Sign In
Not register? Register Now!
You are here: HomeCourseworkIT & Computer Science
7 pages/≈1925 words
6 Sources
IT & Computer Science
English (U.S.)
MS Word
Total cost:
$ 39.95

Operating Systems Types and Their Vulnerabilities (Coursework Sample)


The student was required to choose an operating system and evaluate any threats using special software and provide a technical report.


Operating Systems Vulnerabilities
Operating Systems Vulnerabilities
OS Definition
OS Fundamentals
Operating system (OS) entails a set of programs designed to complete one mutual task: hardware resources management. Operating systems also offer various services for application software. Essentially, an OS is an interface linking programs requesting in/out (I/O) and hardware (Silberschatz, Gagne & Galvin, 2018). This fundamental concept of OS makes it the most crucial component if of all system software programs. The tasks executed by an OS in any given scenario includes (but is not limited to) concealing hardware complexities from users, management if hardware's resources, and sharing of I/O among various programs using the central processing unit (CPU).
Types of Operating Systems
There exist several types of operating systems. The five of the most common operating systems are Microsoft Windows, Linux, Apple Mac OS, Apple's iOS, and Android. Crucially, an OS defines the file storage channels, among other important aspects involving security. While all types of OS aim to achieve the above-mentioned set of tasks, they differ in terms of the approaches they take while executing these tasks (Silberschatz, Gagne & Galvin, 2018). A case in point is where one cannot run a Windows program on a Linux system. Also, the access of the several OS types varies whereby some are designed and offered freely by groups of individuals around the globe like Linux, while others such as Microsoft’s Windows are commercial products. Similarly, different operating systems run on different types of hardware and are designed for different types of applications.
Microsoft Windows. Microsoft Windows has seen tremendous developments since its inception in 1985, and it has gained an unmistakable recognition globally, making it the most predominant OS for office and home computers. The OS latest version is Windows 10 and is currently offered across various devices such as tablets and smartphones. Also, developers have made significant attempts to make it available on some web and number-crunching server computers. In effect, most computer manufacturers have ensured that their devices support Windows as a marketing strategy (Zotov, Duncan & Szilagyi, 2012). The initial Windows version worked with a former Microsoft operating system called MS-DOS, which provided a modern graphical interface on top of DOS's traditional text-based commands. The OS has since employed a brand and a logo whose signature features include windows themselves – rectangle-shaped, on-panel screens – representing individual applications. The Windows Start menu is also an effective trademark that is easily accessible for users and helps in finding programs and files on their devices. It is worth contemplating that while the Microsoft company has put forward strategies to include versions of the Windows OS for smartphones, such efforts have been considerably less successful.
Linux Operating System. While a single company majorly initiates the individual development of most operating systems, Linux OS is developed by various companies. Linux Torvalds was the creator of the operating system in 1991. However, today, programmers across the globe collaborate on its open-source code and submit tweaks to the central kernel software and other programs. Another notable component of the OS is its wide usage by programmers as well as on corporate and scientific servers, including cloud computing 

Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Application of Information Governance Concepts in Java Programming
    Description: Java developers are some of the most important professional in the information technology sector; they are relevant to the industry since they are responsible for developing new programs for computers and upgrading them for better use-experience....
    2 pages/≈550 words| 1 Source | APA | IT & Computer Science | Coursework |
  • Privacy Leaks in Using Computers and How to Prevent Them
    Description: Privacy is the right of an individual to have freedom unwelcomed scrutiny; it is also the ability to safeguard the information about themselves and the organization's information. It involves consent, notice, and regulatory accountability. Privacy leak is the unwanted exposure of private data or resources...
    2 pages/≈550 words| 4 Sources | APA | IT & Computer Science | Coursework |
  • Identifying the Essential Pieces of Active Directory and Account
    Description: An active directory has several components, including group policy, distribution groups, and security groups. The active directory's role is to organize and enhance access to information in directory of an operating system. Role of group policy is to organize information into groups that require same task....
    2 pages/≈550 words| No Sources | APA | IT & Computer Science | Coursework |
Need a Custom Essay Written?
First time 15% Discount!