Question

In: Computer Science

please make sure it's in your own words, NOT copied from Google, my professor would know...

please make sure it's in your own words, NOT copied from Google, my professor would know

and it MUST be typesetting

6) List 2 types of utility software and what each one does.
7) Explain what is malicious software and what it does
8) Explain what is antivirus software and what it does
9) Thoroughly explain the unique functions and usage of the following operating systems: (20 points) Do not copy & paste. Explain in your own words.
a. Windows
b. Linux
c. Mac OS
d. iOS
e. Unix
10) List 2 advantages and 2 disadvantages of Open Source software

Solutions

Expert Solution

Answer 6:

These software examine and maintain a computer . These software are centered on how OS works on that basis it carry out task to allow easy functioning of computer . These software program may come along side OS like windows defender, home windows disk clean up tool.

Some of popular software software are described as below:
Antivirus:
It is used to shield a pc from the virus. It detects a virus and notify the user . The virus are stored in distinct vicinity referred to as vault in which it has different file machine due to which virus impact it. User can itself coach antivirus to delete computer virus, put it in vault or even ignore it. These days most come in GUI shape.
Examples: Windows Defender, AVG, AVAST, MCAFEE and many others.

Compression Tool:
These tool are used to reduce the size of a file based on the selected algorithm.Most operating structures include equipment for compressing and uncompressing files. Linux has tools for both .Tar.Gz and .Zip. Other compressed documents, like .7z and .Rar, require a third-party compression utility to be installed
Some Examples are: WinAce, WinZip, WinRAR

Answer 7:

Malware is a software program that receives into the system with out user consent with an goal to steal personal and private information of the user that consists of financial institution information and password. They additionally generates disturbing pop up commercials and makes adjustments in device settings

  1. They get into the system through various manner:
  2. Along with free downloads.
  3. Clicking on suspicious link.
  4. Not putting in an updated version of antivirus in the system .

Answer 8:

Antivirus:
It is used to shield a pc from the virus. It detects a virus and notify the user . The virus are stored in distinct vicinity referred to as vault in which it has different file machine due to which virus impact it. User can itself coach antivirus to delete computer virus, put it in vault or even ignore it. These days most come in GUI shape.
Examples: Windows Defender, AVG, AVAST, MCAFEE and many others.

Answer 9:

the unique functions and usage of the following operating systems:

a. Windows

Windows is a sequence of working structures evolved by means of Microsoft. Each model of Windows consists of a graphical user interface, with a computer that allows user to view documents and folders in windows. For the beyond two many years, Windows has been the maximum extensively used operating machine for personal computer systems PCs.

The particular functions and usage:

  1. Multimedia and gaming
  2. widespread search container
  3. Microsoft's intelligent personal assistant

b. Linux

Linux is one of popular version of UNIX operating System. It is open supply as its supply code is freely to be had. Linux was designed thinking about UNIX compatibility. Its capability listing is pretty similar to that of UNIX

The particular functions and usage:

  1. Portable − Portability way software program can works on extraordinary types of hardware in same manner. Linux kernel and application applications helps their installation on any sort of hardware platform.
  2. Open Source − Linux supply code is freely to be had and it is network based improvement challenge. Multiple teams work in collaboration to decorate the functionality of Linux running gadget and it is continuously evolving.
  3. Shell − Linux gives a special interpreter application which can be used to execute instructions of the running system. It may be used to do diverse varieties of operations, call software applications.

c. Mac OS

Mac OS is the computer operating system for Apple Computer's MacIntosh line of personal computers and workstations.

The particular functions and usage:

  1. A popular feature of its latest version, Mac OS X , is a desktop interface with some 3-D appearance characteristics.
  2. OS X has a modular design intended to make it easier to add new features to the operating system in the future.
  3. It runs UNIX applications as well as older Mac applications.
  4. Mac OS comes with Apple Computer's iMac and Power Macintosh line of computers.

d. iOS

IOS stands for iphone operating system. It is a proprietary mobile running system of apple for its hand held. It supports Objective-C, C, C++, Swift programming language. It is based at the Macintosh OS X. IPhone, ipod and iPad all comes with IOS.


The particular functions and usage:

  1. iCloud
  2. In-App purchase
  3. Game Center
  4. Notification Center

e. Unix

UNIX is an operating system which become first developed within the 1960, and has been underneath steady development .By operating system, we mean the suite of programs which make the computer work. It is a stable, multi-user, multi-tasking system for servers, desktops and laptops.

The particular functions and usage:

  1. UNIX systems also have a graphical consumer interface (GUI) much like Microsoft Windows which offers an smooth to use environment.
  2. However, understanding of UNIX is needed for operations which aren't included by means of a graphical application, or for when there may be no home windows interface available, as an example, in a telnet consultation.

Answer 10:

Benefits of Open Source Software:

  1. Promote Innovation
  2. Brings Reliability
  3. Bugs Removal and Tracking

Disadvantages of OSS

  1. It’s less User – Friendly
  2. Less Personalized Support

Related Solutions

Please make sure it's in your own words NOT copied from Google, my professor would know....
Please make sure it's in your own words NOT copied from Google, my professor would know. and it MUST be typewriting. 1) Explain system software and what it does. 2) List 2 types of system software and what each one does. 3) Explain application software and what it does. 4) List 2 types of application software and what each one does. 5) Explain utility software and what it does.
In your own words and not copied from the web please. Optical fibers are made from...
In your own words and not copied from the web please. Optical fibers are made from glass or plastic and generally have an index of refraction of about 1.45. They are commonly used in telecommunications and computer networks. Identify and describe a specific application for fiber optics? What kind of information can they transmit? What advantages do they have over other materials or technologies? Explain how optical fibers work and the role of total internal reflection of light within.
Solve the below questions using your own words PLEASE!! Make sure to write by your own...
Solve the below questions using your own words PLEASE!! Make sure to write by your own words or paraphrase 1. What is the difference between Windows and Linux server 2. Give some advantages and disadvantages Windows and Linux Operating System
MIS/D3: Please make sure the answer should be in your own words with at least 30...
MIS/D3: Please make sure the answer should be in your own words with at least 30 sentences. 1. What are the business costs or risks of poof data quality? Support your discussion with at least 3 references. 2. What is data mining? Support your discussion with at least 3 references. 3. What is text mining? Support your discussion with at least 3 references.
In your own words, what would you say to the patient? Please be sure you cover...
In your own words, what would you say to the patient? Please be sure you cover everything that was seen in his lungs, heart and adrenal glands. DO NOT use medical terminology. You need to discuss calcifications, adrenal adenomas, the coronary artery, cardiomegaly, lymph nodes, and all of the nodules that were listed (mediastinal, pretracheal, precarinal, subcarinal) and the fact that intravenous contrast is now being recommended. CT OF THE CHEST WITHOUT CONTRAST HISTORY: Shortness of breath. FINDINGS: CT examination...
D5/ISI: Please make sure the answer should be at least 30 sentences with your own words....
D5/ISI: Please make sure the answer should be at least 30 sentences with your own words. Research emerging enterprise network applications and describe 3 that you think are most interesting and briefly explain why you believe this.
Describe, in your own words, when you would use each type of test below. Make sure...
Describe, in your own words, when you would use each type of test below. Make sure to include the type of variables and when you would use that particular test.                                                                                                                                  Pearson Correlation Spearman Correlation Paired T-Test Independent T-Test ANOVA Regression
Please finish this code and make it work. This is my homework and my professor wont...
Please finish this code and make it work. This is my homework and my professor wont allow me to change the code in main, it's a set of huge numbers need to sort by radixsort with bit operation. #include <iostream> using namespace std; void radixLSD_help(int *items, int length, int bit) {    // – Count number of items for each bucket.    // – Figure out where each bucket should be stored (positions // of the first and last element...
D4/MIS: Please make sure the answer should be in your won words. I would appreciate if...
D4/MIS: Please make sure the answer should be in your won words. I would appreciate if you provide the articles Read four (4) academically reviewed articles on Net Neutrality and Summarize all four (4) articles in at least 30 sentences words or more.
*NOTE: I don't really know what subject this would be considered. It's from my business law...
*NOTE: I don't really know what subject this would be considered. It's from my business law class. Outsourcing specialized operational tasks has become a common practice. When outsourcing involves the transfer of personal information, issues of security and privacy are raised. Customers may consent to the collection of personal data without realizing that their information could be shared with another company located halfway around the world and subject to different disclosure and protection rules. In recognition of international privacy concerns,...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT