...UNIT 1 NOTES Digital Computer A digital computer is an electronic computing machine that uses the binary digits (bits) 0 and 1 to represent all forms of information internally in digital form. Every computer has a set of instructions that define the basic functions it can perform. Sequences of these instructions. Component of Digital Computer: (1)CPU: The Central Processing Unit (CPU) or the processor is the portion of a computer system that carries out the instructions of a Computer, and is the primary element carrying out the computer's functions. This term has been in use in the computer industry at least since the early 1960s . The form, design and implementation of CPUs have changed dramatically since the earliest examples, but their fundamental operation remains much the same. (2)ALU: an arithmetic logic unit (ALU) is a Digital computer that performs arthimatic and logical operations. The ALU is a fundamental building block of the central processing unit(CPU) of a computer, and even the simplest microprocessor contain one for purposes such as maintaining timers. The processors found inside modern CPUs and graphics processing units(CPU) accommodate very powerful and very complex ALUs; a single component may contain a number of ALUs. Mathematician proposed the ALU concept in 1945, when he wrote a report on the foundations for a new computer called the EDVAC. (3)Memory: memory is an organism's ability to store, retain, and recall information. Traditional studies of memory...
Words: 2515 - Pages: 11
...The Linux security technologies I researched are SELinux, chroot jail and iptables. SELinux (Security-Enhanced Linux) is a Linux feature that provides the mechanism for supporting access control security policies, including United States Department of Defense-style mandatory access controls, through the use of Linux Security Modules (LSM) in the Linux kernel. It is not a Linux distribution, but rather a set of kernel modifications and user-space tools that can be added to various Linux distributions. Its architecture strives to separate enforcement of security decisions from the security policy itself and streamlines the volume of software charged with security policy enforcement. The key concepts underlying SELinux can be traced to several earlier projects by the United States National Security Agency. The United States National Security Agency (NSA), the original primary developer of SELinux, released the first version to the open source development community under the GNU GPL on December 22, 2000. The software merged into the mainline Linux kernel 2.6.0-test3, released on 8 August 2003. Other significant contributors include Network Associates, Red Hat, Secure Computing Corporation, Tresys Technology, and Trusted Computer Solutions. Experimental ports of the FLASK/TE implementation have been made available via the TrustedBSD Project for the FreeBSD and Darwin operating systems. It provides an enhanced mechanism to enforce the separation of information based on confidentiality...
Words: 1300 - Pages: 6
...Linux+ Study guide Chapter 1 Shell Facts The Linux shell is the Command Line Interface (CLI) or Text User Interface (TUI) that administrators use to control a Linux operating system. Users and programs use the shell to send commands to the system. A shell might be opened inside a Graphical User Interface (GUI), or might be the sole method used to run the computer. Although most Linux distributions now include a graphical interface, and many administration tools have been converted to a graphical format, many tasks are best performed from the command prompt. In addition, while graphical elements vary between distributions, shell commands are more likely to be consistent between distributions. The following table describes many common shell types: Shell Type | Description | bash | The Bourne-again shell (bash) is the standard shell used in most Linux computers. It uses commands similar to a UNIX shell. Bash includes features such as: * Command completion when pressing the tab key * Command history * Improved arithmetic functions | sh | The Bourne shell is an earlier version of the Bash shell, and is similar in many ways. Sh is the original shell created by Steve Bourne. | ksh | The Korn shell was developed by David Korn. Ksh has scripting features not found in bash. | csh | The C-shell uses syntax similar to syntax used in the C programming language. | tcsh | The tcsh shell is an improved version of csh. It offers command line editing and completion features...
Words: 2543 - Pages: 11
...Marketing Research Submitted by: GROUP-5 Ajit Kumar Anand 03 Chetna Asopiya 04 Doly Chotwani 07 Ashish Dhole 10 Kunal Gogri 13 Reema Jain 16 Rohit More 31 Kajal Tuteja 48 Submitted to: Prof. Victor Manickam T.Y.BMS 2005-2006 Semester VI V.E.S COLLEGE OF ARTS, SCIENCE AND COMMERCE. Index |Chapter No. |Topic |Page No. | |1 |Introduction of the topic | | |1.1 |Profile of the company: Xcel Solutions | | |1.2 |Introduction to the project: “Looking Beyond Windows” | | | | | | |2 |Research Methodology | | |2.1 |Primary Research | | |2.2 |Secondary Research ...
Words: 5125 - Pages: 21
...amazon, Google, and Rackspace. Rackspace has many features to choose from and can really help depending on what you will need to use. They have ecommerce sites, mobile apps, rich media sites, test/dev environments, sharepoint developments, saas applications, corporate websites, and enterprise applications. You can access linux and windows servers, my SQL cloud databases with 229% faster performance than RDS, high performance ssd block storage and cloud files storage with cdn, and software defined networks. You have the option of building your own language; it is open to any API depending on what language you prefer whether it is Java, Python etc. They also have Rackspace private cloud and hybrid cloud that you can try. Amazon has many of the same features you can choose from. They have a lot of high memory space like extra large instance is 17.1GB, double extra memory is 34.2GB, and quadruple extra large is 68.4 GB. It can be used on many different operating systems such as red hat, suse linux, fedora, windows server, amazon linux, Gentoo linux, oracle, Ubuntu, and debian. The cost depends on exactly how much you use and they charge by the hour with no long term commitments. It is reliable, secure, inexpensive, and easy to start. With the google cloud they have a lot of security features to make sure your work is safe. Your work is always backed up, you can control your own data, increased security and reliability, strong encryption and authentication, and they are constantly improving...
Words: 366 - Pages: 2
...assignment 1 Contents The Linux Operating System 1 The History of Linux 3 The linux mascot 4 linux and its fued with microsoft 4 The Advantages and Disadvantages of Linux 6 Comparing Linux to Windows 7 The increase in complexity of Operating Systems 8 advantages and disadvantages of this increased complexity 10 Client-Server Operating System 11 Plug and Play & Multitasking in Windows 13 plug and play 13 multitasking in windows 15 References 17 The Linux Operating System Before getting into Linux, a short introduction on what an Operating System is – An Operating System is a software layer that is between the hardware and the software that you actually use to get something productive. In other words, the operating system is what allows the software to talk to the hardware, such as storing information to the hard drive, to send out print jobs to the printer and so on and so forth. Figure [ 1 ] An excerpt from the Ubuntu (a Linux distribution) website on how and why it's free Figure [ 1 ] An excerpt from the Ubuntu (a Linux distribution) website on how and why it's free Now, onto Linux. Linux, like Microsoft Windows is an Operating System. Unlike Windows, however, Linux is open source, meaning one can readily find the source code for the OS for free and add or edit the code to his heart’s content. 1Library A library is a collection of implementations of behavior, written in terms of a language that has a well-defined interface by which the...
Words: 4387 - Pages: 18
...OPEN SOURCE SOFTWARE What are reasons for business to use open source software? With the current economy difficulties, companies are trying to find areas in their businesses where they can save money. Many companies are having no choice but to let people go. Some businesses try to avoid lay-offs and instead are looking in other areas to save money. One of the areas is, of course, the IT department; software application acquisition is an area that might lead to a big money savings. Even in financially difficulties times, businesses want or need to improve their application environment. Sometimes it might even be necessary to invest in the IT infrastructure for long-term savings, which may result in the company not needing to close their doors. But many business owners or CEO’s will question if open source software is ready for business. This research paper intends to answer this question. The best reason to use open source software in a business environment is cost savings. This gives the business freedom to use software and change the source code in other words, modify how the software application is used, as it is needed. Open source removes the need for dependence on single vendor solutions and it provides very high quality applications and very good support. To understand open source software it is important to know what open source is, and what the meaning of open source software is. This research paper will also show where open source came from; the history of open...
Words: 2520 - Pages: 11
...a) What trends are occurring in the development and use of the major types of computer systems? Every day there are new developments. New products are launched and new product ideas and applications of information technology involve. As we can see the trends development of computer systems can be seen from it physical and functions. Computers now days a becoming smaller but had more memory, user friendly, reliable to use, and more efficient for user to bring it travelling as it can be connected via telecommunication everywhere and anywhere. Few examples are, after dual core processors, quad core processors for PCs are being launched. Another example is the manufacture from PC to Laptop, PDA, I Pad, Tabs and etc. b) Do you think that information appliances like PDAs, I Pad will replace personal computers (PCs) in business applications? Explain. In my opinion, the replacement of PCs by PDAs and I Pad in business application is depending on the nature of the business and also the needs of the company. Before decided to change our PCs to PDA few question should be ask. Example, it is necessary to change PCs to PDA? What will be the impacts on the change? How much cost will be involved on the changes? Does it improve the customer service levels? Now days we are moving toward smart gadgets and information appliances. This will of course give impact on the nature of business applications. However, the management must decide the type of technology that will best meet the needs of...
Words: 1882 - Pages: 8
...enterprise LinuX subscription Guide subscription Guide Table of ConTenTs Introduction How IT organizations benefit from subscriptions What is included in your Red Hat subscription? Support for the production environment Subscription packaging model Assembling your subscription order Sample worksheet 1: Provisioning physical servers Sample worksheet 2: Adding guests to a virtual environment Sample worksheet 3: Setting up a virtual environment Subscription scenarios and recommendations Physical production environment Sample worksheet 4: Setting up a physical, mission-critical production environment Virtual production environment Sample worksheet 5: Calculating subscriptions for guests Sample worksheet 6: Calculating subscriptions for Red Hat Enterprise Linux on virtual environments Open hybrid cloud Sample worksheet 7: Calculating subscriptions for a private cloud Public cloud access subscriptions Sample worksheet 8: Calculating subscriptions for a public cloud Disaster recovery Development environment Desktops and workstations Managing subscriptions Renewing subscriptions Subscription terms facebook.com/redhatinc @redhatnews linkedin.com/company/red-hat 2 3 3 5 6 8 9 9 9 10 10 11 11 12 13 13 14 14 14 14 15 15 16 17 17 redhat.com System coverage Support services levels Proper use of subscriptions and services Next steps Registering on the Red Hat Customer Portal Activating subscriptions Downloading software Entitling subscriptions Red Hat Enterprise Linux products ...
Words: 8641 - Pages: 35
...and an efficient operating system; one of which consist of a closed and an open source. To understand the sources of an operating system, it is best to find out and figure out what closed and open source is. Closed and Open source can be a disadvantage or an advantage of software development and cost sharing. The initial step is to recognize what it means to have a closed or open system, and what components are needed and will make up the requirement for software or an application to function. With both closed and open sources functioning differently as to how the system is programmed and structured and how the system will function within a software application or program. OPEN SOURCE Operating systems of an open source can be defined as free software developed by corporations or individuals to develop an alternate to not having to rely on any individual or one company to modify or change the software and maximize its used for the individuals or companies' advantages. Open source are typically free to use by each individual or companies to modify and changed without having to worry about the licensing and compliance to the original developer of the software being used. These are the advantages to an open source system. * Unlimited Community Support: With the public support, the alteration and transformation of the system is more frequently, more elaborating on time to develop a greater system and advance the code ("Open Source", n.d.). With the unlimited resources...
Words: 714 - Pages: 3
...LINUX PROGRAMMING FINAL NOTES UNIT 1ST THESE NOTES ARE AS PER SYLLABUS & WILL HELP YOU TO ACHIEVE SUCCESS IN FINAL EXAM OF MCA 5TH SEMESTER. LETS START: UNIT 1ST Linux – The Operating System: Linux is one of popular version of UNIX operating System. It is open source as its source code is freely available. It is free to use. Linux was designed considering UNIX compatibility. It's functionality list is quite similar to that of UNIX. Linux is a free distributed implementation of a Unix-like Kernel Developed by Linus Torvalds at the University of Helsinki with the help of programmers across the Internet. Linux history: * Linux features: Following are some of the important features of Linux Operating System. * Portable - Portability means softwares can works on different types of hardwares in same way.Linux kernel and application programs supports their installation on any kind of hardware platform. * Open Source - Linux source code is freely available and it is community based development project. Multiple teams works in collaboration to enhance the capability of Linux operating system and it is continuously evolving. * Multi-User - Linux is a multiuser system means multiple users can access system resources like memory/ ram/ application programs at same time. * Multiprogramming - Linux is a multiprogramming system means multiple applications can run...
Words: 6867 - Pages: 28
...Understanding Open Source Software Development Process Abstract: As the assignment requirement, we selected eclipse, Linux kernel and commercial software from the corporation of one member. It is the regret that we had not enough time to collect all statistics by ourselves, and instead of that, papers and blogs are the main resources for open source part in this document. The open source software is introduced before the commercial one. Keywords: development process, code ownership, defect density, bug lifetime Background: Linux Kernel In April 1991, Linus Torvalds, a 21-year-old student at the University of Helsinki, Finland started working on some simple ideas for an operating system. He started with a task switcher in Intel 80386 assembly language and a terminal driver. On 26 August 1991, Torvalds posted the following to comp.os.minix, a newsgroup on Usenet: I'm doing a (free) operating system (just a hobby, won't be big and professional like gnu) for 386(486) AT clones. This has been brewing since April, and is starting to get ready. I'd like any feedback on things people like/dislike in minix, as my OS resembles it somewhat (same physical layout of the file-system (due to practical reasons) among other things). After that, many people contributed code to the project. Early on, the MINIX community contributed code and ideas to the Linux kernel. At the time, the GNU Project had created many of the components required for a free operating system, but its own kernel...
Words: 9369 - Pages: 38
...4/5/2016 Intel® Celeron® Processor 877 (2M Cache, 1.40 GHz) Specifications Intel® Celeron® Processor 877 (2M Cache, 1.40 GHz) Specifications - Essentials Status Launched Launch Date Q2'12 Processor Number 877 L3 Cache 2 MB DMI 5 GT/s Instruction Set 64-bit Instruction Set Extensions SSE4.x Embedded Options Available No Lithography 32 nm Recommended Customer Price N/A Datasheet Link - Performance # of Cores 2 # of Threads 2 Processor Base Frequency 1.4 GHz TDP 17 W - Memory Specifications Max Memory Size (dependent on memory type) 16 GB Memory Types DDR3 1066/1333 Max # of Memory Channels 2 Max Memory Bandwidth 21.3 GB/s ECC Memory Supported ‡ No - Graphics Specifications Processor Graphics ‡ Intel® HD Graphics Graphics Base Frequency 350 MHz Graphics Max Dynamic Frequency 1 GHz Graphics Output eDP/DP/HDMI/SDVO/CRT Intel® Quick Sync Video No Intel® InTru™ 3D Technology No Intel® Insider™ No http://ark.intel.com/products/67192/IntelCeleronProcessor8772MCache1_40GHz 1/5 4/5/2016 Intel® Celeron® Processor 877 (2M Cache, 1.40 GHz) Specifications Intel® Wireless Display No Intel® Flexible Display Interface (Intel® FDI) Yes Intel® Clear Video HD Technology No Intel® Clear Video Technology No # of Displays Supported ‡ 2 - Expansion Options PCI Express Revision ...
Words: 1956 - Pages: 8
...LINUX System Programming Other Linux resources from O’Reilly Related titles Building Embedded Linux Systems Designing Embedded Hardware Linux Device Drivers Linux Kernel in a Nutshell Programming Embedded Systems Running Linux Understanding Linux Network Internals Understanding the Linux Kernel Linux Books Resource Center linux.oreilly.com is a complete catalog of O’Reilly’s books on Linux and Unix and related technologies, including sample chapters and code examples. ONLamp.com is the premier site for the open source web platform: Linux, Apache, MySQL and either Perl, Python, or PHP. Conferences O’Reilly brings diverse innovators together to nurture the ideas that spark revolutionary industries. We specialize in documenting the latest tools and systems, translating the innovator’s knowledge into useful skills for those in the trenches. Visit conferences.oreilly.com for our upcoming events. Safari Bookshelf (safari.oreilly.com) is the premier online reference library for programmers and IT professionals. Conduct searches across more than 1,000 books. Subscribers can zero in on answers to time-critical questions in a matter of seconds. Read the books on your Bookshelf from cover to cover or simply flip to the page you need. Try it today for free. LINUX System Programming Robert Love Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo Linux System Programming by Robert Love Copyright...
Words: 125679 - Pages: 503
...Introduction The most commonly known Operating Systems (OS) today are UNIX, Linux, MacOS, and Windows. These operating systems all behave in their own way and similar in others. This paper will discuss this comparison of how these operating systems utilize memory, process handling, file management, and security. Memory Management Each operating system is required to allocate a certain amount of memory for the operating system itself for the processes that are being used or executed. There are two places memory exists: physically on the motherboard of the computer and within the operating system itself. When the operating system dynamically divides the memory usage between these two areas, this is called memory management. Each operating system manages memory different from the others; however they all follow some basic rules of memory management. All of the operating system’s memory management in general follows these requirements: relocation, protection, sharing, logical organization, and physical organization (Stallings, 2015). Relocation of memory is the process that allows the operating system to move a process or file from physical memory to virtual memory and back again, depending on the need for that data. Virtual memory exists within the operating system which uses the hard drive to store temporary information and physical memory is located on the motherboard of the computer. While the process is in memory, protection of that area needs to be enabled to...
Words: 2918 - Pages: 12