Friday, December 24, 2010

CASE 3

          Multiprogramming and time-sharing environment is a process in which share common processing resources such as a CPU or central processing unit. In a computer with a single CPU, a single task should be running any time. In multiprogramming the running task keeps executing until it performs an operation that requires waiting for an external event or until the computer's scheduler by force swaps the running task out of the CPU. This environment was also designed to maximize the CPU handling. In time-sharing environment the running task is required to turn down the CPU, either by its own free will or by an external event such as hardware interrupt. This environment is designed to allow several programs to execute apparently at the same time.

            There are two various security problems in multiprogramming environment and time-sharing environment. (1) First, one user can copy or steal another user’s files, program or memory space. This could also lead another user to overwrite on one’s program. This could be very harmful, for example, an administrator was executing a decryption procedure and another user copied or stole the decryption program. (2) Second, resource usage may not be completely controlled or there could also be another user using the system resources (CPU or central processing unit, memory, disk space) without proper accounting, and could cause deadlock for certain users. For example, if user A had resource 1 and was waiting for resource 2, and user B had resource 2 and was waiting for resource 1, deadlock would occur and neither user would be able to make progress in their program, no matter how many time slots they were allocated.

            Those problems made us a bit or more serious and scared for the impairment that it, either of the two environments, would lead. But how can we ensure the same degree of security in a time-share machine as we have in a dedicated machine? (On the other hand, dedicated machine is the computer that services one primary function or task. For example, an automobile might have an onboard computer that is dedicated solely to navigation. That is how dedicated machine worked.) And so, in the question, I would say not. We cannot ensure the level of security that the time-sharing machine would offer. Because the protection scheme in every computer or machine was still created by human. It was created by man so man can also find ways to break it. And the more complex the scheme is, the more complicated it is to be certain of its accurate execution. In time-sharing machine, other users can easily access other’s program. They can manipulate, control, steal and copy files from other users. Just by stating that, you cannot guarantee your safety as a user. While in dedicated machine, you will be executing only a single task that made it certainly safer.

            You cannot find a certain safety alone in any computer program. But in dedicated machine, you can assure that it is safer than time-sharing machine. Because anyone can be a user, anyone can use or access, anyone can break the security or protection scheme that is what we call “hacking”. Once you hacked a system, it only implies that, that system is harmed. (Security tips from Mac OS X 10.5: as a user, you cannot share your password in any program; secure back-up files.)

CASE 2

          In our daily lives, gadgets and other portable devices are very much needed. From the simple people up to the most powerful individual, these devices are very much essential. The most common gadget that everyone has is the cellphone or mobile phones. New models of cellphones now-a-days can be use for saving music, videos, playing different types of games, as a camera, and the most in demand type of mobile phones are those who have the function of a personal computer (the general type of a computer). But the usage of these types of handheld computer differs from the needs of different people.

            For a medical practitioner, their gadgets and other stuff must be related or somewhat relevant to their job. They also uses handheld computer just like a mobile phone, for them to contact people and for them to be contact. Handheld computers running Palm OS have been used in studies of urban academic emergency departments, to measure the timing of interactions between patients and emergency department staff. This replaces ineffective information gathering by the use of pen, paper and manual stopwatches. This specialized application enables the user to pick from a detailed list of activities done by the emergency department doctor and nurse. The same application also enables the user to time two activities simultaneously, as emergency department doctors often do. Activities of other care providers, including consulting physicians, radio technologists, phlebotomists, ECG technicians and respiratory therapists, also can be recorded. By this new technology, the health and wellness of the patients will be monitored by a simply touching and pressing buttons. This also made things inside the hospitals and clinics tense less and accurate.

            Inside a supermarket, a manager uses a specialized handheld computer that has this we called RFID or radio frequency identification. This is a type of bar code that emits a radio frequency, a computer monitoring system that tracks their products as they leave the shelves and when they are checked out. This inventory computer system is designed to keep automatic track of all inventory that the supermarket has. By this kind of device, the supermarkets can be able to analyze what products particular customers are buying (the same way online markets do) and keep better track of inventory as it moves throughout the store.

            The birth of computers, especially the birth of these handheld computers changed the whole lifestyle of every people. Handheld computers are portable extensions of personal computers, though they are not meant to replace the personal computer. They are mobile computing devices such as personal digital assistants, and smartphones. Some handheld computers are custom made to meet specific requirements such as extreme temperature resistance and environmental durability. Handheld computers are no longer just another personal gadget, as they have been deployed in the industry to solve real-world problems.

CASE 1

An Operating System takes care for all input and output in a computer system. It manages users, processes, memory management, printing, telecommunication, networking etc.
It ships data to a disk, the printer, the screen and other peripherals connected to the computer. And because every machine is constructed uniquely, commands for input or output will have to be handled differently, too. In almost all cases an Operating System is not one large behemoth but contains of many small system programs managed by the kernel of the OS. Because of the concentration of these small sustaining programs, it will be easier to amend parts or packages of the OS than to do over a whole program.

Batch Operating System

            The Batch Operating Systems are OS’s which analyze your i/p and groups them into batches. That is data in each batch is of similar characteristics. And then it performs operation on each individual batch. An example of it is the punch card or Hollerith card or IBM card. The IBM 1402 is a piece of stiff paper that contains digital information represented by the presence or absence of holes in predefined positions.  They were used through the 20th century in unit record machines for input, processing, and data storage. Punched cards are the input (sometimes output) medium for communicating with mainframes. Bits were represented by punching holes in the right places, the job performed by a keypunch machine which had an alpha keyboard.

Real-Time Operating System

            The Real-Time Operating Systems are the OS that was build or created for real-time application request. RTOS has the echelon of its consistency relating to the amount of time it takes to allow and complete the application. There are two types of RTOS: the hard real-time operating and the soft real-time operating system. An example of a RTOS is the QNX Operating System. The QNX Neutrino RTOS is very well known for its high performance and reliability. It was designed for bullet-proof operation. Its microkernel architecture protects every application, driver, file system, and protocol stack in the safety of memory-protected user space. As a result, multiple third-party applications can run simultaneously on the RTOS without corrupting one another or the RTOS itself. As a result, the QNX Neutrino RTOS became the power behind the Blackberry Tablet OS.

Hybrid Operating System
           
The Hybrid Operating Systems are the kind of OS that are the combination of a general-purpose Operating System. An example of Hybrid OS is the Microsoft NT kernel. It is a powerful high-level-language-based, processor-independent, multiprocessing, multiuser operating system with features comparable to Unix.
           

Interactive Operating System

            The Interactive Operating Systems are the OS that allows users to run interactive programs. Pretty much all operating systems that are on PCs are interactive OS's. It is also a system that has been designed which facilitates the development of experimental graphics-oriented computer procedures for multivariate data compression and classification. Its features include a random access vector file system, an on-line monitor for data base manipulation and program execution, and a provision for defining sequences of monitor commands as system procedures. An example of this is the UNIX of the Unix Shell. The Unix shell used the same language for interactive commands as for scripting (shell scripts— there was no separate job control language like IBM's JCL).

Embedded Operating System

            The Embedded Operating Systems are the Operating Systems that are designed to be very compact and efficient, forsaking many functions that non-embedded computer operating systems provide, and which may not be used by the specialized applications they run. They are also real-time operating systems. Examples of embedded operating systems could include the software used in Automated Teller Machines, Cash Registers, CCTV systems, a TV box set, a GPS, jukeboxes, missiles, etc. An example of this kind of operating system is the Nexus. Nexus' coniX small romable embedded operating system for ARM processors. Nexus 128 offers graphics designers and content creators design-caliber 2D performance, high-quality 3D performance, and true color resolution support up to 1920 x 1200.