Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security Fundamentals
    • Security Principles
    • Information Security
  • Hacking
    • Reconnaissance
      • Footprinting
      • Scanning
      • Enumeration
      • Vulnerability Analysis
    • Privilege Escalation
    • Ethical Hacking
  • Governance, Risk And Compliance (GRC)
    • Risk Management
  • Security Architecture And Engineering
    • Cryptography
    • Identity Access Management
  • Security Operations
    • Security Assessment
      • Vulnerability Management
        • Threat Intelligence
    • Intrusion Detection And Prevention
  • Cyber Security Attacks and Threats
    • DoS
    • Password Hacking
    • Web Attacks
    • Web Applications Attacks
    • WI-FI Wireless Attacks
    • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Category: Operating Systems

Process

Posted on by

A process is an instance of program being executed in the CPU. Application Software is collection of multiple programs. When we run an application, the programs are loaded in the CPU as sequential processes with an address space. This creates a kind virtual CPU for each process. The CPU loads multiple processes and keeps multiplexing…

Read more

Software

Posted on by

Software is a collection of programs that instructs the computer to perform an execution of a task. Software can be broadly classified as Operating System is software layer between the computer hardware and other application programs which provides resources to run the program and interface to the hardware. Application Software run on the top of…

Read more

Programs

Posted on by

A Program is a set of instruction in a programming language format that instructs the computer to perform a task or function. A collection of programs makes a software which can be an Operating System or an Application Software. Programming is classified based on abstraction from Instruction Set Architecture as following: High Level Programing is…

Read more

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme