Operating Systems

  1. Functions of Operating Systems
    1. Process Management
      1. Process Creation and Termination
        1. Initiating processes via system calls
          1. Terminating processes and releasing resources
            1. Child and parent process relationships
            2. Process Scheduling
              1. CPU scheduling algorithms
                1. First-Come, First-Served (FCFS)
                  1. Shortest Job Next (SJN)
                    1. Priority Scheduling
                      1. Round Robin (RR)
                        1. Multilevel Queue Scheduling
                        2. Context switching
                          1. Scheduling criteria (CPU utilization, throughput, turnaround time)
                          2. Synchronization and Communication
                            1. Inter-process communication (IPC) methods
                              1. Message passing
                                1. Shared memory
                                2. Mechanisms for synchronization
                                  1. Semaphores
                                    1. Mutexes
                                      1. Monitors
                                      2. Deadlock and starvation issues
                                        1. Deadlock prevention and avoidance
                                          1. Deadlock detection and recovery
                                      3. Memory Management
                                        1. Allocation and Swapping
                                          1. Dynamic vs static memory allocation
                                            1. Swappers and their role in RAM management
                                              1. Contiguous allocation
                                              2. Virtual Memory
                                                1. Concept and advantages
                                                  1. Demand paging
                                                    1. Page replacement algorithms
                                                      1. Least Recently Used (LRU)
                                                        1. First-In, First-Out (FIFO)
                                                          1. Optimal page replacement
                                                          2. Thrashing and its mitigation
                                                          3. Paging and Segmentation
                                                            1. Paging:
                                                              1. Implementation and advantages
                                                                1. Fragmentation issues (internal vs external)
                                                                2. Segmentation:
                                                                  1. Logical vs physical segmentation
                                                                    1. Segmentation advantages and disadvantages
                                                                3. Device Management
                                                                  1. Input/Output Control
                                                                    1. Role of I/O control systems
                                                                      1. Asynchronous vs synchronous I/O
                                                                        1. Buffering, caching, and spooling
                                                                        2. Device Drivers
                                                                          1. Purpose and function of device drivers
                                                                            1. Types of device drivers
                                                                              1. Character drivers
                                                                                1. Block drivers
                                                                                  1. Network drivers
                                                                                  2. Plug and Play (PnP) technology
                                                                                  3. Device Interfaces
                                                                                    1. Uniform device interconnects (e.g., USB)
                                                                                      1. Proprietary interfaces (e.g., Thunderbolt)
                                                                                    2. File Management
                                                                                      1. Storage, Organization, and Access
                                                                                        1. File organization methods (sequential, indexed, hashed)
                                                                                          1. Hierarchical directory structure
                                                                                            1. File allocation table (FAT) and inodes
                                                                                            2. Permissions and Security
                                                                                              1. Access control lists (ACLs)
                                                                                                1. User and group permissions
                                                                                                  1. Encryption for file and data security
                                                                                                    1. Secure file transfer protocols
                                                                                                  2. Security and Protection
                                                                                                    1. User Authentication
                                                                                                      1. Authentication methods (passwords, biometrics, multi-factor)
                                                                                                        1. User account management
                                                                                                        2. Data Encryption
                                                                                                          1. Encryption algorithms (AES, RSA, etc.)
                                                                                                            1. Role of encryption in secure data transmission and storage
                                                                                                            2. System Integrity
                                                                                                              1. Integrity checks (checksums, hash functions)
                                                                                                                1. Intrusion detection and prevention systems (IDPS)
                                                                                                                  1. Security patches and updates
                                                                                                                  2. Access Control
                                                                                                                    1. Role-based access control (RBAC)
                                                                                                                      1. Mandatory access control (MAC)
                                                                                                                        1. Discretionary access control (DAC)