Skip to main content
Understanding Operating Systems

Every new computer that’s brought home from the store has an operating system installed onto it. But what most new computer users don’t realize, is that without an operating system, that computer would be a simple shell of possibilities. A powered computer lacking an operating system wouldn’t display anything more than a bunch of confusing text messages that describe the computer’s boot process. At the very end of this process, the computer looks for an operating system and if not found, it will prompt the user to tell it where it is.

Earlier computers didn’t have an operating system and if you have experience with the computers of the early eighties, you’ll remember that most to them didn’t even have a hard drive! These old computers booted an MS-DOS type operating system from drivers stored onto a floppy disk, and in order to use a program, users would remove the boot floppy and then insert a new floppy that contained the program. The floppy not only stored the program (word processor, spreadsheet, etc.), it also stored the drivers that the program needed to communicate with the computer’s hardware. As you can imagine, the cumbersome process of switching from floppy to floppy prompted the birth of the operating system.

An operating system is a software program that controls how the computer’s hardware (and installed software) works. It manages the activity of every component and then displays that activity as a user-friendly interface (GUI). It keeps track of where things exist on a computer’s hard drive as well. But perhaps most importantly for the end-user, the operating system is responsible for translating commands issued with a keyboard and mouse into binary code (010110101 stuff) that can communicate with a set of speakers, a printer, a scanner, and more.

With an operating system installed onto a computer’s hard drive, users no longer need to boot a computer with a floppy disk, nor do they need to run programs from a floppy disk. All the drivers of a program are stored onto the computer and used whenever a program is started.

Apple’s Macintosh computer was among the first of a couple systems to establish a user-to-hardware relationship through a user-friendly interface. Today, we have quite a few operating systems. Some of the more popular ones are Windows Vista, Mac OS X, ZETA, IBM, Unix, and Linux. But even still, operating systems have extended onto to non-computer devices such as game consoles, portable music players, and PDAs. Regardless of the device, the operating system installed onto it serves the same purpose across the board: to enable user-to-hardware communication.

When you think about upgrading your computer to a new operating system, be careful to make sure that you have the necessary hardware components. We tried to upgrade one of our Windows 98 machines to Windows XP, but we were cautioned that the former may not be hardware compatible with XP technology. Apparently, the Windows XP operating system requires components that weren’t developed at the time Windows 98 was distributed, it consumes more space and if we were to install Windows XP on this machine anyway, the new operating system would look for hardware that the computer didn’t have. And that would be an instant recipe for failure.

http://facebook.com/Depeaktech
http://depeaktech.wordpress.com

Click this link if you are interested in getting a freelancer to do your job.
https://www.elance.com/?rid=3ZTZ2





Popular posts from this blog

Disruptions in mobile phones manufacturing

“We need to be able to make a chipset to stand out as someone who was really innovative,” ,  John Chan (don't know if he is a brother to Jackie Chan). Business as well as life itself is a risk and only those who plunged into the risky terrains mostly at times come out as a leader in innovation with an edge over others. Mobile phones market has mostly been dominated by big brands like Apple, Samsung, Microsoft (Nokia), Huawei and the likes. At times, the geographical location determines which brand leads where but we all know for now who leads who. The issue has been disruption in giving the end user what they actually think they want. Putting the power in their palms and helping them toy with it in terms of mobile phones, accessories and mobile apps for different applications to make life easier. All these leads to Internet of Things and innovative smart homes. I think one day, we will be able to change the colour of our bed sheet with a click of the phone and adjust the th...

Open Source Software

  If you’ve spent any lengthy amount of time on the Internet, you’ve probably heard of open source software but might not have fully understood what it is and why it even exists.   This article will describe this recent phenomenon and describe some of its benefits for the software using community. In a nutshell, open source software is software made by everyone – for everyone. The hope behind its development is that through its open access, it will evolve into something that represents the true desires of computer users. Through a wide network of user involvement, the software in question is enhanced and debugged without costs or administrative policies. Traditionally, software is developed behind closed doors. A team of professional coders build it but the community at large isn’t part of its conception. It’s costly to produce and as you can probably guess, that cost is passed on to the end user: the consumer. Open source software on the other hand is free. Free ...
Computer Security In Today’s Society, Protecting Your Computer Is A Requirement Advancement in computer technology is a double-edged sword. On one hand, it affords us quick and easy access to numerous conveniences such as bank statements, favorite shopping centers, school and health records, and more. On the other hand, it can also grant the same access to those who aren’t supposed to get it. Although it’s a rare occurrence, hacking has become the biggest criminal nuisance in computer history. Make no bones about it. There’s nothing innocent or cute about a hacker. Today’s hackers aren’t the pimply-faced teen rebels that you might be thinking of. Instead, these hackers are grown individuals who are more than likely earning a living by stealing the identities of innocent, law abiding individuals and then selling those identities to others who want to slip by the system. And the only protection against these seedy people is prevention. Computer security couldn’t be m...