A logical address is the virtual address that is generated by the CPU. A user can view the logical address of a computer program. On the other hand, a physical address is one that represents a location in the computer memory. A user cannot view the physical address of a program.

Preemptive scheduling
Preemptive scheduling is a method that may be used when a process switches from a running state to a ready state or from a waiting state to a ready state.
The resources are assigned to the process for a particular time and then removed. If the resources still have the remaining CPU burst time, the process is placed back in the ready queue. The process remains in the ready queue until it is given a chance to execute again.
Non-preemptive
Non-preemptive scheduling is a method that may be used when a process terminates or switches from a running to a waiting state.
When processors are assigned to a process, they keep the process until it is eliminated or reaches a waiting state. When the processor starts the process execution, it must complete it before executing the other process, and it may not be interrupted in the middle.
When a process requests for the resource that is been held another process which needs another resource to continue, but is been held by the first process, then it is called a deadlock.
There are four conditions because of which Deadlock is going to occur in Operating Systems. The Conditions are:
Device Management in Operating system manages all the hardware or virtual devices of a computer or PC. The device management system allocates input/output devices to the process on the basis of priority and deallocated as well either temporarily or permanently depending upon the conditions.
The function of device management are:-
System protection in an operating system refers to the mechanisms implemented by the operating system to ensure the security and integrity of the system. System protection involves various techniques to prevent unauthorized access, misuse, or modification of the operating system and its resources.
An operating system (OS) is the program that, after being initially loaded into the computer by a boot program, manages all of the other application programs in a computer
Following are a few common services provided by an operating system −
A time-sharing operating system is an operating system design that allows multiple users or processes to concurrently share the same system resources, such as the CPU, memory, and peripherals.read in detail
A real-time operating system (RTOS) is an operating system that is used in computing systems that needs strict completion deadlines for all the tasks that need to be performed on it.
Demand paging is a technique used in virtual memory systems where the pages are brought in the main memory only when required or demanded by the CPU.
Cache memory is a chip-based computer component that makes retrieving data from the computer's memory more efficient. It acts as a temporary storage area that the computer's processor can retrieve data from easily.
Attributes of the File
Name
Every file carries a name by which the file is recognized in the file system. One directory cannot have two files with the same name.
Identifier
Along with the name, Each File has its own extension which identifies the type of the file. For example, a text file has the extension .txt, A video file can have the extension .mp4.
Type
In a File System, the Files are classified in different types such as video files, audio files, text files, executable files, etc.
Location
In the File System, there are several locations on which, the files can be stored. Each file carries its location as its attribute.
Size
The Size of the File is one of its most important attribute. By size of the file, we mean the number of bytes acquired by the file in the memory.
ProtectionThe Admin of the computer may want the different protections for the different files. Therefore each file carries its own set of permissions to the different group of Users.
Time and Date
Every file carries a time stamp which contains the time and date on which the file is last modified.
A system call is a way for programs to interact with the operating system. A computer program makes a system call when it makes a request to the operating system’s kernel. System call provides the services of the operating system to the user programs via Application Program Interface(API).
Advantages of multiprogramming are −
Semaphores are integer variables that are used to solve the critical section problem by using two atomic operations, wait and signal that are used for process synchronization.
Type-1: General Semaphore
A semaphore whose integer component can take arbitrary non-negative values of S.L. these is called General Semaphore. They are kind of weak semaphores.
Type-2: Binary Semaphore
A semaphore whose integer component S.L. takes only the values 0 and 1 is called a binary semaphore. This is also known as “mutex” which stands for mutual exclusion.
Type-3 : Strong Semaphore
In Strong semaphores, S.L. remains unchanged as in weak semaphores whereas S.V. is replaced by the queue. Because removal of arbitrary process in a weak semaphore it may lead to starvation whereas in this case, it remains free from starvation.
Type-4 Busy- Wait for Semaphore
It does not have a component S.L. and Semaphore S is identified only by S.V. Busy-Wait Semaphore are appropriate in a multi-processor system where the waiting process has its own processor and is not waste CPU time that could be used for computation.
Hardware reliability is defined as the probability of the absence of any hardware-related system malfunction for a given mission.
First Fit
In the first fit approach is to allocate the first free partition or hole large enough which can accommodate the process. It finishes after finding the first suitable free partition.
Advantage
Fastest algorithm because it searches as little as possible.
Disadvantage
The remaining unused memory areas left after allocation become waste if it is too smaller. Thus request for larger memory requirement cannot be accomplished.
Best Fit
The best fit deals with allocating the smallest free partition which meets the requirement of the requesting process. This algorithm first searches the entire list of free partitions and considers the smallest hole that is adequate. It then tries to find a hole which is close to actual process size needed.
Advantage
Memory utilization is much better than first fit as it searches the smallest free partition first available.
Disadvantage
It is slower and may even tend to fill up memory with tiny useless holes.
Worst fit
In worst fit approach is to locate largest available free portion so that the portion left will be big enough to be useful. It is the reverse of best fit.
Advantage
Reduces the rate of production of small gaps.
Disadvantage
If a process requiring larger memory arrives at a later stage then it cannot be accommodated as the largest hole is already split and occupied.
Deadlock is a situation where a process or a set of processes is blocked, waiting for some other resource that is held by some other waiting process.
Methods of handling deadlocks: There are four approaches to dealing with deadlocks.
Deadlock Prevention: The strategy of deadlock prevention is to design the system in such a way that the possibility of deadlock is excluded
Deadlock Avoidance: The deadlock avoidance Algorithm works by proactively looking for potential deadlock situations before they occur. It does this by tracking the resource usage of each process and identifying conflicts that could potentially lead to a deadlock.
Deadlock Detection: Deadlock detection is used by employing an algorithm that tracks the circular waiting and kills one or more processes so that the deadlock is removed.
Deadlock Ignorance: In the Deadlock ignorance method the OS acts like the deadlock never occurs and completely ignores it even if the deadlock occurs.
Disk scheduling is done by operating systems to schedule I/O requests arriving for the disk. Disk scheduling is also known as I/O scheduling.

FCFS disk scheduling algorithm:
It stands for 'first-come-first-serve'. As the name suggests, the request which comes first will be processed first and so on.
SSTF disk scheduling algorithm:
It stands for 'Shortest seek time first'. As the name suggests, it searches for the request having the least 'seek time' and executes them first.
SCAN disk scheduling algorithm:
In this algorithm, the head starts to scan all the requests in a direction and reaches the end of the disk. After that, it reverses its direction and starts to scan again the requests in its path and serves them. Due to this feature, this algorithm is also known as the "Elevator Algorithm".
C-SCAN disk scheduling algorithm:
It stands for "Circular-Scan". This algorithm is almost the same as the Scan disk algorithm but one thing that makes it different is that 'after reaching the one end and reversing the head direction, it starts to come back.
LOOK the disk scheduling algorithm:
In this algorithm, the disk arm moves to the 'last request' present and services them. After reaching the last requests, it reverses its direction and again comes back to the starting point. It does not go to the end of the disk, in spite, it goes to the end of requests.
C-LOOK disk scheduling algorithm:
The C-Look algorithm is almost the same as the Look algorithm. The only difference is that after reaching the end requests, it reverses the direction of the head and starts moving to the initial position. But in moving back, it does not serve any requests.
The critical section is a code segment where the shared variables can be accessed. An atomic action is required in a critical section i.e. only one process can execute in its critical section at a time. All the other processes have to wait to execute in their critical sections.

watch Video to clear concept
A supervisor call is an instruction sent to a computer’s processor that directs it to transfer computer control to the operating system’s supervisor program
supervisor call (SVC) instruction is a processor instruction that directs the processor to pass control of the computer to the operating system's supervisor program.
The allocation methods define how the files are stored in the disk blocks. There are three main disk space or file allocation methods.
The main idea behind these methods is to provide:
bcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca bcanotes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaper
bcanotes bca notes bcaquestionpaper bca questionpaperbcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaperbcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaper ccsu ccsunotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaperbcanotes
Visit W3Schools.com!Visit W3Schools.com!Visit W3Schools.com!Visit W3Schools.com!Visit W3Schools.com!Visit W3Schools.com!Visit W3Schools.com!Visit W3Schools.com!Visit W3Schools.com!ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaperbcanotes ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaperbcanotes bcanotes bca notes bcaquestionpaper bca questionpaper
bcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaper
ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaperbcanotes
ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaperbcanotes
bcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaper
bcanotes bca notes bcaquestionpaper bca questionpaperbcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaperbcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaperbcanotes
ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaperbcanotes ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaperbcanotes bcanotes bca notes bcaquestionpaper bca questionpaper
bcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaper
ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaperbcanotes
ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaperbcanotes
bcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaper
bcanotes bca notes bcaquestionpaper bca questionpaperbcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaperbcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaperbcanotes
ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaperbcanotes ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaperbcanotes bcanotes bca notes bcaquestionpaper bca questionpaper
bcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaper
ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaperbcanotes
ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaperbcanotes
bcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaper
bcanotes bca notes bcaquestionpaper bca questionpaperbcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaperbcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaperbcanotes
ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaperbcanotes ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaperbcanotes bcanotes bca notes bcaquestionpaper bca questionpaper
bcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaper bcanotes bca notes bcaquestionpaper bca questionpaper
ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaperbcanotes
ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaper ccsubcanotes ccsu bca cccsu notes ccsubcaquestionpaper bca questionpaperbcanotes