0% found this document useful (0 votes)
48 views10 pages

Assignment

This document provides information on server and desktop operating systems, CMOS, the connection between CMOS and BIOS, and encryption. The main differences between server and desktop operating systems are outlined, including features like GUIs, updating capabilities, and examples like Windows Server, Linux variants, and Mac OS X Server for servers versus Linux, Windows, Mac OS X, BSD, and UNIX for desktops. CMOS is described as a small memory chip on the motherboard that handles functionality by communicating with BIOS. It stores startup data for BIOS and functions like clock settings. CMOS and BIOS work together, with BIOS communicating between hardware and CMOS storing variable startup parameters. Encryption is defined
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views10 pages

Assignment

This document provides information on server and desktop operating systems, CMOS, the connection between CMOS and BIOS, and encryption. The main differences between server and desktop operating systems are outlined, including features like GUIs, updating capabilities, and examples like Windows Server, Linux variants, and Mac OS X Server for servers versus Linux, Windows, Mac OS X, BSD, and UNIX for desktops. CMOS is described as a small memory chip on the motherboard that handles functionality by communicating with BIOS. It stores startup data for BIOS and functions like clock settings. CMOS and BIOS work together, with BIOS communicating between hardware and CMOS storing variable startup parameters. Encryption is defined
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Title Page

1
Contents
Task 2 (A) 3

Server operating system 3

Desktop operating system 4

Task 2 (B) 5

CMOS 5

Functionalities 6

Connection between CMOS and BIOS 6

Task 2(C) 7

Encryption 7

How to handle it 8

Bibliography 9

2
TASK 2(A):

The Operating system is the interface between the hardware, Software and the
user, it allows the hardware devices to interact with the application in computer
system by receiving the instruction from the user itself, however there are different
operating system can use & it depend base on the requirement.

Based on the above, you need to compare in detail between the server
operating system and desktop operating system shown the features, examples,
and the functionalities for each one.

SOLUTION:

MAIN DIFFERENCES BETWEEN A DESKTOP AND SERVER

Desktop operating system are generally established to run the application on the client platform.
It deals with the computer components to communicate between users and hardware. Basic
purpose of all operating systems is to provide a platform on which a user can execute their
programs in an efficient way.

Where as in case of Server OS, our main necessity is to make in working for 24 x 7 as typical
server or some server like roles. We need to make it possible to work on numerous domains. A
Server OS should provide the best form of processor and memory.

SERVER OPERATING SYSTEM

 FEATURES

Server-oriented operating systems incline to have features in common that make them more
suitable for the server environment, such as:

o GUI is optional in server OS it may provide or not.


o It has ability to reconfigure and update both hardware and software to some extent
without restart.
o It provides advanced backup facilities to allow regular and frequent online
backups of critical data.
o It can transfer transparent data between volumes and devices.
o It provides capabilities of flexible and advanced networking.
o Server OS provides automation capabilities such as daemons in UNIX and
services in Windows, and tight system security, with advanced user, resource,
data, and memory protection.

3
 FUNCTIONALITIES

o It provides open-source software solutions and products to various enterprises and


communities around the world, and deals in Linux Enterprise after payment and
Fedora for free to its users.
o Secure, fast and economically scalable, it helps make the most of infrastructure.
o A group for open-source community of contributors and users working
on development and adoption of next-generation projects.
o Reliability, scalability, security, and performance for demanding enterprise
workloads. 

 EXAMPLES

Popular server operating systems include:

o Windows Server
o Mac OS X Server
o variants of Linux such as:
 Red Hat Enterprise Linus (RHEL)
 SUSE Linux Enterprise Server

DESKTOP OPERATING SYSTEM


 FEATURES

o Licensing
 There is basic three kinds of desktop operating system
 Open source: Linux is an open-source operating system anyone
can download it an modify it according to their own needs. e.g.,
Ubuntu.
 Free OS: Free operating system does not have open source it
means that these are free to download and use but can’t modify
them. e.g., google owns Chrome OS.
 Commercial OS: These are privately owned by companies and the
companies charged them. e.g., Microsoft Windows and Apple
MacOS.
o Software compatibility

4

Every operating system has their own compatibilities. Because the
developer develops the software compatibles with different versions with
in OS type but not compatible for other OS type.
o Complexity
 Desktop Operating systems come is basically two editions:
 32-bit: these are not compatible for 64-bit.
 64-bit: It provides best utilization of Random-Access Memory. A
computer with 64-bit operating system can run either 64-bit or 32-
bit operating system.
 FUNCTIONALITIES

o Interface between the user and the hardware.


o Coordinate hardware components
o Provide environment for software to functions.
o Provide structure for data management
o Monitor system health and functionalities.

 EXAMPLES

o popular modern operating systems are:


 BSD
 Linux
 Mac OS X
 Microsoft Windows
 UNIX

TASK 2 (B):

CMOS is one of the major components in the motherboard, it is small size of


devices connected to system board, Moreover, it handles the functionalities by
communicating with the BIOS.

Based on the above, what is CMOS and what kind of functionalities handle it
in computer system. In addition, describe the connection between the CMOS
& BIOS.

SOLUTION:

 WHAT IS CMOS?

5
CMOS stands for complementary Metal-Oxide-Semiconductor. It is term which used to handle
the functionalities of small amount of memory of motherboard to handle the BIOS settings, such
as setting time and date, as well as hardware settings.

CMOS chips are required for battery-powered devices just like laptops because they use less
power than other types of chips. While they use both negative polarity circuits and positive
polarity circuits (NMOS and PMOS), only one circuit type is powered on at a time.

The Mac equivalent to CMOS is PRAM, which stands for Parameter RAM. You can also reset
your Mac PRAM.

 FUNCTIONALITIES
When the computer is start up and on BOOT mode the there is a choice to start it up on either
BIOS or CMOS. The main function of CMOS is to store start-up data that BIOS used to BOOT
the computer. The CMOS chip is generally used CMOS battery which is usually powered by a
coin-sized CR2032 cell battery.

As we know there are several functionalities are done in computer even at start-up and as well as
turned-off time although they use very low power consumption. The clock is one of those
functionalities which occupied very high consumption of power. The clock settings keep on
working all the time and it becomes possible only because of CMOS. So, it is the most important
functionality of CMOS.

In such rare cases we can reset the settings of BIOS to reinsert the CMOS battery it converts the
setting of BIOS on the default level. Through this we can easily troubleshoot the computer which
covers many huge sized errors. You can also use CMOS setup to disable/enable some hardware
devices.

 CONNECTION BETWEEN CMOS AND BIOS


CMOS and BIOS both are the chips on the motherboard, BIOS are used as a communication
medium between the processors and the hardware components just like: USB port, hard drive,
sound card, video card and many other. With out BIOS computer wouldn’t be able to understand
the functionalities of the components.

The BIOS firmware is also what performs the Power on Self-Test to test those pieces of
hardware, and what ultimately runs the boot loader to launch the operating system.

6
CMOS is a type of memory technology, but most people use the term to refer to the chip that
stores variable data for startup. A computer's BIOS will initialize and control components like
the floppy and hard drive controllers and the computer's hardware clock, but the specific
parameters for startup and initializing components are stored in the CMOS. It's important to
understand that CMOS and BIOS are not interchangeable terms for the same thing. While they
work together for a specific function within the computer, they are two entirely different
components.

In short CMOS is one of the most important components of the computer which is placed on the
motherboard just like a chip. Without CMOS turning on the computer may become a cause of
problem. But in case if there is a dead CMOS then the computer will start up but it will create
the clock setting on the default setting every time to start up computer. The computer wouldn’t
be able to keep the settings of date and time.

TASK 2(C):

Based on E-Resource (Omeran Masader, Emerald, AL Manahel or any e-library


resources. You need to find the answer to below question.

The encryption technology is one of technique used it to provide the security


for our data in electronic devices. You need to describe in detail what is the
encryption, how it secures the data in own devices, you can use diagram to
explain the process of encryption.

SOLUTION:

 WHAT IS ENCRYPTION
It is a technique by which data is changed over into mystery code that conceals the data’s actual
code importance. The study of encoding and decoding of the data is known as cryptography. It is
a process to hide the actual information into a coding form so that data may save from
unauthorized persons, data may only readable for the person how have the secret code or
decryption key.

In this process through encryption taking a plain format text which may text message or emails,
and scrambling it into secret text which known as ‘cipher text’. This helps the confidentiality of
any form of data stored on the computer and required to send on network just like internet.

When the data send and received by the targeted recipient the data transmitted back into text
from signals this called decryption. In this technique, an encryption key is required to lock and

7
unlock the message on both sides’ sender and receiver. As a transmission medium a huge
collection of algorithms, scrambles and unscrambles are used to make the text format readable.

There are some types of encryption:

 Data Encryption Standard (DES)


 Triple DES
 RSA
 Advanced Encryption Standard (AES)
 TwoFish

HOW IT SECURES THE DATA


1. Sender sends a plaintext message to the KDC to obtain a symmetric session key between
receiver and herself. The message contains her registered identity and the identity of
receiver. This message is not encrypted, it is public. The KDC does not care.
2. The KDC receives the message and creates what is called a ticket. The ticket is encrypted
using receiver’s key (KB). The ticket contains the identities of sender and receiver and
the session key. The ticket with a copy of the session key is sent to sender. Sender
receives the message, decrypts it, and extracts the session key. Sender cannot decrypt
receiver’s ticket; the ticket is for receiver, not for sender. Note that this message contains
a double encryption the ticket is encrypted, and the entire message is also encrypted. In
the second message, sender is actually authenticated to the KDC, because only sender can
open the whole message using her secret key with KDC.
3. Sender sends the ticket to receiver. Receiver opens the ticket and knows that sender needs
to send messages to receiver using the session key. Note that in this message, receiver is
authenticated to the KDC because only receiver can open the ticket. Because receiver is
authenticated to the KDC, he is also authenticated to sender, who trusts the KDC in the
same way, sender is also authenticated to receiver, because receiver trusts the KDC and
the KDC has sent receiver the ticket that includes the identity of sender.

8
Through the KDC autogenerate encoding/decoding key is generated. This key helps to secure
data in encryption. Encrypted data retains its integrity. Even when a hacker tries to alter it in
transit, the recipient will know that it has been corrupted.

Bibliography

 https://r.search.yahoo.com/_ylt=Awr9Im1KgAlgjg8AjFJXNyoA;_ylu=Y29sbwNncTEEc
G9zAzIEdnRpZAMEc2VjA3Ny/RV=2/RE=1611264202/RO=10/RU=https%3a%2f
%2fwww.lifewire.com%2fwhat-is-cmos-
2625826/RK=2/RS=2fT4mLsdrtN5J5DmvP6lY_vwhDc-
 https://r.search.yahoo.com/_ylt=AwrE1xsFmwlgczsA1QFXNyoA;_ylu=Y29sbwNiZjEE
cG9zAzIEdnRpZAMEc2VjA3Ny/RV=2/RE=1611271046/RO=10/RU=https%3a%2f
%2finfluencingentrepreneur.com%2fdigital-entrepreneur%2ffunctionalities-and-
competence-of-microsoft-windows-server
%2f/RK=2/RS=nPgyuCHrsDQj15wSHxxhS2UzLDI-
 https://r.search.yahoo.com/_ylt=AwrE1xsFmwlgczsA1wFXNyoA;_ylu=Y29sbwNiZjEE
cG9zAzMEdnRpZAMEc2VjA3Ny/RV=2/RE=1611271046/RO=10/RU=https%3a%2f
%2fwww.webopedia.com%2fdefinitions%2fserver-operating-system
%2f/RK=2/RS=GnsSGOENvXj_.wdeplG_q_1yjWI-

9
 https://r.search.yahoo.com/_ylt=AwrJ6yrfmwlgMb8AYAFXNyoA;_ylu=Y29sbwNiZjEE
cG9zAzEEdnRpZAMEc2VjA3Ny/RV=2/RE=1611271264/RO=10/RU=https%3a%2f
%2fwww.geeksforgeeks.org%2ffunctions-of-operating-system
%2f/RK=2/RS=YJQO3wKAUDcaLJsk1oh4PtTSPyg-
 https://r.search.yahoo.com/_ylt=A2KLfSMwoglgS2UALBZXNyoA;_ylu=Y29sbwNiZjE
EcG9zAzEEdnRpZAMEc2VjA3Nj/RV=2/RE=1611272881/RO=10/RU=https%3a%2f
%2fus.norton.com%2finternetsecurity-privacy-what-is-encryption.html%23%3a~
%3atext%3dEncryption%2520is%2520the%2520process%2520of%2520taking
%2520plain%2520text%252C%2cor%2520transmitted%2520through%2520a
%2520network%2520like%2520the
%2520internet./RK=2/RS=9HA8RGxWVCcW6L.XDI_Kk_s8nCo-

10

You might also like