UNIX SHELLS - Essay Example

Comments (0) Cite this document
Unveiled in 1960s, UNIX is a requisite operating system whose enhancements since then up to date present users with heightened enjoyment as well as flexibility while using a computer (Ramesh, 2010). This is especially undertaking varied tasks that entail numerous commands…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful
Read TextPreview

Extract of sample "UNIX SHELLS"

UNIX Shells Introduction Unveiled in 1960s, UNIX is a requisite operating system whose enhancements since then up to date present users with heightened enjoyment as well as flexibility while using a computer (Ramesh, 2010). This is especially undertaking varied tasks that entail numerous commands whereby without its speed their execution would not have been possible in the current state of technological knowhow. To execute these tasks, it normally utilizes shells whose role encompasses acting as an interface amid the user and kernel whereby after login by the user the program scrutinizes the availed information to align appropriately (Ramesh, 2010). Hence, interpreting login commands that will result to the anticipated result. Undeniably, UNIX serves a critical role in the current technological knowhow though to date it has undergone varied and essential developments that give it an advantage over, which this study seeks to highlight.
What I like about it and its history
Compared to other operating systems as well as varied computer technological enhancements, what I like regarding UNIX is its speed (Liu, Yue & Guo, 2011). However, historically this has been improving since its inception in 1960s up to date to the extent of being able to numerous daemons that known to operate manually or slowly in UNIX’s absence (Liu, Yue & Guo, 2011). This is quite advantageous especially currently, whereby almost each venture has almost completely embraced technology in order to evade commercial opposition from competitors. Additionally, it possesses the capability of aiding multiple segments that necessitate usage of varied network cards by the firewall (Liu, Yue & Guo, 2011). Mostly, this is at least 32, which is contrary to the practical Netware’s support that has a limit of 16 and windows strictly limited to four (Parker & Morley, 2014). Another aspect that I like about this system encompasses its compatibility whereby poses a capability of supporting word processors including WordPerfect as well as StarOffice (Liu, Yue & Guo, 2011).
How I can customize it
In customizing this system, it entails adequate knowledge coupled how to navigate with ease to ensure the intended adjustments work as necessitated (Robbins, Hannah, Lamb & Lamb, 2008). However, there are varied ways of customizing this system whereby on my side I would encompass setting the right margin such that it will be prompting to wrap sentences automatically (Robbins, Hannah, Lamb & Lamb, 2008). This is without one or user having to execute that command with the aid of a ENTER key thus saving on time (Robbins, Hannah, Lamb & Lamb, 2008).
Benefits of using it
These include
Usage of these systems does not entail both integration and involvement of numerous resources, which is unlikely to the former as well as other competing ones. Hence, cost-effective for it does not pose challenges of either slowdown or other functionality predicaments.
It is capable of stringing or integrating numerous commands at ago, hence manage to accomplish extremely intricate tasks that would have taken competing systems involvement of other extra resources.
It has heightened stability and flexibility, which is an extremely helpful trait to global ventures that seek for effectiveness in powering respective web as well as mail services or products.
It characterizes numerous devices due to its compatibility (UNIX, 2009).
(2009). Remote users connect to UNIX with reflection x advantage 2.0. (cover story). UNIX Update, 20(6), 1-3.
Liu, Y., Yue, Y., & Guo, L. (2011). UNIX operating system: The development tutorial via UNIX kernel services. Beijing: Higher Education Press.
Parker, C. & Morley, D. (2014). Understanding Computers: Today and Tomorrow, Comprehensive. Boston, Massachusetts: Cengage Learning.
Ramesh, S. V. (2010). Principles of operating systems. New Dilhi: University Science Press.
Robbins, A., Hannah, E., Lamb, L., & Lamb, L. (2008). Learning the vi and Vim editors. Sebastopol, CA: OReilly Media. Read More
Cite this document
  • APA
  • MLA
(“UNIX SHELLS Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
UNIX SHELLS Essay Example | Topics and Well Written Essays - 500 words. Retrieved from
(UNIX SHELLS Essay Example | Topics and Well Written Essays - 500 Words)
UNIX SHELLS Essay Example | Topics and Well Written Essays - 500 Words.
“UNIX SHELLS Essay Example | Topics and Well Written Essays - 500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


UNIX Operating System History

...of the distributed systems networks. Inter process communication in the UNIX operating system involves the connection between the system components logically and physically. It supports real time network applications which allow the user to exchange messages in an interactive session. UNIX is known as a command line interface due to nonexistence of a GUI environment Today UNIX is equipped with a GUI along with dynamic communication functionalities. Some of the registered UNIX products are HP-UX, IBM AIX, SCO UnixWare, SGI IRIX, Sun Solaris etc. UNIX Directory Structure UNIX Directory Structure Figure 1.1 UNIX...
10 Pages(2500 words)Essay

MSc Practical UNIX Security

...?Practical UNIX Security Table of Contents Introduction UNIX is the most popular operating system which has been used extensively, and a lot of people still use it as it has been used in the past. However, a lot of IT experts who used UNIX systems in the earlier period discovered it inflexible from the security point of view. As its control was inspiring, its command-line interface needed technological proficiency; its grammar or syntax was not perceptive, and its interface was not user friendly. However, in the IT market, the UNIX operating system has been the medium for broad transformations that have authorized consumers to seek high quality devoid of random...
8 Pages(2000 words)Essay

Practical UNIX Security

..., the threat may easily allow unauthorized access of an intruder who can modify unauthorized data along with disruption of services. Moreover, the Microsoft domain server is also vulnerable to ‘mod_fcgid’ stack based buffer overflow attacks that are caused by reprehensible bounds inspection from the module named as ‘fcgid_header_bucket_read()’. A hacker may send a uniquely constructed Fast CGO data, in order to execute the arbitrary code on the apache server running on a windows based server. Consequently, the application will crash (, ISS X-Force Database: apache-fcgid-bo(63303): Apache mod_fcgid module fcgid_header_bucket_read() buffer overflow ). Remedial Action In order to eliminate this threat, whether in windows environment or...
10 Pages(2500 words)Assignment

Practical UNIX Security

...?Running Head: UNIX Security UNIX Security Unix is the operating system which was foremost developed in 1960s and is under regular development since that time. Operating system can be understood as the group of programs responsible for making the computer work (Peek Jerry, 2002). It is a multi-user, stable, multi tasking system for severs, laptops and desktops. Unix systems are also equipped with graphical user interface in the same way as Microsoft Windows, which gives an easy to use atmosphere. However, knowledge of unix is essential for operating Unix systems as it is not covered by a graphical program, for instance, in telnet session....
10 Pages(2500 words)Assignment

Royal Dutch Shells Innovation

...? ROYAL DUTCH SHELL’S INNOVATION Given the nature of completion in product marketing sectors of the economy and the globalization of trade, companies are prompted to heavily invest in innovation and technology as a cost-effective approach to competition. To move ahead of their competitors in the market, corporations must adopt modern technology, creativity and innovation which come at a cost. There are a lot of financial bearings which must be met by the innovative firm. The process of innovating a firm involves proper analysis of the market (especially in a perfectly competitive industry) which covers from products/services to management strategies. Shell being one of the firms which operates in an open economy is not left behind... in...
4 Pages(1000 words)Assignment

Positional Parameters (UNIX)

...OF PHOENIX ONLINE Introduction to Unix POS/420 r4 Walt Saiko POS 420 Introduction to UNIX of Phoenix Online Week 3 Individual Assignment Date 20 September 2008 Problem Description: Project 5.2 Page 198 The first exercise involved interaction with the user in the form of giving the user instructions to enter five parameters, the positional parameters are used here and the user is prompted to enter the correct number of arguments. The first terminal window is my script, displayed by typing "cat Project5-2". The second and third screen show two consecutive runs of the script, one with insufficient argument and another with correct arguments. Project 6-2 (page...
2 Pages(500 words)Article

Linux vs HP-UNIX

...of tasks associated with them. For example, the immediate bottom half handler works its way through the immediate tasks queue (tq_immediate) which contains tasks that need to be performed immediately. (Rusling, David 1999) Shell The shell application inside the UNIX Plan9 system are set up for standard input and output connection to the editable text of the window with such features as its own private bitmap and multiplexed access to the keyboard, mouse and other graphical resources. The UNIX shell is commonly defined as the command line which provides the user interface for the actual operating system. By executing input commands, the...
4 Pages(1000 words)Essay

Unix Vs. Windows

...UNIX vs. WINDOWS UNIX and windows are the primary operating systems in the world today. In fact, an open source version of UNIX, known as Linux, had evolves as a popular choice among ardent programming enthusiasts. However, the popularity and extent of use among different categories of users is due to the different strategies adopted by the promoters of both operating systems. The fact that windows has grown to be the most widely used operating system is due to the extensive and aggressive marketing strategies adopted by the company (Microsoft). Apart from allowing the operating system to be used by complete novices (as a result of the ease of operation and the simple user...
2 Pages(500 words)Essay


...3D FEATURE IN USER INTERFACE OF UNIX AND OTHER OPERATING SYSTEMS INTRODUCTION A Graphical User Interface is known to basically refer to an interface emanating from a computer program that challenges a computer’ graphics ability to ease the workload of the said computer. The idea is to make the liveware’s work simpler in demystifying the command languages that are deemed complex. The basic components of a GUI are the menus, pointers, desktop, windows, icons and pointing devices. Although, the first Graphical User Interface was designed by Xerox Corporation in 1970 by their Palo Alto Research Center, it was Apple in the 1980s that catapulted the GUI to new heights, with their ability to incorporate the expensive CPU and...
8 Pages(2000 words)Essay

File management in UNIX

...File management in UNIX A UNIX file system is a method of managing large amounts of data by storing and organizing them in a chronological manner (Pfleeger et al, 2003). Also known as file access rights, file protection on the other hand is a system that allows a user to create a file that has restricted access to only a few selected people. Editing abilities, which involves write and delete privileges are normally the same in a UNIX system since it allows one to overwrite a file with a different one. An individual who creates a file is considered the owner and thus has the sole permission to manage that file (Garfinkel, et al, 2003). The owner therefore is the only person who can...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic UNIX SHELLS for FREE!

Contact Us