Primary functions of operating system

Assignment Help Basic Computer Science
Reference no: EM133058740

Section 1

1. Develop your own definition of software being certain to explain the key terms.

2. What are the primary functions of an operating system?

3. Which of the following are operating systems and which are applications: Microsoft Excel, Google Chrome, iTunes, Windows, Android, Angry Birds.

4. What is your favorite software application? What tasks does it help you accomplish?

5. How would you categorize the software that runs on mobile devices? Break down these apps into at least three basic categories and give an example of each.

6. What does an ERP system do?

7. What is open-source software? How does it differ from closed-source software? Give an example of each.

8. What does a software license grant to the purchaser of the software?

9. If you were running a small business with limited funds for information technology, would you consider using cloud computing? Find some web-based resources that support your decision.

10. Review this article (https://www.zdnet.com/article/six-open-source-security-myths-debunked-and-eight-real-challenges-to-consider/) on the security risks of open-source software. Write a short analysis giving your opinion on the different risks discussed.

11. List three examples of programming languages? What features in each language make it useful to developers?

Section 2

Review the strategic integration section. Note what strategic integration is and how it ties to the implementation of technology within an organization.

Review the information technology roles and responsibilities section. Note how IT is divided based on operations and why this is important to understand within an organization.

Reference no: EM133058740

Questions Cloud

Social media platforms such as facebook : Social media platforms such as Facebook, Twitter, and even Tiktok have become very powerful and influential.
Required assistance such as no contact on door delivery : we hope to provide 24/7 virtual video sessions along with required assistance such as no contact on door delivery.
Definitions of structured data and unstructured data : Definitions of structured data and unstructured data. An example of unstructured data as captured within a research database.
Create draft report detailing all information : Research and select firewalls for the Corporation Techs network. Create a draft report detailing all information as supportive documentation.
Primary functions of operating system : What are the primary functions of an operating system? What is open-source software? How does it differ from closed-source software?
User frustration : Describe three reasons users are still frustrated with modern applications. Describe methods for determining if user frustration is caused by poor system design
Direct manipulation : Describe the three principles of direct manipulation and give examples as to how they are used in video game controls.
Database modeling and normalization : Determine the steps in the development of an effective entity relationship model (ERM) diagram.
Operational workflows of system : In the unified modeling language (UML), usecase modeling captures different aspects of the operational workflows of a system.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Risk mitigation strategy planning

How risk mitigation strategy planning can reduce the likelihood and/or impact of risks. The mitigation strategy should explain how each risk will be addressed.

  Compute percentage changes

According to the data below, please show the percentage change: Compute percentage changes.

  Write the claim mathematically

?(a) Write the claim mathematically and identify H0 and Ha. Choose the correct answer below

  Why are competitive advantages temporary

Why are competitive advantages temporary? Define and Porter's Five Forces model and explain each of the forces.

  Pitt fitness database

Assume that you designed the field LengthOfTime in the Classes table in the Pitt Fitness database.

  Modify the test scores program from the above debug

Also print a report of the each student's test grades, average and final grade as a table, and then print the averages of each Test and overall Test Average, as well as highest Test Grade of all Tests and the student with the highest class grade.

  Risk and costs of compromised data integrity breaches

discuss the risk and costs of compromised data integrity breaches. Focus on integrity not confidentiality.

  How to construct a moore fsm

It is straightforward to show that every Moore FSM is a Mealy FSM. Given a Mealy FSM, show how to construct a Moore FSM whose outputs for every input sequence are identical to those of the Mealy FSM.

  Describe approaches to computer security

Describe approaches to computer security including access control, identity verification and authentication in order to minimize the cyber attacks on a system.

  Coordinate the other source files, main calls functions

Copy the directory lab5 from the cis18b directory. This is the directory where you will do your work for Module 5 lab. In this directory are some source files that work together to allow the user to multiply 2 integers (yes, the code is a no-brain..

  Explain how to access rsat

Windows domain controllers are often in remote locations so system administrators often use RSAT to access and manage domains.

  Rolling a six is unfortunate in this game

Neither player wants a 6, yet they cannot avoid it. Figure out how many rolls it takes until a player rolls a 6 with a certain die.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd