Free Essay

Pos/355 Operating Systems Paper Week 3

In: Computers and Technology

Submitted By railroadrick
Words 883
Pages 4
Operating Systems

Operating system is a software program that operates and manages computer hardware and software components. An operating system can be categorized either as an open source operating system or a closed operating system on the basis of the source code availability for alteration and modification. An operating system that copies the source code into the system when operating installed whereas a closed operating system does not allow viewing, modifying, or updating the source, it only installs the executable files when this operating system is installed into any of the operating systems. Examples of open source operating systems are Linux, UNIX etc., and closed operating systems examples are Microsoft Windows, Mac OS X etc.

Open source and closed source operating systems comparison

Open-source operating will allow access to the source code by the users and programmers to make alterations. As source code is available in the public he person who has programming skills can read the source code and modify the code or here she can add some advanced functions in the existing operating system which can debug the code. In most cases new versions of the open source operating systems are introduced by the Open Source community programmers that debug the product for a special reason and make your own personalized version of the product. Possibilities in the personalize open-source product are limitless. As open-source product is debugged by numerous users worldwide, so open-source operating systems will be bug free. In case of the closed operating system, source is not revealed in the public to read or modify. The source code of close operating system is compiled in debug with the company that has copyrights to build and distribute the product worldwide. The debugging process depends on the policies of the company and they have limited time and money to debug the source code, so there can be some bugs traced by the user of the closed source operating system.

In close source operating systems severe exploits can be discovered that allows remote or local users to hack the machine. When exploitation is discovered the user is totally dependent on the company and will have to wait for the new patch to be released by the company. This may be a slow process and may take months to be resolved. Until the new patch is released by the company users suffer their vulnerability problems. But in the case of an open source operating system and there is an exploit found the open source community programmers will remove the possible vulnerability in short time and released a new patches within days or hours.

Closed operating systems are installed by purchasing a license key. This license key is a valid key usually for a year. For example Windows operating system is installed after purchasing the license key. Windows operating systems should also have a firewall system. Good firewall systems can cost a great sum of money. Open-source operating systems are available for free and are licensed under an open source community. For example Linux is licensed under GNU and it also has a firewall system.

In closed operating systems there are many encrypted techniques that are embedded in it. So there may be a risk to using a closed operating system. But in the case of open source operating systems the open source community has literally tens a very good encryption packages in these packages are trustworthy.

As closed systems do not reveal the source code, so everything is controlled by the company. So any kind of help and support is only possible by the company developers. But an open source operating system code is open and we have full control to read, make changes as we need. And also in open-source systems, there are various community users available to help instantly they provide full help and support for our problems as they are needed.

Open-source operating system like the Linux has implementation that is pro-offered due to its low-cost enters no need to spend or break your budget since a license of the software is is a general public license. The user can utilize the software with the free trial version that will not expire. The free software the user can download his extensive. The Linux stability is dependable and it does not freeze up or slow down due to low memory or leak. It provides great performance on workstations and on networks while having several users simultaneously. Linux was developed by an extensive group of programmers and has strong support for network functionality which can backup faster and is more dependable than other systems. Linux is very flexible and can be used for server applications, embedded systems, and desktop applications. Linux performance is great even with a limited hard drive space. Linux can multitask for example a large print job running in the background while not slowing down other applications. Linux security is very efficient in the user can select and download it for free.

References:

1. Open-source systems versus closed source systems. By Ahmad Basha (2001). Retrieved from http://www.enderunix.org/docs/opensource_ vs_ closedsource.html

2. Open Vs. Closed Source Operating System. By Sue Smith Retrieved from http://www.ehow.com/info_8084277-open-closed-source-operating-system.html

Similar Documents

Free Essay

Pos 355 Week 1 Dq 2

...In this pack of POS 355 Entire Course you will find the next docs: POS-355 Week 1 DQ 1.doc POS-355 Week 1 DQ 2.doc POS-355 Week 1 Lectures Lecture 1.1 Computer Basics.doc POS-355 Week 1 Lectures Lecture 1.2 OS Basics.doc POS-355 Week 2 Assignments Individual Real-time Operating System.doc POS-355 Week 2 DQ 1.doc POS-355 Week 2 DQ 2.doc POS-355 Week 3 Assignments Individual IND.doc POS-355 Week 3 DQ 1.doc POS-355 Week 3 DQ 2.doc POS-355 Week 4 Assignments Individual IND.doc POS-355 Week 4 DQ 1.doc POS-355 Week 4 DQ 2.doc POS-355 Week 5 DQ 1.doc POS-355 Week 5 DQ 2.doc General Questions - General General Questions POS 355 Week 1 Individual Assignment Memory Management Paper For this assignment, you will choose one the following options: ·  Option 1: Write a 2-page paper that explains memory management requirements. ·  Option 2: Write a 2-page paper that explains the differences in memory management between Windows® and Linux®. Format your paper consistent with APA guidelines. UNIX/Linux Versus Mac Versus Windows Write an 8- to 10-page paper that compares and contrasts the basic system differences between UNIX®/Linux®, Mac®, and Microsoft ® Windows® operating systems. Include discussion and comparison of the following: ·  Memory management ·  Process management ·  File management ·  Security Format your paper consistent with APA guidelines....

Words: 367 - Pages: 2

Free Essay

Pos355 Week 2 File Management Paper

...Week 2 File Management Paper POS/355 Joey Turner JR Professor Alicia Pearlman Most UNIX systems that you will come across are usually based on the control scheme of file access associate with early versions of the UNIX system. In UNIX, every individual user is assigned their own unique user ID that they may use to access files saved in memory. Users are identified by being a part of a private group or various groups which can be identified then by their group ID. When a file is created in LINUS it is identified as being owned by a particular user and marked with the user that created the file’s user id. The file also belongs to whatever group the user is associated with as well or else the group of its parent directory but only if that parent directory has SetGID permission configured. SetGID (SetGIUD) are access rights flags that allow users to run executable (.exe) files with the permission of user ids or group id. Protection bits in sets of twelve are associated with each file as well. The owner ID, group ID, and protection bits are part of the file’s index node-which are a data-structure used to represent a file-system object which can be a file or file directory. There are 9 of the 12 protection bits that are advocated to the user and group ids owners of the files which control reading, writing, and execute permissions. These nine protection bits then form a system of hierarchy of user id, group id, and all others. The hierarchy is also coupled with......

Words: 884 - Pages: 4

Free Essay

Management

...|College of Information Systems & Technology | | |POS/355 Version 9 | | |MU12BIT08 | | |Introduction to Operational Systems | | |Wk 1 June 10 | | |Wk 2 June 17 | | |Wk 3 June 24 | | |Wk 4 July 01 | | |Wk 5 July 08 | Copyright © 2012, 2010, 2009, 2008, 2007, 2006, 2005, 2004, 2003 by University of Phoenix. All rights reserved. Course Description This course provides an introduction to operating systems. Topics......

Words: 2247 - Pages: 9

Free Essay

Working Capital

...COMPILATION OF BUSINESS PLANS DEVELOPED BY INDIVIDUALS NORTH THROUGHOUT AMERICA Handbook VOLUME 16 Lynn M. Pearce, Project Editor Business Plans Handbook, Volume 16 Project Editor: Lynn M. Pearce Product Manager: Jenai Drouillard Product Design: Jennifer Wahi Composition and Electronic Prepress: Evi Seoud Manufacturing: Rita Wimberley Editorial: Erin Braun ª 2010 Gale, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher. This publication is a creative work fully protected by all applicable copyright laws, as well as by misappropriation, trade secret, unfair competition, and other applicable laws. The authors and editors of this work have added value to the underlying factual material herein through one or more of the following: unique and original selection, coordination, expression, arrangement, and classification of the information. For product information and technology assistance, contact us at Gale Customer Support, 1-800-877-4253. For permission to use material from this text or product, submit all......

Words: 121839 - Pages: 488

Free Essay

2009-Report to Congress of the Us-China E and S Review Commission

...2009 Printed for the use of the U.S.-China Economic and Security Review Commission Available via the World Wide Web: http://www.uscc.gov dkrause on GSDDPC29 with K1 VerDate Nov 24 2008 08:23 Nov 10, 2009 Jkt 052771 PO 00000 Frm 00003 Fmt 6012 Sfmt 6602 M:\USCC\2009\52771.XXX APPS06 PsN: 52771 M:\USCC\USChina.eps Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 3. DATES COVERED 2. REPORT TYPE 01 NOV 2009 4. TITLE AND SUBTITLE 00-00-2009 to 00-00-2009 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 2009 Report to Congress of the U.S-China Economic and Security Review...

Words: 185166 - Pages: 741

Free Essay

Logistic

...Review of Warehouse Receipt System and Inventory Credit Initiatives in Eastern & Southern Africa Final report commissioned by UNCTAD under the All ACP Agricultural Commodities Programme (AAACP) *The views expressed in this paper are those of the author and do not necessarily reflect the views of the United Nations September 2009 CONTENTS CONTENTS ............................................................................................................................................. i ACKNOWLEDGEMENT .....................................................................................................................iii GLOSSARY OF ABBREVIATIONS .................................................................................................. iv GLOSSARY OF ABBREVIATIONS .................................................................................................. iv SUMMARY ............................................................................................................................................ 1 Introduction ....................................................................................................................... 1 Observations on the different approaches ......................................................................... 1 Policy conclusions and recommendations ........................................................................ 3 Specific proposals .....................................................................

Words: 56151 - Pages: 225

Premium Essay

Auditing Cases

... Mark S. Beasley Frank A. Buckless Steven M. Glover Douglas F. Prawitt do not coPy or redistribute Prentice hall Upper Saddle River, New Jersey ta b l e s e ct ion o f co n t e n t s 1 2 client acceptance . . . . . . . . . . . . . . . . . . . . . . . . . . . S o l u tionS inc lu de d in t h iS Section 1.1 Ocean Manufacturing, Inc. 3 The New Client Acceptance Decision s e ct ion Understanding the Client’s Business and assessing risk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 S o l u tionS inc lu de d in t h iS Section 2.1 Your1040Return.com Evaluating eBusiness Revenue Recognition, Information Privacy, and Electronic Evidence Issues . . . . . . . . . . . . . . . . . . . . . . . . . . 25 2.2 2.3 2.4 Dell Computer Corporation Evaluation of Client Business Risk Flash Technologies, Inc. Asher Farms Inc. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Risk Analysis and Resolution of Client Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Understanding of Client’s Business Environment s e ct ion 3 Professional and ethical issues . . . . . . . . . . . . . . . . . . . . . . . 59 S o l u tio nS inc lu de d in t h iS Section 3.1 3.2 3.3 3.4 3.5 A Day in the Life of Brent Dorsey Staff Auditor Professional Pressures Nathan Johnson’s Rental Car Reimbursement Solving Ethical Dilemmas–Should He Pocket the Cash? Recognizing It’s a Fraud and......

Words: 162000 - Pages: 648

Premium Essay

Supply Chain

...acknowledgments borrowed from other sources and reproduced, with permission, in this textJook appear on appropriate page within text. \.1icrosoft® and Windows® are registered trademarks of the Microsoft Corporation in the U.S.A. and Jther countries. Screen shots and icons reprinted with permission from the Microsoft Corporation. This Jook is not sponsored or endorsed by or affiliated with the Microsoft Corporation. Copyright© 2007, 2004, 2001 by Pearson Education, Inc., Upper Saddle River, New Jersey, 07458. Pearson Prentice Hall. All rights reserved. Printed in the United States of America. This publication is Jrotected by Copyright and permission should be obtained from the publisher prior to any prohibited ~eproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, nechanical, photocopying, recording, or likewise. For information regarding permission(s), write to: Rights and Permissions Department. Pearson Prentice Hall™ is a trademark of Pearson Education, Inc. Pearson® is a registered trademark of Pearson pic Prentice Hall® is a registered trademark of Pearson Education, Inc. Pearson Education LTD. Pearson Education Singapore, Pte. Ltd Pearson Education, Canada, Ltd Pearson Education-Japan Pearson Education Australia PTY, Limited Pearson Education North Asia Ltd Pearson Educaci6n de Mexico, S.A. de C.V. Pearson Education Malaysia, Pte. PEARSON Prentice Hall 10987654321 ISBN: 0-13-208608-5 DED ICA TIO N ~ I......

Words: 138607 - Pages: 555

Premium Essay

Smart Investment

...Pritamnagar 1st Dhal, Ellisbridge, Ahmedabad-6. GUJARAT, INDIA Phone : 079 - 2657 66 39, Fax : 079 - 2657 99 96 E-mail : info@smartinvestment.in smartinvest25@yahoo.in web : www.smartinvestment.in Price VOL : 3 Issue No: 32 RNI No : GUJENG / 2008 / 24320 8 4th Oct. to 10th Oct. 2010 Rs. 12/- CEBBECO, Oberoi Realty and B.S. Trans enters the market this week The listing of Carrer, EROS and Microtech may be most sensational How much the IPOs would be oversubscribed? What about refund? What is the possibility of allotment and listing price? Samtex Fashions Ltd. (BSE Code : 531206) (Rs. 33) In view of recent floods in Pakistan, rice crop there is likely to suffer and since Pakistan is one of the biggest exporters of rice, Indian rice exporters should gain due to likely fall in Pakistan's rice exports. Moroever, there is growing fancy agri-based companies. Hence, the recommendation to buy Samtex Fashions (name appears a misnomer as presently, garment business constitutes only tiny %age of its total business) as scrip is available at extremely low PE Ratio and has high book value. his Delhi based company was originally incorporated for garment business. However, now garment business accounts for hardly 10% of total turnover. Company has set up 3 rice mills For More details refer PrimaryMarket (Center Page) Jay Bharat Maruti (BSE Code : 520066) (Rs. 73) Belonging to Arya group, Jay Bharat Maruti is one of the oldest Autoancillaries of Maruti Udyog and......

Words: 22154 - Pages: 89

Premium Essay

Lulzking

...borrowed from other sources and reproduced, with permission, in this textJook appear on appropriate page within text. \.1icrosoft® and Windows® are registered trademarks of the Microsoft Corporation in the U.S.A. and Jther countries. Screen shots and icons reprinted with permission from the Microsoft Corporation. This Jook is not sponsored or endorsed by or affiliated with the Microsoft Corporation. Copyright© 2007, 2004, 2001 by Pearson Education, Inc., Upper Saddle River, New Jersey, 07458. Pearson Prentice Hall. All rights reserved. Printed in the United States of America. This publication is Jrotected by Copyright and permission should be obtained from the publisher prior to any prohibited ~eproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, nechanical, photocopying, recording, or likewise. For information regarding permission(s), write to: Rights and Permissions Department. Pearson Prentice Hall™ is a trademark of Pearson Education, Inc. Pearson® is a registered trademark of Pearson pic Prentice Hall® is a registered trademark of Pearson Education, Inc. Pearson Education LTD. Pearson Education Singapore, Pte. Ltd Pearson Education, Canada, Ltd Pearson Education-Japan Pearson Education Australia PTY, Limited Pearson Education North Asia Ltd Pearson Educaci6n de Mexico, S.A. de C.V. Pearson Education Malaysia, Pte. PEARSON Prentice Hall 10987654321 ISBN: 0-13-208608-5 DED ICA TIO......

Words: 141930 - Pages: 568

Premium Essay

Asked Frequently Questions

...tly A sk ed Fr equen in s Question orporate C FinanCe io, a llocch ur izio D uiry, M a lv i Pa sc a l Q tonio Sa Le Fur , A n Ya nn From the team behind Pierre Vernimmen’s % = Corporate FinanCe + 3 Frequently Asked Questions in Corporate Finance Frequently Asked Questions in Corporate Finance Pierre Vernimmen, Pascal Quiry, Antonio Salvi, Maurizio Dallocchio and Yann LeFur A John Wiley & Sons, Ltd., Publication This edition first published in 2011 Copyright  2011 Pierre Vernimmen Registered office John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, United Kingdom For details of our global editorial offices, for customer services and for information about how to apply for permission to reuse the copyright material in this book please see our website at www.wiley.com The rights of Pierre Vernimmen, Pascal Quiry, Antonio Salvi, Maurizio Dallocchio and Yann LeFur to be identified as the authors of this work have been asserted in accordance with the Copyright, Designs and Patents Act 1988. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by the UK Copyright, Designs and Patents Act 1988, without the prior permission of the publisher. Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included......

Words: 120046 - Pages: 481

Premium Essay

Sap for Atlam

... What’s the value in a brand name? Everything. A brand that is reputable and stands apart from others provides competitive advantage, confirms credibility, adds value to a company and ensures long lasting customer relationships. As an organisation that has been around for more than three decades, the DRB-HICOM name is one that needs no introduction. It is an organisation that prides itself on always staying ahead of the game, in setting high standards in all its endeavours and constantly challenging the status quo. With a portfolio of more than eighty operating companies in its stable, the Group’s diversity elevates it to a brand with unique character and promise. PROTON, Alam Flora, PUSPAKOM, Pos Malaysia, MODENAS, Bank Muamalat, Glenmarie Properties – these are some of the household names that form a part of the DRB-HICOM Group. From the Automotive and Services sectors to the Property, Asset and Construction sector, DRB-HICOM’s operating companies have always had a strong presence in the local market. Helmed by bold leadership and imbued with core values, strong work ethics and a vision to be number 1, the DRB-HICOM brand is well-positioned to go a step further to become a leading global brand in the future. OUR VISION to be number 1 and continuously excel in all that we do OUR MISSION to lead in the growth of the nation in the areas of DRB-HICOM’S core businesses SHARED VALUES excellence decorum teamwork integrity innovation quality......

Words: 99565 - Pages: 399

Premium Essay

Proton

... What’s the value in a brand name? Everything. A brand that is reputable and stands apart from others provides competitive advantage, confirms credibility, adds value to a company and ensures long lasting customer relationships. As an organisation that has been around for more than three decades, the DRB-HICOM name is one that needs no introduction. It is an organisation that prides itself on always staying ahead of the game, in setting high standards in all its endeavours and constantly challenging the status quo. With a portfolio of more than eighty operating companies in its stable, the Group’s diversity elevates it to a brand with unique character and promise. PROTON, Alam Flora, PUSPAKOM, Pos Malaysia, MODENAS, Bank Muamalat, Glenmarie Properties – these are some of the household names that form a part of the DRB-HICOM Group. From the Automotive and Services sectors to the Property, Asset and Construction sector, DRB-HICOM’s operating companies have always had a strong presence in the local market. Helmed by bold leadership and imbued with core values, strong work ethics and a vision to be number 1, the DRB-HICOM brand is well-positioned to go a step further to become a leading global brand in the future. OUR VISION to be number 1 and continuously excel in all that we do OUR MISSION to lead in the growth of the nation in the areas of DRB-HICOM’S core businesses SHARED VALUES excellence decorum teamwork integrity innovation quality......

Words: 99565 - Pages: 399

Free Essay

Globalization of Cemex

...significant implications for the other cement majors. This case begins with a brief overview of the cement industry and international competition within it. It then describes the globalization of CEMEX and how it was managed. ________________________________________________________________________________________________________________ Professor Pankaj Ghemawat and Research Associate Jamie L. Matthews prepared this case drawing, in part, on a course paper by Pau Cortes, Heriberto Diarte and Enrique A. Garcia. HBS cases are developed solely as the basis for class discussion. Cases are not intended to serve as endorsements, sources of primary data, or illustrations of effective or ineffective management. Copyright © 2000 President and Fellows of Harvard College. To order copies or request permission to reproduce materials, call 1-800-545-7685, write Harvard Business School Publishing, Boston, MA 02163, or go to http://www.hbsp.harvard.edu. No part of this publication may be reproduced, stored in a retrieval system, used in a spreadsheet, or transmitted in any form or by any means—electronic, mechanical, photocopying, recording, or otherwise—without the permission of Harvard Business School. This document is authorized for use only by Arrive Magali in Competition and Strategy (Fall 09) taught by BEN GOMES-CASSERES from August 2009 to December 2009. 701-017 The Globalization of CEMEX The Cement Industry Cement had been used since antiquity as a binding...

Words: 12297 - Pages: 50

Premium Essay

Reappearing Dividends

...prominent judge on Chicago’s Seventh Circuit).3 Easterbrook’s argument was that dividends provide investors with what amounts to a monitoring-and-control device that works as follows: By committing to pay out cash that could otherwise be used to fund capital investment, companies that pay dividends increase the odds that they will be forced to return to the markets for outside capital. And to the extent that the process of raising capital from outsiders allows for more intensive scrutiny by “the market,” the regular payment of dividends ends up increasing investors’ influence over the real drivers of corporate value—corporate investment and operating decisions. In 1986, Michael Jensen expanded on Easterbrook’s explanation with a more specific and forceful account of the role of dividend payments in disciplining corporate managements.4 Jensen’s argument, in brief, was that dividend payouts increase the value of mature, cash-generating companies by controlling management’s natural tendency to use excess capital to pursue low-return investments. Like stock repurchases and heavy debt financing, high dividend payouts help management focus on maximizing profitability and value and resist the temptation to chase growth at any cost.5 Indeed, Jensen went so far as to argue that, in order to maximize value, mature companies with limited growth opportunities should commit to pay out all their “free cash flow”—that is, all (non-operating) cash that cannot be profitably......

Words: 10222 - Pages: 41