... Windows------------------------------------------------------------------------------.4 Windows RT--------------------------------------------------------------------------4 Comparison of Windows and Windows RT---------------------------------- 4-5 Difference between Linux and Android-------------------------------------------- 6-7 Difference between Mac...
Words: 2587 - Pages: 11
...Recent IT developmentsHardware | | Type | Summary-Description (what is it) | Examples of Recent Developments (eg new models, recent changes or new versions) | Images | Computer Platforms | PC | A PC, also known as personal computer, a typical PC includes a system unit, monitor, keyboard and mouse. PC's allow us to write papers, create spreadsheets and play games, all with the help of software as well as the hardware. | HPENVY 23-d180ea Touch Smart 23" Touchscreen All-in-One PC | | | Apple MAC | The Macintosh or Mac, are a series of personal computers designed by Apple inc. It is targeted at the home, education and creative professionals market. | iMac | | | Tablet PC (eg iPad, Galaxy) | A tablet is a mobile computer with display, circuitry and battery all in one place. Tablets are normally touch screen, meaning we can interact with the screen with our fingers, or some can be used with a stylus (pen) | IPad Mini | | Communication Technologies | smart phones | A smart phone is a type of phone that basically exceeds the limit of a regular cellular phone. Some of the components of a smart phone include, the ability to send and receive emails, the ability download applications such as personal and business finance managers, or just games. Another important factor is that basically all smartphones have the capability to connect to the internet. | iPhone 5c | | | Bluetooth | Bluetooth is a wireless technology for passing data over short distances. Bluetooth...
Words: 1536 - Pages: 7
...(2014Spring) INFO TECHNOLOGY INFRASTRUCTURE INFO-300-901-2014Spring | Technical Essay 3 | a comparative analysis | | Kym Harris | 4/26/2014 | | Introduction Microsoft Windows, Apple Macintosh, and Red Hat Linux are the most popular operating systems used today. All three platforms have pros and cons, but many users struggle to find the right OS to serve their computing needs. While Macintosh and Linux seem to be impenetrable to viruses, Windows suffers a great deal from such intrusions. On the other hand, users find Windows to be easier to navigate than the other two operating systems. Macintosh, operating on the Apple computer platform is very expensive in comparison to the Windows platform, while Red Hat Linux is completely free and offers much of the same features as any of the others. The biggest advantage of a Windows platform is its ability to be compatible with almost every application, driver, or game available. Of course, Macintosh does not offer this same level of compatibility, as very few programs will run on this platform. Linux can be installed on any computer except Apple, and more flexibility and options than any of its competitors. Microsoft Windows Historical Background * 1981- Microsoft released its first operating system, Microsoft Disk Operating System (MS-DOS). Initially created for IBM computers, Microsoft was able to sign a deal that allowed them to license this product to other companies. MS-DOS used command line instead of the graphical...
Words: 1689 - Pages: 7
...prevent viruses, hackers or malware that can cause permanent damage to your hard drive and release personal info. - Norton, Kaspersky, and McAfee are examples of antivirus software 3. File compression programs: - Helps save space and providing fast loading by compressing files together to make them smaller. WinZip is a type of file compressor 4. Troubleshooting and diagnostic tools: - A type of diagnostic tool is the DirectX diagnostic tool that presents info about the components and drivers installed on your system. OS Software 1. Desktop Operating Systems: - controls the hardware so that users and application can make use of it - Mac, Window, Linux are all operating systems 2. Windows: - 1st Brought up in 1985 - Bill gates the CEO. - One of the biggest OS worldwide now available on phones 3. MAC OSX: - Steve Jobs was the CEO...
Words: 476 - Pages: 2
...managing connected devices such as a printer. An operating system will make a computer secure to each different user and user specific by requiring a password for each user. DIFFERENCES BETWEEN WINDOWS, MAC OS X, AND LINUX Microsoft Windows is the most preferred operating system among computer users. Microsoft Windows consists of different operating systems developed and sold by Microsoft. Windows is available on desktops, laptops, phones, servers, and tablets. The first Microsoft operating system was released in 1985 and MS-DOS was the only Graphical User Interface. The small Microsoft Company skyrocketed through the 90's and millennium with the massive growth of computers around the workplace and eventually at home. The latest Microsoft Windows operating system is Microsoft Windows 10 and was released in late 2014. Many desktops and laptops received a free upgrade courtesy of Microsoft. Microsoft 10 upgraded to stylish icons like Mac OSX. The Mac OS X is Apple specific to Macintosh machines. OS X was developed and marketed by Apple Inc. and came preinstalled on all Mac desktops and laptops since 2002. In addition, MAC OS X is a great platform for software and graphic engineers because it supports technologies like UNIX, Java, Cocoa, Carbon, Database, and Scripting. The Mac OSX comes with expansive software packages that come preinstalled or can be...
Words: 483 - Pages: 2
...like humans. Hardware is the tools and the durable pieces. There are three types of hardware, input, output, and storage. Input devices use to enter data in the computer like keyboard for example. Output is used to show and process data like speakers. Storage devices are used to store and process information and data like the RAM. Software is the programs and applications that are processed in a computer. The software is often more expensive and harder to build then hardware. Computer software is made by programmers. There are many different types of software and today I'm going to tell you,ore details about software and specially on operating system. Different Types of Software Type Operating systems Examples Microsoft Windows. Linux. Macintosh OS X. Purpose Control your computer. ______________________________________ Type Word processors Examples Word. Corel WordPerfect. AbiWord. Purpose Write essays, novels, reports, or other types of text. ______________________________________ Type Spreadsheets Examples Excel. Lotus 1-2-3. VisiCalc. Purpose Track budgets or investments, or make other calculations. ______________________________________ Type Presentation software Examples PowerPoint. Purpose Create slideshows for meetings. ______________________________________ Type Database management systems Examples Access. Oracle. Sybase. 4th Dimension. Purpose Organize and filter lists of data, such as addresses or inventories....
Words: 1826 - Pages: 8
...layer (SSL) or transport layer security (TLS). These two layers of security allow information to be transmitted worry-free between browsers and web servers, or between a mail server and mail client. SSL is in the form of encryption, which scrambles data sent over a network to keep it private. The second layer involves verification that the server is authentic." With the heighten computer security regarding vulnerabilities, the increase of user awareness and training users to not click on particular links is difficult yet feasible. Although most operating system has computer security protection, the tasks of protecting the systems from vulnerabilities are a daunting task because the operating systems are unique. Security flaw in Microsoft and Mac OS X® A known security flaw in Windows is called the Freak. The Freak security flaw allowed hackers to create a simulated middle person attacks on the encrypted secure sockets layer and transport layer of a security connections. It was discovered that hackers could force websites to weaken the system encryption intentionally. Once the system encoding is hacked, hackers were allowed to steal data. "While the FREAK security vulnerability is mainly associated with Apple's Safari and Android's stock browsers, it apparently affects Windows PC too. Thankfully, Microsoft has issued an update that will patch up the vulnerability in its SSL/TSL implementation called Schannel" (Moon, 2015). A known fix...
Words: 843 - Pages: 4
...application code is usually executed directly by the hardware and frequently makes a system call to an OS function or be interrupted by it. Operating systems can be found on many devices that contain a computer—from cellular phones and video game consoles to supercomputers and web servers. Examples of popular modern operating systems include Android, BSD, iOS, Linux, OS X, QNX, Microsoft Windows, Windows Phone, and IBM z/OS.. History 1. Windows - The first Windows system was released in 1985. Originally, it was just a graphical user interface on top of MS-DOS – a state of affairs that lasted until the release of Windows 95, when MS-DOS products were integrated into Windows. Windows 95 was a huge departure from the previous systems and was the first major step in Window’s transition from GUI to operating system. 2. Apple - The Apple Macintosh system is a little older than Windows, having first been released in 1984. From the start, it was an entirely graphical operating system, and from quite an early stage became popular among the earliest computer graphic designers. In 2005, Apple changed the design and structure of Mac OS, moving from...
Words: 1245 - Pages: 5
...Ransomware Discuss the threat When infected restricts you to access to a computer system. This will become more refined in its targets and methods. Experts predict that the variants of ransomware that hurt the security software that are installed within a computer may particularly target the endpoints which sign up with cloud-based storage solutions like Google Drive, Dropbox, OneDrive and many more. On detecting the endpoint, ransomware will exploit the stored personal credentials of the logged-in user and will even infect the cloud storage that is backed up. McAfee has warned that ransomware attackers will try out as many ways possible to shell out ransom payments from their victims. Degree of damage The most advanced and most damaging ransomware in the wild at the moment, specifically targeting U.S. businesses and individuals. It's a $70 million per year criminal enterprise. Its magnitude is now confirmed by law enforcement. Some quick math shows $18,145 in costs per victim, caused by network mitigation, network countermeasures, loss of productivity, legal fees, IT services, and/or the purchase of credit monitoring services for employees or customers. As you can see, the total costs of a ransomware infection goes well above just the ransom fee itself, which is usually around $500 but can go up to $10,000. What it attacked Ransomware is a type of malware that infects a computer and restricts a user’s access to the infected computer. This type of malware...
Words: 2057 - Pages: 9
...Windows and Mac computer systems have one central kernel that abstracts the hardware so the operating system can manage it. Linux is more customizable because it allows you to create your own kernel. You have been hired as an IT consultant and have been asked to write a manual on the kernel distributions of Linux. This requires the following deliverables: * Define the necessary components and functions of an operating system as they relate to the Kernel and the shell. * List the 5 most common distributions (there are over 600 at present). * After choosing the kernel, the choice of a shell also needs to be made. List at least 2 shells that are available for the kernel that you have selected. * Choose one of the shells, and discuss how you can perform a minimum of 20 commands or functions. There are an influx of available operating systems out there to choose from. Windows, Unix, IOS X, and Linux to name a few. I have been asked to write a brief manual on the kernel distributions of Linux that will include defining the necessary components and their relations to the kernel and shell, the five most common distributions, choosing a kernel and the specific compatible shells, and how to perform at least commands or functions. A kernel in its simplest definition the center of a computer operating system that provides basic services for all other parts of the operating system, it allocates time and memory to programs and handles the filestore and communications in response...
Words: 276 - Pages: 2
...software applications can operate accordingly. Operating systems can be found in almost any type of a computer device such as personal computers, supercomputers, cellular telephones, and video game consoles as stated by Linux Systems (2011). As the research was being conducted for this paper, it raised a question whether the internet uses the operating system? It proved to be a challenge to actually pin point the most common operating systems on the Internet, but as the research continued, it was obvious that these three, Windows, Mac OS X, and Linux are considered to be the most common operating systems used on the Internet today. Background of each Operating System Windows Privately owned operating systems, Microsoft Windows is generally used on personal computers and as of today, the most commonly used version is Windows XP with the new version of Windows 7 for personal computers and Windows Server 2008 R2 for servers is entering the market. Mac OS X Mac OS X is a graphical operating system which is designed and distributed by Apple Incorporated is considered to be partially privately owned. Its latest version of software is pre-loaded on all of the Macintosh Computers and is also a UNIX operating system that uses advanced technology. Linux Is an operating system that can be used on a variety of devices such as personal computers, supercomputers, and some hand...
Words: 1150 - Pages: 5
...Linux Linux What is an ‘Operating System’? Mac OS Mac OS An operating system is the program that acts like the brain of the computer. It is used to control everything. The operating system controls programs and the functions of the computer along with the hardware, software' and file organisation. Computers need an operating system so that they can complete tasks. All programs, software’s and hardware’s need something to tell them how to perform their task, and this is what the operating system is used for. Without one, your computer would be useless. Operating systems are designed to make the computer more convenient for the user; it displays all of the information for the user in a clearer layout. Some popular operating systems are Windows 8.1, Mac OS and Linux. There are 2 variants of operating systems; A Command Line Interface (CLI) and a Graphical User Interface (GUI). Windows 8.1 Windows 8.1 Command Program Command Program Command Line Interface: A ‘Command Line Interface’ is a variant of operating system that allows the user to directly interact with the computer by typing in commands. The computer displays a command program or command box that allows the user to give the computer instructions by entering the command and pressing the enter key. CLI is used by mostly professional programmers who have experience in computer languages. Using CLI doesn’t restrict you as GUI does. It allows you to look into program files and rewrite how the program works. Although...
Words: 1074 - Pages: 5
...Open/Closed Source Heidi Mitchum POS 355 May 6, 2013 Michele Gamberutti Open/Closed Source The background behind an operating system stems into different branches of a tree. There are many items that go into a functional operating system. One of which includes open and closed source. To understand what may be a source for an operating system is the first step to understand what an open or closed source is. Even though at times it can be a wasteful effort, open/closed sources can be an advantage of cost sharing and software development. First it is a good idea to find out what it means to have a open or closed source system, meaning components that make up the functions needed for an application or software. With both open and closed working very differently as to how the system is developed and how they run within a software program or application. Each of these sources will be discussed. Open source systems are typical used for everyone to see and for anyone to use, and this is why the name is open. There are advantages to having an open source system which include: • Larger Development Support – Giving a large support system the developers feel as though they can make changed when and where every needed (Vidal, 2013). • Customizable – Having full control of the system gives developers a sense of control to make changes to the programs for advancement in all areas (Vidal, 2013). • Security – Having two eyes is better than one, having more security...
Words: 996 - Pages: 4
...MAC SECURITY | managing information security Submitted by : srinivasa reddy marreddy Introduction Many years of operating system improvement and an accumulation of frameworks and features from many other systems joined with numerous interesting plans and executions brought the advancement of Apple, Inc's. OS X family. In order to understand the progress of the older systems of OS X it is necessary to examine the upgraded technology and their interaction with other systems. To protect and troubleshoot the system it is necessary to know and understand the working of OS X technology. The open source core of the system is an operating system called Darwin. Darwin is a variant of BSD Unix running on the Mach 3 microkernel from Carnegie Mellon University and the Open Software Foundation (Singh, 2007). On top of Darwin, Apple utilizes both open source and proprietary code and builds a intricate and complex operating system which resembles the look of classic Macintosh computers with almost no similarity to recorded (1980s) Macintosh underlying innovation. In fact OS X is more compatible with its sibling UNIX systems and with Microsoft Windows than with past Apple computers. OS X is a UNIX 03 system as certified by the Open Group and recorded on their register (The...
Words: 1735 - Pages: 7
...is not an example of a smartphone operating system? a. iOS b. BlackBerry c. Android d. Linux 2. You are most likely to find a real-time operating system (RTOS) a. in your automobile b. on a laptop c. on a smartphone d. on an iPad 3. All of the following are key attributes of an operating system EXCEPT a. manages memory and storage b. provides a user interface c. manages the CPU d. tracks connections to external networks 4. Modern operating systems such as Windows and OS X use a _____________ interface. a. command-driven b. graphical user c. menu-driven d. text-based 5. If your computer can’t store all the required operating system data in RAM, it can use a temporary file on the hard drive to store data. This is known as a _________ file. a. Linux b. non-volatile c. swap d. thrash True–False _____ 1. Each device attached to your computer needs a device driver to communicate with the operating system. (True) _____ 2. The first step of the boot process is the Power-on self-test (POST). (False) Part 1: Critical Thinking 1. Market Dominance Microsoft and Apple are large corporations and have control of most of the OS market. Although there have been some innovative changes to both of their proprietary operating systems, does their size and market dominance prevent more innovation? Why or why not? Linux, as an open source environment, is poised for greater innovation. Why do you think the Linux OS doesn’t have a greater market share? Responses may vary...
Words: 1075 - Pages: 5