Network Operating System
Network Operating System
Network Operating System
Network OS Platforms
1. Windows
Known for its Graphical User Interface (GUI) environment wherein users
utilize the “point-and-click” mechanism of navigating the computer
software.
User-friendly
Hardware peripherals are easily attached
More applications are available
Support is highly available
Hardware is affordable
Application software is expensive as license fees are required
Frequent system crashes and restarts
Difficult to manage tasks or processes
Windows 98
Windows NT
Windows 2000
Windows XP
Windows Vista
Windows 7
Windows 10
Windows 11
Server:
Windows NT
Windows 2000
Windows 2003
Windows 2012
2. UNIX (Branded)
Known for its Command Line Interface (CLI) wherein users are expected to
remember the “commands” that allows them to navigate the computer
software.
With GUI option, it is user-friendly
Difficult to attached non-standard peripherals
Application are difficult to find
Support is limited
Hardware is expensive
OS license is free for servers and clients
Systems are stable
Secure and processes are easily identified and managed
Sun Solaris
Hewlett-Packard HP-AUX
IBM AIX
4. Novell
Was the first LAN software based on file-server technology.
Very full featured, ability to add users, assign right to users, easy
to setup printer sharing
Very fast and efficient even on low-end equipment
Very high performance
Question 2:
Evaluate the importance of an operating system's role in maintaining
security, particularly in a multi-user environment. How might the absence of
robust security features impact the system?
Answer:
The operating system plays a crucial role in maintaining security, especially in a
multi-user environment where multiple individuals access the system simultaneously.
It manages user authentication, ensuring that only authorized users can access the
system. Additionally, the operating system controls access to files, directories, and
resources, implementing permissions and encryption to protect sensitive data.
Without robust security features, a multi-user environment would be highly vulnerable
to unauthorized access, data breaches, and malicious attacks. For example, if the
operating system does not properly isolate user processes, one user's actions could
potentially interfere with another's, leading to data corruption or loss. Furthermore,
without strong authentication and access controls, an unauthorized user could gain
access to confidential information or disrupt system operations, causing significant
damage to the organization. The absence of security measures in the operating
system could also expose the system to malware and other cyber threats,
compromising the integrity, availability, and confidentiality of the system and its data.