Question

What are the key features of file management in the UNIX operating system? Discuss the challenges...

  1. What are the key features of file management in the UNIX operating system?
  2. Discuss the challenges you have faced in attempting to install and configure UNIX.
  3. Explain how the designers of the Windows operating system had to incorporate a set of five software design goals; extensibility, portability, reliability, compatibility, and performance.
  4. Discuss the role of the I/O Manager.
  5. Discuss how Kerberos security provides effective distributed security.
  6. What is the difference between device management in the Windows operating systems and MS-DOS?
  7. How do you feel about Microsoft’s commitment to security?
0 0
Add a comment Improve this question Transcribed image text
Answer #1

1)What are the key features of file management in the UNIX operating system?

All the data in UNIX is stored in files.
These files are organized in tree like structure called file system.
There are three basic types of files in UNIX
Ordinary files:It holds the user's data or program.
Directories:It is a folder type structure which contain many file.
Special files:They control access to hardware.

2)Discuss the challenges you have faced in attempting to install and configure UNIX.

UNIX-based systems and the encryption key is not exactly 32 characters.
Linux OS agent fails to load shared libraries

3)Explain how the designers of the Windows operating system had to incorporate a set of five software design goals; extensibility, portability, reliability, compatibility, and performance.

Extensibility :

It refers to the capacity of the system to keep up to date with updated computing technology.So the program written for MS-DOS can run on windows having suitable environment.
Portability:
It seems that the OS can be moved or transfer from one hardware to the other hardware.

Reliability:
It is the ability to handle error and to protect the system from other malicious software.

Compatibility:
these applications can be compile and run without any changes made to the source code.

performance:
It is designed for good performance.The subsystem can communicate through each other in a speedy way and the system respond can be fast to the external query.

4)Discuss the role of the I/O Manager.

The computer consist of many devices for input output operations.
I/O manager manages the communication between application and their device driver.
The packets are passed from operating system to driver and then from one driver to the another driver.

5)Discuss how Kerberos security provides effective distributed security.

kerberos is the protocol for checking service request between two user through an untrusted network.
First of all the client will send an request to the server for a specific service and the request will have only plain text after that the authentication server retrieves the client private key,assuming the client username in the database if the username is found in the database than it will generate the session key and a ticket granting ticket.
the ticket granting ticket is timestamped and encrypted with the client's password and is sent to the client.Then client enters the password and if it matches with the database then the key will be decrypted and will get a desired service.

6)What is the difference between device management in the Windows operating systems and MS-DOS?

DOS have command line or text based interface while WINDOWS have graphical user interface and command line interface.

In DOS user should know the command to use it easily while WINDOWS can be used easily.

DOS is not widely used while WINDOWS is widely used.

DOS uses less MB to work while WINDOWS requires GB to work.

DOS is available free of cost while WINDOWS is expensive.

7)How do you feel about Microsoft’s commitment to security?

Increased transparency:
They believe in providing clear and proper information regarding the issues and for other work.
Focused advocacy:
To deliver the data and the updates to all the user across the globe.
Strong partnerships:
They should have good relation with the government and industry on projects and programs that are useful to all the user.
Constructive conversations.
They communicate to solve the problems that the user are facing and try to solve it as fast as they can.

Add a comment
Know the answer?
Add Answer to:
What are the key features of file management in the UNIX operating system? Discuss the challenges...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Scenario: Security and Memory Management Some have argued that Unix/Linux systems reuse a small number of...

    Scenario: Security and Memory Management Some have argued that Unix/Linux systems reuse a small number of security features in many contexts across the system, while windows systems provide a much larger number of more specifically targeted security features used in the appropriate contexts. This may be seen as a trade-off between simplicity verses lack of flexibility in the Unix/Linux approach against a better targeted but more complex and harder to correctly configure approach in Windows. question: Discuss the highlighted trade-off...

  • I have this case study to solve. i want to ask which type of case study...

    I have this case study to solve. i want to ask which type of case study in this like problem, evaluation or decision? if its decision then what are the criterias and all? Stardust Petroleum Sendirian Berhad: how to inculcate the pro-active safety culture? Farzana Quoquab, Nomahaza Mahadi, Taram Satiraksa Wan Abdullah and Jihad Mohammad Coming together is a beginning; keeping together is progress; working together is success. - Henry Ford The beginning Stardust was established in 2013 as a...

  • First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below...

    First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below Include each of the following in your answer (if applicable – explain in a paragraph) Research problem: what do you want to solve using Delphi? Sample: who will participate and why? (answer in 5 -10 sentences) Round one questionnaire: include 5 hypothetical questions you would like to ask Discuss: what are possible outcomes of the findings from your study? Hint: this is the conclusion....

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT