Premium Essay

Nt1110 Module 1 Lab

In:

Submitted By davidmalave14
Words 1245
Pages 5
The Purpose and Functions of an Operating System
The operating system (OS) is software that manages computer hardware and software resources and provides common services for computer programs. The operating system is an essential component of the system software in a computer system. Application programs usually require an operating system to function. Time-sharing operating systems schedule tasks for efficient use of the system and may also include accounting software for cost allocation of processor time, mass storage, printing, and other resources.
For hardware functions such as input and output and memory allocation, the operating system acts as an intermediary between programs and the computer hardware, although the application code is usually executed directly by the hardware and frequently makes a system call to an OS function or be interrupted by it. Operating systems can be found on many devices that contain a computer—from cellular phones and video game consoles to supercomputers and web servers.
Examples of popular modern operating systems include Android, BSD, iOS, Linux, OS X, QNX, Microsoft Windows, Windows Phone, and IBM z/OS..
History
1. Windows - The first Windows system was released in 1985. Originally, it was just a graphical user interface on top of MS-DOS – a state of affairs that lasted until the release of Windows 95, when MS-DOS products were integrated into Windows. Windows 95 was a huge departure from the previous systems and was the first major step in Window’s transition from GUI to operating system. 2. Apple - The Apple Macintosh system is a little older than Windows, having first been released in 1984. From the start, it was an entirely graphical operating system, and from quite an early stage became popular among the earliest computer graphic designers. In 2005, Apple changed the design and structure of Mac OS, moving from

Similar Documents

Premium Essay

Nt1110 Module 1 Lab

...An operating system is the software that manages the hardware and software resources, it is required for most application programs to function. Operating systems work as an in-between for the programs and computer hardware. It is responsible for allocating computer resources for efficient use of space and power. There are three major operating systems in use today and they are Windows, Linux, and Mac OSX, and each has its own pros and cons depending on what you are using it for. Mac OSX is the operating system used by Apple for their computers. Mac OSX will only work on Macintosh computers with PowerPC or Intel processors, as opposed to Windows and Linux which are compatible with most brands. Mac OSX uses a graphical user interface that is popular with musicians and artist because it has more readily available design/media software. Several high-end graphic, video and audio applications were developed for Mac platforms in the early days of personal computers and the trend has continued even though the applications have been ported for Windows they still run more efficiently on Macs making them preferable for people in the creative arts community. Many people also like OSX for its ease of use and their frequent updates via point releases that make the computer run more efficiently. Linux is a growing number of operating systems meant to run in computers, phones, and several more electronic devises. Linux was created by Linus Torvalds as a free alternative to Windows. The graphical...

Words: 655 - Pages: 3

Premium Essay

Week 6 Lab

...NT1110: Module 6 Troubleshooting and Networks Lab 6.1 Troubleshooting Networking Issues A good troubleshooter should be capable of discerning whether the problem is software or hardware related and repair all of these problems. In this lab, you will demonstrate your ability to use the six-step troubleshooting model to fix a networking issue and outline the steps toward a solution. Required Setup and Resources: A computer with access to the Internet Before starting work on Task 1, perform the following steps: 1. Open Internet Explorer. Click the Tools menu and select Internet Options. 2. Click the Connections tab. 3. Click the LAN Settings button. 4. In the Proxy Server section, select Use a proxy server for your LAN. Then, click the Advanced button. 5. In the Proxy Settings window, enter 192.168.100.1 for the HTTP proxy address and port 80 for the port. Note: Remember to reset the proxy settings to their original values when Task 1 is finished. Recommended Procedures Task 1: Network Troubleshooting When you boot your computer and open Internet Explorer, this is what you see: 1 NT1110: Module 6 Troubleshooting and Networks Lab 6.1 Troubleshooting Networking Issues Apply the six-step troubleshooting model to the problem. Document everything associated with each step of the troubleshooting model. 1. Ascertain what the problem is. 2. Write down probable causes of the problem. 3. Determine if theories are correct...

Words: 513 - Pages: 3

Premium Essay

1234

...Exploring the Motherboard and Busses Exploring the Motherboard and Busses The motherboard represents the logical foundation of the computer.   Everything that makes a computer must be attached to the motherboard.    Answer the following questions: 1. What are the major components of the motherboard?   Provide a brief description of each component. 1.   Processor (CPU):   The processor is the brain of the computer and is the chip where all the computing is done. 2.   Memory:   This is where the computer stores information while it is working on it. 3.   Chipset:   The chipset is a link between the processor and the outside world, and handles things like controlling the hard drives, the USB ports, the keyboard and mouse, generates the sounds the computer makes, and sometimes even creates the pictures you see on the screen. 4.   Expansion Slots:   Expansion slots are connectors that allow you to attach additional cards on the computer, such as video cards, sound cards, modems, and add abilities to the computer that the motherboard doesn’t provide.    5.   I/O (Inputs/ Outputs):   These are a set of connectors that allows you to connect various devices to the computer, such as the keyboard, monitor, mouse, hard drives, flash drives, printers, and connect the computer to a network. 2. Upgrading only the motherboard will give some performance improvement to a computer system.   Why? Upgrading the motherboard will definitely give performance improvement to any computer system...

Words: 469 - Pages: 2

Free Essay

Week5 Lab

...NT1110: Module 5 Computer Operation and Security Lab 5.1 Understanding BIOS, POST, and Security Basics In this lab, you will demonstrate your ability to fix issues related to BIOS/POST and secure the computer from viruses and Trojans. Required Setup and Tools A computer with access to the Internet Recommended Procedures Task 1: Understanding BIOS and POST A user boots his or her computer and hears a sequence of six beeps. The computer uses AMI BIOS. What error is indicated by the six beeps? A different user with a computer using Phoenix BIOS hears a sequence of beeps with pauses in between. The sequence is beep - pause - beep beep beep - pause - beep beep beep beep- pause - beep beep beep. What error is indicated by this beep sequence? Task 2: Basic Security Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Research the Internet for an example of each of these types of firewalls and compare their features. Linksys and Cisco make firewall/routers for home use. The Zone labs are an example of a software firewall. Submission Requirements: Include a references page citing the resources you used from the textbook, ITT Tech Virtual Library, and credible websites to substantiate your answers. All citations should be in APA format. Refer to ITT Tech Virtual Library> Research Help> Research Guides> Grammar, Writing & Style> APA Formatting and Style Guide for help in APA formatting. Your report...

Words: 296 - Pages: 2

Free Essay

Computer & Logic Lab

...NT1110: Module 5 Computer Operation and Security Lab 5.1 Understanding BIOS, POST, and Security Basics In this lab, you will demonstrate your ability to fix issues related to BIOS/POST and secure the computer from viruses and Trojans. Required Setup and Tools A computer with access to the Internet Recommended Procedures Task 1: Understanding BIOS and POST A user boots his or her computer and hears a sequence of six beeps. The computer uses AMI BIOS. What error is indicated by the six beeps? A different user with a computer using Phoenix BIOS hears a sequence of beeps with pauses in between. The sequence is beep - pause - beep beep beep - pause - beep beep beep beep- pause - beep beep beep. What error is indicated by this beep sequence? Task 2: Basic Security Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Research the Internet for an example of each of these types of firewalls and compare their features. Linksys and Cisco make firewall/routers for home use. The Zone labs are an example of a software firewall. Submission Requirements: Include a references page citing the resources you used from the textbook, ITT Tech Virtual Library, and credible websites to substantiate your answers. All citations should be in APA format. Refer to ITT Tech Virtual Library> Research Help> Research Guides> Grammar, Writing & Style> APA Formatting and Style Guide for help in APA...

Words: 296 - Pages: 2