Swapping – moves whole processes or individual pages between main memory and secondary storage to free RAM for active tasks.
Protection – prevents a process from reading or writing memory that belongs to another process or to the OS.
Fragmentation control – deals with internal and external fragmentation; techniques include compaction, paging and memory pooling.
3. File‑System Management
Manages persistent data on secondary storage and presents a hierarchical view to users and applications.
File operations – creation, opening, reading, writing, closing, and deletion.
Directory structure – usually a tree (or graph) of folders that organises files.
File allocation methods:
Contiguous allocation
Linked allocation
Indexed allocation (e.g., FAT, inode tables)
Metadata management – stores attributes such as size, timestamps, owner, permissions, and type.
Protection and access control – permission bits or Access Control Lists (ACLs) restrict who can read, write or execute a file.
Backup & recovery – utilities that copy data to secondary media and restore it after loss.
4. Device Management
The OS abstracts hardware devices, providing a uniform interface for input/output.
Device drivers – translate generic OS requests into hardware‑specific commands.
I/O scheduling – orders pending I/O requests to improve throughput and reduce latency (e.g., elevator algorithm for disks).
Interrupt handling – reacts to hardware interrupt signals, saves the current context, and services the device.
Buffering and caching – temporary storage of data to smooth speed differences between CPU and devices.
Device allocation – controls exclusive or shared access to peripherals such as printers or scanners.
5. Security & Protection
Enforces policies that keep the system and its data safe from unauthorised use.
Authentication – verifies the identity of a user (passwords, biometrics, smart cards).
Authorization – determines what an authenticated user is allowed to do (read, write, execute, administer).
Access‑control mechanisms – permission bits, ACLs, role‑based access control (RBAC).
Encryption – protects data at rest (disk encryption) and in transit (TLS/SSL).
Audit trails – records system events, log‑ins, file accesses, and other actions for later review.
6. Utility Software, Program Libraries & Language Translators (AS 5.1 requirement)
Utility software (examples) – disk formatter, defragmenter, antivirus scanner, backup manager, system monitor.
Program libraries / APIs – standard C library (libc), dynamic‑link libraries (DLLs), graphics and networking APIs, system‑call interface.
Language translators – compilers, assemblers and interpreters that convert high‑level code into machine instructions; they are typically supplied as part of the development environment rather than the OS itself, but the OS provides the runtime support they need.
Summary Table – OS Management Tasks (syllabus wording)
Management Area
Key Tasks (one‑line description)
Process management
Creation, scheduling, context switching, IPC, deadlock handling.
Understanding these management tasks equips you to analyse how operating systems provide a secure, efficient and user‑friendly environment for all computing activities required by the Cambridge 9618 syllabus.
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources,
past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.