Nobody downloaded yet

Operating System - Assignment Example

Comments (0) Cite this document
Summary
The security policy in this context refers to the determination of the user of information in the computer system. An example of one of the…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.4% of users find it useful
Operating System
Read TextPreview

Extract of sample "Operating System"

Download file to see previous pages Thirdly, it ensures that there is as little as possible the amount of damage that errant programs are likely to cause. Therefore, the protection mechanisms are either tools or procedures for the enforcement of the security policies while protection policies encompass what is allowed and those that are prohibited, while using a computer system (Whitman & Mattord, 2009).
An access matrix is a protection security model which contains columns representing varied system resources; and the rows representing varied protection domains. Implementation is executed with reference to: domain, objects and rights entries. The model uses a lock-key mechanism where each resource is linked to a unique lock (bit patterns). Each domain has a specific bit pattern known as a key. Access is only granted if a domain key fits a resource lock. Moreover, modification of its own keys is not allowed. Every column of the table is kept as an access right for the specific object in order to discard blank entries. Every row is maintained as a list of a domains capability (Whitman & Mattord, 2009). The capabilities lists cannot be directly accessed by any user or by the domain because they are protected using a tag and an address space which can further be segmented.
Based on Whitman & Mattord (2009) a computer virus is a program-code that attaches itself to an application so as operate concurrently while the application is running. A worm is a program that replicates itself in order to consume the host’s genetic code and mechanism. A virus attaches itself to a particular file or an opened program while a worm exploits the weakness an operating system or an application in order to duplicate itself. A virus relies on user(s) so as to spread the infected programs or files to other computer devices while a worm uses networks to duplicate itself to other computer devices without the help of user interventions. A virus can modify, delete or change the ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Operating System Assignment Example | Topics and Well Written Essays - 750 words”, n.d.)
Operating System Assignment Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1699110-operating-system
(Operating System Assignment Example | Topics and Well Written Essays - 750 Words)
Operating System Assignment Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1699110-operating-system.
“Operating System Assignment Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1699110-operating-system.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Operating System

Operating System and Networking

...a virtual leased line that will replace the traditional ATM service operating on layer 2 without negotiating flexibility and scalability factors of the University MPLS network. Critical Analysis and Reflections Universities are keen to save money on maintaining and acquiring complex computer networks. However, many universities are acquiring cloud services for low cost of network troubleshooting and administration ownership. On the other hand, scalability options and cost must also be considered at all times in terms of Wide area network connectivity. The proposed WAN MPLS VPN is the most cost effective and robust network design that will provide a single point for connecting all the university campuses together....
6 Pages(1500 words)Coursework

Operating system

... Operating Systems Introduction An operating system is an integral part of a computer system. A computer is a complicated system and has a hierarchical architecture, which helps in data processing. At the centre of the computer architecture is the processing unit, which processes data in digital form. In this regard the computer needs an operation system to achieve the following; Human interface The computer has to have a way of presenting this data to the human level in a language and a format which is understandable. The way the processor operates on data is not the way the human would be able to read or use the data. As a result, there is a need for a communication interface between the computer and the human users. Interfacing... the...
4 Pages(1000 words)Essay

Operating System

...10 September 2008 Operating System The traditional definition of operating system (OS) in the 1960's is"the software that controls the hardware" (Muhammad 2). With the advancement of technology and the creation of microcode, this definition is not applicable anymore. Nowadays, an operating system refers to "the system component of a computer system that is responsible for the management and coordination of activities and the sharing of the resources on the computer" (Operating System 1). This allows it to become a host which manages the other software running in the...
4 Pages(1000 words)Essay

Windows XP Operating System

...1. Introduction Windows has evolved from a program consisting of 4000 line of s of an assembly language that ran in 8 Kbytes of memory using then Intel 8086 microprocessor to a more complex and robust type of a computer system which runs most of today's computers. In 2000, Microsoft released its new version of the windows called Windows 2000, which are offered to both home PC and professional workstation versions. Its operating system architecture is a hybrid architecture which composed of client/server, layered, object-oriented, and symmetric multiprocessing architecture principles. Windows 2000 borrows from the features of object-oriented languages. An object oriented language is a...
9 Pages(2250 words)Essay

Operating System

...Operating System of Operating System To minimize disruptions and maintain a high level of productivity operatingsystems manufacturer came up with different support options present on their websites. Most of these options are free to use but for some options customer has to pay. Support options easily found on manufacturer’s website are Knowledge Base Search, Online Chat, Telephone Support, Support Email Address, Online Technical Forums and FAQs. Microsoft is one of leading Operating System manufacturer. Support options that are available on their website are Knowledge Base search Supported Products list Support offerings Product support...
1 Pages(250 words)Essay

Operating system

...Your full February 18, Operating System An operating system (OS) is the manager software of a computer. What it manages includes the computer’s memory, processes running on it, software installed in it, and all hardware attached to it. With the help of a Graphical User Interface (GUI), an OS becomes a link between the user and the computer, because the user does not know the computer language of ones and zeros, and the operating system takes the responsibility of taking user’s commands and passing it on to the related software and hardware. The user uses the GUI of the OS to give commands through mouse pointer, icons and menus. When we...
1 Pages(250 words)Essay

Operating system

...COMPUTER SCIENCES AND INFORMATION TECHNOLOGY OPERATING SYSTEM An operating system is a program that acts as an interface between the user and the computer hardware and controls the execution of all kinds of programs. (Maxwell, 2011)It is the most important software that runs on a computer. It manages the computers memory, processes, and all of its software and hardware. It also allows one to communicate with the computer without knowing the computers language. (Anonymous, 2010) Functions of an operating System The operating system is important and it has the following functions; (Maxwell, 2011) I. Memory...
2 Pages(500 words)Assignment

Operating System

...1) Define the concepts interrupt and trap, and explain the purpose of an interrupt vector. An interrupt is a command signal generated by an electronic device that is attached to the computer that acts as a signal for the operating systems to tell it what to do. While changing from one task to another the CPU follows a procedure called the context switch to prevent the tasks from conflicting with each other. When an interrupt is generated, OS saves the current execution state by means of context switch. After saving the execution state, the OS executes the interrupt handler at the interrupt vector. Kind of interrupt that is generated by software in response of an exception or an explicit trap instruction...
7 Pages(1750 words)Essay

Operating system assignment

...OPERATING SYSTEM ASSIGNMENT Affiliation OPERATING SYSTEM ASSIGNMENT Short-term Scheduler and Long-term Scheduler A short term-scheduler is also known as a dispatcher. It is the one responsible for executing most often and it makes the finest-grained decisions of the process that is to be executed next. This type of a scheduler is invoked whenever an event occurs. It may lead to the interruption of one process by preemption. A long-term scheduler on the other hand determines the kind of programs admitted to the system for processing. It controls the degree of multi-programming. A job becomes a process once this type of scheduler has been admitted. The...
6 Pages(1500 words)Assignment

Operating System Concepts

2. Methods and Object Synchronization (mutual exclusion): One process should be able to use only one resource at a time. The request by another process should be delayed until the resource has been released. 3. Deadlock prevention: Deadlock can be prevented by using different schemes or by avoiding the necessary conditions (mutual exclusion, hold and wait, no preemption and circular wait (Stalling, 274)) which hold true for it. The different schemes are: 2. (20 points) Given that the first three necessary conditions for a deadlock are in place, provide detailed comments on the feasibility of the following strategy and the potential outcomes based upon its application. All processes are given unique priorities. When more than one p...
4 Pages(1000 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic Operating System for FREE!

Contact Us