The creation of this assignment is to create a baseline knowledge and explain my journey of becoming a Linux administrator. In this assignment, I will continue to cover the topics that I had learned and discussed in the third and fourth weeks of class after the first assignment. After learning the foundations of the Linux Operating System, It is now time to peel back some layers and go more in depth with this intriguing O.S. The discussions topics that will be touch upon is the Boot Process and the System Shutdown and everything in between.
The first topic for discussion is the Linux Boot Process. Just like all computers that have an operating system installed, the boot process is sequence of the actions to make sure that the operating system can turn on. With Linux Operating System it is no different from others, it requires the same process to be utilize before the client is able to take control. With the Linux O.S there are four general stages of the boot process. The first stage is the BIOS. This stage is define as the Basic Input Output system, which is loaded and the system hardware is identified. Then the POST, CMOS, and then Plug and Play are allocated. The second stage is the Boot Loader. Once the first stage is successful, the BIOS gives control to the Boot Loader program. Then BIOS searches through the Boot Loader to retrieve and load the primary boot loader code. This contain the second boot loader that contains the O.S Kernel loads. The third stage is the O.S Kernel. The Boot Loader will have loaded the kernel into memory, configured it with the location of its root filesystem, and loaded the initial ramdisk, if supplied. The new hardware and drivers are loaded and the root is mounted for the next stage. The fourth...
... middle of paper ...
...ly, type the following command to shutdown system immediate as root user. This command “shutdown -h now” the system will immediately shutdown. There is also a choice to shut down the system with a certain time limit. For example, if you want to the system to shut down in 15 minutes the command that needs to be type in the terminal session is “shutdown -h +15”. If you want a warning message to be display then the command would be “shutdown -h +10 “Please save your work ASAP”. When the time has expires the warning message will be displayed on the screen for the user.
Learning Linux is a blast. It’s definitely different from using a Microsoft Operating System. As the class progress, I have learned a lot and have gain a basic knowledge of how to use a Linux Operating System. I hope I will continue to learn more and be one step closer to becoming a Linux administrator.
I was very interested in computers and technology as a child, both playing games and building fake parts for them. Still in elementary school, I was fascinated by these computing machines, spending hours on end working with DOS to satisfy my curiosity. Around my middle school years, Windows became graphical, and I found interest in even more computer games with even greater experiences and capabilities. Windows was the dominant operating system at the time, but I was soon to find there was a whole different world out there of operating systems. While out on vacation in Washington, DC, my Dad and I were able to meet with the local Tech Fanatics group, HackDC. It was here where I discovered Linux. Linux, an alternative to Windows, immediately grabbed my attention when I saw it in use. It appeared to me as something that only the extreme computer users even heard of. Upon my return home,
The Operating System (OS) is the heart of computer server and client systems; therefore they are the pivotal components of the Information Technology (IT) architecture. The OS contains the crucial data, information, and applications, which are vulnerable, and can be infiltrated to cripple the entire IT architecture of the organization. Therefore, it becomes mandatory to properly safeguard the OS from an internal or external intrusion (Stallings & Brown, 2012). This critical thinking report will highlight the security concerns that may impact the OS. Further, the security guidelines and best practices for the OS in general, along with the specific fundamentals regarding the Windows and Linux OS are comprehensively illustrated.
Nowadays, most of the web, email, database and fileservers are Linux servers. Linux is a UNIX system which implies that it has solid compatibility, stability and security features. Linux is used for the mentioned environments because these services require high security. Further, an increase of attacks on these servers can be observed. Additionally, the methods to prevent intrusions on Linux machines are insufficient. Further, the analysis of incidents on Linux systems are not considered appropriately (Choi, Savoldi, Gubian, Lee, & Lee, 2008). It can also be observed that a lot of investigators do not have experience with Linux forensics (Altheide, 2004).
Not long ago computers were non-existent in many homes. When computers were first introduced to the world, they were for the sole purpose of performing business functions. The only people who owned computers were large organizations. Eventually, computers were introduced into the homes of those who could afford to buy them. Today, just about everyone owns some form of system that they use daily to help manage their day-to-day operations. What many once survived without now seems impossible to do without. As technology continues to grow, it has a greater effect on families and the education system. Some companies such as Microsoft and Apple made it possible to reinvent a new form of technology that would change the world. Each company had some form of struggle and overtime had to keep up with the changes of time and the way people communicated. From the first day of its invention, organizations have had to steadily implement new operating systems to keep up with the demands of the people while staying afloat with competitors. The ways of life for many have changed as well as the way people communicate. It is evident that the history and uses of computers have changed the world but these computers could not perform without the operating systems. Various operating systems will be discussed, how they began and how they each changed since they were first introduced. Although, they all had a purpose each varied in how they performed and changed the lives of many and will continue in the near future.
I’m ambitious to learn new things especially when I'm interested in them; this course provides me with a continuous learning platform that will progress through university as
However in both systems, the hardware cannot multitask without the software, which enables the OS to be used and updated. Kernel code is responsible to manage the work in both hardware and software for the OS, and it also transmits the information using the Input and Output system in OS X and it does a similar function in Windows10, but it is called device manager.
In today’s world where several different domains of technology must imbricate to pacify the rapid pace of development, it is necessary to take a multifaceted approach to learning. While Electrical Engineering major courses like Microprocessors, Embedded Controllers and Digital Electronics have exposed me to computing and data storage at the lowest level, chosen Computer Science courses like Computer Systems and Programming, Data Structures and MOOCs like Algorithms, Machine Learning and Software-as-a-Service have equipped me with the latest knowledge and ideas to capitalize on the digital systems as efficiently as possible. Two initial advanced courses in Mathematics have stre...
Virtualization technologies provide isolation of operating systems from hardware. This separation enables hardware resource sharing. With virtualization, a system pretends to be two or more of the same system [23]. Most modern operating systems contain a simplified system of virtualization. Each running process is able to act as if it is the only thing running. The CPUs and memory are virtualized. If a process tries to consume all of the CPU, a modern operating system will pre-empt it and allow others their fair share. Similarly, a running process typically has its own virtual address space that the operating system maps to physical memory to give the process the illusion that it is the only user of RAM.
It all began in 1991, during the time of monumental computing development. DOS had been bought from a Seattle hacker by Bill Gates, for a sum of $50,000 – a small price for an operating system that had managed sneak its way across the globe due to a clever marketing strategy. Apple’s OS and UNIX were both available, though the cost of running either was far greater than that of running DOS. Enter MINIX, an operating system developed from the ground up by Andrew S. Tanenbaum, a college professor. MINIX was part of a lesson plan used to teach students the inner-workings of an operating system. Tanenbaum had written a book on MINIX called “Operating System” and anyone who had picked up a copy would find the 12,000 lines of code that comprised MINIX itself. This was a big issue; due to the fact that all know (well published) operating systems to that point had been well guarded by software developers, thus making it difficult for people to truly expand on operating system mechanics.
I took up Computer Science and Engineering as my discipline in Bhoj Reddy Engineering College for Women affiliated to Jawaharlal Nehru Technological University, one of the premier institutes in India. My undergraduate education has been a great learning and enriching process for me. It exposed me to all the core areas of Computer Science like operating systems, database management systems, networks and network security, data structures, algorithms and software engineering. These courses have given me a good foundation in the core concepts. My interest lies in Database Management, Programming Languages, Theory of Computation, and Software Engineering. I am fully acquainted with the fast growing subjects like Object Oriented Programming, Analysis and Design. On the other hand, the intensive laboratory classes exposed me to a fascinating world of experimentation. It was here that I discovered the qualities of perseverance and diligence in myself. I feel that these courses have done a lot to prepare me for my future studies and research work.
In the end, this class has really opened my eyes to everything that is out there to supplement my teaching and my students learning. I am extremely happy that this class did not teach me how to use Microsoft Office , but I do wish that we could have had the opportunity to work more with the material rather than merely reading about the material. The Multimodal Task definitely allowed us to configure a lesson using and working with technology, but if we had more time, I wish we could have done more than one task to accomplish such goals.
Watson, J. (2008). A history of computer operating systems (pp. 14-17). Ann Arbor, MI: Nimble Books.
The significance of the role of the Operation System (OS) in the overall Information Technology employment sector cannot be undervalued. Indeed, it is hard to talk about technical skill-sets or the practical application of such skill-sets without at least some underlying understanding of their context within a computer operating system environment. From hardware specifications and requirements, user technical support, system administration and security, to software development and system implementation, operating systems are an integral part of the information technology and computing world in all its aspects, and it is difficult to form a concrete demarcation between specialized careers in this industry and the concept of the computer operating system.
been around computers for many years now and enjoy them. I began to learn the
My first real experience with computers, as we know them today, was while I was in the Navy. Once we learned to use commands called "Dos", we could make the computer do unbelievable things. I became obsessed with learning as much as I could abo...