• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Compare Operating Systems for stand-alone and networked computers.

Extracts from this document...

Introduction

Assignment 2: Operating Systems The purpose of this assignment is to compare Operating Systems for stand-alone and networked computers. The following Operating Systems will be compared: * Windows 9x * Windows 2000/XP * Novell * UNIX/LINUX Windows 9x Windows 9x is the term that is used for the Operating Systems 'Windows 95' and 'Windows 98'. Windows 98 is the next upgrade to Windows 95. Although the appearance of both Operating Systems is similar, the unseen processes are different. The main features of Windows 98 are that the desktop was created to act as a web browser which is known as an Active Desktop. Another feature of Windows 98 is that this is the first operating System to be compatible with the FAT32 system which allows partition sizes to be greater than 2GB per partition, as the widely used USB ports were becoming popular, Windows 98 supported USB 1.0 and also DVD's were also supported. ...read more.

Middle

Novell's operating System Netware and although it is considered to be an Operating System, it is only an add-on, which means that the user must have another Operating System installed to run Netware. The reason Netware is so popular is because of the scalability. It can almost have an unlimited amount of computers connected via a network. It has its own Domain Name System and the Dynamic Host Configuration Protocol. The disadvantage to Netware is the cost, due to needing an existing Operating System to run it. UNIX/LINUX UNIX was created in 1969 and is the first Operating System to be created, and in 1974 it was the first Operating System to be written in the C language. It was also freeware which meant that anybody could use it and because of this, other programmers could edit the Operating System to their requirements and because of this, UNIX rights were bought and now Sun Micro Systems now create UNIX Operating Systems, and the latest version is Sun Solaris 8. ...read more.

Conclusion

This kind of is not used by most Operating Systems had many disadvantages; mainly the filenames only had a limit of 8 characters plus 3 extension characters. Although the GUI is far more popular, Microsoft still use their CLI in Windows but changed the name from MS-DOS to Command prompt as it is not longer recognised by Microsoft as an Operating System. GUI A GUI (Graphical User Interface) is the current user interface used by most people. This is because it is very user friendly, as typing in long commands and sub directories has been replaced by a piece of hardware called a mouse, which is used to click on icons which perform commands. This is the type of interface that is used for most operating Systems such as Windows, MAC OS X and LINUX. The advantages of GUI over CLI is that filenames now have a limit of 255 characters plus 3 extension characters and it doesn't cause stress by trying to remember each command and directory. Although GUI's can also allow similar commands to CLI e.g. Ctrl+Alt+Del would bring up the Task Manager. Greg Smith ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    information systems assignment 2

    4 star(s)

    serious trouble, all customers who loose there information can put a complain in to the company and take them to court. When the data protection act is concerned, Rufus supermarket must make sure they abide by all the rules included within the act.

  2. Peer reviewed

    Operating systems. In this article, we are going to make a comparison between ...

    3 star(s)

    Kernel's attention is flagged, taking the complete control of the hardware; it lets the operating system to decide to cope with this malfunctioning program. A course of events reports error and shuts the program. XNU kernel is a standard powerful and simple kernel for running an operating system.

  1. Computer systems assignment 1

    When I am ready I take a screwdriver and open the computer case. I Put it aside and carefully unscrew the metal bit in the middle from the computer which prevents me from manoeuvring when cleaning up. I put it aside and look what needs to be cleaned up.

  2. Primary or Secondary Storage.

    The diagram shows 3 tracks. SECTORS A disk sector is a wedge-shape piece of the disk, shown in yellow. Each sector is numbered. On a 51/4" disk there are 40 tracks with 9 sectors each. On a 31/2" disk there are 80 tracks with 9 sectors each.

  1. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    The two methods of error checking in data transmission I will analyse will be the following: > CRC (Cyclical Redundancy Checking) > Parity Bit Method One: CRC stands for Cyclical Redundancy Checking this is an error checking technique that is used to ensure the accuracy of transmitting digital data.

  2. Smart Card System

    One of the steps in doing this is using the Java header file generator, javah. 5.2.6 Javadoc The programmers fought that it in every way possible. Unfortunately, there is no longer any excuse for not documenting the source code.

  1. Propose to research the WTLS or Wireless transport layer security protocol along with the ...

    Getting to the server itself in modern business can be a major problem for hacker. Currently, gateway servers in a corporation are highly protected pieces of equipment. Vendors know that the problem exists and keeping the gateway server physically secure is one thing that is easily implemented in order to make sure the problem stays behind a locked door.

  2. Explain the different techniques of gathering information to answer an IT Technical problem or ...

    A fault log is located on a database. In order to get onto a fault log you would have to input a required password which the help desk and technician would have, once the password is accepted you would then be able to go through the fault logs and find a suitable one that has the required information.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work