouncil.net<"productClickLinkData"> = <"name":"Chapter 6 operating Systems","id":"163908744","price":"","category":"premium content","variant":"study guide","position":"","brand":"benjamin_dixon58">; QLoad("ptcouncil.net.productClickLinkData"); return;;window.location.assign("https://ptcouncil.net/163908744/chapter-6-operating-systems-flash-cards/");" id="1-163908744">
Chapter 6 operating Systems
17 terms
window.ptcouncil.net<"productClickLinkData"> = <"name":"Chapter 1 operation Systems","id":"163902347","price":"","category":"premium content","variant":"study guide","position":"","brand":"benjamin_dixon58">; QLoad("ptcouncil.net.productClickLinkData"); return;})}elsewindow.ptcouncil.net<"productClickLinkData"> = <"name":"Chapter 1 operating Systems","id":"163902347","price":"","category":"premium content","variant":"study guide","position":"","brand":"benjamin_dixon58">; QLoad("ptcouncil.net.productClickLinkData"); return;;window.location.assign("https://ptcouncil.net/163902347/chapter-1-operating-systems-flash-cards/");" id="1-163902347">