How to Compare Windows OS with OOPs concepts.....??

Answers were Sorted based on User's Feedback



How to Compare Windows OS with OOPs concepts.....??..

Answer / thirupathireddy

just i told two concepts...like as follows..

1.if we can install OS then it creates automatically the
drive C,so here drive is compared to class.

2.Folder-polymarphism
explanation :
Folder is common name but we can rename it
different names.so,here a folder can acted as multiple forms.

Is This Answer Correct ?    7 Yes 1 No

How to Compare Windows OS with OOPs concepts.....??..

Answer / manoj

1>in respect of oops concept ...to have a class and access
via making its object (or instance of a class)..


in OS when process interact with the resource that to
allocate it and free the resource after the tasks being done
..all done via making a instance of a process and resource
too ...

2>Os use the data abstraction like OOps does ..that to
provide the functions and not the whole code written for
those functions to the external level users.

3>And quiet obvious POLYMORPHISM...IN Os take an example of
plAying a video file of different size & extenson ..it can
be played by same player ...(like in oop to calculate the
area of rectangle or square there is need of one fucntion
Area() with the prameters..

Is This Answer Correct ?    5 Yes 0 No

How to Compare Windows OS with OOPs concepts.....??..

Answer / guest

Os:-Operating system
OOPs:-Object Oriented Programming system

Is This Answer Correct ?    1 Yes 8 No

Post New Answer

More Operating Systems AllOther Interview Questions

How do I make a pdf file on my laptop?

0 Answers  


DMA - abbrevation (Direct Memory Access,Discrete memory Access,Disk memoryaccess)

4 Answers   Mascot,


When I startup my computer the screen is black?

0 Answers  


i want information about real time operating systems because i have an interview tomoorow in valeo company.

1 Answers  


Explain the term kernel.

1 Answers   Verifone,


why we make plex offline online in vxvm?

0 Answers  


Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?

0 Answers  


How do I compare files in notepad ++?

0 Answers  


what is the difference between a soft real time operating system and hard real time operating system?

1 Answers   TATA,


Do cores matter for gaming?

0 Answers  


Can you just explain about memory management in iOS?

0 Answers   B-Ways TecnoSoft,


what is memory managemant in Win95

0 Answers  


Categories