Free Essay

Pos/355 Operating Systems Paper Week 3

In:

Submitted By railroadrick
Words 883
Pages 4
Operating Systems

Operating system is a software program that operates and manages computer hardware and software components. An operating system can be categorized either as an open source operating system or a closed operating system on the basis of the source code availability for alteration and modification. An operating system that copies the source code into the system when operating installed whereas a closed operating system does not allow viewing, modifying, or updating the source, it only installs the executable files when this operating system is installed into any of the operating systems. Examples of open source operating systems are Linux, UNIX etc., and closed operating systems examples are Microsoft Windows, Mac OS X etc.

Open source and closed source operating systems comparison

Open-source operating will allow access to the source code by the users and programmers to make alterations. As source code is available in the public he person who has programming skills can read the source code and modify the code or here she can add some advanced functions in the existing operating system which can debug the code. In most cases new versions of the open source operating systems are introduced by the Open Source community programmers that debug the product for a special reason and make your own personalized version of the product. Possibilities in the personalize open-source product are limitless. As open-source product is debugged by numerous users worldwide, so open-source operating systems will be bug free. In case of the closed operating system, source is not revealed in the public to read or modify. The source code of close operating system is compiled in debug with the company that has copyrights to build and distribute the product worldwide. The debugging process depends on the policies of the company and they have limited time and money to debug the source code, so there can be some bugs traced by the user of the closed source operating system.

In close source operating systems severe exploits can be discovered that allows remote or local users to hack the machine. When exploitation is discovered the user is totally dependent on the company and will have to wait for the new patch to be released by the company. This may be a slow process and may take months to be resolved. Until the new patch is released by the company users suffer their vulnerability problems. But in the case of an open source operating system and there is an exploit found the open source community programmers will remove the possible vulnerability in short time and released a new patches within days or hours.

Closed operating systems are installed by purchasing a license key. This license key is a valid key usually for a year. For example Windows operating system is installed after purchasing the license key. Windows operating systems should also have a firewall system. Good firewall systems can cost a great sum of money. Open-source operating systems are available for free and are licensed under an open source community. For example Linux is licensed under GNU and it also has a firewall system.

In closed operating systems there are many encrypted techniques that are embedded in it. So there may be a risk to using a closed operating system. But in the case of open source operating systems the open source community has literally tens a very good encryption packages in these packages are trustworthy.

As closed systems do not reveal the source code, so everything is controlled by the company. So any kind of help and support is only possible by the company developers. But an open source operating system code is open and we have full control to read, make changes as we need. And also in open-source systems, there are various community users available to help instantly they provide full help and support for our problems as they are needed.

Open-source operating system like the Linux has implementation that is pro-offered due to its low-cost enters no need to spend or break your budget since a license of the software is is a general public license. The user can utilize the software with the free trial version that will not expire. The free software the user can download his extensive. The Linux stability is dependable and it does not freeze up or slow down due to low memory or leak. It provides great performance on workstations and on networks while having several users simultaneously. Linux was developed by an extensive group of programmers and has strong support for network functionality which can backup faster and is more dependable than other systems. Linux is very flexible and can be used for server applications, embedded systems, and desktop applications. Linux performance is great even with a limited hard drive space. Linux can multitask for example a large print job running in the background while not slowing down other applications. Linux security is very efficient in the user can select and download it for free.

References:

1. Open-source systems versus closed source systems. By Ahmad Basha (2001). Retrieved from http://www.enderunix.org/docs/opensource_ vs_ closedsource.html

2. Open Vs. Closed Source Operating System. By Sue Smith Retrieved from http://www.ehow.com/info_8084277-open-closed-source-operating-system.html

Similar Documents

Free Essay

Pos 355 Week 1 Dq 2

...In this pack of POS 355 Entire Course you will find the next docs: POS-355 Week 1 DQ 1.doc POS-355 Week 1 DQ 2.doc POS-355 Week 1 Lectures Lecture 1.1 Computer Basics.doc POS-355 Week 1 Lectures Lecture 1.2 OS Basics.doc POS-355 Week 2 Assignments Individual Real-time Operating System.doc POS-355 Week 2 DQ 1.doc POS-355 Week 2 DQ 2.doc POS-355 Week 3 Assignments Individual IND.doc POS-355 Week 3 DQ 1.doc POS-355 Week 3 DQ 2.doc POS-355 Week 4 Assignments Individual IND.doc POS-355 Week 4 DQ 1.doc POS-355 Week 4 DQ 2.doc POS-355 Week 5 DQ 1.doc POS-355 Week 5 DQ 2.doc General Questions - General General Questions POS 355 Week 1 Individual Assignment Memory Management Paper For this assignment, you will choose one the following options: ·  Option 1: Write a 2-page paper that explains memory management requirements. ·  Option 2: Write a 2-page paper that explains the differences in memory management between Windows® and Linux®. Format your paper consistent with APA guidelines. UNIX/Linux Versus Mac Versus Windows Write an 8- to 10-page paper that compares and contrasts the basic system differences between UNIX®/Linux®, Mac®, and Microsoft ® Windows® operating systems. Include discussion and comparison of the following: ·  Memory management ·  Process management ·  File management ·  Security Format your paper consistent with APA guidelines....

Words: 367 - Pages: 2

Free Essay

Management

...|College of Information Systems & Technology | | |POS/355 Version 9 | | |MU12BIT08 | | |Introduction to Operational Systems | | |Wk 1 June 10 | | |Wk 2 June 17 | | |Wk 3 June 24 | | |Wk 4 July 01 | | |Wk 5 July 08 | Copyright © 2012, 2010, 2009, 2008, 2007, 2006, 2005, 2004, 2003 by University of Phoenix. All rights reserved. Course Description This course provides an introduction to operating systems. Topics covered include...

Words: 2247 - Pages: 9

Free Essay

Pos355 Week 2 File Management Paper

...Week 2 File Management Paper POS/355 Joey Turner JR Professor Alicia Pearlman Most UNIX systems that you will come across are usually based on the control scheme of file access associate with early versions of the UNIX system. In UNIX, every individual user is assigned their own unique user ID that they may use to access files saved in memory. Users are identified by being a part of a private group or various groups which can be identified then by their group ID. When a file is created in LINUS it is identified as being owned by a particular user and marked with the user that created the file’s user id. The file also belongs to whatever group the user is associated with as well or else the group of its parent directory but only if that parent directory has SetGID permission configured. SetGID (SetGIUD) are access rights flags that allow users to run executable (.exe) files with the permission of user ids or group id. Protection bits in sets of twelve are associated with each file as well. The owner ID, group ID, and protection bits are part of the file’s index node-which are a data-structure used to represent a file-system object which can be a file or file directory. There are 9 of the 12 protection bits that are advocated to the user and group ids owners of the files which control reading, writing, and execute permissions. These nine protection bits then form a system of hierarchy of user id, group id, and all others. The hierarchy is also coupled with the...

Words: 884 - Pages: 4

Free Essay

Working Capital

...COMPILATION OF BUSINESS PLANS DEVELOPED BY INDIVIDUALS NORTH THROUGHOUT AMERICA Handbook VOLUME 16 Lynn M. Pearce, Project Editor Business Plans Handbook, Volume 16 Project Editor: Lynn M. Pearce Product Manager: Jenai Drouillard Product Design: Jennifer Wahi Composition and Electronic Prepress: Evi Seoud Manufacturing: Rita Wimberley Editorial: Erin Braun ª 2010 Gale, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher. This publication is a creative work fully protected by all applicable copyright laws, as well as by misappropriation, trade secret, unfair competition, and other applicable laws. The authors and editors of this work have added value to the underlying factual material herein through one or more of the following: unique and original selection, coordination, expression, arrangement, and classification of the information. For product information and technology assistance, contact us at Gale Customer Support, 1-800-877-4253. For permission to use material from this text or product, submit all requests...

Words: 121839 - Pages: 488

Free Essay

2009-Report to Congress of the Us-China E and S Review Commission

...2009 Printed for the use of the U.S.-China Economic and Security Review Commission Available via the World Wide Web: http://www.uscc.gov dkrause on GSDDPC29 with K1 VerDate Nov 24 2008 08:23 Nov 10, 2009 Jkt 052771 PO 00000 Frm 00003 Fmt 6012 Sfmt 6602 M:\USCC\2009\52771.XXX APPS06 PsN: 52771 M:\USCC\USChina.eps Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 3. DATES COVERED 2. REPORT TYPE 01 NOV 2009 4. TITLE AND SUBTITLE 00-00-2009 to 00-00-2009 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 2009 Report to Congress of the U.S-China Economic and Security Review...

Words: 185166 - Pages: 741

Free Essay

Logistic

...Review of Warehouse Receipt System and Inventory Credit Initiatives in Eastern & Southern Africa Final report commissioned by UNCTAD under the All ACP Agricultural Commodities Programme (AAACP) *The views expressed in this paper are those of the author and do not necessarily reflect the views of the United Nations September 2009 CONTENTS CONTENTS ............................................................................................................................................. i ACKNOWLEDGEMENT .....................................................................................................................iii GLOSSARY OF ABBREVIATIONS .................................................................................................. iv GLOSSARY OF ABBREVIATIONS .................................................................................................. iv SUMMARY ............................................................................................................................................ 1 Introduction ....................................................................................................................... 1 Observations on the different approaches ......................................................................... 1 Policy conclusions and recommendations ........................................................................ 3 Specific proposals .....................................................................

Words: 56151 - Pages: 225

Free Essay

Core Concepts of Ais

...CORE CONCEPTS OF Accounting Information Systems Twelfth Edition Mark G. Simkin, Ph.D. Professor Department of Accounting and Information Systems University of Nevada Jacob M. Rose, Ph.D. Professor Department of Accounting and Finance University of New Hampshire Carolyn Strand Norman, Ph.D., CPA Professor Department of Accounting Virginia Commonwealth University JOHN WILEY & SONS, INC. VICE PRESIDENT & PUBLISHER SENIOR ACQUISITIONS EDITOR PROJECT EDITOR ASSOCIATE EDITOR SENIOR EDITORIAL ASSISTANT PRODUCTION MANAGER PRODUCTION EDITOR MARKETING MANAGER CREATIVE DIRECTOR SENIOR DESIGNER PRODUCTION MANAGEMENT SERVICES SENIOR ILLUSTRATION EDITOR PHOTO EDITOR MEDIA EDITOR COVER PHOTO George Hoffman Michael McDonald Brian Kamins Sarah Vernon Jacqueline Kepping Dorothy Sinclair Erin Bascom Karolina Zarychta Harry Nolan Wendy Lai Laserwords Maine Anna Melhorn Elle Wagner Greg Chaput Maciej Frolow/Brand X/Getty Images, Inc. This book was set in 10/12pt Garamond by Laserwords Private Limited, and printed and bound by RR Donnelley/Jefferson City. The cover was printed by RR Donnelley/Jefferson City. This book is printed on acid free paper. Founded in 1807, John Wiley & Sons, Inc. has been a valued source of knowledge and understanding for more than 200 years, helping people around the world meet their needs and fulfill their aspirations. Our company is built on a foundation of principles that include responsibility to the...

Words: 241803 - Pages: 968

Free Essay

Globalization of Cemex

...9-701-017 REV: NOVEMBER 29, 2004 PANKAJ GHEMAWAT The Globalization of CEMEX Geographic diversification enables us to operate in multiple regions with different business cycles. For the long term, we are trying to ensure that no one market accounts for more than one third of our business. Yet we do not diversify simply to balance cyclic downturns and upswings. We do not see volatility as an occasional, random element added to the cost of doing business in an interconnected global marketplace. We plan for volatility. We prepare for it. We have learned how to profit from it. Lorenzo Zambrano, CEO of CEMEX.1 In 1990, Cementos Mexicanos was a Mexican cement company that faced trade sanctions in its major export market, the United States. By the end of 1999, CEMEX operated cement plants in 15 countries, owned production or distribution facilities in a total of 30, and traded cement in more than 60. Non-Mexican operations accounted for nearly 60% of assets, slightly over 50% of revenues and 40% of EBITDA (earnings before interest, taxes, depreciation, and amortization) that year. CEMEX’s sales revenues had increased from less than $1 billion in 1989 to nearly $5 billion in 1999, and it had become the third largest cement company in the world in terms of capacity, as well as the largest international trader. Growth had been achieved without compromising profitability: in the late 1990s, its ratio of EBITDA to sales ranged between 30% and 40%—ten to fifteen percentage...

Words: 12297 - Pages: 50

Premium Essay

Supply Chain

...THIRD EDITI ----- --·-- --·-- - - -- - O N -- SU PP LY CH AI N MA NA GE ME NT Stra tegy , Plan ning , and Ope ratio n Sunil Chopra Kellogg Schoo l of Manag ement Northwestern University Peter Meindl Stanfo rd University --------Prentice I-I all Uppe r Saddl e River , New Jersey ·--· PEAR SON -- · - · - - - "ibrary of Congress Cataloging-in-Publication Data :::hopra, Sunil Supply chain management: strategy, planning, and operation I Sunil Chopra, >eter Meind!.-3rd ed. p. em. Includes bibliographical references and index. ISBN: 0-13-208608-5 1. Marketing channels-Managemen t. 2. Delivery of goods-Management. i. Physical distribution of goods-Management. 4. Customer servicesvfanagement. 5. Industrial procurement. 6. Materials management. I. vfeindl, Peter II. Title. HF5415.13.C533 2007 658.7-dc22 2006004948 \VP/Executive Editor: Mark Pfaltzgraff ii:ditorial Director: Jeff Shelstad ;enior Project Manager: Alana Bradley E:ditorial Assistant: Barbara Witmer Vledia Product Development Manager: Nancy Welcher \VP/Executive Marketing Manager: Debbie Clare Vlarketing Assistant: Joanna Sabella ;enior Managing Editor (Production): Cynthia Regan flroduction Editor: Melissa Feimer flermissions Supervisor: Charles Morris Vlanufacturing Buyer: Michelle Klein Vlanager, Print Production: Christy Mahon Composition/Full-Service Project Management: Karen Ettinger, TechBooks, Inc. flrinter/Binder: Hamilton Printing Company Inc. fypeface: 10/12 Times Ten Roman :::redits...

Words: 138607 - Pages: 555

Premium Essay

Auditing Cases

... Mark S. Beasley Frank A. Buckless Steven M. Glover Douglas F. Prawitt do not coPy or redistribute Prentice hall Upper Saddle River, New Jersey ta b l e s e ct ion o f co n t e n t s 1 2 client acceptance . . . . . . . . . . . . . . . . . . . . . . . . . . . S o l u tionS inc lu de d in t h iS Section 1.1 Ocean Manufacturing, Inc. 3 The New Client Acceptance Decision s e ct ion Understanding the Client’s Business and assessing risk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 S o l u tionS inc lu de d in t h iS Section 2.1 Your1040Return.com Evaluating eBusiness Revenue Recognition, Information Privacy, and Electronic Evidence Issues . . . . . . . . . . . . . . . . . . . . . . . . . . 25 2.2 2.3 2.4 Dell Computer Corporation Evaluation of Client Business Risk Flash Technologies, Inc. Asher Farms Inc. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Risk Analysis and Resolution of Client Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Understanding of Client’s Business Environment s e ct ion 3 Professional and ethical issues . . . . . . . . . . . . . . . . . . . . . . . 59 S o l u tio nS inc lu de d in t h iS Section 3.1 3.2 3.3 3.4 3.5 A Day in the Life of Brent Dorsey Staff Auditor Professional Pressures Nathan Johnson’s Rental Car Reimbursement Solving Ethical Dilemmas–Should He Pocket the Cash? Recognizing It’s a Fraud and Evaluating...

Words: 162000 - Pages: 648

Premium Essay

Smart Investment

...Pritamnagar 1st Dhal, Ellisbridge, Ahmedabad-6. GUJARAT, INDIA Phone : 079 - 2657 66 39, Fax : 079 - 2657 99 96 E-mail : info@smartinvestment.in smartinvest25@yahoo.in web : www.smartinvestment.in Price VOL : 3 Issue No: 32 RNI No : GUJENG / 2008 / 24320 8 4th Oct. to 10th Oct. 2010 Rs. 12/- CEBBECO, Oberoi Realty and B.S. Trans enters the market this week The listing of Carrer, EROS and Microtech may be most sensational How much the IPOs would be oversubscribed? What about refund? What is the possibility of allotment and listing price? Samtex Fashions Ltd. (BSE Code : 531206) (Rs. 33) In view of recent floods in Pakistan, rice crop there is likely to suffer and since Pakistan is one of the biggest exporters of rice, Indian rice exporters should gain due to likely fall in Pakistan's rice exports. Moroever, there is growing fancy agri-based companies. Hence, the recommendation to buy Samtex Fashions (name appears a misnomer as presently, garment business constitutes only tiny %age of its total business) as scrip is available at extremely low PE Ratio and has high book value. his Delhi based company was originally incorporated for garment business. However, now garment business accounts for hardly 10% of total turnover. Company has set up 3 rice mills For More details refer PrimaryMarket (Center Page) Jay Bharat Maruti (BSE Code : 520066) (Rs. 73) Belonging to Arya group, Jay Bharat Maruti is one of the oldest Autoancillaries of Maruti Udyog and has...

Words: 22154 - Pages: 89

Premium Essay

British Airway

...Development of World Scheduled Air Traffic World Economic Growth and Airline Profits Rankings - Passenger services Rankings – Freight services Section 2 - British Airways Profile Overview Alliances LHR Air Transport Movements LGW Air Transport Movements Awards History Key Events (1987-2005) Board Members Leadership Team British Airways Management Team Employees Brands Departmental Analysis Section 3 - British Airways Fleet Aircraft Fleet Aircraft Delivery Schedule Mainline Fleet Profiles Regional Aircraft Fleet Maintenance Section 4 - British Airways Performance Summary Strategy Social and Environmental Performance Incentive Plans Summary Financial / Operating Statistics Principal Investments Shareholder Information Share Price History Section 5 - Global Partners Overview BA Connect Franchisees oneworld Aer Lingus American Airlines Cathay Pacific Finnair Iberia LanChile Qantas oneworld At A Glance Section 6 - Route Network British Airways Franchisees Section 7 - General Information Airport Three Letter Decodes Outside Advisors Abbreviations & Specialist Terms How To Contact Us 2 3 3 4 4 5 6 6 7 8 89 91 92 93 97 98 99 100 101 102 103 104 9 9 10 10 11 12 13 38 39 40 41 44 47 105 109 110 115 116 118 56 56 57 69 72 73 74 75 75 77 86 87 88 This document has been prepared solely for the purpose of providing information about British Airways to interested parties. It does not constitute an offer to sell any securities and must not be relied upon in connection with...

Words: 59045 - Pages: 237

Premium Essay

Sap for Atlam

... What’s the value in a brand name? Everything. A brand that is reputable and stands apart from others provides competitive advantage, confirms credibility, adds value to a company and ensures long lasting customer relationships. As an organisation that has been around for more than three decades, the DRB-HICOM name is one that needs no introduction. It is an organisation that prides itself on always staying ahead of the game, in setting high standards in all its endeavours and constantly challenging the status quo. With a portfolio of more than eighty operating companies in its stable, the Group’s diversity elevates it to a brand with unique character and promise. PROTON, Alam Flora, PUSPAKOM, Pos Malaysia, MODENAS, Bank Muamalat, Glenmarie Properties – these are some of the household names that form a part of the DRB-HICOM Group. From the Automotive and Services sectors to the Property, Asset and Construction sector, DRB-HICOM’s operating companies have always had a strong presence in the local market. Helmed by bold leadership and imbued with core values, strong work ethics and a vision to be number 1, the DRB-HICOM brand is well-positioned to go a step further to become a leading global brand in the future. OUR VISION to be number 1 and continuously excel in all that we do OUR MISSION to lead in the growth of the nation in the areas of DRB-HICOM’S core businesses SHARED VALUES excellence decorum teamwork integrity innovation quality transparency 2 Vision & Mission ...

Words: 99565 - Pages: 399

Premium Essay

Proton

... What’s the value in a brand name? Everything. A brand that is reputable and stands apart from others provides competitive advantage, confirms credibility, adds value to a company and ensures long lasting customer relationships. As an organisation that has been around for more than three decades, the DRB-HICOM name is one that needs no introduction. It is an organisation that prides itself on always staying ahead of the game, in setting high standards in all its endeavours and constantly challenging the status quo. With a portfolio of more than eighty operating companies in its stable, the Group’s diversity elevates it to a brand with unique character and promise. PROTON, Alam Flora, PUSPAKOM, Pos Malaysia, MODENAS, Bank Muamalat, Glenmarie Properties – these are some of the household names that form a part of the DRB-HICOM Group. From the Automotive and Services sectors to the Property, Asset and Construction sector, DRB-HICOM’s operating companies have always had a strong presence in the local market. Helmed by bold leadership and imbued with core values, strong work ethics and a vision to be number 1, the DRB-HICOM brand is well-positioned to go a step further to become a leading global brand in the future. OUR VISION to be number 1 and continuously excel in all that we do OUR MISSION to lead in the growth of the nation in the areas of DRB-HICOM’S core businesses SHARED VALUES excellence decorum teamwork integrity innovation quality transparency 2 Vision & Mission ...

Words: 99565 - Pages: 399

Premium Essay

Asked Frequently Questions

...tly A sk ed Fr equen in s Question orporate C FinanCe io, a llocch ur izio D uiry, M a lv i Pa sc a l Q tonio Sa Le Fur , A n Ya nn From the team behind Pierre Vernimmen’s % = Corporate FinanCe + 3 Frequently Asked Questions in Corporate Finance Frequently Asked Questions in Corporate Finance Pierre Vernimmen, Pascal Quiry, Antonio Salvi, Maurizio Dallocchio and Yann LeFur A John Wiley & Sons, Ltd., Publication This edition first published in 2011 Copyright  2011 Pierre Vernimmen Registered office John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, United Kingdom For details of our global editorial offices, for customer services and for information about how to apply for permission to reuse the copyright material in this book please see our website at www.wiley.com The rights of Pierre Vernimmen, Pascal Quiry, Antonio Salvi, Maurizio Dallocchio and Yann LeFur to be identified as the authors of this work have been asserted in accordance with the Copyright, Designs and Patents Act 1988. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by the UK Copyright, Designs and Patents Act 1988, without the prior permission of the publisher. Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with...

Words: 120046 - Pages: 481