Free

CIS 206 U1 Review Assigment - Coursework Example

Comments (0) Cite this document
Summary
It can work as a control program for computers. In addition, it is a well-orchestrated family of utility programs and a set of tools, which allow users to connect and use its utilities to build systems and…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.3% of users find it useful
CIS 206 U1 Review Assigment
Read TextPreview

Extract of sample "CIS 206 U1 Review Assigment"

Computer Sciences and Information Technology Reasons why Linux is Popular Linux is popular because it has unique, as well as powerful features. It can work as a control program for computers. In addition, it is a well-orchestrated family of utility programs and a set of tools, which allow users to connect and use its utilities to build systems and applications (Sobell, 2012). Linux is popular in academia as students can easily understand it. It supports several codes and a rich software development environment. The development of Linux from the time it was UNIX took the effort of universities took the efforts of university and college students to publicize it. Linux also offers more flexible and configuration options. It supports compilers and interpreters for a quite number of computer languages like C, C++, Ada, Java, Lisp, Fortran, Python, Perl, Pascal inter alia (Sobell, 2012).
2. The Free Software Foundation/GNU and the Parties Involved in its Development
The Free Software Foundation is the chief sponsor of the GNU Operating System. GNU is an operating system offered for free (Free Software Foundation, Inc., 2015). Linux is a completely protected multitasking operating system, which allows users to run many jobs at a time. Parties that helped in the development of Linux are the AT&T and UNIX system Labs, universities and colleges.
3. Utility Program and how it can be used with a Shell to Create Applications
Utility program is the software that assists in the management, maintenance and control of computer resources. They provide assistance to the day-to-day computing tasks and keep the system running. The shell can be used as a programming language. Therefore, with the support of utility program that will keep the computer resources running, programmers can use the shell to develop some applications (Sobell, 2012). Commands will be typed, and the shell processes them and through this approach, patterns of the desired application can be constructed bearing special meaning.
4. Difference between a Multiprocessor and a Multiprocessing System
A multiprocessor is an integration of two or more CPUs, with input-output equipment and memory. On the other hand, a multiprocessor system has its control carried out by a single operating system, which is responsible for coordinating activities of several processors, either through interprocessor messages or shared memory.
5. Parties behind Linux
Several parties have taken part in the development of Linux. This traces back to the era of UNIX, which was developed by a group of researchers who needed contemporary computing tools for use in their projects. Then universities and colleges were involved in furthering its popularity. Bell Labs further promoted it by offering it to schools at low costs. Further popular changes were made, and it was called Berkeley UNIX. Another major version called UNIX system V was developed by AT&T and UNIX system Labs (Sobell, 2012).
6. Reasons why this Project is Unique
Linux project is unique as it has a rich selection of applications, both free and commercial. In addition, it has a variety of tools that include word processing, graphical, networking, administration and security, and web server (Sobell, 2012). Linux has also become more mainstreamed with other several companies, hence an attractive alternative operating system over others. It also has an incredible breath of peripherals and a high-speed connectivity with which it supports the new peripherals.
References
Free Software Foundation, Inc. (2015, February 17). GNU Operating System. Retrieved March 5, 2015, from Free Software Foundation, Inc.: https://www.gnu.org/
Sobell, M. G. (2012). A Practical Guide to Fedora and Red Hat Enterprise Linux. New Jersey: Prentice Hall. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CIS 206 U1 Review Assigment Coursework Example | Topics and Well Written Essays - 250 words”, n.d.)
CIS 206 U1 Review Assigment Coursework Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1681578-cis-206-u1-review-assigment
(CIS 206 U1 Review Assigment Coursework Example | Topics and Well Written Essays - 250 Words)
CIS 206 U1 Review Assigment Coursework Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1681578-cis-206-u1-review-assigment.
“CIS 206 U1 Review Assigment Coursework Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1681578-cis-206-u1-review-assigment.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF CIS 206 U1 Review Assigment

LITERATURE REVIEW ASSIGMENT

...? Congestive Heart Failure: Non-Pharmacological Versus Pharmacological Management (Insert Congestive Heart Failure Introduction Congestive heart failure is a condition in which the heart’s pumping function is inadequate to meet the body’s requirements. It is the end result of continuous loss of heart muscles due to blockage of the arteries which supply the heart muscle (Martje et al 2010). Congestive heart failure usually affects people who have advanced age. The condition presents itself as the terminal manifestation of various cardiac diseases which either weaken the heart muscle, stiffen the heart muscle, or increase the oxygen demand of the body tissue beyond the heart’s capability to deliver blood that is rich in oxygen... Congestive...
3 Pages(750 words)Assignment

CIS

...CIS With the imagination of the human mind, racing at the speed of light it is quite evident how it affects the field of technology. Because of the fast paced human thought process, new technologies emerge everyday. Implementing these, technologies in the socio sphere of life bring along its own issues. The widespread use of technology in day-to-day business has forced experts to look into its pros and cons with some insight. The past few years have seen new trends emerging, better and efficient ways to communicate on a personal as well as social level. These boast about the enormous amount of data that can be shared. Nevertheless, along with it has come the intriguing question of "how safe is it to share" (Martinelli,...
3 Pages(750 words)Essay

CIS

...Sherry Turkle: Connected, But Alone? Turkle in the TED.com show talks about how technology has transformed the manner in which people communicate today. The traditional forms of communication where people used to talk face to face or through phone calls have been replaced by new forms of technology through use of text messages, social networks and emails. According to her, this transformation has led to loss of genuine real life conversation converting people into robot- like machines. She asserts that there are features of real conversation that can never be replaced by the electronic communication. These features are what connect people as social beings. It is through real conversation that one can express their real emotions... Turkle:...
2 Pages(500 words)Essay

CIS 206 U1 Discussion

...Fedora Comparison to other Linux Distributions School Linux operating system has many distributions that come up with several operating systems. The major operating systems and distributions are Debian, Ubuntu, Arch, and Red hat. Debian distribution produces operating systems like Ubuntu while Red-hat produces fedora and arch produce the Arch Linux. Other notable Linux distributions include OpenSuse, CentOS, Mint, Mandriva and Kali Linux formerly backtrack. In the text, we will focus on Fedora, Ubuntu and Arch Linux. Fedora started in 2002 as a spun off from an undergraduate project called Fedora Linux and is supported by the open-source community. Ubuntu is a fork of Debian, that is on of the oldest Linux distributions available...
1 Pages(250 words)Essay

CIS 206 Research Assigment

...File system interaction in a UNIX Environment The file system interaction in the Unix Environment is crucial. Unix allows users to have a compromise system functionally in which the kernel, the shell, and file system. Rachel (2003)The kernel of the core is critical for organization data and conducting transfers. This is crucial because managing the machine’s memory and allocating to users allows the UNIX to be proactive in organizing data. As a user, it is imperative to enforce these access permissions. The popularity of UNIX has been growing steadily and has been used by many organizations. Rachel (2003)As a matter of fact, the article is keen on the fact that many accomplished technical professional with experience in in e... system...
1 Pages(250 words)Essay

CIS U2 206 Research Assigment

...CIS U2 206 Research Assignment CIS U2 206 Research Assignment Chad Perrin’s article “Understand basic Unix file permissions” explores the configuration of users, groups, and file or directory permissions in UNIX in an instructive manner. Perrin’s main argument is that one can use the regular file authorization framework for UNIX to improve primary data security (Perrin, 2009). A section of this framework comprises three groups of entities that one can either allow or deny each of them particular authorizations. The entities are owner, group, and world. The owner entity is when every file and its path has an “owner.” The group entity is when one affiliates every file with...
1 Pages(250 words)Coursework

CIS212 U1 Review

...the password. The situation involves the exchange of hashes instead of the real passwords. Both parties can then verify the file or information after the transfer is complete. Activity 1-5 Use the file Nuclear Plant Password Policy for these questions. 1) Open and review the policy file. What type of policy document is this? It is a password policy 2) which standard policy components are in the policy? (Select all that apply.) The standard policy components included in the policy are the policy statement, the standards, and guidelines. 3) How often must system level administrators change their passwords to conform to this policy? They must change their passwords at least on a monthly basis 4) To conform to this policy,...
1 Pages(250 words)Essay

CIS 21 U2 Review

...CIS 21 U2 Review Activity 3 1. Which technology is only used for monitoring and capturing the content of data communications on a network? I.D.S stands for intrusion detection system. It monitors all the inbound and outbound network activities (Paloalto 2015). Also, it reports any form of malicious activity that may attack the system. 2. What is the difference between a host-based, and web application based firewall? Host -based firewall refers to any device attached to the computer for proper functionality. They include; host -based printers and host- based modems (Technet, 2015). Web application firewall refers to a server application that monitors a conversation between a client browser and web server. 3. Your organization... 21 U2...
1 Pages(250 words)Essay

CIS

...CIS Part My experience working for an organization offered new insight and practical involvement in theimplementation of a new system. Participating as part of the software design and development and implementation team, both the functional and non-functional requirements for the system had to be gathered for the organization, Virtusa. The organization is a profit oriented tech-firm that was looking to install a new computer system for its clients. The firm in this instantiated example of the project proves that the failure of the project was due to the requirements deficiencies. The practical case problem presented is that of a software corporation called Virtusa which released a software program application for its...
1 Pages(250 words)Essay

CIS

... College: Computer Programming Preheat the oven to 350 degrees. In a bowl, cream some butter, brown sugar, and white sugar together. Beat in the pudding mix until it is blended (Allrecipes.com, n.d). This recipe step exhibits both a sequence and iteration control structures. The first two steps exhibit a sequence control structure while the last step manifests an iterative approach. 2) 1. Database Administrator - Design and operations of a database 2. Help Desk - End-user oriented 3. System Programmer - Improve mainframe performance 4. Network Manager- Set up and manage network 5. System Operator - Day-to-day computer operations C++ Programming Language C++ is a cross-platform, multi-purpose computer programming language... College: Computer ...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic CIS 206 U1 Review Assigment for FREE!

Contact Us