answersLogoWhite

0


Best Answer

false

User Avatar

Anonymous

Lvl 1
3y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: In the process of conducting design considerations a program's systems?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

List 3 types of personnel involved in a computer systems development process?

The three types of personnel involved in a computer systems development process are: Users, Systems Analysts, Systems Designers, Programmers and Managers


What are the two major weaknesses of file-processing systems?

Traditional file processing systems include manual systems and also computer based file systems that were linked to particular application programs. This is the type of file processing that you used with your 3GL programming. They share a number of characteristics.


What does systems software carry out?

Refers to the operating system and all utility programs that manage computer resources at a low level. Software is generally divided into systems software and applications software. Applications software comprises programs designed for an end user, such as word processors, database systems, and spreadsheet programs. Systems software includes compilers, loaders, linkers, and debuggers. A program (as an operating system or compiler or utility program) that controls some aspect of the operation of a computer


What systems implement access controls using a two-phase process called what?

identification and authentication


What are the Service provided by operating system?

Operating system (OS) provides two main services: file management and user interface with the hardware system. ^^ Following are the five services provided by an operating systems to the convenience of the users. The purpose of a computer systems is to allow the user to execute programs. So the operating systems provides an environment where the user can conveniently run programs. The user does not have to worry about the memory allocation or multitasking or anything. These things are taken care of by the operating systems. Running a program involves the allocating and deallocating memory, CPU scheduling in case of multiprocess. These functions cannot be given to the user-level programs. So user-level programs cannot help the user to run programs independently without the help from operating systems. === === === === Each program requires an input and produces output. This involves the use of I/O. The operating systems hides the user the details of underlying hardware for the I/O. All the user sees is that the I/O has been performed without any details. So the operating systems by providing I/O makes it convenient for the users to run programs. For efficiently and protection users cannot control I/O so this service cannot be provided by user-level programs. === === === === The output of a program may need to be written into new files or input taken from some files. The operating systems provides this service. The user does not have to worry about secondary storage management. User gives a command for reading or writing to a file and sees his her task accomplished. Thus operating systems makes it easier for user programs to accomplished their task. This service involves secondary storage management. The speed of I/O that depends on secondary storage management is critical to the speed of many programs and hence I think it is best relegated to the operating systems to manage it than giving individual users the control of it. It is not difficult for the user-level programs to provide these services but for above mentioned reasons it is best if this service s left with operating system. === === === === There are instances where processes need to communicate with each other to exchange information. It may be between processes running on the same computer or running on the different computers. By providing this service the operating system relieves the user of the worry of passing messages between processes. In case where the messages need to be passed to processes on the other computers through a network it can be done by the user programs. The user program may be customized to the specifics of the hardware through which the message transits and provides the service interface to the operating system. === === === === An error is one part of the system may cause malfunctioning of the complete system. To avoid such a situation the operating system constantly monitors the system for detecting the errors. This relieves the user of the worry of errors propagating to various part of the system and causing malfunctioning. This service cannot allowed to be handled by user programs because it involves monitoring and in cases altering area of memory or deallocation of memory for a faulty process. Or may be relinquishing the CPU of a process that goes into an infinite loop. These tasks are too critical to be handed over to the user programs. A user program if given these privileges can interfere with the correct (normal) operation of the operating systems.

Related questions

What can a content server be used for?

A content server is used for Document Management Systems (DMS) to store and retrieve documents. They can be attached to ECC programs and process PR programs.


What has the author Eric Bouzou written?

Eric Bouzou has written: 'Interactive software for process control' -- subject(s): Computer programs, Interactive computer systems, Process control


Which are the operating systems in distributed systems?

a set of programs


What is process interaction in operating system?

Accepting input from a human. Interactive computer systems are programs that allow users to enter data or commands. Most popular programs, such as word processors and spreadsheet applications, are interactive.


What is the process of vulnerability remediation?

Vulnerability remediation is the process of identifying, correcting, and preventing security vulnerabilities in systems and networks. The process typically involves identifying potential security risks, assessing and prioritizing them, and then taking steps to address the issues. This can include patching systems and applications, implementing security controls, and deploying security tools and processes. Additionally, vulnerability remediation may involve training staff, conducting regular security audits, and monitoring systems for suspicious activity.


Where can we classify media players word processors and spread sheet program systems programs or applications programs?

They are all applications software, not systems software.


Predict and explain what systems are electrically conducting e solid NaCl f molten NaCl g An aqueous solution of NaCl?

The aqueous and molten solutions are electrically conducting


How can you explain process hierarchy in connection with operating systems?

what are hierachies are used for process in operating systems


What is the relationship between systems development process and IT project management?

The IT project management is on top of the systems development process and its absence in the systems development process will results to wastage of resources.


What does 's' stands for in COPS for conducting a detail HR analysis?

Culture Organisation People Systems of HR


What has the author Gene H Fisher written?

Gene H. Fisher has written: 'Cost considerations in systems analysis'


Why operating systems evolved from multiprogrammed batch systems to time sharing systems?

Simple batch system used to for long times and they occupy the CPU even when they are actually not utilizing the CPU for example while doing the I/O operations. So the programmers thought it to be great idea if some other process can use the CPU when the previous process is idle. In multiprogrammed batch systems one user can run multiple programs and which gets the CPU whenever the CPU is idle. So it speeds up the process completion.