Operating Systems Comparison Outline

In: Computers and Technology

Submitted By blue773
Words 700
Pages 3
Operating Systems Comparison Outline
Albert Lara
January 29, 2016
Ongart (Peng) Ratchaworapong

Albert Lara
Operating Systems Comparison Outline
I. Introduction
MAC OS X is the operating system that is currently being utilized by every MAC being sold. According to “Apple” (2016), “Built on a rock-solid Unix foundation, it’s engineered to take full advantage of what the hardware is capable of”. One of the more popular choices due to its commercial success, MAC OS is a very user-friendly operating system that allows you to work throughout numerous MAS OS devices.
II. Memory Management
a. Divides random access memory into two sections
1. Differs from Windows and Linux
b. Uses system partition
1. Begins at lowest byte of memory
2. Extends upward
c. Uses application partition
1. Uses memory contained in its own partition
2. Divided into three parts (Stack, Heap, Global Variables)
d. Memory outside of system available for allocation
1. Have multiple applications open and running simultaneously
III. Process Management
a. Ran by application known as Activity Monitor
1. Comprised of two sections
2. User-Friendly
b. Process List
1. View and manage all processes
2. Given Process ID (PID)
3. Unique identifier number
c. System Statistics
1. Overview of total load on system
2. Divided into 5 sub categories (CPU, System Memory, Disk Activity, Disk Usage, Network)
IV. File Management
a. Designed to manage files to reduce disk and hardware usage.
1. MAC OS uses user-friendly software
b. Two different applications to manage files
1. Finder
2. Spotlight
V. Security
a. MAC OS is designed with technologies that work together to monitor, encrypt, and update
1. System security updates produced and transmitted frequently
b. Gatekeeper
1. Manages downloaded applications
2. Each app has a developer ID that is monitored by Gatekeeper…...

Similar Documents

Operating System

...Khajeh-Hosseini, 2009). As experienced by large or small companies while adopting cloud computing technology, the issues can be outlined as security, privacy, data migration as (Hosseini, et al., 2010 ). Adoption of cloud technology by enterprises especially those are using KBE (knowledge based engineering) systems are in risk in terms of migration their data over the cloud. Most enterprises are in a midst of creating, sharing, streaming and storing data in digital formats to allow collaboration , hence there is a need to continuously managed and protect the data to ensure its value and authenticity (Yale &ump; Chow, 2011). Enterprises now acquire increasingly more information about their products, customers and partners- whether it’s stored in a cloud environment or not and failure to protect this data can be damaging. Partners and clients anticipate their information will be constantly protected before conducting business with a company. Within lay the need for complete data governance to manage and protect crucial data, which has become a key issue for the cloud (Yale, 2011). The literature review aims to address the adoption of cloud computing within enterprises those are using KBE systems and how this adoption of cloud will affect their data governance strategies by drawing findings from different practices and other studies. The report will highlight importance of cloud computing in enterprises and address the state of cloud data governance importance within......

Words: 2090 - Pages: 9

Operating Systems

...Researching operating systems I am choosing Windows XP for the basic low end computer because the system requirements are fairly low and it will work on just about any personal computer that is being used today. The operating system I am choosing for the high end computer is Windows 7. Its requirements are tailor-made more for the newer and higher end computers. Some of the computers that are out there will not be able to run windows 7. Windows XP system requirements are a Pentium 233 megahertz processor, at least 64 megabytes of system memory, at least 1.5 gigabytes of hard disk space, CD-ROM or DVD drive, video adaptor, and a monitor with a screen resolution of 800x600 or higher. Windows XP doesn’t have a very memory intensive graphical user interface either. If you are upgrading from Windows 2000 you probably won’t notice too much of a difference as far as the general look and feel of the operating system. You will have to activate it soon after you install the program to keep it from deactivating. Windows XP also has better security and protection than previous versions. Windows 7 system requirements are 1 gigahertz or faster processor, 1 gigabyte of system memory for 32 bit systems and 2 gigabytes of system memory for 64 bit systems, 16 gigabytes of hard disk space for 32 bit systems and 20 gigabytes of hard disk space for 64 bit systems, support for DirectX 9 with windows display driver model 1.0 and 128 megabytes of memory for the Aero theme desktop, a......

Words: 534 - Pages: 3

Operating System Comparisons

...Operating System Comparisons PRG/355 January 14, 2013 Steven Kernan Operating System Comparisons Table of Contents Introduction 3 Memory Management 3 File Management 4 Security 4 Conclusion 4 Reference 5 Introduction An operating system (OS) is software that manages the hardware and software resources of a computer system. Basically an OS is a set of libraries or functions which programs may use to perform specific tasks relating to interfacing with computer system components (The Computer Technology Documentation Project, n.d.). Advantages and disadvantages exist in every operating system. Reviewed in this paper is a comparison of some of the primary responsibilities of popular operating systems. The review includes Unix/Linux, Mac, and Microsoft Windows operating systems. Memory Management An important function of the OS is to manage the computer systems memory. Programs, processes, and resource do not simply float around in memory haphazardly. Memory is shared among these processes and resources. Accordingly, managed by the OS is an organized structure of locating processes in computer memory locations. The two primary types of memory controlled by an OS are main memory and virtual memory. Main memory is… (need general definition). Virtual (secondary) memory is… (need general definition). Intended memory management requirements include relocation, protection, sharing, logical organization, and physical organization. Processes......

Words: 1019 - Pages: 5

Operating Systems

...MODERN OPERATING SYSTEMS SECOND EDITION by Andrew S. Tanenbaum Publisher: Prentice Hall PTR ISBN 0-13-031358-0, 976 pages Table of Contents About the Author MODERN OPERATING SYSTEMS PREFACE 1 INTRODUCTION 1.1 WHAT IS AN OPERATING SYSTEM? 1.1.1 The Operating System as an Extended Machine 1.1.2 The Operating System as a Resource Manager 1.2 HISTORY OF OPERATING SYSTEMS 1.2.1 The First Generation (1945-55) Vacuum Tubes and Plugboards 1.2.2 The Second Generation (1955-65) Transistors and Batch Systems 1.2.3 The Third Generation (1965-1980) ICs and Multiprogramming 1.2.4 The Fourth Generation (1980-Present) Personal Computers 1.2.5 Ontogeny Recapitulates Phytogeny 1.3 THE OPERATING SYSTEM ZOO 1.3.1 Mainframe Operating Systems 1.3.2 Server Operating Systems 1.3.3 Multiprocessor Operating Systems 1.3.4 Personal Computer Operating Systems 1.3.5 Real-Time Operating Systems 1.3.6 Embedded Operating Systems 1.3.7 Smart Card Operating Systems 1.4 COMPUTER HARDWARE REVIEW 1.4.1 Processors 1.4.2 Memory 1.4.3 I/O Devices 1.4.4 Buses 1.5 OPERATING SYSTEM CONCEPTS 1.5.1 Processes 1.5.3 Memory Management 1.5.4 Input/Output 1.5.5 Files 1.5.6 Security 1.5.8 Recycling of Concepts 1.6 SYSTEM CALLS 1.6.1 System Calls for Process Management 1.6.2 System Calls for File Management 1.6.3 System Calls for Directory Management 1.6.4 Miscellaneous System Calls 1.6.5 The Windows Win32 API 1.7 OPERATING SYSTEM STRUCTURE 1.7.1 Monolithic Systems 1.7.2 Layered Systems 1.7.3 Virtual Machines......

Words: 387392 - Pages: 1550

Operating System

...------------------------------------------------- BCN 2053 – OPERATING SYSTEMS – Assignment 1 ------------------------------------------------- Top of Form INSTRUCTIONS – Detail instructions is given below, please follow accordingly. This assignment carries a total of 10 marks. When we talk about operating systems, the most popular words are Windows and Linux. This assignment is all about exploring both types of operating systems. Each group require to: 1. Draw and explain in brief the evolution of both operating systems from the beginning up to today. Explanations may include : a. Year of release b. Version release c. Features 2. Compare between this two very popular Operating Systems, Windows VS Linux in terms of : a. Memory management 1. Focus on how both operating systems handle their memory management especially on virtual memory. To support your research, you may include relevant scenario of how memory being access. 2. Explain any limitation of maximum or minimum memory required by each operating systems especially on 64bit or 32bit architecture 3. Compare and recommend which operating systems utilize its memory more efficient in terms of: i. Normal usage (everyday usage by normal user) ii. Server usage (server environment) b. Process management 4. Focus on how both operating systems handle their process management when it comes to many processes request for CPU resources.......

Words: 486 - Pages: 2

Contrast and Comparison of Operating Systems

...Contrast and Comparison of Operating Systems Team B will take what we have learned from our course POS/355 Operating systems and research to compare and contrast the UNIX/Linux, Microsoft Windows, and MacOS systems. In particular we will contrast and compare the different operating systems in regards to memory management, processing, file management and security. Operating systems at the core is all about the kernel. The kernel in all of the operating systems is the main component that is responsible in the management of memory, processing, file management and security. Contrast and Comparison of Memory Management within Operating Systems Memory management in comparison and contrasts between the different operating systems is due to the way the kernel works in conjunction with the memory. Since each operating system has different kernel’s they each have similar and different ways that they manage memory. Contrasts and comparisons on Mac OS, Windows, and UNIX/Linux are described below. 1. UNIX: Though UNIX and Linux are extremely similar when it comes to how things work internally; there are slight differences that make UNIX distinct from its counterpart. One process that UNIX utilizes is known as swapping; this is done by moving chunks of the Virtual Memory (called pages), out of the main memory and moving others in. In order for this process to work at its best, those pages that are needed must be accessible in the Main Memory at the demand of the CPU. When a page......

Words: 3967 - Pages: 16

Operating Systems

...OPERATING SYSTEMS An operating system is defined the software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals. The three most common operating systems are Windows, Mac OS, and Linux. Although each OS is different, “they all provide a graphical user interface, or GUI, that includes a desktop and the ability to manage files and folders.” The Windows OS is the most commonly used OS due its simplicity making is extremely user friendly. This OS is versatile and has the highest user base. OS must be purchased for installations. The Mac OS can only be used on Macintosh computers (Apple products). The Mac OS also has to be purchased and it more expensive than the Windows OS. Linux is open-source operating system modeled on UNIX. This OS is free and can be installed on any PC. Many advanced users use this for experimental and/or testing purposes. This OS is the least user friendly. Choosing and OS really depends on the needs of the user. Someone who wants an OS to perform simple tasks such as administrative work or browsing would typically use Windows or Mac depending on their preference. A user with a more advance knowledge base in computers that wants to do experimental testing, gaming, or downloading might want to go with Linux being that if OS became corrupt in the process they could easily reinstall for free. I prefer the windows user interface, but I would rather run linux OS over mac or windows......

Words: 286 - Pages: 2

Open and Closed Source Operating System Comparison

...Open and Closed Source Operating System Comparison POS-355 Open and Closed Source Operating System Comparison Open and Closed Source are the two model of how most software is distributed. The open source code is that exactly, free open-sourced code. Meaning the core functions of the written code are given to a potential developer and that developer is able to manipulate, add to, or change any of the functions of the code. This holds true from the basic core functions or the code to small additional code snippets. FOSS or free and open source software do not typically limit or inhibit the use of the software. However with all of this free distribution, there can be some open sourced software that might have license-based restrictions or redistribution. These restrictions are not overwhelming though. The software can be re-distributed for free, after a developer has modified the code, as long as credit is given to the original manufacturer. FOSS also allows for the code to be modified and then re-compiled, so it can be sold as a complete project. Some examples of this type of re-distribution is Red Hat Inc. Red Hat Inc. takes different pieces of code, pieces it together into a really nice and user friendly interface, and then Red Hat re-distributes this re-compiled code as Red Hat Linux. There have many different flavors and iterations, but as long as Red Hat gives credit in the development to the originally creator, there is no problem with Red Hat re-distributing this...

Words: 844 - Pages: 4

Operating Systems

...Operating Systems Vulnerabilities NAME POS 355 18 Mar 15 Carol Eichling Operating Systems Vulnerabilities As the reported number of security vulnerabilities continued to spike in the 20th century let us define a security flaw. A security flaw according to "Apple Security Flaw: What You Need To Know" (2014), "The flaw is in the way the operating system provides the essential services, known as secure sockets layer (SSL) or transport layer security (TLS). These two layers of security allow information to be transmitted worry-free between browsers and web servers, or between a mail server and mail client. SSL is in the form of encryption, which scrambles data sent over a network to keep it private. The second layer involves verification that the server is authentic." With the heighten computer security regarding vulnerabilities, the increase of user awareness and training users to not click on particular links is difficult yet feasible. Although most operating system has computer security protection, the tasks of protecting the systems from vulnerabilities are a daunting task because the operating systems are unique. Security flaw in Microsoft and Mac OS X® A known security flaw in Windows is called the Freak. The Freak security flaw allowed hackers to create a simulated middle person attacks on the encrypted secure sockets layer and transport layer of a security connections. It was discovered that hackers could force websites to weaken the system......

Words: 843 - Pages: 4

Operating Systems

...NT1110_StudentName_Module1_Lab.doc 3/21/15 An operating system takes input in the form of zeros and ones -- bits -- and runs them through various circuits and processors, the hardware behaves according to built in rules. We define these rules using gates, which take input and produce an output in a structured way. The operating system allows complex programs to access hardware to get results. Only the hardware's physical properties can limit what programs can do. You could design an operating system by physically programming it into a computer's circuits. This would require building electrical pathways using millions of gates. But such an operating system would be slow and you would need the patience of Jonah to use it. That's why operating systems like Mac OS X and Windows are software. Software is flexible and hardware is not -- you can make changes to software with updates. To do the same with hardware would mean switching out physical chips and circuit boards. Operating systems are like the manager for a computer, it’s the job of the OS to monitor what software needs and what the hardware can provide. When you run applications on your computer, the OS allocates the resources necessary to complete the task. That can include processing power, memory and computer storage access, among other things. Ideally the OS will make sure that your computer's hardware is never overtaxed. ...

Words: 705 - Pages: 3

Operating Systems

... ZETECH UNIVERSITY NAME: RUTERE JOAN WANJA REG. NO: DBIT-02-0035/2015 SCHOOL: I.T COURSE: DBIT UNIT NAME: OPERATING SYSTEMS TASK: CAT 2 LECTURER: MR FRED 1. Context Switching It is the process of storing of storing and restoring the state (context) of a process or thread so that the execution can be resumed from the same point at a later time. There are three potential triggers for a context switch: • Multitasking: Most commonly, within some scheduling scheme, one process needs to be switched out of the CPU so another process can run.This context switch can be triggered by the process making itself unrunnable, such as by waiting for an I/O or synchronization operation to complete. On a pre-emptive multitasking system, the scheduler may also switch out processes from being starved of CPU time, preemptive schedulers often configure a timer interrupt to fire when a process exceeds its time slice.This interrupt ensures that the scheduler will gain control to perform a context switch. • Interrupt Handling Modern architectures are interrupt driven.This means that if the CPU requests data from a disk, for example, it does not need to busy-wait until the read is over, it can issue the request and continue with some other execution. When the read is over, the CPU can be interrupted and presented with the read. For interrupts, a program called an interrupt handler that handles the interrupt from the disk. When an interrupt...

Words: 991 - Pages: 4

Operating System Comparison

...constantly debated in the industry). Be sure to support your response. An operating system can be thought of as the link between the computer hardware and the software that is used to perform various tasks. Without an operating system the software applications and computer hardware itself cannot function. Each operating system usually consists of several features, among them memory, processor, device and file management but there are also networking features, security and I/O functions to be considered. Due to the similar nature of computer hardware then many operating systems will require most, if not all of those functions. However, from a technical perspective if we examine the interaction between the core computer hardware and the system applications then it is possible to narrow down those functions that can be deemed essential. The core of the operating system, usually known as the kernel, provides the most basic level of control over the hardware. We can assume that the hardware would consist at the very least of a CPU, Memory and various Devices and the kernel would be responsible for managing each of these as required by any user interaction or application request. While this may be a functioning operating system, practically File management would be required and increasingly security and network functions can be considered as mandatory given the modern utilisation of applications and operating systems....

Words: 270 - Pages: 2

Operating Systems Comparison and Contrast

...An operating system, or OS, is a software program that enables the computer hardware to communicate and operate with the computer software. Without a computer operating system, a computer would be useless. As computers have progressed and developed so have the many different operating systems. We will talk about the different operating systems and how they compare and contrast as far as their security and memory management. The first operating system we will compare and contrast is Windows Vista and the security features it offers. Windows Vista is an upgrade to Microsoft Windows XP and Windows 2000. When it comes to security and Windows vista, Windows Vista can help protect your PC and the people that use it by providing safety and many security features. One feature includes Bit Locker Drive Encryption. Bit Locker Drive Encryption is a security feature that provides data protection by encrypting all the data that is stored on the Windows Operating System. Windows Vista also has Encrypting File system available which is similar to Bit Locker Drive Encryption except that it is for user level file and folder encryption. Drive Encryption is good if you have two users sharing the same computer. Another security feature for Windows Vista is Parental Controls. Parental Controls are to protect your children and for restricting them to certain areas of your computer. Parental Controls help parents determine which games their children can play or......

Words: 750 - Pages: 3

Operating System

...Intercontinental University * Leonel A Silvestre * ITCO211 * File System Hi As your help desk technician I will do everything we can to help you with the operating system problem. Everybody knows what is a Hard Disk or Hard Drive let me refresh your mind, with a simple explanation: Hard Disk/ Drive, is a device for storing and retrieving digital information, primarily computer data. It consists of one or more rigid rapidly rotating discs (platters) coated with magnetic material, and with magnetic heads arranged to write data to the surfaces and read it from them. With that been said, now move forward with Operating System and Hard Disk/ Drive. I would like to recommend you the best operating system is DOS (Disk Operating System), why? Because has everything you need. Let me tell you a little more about DOS. Disk Operating System: Most often abbreviated as DOS, refer to operating system software used in most computers that provides the abstraction and management of secondary storage devices and the information on them (e.g., file systems for organizing files of all sorts). Such software is referred to as a disk operating system when the storage devices it manages are made of rotating platters, such as floppy disks or hard disks. In the early days of microcomputers, computer memory space was often limited, so the disk operating system was an extension of the operating system. This component was only loaded if needed. Otherwise, disk access......

Words: 1780 - Pages: 8

Operating System

...The Amoeba Distributed Operating System 1. INTRODUCTION Roughly speaking, we can divide the history of modern computing into the following eras: 1970s: Timesharing (1 computer with many users) 1980s: Personal computing (1 computer per user) 1990s: Parallel computing (many computers per user) Until about 1980, computers were huge, expensive, and located in computer centers. Most organizations had a single large machine. In the 1980s, prices came down to the point where each user could have his or her own personal computer or workstation. These machines were often networked together, so that users could do remote logins on other people’s computers or share files in various (often ad hoc) ways. Nowadays some systems have many processors per user, either in the form of a parallel computer or a large collection of CPUs shared by a small user community. Such systems are usually called parallel or distributed computer systems. This development raises the question of what kind of software will be needed for these new systems. To answer this question, a group under the direction of Prof. Andrew S. Tanenbaum at the Vrije Universiteit (VU) in Amsterdam (The Netherlands) has been doing research since 1980 in the area of distributed computer systems. This research, partly done in cooperation with the Centrum voor Wiskunde en Informatica (CWI), has resulted in the development of a new distributed operating system, called Amoeba, designed for an environment......

Words: 4509 - Pages: 19