• Distributed systems
  • Data security
  • User Interface
  • Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line




    Download 6,34 Mb.
    Pdf ko'rish
    bet13/203
    Sana10.01.2024
    Hajmi6,34 Mb.
    #134102
    1   ...   9   10   11   12   13   14   15   16   ...   203
    Bog'liq
    Linux This Book Includes 4 Manuscripts The Underground Bible
    10 тема вроде. Про Зинченко и тд, Bozor Iqtisodiyoti, Mysteries of the universe, 1. Korrelyatsionva regression tahlilning umumiy tushunchasi. Reg-fayllar.org, 2-mavzu. Excel va spss kompyuter dasturlarida ma’lumotlarni tash-fayllar.org
    Network Support
    Network systems
    Modern operating systems are adapted to work on the network, they are
    called network operating systems . Networking support enables the OS to:

    To make local resources (disk space, printers, etc.) publicly
    available over the network, ie to function as a server

    Refer to other computer resources through a network that is
    functioning as a client
    Implementing the functionality of server and client based on vehicles 
    responsible for the transmission of data between computers according to the
    rules specified network protocols.


    Distributed systems
    Network OSes do not hide the presence of a network from the user. The
    network support in them does not determine the structure of the system and
    enriches it with additional capabilities. There are also distributed  OSs that
    allow pooling the resources of several computers in a distributed system.  It
    appears to the user as one computer with multiple processors working in
    parallel. Distributed and multiprocessor systems are two major categories of
    OS that use multiple processors.
    Data security
    Data security in the OS means ensuring the reliability of the system (data
    protection against loss in case of failure) and protection of data against
    unauthorized access (accidental or intentional). To protect against
    unwarranted access, the OS should ensure the availability of authentication 
    of users (such means allow to determine whether the users are actually who
    they say they are. This is usually used for system passwords) and
    their authorization  (to verify user rights which have been authenticated to
    perform a specific operation).
    User Interface
    There are two types of user interaction means running: shell  ( shell ) and a
    graphical user interface  ( GUI ). The command interpreter enables users to
    interact with the OS using a special command language (online or through
    startup) to execute batch files. Commands of this language force the OS to
    perform certain actions (for example, run applications, work with files).
    The graphical user interface allows it to interact with the OS by opening
    windows and executing commands with menus or buttons. There are many
    approaches to implementing a GUI: for example, in Windows systems, its
    support systems are built into the system, and in UNIX, they are external to
    the system and rely on standard I / O controls.


    Conclusions
    ❖ 
    An operating system is a level of software that lies between the
    levels of applications and computer hardware. Its main purpose - to
    make use of computer systems easier and improve efficiency

    The main functional components of the OS include process
    management, memory management, I / O management, file
    management and file system support, network support, data
    protection, user interface implementation



    Download 6,34 Mb.
    1   ...   9   10   11   12   13   14   15   16   ...   203




    Download 6,34 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line

    Download 6,34 Mb.
    Pdf ko'rish