پیدایش خلقت انسان از نظر مذهب یزیدیه

پیدایش خلقت انسان از نظر مذهب یزیدیه

خداوند در اول کار خود یک در سفیدی را از سر خود بوجود آورد. و پرنده ای را خلق کرد که نامش انقز مقدس بود و آن دانه در سفید گرانبها را بر پشت آن گذارد و چهل هزار سال در آن ماند و پس از آن شروع به خلق هفت نوشته نمود.

روز دوشنبه، ملک دردائیل را خلق فرمود و او شیخ حسن است.

روز سه شنبه، ملک اسرافیل را خلق کرد و او شیخ شمس الدین است.

روز چهارشنبه، میکائیل را خلق کرد و او شیخ ابوبکر است.

روز پنج شنبه، جبرئیل را خلق کرد و او سجادین است.

روز جمعه، شمنایل را که ناصر الدین است خلق کرد.

روز شنبه ملک نورائیل را، و او بدیانت فخر الدین است.3



روز یکشنبه که آغاز نخستین روز خلق فرشتگان است، عزرائیل (شیطان) را خلق کرد و او همان « ملک » رئیس همه ملائکه و مقرب مذهب یزیدیه است. سپس آسمان هفتگانه و بعد فکر را که از طریق آن به انسان صورت داد خلق کرد و بعد از آن پرندگان و وحوش را خلق کرد. یکصد سال بعد « ملک» از خدا پرسید که چگونه بشر از نسل آدم زیاد می گردد، و نسل آدم کجاست؟ خدا به او گفت: کار بشر و نسل او را به تو واگذار می کنم. « ملک» آمد و از آدم پرسید آیا از درخت ممنوعه باغ که گندم نام داشت خورده ای؟ آدم گفت: خداوند بزرگ مرا از خوردن آن میوه ممنوعه منع کرده است. بر این جهت چگونه می توانم از گندم باغ جنت بخورم؟ ملک به او گفت: نه بخور، تو باید بخوری و از آن که بهترین چیزهای این زمین است پیش از هر چیز دیگر تغذیه نمایی و سیر گردی. تو، ای آدم، اگر به گفته های من که نفع تو در اوست عمل کنی و گندم را بخوری به زودی پیش آمد خوبی برای تو اتفاق خواهد افتاد، و با وسوسه های ملک، آدم از آن میوه سیر خورد و شکمش باد کرد و در این وقت ملک او را از بهشت بیرون کرد و او را تنها گذارد و خود به آسمان رفت. آدم تنها بود و به علت نداشتن مخرج، سخت می گریست و درد می کشید. در این وقت خداوند جبرائیل را فرستاد که مرهمی بر درد آدم نهد و او را از این مصیبت برهاند.



جبرائیل پرنده ی فرستاد و پرنده مزبور، با نوک خود مخرجی از پشت برای آدم ساخت و آدم را آسوده کرد و یکصد سال با آن حال محزون بود و گریه و ناله می کرد و توبه و استغفار می نمود. سرانجام خداوند بر جبرائیل فرمان داد تا حوا را از زیر بغل آدم خلق کند. در این وقت آدم و حوا خواستند هر یک، به تنهایی نسل بشر از وجود خودش آفریده شود و خود سازنده آن محسوب شود و تصمیم داشتند تا در آفرینش انسان از شرکت دیگری جلوگیری به عمل آرند و مثل جانوران روی زمین نباشند.



مدتها گذشت در این مدت آدم و حوا دائماً با یکدیگر در حال مذاکره بودند و مخاصمه می کردند و سرانجام پس از ماهها مذاکره و مشاجره به این نتیجه رسیدند که هر یک از طرفین (آدم و حوا) شهوت خود را در ظرفی ریخته و بر مهر خود ممهورش کند و بعد از 9 ماه هر کدام کوزه ظرف خود را باز نمایند. پس هریک بدانچه که قرار گذاشته بودند عمل کردند و شهوت خود را در ظرفی ریخته و نگهداشتند، روزها، هفته ها و ماهها گذشت، ماه هفتم، ماه هشتم، و بالاخره ماه نهم فرا رسید و آدم و حوا پس از ماهها انتظار هر یک عجولانه به سوی ظرفهای خود رفتند درب آن را گشودند. پس در کوزه آدم اطفالی از پسر و دختر بود ولی در کوزه حوا، کرم و حشرات بوجود آمده بود. دختر و پسر ظرف آدم از اجداد یزیدیه هستند و سایرین از ظرف حوا، آدم پس از اینکه دختر و پسر را از کوزه شهوت خارج ساخت، با دو پستانی که خداوند برایش خلق کرده بود شیر داد و این پستان که امروز در سینه مردان قرار دارد، از آن تاریخ بوجود آمده است.



پس از مدتی، آدم و حوا به بالای کوه عرفات رفته و آتشی کردند و از آن زمان عهد کردند تا چون همه جانداران روی زمین به طور شراکتی تولید مثل نمایند و لذا بقیه افراد، از نژاد مشترک آدم و حوا پس از آشتی در کوه عرفات هستند.



به عقیده یزیدیها این عالم از دو قوه خیر و شر بوجود آمده است. قوه خیر همان خدائیست که بر قوه شرغلبه کرده و آن قوه شر همان شیطان اعظم و ابلیس مقتدر است که سلطه ملکوت او را از خود رانده است. و« ملک»، همان فرشته است که از بهشت رانده شده است و پرستش یزیدیان که به وسیله آن به این فرشته رانده شده نزدیک می شوند با عبادتی که نسبت به پروردگار می نمایند تفاوت دارد. به این صورت که نسبت به شیطان بسیار خاضع و خاشع و مهربان بوده و از او می ترسیدند ولی نسبت به خدای خیر شکرگزار و ممنون و سپاسگذار می باشند. ترس آنها از شیطان به درجه ایست که از عبادت خدا روی بر می گردانند و خطاهای خود را به امید آنکه رحمت خدا، حدی ندارد ناچیز می شمارند و لذا شیطان را معبود خود می دانند و می گویند: هوشیاری انسان اقتضاء دارد که انسان همیشه از شیطان بترسد و کسی که از زندگانی خود سعادت می خواهد باید خدا را کنار گذارد زیرا خدا اقدام در عمل شر نمی کند و باید طالب دوستی شیطان باشد و او را حمایت کند تا از آتش دوزخ در امان باشد. همه ما سرانجام روزی گناه خواهیم کرد و در نتیجه به امر خداوند به دوزخ فرستاده خواهیم شد، و این شیطان است که درآن روز سخت ما را که در این جهان از او پیروی و اطاعت نموده ایم، یاری می نماید و از گزند آتش جهنم برحذر خواهد داشت.





آداب و رسوم یزیدی ها

یزیدی ها آداب و عقاید خاصی در مسائل مختلف دارند که برخی از آنها همان طور که درگذشته ذکر گردید، برداشتی است از سایر مذاهب و بقیه چیزهایی است که رؤسای قوم و مذهب در بین پیروان خود شایع ساخته اند.4



یکی از رسوم آنها غسل اطفال جدید الولاده در حوض آبیست که دو دهنه و دو در دارد و در مقبره شیخ عدی واقع شده، او را غسل داده تا از کثافات ولادت پاک نمایند و آن را (عین البیضاء) می نامند و مسیحیان این را غسل تعمید می دانند.5



یزیدی ها بعضی از درختان را تقدیس کرده و آن را می پوشانند و یا رنگ می کنند و به آن کهنه می بندند و بعضی از آنها برگ درختان مزبور را برای شفا مصرف می نمایند و این درختان مقدس در بسیاری نقاط که یزیدی ها زندگی می کنند، یافت می شود.



دختران و پسران یزیدی ها قبل از ازدواج حق دارند که با هم آشنا شده و معاشقه نمایند بدون آنکه به هم نزدیک شوند. همچنین اگر دختر و پسری قصد ازدواج داشته باشند، باید قبلاً اولیاء همدیگر را در جریان این امر قرار دهند. در این مورد پسر باید نیت خود را به پدر دختر یا مادر خود در میان بگذارد. چنانچه اولیای هر یک از طرفین مایل به این وصلت نباشد، پسر حق دارد دختر مورد علاقه خود را برباید و این اجازه ( فرار دختر توسط پسر) در مصحف رش داده شده است.



مرد یزیدی ها می تواند تا چهار زن بگیرد ولی بر او حرام است بین دو زن را بدون رضایت زن اول جمع نماید. همچنین اگر مردی از زن اول خود فرزندی داشته باشد، نمی تواند زن بگیرد. همچنین «صدیق دملوجی» در کتاب خود به نام « یزیدیه» می نویسد: اگر یک دختر یزیدی نخواست شوهر کند باید تا زنده است خدمتگزار پدرش باشد و اگر شوهر کرد و شوهرش مرد، می تواند به خانه پدر برگردد و پدر او دوباره وی را شوهر دهد، ولو چند مرتبه این اتفاق بیفتد و در آن صورت از شوهر مرده اش ارث نمی برد.



ساده ترین عقیده ای که یزیدی ها دارند امر طلاق است؛ زیرا هر مردی که بخواهد زن خود را طلاق دهد، باید سه دانه سنگریزه در دست زنش قرار دهد و این کار نشانه طلاق مرد از زنش است.



تعدد زوجات در بین رؤسای مذهب و امیران رایج است و می توانند هرچند که مایلند زن بگیرند و تجدید فراش نمایند. عبدالرحمن بدران در مجله الجنان جزء 7، سال 1871، ص 529 چنین نوشته: از معتقدات یزیدیه این است که اگر رئیس آنها یکی از زنان را اعم از آنکه دختر بوده یا شوهر داشته باشد یا بی شوهر باشد خواست آن زن بر او حلال می گردد و بر غیر او حرام است ولو شوهر آن زن باشد.

مهلت شيطان تا چه موقع است ؟



اعوذ بالله من الشیطان الرجیم

بسم الله الرحمن الرحیم

مهلت شيطان تا چه موقع است ؟


- اين كه تا چه زمان شيطان زنده خواهد ماند؟ كى ميرد؟ به دست چه كسى كشته مى شود؟ رواياتى وارد شده و احتمالاتى داده اند كه از اين قراراند:

1. مهلت او تا روز قيامت است ؛
اين احتمال درست نيست .

2. تا روز آخر دنيا.
همان روزى كه خورشيد و ماه و ستارگان تاريك مى شوند و كوه ها مانند پشم زده شده ، روان مى گردند و درياها مانند آتش خروشان شعله ور مى شوند و تمام جن و انس و ملائكه مى ميرند.

3. مهلت او ميان نفخه اول و دوم است ؛
نفخه اول وقتى است كه اسرافيل در صور مى دمد و همه موجودات جهان يك مرتبه از بين مى روند. نفخه دوم آن وقتى است كه اسرافيل در صور مى دمد و همه خلايق دو مرتبه زنده مى شوند. مهلت شيطان در ميان اين دو نفخه تمام مى شود .

4. تا زمان ظهور حضرت مهدى (عج ) و به دست آن حضرت كشته مى شود.

5. تا زمان رجعت ؛
از زمان آمدن حضرت مهدى (عج ) شروع مى شود؛ پيامبر و ائمه معصوم عليه السلام دوباره رجوع مى كنند و به دنيا برمى گردند، آن وقت شيطان مى ميرد. و مدت معلومى كه قرآن بيان مى كند - همان رجعت است - كه عزرائيل جان او را مى گيرد و به زندگيش خاتمه مى دهد.
وارد شده كه در زمان رجعت ، خداوند به (ملك الموت ) مى فرمايد: جان ابليس را قبض كن كه عمر او به سر آمده و سختى ، تلخى و مستى جان كندن را كه به اولين و آخرين افراد چشاندى به او تنها بچشان . و نيز مى فرمايد:
(اى ملك الموت !) اول وارد دوزخ شو و هفتاد زبانيه با هفتاد زنجير و هفتاد كاسه از آب لظى (كه همان آبهاى جهنمى سوزان است ) با هفتاد هزار از سگ هاى جهنمى را بردار و با سخت ترين شكلى جان او را بگير.
عزرائيل هم با صورتى كه اگر اهل زمين او را با آن صورت ببينند، از ترس و وحشت ، تمام آنان قالب تهى مى كنند و مى ميرند، و به همان شكلى كه ماءمور است نازل مى شود.
شيطان وقتى او را به آن هيبت مشاهده مى كند به مشرق فرار مى كند، عزرائيل را همان جا مى بيند! به طرف مغرب مى گريزد، او را حاضر مى بيند، به دريا مى رود، باز او را همان جا مشاهده مى كند؛ در اين زمان ، (ملك الموت ) بر او بانگ مى زند كه : اى ملعون ! بايست ؛ باز فرار مى كند و مى آيد بر سر قبر آدم عليه السلام و مى گويد: اى آدم ! من به واسطه تو رانده شدم و طوق لعنت برگردنم افتاد. عزرائيل به آن سگ هاى جهنمى و ملائكه غلاظ و شداد دستور مى دهد كه بر او حمله كنند. سگ ها بر او حمله مى كنند و اطراف او را مى گيرند. ملائكه با گرزهاى آتشين بر مغز او مى كوبند تا جان خبيث و پليد او را بگيرند و به زندگى پر از مكر، فريب و كبر او پايان دهند.

قاتل شيطان كيست ؟

در روايات ديگرى وارد شده كه : شيطان به مرگ طبيعى از دنيا نمى رود، بلكه او را مى كشند و در آخرالزمان كشته مى شود. حال چه كسى او را مى كشد، اختلاف است . بعضى از روايات مى گويند: امام زمان (عج ) وقتى ظهور كند آن ملعون را مى كشد. امام صادق عليه السلام فرمودند: وقتى قائم ما قيام كند، مى آيد در مسجد كوفه شيطان هم مى آيد و به زانو در مقابل آن حضرت قرار مى گيرد و مى گويد: واى از اين روز سختى كه در كمين من است . در اين موقع امام زمان (عج ) موهاى جلوى پيشانى او را مى گيرد و آن ملعون را گردن مى زند.
در بعضى از روايات وارد شده كه حضرت رسول كشنده شيطان است . امام صادق عليه السلام فرمود: (شيطان در زمان رجعت روى صخره بيت المقدس به دست حضرت رسول صلى الله عليه و آله كشته و ذبح مى شود).
نيز عبدالكريم خثعمى مى گويد: از امام صادق عليه السلام شنيدم كه فرمود: (وقتى شيطان گفت : خدايا! مرا مهلت ده تا روز قيامت ، قبول نكرد و در جواب آن ملعون فرمود: تو را مهلت مى دهم تا وقت معلوم عليه السلام . و مراد از آن وقت ، هنگام رجعت اميرالمؤمنين عليه السلام به دنيا است ).
عبدالكريم گويد: از حضرت پرسيدند: آيا براى آن حضرت رجعتى است ؟ فرمود: بلى ، هيچ امامى نيست ، مگر آن كه در قوت رجعت آن امام ، مؤمن و كافر اهل زمانش با او برمى گردند. تا مؤمنان را بر كافران غالب و پيروز گردانند.
وقتى اميرالمؤمنين عليه السلام با اصحاب خود رجوع نمايد، شيطان هم با لشكرش حاضر شوند و وعده گاه جنگ آنها در زمين (روحا) كه از زمين فرات و در نزديكى كوفه است ، مى باشد.
پس اين دو لشكر مى جنگند، به طورى كه تا آن زمان چنان كشتارى انجام نشده باشد. آن گاه امام صادق عليه السلام فرمود: گويا اصحاب اميرالمؤمنين عليه السلام را مى بينم كه به پشت برگشته اند و از شدت و سختى جنگ صد قدم به عقب رفته اند و گويا آنها را نگاه مى كنيم كه پاهاى بعضى از آنها در آب فرات رفته است .
در اين هنگام ملائكه خشم الهى از پشت آب ها فرو مى آيند و جنگ به حضرت رسول صلى الله عليه و آله واگذار مى شود. آن حضرت در جلوى لشكر و حربه از نور در دست مبارك ايشان است ؛ چون شيطان نگاهش به آن حضرت بيفتد، پشت كرده و بگريزد. ياران او وقتى كه فرار او را مى بينند مى گويند: كجا مى روى و حال آن كه بر آنها غالبى ، در جواب گويد: من مى بينم آن چه را شما نمى بينيد. من از خداوند عالميان مى ترسم .
در اين هنگام ، حضرت رسول صلى الله عليه و آله به او حمله مى كند و ضربتى بين دو كتف او مى زند كه به همان ضربه نابود مى شود و لشكرش نيز هلاك خواهند شد. بعد از آن ، خداوند عالميان پرستش مى شود؛ در حالى كه براى او هيچ شريكى در روى زمين باقى نمى ماند و عبادات همه خالصانه است . آن گاه اميرالمؤمنين عليه السلام در زمين چهل و چهار هزار سال پادشاهى مى كند. و عمرها طولانى مى گردد به طورى كه از هر انسانى هزار اولاد به وجود مى آيد .


شيطان به آسمان مى رود ؟
در ادامه مطلب مقاله





شيطان به آسمان مى رود ؟

گفتيم كه شيطان از طايفه جن بود، و قرآن هم اين مطلب را با صراحت بيان مى كند و مى فرمايد:

و اذا قلنا للملائكة اسجدوا لادم ، فسجدوا الا ابليس كان من الجن ففسق عن امر ربه ؛
اى رسول ما (ياد كن وقتى را كه به ملائكه گفتيم : بر آدم سجده كنيد، همه سجده كردند جز ابليس ، كه او از جن بود، و بدين روى از اطاعت خداى خود سرپيچى نمود و سجده نكرد.)

او مدتى از عمر خود را در ميان جن سپرى كرده و با آنان معاشر بوده ، تا وقتى كه فتنه و فساد، كشت و كشتار در ميان آنان برپا شد.
در اين هنگام خداوند اراده كرد كه آنان را نابود فرمايد: عده اى از ملائكه را فرستاد تا با شمشيرهاى خود با آنها جنگيدند و همه آنها را كشتند. در اين ميان ، شيطان جان سالم به در برد و از مرگ نجات پيدا كرد و به دست ملائكه اسير شد. به فرشتگان گفت : من ، از جمله مؤمنان هستم (و در فتنه و فساد شركت نداشتم .) شما تمام خويشان و هم نوعان مرا كشتيد و من تنها ماندم . مرا با خودتان به آسمان ببريد، تا در آن جا با شما باشم و خداى خود را عبادت كنم .
فرشتگان از خداوند جوياى تكليف شدند. خداوند به آنها اجازه داد كه او را به آسمان ببرند. زمانى كه به آسمان رسيد به گردش در آسمان ها و بررسى پرداخت . در آن ميان لوحى را ديد كه چيزهايى بر آن نوشته شده ؛ مثلا نوشته بود:
(انى لا اضيع عمل عامل منكم . (بلا من عمل و اءراد الدنيا اعطاه الله منها و من عمل و اراد الاخرة بلع الله تعالى مناه ) و من يرد حرث الاخرة نزدله فى حرثه ما نشاء و من يرد حرث الدنيا نؤ ته منها و ماله فى الاخرة من خلاق

(من پاداش هيچ عمل كننده اى را ضايع نمى كنم ؛ بلى ، كسى كه كارى كند و اراده دنيا نمايد، خدا دنيا را به او مى بخشد و كسى كه آخرت را بخواهد، خداوند او را به آرزويش مى رساند. و كسى كه پاداش آخرت را بخواهد به او بركت مى دهيم و بر نتيجه اش مى افزاييم و آنها كه فقط مال دنيا را مى طلبند، كمى از آن به آنها مى دهيم ، اما در آخرت هيچ نصيبى ندارند).

پيش خود فكر كرد كه آخرت نسيه و دنيا نقد است . تصميم گرفت دنيا را به وسيله عبادت هاى طولانى به دست آورد. لذا در ميان ملائكه آن قدر عبادت كرد تا سرور و رئيس همه فرشتگان شد و طاووس ملائكه نام گرفت ! بر منبرى مى نشست و ملائكه در مقابل او با احترام مى ايستادند. وقتى فهميد با اين عبادت ها مى تواند دنيا را جست و جو كند؛ از اين رو، آن چه در قلب سياه خود پنهان داشت آشكار ساخت و ادعا نمود من از آدم برترم و در برابر او به خاك نخواهم افتاد!

توصیف قرآن در قرآن

توصیف قرآن در قرآن

کتاب آسمانی قرآن به اذعان تمام قرآن شناسان جهان (اعم از مؤمن و کافر)، کتاب شگفت انگیزی است. بسیاری، در مورد آن مطالبی گفته و سعی کردهاند آن را به نوعی در حد فهم خود تمجید و توصیف و حتی تبیین کنند. اما مسلماً هیچ یک به واقعیت و روشنی توصیفی خود قرآن از خویش نیست. واژه قرآن حدود 58 بار در آیات آن ذکر شده است و علاوه بر این در آیات متعددی نیز از قرآن با نامهای دیگری توصیف شده است که خود اشاره به جلوه­های متفاوتی از ماهیت ژرف قرآن دارد. در این آیات، صفات متعددی برای قرآن ذکر شده است که هر کدام بیان کننده کارکرد خاصی آن در حیات انسانی میباشد. از جمله:

- قرآن هدایت کننده مردم می باشد (بقره:185) و این هدایت با بهترین و پایدارترین شیوه ارائه شده است(اسراء:9)؛

- قرآن نازل شده از (خداوند) حکیم و ستوده است (فصلت:42)؛

- قرآن تبیین کننده همه چیزهاست (نحل:89) چون از علم خدا نازل شده است (هود: 14) آن کتاب پرحکمت است (یس:2)؛

- قرآن یادآوری کننده فطریات انسان است (تکویر:27)؛

- قرآن شفاء دهند قلوب مؤمنین است (اسراء:82)؛

- قرآن رحمت الهی و تجلی از لطف خداوند است (اسراء:82)؛

- قرآن کتابی منحصر به فرد و بی مانند است (اسراء:88)؛

- قرآن کتاب با کرامت است (واقعه:77)؛

- قرآن یک دست و بدون اختلاف و اعوجاج است.(نساء:82).

و صفاتی دیگری مانند «نور»، «حُبلُ الله»(ریسمان خداوند)، «مجید»(با شکوه)، «کتاب عزیز»(کتاب محترم) «مبین» (روشن گر) و امثال آن، که هر یک دلالت بر وجهی از ذات بابرکت قرآن برای انسان دارد.

زنده گی نامه حضرت محمد "ص"


زنده گی نامه حضرت محمد مصطفی (ص) سرور کائنات:
نام: محمد بن عبد الله در تورات و برخى كتب آسمانى «احمد» نامیده شده است. آمنه، دختر وهب، مادر حضرت محمد (ص) پیش از نامگذارىِ فرزندش توسط عبدالمطلب به محمّد، وى را «احمد» نامیده بود.كنیه: ابوالقاسم و ابوابراهیم.القاب: رسول اللّه، نبى اللّه، مصطفى، محمود، امین، امّى، خاتم، مزّمل، مدّثر، نذیر، بشیر، مبین، كریم، نور، رحمت، نعمت، شاهد، مبشّر، منذر، مذكّر، یس، طه‏ و... .منصب: آخرین پیامبر الهى، بنیان‏گذار حكومت اسلامى و نخستین معصوم در دین مبین اسلام.تاریخ ولادت: روز جمعه، هفدهم ربیع الاول عام الفیل برابر با سال 570 میلادى (به روایت شیعه). بیشتر علماى اهل سنّت تولد آن حضرت را روز دوشنبه دوازدهم ربیع الاول آن سال دانسته‏اند.عام الفیل، همان سالى است كه ابرهه، با چندین هزار مرد جنگى از یمن به مكه یورش آورد تا خانه خدا (كعبه) را ویران سازد و همگان را به مذهب مسیحیت وادار سازد؛ اما او و سپاهیانش در مكه با تهاجم پرندگانى به نام ابابیل مواجه شده، به هلاكت رسیدند و به اهداف شوم خویش نایل نیامدند. آنان چون سوار بر فیل بودند، آن سال به سال فیل (عام الفیل) معروف گشت.محل تولد: مكه معظمه، در سرزمین حجاز (عربستان سعودى كنونى).نسب پدرى: عبدالله بن عبدالمطلب (شیبة الحمد) بن هاشم (عمرو) بن عبدمناف بن قصّى بن كلاب بن مرّة بن كعب بن لوىّ بن غالب بن فهر بن مالك بن نضر (قریش) بن كنانة بن خزیمة بن مدركة بن الیاس بن مضر بن نزار بن معد بن عدنان.از پیامبر اسلام(ص) روایت شده است كه هرگاه نسب من به عدنان رسید، همان جا نگاه دارید و از آن بالاتر نروید. اما در كتاب‏هاى تاریخى، نسب آن حضرت تا حضرت آدم(ع) ثبت و ضبط شده است كه فاصله بین عدنان تا حضرت اسماعیل، فرزند ابراهیم خلیل الرحمن(ع) به هفت پشت مى‏رسد.مادر: آمنه، دختر وهب بن عبد مناف.این بانوى جلیل القدر، در طهارت و تقوا در میان بانوان قریشى، كم‏نظیر و سرآمد همگان بود. وى پس از تولد حضرت محمّد(ص) دو سال و چهارماه و به روایتى شش سال زندگى كرد و سرانجام، در راه بازگشت از سفرى كه به همراه تنها فرزندش، حضرت محمّد(ص) و خادمه‏اش، ام ایمن جهت دیدار با اقوام خویش عازم یثرب (مدینه) شده بود، در مكانى به نام «ابواء» بدرود حیات گفت و در همان جا مدفون گشت.و چون عبدالله، پدر حضرت محمد(ص) دو ماه (و به روایتى هفت ماه) پیش از ولادت فرزندش از دنیا رفته بود، كفالت آن حضرت را جدش، عبدالمطلب به عهده گرفت. نخست وى را به ثویبه (آزاد شده ابولهب) سپرد تا وى را شیر دهد و از او نگه‏دارى كند؛ اما پس از مدتى وى را به حلیمه، دختر عبدالله بن حارث سعدیه واگذار كرد. حلیمه گرچه دایه آن حضرت بود، اما به مدت پنج سال براى وى مادرى كرد.مدت رسالت و زمامدارى: از 27 رجب سال چهلم عام الفیل (610 میلادى)، كه در سن چهل سالگى به رسالت مبعوث شده بود، تا 28 صفر سال یازدهم هجرى، كه رحلت فرمود، به مدت 23 سال عهده‏دار امر رسالت و نبوت بود. آن حضرت علاوه بر رسالت، به مدت ده سال امر زعامت و زمامدارى مسلمانان را پس از مهاجرت به مدینه طیبه بر عهده داشت.تاریخ و سبب رحلت: دوشنبه 28 صفر، بنا به روایت بیشتر علماى شیعه و دوازدهم ربیع الاول بنا به قول اكثر علماى اهل سنّت، در سال یازدهم هجرى، در سن 63 سالگى، در مدینه بر اثر زهرى كه زنى یهودى به نام زینب در جریان نبرد خیبر به آن حضرت خورانیده بود. معروف است كه پیامبر اسلام(ص) در بیمارىِ وفاتش مى‏فرمود: این بیمارى از آثار غذاى مسمومى است كه آن زن یهودى پس از فتح خیبر براى من آورده بود.محل دفن: مدینه مشرفه، در سرزمین حجاز (عربستان سعودى كنونى) در همان خانه‏اى كه وفات یافته بود. هم اكنون مرقد مطهر آن حضرت، در مسجد النبى قرار دارد. همسران:
1. خدیجه بنت خویلد.
2. سوده بنت زمعه.
3. عایشه بنت ابى بكر.
4. امّ شریك بنت دودان.
5. حفصه بنت عمر.
6. ام حبیبه بنت ابى سفیان.
7. امّ سلمه بنت عاتكه.
8. زینب بنت جحش.
9. زینب بنت خزیمه.
10. میمونه بنت حارث.
11. جویریه بنت حارث.
12. صفیّه بنت حىّ بن اخطب فرزندان: الف) پسران: 1. قاسم. او پیش از بعثت پیامبر اكرم(ص) تولد یافت. از این رو پیامبر(ص) را ابوالقاسم نامیدند.
2. عبدالله. این كودك چون پس از بعثت به دنیا آمده بود، وى را «طیّب» و «طاهر» مى‏گفتند.
3. ابراهیم. او در اواخر سال هشتم هجرى متولد شد و در رجب سال دهم هجرى وفات یافت. عبدالله و قاسم از خدیجه كبرى (س) و ابراهیم از ماریه قبطیه متولد شدند. وهرسه آنان در سنین كودكى از دنیا رفتند.ب) دختران:1. زینب (س). 2. رقیه (س). 3. ام كلثوم (س). 4. فاطمه زهرا (س).دختران پیامبر اسلام (ص) همگى از حضرت خدیجه(س) متولد شدند و تمام فرزندان رسول خدا(ص) جز فاطمه زهرا (س) پیش از رحلت آن حضرت، از دنیا رفته بودند. تنها فرزندى كه از آن حضرت در زمان رحلتش باقى مانده بود، فاطمه زهرا(س)، آخرین دختر وى بود. این بانوى مكرّمه، افتخار بانوان عالم، بلكه همه انسان‏ها و مورد تقدیس و تكریم فرشتگان عرشى است. همو است كه مادر سبطین و امّ الأئمة المعصومین(ع) است.گرچه پیامبر اسلام(ص) به تمام خاندان مؤمن خویش علاقه‏مند بود، اما در میان همسرانش بیش از همه، به خدیجه كبرى (س) و در میان فرزندانش بیش از همه، به فاطمه زهرا (س) علاقه‏مند بوده و اظهار محبت و لطف مى‏فرمود. برگرفته شده از كتاب " خاندان عصمت علیهم السلام

کمپیوتر

کمپیوتر

از تظر   لغت : کمپیوتراز کلمه لاتین گرفته شده که به معنی حساب کردن میباشد پس کمپیوتر به معنی محاسب یا حساب کننده افاده میگردد. کمپیوتر یک ماشین برقی یا الکترونیکی electronic میباشد که قادر به عملیات ذهنی و دماغی در وقت کم میباشد و میتواند معلومات یا information or data را در خود ثبت یا  save نماید و دوباره به دسترس ما قراربدهد وبصورت عموم کمپیوتر دارای دو بخش عمده و اساسی میباشد .

1 Soft ware:  نرم افزار

2. .Hard ware:  سخت افزار

1.    : Soft wareیعنی پروگرام ها، به این معنی که تنها میتوان آنرا مشاهده کرد بلکه نمیتوان به آن تماس گرفت.

 

Hard ware: 2: آن بخش کمیوتر را گویند که قابلیت تماس را دارا بوده و قابل دید می باشد.                                                          

 

 

 

تاریخچه کمپیوتر

 

قبل از آنکه مفکوره کمپیوتر به میان بیاید مردم چین در زمان قدیم برای محاسبه ها از چوتها و یا Abacus  استفاده مینمودند به همین ترتیب با گذشت زمان مردم امریکا تا سر شماری قاره خویش را آغاز نمایند لیکن شمارش یک شهر که New York  نام دارد مدت طولانی را در بر گرفت در این وقت یک عالم انگلیسی بنام Charles طی سالهای 1792 الی1871   در پوهنتون Cambridge  ماشین را طرح نمود و نام آنرا Different Engine  گذاشت جنگ جهانی دوم باعث تکامل جدی وسایل و تکنالوجی گردید.

گروه مشخص از کمپنی      IBM (International Business Machine) در سال 1946  ماشین حساب برقی بزرگتر را ساختن بنام Mark Harvard I  یاد میشود و همجنان در همین سال ماشین حساب الکترونیکی دیگر که اساس تکنالوجی آنرا تیوب های برقی تشکیل میداد ساخته شد که تاریخ انکشاف کمپیوتر را به نسل های بعدی کمپیوتر ارتباط میدهد .

تا به حال چهار نوع کمپیوتر ها تکمیل شده است که مشخصات هر نوع به صورت جداگانه مربوط به اساس تکنالوجی کمپیوتر میباشد .(تیوب, ترانزستور( LIC , IC,  .

 

اساس تکنالوجی نوع اول کمپیوتر ها را تیوب های برقی تشکیل میداد که طی سال های 1953-1906  از این کمپیوتر استفاده میشداین کمپیوتر دارای حجم و وزن نهایت زیاد بود و مصرف انرژی قوی داشت از طرف دیگر سرعت عملیات حسابی و حافظهء شان قناعت بخش نبود.

مرحله جدید در انکشاف کمپیوتر تولید کمپیوتر های بود که اساس تکنالوجی آنرا نیمه هادی ها و وسائل مقناطیسی تشکیل میداد . این مرحله انکشاف کمپیوتر ها را به نوع دوم کمپیوتر ها ارتباط میدهند.

در اواخر دهه 50 و اوایل دهه 60  ترانزستور ها که نسبت به تیوب های الکترونیکی دارای وزن ، حجم و مصرف انرژی کم و سرعت اجرای عمل و مدت حیات آن قناعت بخش بود تولید گردید .

نوع سوم کمپیوتر ها در اواخر دهه 60 روی کار گرفته شد که اساس تکنالوجی آنرا IC (Integrated Circuit) تشکیل میداد. حجم و وزن IC نسبت به ترانزستور ها به مراتب کم بوده و دارای مدت حیات زیاد میباشد . با پیدا شدن نوع سوم کمپیوتر ها امکان آن میسر گردید تا کمپیوتر ها با هم مرتب گردند .

در سال 1975  تحول بزرگی در تخنیک صنعت کمپیوتر رونما گردید که در این سال Micro Processor  ساخته شد که اساس تکنالوجی آنرا Large Integrated Circuit , LIC   تشکیل میداد که این نوع چهارم کمپیوتر ها میباشد.

کمپیوتر های نوع چهارم قدرت اجرای صد ملیون عملیات را فی سانیه می باشند.

 

Digital Computers

 

در این نوع کمپیوتر ها که فعلاً استفاده زیاد از آنهاصورت میگیرد کار ذریعه منطق های ریاضی را صورت میپذیرذ یعنی کار ذریعه اعداد باندری انجام میپذیرد .

کمپیوتر های نوع دیجیتل را نظر به ظرفیت کار شان به چهار دسته تقسیم کرده اند .

                                                                              1. Micro Computers

2. Mini Computers

3. Mainframe Computers

4. Super Computers

                                                                                                            . Micro Computer .1  

یکی از مشهورترین کمپیوتر دیجیتل در جهان بوده و این نوع کمپیوتر ها حجم کوچک داشته به آسانی قابل انتقال میباشد و به نام کمپیوتر جیبی نیز مسمی میباشد و این کمپیوتر به نام PC  کمپیوتر نیز یاد میشود یعنیPersonal Computer

 

 (Personal Digital Assistance)PDA

 

1.    Lap Top Computer.

2.    Palm Top Computer.

3.    Disk Top Computer.

4.    Hand Held Computer.

 

 

کمپیوتر Palm Top .

این نوع کمپیوتر ها بالای کف دست گذاشته و بعداً استفاده میشود که خصوصاً از این نوع کمپیوتر ها در بخش استخبارات زیاد استفاده میشود.

 البنته حافظه دایمی ندارد یعنی Hard Disk ندارد مگرتمام برنامه ها در (Rom) ثبت است وهر وختیکه بخواهیم یک برنامه را باز کنیم پس این کمپیوتر از حافظه برقی خود یعنی از (Ram)  استفاده می نماید

و سابق در کمپیوتر پام تاپ از Windows (CE) کارگرفته میشود.

 

کمیپیوتر Hand Held  .

این کمپیوتر یک نوع کمپیوتر Micro می باشد که مانند Palm Top بدست گرفته می شود

و بعدا" از آن استفاده می شود.

 

کمپیوتر Lap Top .

 

این نوع کمپیوتر ها همچنان نوع از کمپیوتر Micro می باشد که بالای ران پای گذاشته میشود

این کپیوتر ها دارای Charger مخصوص می باشد که همین حلت میتوانیم که این کمپیوتر را از یک جا به جای دیگر انتقال بدهیم یعنی این کمپیوتر را بنام Portable Computer یاد میکند.

 

کمپیوتر Desk Top.این کمپیوتر ها نوع از کمپیوتر Micro می باشد که باید در بک جای معین گذاشته شود و  به آن Power برق وصل باشد. و بسیار به مشکل می توانیم انرا از یکجا به جای دیگر انتقال دهیم

بنا" Portable نمی باشد.

 

. Mini Computer .2

 

این  کمپیوتر ها نوع از کمپیوتر های Digital بوده و نسبت به کمپیوتر Micro بزدگتر می باشد و همچنان حافظه اش نظر به کمپیوتر Micro زیاد تر و قوی تر می باشد.و به تعداد  1الِِی 16 نفر می تواند از این استفاده کند.

 

: Mainframe Computers .3 

 

 این نوع کمپیوتر ها دارای سرعت عمل زیاد بوده فعالیت های مهم و زیاد را انجام میدهد . در شفاخانه ها ، مراکز تحقیقاتی ، لابراتوار ها ، پیش بینی اوضاع جوی ، هوا شناسی ، صفینه های فضائی ، سیستم مخابراتی ، نفوس شماری و غیره مراکز عام المنفعه از این نوع کمپیوتر ها استفاده زیاد بعمل میآید .

 

: Super Computers .4 

این نوع کمپیوتر ها دارای قیمت زیاد بوده و فعالیت های مغلق را انجام میدهد که سیستم اقمار مصنوعی ، سیستم بانکها ، انکشافات علمی ، تحقیقات هستوی ، مسائل اقتصادی و غیره قسمت ها میتوان از این نوع کمپیوتر ها استفاده موثر نمود.

By: MOA

مهمترین میانبر ها در ویندوز

مهمترین میانبر ها در ویندوز 

ویندوز هفت تعداد زیادی میانبر های صفحه کلید معرفی کرده است که برای کسانیکه که زیاد با کامپیوتر سر و کار دارند و می خواهند سریع تر کار های خود را انجام دهند می تواند بسیار مفید باشد از طرفی تعداد زیاد این میانبر ها هم خود مشکل ساز شده است و پیدا کردن میانبر های مفید کمی سخت شده است. به همین منظور لیستی از مهمترین آنها را در اختیار خوانندگان عزیز یاد بگیر دات کام قرار می دهیم.

 

میانبر های راهبردی ویندوز

1.    [Win+M]همه پنجره های باز را مخفی می کند

2.    [Win+Shift+M]همه پنجره های مخفی را باز می کند

3.    [Win+D] :- نمایش دسکتاپ

4.    [Windows+Up]پنجره را به بزرگترین اندازه نمایش می دهد

5.    [Windows+Down]پنجره را مخفی می کند /دوباره نمایش می دهد

6.    [Windows+Left]پنجره را به سمت چپ هدایت می کند

7.    [Windows+Right]پنجره را به سمت راست هدایت می کند

8.    [Windows+Shift Up]پنجره را از طول به میزان حداکثر باز می کند

9.    [Windows+Shift Down]طول پنجره را به اندازه قبلی باز می گرداند

10.                       [Windows+Shift Left]پنجره را به مانیتور سمت چپ هدایت می کند

11.                       [Windows+Shift Right]پنجره را به مانیتور سمت راست هدایت می کند

12.                       [Win+Spacebar]یک لحظه دسکتاپ را نمایش می دهد

13.                       [Win+Home]همه پنجره ها را مخفی می کند دوباره در بزرگ می کند

14.                       [Alt+F4] - پنجره فعال را می بندد

15.                       [Alt+Tab] - می توانید با این میانبر بین پنجره ها و برنامه های فعال ویندوز جابجا شوید

16.                       [Alt+Esc]بین همه پنجره های فعال می چرخد

17.                       [Win+Tab]- چرخش سه بعدی

 میانبر های مربوط بهTaskbar

1.    [Win+Any number (1, 2, 3, .., 0)]با توجه به شماره برنامه موجود در Taskbar را اجرا می کند

2.    [Ctrl+کلیک روی یکی از آیتم های Taskbar  ]می توانید از بین آنها برنامه مورد نظر خود را باز کنید

3.    [Shift+کلیک روی یکی از آیتم های Taskbar] -پنجره جدیدی از برنامه مورد نظر را باز می کند.

4.    [Ctrl+Shift+کلیک روی یکی از آیتم های Taskbar]پنجره جدیدی را به عنوان کاربر اصلی باز می کند

5.    [Shift+کلیک سمت راست روی ایکون]منوی معروف restore minimize ,.. را باز می کند

6.    [Win+T]بین برنامه های موجود در Taskbar  می چرخد

7.    [Win+Shift+T]معکوس عمل بالا را انجام می دهد

8.    [Win+R] - پنجره RUN را باز می کند

 

عمومی

1.    [Win+P]نمایش وضعیت حالت ارائه سمینار و انتخاب های بیشتر برای آن

2.    [Win+G]نمایش ابزار های (gadgets) دسکتاپ

3.    [Win+L]قفل کردن کامپیوتر

4.    [Win+X] - مرکز حمل و نقل

5.    [Win++] - بزرگنمایی

6.    [Win+-]کوچکنمایی

7.    [Win+=]درشتنمایی

 

میانبر های مربوط به Windows Explorer

1.    [Alt+P] - نمایش و مخفی کردن حالت شیشه ای

2.    [Alt+Up] - در صفحات یک پله بالاتر می رود

3.    [Alt+Left/Right] - جلو و عقب رفتن در صفحات

 

 

                                                                   www.OsmanArrib.blogfa.com

 

by: MOA

What is Operating system?i

Operating systemAn operating system (OS) is a collection of software that manages computer hardware resources and provides common services for computer programs. The operating system is a vital component of the system software in a computer system. Application programs usually require an operating system to function.

Time-sharing operating systems schedule tasks for efficient use of the system and may also include accounting for cost allocation of processor time, mass storage, printing, and other resources.

For hardware functions such as input and output and memory allocation, the operating system acts as an intermediary between programs and the computer hardware,[1][2] although the application code is usually executed directly by the hardware and will frequently make a system call to an OS function or be interrupted by it. Operating systems can be found on almost any device that contains a computer—from cellular phones and video game consoles to supercomputers and web servers.

Examples of popular modern operating systems include Android, BSD, iOS, Linux, Mac OS X, Microsoft Windows,[3] Windows Phone, and IBM z/OS. All these, except Windows and z/OS, share roots in UNIX.Contents [hide]
1 Types of operating systems
2 History
2.1 Mainframes
2.2 Microcomputers
3 Examples of operating systems
3.1 UNIX and UNIX-like operating systems
3.1.1 BSD and its descendants
3.1.1.1 OS X
3.1.2 Linux and GNU
3.1.2.1 Google Chrome OS
3.2 Microsoft Windows
3.3 Other
4 Components
4.1 Kernel
4.1.1 Program execution
4.1.2 Interrupts
4.1.3 Modes
4.1.4 Memory management
4.1.5 Virtual memory
4.1.6 Multitasking
4.1.7 Disk access and file systems
4.1.8 Device drivers
4.2 Networking
4.3 Security
4.4 User interface
4.4.1 Graphical user interfaces
5 Real-time operating systems
6 Operating system development as a hobby
7 Diversity of operating systems and portability
8 See also
9 References
10 Further reading
11 External links

[edit]
Types of operating systems This section does not cite any references or sources. Please help improve this section by adding citations to reliable sources. Unsourced material may be challenged and removed. (February 2012)

Real-time
A real-time operating system is a multitasking operating system that aims at executing real-time applications. Real-time operating systems often use specialized scheduling algorithms so that they can achieve a deterministic nature of behavior. The main objective of real-time operating systems is their quick and predictable response to events. They have an event-driven or time-sharing design and often aspects of both. An event-driven system switches between tasks based on their priorities or external events while time-sharing operating systems switch tasks based on clock interrupts.
Multi-user
A multi-user operating system allows multiple users to access a computer system at the same time. Time-sharing systems and Internet servers can be classified as multi-user systems as they enable multiple-user access to a computer through the sharing of time. Single-user operating systems have only one user but may allow multiple programs to run at the same time.
Multi-tasking vs. single-tasking
A multi-tasking operating system allows more than one program to be running at a time, from the point of view of human time scales. A single-tasking system has only one running program. Multi-tasking can be of two types: pre-emptive and co-operative. In pre-emptive multitasking, the operating system slices the CPU time and dedicates one slot to each of the programs. Unix-like operating systems such as Solaris and Linux support pre-emptive multitasking, as does AmigaOS. Cooperative multitasking is achieved by relying on each process to give time to the other processes in a defined manner. 16-bit versions of Microsoft Windows used cooperative multi-tasking. 32-bit versions of both Windows NT and Win9x, used pre-emptive multi-tasking. Mac OS prior to OS X used to support cooperative multitasking.
Distributed
Further information: Distributed system
A distributed operating system manages a group of independent computers and makes them appear to be a single computer. The development of networked computers that could be linked and communicate with each other gave rise to distributed computing. Distributed computations are carried out on more than one machine. When computers in a group work in cooperation, they make a distributed system.
Embedded
Embedded operating systems are designed to be used in embedded computer systems. They are designed to operate on small machines like PDAs with less autonomy. They are able to operate with a limited number of resources. They are very compact and extremely efficient by design. Windows CE and Minix 3 are some examples of embedded operating systems.
[edit]
History
Main article: History of operating systems
See also: Resident monitor

Early computers were built to perform a series of single tasks, like a calculator. Operating systems did not exist in their modern and more complex forms until the early 1960s.[4] Basic operating system features were developed in the 1950s, such as resident monitor functions that could automatically run different programs in succession to speed up processing. Hardware features were added that enabled use of runtime libraries, interrupts, and parallel processing. When personal computers became popular in the 1980s, operating system were made for them similar in concept to those used on larger computers.

In the 1940s, the earliest electronic digital systems had no operating systems. Electronic systems of this time were programmed on rows of mechanical switches or by jumper wires on plug boards. These were special-purpose systems that, for example, generated ballistics tables for the military or controlled the printing of payroll checks from data on punched paper cards. After programmable general purpose computers were invented, machine languages (consisting of strings of the binary digits 0 and 1 on punched paper tape) were introduced that sped up the programming process (Stern, 1981).

OS/360 was used on most IBM mainframe computers beginning in 1966, including the computers that helped NASA put a man on the moon.

In the early 1950s, a computer could execute only one program at a time. Each user had sole use of the computer for a limited period of time and would arrive at a scheduled time with program and data on punched paper cards and/or punched tape. The program would be loaded into the machine, and the machine would be set to work until the program completed or crashed. Programs could generally be debugged via a front panel using toggle switches and panel lights. It is said that Alan Turing was a master of this on the early Manchester Mark 1 machine, and he was already deriving the primitive conception of an operating system from the principles of the Universal Turing machine.[4]

Later machines came with libraries of programs, which would be linked to a user's program to assist in operations such as input and output and generating computer code from human-readable symbolic code. This was the genesis of the modern-day computer system. However, machines still ran a single job at a time. At Cambridge University in England the job queue was at one time a washing line from which tapes were hung with different colored clothes-pegs to indicate job-priority.[citation needed]
[edit]
Mainframes
Main article: Mainframe computer
See also: History of IBM mainframe operating systems

Through the 1950s, many major features were pioneered in the field of operating systems, including batch processing, input/output interrupt, buffering, multitasking, spooling, runtime libraries, link-loading, and programs for sorting records in files. These features were included or not included in application software at the option of application programmers, rather than in a separate operating system used by all applications. In 1959 the SHARE Operating System was released as an integrated utility for the IBM 704, and later in the 709 and 7090 mainframes, although it was quickly supplanted by IBSYS/IBJOB on the 709, 7090 and 7094.

During the 1960s, IBM's OS/360 introduced the concept of a single OS spanning an entire product line, which was crucial for the success of the System/360 machines. IBM's current mainframe operating systems are distant descendants of this original system and applications written for OS/360 can still be run on modern machines.[citation needed]

OS/360 also pioneered the concept that the operating system keeps track of all of the system resources that are used, including program and data space allocation in main memory and file space in secondary storage, and file locking during update. When the process is terminated for any reason, all of these resources are re-claimed by the operating system.

The alternative CP-67 system for the S/360-67 started a whole line of IBM operating systems focused on the concept of virtual machines. Other operating systems used on IBM S/360 series mainframes included systems developed by IBM: COS/360 (Compatibility Operating System), DOS/360 (Disk Operating System), TSS/360 (Time Sharing System), TOS/360 (Tape Operating System), BOS/360 (Basic Operating System), and ACP (Airline Control Program), as well as a few non-IBM systems: MTS (Michigan Terminal System), MUSIC (Multi-User System for Interactive Computing), and ORVYL (Stanford Timesharing System).

Control Data Corporation developed the SCOPE operating system in the 1960s, for batch processing. In cooperation with the University of Minnesota, the Kronos and later the NOS operating systems were developed during the 1970s, which supported simultaneous batch and timesharing use. Like many commercial timesharing systems, its interface was an extension of the Dartmouth BASIC operating systems, one of the pioneering efforts in timesharing and programming languages. In the late 1970s, Control Data and the University of Illinois developed the PLATO operating system, which used plasma panel displays and long-distance time sharing networks. Plato was remarkably innovative for its time, featuring real-time chat, and multi-user graphical games. Burroughs Corporation introduced the B5000 in 1961 with the MCP, (Master Control Program) operating system. The B5000 was a stack machine designed to exclusively support high-level languages with no machine language or assembler, and indeed the MCP was the first OS to be written exclusively in a high-level language – ESPOL, a dialect of ALGOL. MCP also introduced many other ground-breaking innovations, such as being the first commercial implementation of virtual memory. During development of the AS400, IBM made an approach to Burroughs to licence MCP to run on the AS400 hardware. This proposal was declined by Burroughs management to protect its existing hardware production. MCP is still in use today in the Unisys ClearPath/MCP line of computers.

UNIVAC, the first commercial computer manufacturer, produced a series of EXEC operating systems. Like all early main-frame systems, this was a batch-oriented system that managed magnetic drums, disks, card readers and line printers. In the 1970s, UNIVAC produced the Real-Time Basic (RTB) system to support large-scale time sharing, also patterned after the Dartmouth BC system.

General Electric and MIT developed General Electric Comprehensive Operating Supervisor (GECOS), which introduced the concept of ringed security privilege levels. After acquisition by Honeywell it was renamed to General Comprehensive Operating System (GCOS).

Digital Equipment Corporation developed many operating systems for its various computer lines, including TOPS-10 and TOPS-20 time sharing systems for the 36-bit PDP-10 class systems. Prior to the widespread use of UNIX, TOPS-10 was a particularly popular system in universities, and in the early ARPANET community.

In the late 1960s through the late 1970s, several hardware capabilities evolved that allowed similar or ported software to run on more than one system. Early systems had utilized microprogramming to implement features on their systems in order to permit different underlying computer architectures to appear to be the same as others in a series. In fact most 360s after the 360/40 (except the 360/165 and 360/168) were microprogrammed implementations. But soon other means of achieving application compatibility were proven to be more significant.

The enormous investment in software for these systems made since 1960s caused most of the original computer manufacturers to continue to develop compatible operating systems along with the hardware. The notable supported mainframe operating systems include:
Burroughs MCP – B5000, 1961 to Unisys Clearpath/MCP, present.
IBM OS/360 – IBM System/360, 1966 to IBM z/OS, present.
IBM CP-67 – IBM System/360, 1967 to IBM z/VM, present.
UNIVAC EXEC 8 – UNIVAC 1108, 1967, to OS 2200 Unisys Clearpath Dorado, present.
[edit]
Microcomputers

PC-DOS was an early personal computer OS that featured a command line interface.

Mac OS by Apple Computer became the first widespread OS to feature a graphical user interface. Many of its features such as windows and icons would later become commonplace in GUIs.

The first microcomputers did not have the capacity or need for the elaborate operating systems that had been developed for mainframes and minis; minimalistic operating systems were developed, often loaded from ROM and known as monitors. One notable early disk operating system was CP/M, which was supported on many early microcomputers and was closely imitated by Microsoft's MS-DOS, which became wildly popular as the operating system chosen for the IBM PC (IBM's version of it was called IBM DOS or PC DOS). In the '80s, Apple Computer Inc. (now Apple Inc.) abandoned its popular Apple II series of microcomputers to introduce the Apple Macintosh computer with an innovative Graphical User Interface (GUI) to the Mac OS.

The introduction of the Intel 80386 CPU chip with 32-bit architecture and paging capabilities, provided personal computers with the ability to run multitasking operating systems like those of earlier minicomputers and mainframes. Microsoft responded to this progress by hiring Dave Cutler, who had developed the VMS operating system for Digital Equipment Corporation. He would lead the development of the Windows NT operating system, which continues to serve as the basis for Microsoft's operating systems line. Steve Jobs, a co-founder of Apple Inc., started NeXT Computer Inc., which developed the NEXTSTEP operating system. NEXTSTEP would later be acquired by Apple Inc. and used, along with code from FreeBSD as the core of Mac OS X.

The GNU Project was started by activist and programmer Richard Stallman with the goal of creating a complete free software replacement to the proprietary UNIX operating system. While the project was highly successful in duplicating the functionality of various parts of UNIX, development of the GNU Hurd kernel proved to be unproductive. In 1991, Finnish computer science student Linus Torvalds, with cooperation from volunteers collaborating over the Internet, released the first version of the Linux kernel. It was soon merged with the GNU user space components and system software to form a complete operating system. Since then, the combination of the two major components has usually been referred to as simply "Linux" by the software industry, a naming convention that Stallman and the Free Software Foundation remain opposed to, preferring the name GNU/Linux. The Berkeley Software Distribution, known as BSD, is the UNIX derivative distributed by the University of California, Berkeley, starting in the 1970s. Freely distributed and ported to many minicomputers, it eventually also gained a following for use on PCs, mainly as FreeBSD, NetBSD and OpenBSD.
[edit]
Examples of operating systems
[edit]
UNIX and UNIX-like operating systems

Evolution of Unix systems
Main article: Unix

Unix was originally written in assembly language.[5] Ken Thompson wrote B, mainly based on BCPL, based on his experience in the MULTICS project. B was replaced by C, and Unix, rewriten in C, developed into a large, complex family of inter-related operating systems which have been influential in every modern operating system (see History).

The UNIX-like family is a diverse group of operating systems, with several major sub-categories including System V, BSD, and Linux. The name "UNIX" is a trademark of The Open Group which licenses it for use with any operating system that has been shown to conform to their definitions. "UNIX-like" is commonly used to refer to the large set of operating systems which resemble the original UNIX.

Unix-like systems run on a wide variety of computer architectures. They are used heavily for servers in business, as well as workstations in academic and engineering environments. Free UNIX variants, such as Linux and BSD, are popular in these areas.

Four operating systems are certified by the The Open Group (holder of the Unix trademark) as Unix. HP's HP-UX and IBM's AIX are both descendants of the original System V Unix and are designed to run only on their respective vendor's hardware. In contrast, Sun Microsystems's Solaris Operating System can run on multiple types of hardware, including x86 and Sparc servers, and PCs. Apple's Mac OS X, a replacement for Apple's earlier (non-Unix) Mac OS, is a hybrid kernel-based BSD variant derived from NeXTSTEP, Mach, and FreeBSD.

Unix interoperability was sought by establishing the POSIX standard. The POSIX standard can be applied to any operating system, although it was originally created for various Unix variants.
[edit]
BSD and its descendants

The first server for the World Wide Web ran on NeXTSTEP, based on BSD.
Main article: Berkeley Software Distribution

A subgroup of the Unix family is the Berkeley Software Distribution family, which includes FreeBSD, NetBSD, and OpenBSD. These operating systems are most commonly found on webservers, although they can also function as a personal computer OS. The Internet owes much of its existence to BSD, as many of the protocols now commonly used by computers to connect, send and receive data over a network were widely implemented and refined in BSD. The world wide web was also first demonstrated on a number of computers running an OS based on BSD called NextStep.

BSD has its roots in Unix. In 1974, University of California, Berkeley installed its first Unix system. Over time, students and staff in the computer science department there began adding new programs to make things easier, such as text editors. When Berkely received new VAX computers in 1978 with Unix installed, the school's undergraduates modified Unix even more in order to take advantage of the computer's hardware possibilities. The Defense Advanced Research Projects Agency of the US Department of Defense took interest, and decided to fund the project. Many schools, corporations, and government organizations took notice and started to use Berkeley's version of Unix instead of the official one distributed by AT&T.

Steve Jobs, upon leaving Apple Inc. in 1985, formed NeXT Inc., a company that manufactured high-end computers running on a variation of BSD called NeXTSTEP. One of these computers was used by Tim Berners-Lee as the first webserver to create the World Wide Web.

Developers like Keith Bostic encouraged the project to replace any non-free code that originated with Bell Labs. Once this was done, however, AT&T sued. Eventually, after two years of legal disputes, the BSD project came out ahead and spawned a number of free derivatives, such as FreeBSD and NetBSD.
[edit]
OS X
Main article: OS X

The standard user interface of Mac OS X

Mac OS X is a line of open core graphical operating systems developed, marketed, and sold by Apple Inc., the latest of which is pre-loaded on all currently shipping Macintosh computers. Mac OS X is the successor to the original Mac OS, which had been Apple's primary operating system since 1984. Unlike its predecessor, Mac OS X is a UNIX operating system built on technology that had been developed at NeXT through the second half of the 1980s and up until Apple purchased the company in early 1997. The operating system was first released in 1999 as Mac OS X Server 1.0, with a desktop-oriented version (Mac OS X v10.0 "Cheetah") following in March 2001. Since then, six more distinct "client" and "server" editions of Mac OS X have been released, the most recent being OS X 10.8 "Mountain Lion", which was first made available on February 16, 2012 for developers, and was then released to the public on July 25, 2012. Releases of Mac OS X are named after big cats.

The server edition, Mac OS X Server, is architecturally identical to its desktop counterpart but usually runs on Apple's line of Macintosh server hardware. Mac OS X Server includes work group management and administration software tools that provide simplified access to key network services, including a mail transfer agent, a Samba server, an LDAP server, a domain name server, and others. In Mac OS X v10.7 Lion, all server aspects of Mac OS X Server have been integrated into the client version.[6]
[edit]
Linux and GNU
Main articles: GNU, Linux, and Linux kernel

Ubuntu, desktop Linux distribution

Android, a popular mobile operating system using the Linux kernel

Linux (or GNU/Linux) is a Unix-like operating system that was developed without any actual Unix code, unlike BSD and its variants. Linux can be used on a wide range of devices from supercomputers to wristwatches. The Linux kernel is released under an open source license, so anyone can read and modify its code. It has been modified to run on a large variety of electronics. Although estimates suggest that Linux is used on 1.82% of all personal computers,[7][8] it has been widely adopted for use in servers[9] and embedded systems[10] (such as cell phones). Linux has superseded Unix in most places[which?], and is used on the 10 most powerful supercomputers in the world.[11] The Linux kernel is used in some popular distributions, such as Red Hat, Debian, Ubuntu, Linux Mint and Google's Android.

The GNU project is a mass collaboration of programmers who seek to create a completely free and open operating system that was similar to Unix but with completely original code. It was started in 1983 by Richard Stallman, and is responsible for many of the parts of most Linux variants. Thousands of pieces of software for virtually every operating system are licensed under the GNU General Public License. Meanwhile, the Linux kernel began as a side project of Linus Torvalds, a university student from Finland. In 1991, Torvalds began work on it, and posted information about his project on a newsgroup for computer students and programmers. He received a wave of support and volunteers who ended up creating a full-fledged kernel. Programmers from GNU took notice, and members of both projects worked to integrate the finished GNU parts with the Linux kernel in order to create a full-fledged operating system.
[edit]
Google Chrome OS
Main article: Google Chrome OS

Chrome is an operating system based on the Linux kernel and designed by Google. Since Chrome OS targets computer users who spend most of their time on the Internet, it is mainly a web browser with no ability to run applications. It relies on Internet applications (or Web apps) used in the web browser to accomplish tasks such as word processing and media viewing, as well as online storage for storing most files.
[edit]
Microsoft Windows
Main article: Microsoft Windows

Bootable Windows To Go USB flash drive

Microsoft Windows 7 Desktop

Microsoft Windows is a family of proprietary operating systems designed by Microsoft Corporation and primarily targeted to Intel architecture based computers, with an estimated 88.9 percent total usage share on Web connected computers.[8][12][13][14] The newest version is Windows 8 for workstations and Windows Server 2012 for servers. Windows 7 recently overtook Windows XP as most used OS.[15][16][17]

Microsoft Windows originated in 1985 as an operating environment running on top of MS-DOS, which was the standard operating system shipped on most Intel architecture personal computers at the time. In 1995, Windows 95 was released which only used MS-DOS as a bootstrap. For backwards compatibility, Win9x could run real-mode MS-DOS[18][19] and 16 bits Windows 3.x[20] drivers. Windows Me, released in 2000, was the last version in the Win9x family. Later versions have all been based on the Windows NT kernel. Current versions of Windows run on IA-32 and x86-64 microprocessors, although Windows 8 will support ARM architecture. In the past, Windows NT supported non-Intel architectures.

Server editions of Windows are widely used. In recent years, Microsoft has expended significant capital in an effort to promote the use of Windows as a server operating system. However, Windows' usage on servers is not as widespread as on personal computers, as Windows competes against Linux and BSD for server market share.[21][22]
[edit]
Other

There have been many operating systems that were significant in their day but are no longer so, such as AmigaOS; OS/2 from IBM and Microsoft; Mac OS, the non-Unix precursor to Apple's Mac OS X; BeOS; XTS-300; RISC OS; MorphOS and FreeMint. Some are still used in niche markets and continue to be developed as minority platforms for enthusiast communities and specialist applications. OpenVMS formerly from DEC, is still under active development by Hewlett-Packard. Yet other operating systems are used almost exclusively in academia, for operating systems education or to do research on operating system concepts. A typical example of a system that fulfills both roles is MINIX, while for example Singularity is used purely for research.

Other operating systems have failed to win significant market share, but have introduced innovations that have influenced mainstream operating systems, not least Bell Labs' Plan 9.
[edit]
Components

The components of an operating system all exist in order to make the different parts of a computer work together. All user software needs to go through the operating system in order to use any of the hardware, whether it be as simple as a mouse or keyboard or as complex as an Internet component.
[edit]
Kernel

A kernel connects the application software to the hardware of a computer.
Main article: Kernel (computing)

With the aid of the firmware and device drivers, the kernel provides the most basic level of control over all of the computer's hardware devices. It manages memory access for programs in the RAM, it determines which programs get access to which hardware resources, it sets up or resets the CPU's operating states for optimal operation at all times, and it organizes the data for long-term non-volatile storage with file systems on such media as disks, tapes, flash memory, etc.
[edit]
Program execution
Main article: Process (computing)

The operating system provides an interface between an application program and the computer hardware, so that an application program can interact with the hardware only by obeying rules and procedures programmed into the operating system. The operating system is also a set of services which simplify development and execution of application programs. Executing an application program involves the creation of a process by the operating system kernel which assigns memory space and other resources, establishes a priority for the process in multi-tasking systems, loads program binary code into memory, and initiates execution of the application program which then interacts with the user and with hardware devices.
[edit]
Interrupts
Main article: Interrupt

Interrupts are central to operating systems, as they provide an efficient way for the operating system to interact with and react to its environment. The alternative — having the operating system "watch" the various sources of input for events (polling) that require action — can be found in older systems with very small stacks (50 or 60 bytes) but are unusual in modern systems with large stacks. Interrupt-based programming is directly supported by most modern CPUs. Interrupts provide a computer with a way of automatically saving local register contexts, and running specific code in response to events. Even very basic computers support hardware interrupts, and allow the programmer to specify code which may be run when that event takes place.

When an interrupt is received, the computer's hardware automatically suspends whatever program is currently running, saves its status, and runs computer code previously associated with the interrupt; this is analogous to placing a bookmark in a book in response to a phone call. In modern operating systems, interrupts are handled by the operating system's kernel. Interrupts may come from either the computer's hardware or from the running program.

When a hardware device triggers an interrupt, the operating system's kernel decides how to deal with this event, generally by running some processing code. The amount of code being run depends on the priority of the interrupt (for example: a person usually responds to a smoke detector alarm before answering the phone). The processing of hardware interrupts is a task that is usually delegated to software called device driver, which may be either part of the operating system's kernel, part of another program, or both. Device drivers may then relay information to a running program by various means.

A program may also trigger an interrupt to the operating system. If a program wishes to access hardware for example, it may interrupt the operating system's kernel, which causes control to be passed back to the kernel. The kernel will then process the request. If a program wishes additional resources (or wishes to shed resources) such as memory, it will trigger an interrupt to get the kernel's attention.
[edit]
Modes
Main articles: Protected mode and Supervisor mode

Privilege rings for the x86 available in protected mode. Operating systems determine which processes run in each mode.

Modern CPUs support multiple modes of operation. CPUs with this capability use at least two modes: protected mode and supervisor mode. The supervisor mode is used by the operating system's kernel for low level tasks that need unrestricted access to hardware, such as controlling how memory is written and erased, and communication with devices like graphics cards. Protected mode, in contrast, is used for almost everything else. Applications operate within protected mode, and can only use hardware by communicating with the kernel, which controls everything in supervisor mode. CPUs might have other modes similar to protected mode as well, such as the virtual modes in order to emulate older processor types, such as 16-bit processors on a 32-bit one, or 32-bit processors on a 64-bit one.

When a computer first starts up, it is automatically running in supervisor mode. The first few programs to run on the computer, being the BIOS or EFI, bootloader, and the operating system have unlimited access to hardware - and this is required because, by definition, initializing a protected environment can only be done outside of one. However, when the operating system passes control to another program, it can place the CPU into protected mode.

In protected mode, programs may have access to a more limited set of the CPU's instructions. A user program may leave protected mode only by triggering an interrupt, causing control to be passed back to the kernel. In this way the operating system can maintain exclusive control over things like access to hardware and memory.

The term "protected mode resource" generally refers to one or more CPU registers, which contain information that the running program isn't allowed to alter. Attempts to alter these resources generally causes a switch to supervisor mode, where the operating system can deal with the illegal operation the program was attempting (for example, by killing the program).
[edit]
Memory management
Main article: Memory management

Among other things, a multiprogramming operating system kernel must be responsible for managing all system memory which is currently in use by programs. This ensures that a program does not interfere with memory already in use by another program. Since programs time share, each program must have independent access to memory.

Cooperative memory management, used by many early operating systems, assumes that all programs make voluntary use of the kernel's memory manager, and do not exceed their allocated memory. This system of memory management is almost never seen any more, since programs often contain bugs which can cause them to exceed their allocated memory. If a program fails, it may cause memory used by one or more other programs to be affected or overwritten. Malicious programs or viruses may purposefully alter another program's memory, or may affect the operation of the operating system itself. With cooperative memory management, it takes only one misbehaved program to crash the system.

Memory protection enables the kernel to limit a process' access to the computer's memory. Various methods of memory protection exist, including memory segmentation and paging. All methods require some level of hardware support (such as the 80286 MMU), which doesn't exist in all computers.

In both segmentation and paging, certain protected mode registers specify to the CPU what memory address it should allow a running program to access. Attempts to access other addresses will trigger an interrupt which will cause the CPU to re-enter supervisor mode, placing the kernel in charge. This is called a segmentation violation or Seg-V for short, and since it is both difficult to assign a meaningful result to such an operation, and because it is usually a sign of a misbehaving program, the kernel will generally resort to terminating the offending program, and will report the error.

Windows 3.1-Me had some level of memory protection, but programs could easily circumvent the need to use it. A general protection fault would be produced, indicating a segmentation violation had occurred; however, the system would often crash anyway.
[edit]
Virtual memory
Main article: Virtual memory
Further information: Page fault

Many operating systems can "trick" programs into using memory scattered around the hard disk and RAM as if it is one continuous chunk of memory, called virtual memory.

The use of virtual memory addressing (such as paging or segmentation) means that the kernel can choose what memory each program may use at any given time, allowing the operating system to use the same memory locations for multiple tasks.

If a program tries to access memory that isn't in its current range of accessible memory, but nonetheless has been allocated to it, the kernel will be interrupted in the same way as it would if the program were to exceed its allocated memory. (See section on memory management.) Under UNIX this kind of interrupt is referred to as a page fault.

When the kernel detects a page fault it will generally adjust the virtual memory range of the program which triggered it, granting it access to the memory requested. This gives the kernel discretionary power over where a particular application's memory is stored, or even whether or not it has actually been allocated yet.

In modern operating systems, memory which is accessed less frequently can be temporarily stored on disk or other media to make that space available for use by other programs. This is called swapping, as an area of memory can be used by multiple programs, and what that memory area contains can be swapped or exchanged on demand.

"Virtual memory" provides the programmer or the user with the perception that there is a much larger amount of RAM in the computer than is really there.[23]
[edit]
Multitasking
Main articles: Computer multitasking and Process management (computing)
Further information: Context switch, Preemptive multitasking, and Cooperative multitasking

Multitasking refers to the running of multiple independent computer programs on the same computer; giving the appearance that it is performing the tasks at the same time. Since most computers can do at most one or two things at one time, this is generally done via time-sharing, which means that each program uses a share of the computer's time to execute.

An operating system kernel contains a piece of software called a scheduler which determines how much time each program will spend executing, and in which order execution control should be passed to programs. Control is passed to a process by the kernel, which allows the program access to the CPU and memory. Later, control is returned to the kernel through some mechanism, so that another program may be allowed to use the CPU. This so-called passing of control between the kernel and applications is called a context switch.

An early model which governed the allocation of time to programs was called cooperative multitasking. In this model, when control is passed to a program by the kernel, it may execute for as long as it wants before explicitly returning control to the kernel. This means that a malicious or malfunctioning program may not only prevent any other programs from using the CPU, but it can hang the entire system if it enters an infinite loop.

Modern operating systems extend the concepts of application preemption to device drivers and kernel code, so that the operating system has preemptive control over internal run-times as well.

The philosophy governing preemptive multitasking is that of ensuring that all programs are given regular time on the CPU. This implies that all programs must be limited in how much time they are allowed to spend on the CPU without being interrupted. To accomplish this, modern operating system kernels make use of a timed interrupt. A protected mode timer is set by the kernel which triggers a return to supervisor mode after the specified time has elapsed. (See above sections on Interrupts and Dual Mode Operation.)

On many single user operating systems cooperative multitasking is perfectly adequate, as home computers generally run a small number of well tested programs. The AmigaOS is an exception, having pre-emptive multitasking from its very first version. Windows NT was the first version of Microsoft Windows which enforced preemptive multitasking, but it didn't reach the home user market until Windows XP (since Windows NT was targeted at professionals).
[edit]
Disk access and file systems
Main article: Virtual file system

Filesystems allow users and programs to organize and sort files on a computer, often through the use of directories (or "folders")

Access to data stored on disks is a central feature of all operating systems. Computers store data on disks using files, which are structured in specific ways in order to allow for faster access, higher reliability, and to make better use out of the drive's available space. The specific way in which files are stored on a disk is called a file system, and enables files to have names and attributes. It also allows them to be stored in a hierarchy of directories or folders arranged in a directory tree.

Early operating systems generally supported a single type of disk drive and only one kind of file system. Early file systems were limited in their capacity, speed, and in the kinds of file names and directory structures they could use. These limitations often reflected limitations in the operating systems they were designed for, making it very difficult for an operating system to support more than one file system.

While many simpler operating systems support a limited range of options for accessing storage systems, operating systems like UNIX and Linux support a technology known as a virtual file system or VFS. An operating system such as UNIX supports a wide array of storage devices, regardless of their design or file systems, allowing them to be accessed through a common application programming interface (API). This makes it unnecessary for programs to have any knowledge about the device they are accessing. A VFS allows the operating system to provide programs with access to an unlimited number of devices with an infinite variety of file systems installed on them, through the use of specific device drivers and file system drivers.

A connected storage device, such as a hard drive, is accessed through a device driver. The device driver understands the specific language of the drive and is able to translate that language into a standard language used by the operating system to access all disk drives. On UNIX, this is the language of block devices.

When the kernel has an appropriate device driver in place, it can then access the contents of the disk drive in raw format, which may contain one or more file systems. A file system driver is used to translate the commands used to access each specific file system into a standard set of commands that the operating system can use to talk to all file systems. Programs can then deal with these file systems on the basis of filenames, and directories/folders, contained within a hierarchical structure. They can create, delete, open, and close files, as well as gather various information about them, including access permissions, size, free space, and creation and modification dates.

Various differences between file systems make supporting all file systems difficult. Allowed characters in file names, case sensitivity, and the presence of various kinds of file attributes makes the implementation of a single interface for every file system a daunting task. Operating systems tend to recommend using (and so support natively) file systems specifically designed for them; for example, NTFS in Windows and ext3 and ReiserFS in Linux. However, in practice, third party drives are usually available to give support for the most widely used file systems in most general-purpose operating systems (for example, NTFS is available in Linux through NTFS-3g, and ext2/3 and ReiserFS are available in Windows through third-party software).

Support for file systems is highly varied among modern operating systems, although there are several common file systems which almost all operating systems include support and drivers for. Operating systems vary on file system support and on the disk formats they may be installed on. Under Windows, each file system is usually limited in application to certain media; for example, CDs must use ISO 9660 or UDF, and as of Windows Vista, NTFS is the only file system which the operating system can be installed on. It is possible to install Linux onto many types of file systems. Unlike other operating systems, Linux and UNIX allow any file system to be used regardless of the media it is stored in, whether it is a hard drive, a disc (CD,DVD...), a USB flash drive, or even contained within a file located on another file system.
[edit]
Device drivers
Main article: Device driver

A device driver is a specific type of computer software developed to allow interaction with hardware devices. Typically this constitutes an interface for communicating with the device, through the specific computer bus or communications subsystem that the hardware is connected to, providing commands to and/or receiving data from the device, and on the other end, the requisite interfaces to the operating system and software applications. It is a specialized hardware-dependent computer program which is also operating system specific that enables another program, typically an operating system or applications software package or computer program running under the operating system kernel, to interact transparently with a hardware device, and usually provides the requisite interrupt handling necessary for any necessary asynchronous time-dependent hardware interfacing needs.

The key design goal of device drivers is abstraction. Every model of hardware (even within the same class of device) is different. Newer models also are released by manufacturers that provide more reliable or better performance and these newer models are often controlled differently. Computers and their operating systems cannot be expected to know how to control every device, both now and in the future. To solve this problem, operating systems essentially dictate how every type of device should be controlled. The function of the device driver is then to translate these operating system mandated function calls into device specific calls. In theory a new device, which is controlled in a new manner, should function correctly if a suitable driver is available. This new driver will ensure that the device appears to operate as usual from the operating system's point of view.

Under versions of Windows before Vista and versions of Linux before 2.6, all driver execution was co-operative, meaning that if a driver entered an infinite loop it would freeze the system. More recent revisions of these operating systems incorporate kernel preemption, where the kernel interrupts the driver to give it tasks, and then separates itself from the process until it receives a response from the device driver, or gives it more tasks to do.
[edit]
Networking
Main article: Computer network

Currently most operating systems support a variety of networking protocols, hardware, and applications for using them. This means that computers running dissimilar operating systems can participate in a common network for sharing resources such as computing, files, printers, and scanners using either wired or wireless connections. Networks can essentially allow a computer's operating system to access the resources of a remote computer to support the same functions as it could if those resources were connected directly to the local computer. This includes everything from simple communication, to using networked file systems or even sharing another computer's graphics or sound hardware. Some network services allow the resources of a computer to be accessed transparently, such as SSH which allows networked users direct access to a computer's command line interface.

Client/server networking allows a program on a computer, called a client, to connect via a network to another computer, called a server. Servers offer (or host) various services to other network computers and users. These services are usually provided through ports or numbered access points beyond the server's network address. Each port number is usually associated with a maximum of one running program, which is responsible for handling requests to that port. A daemon, being a user program, can in turn access the local hardware resources of that computer by passing requests to the operating system kernel.

Many operating systems support one or more vendor-specific or open networking protocols as well, for example, SNA on IBM systems, DECnet on systems from Digital Equipment Corporation, and Microsoft-specific protocols (SMB) on Windows. Specific protocols for specific tasks may also be supported such as NFS for file access. Protocols like ESound, or esd can be easily extended over the network to provide sound from local applications, on a remote system's sound hardware.
[edit]
Security
Main article: Computer security

A computer being secure depends on a number of technologies working properly. A modern operating system provides access to a number of resources, which are available to software running on the system, and to external devices like networks via the kernel.

The operating system must be capable of distinguishing between requests which should be allowed to be processed, and others which should not be processed. While some systems may simply distinguish between "privileged" and "non-privileged", systems commonly have a form of requester identity, such as a user name. To establish identity there may be a process of authentication. Often a username must be quoted, and each username may have a password. Other methods of authentication, such as magnetic cards or biometric data, might be used instead. In some cases, especially connections from the network, resources may be accessed with no authentication at all (such as reading files over a network share). Also covered by the concept of requester identity is authorization; the particular services and resources accessible by the requester once logged into a system are tied to either the requester's user account or to the variously configured groups of users to which the requester belongs.

In addition to the allow/disallow model of security, a system with a high level of security will also offer auditing options. These would allow tracking of requests for access to resources (such as, "who has been reading this file?"). Internal security, or security from an already running program is only possible if all possibly harmful requests must be carried out through interrupts to the operating system kernel. If programs can directly access hardware and resources, they cannot be secured.

External security involves a request from outside the computer, such as a login at a connected console or some kind of network connection. External requests are often passed through device drivers to the operating system's kernel, where they can be passed onto applications, or carried out directly. Security of operating systems has long been a concern because of highly sensitive data held on computers, both of a commercial and military nature. The United States Government Department of Defense (DoD) created the Trusted Computer System Evaluation Criteria (TCSEC) which is a standard that sets basic requirements for assessing the effectiveness of security. This became of vital importance to operating system makers, because the TCSEC was used to evaluate, classify and select trusted operating systems being considered for the processing, storage and retrieval of sensitive or classified information.

Network services include offerings such as file sharing, print services, email, web sites, and file transfer protocols (FTP), most of which can have compromised security. At the front line of security are hardware devices known as firewalls or intrusion detection/prevention systems. At the operating system level, there are a number of software firewalls available, as well as intrusion detection/prevention systems. Most modern operating systems include a software firewall, which is enabled by default. A software firewall can be configured to allow or deny network traffic to or from a service or application running on the operating system. Therefore, one can install and be running an insecure service, such as Telnet or FTP, and not have to be threatened by a security breach because the firewall would deny all traffic trying to connect to the service on that port.

An alternative strategy, and the only sandbox strategy available in systems that do not meet the Popek and Goldberg virtualization requirements, is the operating system not running user programs as native code, but instead either emulates a processor or provides a host for a p-code based system such as Java.

Internal security is especially relevant for multi-user systems; it allows each user of the system to have private files that the other users cannot tamper with or read. Internal security is also vital if auditing is to be of any use, since a program can potentially bypass the operating system, inclusive of bypassing auditing.
[edit]
User interface

A screenshot of the Bourne Again Shell command line. Each command is typed out after the 'prompt', and then its output appears below, working its way down the screen. The current command prompt is at the bottom.
Main article: Operating system user interface

Every computer that is to be operated by an individual requires a user interface. The user interface is usually referred to as a shell and is essential if human interaction is to be supported. The user interface views the directory structure and requests services from the operating system that will acquire data from input hardware devices, such as a keyboard, mouse or credit card reader, and requests operating system services to display prompts, status messages and such on output hardware devices, such as a video monitor or printer. The two most common forms of a user interface have historically been the command-line interface, where computer commands are typed out line-by-line, and the graphical user interface, where a visual environment (most commonly a WIMP) is present.
[edit]
Graphical user interfaces

A screenshot of the KDE Plasma Desktop graphical user interface. Programs take the form of images on the screen, and the files, folders (directories), and applications take the form of icons and symbols. A mouse is used to navigate the computer.

Most of the modern computer systems support graphical user interfaces (GUI), and often include them. In some computer systems, such as the original implementation of Mac OS, the GUI is integrated into the kernel.

While technically a graphical user interface is not an operating system service, incorporating support for one into the operating system kernel can allow the GUI to be more responsive by reducing the number of context switches required for the GUI to perform its output functions. Other operating systems are modular, separating the graphics subsystem from the kernel and the Operating System. In the 1980s UNIX, VMS and many others had operating systems that were built this way. Linux and Mac OS X are also built this way. Modern releases of Microsoft Windows such as Windows Vista implement a graphics subsystem that is mostly in user-space; however the graphics drawing routines of versions between Windows NT 4.0 and Windows Server 2003 exist mostly in kernel space. Windows 9x had very little distinction between the interface and the kernel.

Many computer operating systems allow the user to install or create any user interface they desire. The X Window System in conjunction with GNOME or KDE Plasma Desktop is a commonly found setup on most Unix and Unix-like (BSD, Linux, Solaris) systems. A number of Windows shell replacements have been released for Microsoft Windows, which offer alternatives to the included Windows shell, but the shell itself cannot be separated from Windows.

Numerous Unix-based GUIs have existed over time, most derived from X11. Competition among the various vendors of Unix (HP, IBM, Sun) led to much fragmentation, though an effort to standardize in the 1990s to COSE and CDE failed for various reasons, and were eventually eclipsed by the widespread adoption of GNOME and K Desktop Environment. Prior to free software-based toolkits and desktop environments, Motif was the prevalent toolkit/desktop combination (and was the basis upon which CDE was developed).

Graphical user interfaces evolve over time. For example, Windows has modified its user interface almost every time a new major version of Windows is released, and the Mac OS GUI changed dramatically with the introduction of Mac OS X in 1999.[24]
[edit]
Real-time operating systems
Main article: Real-time operating system

A real-time operating system (RTOS) is a multitasking operating system intended for applications with fixed deadlines (real-time computing). Such applications include some small embedded systems, automobile engine controllers, industrial robots, spacecraft, industrial control, and some large-scale computing systems.

An early example of a large-scale real-time operating system was Transaction Processing Facility developed by American Airlines and IBM for the Sabre Airline Reservations System.

Embedded systems that have fixed deadlines use a real-time operating system such as VxWorks, PikeOS, eCos, QNX, MontaVista Linux and RTLinux. Windows CE is a real-time operating system that shares similar APIs to desktop Windows but shares none of desktop Windows' codebase.[citation needed] Symbian OS also has an RTOS kernel (EKA2) starting with version 8.0b.

Some embedded systems use operating systems such as Palm OS, BSD, and Linux, although such operating systems do not support real-time computing.
[edit]
Operating system development as a hobby
See also: Hobbyist operating system development

Operating system development is one of the most complicated activities in which a computing hobbyist may engage. A hobby operating system may be classified as one whose code has not been directly derived from an existing operating system, and has few users and active developers. [25]

In some cases, hobby development is in support of a "homebrew" computing device, for example, a simple single-board computer powered by a 6502 microprocessor. Or, development may be for an architecture already in widespread use. Operating system development may come from entirely new concepts, or may commence by modeling an existing operating system. In either case, the hobbyist is his/her own developer, or may interact with a small and sometimes unstructured group of individuals who have like interests.

Examples of a hobby operating system include ReactOS and Syllable.
[edit]
Diversity of operating systems and portability

Application software is generally written for use on a specific operating system, and sometimes even for specific hardware. When porting the application to run on another OS, the functionality required by that application may be implemented differently by that OS (the names of functions, meaning of arguments, etc.) requiring the application to be adapted, changed, or otherwise maintained.

This cost in supporting operating systems diversity can be avoided by instead writing applications against software platforms like Java or Qt. These abstractions have already borne the cost of adaptation to specific operating systems and their system libraries.

Another approach is for operating system vendors to adopt standards. For example, POSIX and OS abstraction layers provide commonalities that reduce porting costs.
[edit]
See alsoComparison of operating systems
Handheld computers
Hypervisor
Interruptible operating system
List of important publications in operating systems
List of operating systems
Microcontroller Computer Science portal
Information technology portal
Computer networking portal

Network operating system
Object-oriented operating system
Operating System Projects
PCjacking
System image
Timeline of operating systems
Usage share of operating systems

[edit]
References
^ Stallings (2005). Operating Systems, Internals and Design Principles. Pearson: Prentice Hall. p. 6.
^ Dhotre, I.A. (2009). Operating Systems.. Technical Publications. p. 1.
^ "Operating System Market Share". Net Applications.
^ a b Hansen, Per Brinch, ed. (2001). Classic Operating Systems. Springer. pp. 4–7. ISBN 0-387-95113-X.
^ Ritchie, Dennis. "Unix Manual, first edition". Lucent Technologies. Retrieved 22 November 2012.
^ "OS X Mountain Lion - Move your Mac even further ahead". Apple. Retrieved 2012-08-07.
^ Usage share of operating systems
^ a b "Top 5 Operating Systems from January to April 2011". StatCounter. October 2009. Retrieved November 5, 2009.
^ "IDC report into Server market share". Idc.com. Retrieved 2012-08-07.
^ Linux still top embedded OS
^ Dhotre, I.A. (2009). Operating Systems.. Technical Publications. p. 1.
^ "Operating System Market Share". Net Applications.
^ a b Hansen, Per Brinch, ed. (2001). Classic Operating Systems. Springer. pp. 4–7. ISBN 0-387-95113-X.
^ Ritchie, Dennis. "Unix Manual, first edition". Lucent Technologies. Retrieved 22 November 2012.
^ "OS X Mountain Lion - Move your Mac even further ahead". Apple. Retrieved 2012-08-07.
^ Usage share of operating systems
^ a b "Top 5 Operating Systems from January to April 2011". StatCounter. October 2009. Retrieved November 5, 2009.
^ "IDC report into Server market share". Idc.com. Retrieved 2012-08-07.
^ Linux still top embedded OS
^ Tom Jermoluk (2012-08-03). "TOP500 List – November 2010 (1–100) | TOP500 Supercomputing Sites". Top500.org. Retrieved 2012-08-07.
^ "Global Web Stats". Net Market Share, Net Applications. May 2011. Retrieved 2011-05-07.
^ "Global Web Stats". W3Counter, Awio Web Services. September 2009. Retrieved 2009-10-24.
^ "Operating System Market Share". Net Applications. October 2009. Retrieved November 5, 2009.
^ "w3schools.com OS Platform Statistics". Retrieved October 30, 2011.
^ "Stats Count Global Stats Top Five Operating Systems". Retrieved October 30, 2011.
^ "Global statistics at w3counter.com". Retrieved 23 January 2012.
^ "Troubleshooting MS-DOS Compatibility Mode on Hard Disks". Support.microsoft.com. Retrieved 2012-08-07.
^ "Using NDIS 2 PCMCIA Network Card Drivers in Windows 95". Support.microsoft.com. Retrieved 2012-08-07.
^ Dhotre, I.A. (2009). Operating Systems.. Technical Publications. p. 1.
^ "Operating System Market Share". Net Applications.
^ a b Hansen, Per Brinch, ed. (2001). Classic Operating Systems. Springer. pp. 4–7. ISBN 0-387-95113-X.
^ Ritchie, Dennis. "Unix Manual, first edition". Lucent Technologies. Retrieved 22 November 2012.
^ "OS X Mountain Lion - Move your Mac even further ahead". Apple. Retrieved 2012-08-07.
^ Usage share of operating systems
^ a b "Top 5 Operating Systems from January to April 2011". StatCounter. October 2009. Retrieved November 5, 2009.
^ "IDC report into Server market share". Idc.com. Retrieved 2012-08-07.
^ Linux still top embedded OS
^ Tom Jermoluk (2012-08-03). "TOP500 List – November 2010 (1–100) | TOP500 Supercomputing Sites". Top500.org. Retrieved 2012-08-07.
^ "Global Web Stats". Net Market Share, Net Applications. May 2011. Retrieved 2011-05-07.
^ "Global Web Stats". W3Counter, Awio Web Services. September 2009. Retrieved 2009-10-24.
^ "Operating System Market Share". Net Applications. October 2009. Retrieved November 5, 2009.
^ "w3schools.com OS Platform Statistics". Retrieved October 30, 2011.
^ "Stats Count Global Stats Top Five Operating Systems". Retrieved October 30, 2011.
^ "Global statistics at w3counter.com". Retrieved 23 January 2012.
^ "Troubleshooting MS-DOS Compatibility Mode on Hard Disks". Support.microsoft.com. Retrieved 2012-08-07.
^ "Using NDIS 2 PCMCIA Network Card Drivers in Windows 95". Support.microsoft.com. Retrieved 2012-08-07.
^ "INFO: Windows 95 Multimedia Wave Device Drivers Must be 16 bit". Support.microsoft.com. Retrieved 2012-08-07.
^ "Operating System Share by Groups for Sites in All Locations January 2009".
^ "Behind the IDC data: Windows still No. 1 in server operating systems". ZDNet. 2010-02-26.
^ Stallings, William (2008). Computer Organization & Architecture. New Delhi: Prentice-Hall of India Private Limited. p. 267. ISBN 978-81-203-2962-1.
^ Poisson, Ken. "Chronology of Personal Computer Software". Retrieved on 2008-05-07. Last checked on 2009-03-30.
^ "My OS is less hobby than yours". Osnews. December 21, 2009. Retrieved December 21, 2009.
[edit]
Further reading
Auslander, Marc A.; Larkin, David C.; Scherr, Allan L. (1981). The evolution of the MVS Operating System. IBM J. Research & Development.
Deitel, Harvey M.; Deitel, Paul; Choffnes, David. Operating Systems. Pearson/Prentice Hall. ISBN 978-0-13-092641-8.
Bic, Lubomur F.; Shaw, Alan C. (2003). Operating Systems. Pearson: Prentice Hall.
Silberschatz, Avi; Galvin, Peter; Gagne, Greg (2008). Operating Systems Concepts. John Wiley & Sons. ISBN 0-470-12872-0.
[edit]
External links Look up operating system in Wiktionary, the free dictionary.
Wikimedia Commons has media related to: Screenshots of operating systems
Wikiversity has learning materials about Operating Systems at
Topic:Operating systems

Operating Systems at the Open Directory Project
Multics History and the history of operating systems
How Stuff Works - Operating Systems
Help finding your Operating System type and version[show]
v · t · e
Operating system

[show]
v · t · e
Systems and systems science



View page ratings
Rate this page
What's this?
Trustworthy
Objective
Complete
Well-written
I am highly knowledgeable about this topic (optional)
Submit ratings
Categories: Operating systems
American inventions
Navigation menu
Create account
Log in
Article
Talk
Read
Edit
View history

Main page
Contents
Featured content
Current events
Random article
Donate to Wikipedia
Interaction
Help
About Wikipedia
Community portal
Recent changes
Contact Wikipedia
Toolbox
Print/export
Languages
Acèh
Afrikaans
Alemannisch
አማርኛ
العربية
Aragonés
অসমীয়া
Asturianu
Azərbaycanca
বাংলা
Bân-lâm-gú
Башҡортса
Беларуская
Беларуская (тарашкевіца)‎
Български
Bosanski
Brezhoneg
Català
Чӑвашла
Česky
Cymraeg
Dansk
Deutsch
Eesti
Ελληνικά
Español
Esperanto
Euskara
فارسی
Français
Furlan
Gaeilge
Galego
한국어
Հայերեն
हिन्दी
Hornjoserbsce
Hrvatski
Ido
Ilokano
Bahasa Indonesia
Interlingua
Íslenska
Italiano
עברית
Basa Jawa
ಕನ್ನಡ
ქართული
Kaszëbsczi
Қазақша
Kiswahili
Kurdî
Кыргызча
ລາວ
Latina
Latviešu
Lëtzebuergesch
Lietuvių
Lingála
Lumbaart
Magyar
Македонски
Malagasy
മലയാളം
मराठी
مصرى
Bahasa Melayu
Монгол
မြန်မာဘာသာ
Nederlands
नेपाल भाषा
日本語
Norsk (bokmål)‎
Norsk (nynorsk)‎
Occitan
Олык марий
ଓଡ଼ିଆ
Oʻzbekcha
پنجابی
پښتو
Plattdüütsch
Polski
Português
Qaraqalpaqsha
Ripoarisch
Română
Runa Simi
Русиньскый
Русский
Саха тыла
Sámegiella
Shqip
සිංහල
Simple English
Slovenčina
Slovenščina
Ślůnski
Soomaaliga
کوردی
Српски / srpski
Srpskohrvatski / српскохрватски
Basa Sunda
Suomi
Svenska
Tagalog
தமிழ்
Taqbaylit
Татарча/tatarça
తెలుగు
ไทย
Тоҷикӣ
Türkçe
Українська
اردو
Vèneto
Tiếng Việt
Võro
Walon
Winaray
Wolof
ייִדיש
Yorùbá
粵語
Zazaki
Žemaitėška
中文
This page was last modified on 22 December 2012 at 15:41.
Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. See Terms of Use for details.
Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.
Contact us
Privacy policy
About Wikipedia
Disclaimers

 Microsoft® SQL Server® 2008 Express


Download Center
Sign in

Products
Categories
Security
Support
Microsoft® SQL Server® 2008 Express



Quick links
Overview
System requirements
Instructions
Additional information
Looking for support?

Visit the Microsoft Support site now >

SQL Server 2008 Express is a free edition of SQL Server that is an ideal data platform for learning and building desktop and small server applications, and for redistribution by ISVs.
Quick detailsVersion: 10.00.1600.22 Date published: 2/8/2009
Change language:

Files in this download

The links in this section correspond to files available for this download. Download the files appropriate for you.File name Size
SQLEXPR_x64_ENU.exe 82.5 MB Download
SQLEXPR_x86_ENU.exe 89.1 MB Download
SQLEXPR32_x86_ENU.exe 61.1 MB Download

Overview

Microsoft SQL Server 2008 Express is a powerful and reliable data management system that delivers a rich set of features, data protection, and performance for embedded application clients, light Web applications, and local data stores. Designed for easy deployment and rapid prototyping, SQL Server 2008 Express is available at no cost, and you are free to redistribute it with applications. It is designed to integrate seamlessly with your other server infrastructure investments. For more information about SQL Server Express, including other versions and downloadable components now available, see Microsoft SQL Server Express.

For information about the different editions of SQL Server 2008, see the Editions page.
Top of page
System requirements

Supported operating systems: Windows Server 2003 Service Pack 2, Windows Server 2008, Windows Vista, Windows Vista Service Pack 1, Windows XP Service Pack 2, Windows XP Service Pack 3

32-Bit Systems: Computer with Intel or compatible 1GHz or faster processor (2 GHz or faster is recommended. Only a single processor is supported)
64-Bit Systems: 1.4 GHz or higher processor (2 GHz or faster is recommended. Only a single processor is supported)
Minimum of 256 MB of RAM (1 GB or more is recommended)
1 GB of free hard disk space

Connecting to Visual Studio 2005 requires downloading and installing Visual Studio 2005 Support for SQL Server 2008, Community Technology Preview.

Please read important information in the Release Notes before installing SQL Server 2008 with Visual Studio 2008.

To learn more about what is required to run SQL Server 2008 Express, see the system requirements page.

Top of page
Instructions

Note: You must have administrative rights on the computer to install SQL Server 2008 Express.

We recommend that you read the Release Notes and Readme before installing SQL Server 2008 Express.

Step 1: Download and install Microsoft .Net Framework 3.5 SP1.

Step 2: Download and install Windows Installer 4.5.

Step 3: Download SQL Server 2008 Express by clicking the appropriate link later on this page. To start the installation immediately, click Run. To install SQL Server Express at a later time, click Save.

Note: Note: SQL Server 2008 Express includes both 32-bit and 64-bit versions. SQLEXPR32_x86 is a smaller package that can be used to install SQL Server 2008 Express onto only 32-bit operating systems. SQLEXPR_x86 is the same product but supports installation onto both 32-bit and 64-bit (WoW) operating systems. SQLEXPR_x64 is a native 64-bit SQL Server 2008 Express and supports installation onto only 64-bit operating systems. There is no other difference between these packages.


Top of page
Additional information

SQL Server 2008 Express is available for x86 and x64 systems. SQL Server 2008 Express is not supported on IA64 systems.


See SQL Server Books Online for detailed information on installing and using SQL Server 2008 Express.


If you have questions about SQL Server 2008 Express, visit the SQL Server 2008 forums on MSDN.


Register your personal copy of SQL Server 2008 Express if you haven't already done so.


Building and shipping applications with SQL Server 2008 Express? Sign up for free redistribution rights here.


Help improve SQL Server 2008 Express by submitting bugs to Microsoft Connect Feedback.


Top of page
Related resources
Samples and Sample Databases›
SQL Server Developer Center›
Home page for Microsoft SQL Server›
Related downloads
Microsoft SQL Server 2008 Books Online (October 2009)›
Microsoft® SQL Server® 2008 Express Edition Service Pack 1›
What others are downloading
Microsoft® SQL Server® 2008 Management Studio Express›
Microsoft® SQL Server® 2012 Express›
Microsoft® SQL Server® 2008 Express with Tools›
Microsoft SQL Server 2005 Express Edition›
Microsoft SQL Server Management Studio Express›
Windows Installer 4.5 Redistributable›

Other Microsoft sites

Windows

Office

Windows Phone

Xbox

Skype

Bing

Microsoft Store
Windows downloads
All Windows products
Windows 7
Windows XP
Internet Explorer
Office downloads
All Office products
Office 2010
Office clip art & templates
Security
Security updates & tools
Virus & malware
Microsoft Update
Download categories
All downloads
Drivers
Service packs
Security updates & tools
Popular resources
Free antivirus software
Malware removal tool
Windows 7 Home Premium
Microsoft Office academic edition
Laptops and desktop computers
Windows Phone devices
Windows Phone apps and games
Xbox 360 4GB with Kinect
Cloud computing solutions
Microsoft Dynamics Online CRM

United States

©2012 Copyright
Contact Us
Terms of Use
Trademarks
Privacy & Cookies