Found 1301 Articles for MCA

What is Bitmap?

Alex Onsman
Updated on 31-Jan-2020 07:29:05

11K+ Views

A bitmap is a mapping from one system such as integers to bits. It is also known as bitmap index or a bit array.The memory is divided into units for bitmap. These units may range from a few bytes to several kilobytes. Each memory unit is associated with a bit in the bitmap. If the unit is occupied, the bit is 1 and if it is empty, the bit is zero.The bitmap provides a relatively easy way to keep track of memory as the size of the bitmap is only dependent on the size of the memory and the size ... Read More

Operating System Operations

David Meador
Updated on 31-Oct-2023 21:48:31

59K+ Views

An operating system is a construct that allows the user application programs to interact with the system hardware. Operating system by itself does not provide any function but it provides an atmosphere in which different applications and programs can do useful work.The major operations of the operating system are process management, memory management, device management and file management. These are given in detail as follows:Process ManagementThe operating system is responsible for managing the processes i.e assigning the processor to a process at a time. This is known as process scheduling. The different algorithms used for process scheduling are FCFS (first ... Read More

I/O Systems and Subsystems

Ricky Barnes
Updated on 22-Jun-2020 11:06:34

12K+ Views

I/O devices are very important in the computer systems.They provide users the means of interacting with the system. So there is a separate I/O system devoted to handling the I/O devices.The different Components of the I/O systems are −I/O HardwareThere are many I/O devices handled by the operating system such as mouse, keyboard, disk drive etc. There are different device drivers that can be connected to the operating system to handle a specific device. The device controller is an interface between the device and the device driver.A diagram to represent this is −I/O Application InterfaceThe user applications can access all ... Read More

Protection and Security in Operating System

Kristi Castro
Updated on 07-Oct-2023 01:35:24

27K+ Views

Protection and security requires that computer resources such as CPU, softwares, memory etc. are protected. This extends to the operating system as well as the data in the system. This can be done by ensuring integrity, confidentiality and availability in the operating system. The system must be protect against unauthorized access, viruses, worms etc. Threats to Protection and Security A threat is a program that is malicious in nature and leads to harmful effects for the system. Some of the common threats that occur in a system are − Virus Viruses are generally small snippets of code embedded in a ... Read More

Types of Computing Environments

Alex Onsman
Updated on 22-Jun-2020 11:07:39

19K+ Views

A computer system uses many devices, arranged in different ways to solve many problems. This constitutes a computing environment where many computers are used to process and exchange information to handle multiple issues.The different types of Computing Environments are −Let us begin with Personal Computing Environment −Personal Computing EnvironmentIn the personal computing environment, there is a single computer system. All the system processes are available on the computer and executed there. The different devices that constitute a personal computing environment are laptops, mobiles, printers, computer systems, scanners etc.Time Sharing Computing EnvironmentThe time sharing computing environment allows multiple users to share ... Read More

Kernel Data Structures

Ricky Barnes
Updated on 22-Jun-2020 11:08:15

13K+ Views

The kernel data structures are very important as they store data about the current state of the system. For example, if a new process is created in the system, a kernel data structure is created that contains the details about the process.Most of the kernel data structures are only accessible by the kernel and its subsystems. They may contain data as well as pointers to other data structures.Kernel ComponentsThe kernel stores and organizes a lot of information. So it has data about which processes are running in the system, their memory requirements, files in use etc. To handle all this, ... Read More

Communication Satellites

Arjun Thakur
Updated on 22-Jun-2020 11:08:50

15K+ Views

A communication satellite is an artificial satellite that acts as a large repeater in the sky. It receives signals from the source transmitter, amplifies using transponders, and relays them to the receiver. Thus, it creates a communication channel between locations of the earth that would not have been able to communicate due to long distance or obstruction by earth’s curvature.Communication satellites may be owned by government or private organizations. Presently, there are more than 2000 communication satellites in the sky. Some of its uses are −InternetMilitary operationsTelevisionTelephoneRadioCommunication satellites are broadly categorized into three types depending upon the orbit in which ... Read More

Light Transmission

George John
Updated on 30-Jul-2019 22:30:23

2K+ Views

Electromagnetic waves within the frequency range of 400 THz – 790 THz are detected by the human eye. Light transmission is line of sight propagation and is blocked by obstacles. Laser Signals Optical signalling can be obtained by laser signals. For example, the LANs in two buildings can be connected by installing laser signalling system on the rooftops. Laser rays are unidirectional. So both the transmitter and the receiver need perfectly aligned photo-emitter and photo-detector. Visual Light Communication A more used variant of light transmission is visual light communication (VLC). VLC refers to data communication using visible ... Read More

Infrared Transmission

Arjun Thakur
Updated on 30-Jul-2019 22:30:23

2K+ Views

Infrared waves are those between the frequencies 300GHz and 400THz in the electromagnetic spectrum. Their wavelengths are shorter than microwaves but longer than visible light. Infrared propagation is line of sight. They cannot penetrate walls and sun’s infrared rays interfere with these rays. So cannot be used for long – range communication. As their usage is confined within closed space, they do not need any government permissions for their applications. Applications of Infrared Waves in Communications Remote controls for television, stereos and other home appliances. Wireless LANs Wireless modem, keyboard, mouse, printer etc Fire detectors Night vision ... Read More

Microwave Transmission

Arjun Thakur
Updated on 22-Jun-2020 11:09:37

11K+ Views

In the electromagnetic spectrum, waves within the frequencies 1GHz to 300GHz are called microwaves.Features of MicrowavesMicrowaves travel in straight lines, and so the transmitter and receiver stations should be accurately aligned to each other.Microwave propagation is line – of – sight propagation. So, towers hoisting the stations should be placed so that the curvature of the earth or any other obstacle does not interfere with the communication.Since it is unidirectional, it allows multiple receivers in a row to receive the signals without interference.Microwaves do not pass through buildings. So, indoor receivers cannot be used effectively.Microwaves are often refracted by the ... Read More

Advertisements