• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Compare Operating Systems for stand-alone and networked computers.

Extracts from this document...

Introduction

Assignment 2: Operating Systems The purpose of this assignment is to compare Operating Systems for stand-alone and networked computers. The following Operating Systems will be compared: * Windows 9x * Windows 2000/XP * Novell * UNIX/LINUX Windows 9x Windows 9x is the term that is used for the Operating Systems 'Windows 95' and 'Windows 98'. Windows 98 is the next upgrade to Windows 95. Although the appearance of both Operating Systems is similar, the unseen processes are different. The main features of Windows 98 are that the desktop was created to act as a web browser which is known as an Active Desktop. Another feature of Windows 98 is that this is the first operating System to be compatible with the FAT32 system which allows partition sizes to be greater than 2GB per partition, as the widely used USB ports were becoming popular, Windows 98 supported USB 1.0 and also DVD's were also supported. ...read more.

Middle

Novell's operating System Netware and although it is considered to be an Operating System, it is only an add-on, which means that the user must have another Operating System installed to run Netware. The reason Netware is so popular is because of the scalability. It can almost have an unlimited amount of computers connected via a network. It has its own Domain Name System and the Dynamic Host Configuration Protocol. The disadvantage to Netware is the cost, due to needing an existing Operating System to run it. UNIX/LINUX UNIX was created in 1969 and is the first Operating System to be created, and in 1974 it was the first Operating System to be written in the C language. It was also freeware which meant that anybody could use it and because of this, other programmers could edit the Operating System to their requirements and because of this, UNIX rights were bought and now Sun Micro Systems now create UNIX Operating Systems, and the latest version is Sun Solaris 8. ...read more.

Conclusion

This kind of is not used by most Operating Systems had many disadvantages; mainly the filenames only had a limit of 8 characters plus 3 extension characters. Although the GUI is far more popular, Microsoft still use their CLI in Windows but changed the name from MS-DOS to Command prompt as it is not longer recognised by Microsoft as an Operating System. GUI A GUI (Graphical User Interface) is the current user interface used by most people. This is because it is very user friendly, as typing in long commands and sub directories has been replaced by a piece of hardware called a mouse, which is used to click on icons which perform commands. This is the type of interface that is used for most operating Systems such as Windows, MAC OS X and LINUX. The advantages of GUI over CLI is that filenames now have a limit of 255 characters plus 3 extension characters and it doesn't cause stress by trying to remember each command and directory. Although GUI's can also allow similar commands to CLI e.g. Ctrl+Alt+Del would bring up the Task Manager. Greg Smith ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    information systems assignment 2

    4 star(s)

    If these are not kept then the company can face large fines, financial penalties and legal action against them and loosing customers. Money is a real constraint when the data protection act is involved, the Rufus supermarket will have to spend more money in order to employ more staff to

  2. Peer reviewed

    Operating systems. In this article, we are going to make a comparison between ...

    3 star(s)

    This system has a flaw as well. Creation of journel requires a large disk space and hence reducing the size of usable space on the disk. As far as the system calls are concerned, Mac uses POSIX which is a standard set of system calls for UNIX.

  1. Computer systems assignment 1

    Click yes to proceed to the next stage. In the next window choose how your printer will be connected to the computer and press next. It could be either Via USB, cable or a network. When chosen press next to start the installation.

  2. Primary or Secondary Storage.

    You'd have a hard time getting a book together. A formatting method allows you to efficiently use the space while still being able to find things TRACKS A track is a circular ring on one side of the disk. Each track has a number. The diagram shows 3 tracks.

  1. Smart Card System

    in which components of a system may change on a regular basis. Java's run-time linking guarantees that a program always loads the most recent version of its library modules. It also reduces recompilation by making it possible to add methods and instance variables to a library without having to recompile its clients.

  2. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    Handshaking means that communicating devices must have a common method of determining their presence and readiness in order to communicate. Although the details vary, a handshake can be illustrated simply by the following example. Suppose that device A wishes to communicate with device B.

  1. Propose to research the WTLS or Wireless transport layer security protocol along with the ...

    From the starting point of the data gathered of the memory size of 1024 bytes, which is the size of one packet, the hits by the hacker decrease dramatically by each power of two memory is increased. By each power of two memory is increased, the number of hits by the hacker program is about cut in half.

  2. Explain the different techniques of gathering information to answer an IT Technical problem or ...

    A fault log is located on a database. In order to get onto a fault log you would have to input a required password which the help desk and technician would have, once the password is accepted you would then be able to go through the fault logs and find a suitable one that has the required information.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work