Types of Oparating Systems. Operating Systems Is a software system, a set of computer programs...

17
Types of Oparating Systems

Transcript of Types of Oparating Systems. Operating Systems Is a software system, a set of computer programs...

Page 1: Types of Oparating Systems. Operating Systems Is a software system, a set of computer programs designed to perform many tasks including the effective.

Types of Oparating Systems

Page 2: Types of Oparating Systems. Operating Systems Is a software system, a set of computer programs designed to perform many tasks including the effective.

Operating Systems

• Is a software system, a set of computer programs designed to perform many tasks including the effective management of its resources.

• It can be found in most electronic devices that use microprocessors to operate.

Page 3: Types of Oparating Systems. Operating Systems Is a software system, a set of computer programs designed to perform many tasks including the effective.

The operating systems, as a software layer that enables and simplifies the management of the computer, perform a variety of basic functions, each one held by an internal component:

• Provide comfort in using a computer• Services for running processes

(programs)• Provide an interface to the user,

executing instructions (commands).

Page 4: Types of Oparating Systems. Operating Systems Is a software system, a set of computer programs designed to perform many tasks including the effective.

Types of operating systems

• Batch processing system: data or programs area collected grouped and processed at a later date. Ex. Payroll.

• Real-time systems: inputs immediately affect the outputs, timing is critical. Ex. Control of nuclear power plants.

• Real-time transaction: inputs immediately affect the outputs but timing is not critical. Ex. Holiday and airline booking system.

Page 5: Types of Oparating Systems. Operating Systems Is a software system, a set of computer programs designed to perform many tasks including the effective.

• Online processing: processing performed under the direct control of the CPU.

• Offline processing: processing which is done away from CPU. Ex. Batching together of clocks cards.

• Multi-access on-line: any users linked by workstations to a central computer such as in a network

Page 6: Types of Oparating Systems. Operating Systems Is a software system, a set of computer programs designed to perform many tasks including the effective.

• Interactive processing: the user has to be present an program can’t proceed until there is some input fron the user.

• Distributed system: processing is carried out independently in more than one locatio, but with shared and controlled access to some common facilities.

• Multi tasking: the ability to hold several programs in RAM at one time but the user swithches between them.

Page 7: Types of Oparating Systems. Operating Systems Is a software system, a set of computer programs designed to perform many tasks including the effective.

Examples• There are many operating systems, but all

descend from two primitive operating systems: the DOS (Disk Operating System) and the UNIX. (Other primitive operating systems like the VMS, the RTL2, the CP/M, the MP/M, the VME/B Exist…)

• Both operating systems had like user interface the line of commands: the DOS was the simplest and UNIX was the most powerful.

• The DOS was developed in 1979 by Tim Paterson working for Seattle Computer Products and was bought by Microsoft Corporation, and the UNIX was designed in 1971.

Page 8: Types of Oparating Systems. Operating Systems Is a software system, a set of computer programs designed to perform many tasks including the effective.

Differences between the DOS and the UNIX.

DOS UNIX•The names of the archives can only have up to 8 characters and the extension up to three, also there are certain characters that they can’t be used in the names(*).•The extension indicates us the type of file for example :.txt text file.bmp image•DOS, doesn’t distinguish between capital letters and lowercase letters.

•The names don’t have extension that’s because a file can have so many points as we want in its name, in fact, the name can have up to 256 characters. There are reserved chacters(*).•The feasible ones are distiguished in this case by which it’s not seen in the name: the execution permission. •UNIX, distinguish between capital letters and lowercase letters.

Page 9: Types of Oparating Systems. Operating Systems Is a software system, a set of computer programs designed to perform many tasks including the effective.

Most common operative systems

• Windows 95 • Windows 98 • Windows ME • Windows NT • Windows 2000 • Windows 2000 server • Windows XP • Windows Server 2003 • Windows CE • Windows Mobile • Windows XP 64 bits • Windows Vista

(Longhorn)

• Mac OS 7 • Mac OS 8 • Mac OS 9 • Mac OS X • UNIX • AIX • AMIX • GNU/Linux • GNU / Hurd • HP-UX • Irix • Minix • System V • Solaris • UnixWare

Page 10: Types of Oparating Systems. Operating Systems Is a software system, a set of computer programs designed to perform many tasks including the effective.

• AIX • AMIX • GNU/Linux • GNU / Hurd • HP-UX • Irix • Minix • System V • Solaris • UnixWare

Page 11: Types of Oparating Systems. Operating Systems Is a software system, a set of computer programs designed to perform many tasks including the effective.

* Estimation of the present use of operating systems according to a sample of computers with access to Internet.

Page 12: Types of Oparating Systems. Operating Systems Is a software system, a set of computer programs designed to perform many tasks including the effective.
Page 13: Types of Oparating Systems. Operating Systems Is a software system, a set of computer programs designed to perform many tasks including the effective.

• In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information . In many contexts, the word encryption also implicitly refers to the reverse process, decryption ( “software for encryption” can typically also perform decryption), to make the encrypted information readable again (to make it unencrypted).

Page 14: Types of Oparating Systems. Operating Systems Is a software system, a set of computer programs designed to perform many tasks including the effective.

uses

• used by militaries and governments to facilitate secret communication

• Encryption can be used to protect data "at rest", such as files on computers and storage devices ex. USB flash drives

• Encryption is also used to protect data in transit, for example data being transferred via networks

Page 15: Types of Oparating Systems. Operating Systems Is a software system, a set of computer programs designed to perform many tasks including the effective.

Secure Sockets Layer (SSL): How It Works

• Secure Sockets Layer (SSL) technology protects your Web site and makes it easy for your Web site visitors to trust you in three essential ways:

• An SSL Certificate enables encryption of sensitive information during online transactions.

• Each SSL Certificate contains unique, authenticated information about the certificate owner.

• A Certificate Authority verifies the identity of the certificate owner when it is issued.

Page 16: Types of Oparating Systems. Operating Systems Is a software system, a set of computer programs designed to perform many tasks including the effective.

You need SSL if...

• you have an online store or accept online orders and credit cards

• you offer a login or sign in on your site • you process sensitive data such as

address, birth date, license, or ID numbers

• you need to comply with privacy and security requirements

• you value privacy and expect others to trust you.

Page 17: Types of Oparating Systems. Operating Systems Is a software system, a set of computer programs designed to perform many tasks including the effective.

How Encryption Works

• Imagine sending mail through the postal system in a clear envelope. Anyone with access to it can see the data. If it looks valuable, they might take it or change it. An SSL Certificate establishes a private communication channel enabling encryption of the data during transmission. Encryption scrambles the data, essentially creating an envelope for message privacy.

• Each SSL Certificate consists of a public key and a private key. The public key is used to encrypt information and the private key is used to decipher it. When a Web browser points to a secured domain, a Secure Sockets Layer handshake authenticates the server (Web site) and the client (Web browser). An encryption method is established with a unique session key and secure transmission can begin.