Free Essay

Pos/355 Operating Systems Paper Week 3

In: Computers and Technology

Submitted By railroadrick
Words 883
Pages 4
Operating Systems

Operating system is a software program that operates and manages computer hardware and software components. An operating system can be categorized either as an open source operating system or a closed operating system on the basis of the source code availability for alteration and modification. An operating system that copies the source code into the system when operating installed whereas a closed operating system does not allow viewing, modifying, or updating the source, it only installs the executable files when this operating system is installed into any of the operating systems. Examples of open source operating systems are Linux, UNIX etc., and closed operating systems examples are Microsoft Windows, Mac OS X etc.

Open source and closed source operating systems comparison

Open-source operating will allow access to the source code by the users and programmers to make alterations. As source code is available in the public he person who has programming skills can read the source code and modify the code or here she can add some advanced functions in the existing operating system which can debug the code. In most cases new versions of the open source operating systems are introduced by the Open Source community programmers that debug the product for a special reason and make your own personalized version of the product. Possibilities in the personalize open-source product are limitless. As open-source product is debugged by numerous users worldwide, so open-source operating systems will be bug free. In case of the closed operating system, source is not revealed in the public to read or modify. The source code of close operating system is compiled in debug with the company that has copyrights to build and distribute the product worldwide. The debugging process depends on the policies of the company and they have limited time and money to debug the source code, so there can be some bugs traced by the user of the closed source operating system.

In close source operating systems severe exploits can be discovered that allows remote or local users to hack the machine. When exploitation is discovered the user is totally dependent on the company and will have to wait for the new patch to be released by the company. This may be a slow process and may take months to be resolved. Until the new patch is released by the company users suffer their vulnerability problems. But in the case of an open source operating system and there is an exploit found the open source community programmers will remove the possible vulnerability in short time and released a new patches within days or hours.

Closed operating systems are installed by purchasing a license key. This license key is a valid key usually for a year. For example Windows operating system is installed after purchasing the license key. Windows operating systems should also have a firewall system. Good firewall systems can cost a great sum of money. Open-source operating systems are available for free and are licensed under an open source community. For example Linux is licensed under GNU and it also has a firewall system.

In closed operating systems there are many encrypted techniques that are embedded in it. So there may be a risk to using a closed operating system. But in the case of open source operating systems the open source community has literally tens a very good encryption packages in these packages are trustworthy.

As closed systems do not reveal the source code, so everything is controlled by the company. So any kind of help and support is only possible by the company developers. But an open source operating system code is open and we have full control to read, make changes as we need. And also in open-source systems, there are various community users available to help instantly they provide full help and support for our problems as they are needed.

Open-source operating system like the Linux has implementation that is pro-offered due to its low-cost enters no need to spend or break your budget since a license of the software is is a general public license. The user can utilize the software with the free trial version that will not expire. The free software the user can download his extensive. The Linux stability is dependable and it does not freeze up or slow down due to low memory or leak. It provides great performance on workstations and on networks while having several users simultaneously. Linux was developed by an extensive group of programmers and has strong support for network functionality which can backup faster and is more dependable than other systems. Linux is very flexible and can be used for server applications, embedded systems, and desktop applications. Linux performance is great even with a limited hard drive space. Linux can multitask for example a large print job running in the background while not slowing down other applications. Linux security is very efficient in the user can select and download it for free.


1. Open-source systems versus closed source systems. By Ahmad Basha (2001). Retrieved from vs_ closedsource.html

2. Open Vs. Closed Source Operating System. By Sue Smith Retrieved from…...

Similar Documents

Premium Essay

Operating System Analysis Paper

...Operating System Analysis Paper Team A: , POS/355 August 25, 2012 Demetrius Fluker University of Phoenix Operating System Analysis Paper When ruminating over which operating system for a home, business, or office computer or network of computers, it is vital to evaluate all areas of the different operating systems options. The key system options to compare and contrast when evaluating Microsoft Windows XP, Microsoft Windows Server 2003, and Linux operating systems are to consider the system requirements, the different editions available, security features, system features, updates and support, user interface, and cost effectiveness. Moreover, the best fit operating system can be determined depended on the individual’s or organization’s needs. Operating System Requirements Windows XP The system requirements for Windows XP Home Edition and Professional Edition are the same. These requirements are a PC with a 233 megahertz or higher (a 300 megahertz + processor speed is recommended), 64 megabytes (MB) of RAM or higher (128 MB is recommended), 1.5 gigabytes (GB) of available hard drive space, a video adapter and monitor that is Super VGA (800x600) or higher-resolution, CD/DVD-ROM drive, keyboard, and mouse/pointing device. The Windows XP Starter Edition has different system requirements. These are 233MHz processor or better, 256 MB of RAM, Super VGA (800x600) video adapter and monitor, CD/DVD-ROM drive, keyboard, mouse/pointing device, DirectX 9 graphics with 32 MB...

Words: 4101 - Pages: 17

Premium Essay

Operating Systems Analysis Paper

...Operating Systems Analysis Paper An operating system is the meat and potatoes of any computer system, without it there would be no computer system. Its’ main functions are input/output, peripherals and providing a platform for which all applications and processes can run. This software tells your computer how to function and is the primary interface for which the computer is controlled. Operating systems also commonly referred to as OS are the basis for the security of systems. In today’s technology the operating systems use GUI’s which are graphic user interfaces that work to manage multiple processes at one time almost seamlessly. We will evaluate the most common operating systems found on the Internet today. The purpose for having an OS is to handle multiple programs that may be installed on a computer. The three most common operating systems for use on the Internet are Windows, Linux and the Mac OS X. Making the decision about which is best for you, means that you will need to be aware of the functionality and compatibility of these operating systems that are available for the Internet. First, let’s evaluate Windows, the first version was just called Windows and developed in 1985 as an add-on for MS-DOS, which is one of the dinsoaurs of operating systems. Windows Logo-Clipart Gallery . Microsoft Windows is a series of operating systems that uses (GUI) Graphic User Interfaces. This software was initially created to compete......

Words: 634 - Pages: 3

Premium Essay

Operating Systems

...Week 4 Individual Paper: Operating Systems Analysis Paper POS/355 November 7, 2011 Jeff Rugg Introduction The operating system, commonly known as OS, is the brain or the center of all computer systems. It controls the input/output and controls various tasks of the hardware. Apart from serving as a go-between for application programs and the hardware of the computer, the OS also consists of information and programs while providing general services to make sure that several software applications can operate accordingly. Operating systems can be found in almost any type of a computer device such as personal computers, supercomputers, cellular telephones, and video game consoles as stated by Linux Systems (2011). As the research was being conducted for this paper, it raised a question whether the internet uses the operating system? It proved to be a challenge to actually pin point the most common operating systems on the Internet, but as the research continued, it was obvious that these three, Windows, Mac OS X, and Linux are considered to be the most common operating systems used on the Internet today. Background of each Operating System Windows Privately owned operating systems, Microsoft Windows is generally used on personal computers and as of today, the most commonly used version is Windows XP with the new version of Windows 7 for personal computers and Windows Server 2008 R2 for servers is entering the market. Mac OS X Mac OS X is a graphical......

Words: 1150 - Pages: 5

Free Essay

Pos 355

...UNIX Protection Scheme Cedric Lee POS/355 Scott Stewart March 25, 2013 UNIX Protection Scheme There is an operation system that supports 5,000 users, and the company only wants to allow 4,990 users permission to access one file. In order to have a protection scheme in UNIX, a number of operations need to be performed first in order for this to work. UNIX file management hierarchy is very essential to know in order to understand and devise a plan that will allow this protection scheme to protect the files. Without knowledge of the hierarchy of the file management system within the UNIX operating system, there is no way that the 4,990 will have access to only one file. A file access control scheme will be the design of UNIX operating system. Therefore, user ids and passwords are needed in order to gain access to the system. All users of the UNIX operating system will each be given a user id and a user password. These user ids and passwords will be kept by the assigned users only. The protection of these ids and passwords depend on how well the user protects them. Encryptions and decryptions can also be used when the users are attempting to login. The administrator can put each user into different groups that allow access or deny access to certain files within the operating system. By doing this, there can be control on who can access what file due to the permission given to them by the administrator. The administrator is referred to as the super user......

Words: 385 - Pages: 2

Free Essay

Pos 355 Week 3 - Gnu Public License

...| Open and Closed Source Systems | GNU Public License and It’s Role | Type College Here | [Type the author name] | 5/13/2013 | | GNU General Public License To start, a GNU is a Unix-like OS that gives users complete freedom to modify or edit the software as they see fit. (, 2013) “A Unix-like operating system is a software collection of applications, libraries, and developer tools, plus a program to allocate resources and talk to the hardware, known as a kernel.” (, 2013) The GNU General Public License (GNU GPL) is a free, copyleft license for software and other kinds of works. (, 2013) The GNU GPL is a license that allows users the freedom to change/modify a program or to share it with others for free. This opens up programs to be edited in a manner that better suits the user. If the original program worked, but not in the way a specific user needs it to, they have the right, through the GNU GPL, to modify it for their needs, or to work better in general. Modified versions of the original software can also be distributed as an individual program. There are a couple different ways to look at this. Positive aspects involve some of which was just discussed; the ability to change a program or share it with other users, along with also being able to share the modified version of the original program. The bright side of this is that there is no one that the user has to get permission from when modifying the program. Given it’s free......

Words: 643 - Pages: 3

Premium Essay

Psy 355 Week 3 Paper

...Week 3 Paper PSY 355 Dr. Brenya Bucholski Week 3 Paper The human organism is amazing and its complexity goes beyond the tangible body itself. The cognitive functions are so fascinating to consider; the ability to emote, reason, and make decisions have drawn many into the search for a better understanding of the mind. The mind-body dualism theory is a theory that argues that the mind, also referred to as the soul, and the body are distinct from each other. This is highly regarded in many religions, such as Hinduism, that believes in reincarnation. Reincarnation requires the mind to be independent of the body and free to flow from one body to another in life after life. As psychology continues to develop as a science and with the advancements in scientific technology it brings to question how our psyche functions within this organism. Consider motivation. Does the body, specifically the brain, operate our motivation? I want to look into the motivation to exercise. What are the functions taking place that will drive a person to make the decision to exercise? Is this a function of the mind, the body, or a combination of both? Maslow’s Hierarchy of Needs is a great model to illustrate the interactive nature of our mind and body. It is also a good flow chart to point out some differences between intrinsic and extrinsic motivations. In psychology, the terms intrinsic and extrinsic motivation are common. Intrinsic motivation is essentially the personal satisfaction of an......

Words: 974 - Pages: 4

Free Essay

Memory Management Paper Pos/355

...Memory Management Paper POS/355 February 16, 2013 Bhupinder Singh Memory Management Paper Memory management is a key function of the operating system. Without proper memory management it can slow the running of the operating systems and can limit the number of tasks the system is able to do at the same time. The memory management is divided into two parts Multi-Programming and Uniprogramming system. One part would be the uniprogramming, it process things one at a time. Some users only do things one at a time more for personal computers, and then there is the multi- programming, which several programs can run at the same time. The operating system has the capability of causing an interruption after a specified time interval. The multiprogramming is a rudimentary form of parallel processing, so the operating system will allow each program for a given length of time. So what the memory management does is of the act of handling the computer’s operating systems memory space. In order for the operating system to run efficiently the memory management part has to share and store properly. It is a critical component to the operating system to run efficiently. There are requirements to the memory management. The mechanism and policies are in place to be required for the use of the operating system. These requirements are Protection, Sharing, Relocation, Physical Organization, and Logical Organization. Protection is one, it must be provided by...

Words: 511 - Pages: 3

Free Essay

Open and Close Source Systems Paper Pos/355

...Open and Closed Source Systems Paper POS/355 March 1, 2013 Bhupinder Singh Open and Closed Source Systems Paper GNU GPL (General Public License) defined as the copy left or free licensed software (, 2007). When making an invention the creator must have copyrights to protect them from their inventions. No one wants their inventions taken from them. They can loss acknowledgement or worse the royalties not given to them. Copyrights mean the right to copy; generally, it gives the copyright holder many other rights to their software or products. Creators who work hard to make their software or products a reality, they want that accreditation for their works; and they can determine who can take the work and financially benefit for the use it. It is a form of intellectual property; like patent, trademark, and trade secret (, 2012). By contrast, the GNU GPL is freedom of a guarantee to change and share the versions of the programs or software’s (, 2007). Most organizations use GNU GPL for their software and it with their authors also that release the work. The licenses are put in place for developer’s freedom and to change and share their work that they develop; this is GNU General Public License. There are steps that are taken to use GNU GLP. (1) assert copyright on the software, and (2) offer you this license giving you legal permission to copy, distribute and/or modify it, and this the developers that uses GNU......

Words: 479 - Pages: 2

Free Essay

File Management Pos/355

...File Management POS/355 February 25, 2013 Bhupinder Singh File Management Imagine a system that support 5000 users, and only allow 4000 of those users can access one file. This can be accomplished in many different ways. One option is for the 4000 users placed in a specific group and then set another group access to the group already on file. The second option is would be the way to go, and that is to have an access control list made up with names of all 5000 users on it. This paper will look into a protection scheme that will be used in an efficiently way to provide that protection to the system. There are techniques to protect the systems directories, files, and folders. Most IT departments will set up appropriate file permission on the files, set up certain tools to check accounts security, and make sure that every account and user set up passwords when in the systems. Security properties can be the source of protecting this. This paper will talk about the security descriptor referred to as access control list (ACL). There are two different types of ACL’s. Access Control List is specifically for the directory and files, and Access Control Default can only be associated with the directory. Example: when a file is in the directory and does not have access to the ACL it will use the rule of default for the directory. So with setting up those 500 users the system can access the list and find if those users are allowed to......

Words: 584 - Pages: 3

Free Essay

Failures Paper Pos/355

...POS/355 March 11, 2013 Bhupinder Singh Failures Paper The distributed systems are unique in that it’s executions of the application of the protocols are to coordinate on multiple processes on the network, they have their own local memory and it communicates in entities with each of them using a massage passing mechanism. They also have their own personal users to them that they can use for personal uses. What are shared across the distributed systems are the data, processor, and the memory that can achieve those tasks when processing information. The distributed system has features to help achieve in in solving problems and issues with software and programs, when being useful with the distributed system is not very easy; its capabilities are the components, than just the stand alone systems that are sometimes not as reliable. Because of the complexities of interactions between running the distributed systems, it must have special characteristics like the fault tolerant; this can recover from component failures without performing incorrect actions. Recoverable is where failed components can restart and then rejoin the system after the cause failure has been repaired. The failure on a distributed system can result in anything from easily repairable errors to a catastrophic meltdown. Fault tolerance deals with making the system function in the presence of defaults. Faults can occur in any one of components. In this paper we will look at the......

Words: 811 - Pages: 4

Premium Essay

Pos/355 Week 1

...Memory Management Requirements The requirements that memory management is intended to satisfy are; relocation, protection, sharing, logical organization and physical organization. Main memory is vital component in a computer system, as both the operation system and some user application have to be loaded into main memory before they can be executed. I will describe each requirement is a bit more detail. The first requirement in memory management is relocation. Relocation is essentially relocating the process to a different area of memory. Often it is impossible for a programmer to know in advance which other programs will be resident in main memory at the time of execution of their program, therefore, in an effort to maximize processor utilization, we like to be able to swap active processes in and out of main memory. The next requirement in memory management is protection. The purpose of protection is to protect each process against unwanted interference by other processes, whether they are unintentional or deliberate. Since, the location of a program in main memory is unpredictable, it is impossible to check absolute address at compile time to assure protection. Furthermore, most programming languages allow the dynamic calculation of addresses at run time. Therefore, all memory references generated by a process must be checked at run time to ensure that they refer only to the memory space allocated to that process. Any protection mechanism must have the......

Words: 566 - Pages: 3

Premium Essay

University of Phoenix Pos/355 Introduction to Operating Systems Week 3

...time experience with a virtual operating system. I am currently running Windows 8 on my Asus machine the windows operating system was installed when I purchased my machine. For my Virtual operating system I chose an Ubuntu (64bit) operating system since I had no former experience with it I will be running the operating system on the Oracle VM Box Manager. My first experience with the Virtual Operating system is that I had to go to to download the files to use to get the program for the virtual operating system. This took some leg work for me because I wanted to make sure that I was doing this correctly I didn’t want to accidently download a virus or something that would hurt my machine or break it so to speak. I consulted and I found that the information there seemed legitimate so I went ahead with the downloading process. When you look on the site for the Oracle VM Box Manager they do include a very detailed manual so I found the correct install for my host which is windows it only took a couple of minutes for it to download. Once downloaded you go through the wizard which is pretty straight forward but I do highly suggest keeping the manual open for a reference so that you are able to know how much RAM to allocate your guest operating system. Once you have your virtual machine named and set up with a virtual hard drive you are ready to install your guest your operating system. Don’t worry there is a wizard......

Words: 985 - Pages: 4

Free Essay

Pos/355 Project Failures

...Failures Adam Cain POS/355 2/6/2014 Randy Shirley Failure is not an option! This is what I have been told growing up and while I served in the Marine Corps, but as I found out in this assignment, failure is an option. This holds true when talking about a distributed system, which is a computer network like a Wide Area Network (WAN) or a Local Area Network (LAN). Distributed systems is defined as a software system in which components located on networked computers communicate and coordinate their actions by passing messages (Coulouris, Dollimore, Kindberg, & Blair, 2012). This allows the computers or even devices like smart phones and tablets, to share resources like printers, hard drives, and even internet access. A centralized system is a computer that is by itself, one that is not connected to a laptop. Think of a centralized computer as one of the spy computers in movies, like Mission Impossible. These systems can and will fail, while sharing some failures; a distributed system has more components that could fail, leading to them having more problems. There a many things that could fail on a distributed system, this paper will cover four of them, starting with hardware failure. Video cards, network access card, hard disk drives, solid-state drives, memory, and power supply units (PSU), these are all pieces of hardware that are in most of the computers sold today, and they can all die at a moment’s notice. Some of these items, if they failed would......

Words: 1129 - Pages: 5

Free Essay

Pos 355 Week 1 Dq 2

...In this pack of POS 355 Entire Course you will find the next docs: POS-355 Week 1 DQ 1.doc POS-355 Week 1 DQ 2.doc POS-355 Week 1 Lectures Lecture 1.1 Computer Basics.doc POS-355 Week 1 Lectures Lecture 1.2 OS Basics.doc POS-355 Week 2 Assignments Individual Real-time Operating System.doc POS-355 Week 2 DQ 1.doc POS-355 Week 2 DQ 2.doc POS-355 Week 3 Assignments Individual IND.doc POS-355 Week 3 DQ 1.doc POS-355 Week 3 DQ 2.doc POS-355 Week 4 Assignments Individual IND.doc POS-355 Week 4 DQ 1.doc POS-355 Week 4 DQ 2.doc POS-355 Week 5 DQ 1.doc POS-355 Week 5 DQ 2.doc General Questions - General General Questions POS 355 Week 1 Individual Assignment Memory Management Paper For this assignment, you will choose one the following options: ·  Option 1: Write a 2-page paper that explains memory management requirements. ·  Option 2: Write a 2-page paper that explains the differences in memory management between Windows® and Linux®. Format your paper consistent with APA guidelines. UNIX/Linux Versus Mac Versus Windows Write an 8- to 10-page paper that compares and contrasts the basic system differences between UNIX®/Linux®, Mac®, and Microsoft ® Windows® operating systems. Include discussion and comparison of the following: ·  Memory management ·  Process management ·  File management ·  Security Format your paper consistent with APA guidelines....

Words: 367 - Pages: 2

Free Essay

Pos 355 – Week 1

...Option 2: The Differences in Memory Management between Windows® and Linux®. Linux and Windows are both operating systems for the everyday computers. They both do not require special hardware. Many claim one operating system is better than the other. Windows does something better than Linux and Linux does something’s better than Windows. How each of these handles memory is the key to understanding. Linux has the unique ability to virtually extend system RAM capabilities with another form of partitioning called SWAP space. SWAP space is used by Linux to add more virtual RAM to the system. Virtual memory sort of trick the system to think it has more memory that it actually has by sharing it between competing processes as they are desired. This speeds up the capability of Linux to operate faster and with less system resources than a Windows machine with similar RAM specs. This swap space is dedicated specifically for paging operations. Paging is the function of writing parts of memory chunks to temporary space on a hard disk. Windows commonly uses a dynamically allocated temporary space on a hard disk called a “page file” for memory management. A “page file” is allocated on disk, for less frequently accessed objects in memory; things that would not necessarily be needed to be constantly in the hard drive or RAM memory buffer. This leaves more RAM obtainable to aggressively used objects. Windows and Linux have modern memory management architecture that in reality have......

Words: 310 - Pages: 2