Development of UNIX , Basic Computer Science

Assignment Help:

Development of UNIX:

The original UNIX development was performed on a Digital PDP-7 minicomputer and later moved to a PDP-11 minicomputer, the forerunner of the VAX computer. Originally, the system was written in assembly language, but at the later stage the operating system was largely rewritten in C.  

UNIX introduced many important OS concepts which have become a trend in OS design today, including the hierarchical file system, the shell concept, redirection, piping, and the use of simple commands that can be combined to perform powerful operations.

The authors Ken Thompson and Denis Ritchie of the OS also developed techniques for interprocess communication, and even provided for networked and distributed processing. UNIX earned a reputation for power and flexibility. Because it was written in C, it was also easy to port  it that is to make it run on other computers.

As a result of these  factors, UNIX became an important operating system for universities and was ultimately adopted, in many versions. 

Another important innovation, some would say the most important development in making the computer accessible to nontechnical users, was the development of the concept of graphical user interfaces.     


Related Discussions:- Development of UNIX

Choice of medium - transmission channels, Choice of Medium: All the tr...

Choice of Medium: All the transmission channels discussed in the foregoing paragraphs can be used as point to point connections or as broadcast systems. Transmitting informati

Computer Literacy Assignment Task, Assignment Task: You are required to dev...

Assignment Task: You are required to develop working solutions in Excel that will manage the annual budget, current month’s inventory, and a list of the current month’s transaction

Socket, socket programming

socket programming

How to avoid race conditions with critical section?, • The key to preventi...

• The key to preventing problem involving shared storage is get some way to prohibit more than one process from reading and writing the shared data concurrently. That part of the p

Distinguish between passive and active attacks, QUESTION (a) Distinguis...

QUESTION (a) Distinguish between passive and active attacks. (b) Give two reasons why it is important to organise security awareness programs for users. (c) Explain how s

Telecommunications, Telecommunications: 'Data communications', 'Commun...

Telecommunications: 'Data communications', 'Communications technology', 'Computer telecommunications', Compunications', 'Telecomputing', etc., are just some of the terms we co

Threading Module of python, The latest threading module comprised with Pyth...

The latest threading module comprised with Python 2.4 provides much more powerful, high-level hold for threads than the old thread module. The threading module depictions all the m

Cryptography, Consider the one-time pad encryption scheme to encrypt a 1-bi...

Consider the one-time pad encryption scheme to encrypt a 1-bit message m, and assume m is chosen with uniform distribution from message space M={0,1}. Let E1 be the event "message

Backup software, Backup software: A number of Backup software are avai...

Backup software: A number of Backup software are available that assist you in taking backup of your important data on the computer. Selecting between various back-up software

Networking, what is computer topology .

what is computer topology .

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd