Question

Operating System! Please provides the answer for the following Question? How does the OS have direct...

Operating System! Please provides the answer for the following Question?

  1. How does the OS have direct privilege access to system software ?

  2. Why do we need only the OS to have direct privilege access to system software?

  3. How does the OS ensure the applications are isolated and protected from one and another?

  4. How does the OS have direct privilege access over computer hardware?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

How does the OS have direct privilege access to system software ?

ans: An operating system is a program that controls the execution of application programs and acts as an interface between the user of a computer and the computer hardware.

Firstly, your computer's operating system coordinates the demands that the computer's software makes on its hardware, especially the central processing unit. Each piece of software running on your computer ideally would like to have the undivided attention of its hardware. It's the operating system's job to make sure that each application gets its fair share of your computer's finite resources in the most efficient way possible.

Second, the operating system provides a consistent set of rules for applications to use in order to be able to interface with your computer's hardware. The system's application program interface lets developers create software that will run on computers of the same type even if the hardware is different or open to change.
Software applications feed the CPU the instructions it needs to process data. These instructions take the form of computer code. Every software application, no matter what its type or manufacture, needs to interact with the CPU. For programs to work with the CPU, they must contain code that the CPU recognizes. Rather than having the same blocks of code for similar procedures in each software application, the operating system includes the blocks of code that software applications need to interact with it.

Why do we need only the OS to have direct privilege access to system software?

Because an operating system must hide the computer's hardware, and manage the hardware resources, it needs to prevent the application software from accessing the hardware directly. Without this sort of protection, the operating system would not be able to do its job.

The operating system must shield the details of the hardware from the application programs, and thus from the user.

The operating system has to substitute a set of abstract services to the application programs, to replace the physical hardware services. When applications use these abstract services, the operations must be translated into real hardware operations.

Finally, the resources in a computer (CPU, memory, disk space) are limited. The operating system must act as a resource manager, optimising the use of the resources, and protecting them against misuse and abuse. When a system provides multiuser or multitasking capabilities, resources must be allocated fairly and equitably amongst a number of competing requests. w

How does the OS ensure the applications are isolated and protected from one and another?

Virtual machines are the containers in which applications and guest operating systems run. By design, all VMware virtual machines are isolated from one another. This isolation enables multiple virtual machines to run securely while sharing hardware and ensures both their ability to access hardware and their uninterrupted performance.

How does the OS have direct privilege access over computer hardware?

The operating system coordinates the use of the hardware among the various system programs and application programs for a various users. It simply provides an environment within which other programs can do useful work.

The operating system is a set of special programs that run on a computer system that allows it to work properly. It performs basic tasks such as recognizing input from the keyboard, keeping track of files and directories on the disk, sending output to the display screen and controlling peripheral devices.
OS is designed to serve two basic purposes:

  1. It controls the allocation and use of the computing System’s resources among the various user and tasks.
  2. It provides an interface between the computer hardware and the programmer that simplifies and makes feasible for coding, creation, debugging of application programs.

The Operating system must support the following tasks. The task are:

  1. Provides the facilities to create, modification of programs and data files using an editor.
  2. Access to the compiler for translating the user program from high level language to machine language.
  3. Provide a loader program to move the compiled program code to the computer’s memory for execution.
  4. Provide routines that handle the details of I/O programming.
Add a comment
Know the answer?
Add Answer to:
Operating System! Please provides the answer for the following Question? How does the OS have direct...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Why do we need Subcontractor in Software and System Integration process? How does it help to...

    Why do we need Subcontractor in Software and System Integration process? How does it help to ensure quality of integrated system? How do we Improve the quality and productivity during the software and system integration process?

  • Management information system Please answer the question correctly QUESTION 16 Which of the following is the...

    Management information system Please answer the question correctly QUESTION 16 Which of the following is the most widely used operating system in business? Linux Mac OS Windows Unix 2.5 points    QUESTION 17 Which of the following is an open-source operating system? Unisys Windows Linux Mac OS 2.5 points    QUESTION 18 Which of the following storage types is volatile? RAM ROM PROM All the choices are volatile. 2.5 points    QUESTION 19 Which of the following best describes the...

  • Please answer the following questions: 1. On how many bits is the operating system in your...

    Please answer the following questions: 1. On how many bits is the operating system in your computer based, and what is the largest signed integer that this can hold? b. a. Convert 132 in base 4 to a number in base 16 How many megabytes will you need to store an array of size (30000, 2000, 3000) assuming the data is stored as long? c. 9 Points]

  • How should you back up your data on a virtualized system? Data is the most important aspect of yo...

    How should you back up your data on a virtualized system? Data is the most important aspect of your computer. The operating system can be reinstalled and so can applications, but it may be difficult or impossible to recreate your original data. It is essential that you always back up your important information and have a plan for recovering from a system failure. An attacker could crash a computer's operating system or data may be corrupted or wiped out by...

  • Choose the correct answer 1. A virtual machine executes on a host operating system and a...

    Choose the correct answer 1. A virtual machine executes on a host operating system and a hypervisor provides an API to the actual hardware 2. The guest OS knows that it is not accessing the actual hardware so that it can perform better 3. The VM may supply an environment that is different than the actual host hardware 4. Applications running within the VM have an illusion that they are executing on a real machine Select one: a. All the...

  • Case Study A community health clinic located in a city of 250,000 provides the bulk of...

    Case Study A community health clinic located in a city of 250,000 provides the bulk of Medicaid and homeless care to the community. The clinic maintains approximately 27,000 active health records and has a staff of 90 employees. The professional clinical staff includes five family practice physicians, seven physician’s assistants, and four clinical nurse practitioners.The clinic management was recently notified that it is eligible to receive funding to convert its existing computer systems to a new integrated system that includes...

  • Discuss how you would harden a system and whose responsibility it would be to do this...

    Discuss how you would harden a system and whose responsibility it would be to do this task. Is there an issue if this task is not assigned? What is important about a baseline? Why do you need one? How do you capture a proper baseline? Discuss any issues that have come up when a proper baseline wasn't captured. Explain the importance of inventory management when it comes to computer hardware and how this may help with administration of servers. What...

  • Attacks: Passive – attempt to learn or make use of information from the system that does...

    Attacks: Passive – attempt to learn or make use of information from the system that does not affect system resources • Active – attempt to alter system resources or affect their operation • Insider – initiated by an entity inside the security parameter • Outsider – initiated from outside the perimeter Threat Consequences Unauthorized disclosure is a threat to confidentiality •Exposure: This can be deliberate or be the result of a human, hardware, or software error •Interception: unauthorized access to...

  • BKF.com provides banks access to sophisticated financial information and analysis via the web, enabling them to...

    BKF.com provides banks access to sophisticated financial information and analysis via the web, enabling them to instantly evaluate both personal and commercial loan applications. To better focus on its client services, BKF.com is considering outsourcing some of its internal functions. Its controller, Jenny Lee, suggests starting with the company's internal email system. She recently attended a conference and learned that GTE and NBC outsource their email function to companies such as Google and Yahoo. Lee began her analysis by identifying...

  • BKF.com provides banks access to sophisticated financial information and analysis via the web, enabling them to...

    BKF.com provides banks access to sophisticated financial information and analysis via the web, enabling them to instantly evaluate both personal and commercial loan applications. To better focus on its client services, BKF.com is considering outsourcing some of its internal functions. Its controller, Jenny Lee, suggests starting with the company's internal email system. She recently attended a conference and learned that GTE and NBC outsource their email function to companies such as Google and Yahoo. Lee began her analysis by identifying...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT