Premium Essay

Mac Os

In:

Submitted By christylopez
Words 2413
Pages 10
Learning More about your Mac Apple Training, Videos and Text Tutorials

Mac 101 - Getting Started with the Mac
“Give me the grand tour of the Mac interface” 5 lessons
Apple - Support - Mac 101 - The Grand Tour

“Get me working and playing” 27 lessons
Apple - Support - Mac 101 - All Work and Play

“Show me how to set up my Mac for me” 6 lessons
Apple - Support - Mac 101 - Customize Your Mac

“Connect your peripherals or get on the Internet” 7 lessons
Apple - Support - Mac 101 - Connect and Use Your Devices

“My Mac needs help” (Troubleshooting 101) 2 lessons
Apple - Support - Mac 101 - Troubleshooting 101

“My Mac Cheat Sheet”
Whether your Mac asks you for certain information or you're seeking help from Apple or an Apple Authorized Service Provider (AASP), there may come a time when you need to have access to your serial number, hardware configuration, passwords, email server or internet access information. And then you discover that you've either forgotten or misplaced this information.

page 1

Here is a link to a PDF form where you can keep all your basic information. http://a248.e.akamai.net/7/248/51/3047521211216301/www.info.apple.com/images/ kbase/304752/my_mac_cheat_sheet.pdf This form can also be found on the last page of this handout.

Switch 101
If you're a PC user who has just switched to the Mac and want to find out how to adapt your old working habits to the Mac OS, this is the right place. Visit Switch 101: The former PC user's guide to getting the most out of your Mac. Apple - Support - Switch 101

Mac Videos and Text Tutorials
Apple - Find Out How - Mac Basics What is covered Mac Basics Photos Movies Web Music iWork MobileMe

Mac Basics
Apple - Find Out How - Mac Basics Videos tutorials available on Mac Basics Get Started with Mac (37) Anatomy of a Mac Move to Mac Windows on a Mac page 2

PC to Mac: The Basics

Similar Documents

Free Essay

Mac Os X

...© Amit Singh. All Rights Reserved.Written in December 2003 A Sampling of Mac OS X Features Mac OS X has many "cool", "interesting", and useful features, a number of which directly contribute to the overall usability of the system. This page briefly describes a few features representative of why Mac OS X is a good (Desktop) operating system. Aqua The graphical user interface of Mac OS X is called Aqua. This includes the look and feel, behavior, and integration of GUI elements. The GUI application environments of Mac OS X, Carbon, Cocoa, and Java, all support Aqua. Classic does not, and Mac OS 9 applications running under Classic look like they did on Mac OS 9. Finally, Mac OS X includes an optimized X Window server, including a native Aqua window manager (quartz-wm) that lets you run X11 applications alongside native Aqua programs. quartz-wm provides Aqua window controls, drop shadows, etc. However, the X11 application's own look and feel will be the one provided by the particular X11 toolkit being used. Aqua has numerous distinctive features: Mac OS X uses high-quality photorealistic icons that are rendered at various sizes up to 128x128, allowing for features such as in-place document preview and in-icon status indication. Mac OS X has a number of functional and unique user interface elements, such as sheets, which are document-modal dialogs that attached to and appear to come out of a document's title bar. The Desktop, Dock, and the Finder are also different (in my opinion...

Words: 2214 - Pages: 9

Free Essay

Os X for Legacy Macs

...XPostFacto is a utility from Other World Computing which helps to install and boot Mac OS X, Mac OS X Server, and Darwin on certain unsupported systems. When Mac OS X installs successfully, its stability on unsupported systems appears to be excellent. However, there are cases in which Mac OS X is difficult to install, and there are a variety of problems you can run into. So read carefully. You should also remember to check the online version of this documentation from time to time, to see whether there have been any changes. Here's a quick link to download the latest version. Previous versions are also available in the version history below, along with a list of changes. XPostFacto 4 (disk image) (or in the older .sit format) XPostFacto is an open-source application which you may download and try without registration. However, I encourage you to contribute to the ongoing work on XPostFacto by registering as an XPostFacto user ($25). This helps to support the continuing development of XPostFacto, and also gives you an account on the tech support forum. If you are already a registered user of XPostFacto, you can make a contribution to its continuing development. If you want to redistribute XPostFacto, then consult the license terms (which have changed a little for XPostFacto 4). What's New Here's what is new in version 4.0: Supports Mac OS X 10.4 (Tiger)! Runs on Mac OS 9.x or 10.2 through 10.4. Will install Mac OS X 10.2 through 10.4. Works with "New World" machines that Apple dropped support...

Words: 14988 - Pages: 60

Free Essay

Unix, Linux, Mac Os, Windows Os Comparison

...Introduction The most commonly known Operating Systems (OS) today are UNIX, Linux, MacOS, and Windows. These operating systems all behave in their own way and similar in others. This paper will discuss this comparison of how these operating systems utilize memory, process handling, file management, and security. Memory Management Each operating system is required to allocate a certain amount of memory for the operating system itself for the processes that are being used or executed. There are two places memory exists: physically on the motherboard of the computer and within the operating system itself. When the operating system dynamically divides the memory usage between these two areas, this is called memory management. Each operating system manages memory different from the others; however they all follow some basic rules of memory management. All of the operating system’s memory management in general follows these requirements: relocation, protection, sharing, logical organization, and physical organization (Stallings, 2015). Relocation of memory is the process that allows the operating system to move a process or file from physical memory to virtual memory and back again, depending on the need for that data. Virtual memory exists within the operating system which uses the hard drive to store temporary information and physical memory is located on the motherboard of the computer. While the process is in memory, protection of that area needs to be enabled to...

Words: 2918 - Pages: 12

Premium Essay

The Diference in Window, Linux and Mac Os

...perform desired functions on your computer. Originally, Linux was designed as an alternative operating system to Windows; however, they are meant to run on PCs, gaming consoles, DVRs, mobile phones, and many other devices. Android, which is a widely used operating system for mobile devices, is built on top of the Linux kernel. GNOME is a graphical user interface that runs on top of the Linux operating system, it consists solely of free and open source software. Its emphasis is on simplicity and accessibility. One company does not own Linux or update Linux. Instead, it’s a community of developers. The Mac OS X is the operating system that could be run only on Macintosh computers that had Motorola processors. When Steve Jobs left Apple in 1985, the company tried to create a “next generation” OS through the Taligent Copland and Gerswin projects, with little success. The Mac OS is not...

Words: 327 - Pages: 2

Premium Essay

Windows vs Mac Os

...You can either use Mac OS on a Macintosh, or you can also install Windows OS on it. Mac OS and Windows are the two most popular operating systems for computers known to beings. The rivalry among the two is much older than you can imagine. It all began when Apple released Macintosh in 1984, and Bill Gates released Windows in the following year. This is when the computer generation was born and door to technology opened. Since then, we are bombarded with information comparing one operating system to another. Frankly, these two operating systems have much more in common than they do in difference. Each has its own set of pros and cons, but they share many of the core features that define a computer operating system in a modern era. If I were to pick one operating system between the two, I would be better served out by having the similarities pointed out first rather than the differences. Let’s take a moment to move past this vs. that way of thinking and look into what is similar between the two operating systems. Like, both operating systems have a robust set of integrated drivers that enable a wide range of external accessories to work flawlessly out of the box. Installing software or applications on any of them isn’t a problem now, because now usually they are made for both operating systems. The elements of the user interface are mostly common too, only the placement of them differs. E.g. the title bar buttons are on the left in a Mac, while they are on the right...

Words: 605 - Pages: 3

Premium Essay

Microsoft Move

...$150-million (U.S.) worth of Apple shares], Apple is just a subsidiary of Microsoft now,” Mr. Katz says. “Apple has lost the battle. They lost it years ago. It was inevitable they'd lose it because they didn't control the interface.” True enough. When most people interact with a PC, they do so through a Microsoft Corp. operating system. Cupertino, Calif.-based Apple made a futile attempt to expand its relevance in 1994, by licensing its Mac OS to clone makers. Its hope was that more companies selling Macs would expand market share for the operating system, creating a virtuous cycle. More market share would mean more independent software developers writing programs that run on the Mac OS, and with more of that so-called application software available, more people would buy Macs. But in reality, by the time Apple licensed the Mac OS, its place in the market had been cemented. All the clones did was eat into the company's remaining share of the market, and cut into its profit margins. By purchasing Power Computing Corp., the largest Mac clone maker, in a stock deal worth $100-million, Apple is sending a strong message that it intends to control the fate of its interface. At least it won't be done in by an evil twin. There's a large body of evidence suggesting that control of the...

Words: 1183 - Pages: 5

Premium Essay

If You Cant Beat Them Join Them

...If you can’t beat them, join them Two decades ago, personal computers were considered as a revolutionary innovation in the business world and started being used by large companies. More than any other company, Apple which was molded by counterculture phenomenon. The company has always been different and ingenious. In order to gain new perspective and innovative ideas, Steve Jobs made sure that nothing comes in the way of it. He surprisingly settled an agreement with Apple’s old rivals-Microsoft –to produce compatible Microsoft Office and Internet Explorer versions for Mac OS. In exchange of that, Apple agreed to use Internet Explorer as the default browser for their operating system. Even if this move was considered to have double edged blade effects on Apple’s future, Jobs viewed Microsoft as opportunity and not an obstacle. “If you can’t beat them join them”. The proverb “if you can’t beat them join them” has been derived from the slang “If you can’t lick’em then join’em”.It is often used ironically to explain a change of heart, but basically what does this saying mean? It means that if you cannot defeat an opponent or get him to change his ideas or views ,the best thing is to change the way your ideas or plans. This is exactly what Jobs did in order for betterment of Apple by making Microsoft as an ally, which in return proved to be beneficial for both. So instead of continuing with objection sometimes supporting it can prove to be more lucrative. When looked at it critically...

Words: 343 - Pages: 2

Free Essay

Project Identification

...providing the Windows operating system to PC makers as well as the Office Suite there is growing competition from Apple in terms of both the consumer market and the corporate market. The Apple Mac OS is now becoming a viable contender in both markets. However, in terms of the quickly growing and ever expanding mobile market Microsoft has done very little to win over handset makers and create an environment in which individuals are writing apps for their platform. In this case Apple has become the predominant leader and the standard methods of competing are not producing the results needed to remain competitive in the long term market. For this reason I would recommend that Microsoft make a significant departure and start writing apps for the Apple iOS platform. While it may seem counterintuitive to develop apps that will run on other hardware Microsoft is currently faced with the issue of taking a beating in terms of the app market. Creating apps that run on iOS will allow Apple users to see the Microsoft products that are available and hopefully create additional revenue such that they can fund and create new opportunities in their own potential app store for Windows based phones. This is basically the last significant chance Microsoft has in order to salvage the potential for the mobile OS and app market. The opportunity is a single as it hopefully prevents the downfall of their mobile market altogether. There is a risk that it won't sway consumers but that isn't an option at this...

Words: 861 - Pages: 4

Free Essay

Mac Memory Manacement

...Mac Memory Management For rough draft Mac OS is available on two processor architectures: the Motorola 68k series and the PowerPC. Mac OS has a flat address space, shared between all processes. There is no per-process memory protection. Application code runs in supervisor mode, so there is no instruction protection. Mac OS has virtual memory, in the limited sense that a larger fixed address space can be simulated, by storing the entire address space on disc. This size of this address space is fixed at boot time. The lowest part of memory is occupied by the system partition. This contains some system global values which applications should not access directly, although there is nothing to prevent them doing so. Historically, the Mac OS used a form of memory management that has fallen out of favor in modern systems. Criticism of this approach was one of the key areas addressed by the change to OS X. The original problem for the engineers of the Macintosh was how to make optimum use of the 128 KB of RAM that the machine was equipped with. Since at that time the machine could only run one application program at a time, and there was no fixed secondary storage, the engineers implemented a simple scheme which worked well with those particular constraints. However, that design choice did not scale well with the development of the machine, creating various difficulties for both programmers and users. References: The Memory Management Reference Memory management in Mac OS, en...

Words: 1794 - Pages: 8

Premium Essay

Biolox

...Congratulations, you and your iMac were made for each other. Built-in iSight camera Video chat with up to three friends anywhere in the world at the same time. www.apple.com/imac Mac Help iSight Music Front Row with Apple Remote Enjoy movies, music, and photos from the comfort of your sofa. www.apple.com/imac Mac Help Front Row Dashboard widgets Get up-to-date information instantly. View stocks, check the weather, track flights, and much more. www.apple.com/macosx/overview Mac Help Dashboard iMovie Collect all your video in one library. Create and share movies in minutes. www.apple.com/ilife/imovie iMovie Help movie iPhoto Organize all your photos with Events. Publish to a Web Gallery with a click. www.apple.com/ilife/iphoto iPhoto Help photo GarageBand Create music by adding musicians to a virtual stage. Enhance your song to sound like a pro. www.apple.com/ilife/garageband GarageBand Help record iWeb Create beautiful websites with photos, movies, blogs, podcasts, and dynamic web widgets. www.apple.com/ilife/iweb iWeb Help website Contents Chapter 1: Ready, Set Up, Go 9 What’s in the Box 10 Setting Up Your iMac 15 Putting Your iMac to Sleep or Shutting It Down Chapter 2: Life with Your iMac 20 22 24 26 28 Basic Features of Your iMac Other Features of Your iMac Ports on Your iMac Other Components of Your iMac Getting Answers Chapter 3: Boost Your Memory 33 Installing Additional Memory 38 Making Sure Your iMac Recognizes the New...

Words: 10289 - Pages: 42

Premium Essay

Moral

...known as Mac PCs. Based on the article, it is written that no doubt the sales of iPod music players together with iTunes music downloads and sales of the iPhones had generated a lot of profit for the company, but the Mac PCs still managed to regain their title as the company’s highest revenue source in June 2007 even though Mac PCs had to struggle their way to break through the worldwide market. The Apple’s Mac sales have indeed increased at triple the rate of other PC industry which made the company settled at third place in the U.S, behind Dell and Hewlett-Packard. The company’s shares are said to be much higher than it has targeted. Besides that, the article did mention the reasons why Mac PCs are Apple’s hottest line which is due to Apple’s PCs being ultimately personal and designed with the creativeness of individuals instead of the corporate IT department. Apple’s PCs doesn’t compete for corporate servers that are considered PCs due to their internal design, and never aimed for big businesses besides publishers and creative departments. The sales of Mac PCs increased due to the purchases made by students and working adults. 15% market shares of PCs sold in retail and online services are due to good advertising strategies used by the company. From this, it increases the percentage point of shares for Apple in its unit sales. The article also stated that Apple has the best software which is constantly upgraded that improves performance of the PCs. It is stated that Mac PCs can...

Words: 1277 - Pages: 6

Premium Essay

Apple History

...MAC SECURITY | managing information security Submitted by : srinivasa reddy marreddy Introduction Many years of operating system improvement and an accumulation of frameworks and features from many other systems joined with numerous interesting plans and executions brought the advancement of Apple, Inc's. OS X family. In order to understand the progress of the older systems of OS X it is necessary to examine the upgraded technology and their interaction with other systems. To protect and troubleshoot the system it is necessary to know and understand the working of OS X technology. The open source core of the system is an operating system called Darwin. Darwin is a variant of BSD Unix running on the Mach 3 microkernel from Carnegie Mellon University and the Open Software Foundation (Singh, 2007). On top of Darwin, Apple utilizes both open source and proprietary code and builds a intricate and complex operating system which resembles the look of classic Macintosh computers with almost no similarity to recorded (1980s) Macintosh underlying innovation. In fact OS X is more compatible with its sibling UNIX systems and with Microsoft Windows than with past Apple computers. OS X is a UNIX 03 system as certified by the Open Group and recorded on their register (The...

Words: 1735 - Pages: 7

Free Essay

Cis502 Week 8 Assignment

...Mobile Device Security and Other Threats Melissa M Dr. Constance Blanson Theories of Security Management November 30, 2014 Analyze the emerging security threats presented within the “Security Threat Report 2014” Security threats have not only grown and matured quickly, but the people behind these threats have become more creative in camouflaging their work. These criminals have become more adept at eluding their identification and are now relying on cryptography. Malware authors, as with users, are now focusing on mobile devices and web services. Numerous threats were listed in the Security Threat Report 2014 such as botnets, android malware, attacks on Linux platforms and Mac OS X, web-based malware, targeted threats to your financial accounts, unpatched windows systems and re-invented spam. These items are detrimental to companies and users. The more complex these threats get, the harder it is to protect against them. I will analyze botnets and android malware in this section. A botnet is a network of private computers infected with malicious software and controlled as a group without the owner’s knowledge. Criminals distribute malicious software that can turn your computer into a “bot”. When this occurs, your computer can perform automated tasked over the Internet without your knowledge. This type of malware is typically used to infect large numbers of computers. They are used to send out spam email messages, spread viruses, attack computers and servers...

Words: 1366 - Pages: 6

Free Essay

Unix/Linux Versus Mac Versus Windows Pos/355

...UNIX /Linux versus MAC versus Windows Paper POS/355 March 11, 2013 Bhupinder Singh UNIX/Linux versus MAC versus Windows Paper Introduction Today we live in a world where technology is the way to go. Even in this century there are people that are still clueless on the operating system. It is different, exciting when a new and advance system comes out. But some of us are so confused when it comes to the basics of new technology. Operating systems are programs which manages the computer’s hardware. The systems provide a basic for the applications programs between the computer user and its hardware. When looking, there are so many different types of operating systems that are available. The four main operating systems that are used are Windows, Mac, UNIX, and Linux. For every computer there are many different items that make the system a whole. When it comes to the different operating systems there are different features available, even though when you think of computers a person might think security will all be the same but there are difference between each one. As you read more you will understand the security and the difference between a MAC, UNIX/LINUX and Windows systems and how each one works. Access control goal is to protect a resource from unauthorized access while facilitating seamless and legitimate use of such resources. Presently, each day users hold the need to access to those resources through a broad line of devices...

Words: 2503 - Pages: 11

Free Essay

Operating Systems

...The purpose and functions of an operating system is to accompany us at school and/ or in completing our assignments. Operating systems are there to help guide us, and it gives us more knowledge on how to use computers and its different software’s. There are three types of operating systems discussed in this lesson. Windows, Mac OS, and Linux, but what sets them apart? Windows as we know is the most commonly used operating system used by many people. We use Windows on a daily basis, especially in school and work places. Windows incorporates many applications, such as Internet Explorer, Word Processor, and Microsoft Office. Microsoft being the most commonly used. Almost every assignment/ paper written in school (college mostly) had be written using Microsoft word. We use excel often and power point when doing presentations. Because Windows has the highest saturation in the market, third party application developers focus more on compiling programs that run effectively on Windows. Linux however is an expanding group of operating systems that are similar to UNIX in their design. They are meant to run on PCs, gaming consoles, DVRs, and mobile phones. With Linux you have the support of a huge community, online search, & a ton of websites. If you have an issue with something, whether it is technical support or just a general question, you can send out e-mail to a mailing list or post on a forum, and within 10 minutes be flooded with suggestions. Or these suggestions could take hours...

Words: 498 - Pages: 2