Assignment
Assignment
1
Contents
Task 2 (A) 3
Task 2 (B) 5
CMOS 5
Functionalities 6
Task 2(C) 7
Encryption 7
How to handle it 8
Bibliography 9
2
TASK 2(A):
The Operating system is the interface between the hardware, Software and the
user, it allows the hardware devices to interact with the application in computer
system by receiving the instruction from the user itself, however there are different
operating system can use & it depend base on the requirement.
Based on the above, you need to compare in detail between the server
operating system and desktop operating system shown the features, examples,
and the functionalities for each one.
SOLUTION:
Desktop operating system are generally established to run the application on the client platform.
It deals with the computer components to communicate between users and hardware. Basic
purpose of all operating systems is to provide a platform on which a user can execute their
programs in an efficient way.
Where as in case of Server OS, our main necessity is to make in working for 24 x 7 as typical
server or some server like roles. We need to make it possible to work on numerous domains. A
Server OS should provide the best form of processor and memory.
FEATURES
Server-oriented operating systems incline to have features in common that make them more
suitable for the server environment, such as:
3
FUNCTIONALITIES
EXAMPLES
o Windows Server
o Mac OS X Server
o variants of Linux such as:
Red Hat Enterprise Linus (RHEL)
SUSE Linux Enterprise Server
o Licensing
There is basic three kinds of desktop operating system
Open source: Linux is an open-source operating system anyone
can download it an modify it according to their own needs. e.g.,
Ubuntu.
Free OS: Free operating system does not have open source it
means that these are free to download and use but can’t modify
them. e.g., google owns Chrome OS.
Commercial OS: These are privately owned by companies and the
companies charged them. e.g., Microsoft Windows and Apple
MacOS.
o Software compatibility
4
Every operating system has their own compatibilities. Because the
developer develops the software compatibles with different versions with
in OS type but not compatible for other OS type.
o Complexity
Desktop Operating systems come is basically two editions:
32-bit: these are not compatible for 64-bit.
64-bit: It provides best utilization of Random-Access Memory. A
computer with 64-bit operating system can run either 64-bit or 32-
bit operating system.
FUNCTIONALITIES
EXAMPLES
TASK 2 (B):
Based on the above, what is CMOS and what kind of functionalities handle it
in computer system. In addition, describe the connection between the CMOS
& BIOS.
SOLUTION:
WHAT IS CMOS?
5
CMOS stands for complementary Metal-Oxide-Semiconductor. It is term which used to handle
the functionalities of small amount of memory of motherboard to handle the BIOS settings, such
as setting time and date, as well as hardware settings.
CMOS chips are required for battery-powered devices just like laptops because they use less
power than other types of chips. While they use both negative polarity circuits and positive
polarity circuits (NMOS and PMOS), only one circuit type is powered on at a time.
The Mac equivalent to CMOS is PRAM, which stands for Parameter RAM. You can also reset
your Mac PRAM.
FUNCTIONALITIES
When the computer is start up and on BOOT mode the there is a choice to start it up on either
BIOS or CMOS. The main function of CMOS is to store start-up data that BIOS used to BOOT
the computer. The CMOS chip is generally used CMOS battery which is usually powered by a
coin-sized CR2032 cell battery.
As we know there are several functionalities are done in computer even at start-up and as well as
turned-off time although they use very low power consumption. The clock is one of those
functionalities which occupied very high consumption of power. The clock settings keep on
working all the time and it becomes possible only because of CMOS. So, it is the most important
functionality of CMOS.
In such rare cases we can reset the settings of BIOS to reinsert the CMOS battery it converts the
setting of BIOS on the default level. Through this we can easily troubleshoot the computer which
covers many huge sized errors. You can also use CMOS setup to disable/enable some hardware
devices.
The BIOS firmware is also what performs the Power on Self-Test to test those pieces of
hardware, and what ultimately runs the boot loader to launch the operating system.
6
CMOS is a type of memory technology, but most people use the term to refer to the chip that
stores variable data for startup. A computer's BIOS will initialize and control components like
the floppy and hard drive controllers and the computer's hardware clock, but the specific
parameters for startup and initializing components are stored in the CMOS. It's important to
understand that CMOS and BIOS are not interchangeable terms for the same thing. While they
work together for a specific function within the computer, they are two entirely different
components.
In short CMOS is one of the most important components of the computer which is placed on the
motherboard just like a chip. Without CMOS turning on the computer may become a cause of
problem. But in case if there is a dead CMOS then the computer will start up but it will create
the clock setting on the default setting every time to start up computer. The computer wouldn’t
be able to keep the settings of date and time.
TASK 2(C):
SOLUTION:
WHAT IS ENCRYPTION
It is a technique by which data is changed over into mystery code that conceals the data’s actual
code importance. The study of encoding and decoding of the data is known as cryptography. It is
a process to hide the actual information into a coding form so that data may save from
unauthorized persons, data may only readable for the person how have the secret code or
decryption key.
In this process through encryption taking a plain format text which may text message or emails,
and scrambling it into secret text which known as ‘cipher text’. This helps the confidentiality of
any form of data stored on the computer and required to send on network just like internet.
When the data send and received by the targeted recipient the data transmitted back into text
from signals this called decryption. In this technique, an encryption key is required to lock and
7
unlock the message on both sides’ sender and receiver. As a transmission medium a huge
collection of algorithms, scrambles and unscrambles are used to make the text format readable.
8
Through the KDC autogenerate encoding/decoding key is generated. This key helps to secure
data in encryption. Encrypted data retains its integrity. Even when a hacker tries to alter it in
transit, the recipient will know that it has been corrupted.
Bibliography
https://r.search.yahoo.com/_ylt=Awr9Im1KgAlgjg8AjFJXNyoA;_ylu=Y29sbwNncTEEc
G9zAzIEdnRpZAMEc2VjA3Ny/RV=2/RE=1611264202/RO=10/RU=https%3a%2f
%2fwww.lifewire.com%2fwhat-is-cmos-
2625826/RK=2/RS=2fT4mLsdrtN5J5DmvP6lY_vwhDc-
https://r.search.yahoo.com/_ylt=AwrE1xsFmwlgczsA1QFXNyoA;_ylu=Y29sbwNiZjEE
cG9zAzIEdnRpZAMEc2VjA3Ny/RV=2/RE=1611271046/RO=10/RU=https%3a%2f
%2finfluencingentrepreneur.com%2fdigital-entrepreneur%2ffunctionalities-and-
competence-of-microsoft-windows-server
%2f/RK=2/RS=nPgyuCHrsDQj15wSHxxhS2UzLDI-
https://r.search.yahoo.com/_ylt=AwrE1xsFmwlgczsA1wFXNyoA;_ylu=Y29sbwNiZjEE
cG9zAzMEdnRpZAMEc2VjA3Ny/RV=2/RE=1611271046/RO=10/RU=https%3a%2f
%2fwww.webopedia.com%2fdefinitions%2fserver-operating-system
%2f/RK=2/RS=GnsSGOENvXj_.wdeplG_q_1yjWI-
9
https://r.search.yahoo.com/_ylt=AwrJ6yrfmwlgMb8AYAFXNyoA;_ylu=Y29sbwNiZjEE
cG9zAzEEdnRpZAMEc2VjA3Ny/RV=2/RE=1611271264/RO=10/RU=https%3a%2f
%2fwww.geeksforgeeks.org%2ffunctions-of-operating-system
%2f/RK=2/RS=YJQO3wKAUDcaLJsk1oh4PtTSPyg-
https://r.search.yahoo.com/_ylt=A2KLfSMwoglgS2UALBZXNyoA;_ylu=Y29sbwNiZjE
EcG9zAzEEdnRpZAMEc2VjA3Nj/RV=2/RE=1611272881/RO=10/RU=https%3a%2f
%2fus.norton.com%2finternetsecurity-privacy-what-is-encryption.html%23%3a~
%3atext%3dEncryption%2520is%2520the%2520process%2520of%2520taking
%2520plain%2520text%252C%2cor%2520transmitted%2520through%2520a
%2520network%2520like%2520the
%2520internet./RK=2/RS=9HA8RGxWVCcW6L.XDI_Kk_s8nCo-
10