Skip to content
The Computer Science
TheCScience
  • Engineering Subjects
    • Human Values
    • Computer System Architecture
    • Microprocessor
    • Digital Communication
    • Internet of Things
  • NCERT Solutions
    • Class 12
    • Class 11
  • Solutions
    • HackerRank
      • C Solutions
      • C++ Solutions
      • Java Solutions
      • Python Solutions
      • Algorithms Solutions
      • Data Structures Solutions
    • HackerEarth Solutions
    • Leetcode Solutions
  • JEE 2027
The Computer Science
TheCScience

Components of Operating System | OS Tutorials

YASH PAL, May 9, 2026May 9, 2026

The hardware and software are the two main components of an operating system. Both are used in providing applications to a user. We can draw these components in a layered or hierarchical model as shown in Figure 1.

Components of operating system
Figure 1: Components of the operating system Diagram

As shown in Figure 1, the hardware at the bottom consists of chip boards, disks, a monitor, etc. On top of hardware is the software. The operating system uses all these things.

Table of Contents

  • Component Modes of Operation
    • Kernel Mode/Supervision Mode
    • Protected Mode

Component Modes of Operation

Most computers have two modes of operations

  1. Kernel Mode (Supervisor Mode)
  2. User Mode (Protected Mode)

Kernel Mode/Supervision Mode

This mode is used by the operating system‘s kernel for low-level tasks that need unrestricted access to hardware, such as controlling how memory is written and erased, and communication with devices like graphics cards. When a computer first starts up, it is automatically running in supervisor mode. The first few programs to run on the computer are the BIOS (Basic Input/Output System) and the Bootloader. When the operating system passes control to another program, it can place the CPU into protected mode.

Priviledge rings in protected mode
Figure 2: Privilege rings in protected mode

Protected Mode

  • Applications operate within protected mode and can use hardware by communicating with the kernel.
  • CPUs might have other modes similar to protected mode as well, such as virtual mode.
  • In protected mode, programs may have access to a more limited set of the CPU’s instructions.
  • A user program may leave protected mode only by triggering an interrupt, causing control to be passed back to the kernel. In this way, the operating system can maintain exclusive control over things like access to hardware and memory.
engineering subjects Operating System Operating System

Post navigation

Previous post
Next post

Leave a Reply

Your email address will not be published. Required fields are marked *

Engineering Core Subjects

Digital Communication Subject
Internet of Things Subject
Computer Architecture subject
Human Value Subject

JEE Study Materials

JEE Physics Notes
JEE Chemistry Notes

TheCScience

At TheCScience.com, our mission is to make quality education accessible to everyone. We provide in-depth, easy-to-understand articles covering Secondary, Senior Secondary, and Graduation-level subjects.

Our content is designed to simplify complex concepts through clear explanations, diagrams, and structured learning—helping students build strong fundamentals and succeed academically without financial barriers.

Pages

About US

Contact US

Privacy Policy

DMCA

Our Tools

Hosting - get 20% off

Engineering Subjects

Internet of Things

Human Values

Digital Communication

Computer System Architecture

Microprocessor

Programming Tutorials

Data Structure and Algorithm

C

Java

NCERT

Class 12th

©2026 TheCScience | WordPress Theme by SuperbThemes