Skip to main content

How the Computer get Boot Up inside process.



When you press a button on the PC to start the system. Many processes get invoke which make operating system run. So, what happens is when you press the power button immediately kernel present in main memory get invoke. Kernel is main part of the operating system.

Kernel is the system code which work as translator between hardware and operating system.

Imagine who you will use hard disk without operating system? Can you?

In my opinion it’s not possible to interact with hard drive we need an OS.

OS interact with kernel and kernel interact with hardware.

SO, let’s get to the point as soon as the kernel get activated, it calls the OS file from drive into the ram.

Note: To do anything with file of your hard drive it has to be call in RAM first where it can make change you want. As we know ROM (Read Only Memory) in hard drive we can only read memory that is why we require ram to execute any task on computer.


 As the OS come into the RAM system boot up and we the screen of the Operating System.
This is how OS get boot up.



*********************************************************************************************
Comment down below if you have any query.We will love to answer your question.           
                                                                                                                                                   
Thanks for reading the content.
If you like the content share it with your friends.
For getting notified for new blog. Subscribe our Blog.

See you next time , until then peace out.

*********************************************************************************************

Comments

Popular posts from this blog

Hustle

The innate hunger to build,create,do something & try. Hustle isn't just working on the things you like,it means doing the things you don't enjoy so you can do the things you love. Hustle:The ability to make things happen in light of knowing,how to get there ,but operate with the general principle that action breed results. Hustle stands for: H - How U - U  S -  Survive T -  The L - life  E - Everyday Some days I'm Humble. Some days I  Struggle. But everyday I Hustle. Remember Every Boss started as a worker.

Authentication Authorization Accounting(week 3)

Identification is the idea of describing an entity uniquely. Biometric authentication is the process of using unique physiological characteristics of an individual to identify them. C.R.L(Certificate revocation list) :This is a signed list published by the CA which defines certificates that have been explicitly revoked. Lightweight Directory Access Protocol(LDAP): LDAP is an open industry-standard protocol for accessing and maintaining directory services. Authentication is related to verifying the identity a user, authorization pertains to describing what the user account has access to or doesn't have access to. An access control list or ACL , is a way of defining permissions or authorizations for objects.  RADIUS or Remote Authentication Dial-In User Service , is a protocol that provides AAA services for users on a network.It's a very common protocol used to manage access to internal networks, WiFi networks, email services and VPN services. when a client wants to access a r...

Secure Network(Week 4)

Network hardening is the process of securing a network by reducing its potential vulnerabilities through configuration changes and taking specific steps.   Implicit deny is a network security concept where anything not explicitly permitted or allowed should be denied. Analyzing logs is the practice of collecting logs from different networks and sometimes client devices on your network, then performing an automated analysis on them. Correlation analysis is the process of taking log data from different systems and matching events across the systems. Flood guards provide protection against Dos or denial of service attacks. EAP-TLS is an authentication type supported by EAP that uses TLS to provide mutual authentication of both the client and the authenticating server.   if you really want to lock down your network, you can implement 802.1x . DHCP Snooping Attack Why WEP Encryption fall apart? A general concept in security and encryption is to never send the plain ...