answersLogoWhite

0

📱

Operating Systems

Operating systems, both proprietary and open-source, include those produced by Microsoft, Linux, and Apple Mac

4,423 Questions

Are vampires real in out time?

they are real if you belive but in real life they aren't. but i love vampirea alot if they exsited i would want to be come one

How to Properly Use A Boom Lift?

Boom lifts are helping workers everyday access areas that are high up above certain obstacles. Operating a boom lift is not too hard but it is not too simple either. One has to know the correct steps to take to make sure that they properly work a boom lift to access these areas. Below are the steps that you can use to learn how to operate a boom lift.

1. First and foremost you have to look around the machine to see that you are going to be operating the boom lift on a stable location. You do not want the boom lift to be toppled over. While doing this you can also take a look at the boom lift to see if there are any noticeable anomalies as a precaution.

2. Switch on the boom lift and on the input controls choose either ‘ground’ or ‘base’. This base mounted control is what you are going to be using. You can then switch from either ground or base to ‘platform’.

3. Make sure that you buckle up for safety.

4. Move over to the operation functions. On the operation function, change the setting to ‘drive’. This will enable you to move the boom lift forward or backwards in reverse. You can turn the wheels to point in the direction that you want to go.

5. Carefully drive the boom lift as close as possible to the area that you are going to be working from. The further you are the harder it is going to be for you to access what you want.

6. Once close to the work area, you can now raise the boom arm that is connected to the basket you are sitting or standing in. The second boom arm can then also be extended for some additional height.

7. When the second boom arm has been extended to maximum, you can then raise the articulated boom. This order of raising the booms is important to be done in exactly this manner so as to maintain the stability of the boom lift. You can then adjust the angles and or the height of each boom arm appropriately to reach your work area.

What is the best operating system for PCs?

The best operating system for PCs all depend on what the PC is mainly used for, such as working, gaming, writing, etc. Each purpose has a different answer.

Why dinosaur on cover of os book by galvin?

operating system is the program from which the coputer has evolved in the same way as the humans have evolved from the dinosaurs.

What is the single processor system in the operating system?

The system that execute the one process at the time and the next job when process is completed it is called the single process system

What are different security mechanism in network security?

The process to implement the security properties is known as security mechanism. The various type of mechanism on the basis of properties is as follows:


  • Attack Prevention
  • Attack Avoidance
  • Attack Detection

Attack Prevention: can be defined as a series of security mechanism implemented to prevent or defend against various types of attack before they can actually reach and affect the target systems. An important mechanism is access control which is defined as the process of limiting the access to the resources of the Information System. Access can be implemented at different levels such as the operating system the network and the application layer.

A firewall is also an important access control system that is implemented at the network layer the concept behind firewall is to separate the trusted network from the entrusted network known as internet. The firewall prevents the attack from the outside world against the machines inside the internal network by preventing connection s attempts from the unauthorized entities located outside.

Attack Avoidance: The expansion of connectivity of computers makes the need of protecting the message and message from tampering reading important. This is the technique in which the information is modified in a way that makes is unusable for the attacker. This is performed under the assumption that the attacker may have access to the subject system/information. The sender preprocess the information before it is send through the unsecured system and the same is again post processed on the receiver end systems. This encryption and decryption is perfumed by cryptography mechanism, they are further divided in the following forms:


  • Secret Key Cryptography
  • Public Key Cryptography
  • Hash Functions

Attack Detection: In this mechanism it is assumed that the attacker is able to bypass the installed security measures to access the desired target/information. When such incidents happens attack detection takes the responsibility to report someone that something went wrong somewhere in the system.

Attack detection is not an applicable mechanism instead of that it's a check/measure which will make sure that if anything happened badly in the system then someone should be notified for the same.

What is ReactOS?

ReactOS is a free and open source implementation of the Windows NT/2000/XP/Vista/7 kernel and userland. It is currently in an alpha state but new features and better compatibility are added with each release.

What generation computers were the first to use operating systems containing instructions that any software could use?

I'm not sure what you are asking. Third generation computers were the first to have fully functional OSs supplied by the manufacturer. They were also the first to come with supervisor/user modes where some instructions could only be executed by the OS in Supervisor mode, user programs would error out if they executed such instructions directly. This protected the OS and I/O devices from defective user code. To perform any I/O or interact with other programs the user programs had to call OS service routines to coordinate the actions and execute the required Supervisor only instructions.

Why are Macs expensive, yet have poor gaming performance?

They are expensive because of the quality of the product and they aren't meant for gaming. Also they are made by Apple which is usually pretty

Which operating system is easiest to learn?

While everyone will have their own personal preferences, it's hard to imagine any operating system being easier or more intuitive than Apple's OSX series. Right now the latest is Leopard, which is OS 10.5.

What is the difference between distributed operating system and network operating systems?

The network managers are responsible for all the customers, including other networks that they buy and sell electricity to and from. Typically the distributed operating system mostly worries about the local electricity needs, however incompetent behavior is often penalized such as shut down without warning of the distributed system, non-sinusoidal waveform, poor power factor, poor phase matching, over loading interconnecting power lines and high or low voltage operation = the voltage needs to be matched plus or minus about one volt. Neil

Or alternatively, if you meant the two kinds of computer operating systems:

A network OS will share filesystems over several machines, and each computer system schedules their own processes individually. (Windows, OS X)

A distributed OS will also share the scheduling of processes as a collective group for the networked machines. A program running on one system may have subprocesses running on other systems in the network, all cooperating and running as if on the same computer. (maybe GNU Hurd)

What about multiprogramming?

Multiprogramming is a rudimentary form of parallel processing in which several programs are run at the same time on a uniprocessor. Since there is only one processor, there can be no true simultaneous execution of different programs. Instead, the operating system executes part of one program, then part of another, and so on. To the user it appears that all programs are executing at the same time. If the machine has the capability of causing an interrupt after a specified time interval, then the operating system will execute each program for a given length of time, regain control, and then execute another program for a given length of time, and so on. In the absence of this mechanism, the operating system has no choice but to begin to execute a program with the expectation, but not the certainty, that the program will eventually return control to the operating system. If the machine has the capability of protecting memory, then a bug in one program is less likely to interfere with the execution of other programs. In a system without memory protection, one program can change the contents of storage assigned to other programs or even the storage assigned to the operating system. The resulting system crashes are not only disruptive, they may be very difficult to debug since it may not be obvious which of several programs is at fault.

The term includes the operating system and programs?

The term____includes the operating system and programs.

What kind of operating system available on a Ipad?

IOS 4.2.1

Available for update March 11 2011: IOS 4.3

Is a word processor a type of operating system?

No. Word processors are considered application software.

What are types of array operation?

Here are some:

Create an array

Destroy it

Access an element of it

What is the main characteristics of a application software?

The main characteristics of application software is that it is used to solve user-specific problems and that it generally can not be used to perform other tasks apart from the one it was intended for. The other category of software is system software.

Would it be possible for the user to develop a new command interpreter using the system call interface provided by the operating system?

It reads commands from the user or from a file of commands and executes them, usually by turning them into one or more system calls. It is usually not part of the kernel since the command interpreter is subject to changes. An user should be able to develop a new command interpreter using the system-call interface provided by the operating system. The command interpreter allows an user to create and manage processes and also determine ways by which they communicate (such as through pipes and files). As all of this functionality could be accessed by an user-level program using the system calls, so it should be possible for the user to develop a new command-line interpreter.

What part of a computer coordinates all communication between other computers?

The networking card coordinates the communication between computers. This system responds to requests in order to establish a network. Routers are computers with the dedicated purpose of coordinating communication between the computers on a network and between computers on the local network and larger networks - including the Internet. They are a key element within networks.