Identify an operating system that runs a cell phone

Assignment Help Operating System
Reference no: EM131781096

Fundamentals of Operating Systems and Java Programming Assignment: Role of OS Operating System and CLI

Purpose of the assessment (with ULO Mapping) - This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them.

a. Describe the role of Operating Systems (OS) and its different subsystems in controlling computer hardware

b. Demonstrate competency in the use of a command line interface to operate and perform simple OS administration

Assignment Specifications -

Section 1:  Operating Systems

I. An operating system consists of four essential subsystem managers such as Memory Manager, Processor Manager, Device Manager and File Manager. When a user executes a command explain with a flow chart how these managers cooperate with each other to get a job done.    

II. Research the Internet or current literature to identify an operating system that runs a cell phone or handheld computer. (These are generally known as mobile operating systems.) List the key features of the operating system and the hardware it is designed to run. Cite your sources.         

III. Name the five key concepts about an operating system that you think a novice user needs to know and understand.

IV. Give an example of an organization that might find batch-mode processing useful and explain why?

V. How does timesharing extend multiprogramming to provide for interactive computing by several users?

VI. To what extent are the two OS's (Linux/Unix and Windows), are essentially the same and importantly different?

Section 2: OS Administration using Command Line Interface

I. Directory Navigation

i. Determine your current working directory

ii. List the contents of the current directory in long format.

iii. Create a directory called learning.

iv. Change the current working directory to the new learning directory.

v. List the files in 'learning' in long format.

vi. Change the working directory back to your home directory.

vii. Remove the directory learning.

II. Changing File Permissions

i. Display the current file permissions on a file.

ii. Restrict access to a file by removing read permissions for group and other.

iii. Display the new files permissions on that file and observe the changes.

III. Viewing Files

i. List your files.

ii. View the file history using either less or more.

IV. Manipulating Files

i. List the files in your home directory. Note that the file 'old' is one of the files in your home directory. If not create a file with name 'old'.

ii. Copy old to a file called new. List your files to confirm that you have both old and new.

iii. Rename the file old to ancient. List your files to confirm that ancient and new exist.

iv. Remove the file ancient and then list your files to ensure it has been removed.

v. Create a directory called myfolder. List your files to ensure that myfolder was created.

vi. Set your current working directory to myfolder. Do not, however, type in the entire name of the directory. Instead type the first two letters and use Tab completion to fill in the rest of the file name.

vii. Copy the file new from your home directory to myfolder.

viii. Using a wildcard, list all of the files that begin with the letter n.

ix. Return to your home directory.

x. Remove the directory called myfolder and all of its contents. List your files to ensure that it was removed.

V. Try the following command sequence:

i. cd (to any directory you have)

ii. pwd

iii. ls -al

iv. cd .

v. pwd

vi. cd ..

vii. pwd

viii. ls -al

ix. cd ..

x. pwd

xi. ls -al

xii. cd ..

xiii. pwd

xiv. cd /etc

xv. ls -al | more

xvi. cat passwd

xvii. cd -

xviii. pwd

VII. Experiment with the options on the ls command. What do the d, i, R and F options do?

Need around 600-800 words for Section 1 and Section 2 Screen Shots.

Reference no: EM131781096

Questions Cloud

Internal stakeholders for wendy''s are investors : Internal stakeholders for "Wendy's" are Investors, and employees. provide examples of communications to at least one of these groups?
What is the meaning of the default intensity parameter : What are the various ways that the default intensity parameter can be modeled in a reduced form model?
Discuss interest payments are made each june : James Corporation is planning to issue $507,000 worth of 6 percent bonds that mature in 5 years. Interest payments are made each June 30 and December 31
Regional retailer is looking for ways to increase profits : A small regional retailer is looking for ways to increase profits.
Identify an operating system that runs a cell phone : MN404 - T3 2017 Fundamentals of Operating Systems and Java Programming Assignment. identify an operating system that runs a cell phone
Identify a problem that rdbms practices : Identify a problem that standard relational database management (RDBMS) practices do not completely address, and to innovate a solution.
What is meant by a top-down approach : "The overall volatility of the product (i.e., standard deviation) and tracking error versus its benchmark and peer group is monitored and projected.
What is the essential ingredient in portfolio strategies : Those portfolio managers who follow an indexing strategy are said to be "index huggers." Why?
How would you respond to the portfolio manager : A corporate bond portfolio manager was overhead asking: "Why do I need a credit risk model? I can get information about the probability of default from credit.

Reviews

len1781096

12/25/2017 11:47:23 PM

Submit a word document that contains the screen shots of the answers to all the questions in section 2 (Unix exercises) along with the answers for questions in section 1. All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

len1781096

12/25/2017 11:47:16 PM

If an extension of time to submit work is required, a Special Consideration Application must be submitted directly through AMS. You must submit this application within three working days of the assessment due date. Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree.

len1781096

12/25/2017 11:47:07 PM

Academic Integrity: For assignments, students are encouraged to consult each other, the lecturer, tutor or anyone else for that matter. However, the assistance offered or accepted should not go beyond a discussion of the problem and a sketch of a solution. But in your assignment, do not use any written material from the discussion/website/book. If you can reconstruct the discussion and complete the solution on your own, then you have learned the material (and that is the objective of this course!).

len1781096

12/25/2017 11:46:55 PM

Section 2 - All the commands in this section have to be executed on Ubuntu in the lab - Directory Navigation, Changing File Permissions, Viewing Files, Manipulating Files, Command sequence and Experiment with ls command. Reference style - Follow IEEE reference style (should have both in-text citation and reference list). Concise and specific answers to the questions. Perfect usage of commands for the given tasks. Logic is clear and easy to follow with strong arguments. Clear styles with excellent source of references.

Write a Review

Operating System Questions & Answers

  Explaining first-in-first-out scheduling

Qqueue for service (if the server process is busy servicing another request). Requests in queue are served according to the scheduling policy in use: First-In-First-Out (FIFO) scheduling.

  How many primes are there that are less than 10,000

Write a program that prints out the first n primes, and n is input by the user.

  How can the size of a dbms be one of its disadvantage

What is a DBA? What kinds of things does a DBA do in a database environment?

  How can you use the printf() statement

There are many ways to debug a program, perhaps the most elementary is using a printf() statement to show important pieces of information regarding the program execution point, variable value, and loop and branch operation.

  Discuss the latest vulnerability for an operating system

Using information from the CERT Coordination Center (www.cert.org), identify the latest vulnerability for an operating system of your choice.

  Implement a framework for cpu scheduling

Implement a framework for CPU scheduling with three scheduling algorithms: FIFO, round robin, and shortest job first (SJF). Jobs arrive at the CPU scheduler at arbitrary times.

  Examine two benifts for both hardware and software firewalls

Explain whether a home office that has a firewall should be considered secure. Examine why or why not and provide a rationale for your response.

  Compare windows mac and linux operating systems

Compare Windows, Mac, and Linux operating systems. Explain the difference between closed and open source operating systems.

  Problem on demand-page system

Describe in general how the system is being used and explain the effect on the above measurement (CPU utilization) if the following occurred

  Discuss the purpose of operating systems

Discuss the purpose of operating systems and Describe the components that comprise operating systems and the functions of each of these components

  Network security case study

In this case study, you require to construct a network checklist to establish certain process that enable you and other network security specialists to assess a network from different possible threats and vulnerabilities.

  Advantage of modularizing code

Imagine you are a part of a team that is tasked with writing a mobile application (app) that will allow users to send pictures to their friends. The manager does not want to waste time creating code modules. Describe at least one (1) advantage of ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd