Note OS
Note OS
Memory Management − Keeps track of the primary memory (what part of it is in use by whom,
what part is not in use, etc.) and allocates the memory when a process or program requests it.
Processor Management − Allocates the processor (CPU) to a process and deallocates the
processor when it is no longer required.
Device Management − Keeps track of all the devices. This is also called I/O controller that
decides which process gets the device, when, and for how much time.
File Management − Allocates and de-allocates the resources and decides who gets the
resources.
Security − Prevents unauthorized access to programs and data by means of passwords and
other similar techniques.
Job Accounting − Keeps track of time and resources used by various jobs and/or users.
Control Over System Performance − Records delays between the request for a service and from
the system.
Error-detecting Aids − Production of dumps, traces, error messages, and other debugging and
error-detecting methods.
Coordination Between Other Software and Users − Coordination and assignment of compilers,
interpreters, assemblers, and other software to the various users of the computer systems.
Free Software:
“Free software” means software that respects users’ freedom and community.
Users have the freedom to run, copy, distribute, study, change and improve the software.
The term “free software” is sometimes misunderstood—it has nothing to do with price. It
is about freedom.
Eg: Firefox web browser, the Vim text editor, the GIMP image editor, and the VLC media player.
Proprietary Software -
Proprietary software is computer software where the source codes are publicly not available
only the company that has created can modify it. Here the software is developed and tested
by the individual or organization by which it is owned not by the public.
This software is managed by a closed team of individuals or groups that developed it. We have
to pay to get this software and its commercial support is available for maintenance. The
company gives a valid and authenticated license to the users to use this software. But this
license puts some restrictions on users also like.
Number of installations of this software into computers
Restrictions on sharing of software illegally
Time period up to which software will operate
Number of features allowed to use
Eg: Windows, macOS, Internet Explorer, Google Earth, Microsoft Office, etc.