Compare android and the linux operating systems

Assignment Help Operating System
Reference no: EM13761663

1. Early versions of UNIX were available only with a command-driven interface. In more recent years, graphical user interfaces have become popular. Explain in your own words why these GUIs made an impact on the popularity of this operating system.

2. Assume that you are a systems administrator. Explain why you might want to change the permissions on some of your directories to make them invisible to users.

3. Administrators sometimes find that when they deploy Windows in a multilingual environment, some languages require more hard-disk storage space than others. Why might that be the case? Explain your answer and give an example of one languages that could be expected to require more space.

4. Windows features Kerberos authentication. Describe the role of the ticket granting ticket to authenticate users for network access.

5. Identify at least five major types of threats to systems running Windows and the policies that system administrators must take to protect the system from unauthorized access. Compare the practical problems when balancing the need for accessibility with the need to restrict access, and suggest the first action you would take to secure a Windows computer or network if you managed one.

6. Examine the following list of permissions for four items included in a directory listing. Identify if it is a file, directory, or other. Specify the access allowed to three categories: world, user, and group. Identify any category of users who are denied any access to all of these files.

a. -rwx---r-x
b. drwx---rwx
c. d--x---r-x
d. prwx-------

7. Linux uses an LRU algorithm to manage memory. Suppose there is another page replacement algorithm called not frequently used (NFU) that gives each page its own counter that is incremented with each clock cycle. In this way, each counter tracks the frequency of page use, and the page with the lowest counter is swapped out when paging is necessary. In your opinion, how do these two algorithms (LRU and NFU) compare? Explain which one would work best under normal use, and define how you perceive "normal use."

8. Compare and contrast Android and the Linux operating systems.

9. Compare and contrast the Android and Windows operating systems.

10. The role of the Linux kernel is crucial to the Android operating system. Explain in your own words why this is so.

Reference no: EM13761663

Questions Cloud

Explain the nature and functions of auditing : Write a 700- to 1,050-word paper in which you explain the nature and functions of auditing. Relate your explanation to the audit functions in your organization, or an organization with which you are familiar. In your paper, be sure to address the ..
How can an early childhood care professional facilitate play : How can an Early Childhood Care Professional facilitate play for a child with special needs using assistive technology? What are some limitations that this child may have? Give specific examples.
Discuss three aspects of an affirmative action program : Discuss three aspects of an Affirmative Action Program. Define the concept of an expatriate and identify three ways companies can prepare expatriates to deal with a new business culture.
Compare and contrast auditing-attestation : Write a 1,050- to 1,400-word paper in which you compare and contrast auditing, attestation, and assurance services. In your paper, be sure to include the following:
Compare android and the linux operating systems : Compare and contrast Android and the Linux operating systems. Compare and contrast the Android and Windows operating systems
Identify strategies for facilitating play for children : Identify strategies for facilitating play for children with special needs. Identify the importance as well as the variety of uses of assistive technology
Multicultural-plural and monolithic organizations : Explain the key differences between multicultural, plural, and monolithic organizations. Discuss the difference between a stereotype, prejudice and discrimination. Next, cite (list) two federal laws that help to alleviate two different forms of emplo..
What is the fasb codification system : Prepare a 350-word paper in which you answer the following questions: What is the FASB Codification System?
Utility auditing program based : Design, implement, test, and debug a Visual Basic® program to create an enhanced home utility auditing program

Reviews

Write a Review

Operating System Questions & Answers

  Mobile email and text messaging in the work place

What is a firm's fully qualified domain name and what is the significance of the. Discuss the benefits and drawbacks of mobile email and text messaging in the work place.

  How smart phones used in running a business

Can you run your company out of your pocket? Discuss how smart phones, tablets, and other mobile devices can be used in running a business. Consider all types of devices such as Android, Blackberry, iPhone, iPad and Windows Phone 7.

  Six of the best practices should be general practices

The management team for MWS has asked for a simple but thorough checklist describing best practices for securing the operating systems used in the company. Six of the best practices should be general practices

  Fragmented mean in reference to hard drives

What does fragmented mean in reference to hard drives, and what, if anything, should be done to prevent it. Describe the general path data takes in an application from user input to the computer hardware.

  Perform necessary error checking to ensure that a positive

Write a C program using the fork() system call that generates this sequence in the child process. The starting number will be provided from the command line. For example

  Set of three uml class relationship diagrams

Prepare a set of three UML class relationship diagrams highlighting important relations among the discovered classes. Each diagram should give a coherent picture of relations among 3-5 classes.

  Advantages of using smart cards for identification

Describe the advantages of using smart cards for identification and provide at least three examples.

  Explain the difference between a cpu-bound process

Explain the difference between a CPU-bound process and an I/O bound process in terms of the length of CPU burst and the length of I/O burst. Why is it important for the operating system to select a good mix of I/O bound and CPU bound processes?

  Discuss five computer forensics tools

Use Library and internet resources to analyze five computer forensics tools. For each tool, list the vendor and its functions.

  G a proces switch, the operating system executes instruction

During a process switch, the operating system executes instructions that choose the next process to execute. These instructions are typically at a fixed location in memory. Why?

  Design a memory management scheme

Design a memory management scheme for a 64 bit architecture, using various types of paging and/or segmentation available. Then highlight its advantages and disadvantages. Your scheme must be different from your colleagues' schemes.

  Page table entries are needed for two-level paging

Assume that word 0 is part of a hole and that the highest word in memory contains valid tries are needed in the page table if traditional(one-level) paging is used? how many page table entries are needed for two-level paging, with 10 bits in ea..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd