Type of paper:Â | Essay |
Categories:Â | Management Computer science |
Pages: | 6 |
Wordcount: | 1616 words |
Introduction
An operating system is a program responsible for the performance and response of the other programs on the computer. Therefore an operating system links the user to the computer. The most significant operating system used by the majority of organizations today is the Top Secret, Inc. (TSI). Organizations rely significantly on the usage of computers to run their activities. Therefore, handy operating systems need to be installed on computers. Below is a discussion on the needs and requirements of an organization, computer architecture, process management, memory management, I/O, mass storage, security, and overall Evaluation of operating systems related to organizations.
Organizational Needs and Requirements
The needs and requirements of an organization vary since each organization has different tasks to be conducted. For instance, Qatar Airline organization tasks include ticket issuing, career management, response to emerging issues, and flight dispatching and accounts management (Baccelli et al., 2018). The computer applications to be used to perform ticket issuing should be able to receive and analyze the passengers’ commands initiated and give the passengers reliable and accurate feedback. The computer application used for response to emerging issues should give timely and updated information on emerging issues such as weather changes, which have a significant impact on flights. The computer application used for flight dispatching should give flight routes after scrutinizing the routes and assessing both the benefits and dangers of a plane following a specific route. The computer application used for accounts management should record any transactions and provide well-detailed finance records.
The TSI that the organization uses should ensure information security such that only intended and authorized personnel can access information through the operating system. The operating system that an institution opts to use in its computers should not make the organization incur more costs when doing its maintenance. The operating system should be strong enough to need minimal maintenance hence saving the organization funds.
Computer Architecture
The operating system is hosted in hardware that should protect the operating system from issues that cause a threat to the operating system, such as dust and heating. The minimum hardware needed is a desktop model of hardware for use in an organization. It is mobile but not compared to the laptop's model of hardware, which is more mobile (Brost et al., 2018). Organizations such as airline organizations, due to their rare nature of relocation, can use the desktop model. However, organizations are dealing with sales of products or delivery of goods; it will not be convenient to use desktops. The sales and delivery organizations should use either laptops or tablets. That is so because the hardware hosting the operating system in laptops and tablets is portable and can be used from any location.
The architecture has led to innovations that have seen smaller disks that offer limited memory utilization. The latest architecture has dramatically improved the input of commands and output of processed information by the operating system in computing. The architecture has led to the introduction of more interactive components such as cordless mice keyboards and touch screens. The latest architecture in computing has led to the introduction of storage components with a higher capacity to store all the information executed and aid in filling in organizations.
Multiprocessor systems can conduct multiple tasks at the same time and still give the desired results. Computer architecture has supported multiprocessor systems by giving room for the installation of multiprocessor systems. A multiprocessor can run operations that at least two processors would have run. The technological issue that might arise in the architecture of a multiprocessor is the need for a more efficient multiprocessor. Multiprocessors are reliable, and if they can be made more efficient, organizations should opt for multiprocessors.
Process Management
The operating system facilitates the running of computer applications. In return, the computer applications with aid from the operating system respond as per the organization's requirements. The applications respond by displaying the results on a screen, producing an audio or video clip, and displaying the results on a paper sheet.
The operating system is designed to check itself and heal itself. However, occasionally, code errors occur. Hence, the a need for software tools to conduct thread analysis and detect deadlock in the system. The best software for thread analysis and deadlock detection is Solar Winds NPM, Solar Winds SAM, and Manage Engine Op Manager. This software monitors the applications, memory, CPU utilization, and the network (Cronin & Doherty, 2019). The operating system prevents deadlock by allocating all the resources to the process before the execution.
TSI supports multiprocessing by allocating tasks to other processors in the computer. An operating system can give several tasks to processors due to the construction of multiple processors that have been attached to the motherboard. The growth of commercial networks has catalyzed the construction of multiple processors embedded on the motherboard.
Memory Management
The operating system supports two types of memory: Random Access Memory (RAM) and Dynamic Random Access Memory (DRAM). Random Access Memory (RAM) is used to store working data. In contrast, the operating system uses dynamic Random Access Memory (DRAM) for the program codes needed.
The operating system has supported virtual memory to enable software portability and security provision to the software. The system has also facilitated memory paging where the computer retrieves information from secondary storage. The system has also facilitated memory segmentation by enabling the computer to divide memory into variable-sized parts (Kumar et al., 2017). Support of the virtual memory, paging of memory, and segmentation of memory makes the system still operate and give the desired output even when under heavily loaded conditions.
Virtual memory ensures mobility and security for operating system software; memory paging enables the computer to break down memory into smaller parts to so that it can work faster and segmentation enables the computer to retrieve information from secondary sources which are to be worked on and these memory management techniques help the computer perform complex tasks.
Input and Output and Mass Storage
The operating system provides an interface for both the hardware and the software for Input and Output management. The system enables the software to receive the commands executed through the hardware and process it (Pokhrel et al., 2017). The software then displays the results of the task completed through the hardware. These processes are made possible by the operating system. Communication techniques supported by the operating systems are Special Instruction I/O, Memory-mapped I/O and Direct memory access (DMA). The advantage of these communication techniques is that they enable the completion of tasks. The disadvantage is that a weak operating system cannot run them.
Scheduled context switching is when an operating system switches tasks it was performing to work on another task. At the same time, input/output interrupt handling is the process of a processor receiving a signal that requires it to stop the task it was performing immediately. The linkage between scheduled context switching and input/output interrupt handling is that interrupt handling requires a switch from context-switching. Interrupts in the system help to identify physical or electric changes needing immediate attention. Manual input /Output approaches are prone to damage compared to device interrupt configured Input/output approaches.
Security
A formal security model supported by an operating system is the Access Control Security Model, which has a different set of objects that make the model stronger to crack. Each object has a label and a specific set of control rule that determines which subject is permitted to have access to which object making system security to the standards of any organization's needs (Sudyana & Lizarti, 2019) A system security system should ensure that the operating system is well protected from damage and cyber threats.
Evaluation
There is a dire need for advanced operating systems in different organizations, as computers manage most of the organization's activities. Therefore, it is vital to produce multiprocessing processors, which will help organizations cut costs in purchasing computers (Vito et al., 2019). Computer memory should be advanced to utilize memory and consume less power. Storage components should also be advanced to hold massive storage instead of organizations purchasing several storage components; they can purchase one that is more manageable and easy to access information stored.
Conclusion
In the technologically advancing world, organizations are adopting digital changes and incorporating the advancements in their operations. Therefore, computer architecture personnel must discover better components to meet the rising needs of the available organizations and individuals in different settings.
References
Baccelli, E., Gündogan, C., Hahm, O., Kietzmann, P., Lenders, M. S., Petersen, H., ... & Wählisch, M. (2018). RIOT: An open-source operating system for low-end embedded devices in the IoT. IEEE Internet of Things Journal, 5(6), 4428-4440.https://ieeexplore.ieee.org/abstract/document/8315125/
Brost, M., Klötzke, M., Kopp, G., Deißer, O., Fraedrich, E. M., Karnahl, K., ... & Beyer, S. (2018). Development, Implementation (Pilot), and Evaluation of a Demand-Responsive Transport System. World Electric Vehicle Journal, 9(1), 4.https://www.mdpi.com/2032-6653/9/1/4
Cronin, S., & Doherty, G. (2019). Touchless computer interfaces in hospitals: A review. Health informatics journal, 25(4), 1325-1342. https://journals.sagepub.com/doi/abs/10.1177/1460458217748342
Kumar, S., Mahaja, R., & Sood, S. (2017). Comparative evaluation of Boss (Bharat operating system solutions, a free/open-source software, developed by India) versus MS Windows, proprietary software to assist Indian organizations to select the better. International Journal of Advanced Research in Computer Science, 8(1). http://search.proquest.com/openview/2b0420fa366ade98526403e8eb55c151/1?pq-origsite=gscholar&cbl=1606379
Pokhrel, N. R., Rodrigo, H., & Tsokos, C. P. (2017). Cybersecurity: Time series predictive modeling of the desktop operating system's vulnerabilities using the linear and non-linear approach. Journal of Information Security, 8(04), 362.https://www.scirp.org/html/5-7800474_80038.htm
Sudyana, D., & Lizarti, N. (2019). Digital evidence acquisition system on the cloud computing model using the live forensic method. Scientific Journal of Informatics, 6(1), 125-137.https://pdfs.semanticscholar.org/d742/bddfdb19a5f2c58138a16c5d400fb582f9ea.pdf
Vito, R. L., Belga, G. D., & Batino, M. R. (2019). Computer-Based Checker for Technical Drafting Plates: Development and Evaluation. International Journal in Information Technology in Governance, Education, and Business, 1(1), 46-57.http://ijitgeb.org/ijitgeb/article/view/19
Cite this page
Free Essay Example on Technical Evaluation of an Operating System. (2023, Nov 09). Retrieved from https://speedypaper.net/essays/free-essay-example-on-technical-evaluation-of-an-operating-system
Request Removal
If you are the original author of this essay and no longer wish to have it published on the SpeedyPaper website, please click below to request its removal:
- Common Forms of Cyber Attacks - Free Essay in Cyber Security
- Essay Sample on the Biggest Clothing Retail Shop: Uniqlo
- Essay Sample. Employees' Social Media Use: Problem at Workplace
- Free Essay Sample - Cloud Storage
- Free Essay: Background on the Company
- Paper on Securing Financial Institutions: A Comprehensive Guide to Cybersecurity Strategies and Regulatory Compliance
- Free Essay Example:The Use of Technology in Supply Chain Management
Popular categories