Tuesday, January 28, 2020

Functions Of The Operating System Computer Science Essay

Functions Of The Operating System Computer Science Essay Introduction A personal computer consists of two components, the hardware and the software. Hardware are basically physical components of the computer, in other words, they are tangible such as the motherboard, graphic card, hard drive, sound card, keyboard à ¢Ã¢â€š ¬Ã‚ ¦ etc. Software on the other hand are series of programs, algorithms, procedures, and data that provide instructions and tell computers what tasks to perform and how to perform the tasks. Software are classified into two main types: application software and system software. Example of application software includes Skype, Microsoft office, iTunes, Windows Media Playerà ¢Ã¢â€š ¬Ã‚ ¦etc. System software is divided into two classes, utility program which includes Anti Spyware, Anti-Virus, firewallà ¢Ã¢â€š ¬Ã‚ ¦etc. In order to have the computer to run a system, to manage all the hardware and software, and sending an output to a device by recognizing an input, the computer must have an operating system (OS) OS are set of software written with various data and programs that contain instructions and procedures to incorporate and perform the aforementioned tasks; almost every personal computer comes with a preloaded OS. Types of Operating Systems There are three main type of OS, there is the standalone OS, embedded OS and the server OS. These OSs usually have similar functions. Most personal computer uses the standalone OS. Mobiles, PDA uses the embedded OS such as Palm, Android, iPhone OS, Symbian, Blackberryà ¢Ã¢â€š ¬Ã‚ ¦etc. The server OS are used for configuring and backup purposes, example of the server OS would be UNIX, Solaris, and Windows Server 2008. Functions of the Operating System and how it Works The OS plays a vital role when it comes to starting and shutting down the computer which is also known as booting. Six steps take place when a computer is booting: The first step begins as soon as the computer is turned on, the electrical signal reaches to the components in the system unit through the power supply. During the second step, the processor chip is reset due to the electric signal and then it locates the ROM that contains the basic input/output system (BIOS), which is a firmware that contains the startup instructions of the computer. Next, the BIOS launches a series of tests to ensure hardware are working and connected properly, known as the power on self-test (POST), usually when the POST launches, the LED lights of the devices flicker, at times there will be messages displaying on the screen. The forth step takes place when the POST compares the result with the complementary metal-oxide-semiconductor (CMOS) chip data. CMOS uses battery power to preserve the information, data, and memory when the computer shut down. Besides that, it detects new devices and identifies them when these devices are connected to the computer. The beep sound usually results when the CMOS detects which later followed by the error messages. The fifth step proceeds when the POST completes without any interference where the BIOS will locate the OS files also known as the system files from any source of drive. The sixth steps occurs when the system file is located, which is then loaded into the RAM from its storage along the kernel of the OS. The system file then launches, and finally, the OS which was stored in memory takes control of the whole computer system. During the final step, the OS loads the information setting. Certain OS may request for user ID and password. After the OS loads, it displays the desktop screen and it starts up background processes. The second function of the OS is by providing a user interface. The two types of user interface are the graphical user interface (GUI) and the command-line interface. The GUI basically provides user with an easy way to perform a command or task by having the menus with buttons or other pictures to allow user to click it with ease. Instead of having simple buttons to click on, advance users work with command-line interface to configure, manage and troubleshoot devices and other software. The command-line interface works only with commands by using the keyboard. To perform such command, one must type in the commands accurately with the exact spellings and punctuations. OS also manages programs. It depends on certain OS, some OS can only run one program at a time, while some can run up to thousands of programs at the same time with one or multiple users. There are the single user/single tasking OS, single user/multitasking OS, multiuser OS, and the multiprocessing OS. When one multitasks, the program that is actively used by the user is said to be in the foreground, while the other programs are known to be in the background. The OSs fourth function is memory management. The OS does so by transferring the data and program instructions from the RAM to the hard disk when they are not needed at the moment because at times there is only limited space for the RAM when it has to perform other functions, when the same data and program instructions is needed again, the OS then transfer them from the hard disk to the RAM. The fifth function of the OS is coordinating tasks. As the phrase implies, the OS determines the order of the tasks which are processed. User can adjust or set the priority of certain tasks, in which result the other tasks to queue up until the preceding task is performed. Every hardware has a driver which acts like a manual. The sixth function in this case, allows the computer to identify and install it without having the computer to thoroughly learn all the details of the hardware. With the Plug and Play technology today, the OS can automatically configure the new devices as the devices are installed on the computer. The OS is also very important by providing a consistent way for software to deal with hardware without having the computer to thoroughly learn all the details of hardware. The OS interacts with the hardware via drivers. An easy example would be installing a printer to many computers. The seventh function allows user to easily connect to the internet instead of having to configure the tedious broadband service. OS can automatically configure the internet connection. The OS also function as a performance monitor, which in this case identify and reports information about the software or the devices of the computer. File management allows user to easily access their files and documents by allowing users to organize it. It also allows user to search or locate their files at ease and install new programs or software. The ninth function is important because without it, the computer will be a mess where all the files and programs are not well organized and randomly wonders in the computer. The OS also provides other utility such as cleaning up, defragmenting, diagnosing, and backing up the files and disks. With internet access, the OS is able to notify the user or update software automatically when an update is available. Many OS today comes with the automatic update feature. These updates are useful when it comes to fixing program bugs and errors. Sometimes, these updates can enhance the performance of the driver. Last but not least, the OS is also meant for controlling the network and administering security by providing an administrator account. A typical account usually consist of the user ID and password. Without the OS, the computer is said to be useless and unable to perform. The example of a personal computer OS are: Windows7, Mac OS X, Linux, Amigo, Haikuà ¢Ã¢â€š ¬Ã‚ ¦etc. Operating System Details Name of OS Company Current version Average Price Capabilities Additional Info. Amiga OS 4 Hyperion Entertainment 4.1 Update $164 eCom Station Serenity Systems OS/2 Home Student (5 licenses)- $149 Business Edition (unlimited licenses) -$259 Haiku Haiku Inc. R1/Alpha2 Free Mac OS X Apple Inc. 10.6.7 Bundled with hardware Upgrades: $29-$49 OS/2 IBM and Microsoft 4.52 $300 PC-BSD PC-BSD Software 8.2 Free Microsoft Windows Microsoft Windows 7 (Build 7601: Service Pack 1) Home Basic (Retail) $99.95, Home Premium (Retail) $119.95, Business (Retail) $299.95, Ultimate (Retail) $300.95 RISC OS Acorn Computers,  Castle Technology,  RISCOS Ltd,  RISC OS Open RISC OS  6.10 Select4i4 and RISC OS 5.13 Bundled with hardware Sold separately at $127 ZETA yellowTAB 1.2 Discontinued ReactOS ReactOS development team 0.3.13 Free Ubuntu Canonical Ltd.  /  Ubuntu Foundation 11.04 Free Linux based Google Chrome OS Google Inc. 0.12.433.57 (Beta)   Beginning at $349 Linux based Windows 7 versus Mac OS X Snow Leopard Interface GUI (ease of use) Desktop Image retrieved from arstechnica.com The differences between the Windows 7s desktop (on the left) and Mac OS Xs desktop (on the right) is that the Windows 7 allows you to add gadgets on the windows sidebar gadgets. In addition, if a program is running on the Windows 7, you are able to see that the application icon is highlighted at the bottom. Whereas, to see whether a program is running on the Mac or not, it requires an additional steps by putting the mouse arrow to the second last icon on the Mac OS Xs dock. A list will appear indicating which programs are in use like the image bellow. Image retrieved from arstechnica.com It can also be seen in the previous image, that the position of the desktop icon and the minimize, restore down/up, and close buttons are different. In Windows 7, the desktop icon default position is on the left, and the buttons are on the top right of the windows explorer. On a Mac OS X, the positions as well as the order of the buttons are different, having this order from the left close, minimize, and restore up/down. Toolbar/ docks Image retrieved from arstechnica.com Instead of using the feature call toolbar, the Mac OS X uses something call the dock to locate the applications and so on. As one can reference from the image below, the dock actually looks graphically nicer than the windows toolbar. As the user place the mouse arrow along the dock, the software icon will expand slightly indicating it is selected. Image retrieved from arstechnica.com However, say when the same internet browser is been launched twice, windows 7 Compatibility Hardware (drivers) HDD>file system types :format cannot support OS Commonly used File System Types Windows7 Mac OS X FAT Yes FAT16 Yes No FAT32 Yes No NTFS Yes Yes (Read only) Software (games) Chemistry sketch Internet explorer Gunbound Emulators: no$GBA, ndsemume Maple story Boot Camp BOOT CAMP (Window7 thing) Price( bought separately, MAC is always bundled with hardware) Performance Speed Battery/power consumption If one can never convert just a simple criticism to a form of motivating device, yet taking it personally and one will never learn Overall Users preference

Monday, January 20, 2020

Population: The Growing Problem Essay -- Science Biology Papers

Population: The Growing Problem History of Earth's Population From the beginning of time until 1850, the world population had been steadily growing until it finally reached the point of one billion people. Hurray for our species, we are successful and have been able to make adaptations in order to survive! Then, only 80 years later, the world population doubled to a whopping 2 billion citizens. After that, the doubling time was sliced once again. By 1960, just thirty years later, three billion people called Earth "home." Seventeen year later, in 1977, the world population hit four billion people. In 1986, nine short years later, we reached a population of 5 billion inhabitants. Sometime in the next few years, we are looking at crossing the 6 billion mark (Davidson 1995). The notion, debate, and warning behind overpopulation is nothing new. The theologian Tertullian, in 200 CE, wrote, "What most frequently meets out view (and occasions complaint) is our teeming population." He continued by exclaiming that "[the global population] numbers are burdensome to the world, which can hardly support us." At the time of this statement, the global population totaled a mere 190 million people (Lambert 1995). In 1798, Thomas Robert Malthus, possibly one of the best-known writers and debaters of overpopulation, wrote an essay entitled "Principle of Population." In this composition, Malthus suggested that humankind was, currently and forever more, playing a hopeless game of population vs. natural resources. This game, he continued, would end with a vast number of humans losing the battle. Malthus presented this doomsday scenario of global overpopulation as closely connected with famine and starvation. His belief was that human po... ...9). World population and development. New York: Syracuse University Press. "Ireland." The 1996 grolier multimedia encyclopedia. CD-ROM. Danbury: Grolier, 1996. Lambert, T.A., Olin, J.M, Abernethy, V.D., Barroso, C., Sen, G. (1995). Women and population. Environment, 37, 3. Sanger, M. (1931). My fight for birth control. New York: Maxwell Reprint Company. Sax, K. (1955). The world's exploding population. Boston: Beacon Press. Scanlon, M. (1997, September). The new population bomb. Mother Earth News, 163, 48. Wattenberg, B.J. (1997, November). The population explosion is over. The New York Times Magazine, 60-63. Wilson, E.O. (1992). The diversity of life. Cambridge: The Belknap Press of Harvard University Press. World-wide web 1: "United nations population fund moves day of six billion based on new population esitmates." 30 October, 1998.

Sunday, January 12, 2020

Integrative Problems and Virtual Organization Strategy Paper Essay

Different types of threats for each different approach much each are carefully considered to ensure that the right approach is chose. There are benefits and risks for each approach. The threats must be read and understood appropriately. The first approach would be about Patton Fuller Community College going through with an IPO. An IPO is also known as an Initial Public Offering. The IPO is the first stock sale is a public offering that sales shares of stocks from a company to people within the â€Å"general† public. Some of the threats that Patton Community Hospital could go through if the IPO is pronounced publically would be that the people who make large investments for important things like retirement, they are putting their retirement at risk because the market can be very good to people at times, but it is not a sure thing. â€Å"†This is the most negative piece of legislation I’ve ever seen,† frets William Elmore of Foundation Capital.† It will dampen capital formation. Anyone standing to create wealth by building a growth company would face putting personal assets at risk.† There will be fewer future IPOs if some founders choose not to go public as a result of lingering concern† (Mamis, Robert A. (1997). Going public puts a lot of people in a position to create an opinion immediately and this might be a bad thing because business could slow. Some of the threats that could take place if another organization from the same industry is acquired the company that is being acquired (if it is the buying company) will end up in quite a bit of debt because it will end up costing more in the long run. â€Å"Because a public company’s stock is relatively liquid, it can be used as the currency to acquire other businesses and fuel further growth. Many owners of successful private enterprises are happy to sell their businesses in exchange for the marketable securities of a growth company† (QWOTER.CO. (2013). The threat that opposes here would be that even through with this approach there is a good chance of the business being larger and better, but this would mean that there is also the risk that the company is making the wrong move, and this could fail just as easy as it could succeed. This means that a threat would be that the business could go downhill. For example, if the other business acquired has a bad person worki ng for them or a bad rep, this will now include all companies involved. Patten Community Hospital also faces threats of merging with another company’s. Some of these threats would include debt, legal issues or standards, and mutual understanding and respect for all company’s involved. Merging a company can be very costly. This could mean putting the Company who is buying into some serious debt. This would not be good for either one of the merging parties. It would be smart to weigh every decision very carefully when choosing to merge companies because you want to make sure that everything legal is discussed and agreed upon to ensure that there are no misunderstandings. Also any business’s that are considering merging should meet and get to know the other business owner well before making the final decisions because there are so many different types of business, different types of strategies, different types of techniques, and different types of ideas and styles. Business owners that merger businesses may be very settled on the way th at he or she runs their business. Therefore this may cause conflict. Businesses can be very successful from merging their businesses together if a good team strategy and no conflict. View as multi-pages

Friday, January 3, 2020

Burmese Python Predatory Species Of The Florida Everglades...

Burmese Python Predatory Species of the Florida Everglades The Burmese python has become a predatory species in the Florida Everglades. The Burmese Python has slowly been taking over the Florida Everglades eating small animals and causing massive destruction. The reason for this problem is the growth rate of the species occurring all over the Everglades. The ecosystem is perfect for the ever growing population of Burmese pythons in the Everglades. Pythons have migrated to the Florida Everglades by irresponsible pet owners and escaping from their homes. A group of researchers collected data to support the theory that the overpopulation of snakes is killing off the mammal population. Ashley Townsend, National Geographic writes, â€Å"the python population has continued to grow at a remarkable rate and has caused great distress to the park s ecosystem.† For this study, the researchers at the South Florida Water Management District recorded the rates of live and dead mammals duri ng a nocturnal road survey and compared it to the 1996-1997 road surveys. Scientists for the South Florida Management District, stated, â€Å"Researchers noted that the animals in the park were dying at a greater rate since the python population has gotten so enormous.† According to Donald Marcus, director for Corbett Wildlife Center, â€Å"there is a vast amount of data supporting the theory that scientists have conclusively proven the Burmese python population is a major reason for theShow MoreRelatedThe Burmese Python ( Python Bivittate )1511 Words   |  7 Pages. The specific species this paper will focus on are the Burmese python (Python bivittate), the Lionfish (Pterois), and the Brazilian pepper tree (schinus terebinthifolius). These specific invasive species have been chosen for their diversity in the animal kingdom and their large impact on the Florida Everglades and Florida’s ecosystem. These species all negatively impacted the host environments. The different types of harm caused by these species include overpopulation from no predator in new location