


What does the storage management function of the operating system actually manage?
#What does the storage management function of the operating system actually manage?
The storage management function of the operating system is actually to manage memory resources.
The five major management functions of the operating system:
(1)Job management: including tasks, Interface management, human-computer interaction, graphical interface, voice control and virtual reality, etc.;
(2) File management: also known as information management;
(3) Storage management: essentially The management of storage "space" mainly refers to the management of main memory;
(4) Device management: essentially the management of hardware devices, including the allocation, startup, completion and recycling of input and output devices;
(5) Process management: In essence, it is the management of the processor execution "time", that is, how to allocate the CPU to each task truly and reasonably.
The characteristics of the five major types of operating systems are:
(1) The characteristics of the batch operating system are: a. Users use the computer offline. After the user submits the job, they no longer interact with the computer until they receive the results. Jobs can be submitted directly to the management operator of the computing center or through remote communication lines. Submitted jobs are stored in the system's external storage and become backup jobs.
b. Batch processing. Operators process jobs submitted by users in batches. The jobs in each batch will be automatically scheduled and executed between jobs by the operating system or supervisory program.
c.Multiple programs run. According to the scheduling principle of multi-programming, multiple jobs are selected from a batch of backup jobs and transferred into the memory and organized to run, becoming multi-channel batch processing.
(2) The characteristics of the time-sharing operating system are: a. Interactivity: First, users can control the program while it is running dynamically. Secondly, it is convenient for users to submit homework on the computer. Third, the time-sharing system also facilitates cooperation among users.
b. Multi-user simultaneity: Multiple users can log in on their own terminals at the same time, sharing the CPU and other resources to give full play to the efficiency of the system.
c. Independence: Objectively speaking, users cannot feel that others are using the computer, just like they own the computer exclusively.
(3) The characteristics of the real-time operating system are: a. Real-time clock management (timing processing and delay processing).
b. Continuous human-machine dialogue, which is often necessary for real-time control.
c. Overload protection measures are required. For example, for short-term overload, the input tasks are queued in the buffer according to a certain strategy, waiting for scheduling; for persistent overload, the input of some tasks may be rejected; in a real-time control system, some tasks are processed in time and some are abandoned. tasks or reduce service frequency for certain tasks.
d. High reliability and security require redundancy measures. Front-end and back-end work of the dual-machine system, including necessary confidentiality measures.
(4) The characteristics of the network operating system are: a. A computer network is a group of interconnected computer systems.
b. These computers are autonomous. Each computer has its own operating system and works independently. They work together under the control of network protocols.
c. System interconnection must be realized through communication facilities (hardware, software).
d. The system performs information exchange, resource sharing, interoperability and collaborative processing through communication facilities to achieve a variety of application requirements.
(5) The characteristics of distributed operating systems are: a. The development of computer networks follows protocols, but there is no standard protocol for various distributed systems. Of course, a computer network can also be considered a distributed system.
b. Distributed systems require a unified operating system to achieve uniformity of system operations.
c. The distributed operating system is transparent to users. But for computer networks, if a user on one computer wants to use resources on another computer, he must clearly indicate which computer.
d. The foundation of distributed systems is the network. A distributed system is not only a physically loosely coupled system, but also a logically tightly coupled system.
e. Distributed systems are still in the research stage. Computer networks have been widely used in various fields.
The above is the detailed content of What does the storage management function of the operating system actually manage?. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

MinGW - Minimalist GNU for Windows
This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

Dreamweaver Mac version
Visual web development tools

EditPlus Chinese cracked version
Small size, syntax highlighting, does not support code prompt function

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.