Ask a question from expert

Ask now

Operating System: Services, Security Risks, and Evaluation

8 Pages2176 Words28 Views
   

Added on  2023-01-04

About This Document

This report provides an overview of the services offered by operating systems, focusing on Windows and Linux. It discusses the productive usage of operating system services, such as input/output, pipes and filters, access control, process concept, threads, parallel processing, concurrency, scheduling, and memory management. It also evaluates the distinct operating systems, Windows and Linux, along with the security risks associated with them. The report concludes by highlighting the importance of operating systems in facilitating user activities.

Operating System: Services, Security Risks, and Evaluation

   Added on 2023-01-04

BookmarkShareRelated Documents
Operating System
Table of Contents
Operating System: Services, Security Risks, and Evaluation_1
Introduction......................................................................................................................................1
Part 1................................................................................................................................................1
Illustrate productive usage of operating system services.......................................................1
Part 2................................................................................................................................................3
Evaluation of distinct operating systems along with security risks associated with them.....3
Conclusion.......................................................................................................................................6
References........................................................................................................................................7
Operating System: Services, Security Risks, and Evaluation_2
Introduction
Operating system acts like a interface among computer hardware and user. This is liable
for performing basic tasks such as memory, process and file management along with handling
input & output as well as controlling peripheral devices like printers, disk drivers, etc. There are
different kinds of operating systems that are being used, they are Windows, Linux, OS/400, Mac,
AIX and many more that enables user to interaction with the system and conduct their operations
(Anwar and et. al, 2016). This report will provide an overview of windows and Linux operating
systems with reference to different aspects. Along with this, certain vulnerabilities and security
risks associated with the operating system will be depicted.
Part 1
Illustrate productive usage of operating system services
A Microsoft window is also known as Windows OS that supports graphical user
interface. It was released in the year 1985 and from then different versions has been brought
within the market. The services that are being rendered by windows are specified beneath:
Input & output: The I/O subsystem that involves I/O devices along with corresponding
software drivers. The drivers are liable for hiding peculiarities associated with particular
hardware devices from users. OS is responsible for managing communication among device
drivers and their users. The access is provided by operating system when it is needed. I/O
operations implies read and write functions with file or peculiar I/O device.
Pipes and filters: To redirect I/O to the file, the two different commands can be
connected through which output on one program will act as input for the other. The way in which
they can be connected is referred to as pipe and done by making use of vertical line among
commands. Furthermore, when program takes input from other program, conducts some sort of
operations on it and write results to standard output is defined as filter. The task that is
accountable for carrying out critical processing within series of unlike elements then this can be
reused (Hviid and Kjærgaard, 2018). Pipes and filters lead to enhance scalability, reusability and
performance by allowing different task elements to perform processing that can be deployed as
well as scaled independently.
1
Operating System: Services, Security Risks, and Evaluation_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Fundamentals of operating system
|16
|1095
|138

Introduction to Operating System (PDF)
|14
|1031
|86

Fundamentals of Operating Systems and Programming
|14
|1522
|70

(PDF) Introduction to Operating System
|11
|1246
|34

Fundamentals of Operating Systems and Programming
|6
|1111
|292

Operating system - Sample Assignment
|6
|1203
|31