02 Performance Task 1 (Plat Tech) - Jadulco
02 Performance Task 1 (Plat Tech) - Jadulco
02 Performance Task 1 (Plat Tech) - Jadulco
IT301M
Platform Technology
02 Performance Task 1
I.
1. Configuration Manager
- Through the role of the Configuration Manager, hardware devices’ configuration and
management are facilitated. One of the processes it often performs include the loading of
device drivers at the booting time of the computer system. This process includes the reading
of system config files as well as loading required drivers and applying setting to implement
the right functioning of the hardware. As for process control structures, the Configuration
Manager makes sure that practically any hardware resources such as I/O devices, system
ports, or network interfaces can be initialized prior to running processes which may require
the use of these resources. It modifies the PCB to allocate resources or set flags which show
the availability of a device, in other words, guarantee right interaction of processes with
hardware.
2. Power Manager
- Power Manager is another one which implies the management of power in the system. One
of the typical processes it considers is system suspending and resuming for instance when a
laptop goes to the sleep mode. In this process, the Power Manager wakes up the kernel,
communicates to it to shut down all the processes currently in operation, store their state in
memory and switch off all the unnecessary hardware components. On resuming the system,
the Power Manager pulls out the states stored and brings up the processes to the state it
was in before. This is because PCB has the responsibility of storing the present state (for
example running, ready, blocked) of processes so that in case of a power change, the
processes are reintroduced from where they stopped.
3. Cache Manager
- Cache Manage is responsible for the system cache that is a temporary storage space used by
the central processing unit and the computer’s other components in their interactions with
slow storage devices. One of the usual works it performs relates to the writing of dirty cache
pages which are the pages in memory that are modified and therefore needs to be written
back to disk. This process usually takes place when the CPU is in a free state in order to
ensure that the disk is in harmony with the updated data. The Cache Manager continues the
PCB of processes that require I/O, for instance, disk read or disk writes, to appropriately
record the details of I/O requests. Moreover, it brings into a current state any processes that
were frozen while waiting for cache operations to be finished, and said processes may
continue once the writing to the disk is done.
II.
a. Microsoft Windows
b. 16gb RAM
f. As for the memory usage, it can be noted that on most of the devices, the application
processes have higher memory usage in contrast with the background/system processes.
Use cases including web browsers, games, productivity tools, etc., require significant
memory as the application processes are complex, and they utilize a number of
resources when running. For instance, a web browser with different tabs opened or a
video editing software increases the memory usage significantly. Background and system
processes deal with other essential activities such as the communication within the
hardware which is normally not very intensive in terms of memory usage and other
routine activities such as maintenance of systems. Despite the fact that system
processes are essential for operation and sustainment of the device, these are normally
designed to be resource-consuming. Therefore, if, for instance, one open the windows
Task Manager or other similar utilities, it becomes clear that the working app processes
utilize more memory than the non-active background and system processes.
h. The concept simply means linking your device to other devices does not necessarily
mean creating new processes like the diagram illustrates, but it may well trigger different
activities that are made up of processes. When you join electronics whether by a cable, a
wireless signal, or Bluetooth, what happens is that the OS and drivers connect you
through management of other procedures rather than initiating new programs. For
instance, when connecting a USB device, this causes the launching of device invokers or
services which help the operating system to recognize and incorporate that hardware
but this is done in the context of process. Likewise getting connected to a network may
trigger activities in network management services which are already in place. In other
words, during the connection process, the system performs various tasks related to tasks
and resources, still it acts mainly within the scope of already existing processes and
services, creating new processes as a result of work.
i. Exiting or force quitting multiple processes on your device may produce a number of
effects in the short run and further consequences in the long run. By forcing stop
processes, you can interrupt on going tasks making the instance’s data vulnerable to loss
or corruption if the tasks are not saved appropriately. For example, one can shut a
document editing application, and all the work on the document that was not saved
could be deleted. However, it also has to remove critical system processes which may
lead to OS instability and result in failure or unstable behavior since these processes are
vital to stabilize the OS and manage various functions. At times, force-stopping
processes can also cause interference with other network connections or any other
integrated services thereby hampering the normal working of the device. In the long
run, constant force-stopping of processes could make the user encounter high levels of
discomfort that results from a consistently slow starting up of applications or even
noticeable slow-moving systems that have to re-load as well as re-initialize some of the
stopped processes.
j. Less privilege mode also referred to as standard user mode or limited access mode limits
the operation of your device to reduce the chances of the unauthorized changes being
made. In this mode users can be allowed to accomplish normal activities like, web
browsing, application usage and personal file manipulation but cannot change setting,
add new software and games without permission from the administrator. This limitation
also secures the system from certain security threats since malware cannot perform
alteration to the system or gain access to some specific areas in the device. Moreover,
less privileged mode is to prevent the user from tampering with other users’ accounts or
system wide settings hence enhancing system stability and security. Though this mode is
appropriate for the routine operations, it is developed specifically to reduce the
possibility of the accidental or intentional invasion in the operating system and its crucial
procedure.
k. There are several ways of killing processes on the device and some of the include the
following. The first method is using the window called Task Manager Here you will find a
list of all processes that are running on the computer shown graphically You have an
option of ending running processes by clicking on such and pressing the ‘End task’
button, helps to shut applications that have crashed or those that are highly active. The
other approach is using what is referred to as the command line tools, including the
Command prompt or PowerShell since you can input several commands such as task kill
and erase particular processes by the PID or the name; this is more personal and
effective especially to power users or scenarios. Both come in handy to gauge and direct
system performance and to address any concern involving processes that either freeze,
or consume too many system resources.