Useful Links
Technology
Computer science
Operating Systems
Functions of Operating Systems
Process Management
Process Creation and Termination
Initiating processes via system calls
Terminating processes and releasing resources
Child and parent process relationships
Process Scheduling
CPU scheduling algorithms
First-Come, First-Served (FCFS)
Shortest Job Next (SJN)
Priority Scheduling
Round Robin (RR)
Multilevel Queue Scheduling
Context switching
Scheduling criteria (CPU utilization, throughput, turnaround time)
Synchronization and Communication
Inter-process communication (IPC) methods
Message passing
Shared memory
Mechanisms for synchronization
Semaphores
Mutexes
Monitors
Deadlock and starvation issues
Deadlock prevention and avoidance
Deadlock detection and recovery
Memory Management
Allocation and Swapping
Dynamic vs static memory allocation
Swappers and their role in RAM management
Contiguous allocation
Virtual Memory
Concept and advantages
Demand paging
Page replacement algorithms
Least Recently Used (LRU)
First-In, First-Out (FIFO)
Optimal page replacement
Thrashing and its mitigation
Paging and Segmentation
Paging:
Implementation and advantages
Fragmentation issues (internal vs external)
Segmentation:
Logical vs physical segmentation
Segmentation advantages and disadvantages
Device Management
Input/Output Control
Role of I/O control systems
Asynchronous vs synchronous I/O
Buffering, caching, and spooling
Device Drivers
Purpose and function of device drivers
Types of device drivers
Character drivers
Block drivers
Network drivers
Plug and Play (PnP) technology
Device Interfaces
Uniform device interconnects (e.g., USB)
Proprietary interfaces (e.g., Thunderbolt)
File Management
Storage, Organization, and Access
File organization methods (sequential, indexed, hashed)
Hierarchical directory structure
File allocation table (FAT) and inodes
Permissions and Security
Access control lists (ACLs)
User and group permissions
Encryption for file and data security
Secure file transfer protocols
Security and Protection
User Authentication
Authentication methods (passwords, biometrics, multi-factor)
User account management
Data Encryption
Encryption algorithms (AES, RSA, etc.)
Role of encryption in secure data transmission and storage
System Integrity
Integrity checks (checksums, hash functions)
Intrusion detection and prevention systems (IDPS)
Security patches and updates
Access Control
Role-based access control (RBAC)
Mandatory access control (MAC)
Discretionary access control (DAC)
3. Components of Operating Systems
First Page
5. Features of Operating Systems