A different use of the term bootstrapping is to use a compiler to compile itself, by first writing a small part of a compiler of a new programming language in an existing language to compile more programs of the new compiler written in the new language. This solves the "chicken and egg" causality dilemma.
1.) Bootstrapping Program
A different use of the term bootstrapping is to use a compiler to compile itself, by first writing a small part of a compiler of a new programming language in an existing language to compile more programs of the new compiler written in the new language. This solves the "chicken and egg" causality dilemma.
2.) Trap and Interrupt
3.) Monitor Mode
4.) User Mode
5.) Storage Hierarchy
To clarify the "guarantees" provided at different settings of the persistence spectrum without binding the application to a specific environment or set of storage devices, MBFS implements the continuum, in part, with a logical storage hierarchy. The hierarchy is defined by N levels:
- 1.LM (Local Memory storage): very high-speed volatile storage located on the machine creating the file.
- 2.LCM (Loosely Coupled Memory storage): high-speed volatile storage consisting of the idle memory space available across the system.
- 3.-N DA (Distributed Archival storage): slower speed stable storage space located across the system.
6.) DMA
Some expansion boards, such as CD-ROM cards, are capable of accessing the computer's DMA channel. When you install the board, you must specify which DMA channel is to be used, which sometimes involves setting a jumper or DIP switch.
7.) Difference of RAM and DRAM
8.) Hardware Protection
Sharing system resources requires operating system to ensurethat an incorrect program cannot cause other programs toexecute incorrectly.
Provide hardware support to differentiate between at least twomodes of operations.
1. User mode – execution done on behalf of a user.
2. Monitor mode (also supervisor mode or system mode) –execution done on behalf of operating system.

Mode bit added to computer hardware to indicate the currentmode: monitor (0) or user (1). When an interrupt or fault occurs hardware switches to monitor mode. Privileged instructions can be issued only in monitor mode.

All I/O instructions are privileged instructions. Must ensure that a user program could never gain control ofthe computer in monitor mode (i.e., a user program that, aspart of its execution, stores a new address in the interruptvector).

- Timer is decremented every clock tick
- When timer reaches the value 0, an interrupt occursTimer commonly used to implement time sharing.
Time also used to compute the current time.
Load-timer is a privileged instruction.
9.) Storage Structure
The computer can manipulate only data that is in main memory. Therefore, every program you execute and every file you access must becopied from a storage device into main memory. The amount of main memory on a computer is crucial because it determines how many programs can be executed at one time and how much data can be readily available to a program.
Because computers often have too little main memory to hold all the data they need, computer engineers invented a technique called swapping, in which portions of data are copied into main memory as they are needed. Swapping occurs when there is no room in memory for needed data. When one portion of data is copied into memory, an equal-sized portion is copied (swapped) out to make room.
Now, most PCs come with a minimum of 32 megabytes of main memory. You can usually increase the amount of memory by inserting extra memory in the form of chips.
On magnetic disks, data is encoded as microscopic magnetized needleson the disk's surface. You can record and erase data on a magnetic disk any number of times, just as you can with a cassette tape. Magnetic disks come in a number of different forms:
Moving Head Disk MechanismThe machine that spins a disk is called a disk drive. Within each disk drive is one or more heads (often called read/write heads) that actually read and write data.
Accessing data from a disk is not as fast as accessing data from main memory, but disks are much cheaper. And unlike RAM, disks hold on to data even when the computer is turned off.
Rotation Speeds: 60 to 200 rotations per second
Head Crash: read-write head makes contact with the surface
Consequently, disks are the storage medium of choice for most types of data. Another storage medium is magnetic tape. But tapes are used only for backup and archiving because they are sequential-access devices (to access data in the middle of a tape, the tape drive must pass through all the preceding data).
A new disk, called a blank disk, has no data on it. Before you can store data on a blank disk, however, you must format it.
Magnetic Tapes A magnetically coated strip of plastic on which data can be encoded. Tapes for computers are similar to tapes used to store music.
Storing data on tapes is considerably cheaper than storing data on disks. Tapes also have large storage capacities, ranging from a few hundred kilobytes to several gigabytes. Accessing data on tapes, however, is much slower than accessing data on disks. Tapes are sequential-access media, which means that to get to a particular point on the tape, the tape must go through all the preceding points. In contrast, disks are random-access media because a disk drive can access any point at random without passing through intervening points.
Because tapes are so slow, they are generally used only for long-term storage and backup. Data to be used regularly is almost always kept on a disk. Tapes are also used for transporting large amounts of data.
Tapes come in a variety of sizes and formats.
Tapes are sometimes called streamers or streaming tapes.