Development of UNIX , Basic Computer Science

Assignment Help:

Development of UNIX:

The original UNIX development was performed on a Digital PDP-7 minicomputer and later moved to a PDP-11 minicomputer, the forerunner of the VAX computer. Originally, the system was written in assembly language, but at the later stage the operating system was largely rewritten in C.  

UNIX introduced many important OS concepts which have become a trend in OS design today, including the hierarchical file system, the shell concept, redirection, piping, and the use of simple commands that can be combined to perform powerful operations.

The authors Ken Thompson and Denis Ritchie of the OS also developed techniques for interprocess communication, and even provided for networked and distributed processing. UNIX earned a reputation for power and flexibility. Because it was written in C, it was also easy to port  it that is to make it run on other computers.

As a result of these  factors, UNIX became an important operating system for universities and was ultimately adopted, in many versions. 

Another important innovation, some would say the most important development in making the computer accessible to nontechnical users, was the development of the concept of graphical user interfaces.     


Related Discussions:- Development of UNIX

Base, 123 is not valid in which base value

123 is not valid in which base value

System administration and linux/unix, Write a system using script written i...

Write a system using script written in asuitable scripting language to automate taking a basic linux server instance and provisioning it with particular applications based on its I

DBMS, what is the meaning of data definition

what is the meaning of data definition

Web Design Project, Hello - What is the turn around time for a 6 page websi...

Hello - What is the turn around time for a 6 page website.

What is vpn? explain the vpn protocols, Question 1 What is IT auditing? Di...

Question 1 What is IT auditing? Discuss the three phases involved in the IT auditing Question 2 List and explain the two types of load balancing methods Question 3

Explain web cache, To satisfy client needs through proxy server and not thr...

To satisfy client needs through proxy server and not through main server, as some other user have already accessed that file and its copied to the proxy server, so next time a user

Cryptography, Assume |s1|=|s2|=n and consider the functions defined, for an...

Assume |s1|=|s2|=n and consider the functions defined, for any s1 and s2, as: (a) G1(s1,s2)=s1 xor s2, (b) G2(s1,s2)=(s1, s2, s1 xor s2). We have that: A. G1 and G2 are pseudo-ra

Networking, what is computer topology .

what is computer topology .

What is evaluating information system investments, 1. What is Evaluating In...

1. What is Evaluating Information System Investments? 2. Is IS evaluation different to evaluation of other investments? 3. What approaches are used to evaluate IS investments

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd