• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Comparing Operating Systems

Extracts from this document...

Introduction

OPERATING SYSTEMS Operating systems are the programmes that create environment which enable the various programmes to run on a computer. That is why they are also referred to as platforms. The programmes that run on these platforms can range from simple office automation softwares that enable us to do wordprocessing to games and also device drivers. All major companies make their software for multiple platforms. By platform we mean the base environment that enables the communication between the onboard devices like the hard-disk, memory, various ports (input/output) and the functions it will carry out using other programmes that will run in that environment. For example if we look at Microsoft which makes the MS Office software that is used by most personal computers. They make MS Office for not only their own operating system namely Windows but also for MAC and also for UNIX / LINUX. The function of the Operating system is to provide an environment and background on which the other applications will run. This involves the use of Hardware like the display card, network card, sound card, printers, scanners, other input and output devices. ...read more.

Middle

The MAC operating system was developed solely for use in the Apple computers and it was programmed for specific hardware that was on the Apple PCs. Unlike Windows that was developed independent of the hardware, MAC on the other hand remained dependent on the hardware and the various versions that came were designed so as to get the maximum output from the same hardware rather than for other new hardware. This was the reason that AppleMac as it was commonly called failed to capture the global market since people could not afford to buy the hardware and also the level of support was lacking beyond the borders of USA. It did try to market the concept that you need to buy the hardware only once and then just keep upgrading the software but by this time it was too late. Far East especially Taiwan, Korea, Japan and China took on the opportunity and started developing motherboards for PCs for which Microsoft was willing to supply the necessary Operating System. MAC has produced various versions so far and presently we are using MAC OS x10.5 also nicknamed "Leopard" just like its previous versions which were also named after the big cats. ...read more.

Conclusion

Sun computers use LINUX as their main operating system. When we run LINUX on a normal PC it is called referred to as a LINUX COMPARISON AT A GLANCE Windows MAC UNIX / LINUX * Popular around the world * Support is available even in remote areas * Uses the same protocol that is used to communicate with the internet. * Is very prone to hackers and viruses thus the creators have to constantly develop patches to overcome the threats. * Has more variety of programmes available as compared to other operating systems * Is only popular in the America * Has limited support around the world. * Is more secure than Windows in that it is not prone to hackers and viruses. * Uses the protocol AppleTalk to communicate with other Apple computers but needs the TCP/IP to communicate with the internet. * It is freeware so anyone can use it free of cost. * It is an open source system allowing one to customise it to ones own needs and requirements without fear of any legal liability. * It uses the TCP/IP protocol to communicate thus is compliant with the internet. * Most internet servers still use UNIX as their main operating system ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    information systems assignment 2

    4 star(s)

    Solutions are then found to certain problems which occur. Besides governmental uses, many marketers use data mining to find strong consumer patterns and relationships. Large organizations and educational institutions also data mine to find significant correlations that can enhance our society.

  2. Peer reviewed

    Operating systems. In this article, we are going to make a comparison between ...

    3 star(s)

    POSIX is the same set of system calls that is used in UNIX builds. Mac manages the memory using the priority-hierarchy of preemptive multitasking system. Through this system, the kernel can assign a priority to each running process and whenever a program needs some system resources, it checks the priority level of the program.

  1. Review of the article "Supply Chain Analysis at Volkswagen of America".

    The maximum number of DC's was set to six. The scenario produced the DC which gave the highest profit. From where, they started to increase the number of DC's fixing only the existing five centers. They tried this scenario until the opening new DC was not profitable anymore. For another scenario, they repeated this analysis under the assumption that

  2. Smart Card System

    Triple DES is a product cipher, which like DES, operates on 64-bit data blocks. There are several forms, each of which uses the DES cipher 3 times. Some forms use two 56-bit keys and some use three. The DES "modes of operation'' may also be used with triple-DES.

  1. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    > Data can be transmitted digitally (the natural form for computer data) rather than analogically. Identify the alternative forms of communication media and provide examples of their use in different forms of network. Microwave Microwave frequencies require a direct line of sight between sending and receiving station to operate.

  2. Propose to research the WTLS or Wireless transport layer security protocol along with the ...

    MAC Algorithm - An algorithm to be used for message authentication. This specification includes the size of the key used for MAC calculation and the size of the hash which is returned by the MAC algorithm. Compression Algorithm - The algorithm to compress data prior to encryption.

  1. LAN & WAN Protocols

    STMP - Simple Mail Transfer Protocols is currently the most used protocol. It can send and receive e-mail over the internet. It is commonly known as a SMTP. ADSL ADSL which stands for Asymmetric Digital Subscribers Line is a high speed transmission protocol.

  2. Flexible Architectures in Communication Security Application

    The programmable feature supports many secret-key ciphers, in contrast to the IDEA engine. We hand-optimized the eight kernels and then validated the results using a super optimizer as the scheduler with varying design parameters. By combining CryptoManiac processors into parallel configurations, we are able to scale cryptographic performance for applications with intersession and inter-packet parallelism.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work