Computers Operating Systems Term Paper

Computers

Operating Systems

http://www.osdata.com/This Web site compares two operating systems - Rhapsody (or the Mac operating system), and Windows NT. It includes detailed information for both technical and non-technical users, and a massive amount of data regarding the two systems. It also includes an overview of operating systems, including the types and their functions, and even a brief history of operating systems, and a biography and information on Windows founder Bill Gates.

This is probably one of the most comprehensive and useful sites on operating systems on the Internet. It would be impossible to review this site in detail without using numerous pages to review each page of the site. This is a site that the user can return to repeatedly to find specific information, or spend hours perusing when they want a more general overview of operating systems and just how they work. It is especially helpful that the site includes information for techies and non-techies, so it is less intimidating to the casual or less advanced users. The site includes a list of just about every operating system known today, and each system summary includes a myriad of information, from an overview of the system to "geek humor" regarding each individual system. Besides that, there are massive sections on system components and even "holistic issues" regarding systems, such as cost, installation, set-up, and much more. This could be the ultimate reference tool for any systems technician, and it seems that the information here is invaluable for just about anyone involved with computers at any level. It would seem that the information here is so detailed that just about anyone could find what they are looking for, and rather quickly, too.

If there is any criticism about this site, it could be that many of the entries are rather outdated. It seems that the last major updates were in 2004, and many are much older than that. It seems impossible that one person could consistently maintain all of this data and information, and so, perhaps that is why the updates are rather dated. Even so, this is one of the ultimate sites for operating systems information, and is a goldmine of information for just about anyone in systems computing.

Cite this Document:

"Computers Operating Systems" (2005, November 09) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/computers-operating-systems-http-wwwosdatacom-this-70126

"Computers Operating Systems" 09 November 2005. Web.26 April. 2024. <
https://www.paperdue.com/essay/computers-operating-systems-http-wwwosdatacom-this-70126>

"Computers Operating Systems", 09 November 2005, Accessed.26 April. 2024,
https://www.paperdue.com/essay/computers-operating-systems-http-wwwosdatacom-this-70126

Related Documents

The operating system uses cycles that use one process and then the other, but this is not apparent to the user. The operating system also makes copies of the registers, stacks, and queues and remembers where one process paused, then reloads all of the registers, stacks, and queues that the next process needs. This process of copying and reloading takes places with each process, and makes the entire computer

Without the consent of the user, the program will never be elevated to administrator privilege. The MIC or integrity levels is again a new security concept with Vista OS. This feature is controlled by the Access control entry (ACE) in the System Access control List (SACL) of a file, process or a registry key. By associating every process with an integrity level, the OS limits privilege escalation attacks. [Matthew

7 billion by 2008 establishing the fact that Linux is no more a fringe player but rather a mainstream. IDC admitted that Linux is not being used just on new hardware only. As an alternative customers frequently reinstall existing servers to run Linux. While considering for such use as also the use of Linux for secondary OS, IDC forecasts for servers running Linux to remain 26% larger in 2008. Evidently,

Navy Operating Systems: The U.S. Navy One recent article on the operating systems utilized by the U.S. Navy, authored by the Intergraph Solutions Group, was entitled "Rugged Hardware for Harsh Environment." What better way of phrasing the needs of this branch of the armed forces, or indeed any of the branches of the United States armed forces? The U.S. Navy sends its men into environments that are extraordinary, and place extraordinary demands

One of the main drawbacks of the user authentication is the essence of various attacks to the protection mechanism. The concept of user authenticity is weak and susceptible to numerous attacks. The protection mechanism also relates to the ability of the user to maintain the user ID and password secret for the purposes of minimizing threats and attacks (Weber 2010). This is an indication that the users must have

The system will also assist the company to incorporate a fleet management system that has a tracking device to assist the Jinx Transport & Logistics Company to track all its fleet of vehicles located at any location. With the new systems, customers will have platform to interact with the systems, and the system will assist them to make inquiry and track their parcels. 2. OS Processor and Core Jinx Transport &