Premium Essay

Nt 1110

In: Computers and Technology

Submitted By devildog8154
Words 364
Pages 2
The Purpose and Function of an Operating System
The Operating System is the most important program that runs on any computer. It is the first program to run on your computer when you turn your computer on and use it. Every computer must have an Operating System. The Operating System is the Commander and Chief in any computer. It allows all of your Hardware and Software to communicate with each other properly. The Operating Systems perform basic functions like recognizing inputs from keyboard, mouse, scanners, and card readers. The Operating System sends outputs to monitors, printers, and projectors. The Operating System also controls and manages working storage (SD-RAM, and DDR-RAM) and permanent storage (Hard Drives, DVD-ROM, and BLU-RAY DRIVE). The Operating System also manages every program and file on your computer. It manages memory usage and allocates more memory to programs that need more memory to operate correctly. It also controls your home network and file sharing on your network. It allows you to setup multiple Disk Partitions on your Hard Drive. It allows you to format removable-media disks and hard disk. It allows you to Defrag and set up restore points if you ever install corrupt software.
There are three main Operating Systems that people use they are Windows, Mac OS, and Linux.
Microsoft Windows: Uses icons for programs and files. Internet Explorer is the default web browser. 90% of computers use Windows. Windows has more programs available. Windows is less expensive. Gamers Prefer Windows.
Mac OS: Uses a graphical user interface (GUI). Only 10% of computers use Mac OS. It costs more than windows. Its default web browser is Safari. Mac OS is favored by Multimedia designers, musicians and graphic artists. Can run Windows as an Operating System.
Linux: The preferred Operating System for large corporations to control their network. Linux is a group…...

Similar Documents

Free Essay

Nt 1110 Transfer Time

...Transfer Time 1 Transfer Time and File Size Transfer Time 2 Abstract Calculating Transfer Rate, Transfer Time and File size can be pretty difficult unless one has a basic knowledge of binary numbers and the different types of storage capacities that are out there. In order to figure out how fast a download will take there is some math that needs to be figured out and in this paper I will mention the way to conquer this task. Transfer Time 3 Transfer Time and File Size The very first step to understanding transfer time and file size is to first know that 1 byte is equal to 8 bits as well as what each component is exactly. A bit is defined as:” a single basic unit of information, used in connection with computers and electronic communication”. (Quote, n.d.) A byte is “pronounced ‘bite’, is the next size up basic unit of measurement for information storage, usually consisting of 8 bits”. (Quote, n.d.) The next set of terms that are used is: Kilo (kilobytes) equal to 1,000 bits stated in decimal form or 1,024 bytes stated in binary form. Then we have Mega (megabytes) equal to 1,000,000 decimal bits or 1,048,576 binary bits. Next is one of the bigger bytes and that is Giga (gigabytes) which is equal to 1,000,000,000 decimal bits or 1,073,741,824 binary bits. After figuring out the numbers to these complex bits of information, the next step is to understand the speed of transferring data. This is simply downloading......

Words: 1000 - Pages: 4

Premium Essay

Nt 2640

...Arthur Raynes Boakai NT 2640 IP Addresses Classes and Special-Use IP Address space September 26, 2013 IP Address Class: Class A: class A addresses are assigned to networks with a very large number of hosts. The high-order bit in a class A address is always set to zero. Class A permit up to 126 networks by using the first octet of the address for the network identification. Class B: class B address is designated for mid-sized corporations and ISPs. They allow 16, 384 networks by using the first two octets of the address for network identification. The first two bits of the first octet are fixed to 1.0. Class C: is designated for small offices and home offices. They allow for approximately 2 million networks by using the first three octets of the address for network identification. The three bits are fixed to 1 1 0. Class D: were reserved for multicasting purposes. The addresses begin with an octet in the 224-239 range. RFC 1918 IP addresses are used for private networks without concern for potential addressing conflicts with other networks. It has specify ranges of IP address that can never be routable on the global internet. RFC 1918 IP address ranges: 10.0.0.0 - 10.255.255.255 172.16.0.0 - 172.31.255.255 192.168.0.0 - 192.168.255.255 Special-Use IP......

Words: 292 - Pages: 2

Free Essay

Nt 1210

...NT-1210 Unit Name Lab l Labs Date 1-l Reading Binary Convert the following decimal numbers to binary equivalents: 89 1011001 776 10110000 Convert the following Binary values to their decimal equivalent: 101_0100L 169 11101010 234 Lab 1-2 Binary Math and Logic Draw the graphical symbol Explain the logical operations (give a truth table) for each: AND OR NOT Lab 1.3 Bit and Byte Structure - (see page 15 of lab manual) How many bits are in a byte? 8 1 Kilobyte is equal to: 1024 55,296 23,552 bytes Kilobytes Megabytes Terabytes 54 Megabyte is equalto: 23 Gigabyte is equalto: 5 Terabyte is equal to 5,120 120MB = 16GB= 125,829,120 16,384 bytes MBytes Lab 1.4 ASCII (See page 20 of Lab manual) 1. Decode the simple numerical sentences into one English paragraph. You may use Google to find an ASCII table. Use the keywords-Binary to text conversion; Hexadecimatto text conversion; ASGllto text conversion-to aid the decoding process: Code"Tvoe ASC llcodes Numeric Message 87 101 1 08 1 08 44 32 116 104 97 116 32 109 97 107 101 115 32 111 117 114 32 49 48 32 110 117 109 98 101 114 32 100 101 99 105 109 97'108 3247 3297 115 99 105 10532115121115116 101 '10932 106 117 11511632114105103104 11633148 Translation Well, that makes our 10 number decimal / ASCII system just right! Lab 1.5 Creating a File System Follow the procedures outlined in the Lab Manual on pages 231o27......

Words: 918 - Pages: 4

Premium Essay

Nt 1110 Assignment 1.1 History Timeline of the Computer

...Assignment 1.1 History timeline of the computer • 1939 Hewlett-Packard is founded. David Packard and Bill Hewlett found Hewlett-Packard in a Palo Alto, California. Their first product was the HP 200A Audio Oscillator, which rapidly becomes a popular piece of test equipment for engineers. • 1940 The Complex Number Calculator (CNC) is completed. George Stibitz demonstrated the CNC at an American Mathematical Society conference at Dartmouth College. Stibitz performed calculations remotely on the CNC using a Teletype connected via special telephone lines. This is the first demonstration of remote access computing. • 1941 Konrad Zuse finishes the Z3 computer. Using 2,300 relays, the Z3 used floating point binary arithmetic and had a 22-bit word length. • 1942 The Atanasoff-Berry Computer (ABC) is completed. The ABC was designed and built by Professor John Vincent Atanasoff and graduate student Cliff Berry between 1939 and 1942. • 1944 Harvard Mark-1 is completed. Created by Howard Aiken, and designed and built by IBM, the Harvard Mark-1 was a room-sized relay-based calculator. This machine had a fifty-foot long camshaft that synchronized the machine’s thousands of component parts. • 1946 The first glimpse of the ENIAC, a machine built by John Mauchly and J. Presper Eckert that improved by 1,000 times on the speed of its contemporaries. • 1949 Maurice Wilkes assembled the EDSAC, the first practical stored-program computer, at Cambridge University. For programming the EDSAC...

Words: 461 - Pages: 2

Premium Essay

Nt-1110 Unit 6 Research Paper

...Matt Bristow NT-1110 Unit 6 Research Paper NAS Devices NAS is an acronym for Network-Attached Storage. It is basically a file-level computer built for data storage connected to a computer network providing data access to any computer connected to that network. The speed for any particular NAS device varies from 1 gigabit all the way up to 10 gigabits depending on what upgrades a pc has such as an upgraded network cards. The capacity range for NAS devices also depend solely on the budget set forth. It can be a low range system with 500 gigabytes, all the way up to a wallet-busting 16 terabytes. The fault tolerances when set at RAID 10 are the most stable since more devices can fail while protecting against any potential data loss. The advantages of an NAS device are that since it is a dedicated file storage device, accessing said data is a lot faster than typical in-pc hard drives. Another advantage would be the amount of storage you're capable of having. It far outpaces pc's in storage capabilities because all it is built for is storage. For a family with a lot of pictures or videos, the advantages are that any computer connected to the NAS device can access them. It's a library for any media/documents/or anything else you can think of that can be accessed at any time by any pc connected to it. They might be pricey for a casual pc user but when dealing with multiple pc's connected to a single network, an NAS device would be the perfect option when space becomes an issue...

Words: 274 - Pages: 2

Premium Essay

Nt 1110 Unit 9 Video Summary 7

...Security Introduction Security introduction is what the first video is about; it tells us what topics the next seven videos will cover. * Local Security Policy * Physical Security * Firewall * Wireless Security * Authentication * Encryption * Viruses Physical Security & Authentication In this video we learn about how to secure your computer and servers theft or tampering. You would do this by locking and controlling access to servers and locking computer cases as well. To protect them even further you should put server locations in high traffic areas, and create administrative alerts with audible alarms. You should also store backup in a separate and secure location, and lock user operating systems. Always physically destroy hard drives. This video also teaches us about CMOS password and how to set them up. We can create limits to the access through CMOS with full, limited, view only, and no access. We also learn about password protecting the hard drive. * Physical Security * Authentication * CMOS Password * Kerberos-Method used to encrypt passwords What I learned from this video is that companies go through great lengths to protect their computers and servers from intrusion. This video was basic and straight forward and not confusing at all, if anything its confusing that we should have to do so much to secure our files. I guess this information would best be used if you working for......

Words: 613 - Pages: 3

Premium Essay

Nt 1110 Unit 9 Video Summary 7

...Security Introduction Security introduction is what the first video is about; it tells us what topics the next seven videos will cover. * Local Security Policy * Physical Security * Firewall * Wireless Security * Authentication * Encryption * Viruses Physical Security & Authentication In this video we learn about how to secure your computer and servers theft or tampering. You would do this by locking and controlling access to servers and locking computer cases as well. To protect them even further you should put server locations in high traffic areas, and create administrative alerts with audible alarms. You should also store backup in a separate and secure location, and lock user operating systems. Always physically destroy hard drives. This video also teaches us about CMOS password and how to set them up. We can create limits to the access through CMOS with full, limited, view only, and no access. We also learn about password protecting the hard drive. * Physical Security * Authentication * CMOS Password * Kerberos-Method used to encrypt passwords What I learned from this video is that companies go through great lengths to protect their computers and servers from intrusion. This video was basic and straight forward and not confusing at all, if anything its confusing that we should have to do so much to secure our files. I guess this information would best be used if you working for......

Words: 613 - Pages: 3

Free Essay

Nt 1110 Unit 3 Assignment 1

...Unit 3 Assignment 1 Video Clip 1.07 Serial Parallel & Game Ports * Serial ports – 9 or 25 pins (male) * Parallel ports – 25 pins (female) * Game ports – 15 pins (female) Mouse – serial connector (old), PS/2, or USB/wireless Keyboard – 5-pin DIN (old), PS/2 or USB/wireless Network Inteface card – converts parallel communication to serial (RJ-45 connector) Modem – connects to phone line (56k), converts analog to digital & vice versa (RJ-11 connector). Video – VGA, DVI, or S-video SCSI – narrow (50-pin Type A), wide (68-pin, type P) IEEE 1394 (firewire) – serial, fast, hot swappable, used for streaming media, expected to replace SCSI Multimedia – Microphone, speakers, earphones, color coded. Video 1.09 CRT Monitor (old) & LCD Monitor (new) CRT – Cathode Ray Tube LCD – Liquid Crystal Display Contrast Ratio – Ratio of purest white to purest black Dot pitch – CRT – Distance between phosphorescent dots Pixel Pitch – LCD – Addressable pixels on screen, same as resolution. Resolution – Both CRT & LCD – Addressable points on screen. PCI Express – twice as fast as AGP Video 1.10 RAID – Redundant Array of Independent Disks Fault tolerance – real time copies of data, and data is not lost if hard drive fails. RAID – protect data in real time. RAID 0 – Striped Volume – faster speeds, no fault tolerance. Requires two or more drives, max 32 drives, CPU writes data evenly among drives, each disk has partial copy. RAID 1 – Mirrored......

Words: 487 - Pages: 2

Premium Essay

Nt 1110 Unit 4 Research Paper

...A port expander is a hardware device that can allow multiple devices to be attached to one port on a computer via either internal or external. An internal port expander is one that is already inside of a computer or one that you can physically put inside the computer yourself, also can be located on the mother board of the CPU. An external expander is one that you can buy and just attach to the outside of the computer in an I/O port to allow the use of multiple devices as well. The advantages of this hardware is that one can use multiple devices through just one port just like one could use a multi plug extension cable to attach many different items. The disadvantage is the running speed isn’t changed at all and depending on the amount of items you have connected can run the speed down on such an expander, another disadvantage could also be the price while some expanders are quite cheap others can be very costly as well. Port expanders can be often generic, however, there are few that are computer specific the reasoning behind this is that with computer specific expanders one would have to know the type of motherboard inside the computer that would be having the expander put inside, external expanders would be the ones that are generic because they can run through ports already in the computer such as the I/O port. Different types of ports available in expander hardware are the addition of Ethernet cable ports, also ports for additional mice if needed, there is also...

Words: 373 - Pages: 2

Premium Essay

Nt 2640

...Stacie Rollins Thursday, January 8, 2015 NT 2640 Unit 1 Assignment 1 Network IDs used to be divided into classes, which were Class A, B, and C. These classes were allowed to have a range of addresses. This class-based system would work well for a while, but the rapid growth of the Internet it becomes evident that this addressing scheme had to be changed in order to support the many networks that were being created. A class full system would be created and still used the IP addressing fundament of a classless system. This 32-bit IP addressing system is subdivided into two portions; the network address space are the host address space. Class A addresses were created for a very large network with few logical network segments and many hosts that have the high-order bit set to zero. The first octet is used to define the network ID. Class A address cannot be greater than 127 because a value of 128 would require the left-most bit be set to 1. Class B addresses always have the first two high-order bits that are set to 10 and are used for medium-sized networks that have a moderate number of hosts connected to them. The Class B network ID, will utilize the first two octets for the network ID, which allows more network IDs and fewer hosts than a Class A network, because it uses an additional octet for the network. Class C addresses are for small networks with few hosts. These addresses have the first three high-order bits set to 110, because Class C addresses use the first......

Words: 294 - Pages: 2

Premium Essay

Nt 1110 Short Answer

...* NT1110 Computer Structure and Logic * Short Answer 1.1 * Describe the purpose and function of an operating system. Explain at least five differences among Windows, Linux, and Mac OS X operating systems. * An operating system is the basic platform for any computer. This platform is designed act as a translator to peripheral devices perform basic tasking from Input/output devices and maintaining files and directories on the hard drive. In a larger system, the O/S acts as a traffic manager to ensure there are no jams or interferences between programs and users. The O/S also maintains security to prevent access from unauthorized users. * Operating systems provide a software platform to run other programs, or applications. These applications are specific to particular operating systems. There are three main operating system that are used today. They are Windows, MAC O/S x, and Linux. Each operating system uses commands that the user would use to interact with the system. These commands perform simple functions such as copy, rename, delete etc... The user would use a keyboard to enter these commands on the command prompt. Graphical user interfaces (GUI) (Windows and Mac) uses a mouse or pointer to click on objects on the screen. * Windows is an Operating system that allows people to manage files and run software programs on desktop and laptop computers. It also uses a GUI, icons and start menu are the primary ways people use to navigate windows. Windows......

Words: 372 - Pages: 2

Premium Essay

Nt 1110 Lab 1

...The operating system that I am using is windows 7. The service pack in my windows 7 is service pack 1. Windows 7 has many features that make it well windows 7. The first one is Windows Aero, which they tweaked just a little bit from Windows vista to windows 7. The second feature is the gadgets. Unlike windows vista, in windows 7 they do away with the sidebar and just have free floating gadgets on the side of the desktop. The third feature is the modified start menu, which was not changed much from windows vista. The fourth feature is the taskbar, which has been there for quite some time through the years. The final feature is windows explorer, which has added libraries to it. The first feature that has changed a little is windows aero. They didn’t change windows aero much but making some minor changes to the color scheme and graphics. Finally it is much smoother than what is was in windows vista. The second feature that has changed is the gadgets. They tweaked how some of the gadgets looked. Finally they also took away the side bar and made the gadgets free floating, which this makes them look more appealing to the eyes. The third feature that has changed a little is the start menu. They haven’t done much to the start menu over the years. It still helps you navigate through your programs and certain folders and features. You can do all of this without having to dive to deep into your computer. They didn’t change much of the start menu from vista to 7 other than adding......

Words: 622 - Pages: 3

Free Essay

Nt 1110 Chapter 4 Review

...1. The system bus and I/O bus carry four different types of signals throughout the computer. Which of the following are the signals? (Choose all that apply.) A, B, C & E – The four different types of signals carried out by the system bus and I/O bus are data, power, control and address. 2. Which of the following are considered expansion slots? (Choose all that apply.) A & C – Expansion slots are PCI and AGP. 3. Which of the following can you use with SCSI (Small Computer Systems Interface)? (Choose all that apply.) A, B, C & D – You can use hard drives, scanners, laser printers and dvd-roms with small computer interfaces. 4. Which of the following are in the ATX family of motherboards? (Choose all that apply.) A, B & C – ATX, mini-ATX and FlexATX are all part of the ATX motherboard family. 5. Which of the following are considered integrated I/O ports? G – Serial ports, parallel ports, USB ports, PS/2 mouse and keyboard, audio ports and Ethernet ports are all types of I/O ports. 6. To connect speakers to the sound card, which of the following must you use? D – You must use a 1/8inch mini-jack cable to connect speakers to a sound card. 7. How many pins are DDR SDRAM two-section memory slots designed for? B – DDR SDRAM two-section memory slots are designed for 184 pins. 8. Which or the following is a common speed for PCI? A – 33MHz is a common speed for PCI. 9. Which of the following expansion bus technologies would be described as x16 (spoken as “by......

Words: 492 - Pages: 2

Premium Essay

Nt 1110

...Nt1110 Lab 10 Research Project E-Commerce Security E-Commerce (Electronic commerce or EC) is the buying and selling of goods and services ort he the transmitting of funds or data, over an electronic network , primarily the internet. These business transactions occur either business to business ,business to consumer ,consumer to consumer or consumer to business. The terms e-commerce and e-business are often used interchangeably. The term e- tail is also sometimes used in reference to transactional processes around online retail. E-commerce is conducted using a variety of applications, such as email, fax, online catalogs and shopping carts , Electronic Data Interchange (EDI),File Transfer Protocol, and Web services. Security is an essential part of any transaction that take place over the internet .Customer will loose his/her faith in E-commerce if its security is compromised. Following are the essentials requirements for safe e-payments/transactions. Confidential-Information should not be accessible to unauthorized person. It should not be intercepted during transmission. Integrity-Information should not be altered during its transmission over the network. Availability-Information should be available wherever and whenever requirement within time limit specified. Authenticity-There should be mechanism to authenticate user before giving him/her access to require information. Non-Repudiability-It is protection against denial of order denial of payment. Once a......

Words: 813 - Pages: 4

Premium Essay

Nt 1110 Unit 10 Analysis: Repair Shop

...Unit 10 Analysis: Repair Shop The pros are: • The users personal files will be saved • The user will have a fresh start and a chance to take preventative measures to avoid future problems • All of the users data will be backed up The cons are: • The user may have to pay to reinstall certain programs • The user will have to reinstall old programs The user with the new computer will not likely be affected as much as the user who has ran their computer for several years. The new user will not have accumulated many personal files or documents and most of the data will consist of factory programs and settings. Recent cache memory should be the only noticeable effect. The user with several years of use of his computer would be ore affected as over the years, he/she may have accumulated many personal files, documents and applications. Of course all of his personal data should be backed up by the computer shop and placed on a CD for later installation, however many programs and applications will be affected. Any changes or personalization’s made to the programs and applications will be lost as they will have to be reinstalled as new applications. The user may also have to pay for some of the applications again. The user who mostly browses the internet and uses email will more than likely only have accumulated cache memory as opposed to the business professional who may have stored important documents and programs on his computer. The email will not be affected......

Words: 322 - Pages: 2

The Cook, the season 06 episode 06 | Watch Movie | Ch.451 : I’d Let This Slide