• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Comparing Operating Systems

Extracts from this document...

Introduction

OPERATING SYSTEMS Operating systems are the programmes that create environment which enable the various programmes to run on a computer. That is why they are also referred to as platforms. The programmes that run on these platforms can range from simple office automation softwares that enable us to do wordprocessing to games and also device drivers. All major companies make their software for multiple platforms. By platform we mean the base environment that enables the communication between the onboard devices like the hard-disk, memory, various ports (input/output) and the functions it will carry out using other programmes that will run in that environment. For example if we look at Microsoft which makes the MS Office software that is used by most personal computers. They make MS Office for not only their own operating system namely Windows but also for MAC and also for UNIX / LINUX. The function of the Operating system is to provide an environment and background on which the other applications will run. This involves the use of Hardware like the display card, network card, sound card, printers, scanners, other input and output devices. ...read more.

Middle

The MAC operating system was developed solely for use in the Apple computers and it was programmed for specific hardware that was on the Apple PCs. Unlike Windows that was developed independent of the hardware, MAC on the other hand remained dependent on the hardware and the various versions that came were designed so as to get the maximum output from the same hardware rather than for other new hardware. This was the reason that AppleMac as it was commonly called failed to capture the global market since people could not afford to buy the hardware and also the level of support was lacking beyond the borders of USA. It did try to market the concept that you need to buy the hardware only once and then just keep upgrading the software but by this time it was too late. Far East especially Taiwan, Korea, Japan and China took on the opportunity and started developing motherboards for PCs for which Microsoft was willing to supply the necessary Operating System. MAC has produced various versions so far and presently we are using MAC OS x10.5 also nicknamed "Leopard" just like its previous versions which were also named after the big cats. ...read more.

Conclusion

Sun computers use LINUX as their main operating system. When we run LINUX on a normal PC it is called referred to as a LINUX COMPARISON AT A GLANCE Windows MAC UNIX / LINUX * Popular around the world * Support is available even in remote areas * Uses the same protocol that is used to communicate with the internet. * Is very prone to hackers and viruses thus the creators have to constantly develop patches to overcome the threats. * Has more variety of programmes available as compared to other operating systems * Is only popular in the America * Has limited support around the world. * Is more secure than Windows in that it is not prone to hackers and viruses. * Uses the protocol AppleTalk to communicate with other Apple computers but needs the TCP/IP to communicate with the internet. * It is freeware so anyone can use it free of cost. * It is an open source system allowing one to customise it to ones own needs and requirements without fear of any legal liability. * It uses the TCP/IP protocol to communicate thus is compliant with the internet. * Most internet servers still use UNIX as their main operating system ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Operating systems. In this article, we are going to make a comparison between ...

    3 star(s)

    POSIX is the same set of system calls that is used in UNIX builds. Mac manages the memory using the priority-hierarchy of preemptive multitasking system. Through this system, the kernel can assign a priority to each running process and whenever a program needs some system resources, it checks the priority level of the program.

  2. Review of the article "Supply Chain Analysis at Volkswagen of America".

    Volkswagen had opened a number of pilot DC's to test the implementation of these findings and realized varying degree of success. The finding stated that dealers in the southeast realized less benefit because they were in close proximity to the existing ports of entry, while dealers in midwestern markets experienced improved service and reduced cost.

  1. LAN & WAN Protocols

    This protocol is very important because it uses the DSL technology which implements an ATM layer over the low level bitsream layer. This lets a variety of technology to work over the same link. It works at the physical layer.

  2. Smart Card System

    If the source and destination IP addresses remain constant as the packet works its way through the network, how is the next hop router addressed? In a LAN environment this is handled by the MAC (Media Access Control) address. The key point is that the MAC addresses will change every

  1. Flexible Architectures in Communication Security Application

    The cipher algorithm first reads the input data, XOR's it with the 128-bit intermediate vector (IV) and key, and then enters the encryption loop. The encryption loop executes 16 iterations (or rounds as they are called in cryptography literature) to produce 128 bits of ciphertext.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    The module selected needs not have validation and error trapping and the I/O design could be in a simple format. (a) select and apply appropriate techniques and principles to design and develop a solution of the problem (The design section should involve full design details for the module(s)

  1. Propose to research the WTLS or Wireless transport layer security protocol along with the ...

    Because of the low demands of simply displaying information, basic handsets are easily equipped with the browser. WAP's architecture allows for the inclusion of scripting, graphics and animations, as well as text in applications and content. This means that the more capable devices can take advantage of richer content and

  2. Coursework 1 (c)Install Apache Web Server on Unix ...

    { int p[2]; char bu[30]; pipe(p); /*create a pipe for ipc*/ if (!fork()) { /*create a child*/ printf(" C: writing\n"); write(p[1], "token", 5); /*Redirect to pipe p[1]*/ printf(" C: bye\n"); exit(0); } else { printf("P: reading\n"); read(p[0], bu, 5); /*read from the pipe p[0]*/ printf("P: [%s]\n", bu); /*print out what

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work