...In this pack of POS 355 Entire Course you will find the next docs: POS-355 Week 1 DQ 1.doc POS-355 Week 1 DQ 2.doc POS-355 Week 1 Lectures Lecture 1.1 Computer Basics.doc POS-355 Week 1 Lectures Lecture 1.2 OS Basics.doc POS-355 Week 2 Assignments Individual Real-time Operating System.doc POS-355 Week 2 DQ 1.doc POS-355 Week 2 DQ 2.doc POS-355 Week 3 Assignments Individual IND.doc POS-355 Week 3 DQ 1.doc POS-355 Week 3 DQ 2.doc POS-355 Week 4 Assignments Individual IND.doc POS-355 Week 4 DQ 1.doc POS-355 Week 4 DQ 2.doc POS-355 Week 5 DQ 1.doc POS-355 Week 5 DQ 2.doc General Questions - General General Questions POS 355 Week 1 Individual Assignment Memory Management Paper For this assignment, you will choose one the following options: · Option 1: Write a 2-page paper that explains memory management requirements. · Option 2: Write a 2-page paper that explains the differences in memory management between Windows® and Linux®. Format your paper consistent with APA guidelines. UNIX/Linux Versus Mac Versus Windows Write an 8- to 10-page paper that compares and contrasts the basic system differences between UNIX®/Linux®, Mac®, and Microsoft ® Windows® operating systems. Include discussion and comparison of the following: · Memory management · Process management · File management · Security Format your paper consistent with APA guidelines....
Words: 367 - Pages: 2
...This work of POS 355 Week 2 Discussion Question 1 contains: Discuss something in week 2's textbook reading that you found interesting and/or which resonated with you. General Questions - General General Questions POS 355 Week 1 Individual Assignment Memory Management Paper For this assignment, you will choose one the following options: · Option 1: Write a 2-page paper that explains memory management requirements. · Option 2: Write a 2-page paper that explains the differences in memory management between Windows® and Linux®. Format your paper consistent with APA guidelines. UNIX/Linux Versus Mac Versus Windows Write an 8- to 10-page paper that compares and contrasts the basic system differences between UNIX®/Linux®, Mac®, and Microsoft ® Windows® operating systems. Include discussion and comparison of the following: · Memory management · Process management · File management · Security Format your paper consistent with APA guidelines. Create a 10- to 12-slide Microsoft® PowerPoint® presentation based on the paper. Discussion Question Main Memory Should DMA access to main memory be given higher priority than processor access to main memory? What is the purpose and technique of DMA logic? Note: Be prepared to discuss in class. Do not submit a written response. POS 355 Week 2 Individual Assignment File Management Paper For this assignment, you will choose one of...
Words: 355 - Pages: 2
...Memory Management Paper Brandon Matthews POS/355 March 9, 2015 Corey Johnson Memory Management Paper Memory management is the process of controlling and coordinating computer memory, assigning portions called blocks to various running programs to optimize overall system performance. Memory management resides in hardware, in the OS (operating system), and in programs and applications. Memory management allows an underlying computer or operating system (OS) to dynamically distribute memory across all running processes, while ensuring optimal performance. In Memory management, there are requirements that must be satisfied such as: Relocation, Protection, Sharing, Logical organization, and Physical organization. The first requirement for memory management is Relocation. In this requirement the programmer cannot know where the program will be placed in memory when it is executed. As a result this process may be relocated in main memory due to swapping. Swapping enables the OS to have a larger pool of ready-to-execute processes. Also, memory references in code (for both instructions and data) must be translated to actual physical memory address. The second requirement for memory management is Protection. This process should not be able to reference memory locations in another process without permission. It is impossible to check addresses at compile time in programs since the program could be relocated. Also any address references must be checked at run time by hardware...
Words: 460 - Pages: 2
...Memory Management Paper Gene Cotton POS/355 Terance Carlson 10/06/2014 The act of managing computer memory is known as memory management. This system is also known for allocating memory for certain programs as requested. Managing the memory properly is vital to any CPU system. If the there isn’t enough memory to run a program or application then the CPU may freeze or fail. There are two types of memory allocations systems that are commonly used Virtual Memory and Garbage Collection. Virtual Memory systems separate memory from physical addresses to distinguish between the amounts of RAM used efficiently through disk swapping. Basically the quality of the virtual manager can positively or negatively impact the overall CPU performance. The Garbage collection system is a distribution and or redistribution of the computer memory cores for a program or application. Usually this is maintained and managed at the programming level. The downside to Garbage collection is it may take up a large amount of total processing time and this also can affect the outcome of CPU performance. With memory management systems on multi-tasking operating systems the virtual memory programs must be able to be launched from different parts of the memory at any given time. So relocation is very important and is a requirement. The reason behind this is that when a program is closed or swapped back into memory it may not always be transitioned back to same place it came from. Most virtual memory...
Words: 400 - Pages: 2
...Learning Team Outline POS 355, Outline of the UNIX/Linux Versus Mac versus Windows Paper I. Memory management a. UNIX®/Linux® i. Memory ii. Memory Management iii. Aging iv. Life Cycle b. Mac® v. Organization of memory vi. System Heap vii. System Global Variables viii. Temporary Memory ix. Pointers x. Invalid Handlers xi. Low-Memory Conditions xii. Virtual Memory c. Microsoft® Windows® Operating systems xiii. Paging in x86 processor xiv. Page Management xv. Memory Protection xvi. Logical Memory Layout II. Process management d. UNIX®/Linux® xvii. Process management within the UNIX OS is based of command prompts via Linux Terminal. xviii. Top ten commands that are helpful in process management * Top * Htop * Ps * Pstree * Kill * Pgrep * Pkill & killall * Renice * Xkill e. Mac® xix. Activity Monitor: process manager within the Mac OS. xx. User interaction and efficiency how does Activity Manager help. f. Microsoft® Windows® Operating systems xxi. Task Manager xxii. User interaction and efficiency how does Task Manager help and or is less effective than Activity Manager. III. File management xxiii. Compare and contrast how file management operates respectively...
Words: 307 - Pages: 2
...Memory Management Paper JJ Barnes POS/355 Version 9 April 15, 2013 John Buono Memory Management Paper As any person utilizes a computer system, what appears to be a simple click-and-point user interface is actually a symphony of data management being controlled by both memory and process management. At their simplest form, the data manager is how the computer system stores and recalls date collected from the user and the process manager controls the processes and systematic applications with the data. This paper will further define both of these managers and discuss their functionality and purpose. Without these two important key pieces, the computing of today would be impossible. Before a process manager can be discussed, the memory manager should be explained. The computers today are multitaskers. They are constantly running multiple processes at any given time. Stallings (2102) stated “Effective memory management is vital in a multiprogramming system” (306). What does the memory manager do with the data that has been given to it? The best way to answer this question would be to simplify the data. Data, in the form that this paper is referring to, is all information used by a computer in order to store, reuse, or even compute. The memory manager must take the data and figure out a way to store it in a way that it will not be overwritten and in a secure spot where the data can be retrieved when needed. The memory manager uses various mechanisms that assist...
Words: 778 - Pages: 4
...Differences Between memory management Between Windows and Linux Gerard T Doris POS/355 03-21-14 New Orleans Differences Between memory management Between Windows and Linux In this paper I will discuss the difference between Windows and Linux memory management. Many business and homes use windows and Linux operating systems to conduct everyday duties. Most consumers never heard of Linux. Linux operating systems is not known for the flashness that Windows have. In my opinion if you want a stable system that you are not looking to do photo, video editing or things in that nature I would use Linux. Both operating systems use Ram and memory storage to help execute the functions of the computer. Windows uses a file system called New Technology File System ( NTFS). NTFS is a stable file system that Windows uses. It replaced the old FAT32 file system. According to Microsoft 2014 The capability to recover from some disk-related errors automatically, which FAT32 can not. Improved support for larger hard disks. Better security because you can use permissions and encryption to restrict access to specific files to approved users. The only thing I have a problem with, is have to defragment the OS. The reason you have to defrag is because NTFS tends to put files in random places. Windows management system is called Pagefile. Pagefile take objects that are less frequently used and put them in a allocated location on the hard drive. This frees up RAM and allows the computer...
Words: 442 - Pages: 2
...Paper 1 POS/355 Option 2: The Differences in Memory Management between Windows® and Linux®. Linux and Windows are both operating systems for the common home PC. Each of them offers positive benefits and negative detriments. Some people try to claim that one is better than the other. But as an active user of Linux for over half a decade, I can honestly say that both are superior in their respective strengths. I would never attempt to do any type of visual work like video editing or photo editing that requires anything in depth on a Linux machine. The native programs are just not as good as anything that Adobe offers in the Windows world. However if I am surfing the net checking out random sites that might be questionable in nature, I would not dare so unless I was on my Linux partition. In reference to memory managements differences between Windows and Linux; We have to first start with the base. Memory can be viewed in both a RAM basis and memory as in storage and a base for operating system. Windows has been locked into a dated filesystem for the basis of their operating system. This file system is called NTFS. NTFS positive is that it is old and stable. Its positives are know and it’s negatives are so well know that they come as no surprise to end users. Sadly this outdated file system technology requires the end user to periodically defragment the operating system to combat NTFS’s gross lack of the ability to organize files. Over time NTFS moves files...
Words: 474 - Pages: 2
...Windows and Linux- Memory Management Marlana Muzny POS/355 May 13, 2013 Joe Fischer Windows and Linux- Memory Management Memory management is the process that the operating system takes to manage the computers processes and memory. This means that the operating system has to figure out what sections of the memory are free and are being used at the current time allocating and reallocating as needed. Memory management is extremely important in how a computer operates. In this paper, we will compare the new Windows 8 to the Linux operating system and describe the differences in the memory management. Windows 8, it is the newest product in operating systems for Microsoft. With enhancements from the previous version, Windows 8 makes better use of the memory management than the previous version Windows 7. In Windows 7, Microsoft started making changes to the operating system when it came to memory management; however, fell short compared to what was already being done in Linux operating system. With the previous versions, most of the memory management occurred upon login. This slowed the processor down taking up all the resources at one time using the system memory. To address this issue and correct it in Windows 8, Microsoft implemented a start on demand model. What this means is that processes that are needed are delayed until the process is needed verses having all the processes start automatically when the computer is started. This makes more run...
Words: 876 - Pages: 4
...The Benefits and Uses of Virtual Memory Marcia Amnay POS/355 Steven Kernan April 22nd, 2013 The Benefits and Uses of Virtual Memory This paper will discuss the benefits and uses of virtual memory. Programs require memory to start and run on computers. When several jobs are being processed at the same time, the operating system must keep track of how the computer’s memory and make sure there is enough. Computers come with a limited amount of random access memory which is known as RAM. RAM is the main memory on a computer. If a user is running multiple applications at the same time, the RAM on it will not be enough to execute the processes. This is when virtual memory comes in and balances the process. Virtual memory is a memory management technique. Virtual memory is secondary memory that can act as if it were part of the main memory. When the RAM is used up, virtual memory places data by using the hard disk or another disk of some kind for space. The hard disk is much slower then RAM so the more virtual memory used, the slower your computer will run. The computer will look for areas on the RAM that are not in use and copy it to the hard disk to free up space on the RAM. Virtual memory keeps ‘active’ process in the RAM and keeps the ‘inactive’ processes on the address space on the disk. When an ‘inactive’ process is needed, it will bring that process back to the RAM from the disk. This process is running in the background without the user being aware...
Words: 788 - Pages: 4
...Systems Comparison Paper. Barbara Poe Pos 355 Introduction to Operating Systems 11-10-14 William Davis Unix®, Linux®, Mac OS®, Windows® Operating Systems Comparison Paper. Memory management is the act of managing computer memory. The essential requirement of memory management is to provide ways to dynamically allocate portions of memory to programs at their request, and free it for reuse when no longer needed. The memory management system is one of the important parts of the operating system. Its basic function is to manage the memory hierarchy of RAM and secondary memory devices. There is always a need of more memory than physical memory. Memory management allows this to be done through the concept of virtual memory. Virtual memory can be many times larger than the physical memory. The most important task of memory management includes allocation and dealloacation of memory to the processes running on the system. Other requirements of memory management are relocation, protection, sharing, logical organization, and physical organization Relocation Stallings states, when an active process is swapped out of main memory to disk it would be quite limiting to specify that when it is next swapped back in, it must be placed in the same main memory region as before. Instead, we may need to relocate the process to a different area of memory (Stallings, 2015). Protection The main purpose of memory protection is to prevent a process from accessing memory that has not been...
Words: 1317 - Pages: 6
...File Management Paper When dealing with the file management concept of computers and operating systems there are always multiple options and preferences that are available. One method of file storing is when an operating system detects the type of file; the type of program used to access it and saves it as such with pathways and locations filled out. A second method is to allow the pathways and file types to be set by the user, allowing for any program or file extension that is available to be used. A third method is for the operating system to not allow the saving of file type or file extensions, but to assign a specific code related to that operating system that allows it to determine the file type. These three methods all have their benefits and drawbacks referring to ease of access, ease of storage, and the structure of the file system. As each of these methods provides a specific purpose the use of one method over another will depend on how a computer filing system is designed and also how it is utilized by frequent and authorized users. In an operating system that detects the file type when it is being stored the system is recognizing what application is being used to access that file and saving it in storage under a file directory that will open the file with that type or certain program. For example if a user is accessing a text document and saves it, the operating system will detect the word processing application and save the file in a directory or pathway that will...
Words: 885 - Pages: 4
...Week 4 Individual Paper: Operating Systems Analysis Paper POS/355 November 7, 2011 Jeff Rugg Introduction The operating system, commonly known as OS, is the brain or the center of all computer systems. It controls the input/output and controls various tasks of the hardware. Apart from serving as a go-between for application programs and the hardware of the computer, the OS also consists of information and programs while providing general services to make sure that several software applications can operate accordingly. Operating systems can be found in almost any type of a computer device such as personal computers, supercomputers, cellular telephones, and video game consoles as stated by Linux Systems (2011). As the research was being conducted for this paper, it raised a question whether the internet uses the operating system? It proved to be a challenge to actually pin point the most common operating systems on the Internet, but as the research continued, it was obvious that these three, Windows, Mac OS X, and Linux are considered to be the most common operating systems used on the Internet today. Background of each Operating System Windows Privately owned operating systems, Microsoft Windows is generally used on personal computers and as of today, the most commonly used version is Windows XP with the new version of Windows 7 for personal computers and Windows Server 2008 R2 for servers is entering the market. Mac OS X Mac OS X is a graphical operating...
Words: 1150 - Pages: 5
...Week 2 File Management Paper POS/355 Joey Turner JR Professor Alicia Pearlman Most UNIX systems that you will come across are usually based on the control scheme of file access associate with early versions of the UNIX system. In UNIX, every individual user is assigned their own unique user ID that they may use to access files saved in memory. Users are identified by being a part of a private group or various groups which can be identified then by their group ID. When a file is created in LINUS it is identified as being owned by a particular user and marked with the user that created the file’s user id. The file also belongs to whatever group the user is associated with as well or else the group of its parent directory but only if that parent directory has SetGID permission configured. SetGID (SetGIUD) are access rights flags that allow users to run executable (.exe) files with the permission of user ids or group id. Protection bits in sets of twelve are associated with each file as well. The owner ID, group ID, and protection bits are part of the file’s index node-which are a data-structure used to represent a file-system object which can be a file or file directory. There are 9 of the 12 protection bits that are advocated to the user and group ids owners of the files which control reading, writing, and execute permissions. These nine protection bits then form a system of hierarchy of user id, group id, and all others. The hierarchy is also coupled with the...
Words: 884 - Pages: 4
... |POS/355 Version 9 | | |MU12BIT08 | | |Introduction to Operational Systems | | |Wk 1 June 10 | | |Wk 2 June 17 | | |Wk 3 June 24 | | |Wk 4 July 01 | | |Wk 5 July 08 | Copyright © 2012, 2010, 2009, 2008, 2007, 2006, 2005, 2004, 2003 by University of Phoenix. All rights reserved. Course Description This course provides an introduction to operating systems. Topics covered include operating system concepts, program execution, and operating system internals such as memory, processor, device, and file management. A variety...
Words: 2247 - Pages: 9