table of contents - cengage...chapter 9 free resources operating systems: managing, coordinating,...

40
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or click any topic below to view its content. TABLE OF CONTENTS.............................................................................................................................................. 1 DISCLAIMER ........................................................................................................................................................... 3 RESTARTING DESKTOPS AND LAPTOPS .................................................................................................................. 4 SINGLE TASKING, MULTITASKING, AND MULTIUSER OPERATING SYSTEMS ........................................................... 5 HIGH-TECH TALK: BENCHMARKING........................................................................................................................ 6 Benchmarking Algorithms.....................................................................................................................................7 ETHICS & ISSUES 9-1: SHOULD MANUFACTURERS INCLUDE EXTRA PROGRAMS IN OPERATING SYSTEMS FOR COMPUTERS AND MOBILE DEVICES? ..................................................................................................................... 9 Websites about Bloatware ....................................................................................................................................9 SECURE IT 9-1: AUTOMATIC UPDATES – SAFE OR NOT? ....................................................................................... 10 Websites about Automatic Updates’ Safety .......................................................................................................10 SECURE IT 9-2: USING AND EVALUATING AN OPERATING SYSTEM’S BUILT-IN SECURITY TOOLS .......................... 11 Websites about Operating Systems’ Built-In Security Tools................................................................................11 DEVICE-DEPENDENT AND DEVICE-INDEPENDENT OPERATING SYSTEMS .............................................................. 12 ETHICS & ISSUES 9-3: SHOULD YOU BE AN EARLY ADOPTER OF A NEW TECHNOLOGY? ....................................... 13 Website about Early Technology Adoption .........................................................................................................13 WINDOWS STORE ................................................................................................................................................ 14 MINI FEATURE 9-1: WINDOWS USER INTERFACE ................................................................................................. 16 MAC APP STORE .................................................................................................................................................. 19 MINI-FEATURE 9-2: MAC OS ................................................................................................................................ 21 TECHNOLOGY INNOVATOR: LINUS TORVALDS ..................................................................................................... 23 TECHNOLOGY TREND: LINUX POWERING THE INTERNET OF THINGS ................................................................... 24 SECURE IT 9-3: OPEN SOURCE OR CLOSED SOURCE – WHICH IS MORE SECURE? .................................................. 25 Websites about Open and Closed Source Security .............................................................................................. 25 LINUX DISTRIBUTIONS AND LIVE CDS/LIVE USBS ................................................................................................. 26 CHROMEBOOKS AND CHROMEBOXES ................................................................................................................. 27 HOW TO 9-3: VIRTUAL MACHINES ....................................................................................................................... 28 Websites about Virtual Machines ....................................................................................................................... 28 HIGH-TECH TALK: VIRTUALIZATION ..................................................................................................................... 29 Types of Virtualization ........................................................................................................................................30 WINDOWS SERVER AND OS X SERVER ................................................................................................................. 31

Upload: others

Post on 02-Mar-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 1

Table of Contents Tap or click any topic below to view its content.

TABLE OF CONTENTS .............................................................................................................................................. 1

DISCLAIMER ........................................................................................................................................................... 3

RESTARTING DESKTOPS AND LAPTOPS .................................................................................................................. 4

SINGLE TASKING, MULTITASKING, AND MULTIUSER OPERATING SYSTEMS ........................................................... 5

HIGH-TECH TALK: BENCHMARKING ........................................................................................................................ 6

Benchmarking Algorithms ..................................................................................................................................... 7

ETHICS & ISSUES 9-1: SHOULD MANUFACTURERS INCLUDE EXTRA PROGRAMS IN OPERATING SYSTEMS FOR

COMPUTERS AND MOBILE DEVICES? ..................................................................................................................... 9

Websites about Bloatware .................................................................................................................................... 9

SECURE IT 9-1: AUTOMATIC UPDATES – SAFE OR NOT? ....................................................................................... 10

Websites about Automatic Updates’ Safety ....................................................................................................... 10

SECURE IT 9-2: USING AND EVALUATING AN OPERATING SYSTEM’S BUILT-IN SECURITY TOOLS .......................... 11

Websites about Operating Systems’ Built-In Security Tools ................................................................................ 11

DEVICE-DEPENDENT AND DEVICE-INDEPENDENT OPERATING SYSTEMS .............................................................. 12

ETHICS & ISSUES 9-3: SHOULD YOU BE AN EARLY ADOPTER OF A NEW TECHNOLOGY? ....................................... 13

Website about Early Technology Adoption ......................................................................................................... 13

WINDOWS STORE ................................................................................................................................................ 14

MINI FEATURE 9-1: WINDOWS USER INTERFACE ................................................................................................. 16

MAC APP STORE .................................................................................................................................................. 19

MINI-FEATURE 9-2: MAC OS ................................................................................................................................ 21

TECHNOLOGY INNOVATOR: LINUS TORVALDS ..................................................................................................... 23

TECHNOLOGY TREND: LINUX POWERING THE INTERNET OF THINGS ................................................................... 24

SECURE IT 9-3: OPEN SOURCE OR CLOSED SOURCE – WHICH IS MORE SECURE? .................................................. 25

Websites about Open and Closed Source Security .............................................................................................. 25

LINUX DISTRIBUTIONS AND LIVE CDS/LIVE USBS ................................................................................................. 26

CHROMEBOOKS AND CHROMEBOXES ................................................................................................................. 27

HOW TO 9-3: VIRTUAL MACHINES ....................................................................................................................... 28

Websites about Virtual Machines ....................................................................................................................... 28

HIGH-TECH TALK: VIRTUALIZATION ..................................................................................................................... 29

Types of Virtualization ........................................................................................................................................ 30

WINDOWS SERVER AND OS X SERVER ................................................................................................................. 31

Page 2: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 2

TECHNOLOGY INNOVATOR: SUN ......................................................................................................................... 32

TECHNOLOGY INNOVATOR: IBM .......................................................................................................................... 33

ETHICS & ISSUES 9-4: SHOULD TEXT MESSAGES SENT BY EMPLOYEES BE PRIVATE? ............................................ 34

Websites about Employee Text Message Privacy ............................................................................................... 34

SECURE IT 9-4: BYOD SECURITY ISSUES ................................................................................................................ 35

Websites about BYOD Security Issues ................................................................................................................. 35

ANDROID ............................................................................................................................................................. 36

IOS ....................................................................................................................................................................... 37

WINDOWS PHONE ............................................................................................................................................... 38

TECHNOLOGY TREND: MOBILE VERSUS DESKTOP OPERATING SYSTEM USAGE ................................................... 39

Websites about Mobile and Desktop Operating System Usage .......................................................................... 39

TECHNOLOGY @ WORK: METEOROLOGY ............................................................................................................. 40

Websites about Technology in Meteorology ...................................................................................................... 40

Page 3: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 3

Disclaimer Cengage Learning and the Shelly Cashman authoring team do not support and are not responsible for

the content of material in third-party or external web/Internet sites. Opinions expressed at third-party

or external web/Internet sites do not necessarily reflect that of Cengage Learning or the Shelly Cashman

authoring team.

The Free Resources include links to web addresses at dscov.com. Web addresses with this domain will

redirect to the actual websites or resources listed and are provided as abbreviated links for students

who wish to type them into a browser.

Tap or click here to return to the Table of Contents.

Page 4: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 4

Restarting Desktops and Laptops Options to restart a computer running the Windows 8 operating system include the following:

Tap or click the Shut down or Power Options button on the sign-in screen and then tap or click

Restart on the Shut down or Power Options menu

Tap or click the Settings charm on the Charms bar, tap or click the Power button on the Settings

menu, and then tap or click Restart

Press CTRL+ALT+DELETE, tap or click the Power button in the lower-right corner of the screen,

and then tap or click Restart

Options to restart computer running the Mac OS operating system include the following:

Click Restart on the Apple menu

Hold down the computer or device’s Power button or press its Restart button

Press CTRL+EJECT and then click Restart

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

The same procedures can be used to restart Windows computers and Apple computers.

True

False

Tap or click here to return to the Table of Contents.

Page 5: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 5

Single Tasking, Multitasking, and Multiuser Operating Systems The following lists identify examples of single-tasking, multitasking, and multiuser operating systems.

You can find additional information by entering the list items as search text.

Single tasking operating systems

o MS-DOS

o Embedded operating systems found in electronics and machinery

Multitasking operating systems

o Linux

o Mac OS

o Windows

Multiuser operating systems

o Linux

o Mac OS X Serer

o UNIX

o Windows Server

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

UNIX is an example of a multiuser operating system.

True

False

Tap or click here to return to the Table of Contents.

Page 6: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 6

High-Tech Talk: Benchmarking A benchmark is a surveyor’s reference mark — a point of reference from which other measurements can

be made. Benchmarking is used to evaluate various aspects of enterprises and is widely used in

computer technology. Additional types of benchmarking exist, such as process benchmarking and

performance benchmarking. In computer technology, a benchmark is a set of conditions used to

measure the performance of hardware or software. Benchmark testing involves running a set of

standard tests to compare the performance of two or more systems. Websites and programs are

available that can perform simple benchmark tests against parameters such as the speed of a

computer’s processor or the speed of the Internet connection. The computer industry, however, uses

far more complex benchmark tests.

Suppose you are a network administrator and need to buy new servers to support your organization’s e-

commerce website. To start, you can access published benchmark results from organizations such as

SPEC and TPC. Both SPEC (Standard Performance Evaluation Corporation) and TPC (Transaction

Processing Performance Counsel) are nonprofit groups that define and maintain benchmarks for the

computer industry. TPC, for example, tests using its TPC Benchmark W (TPC-W), which measures how

servers perform while supporting an e-commerce website. Reading published benchmark test results

from these groups can help you determine how one vendor’s system might perform relative to

another’s.

To understand benchmark results fully, you should understand the design and measurements (or

metrics) used for the test. The TPC-W benchmark, for example, uses two primary metrics: WIPS and

$/WIPS. WIPS is the number of web interactions per second that can be sustained by the system under

test, or SUT (in this case, multiple servers). The $/WIPS is the system cost per WIPS, which is the total

cost of the SUT divided by WIPS.

To calculate WIPS, TPC-W uses several algorithms, or formulas. One calculation is Web Interaction

Response Time (WIRT), which is the time it takes to complete a web interaction. A web interaction might

start when a user taps or clicks a link to request a webpage and ends when the browser receives all of

the data from the requested webpage. WIRT is calculated using the algorithm shown in the table below.

Using this algorithm, if a web interaction starts at 1:00:00 and the last byte of data is sent at 1:00:07, the

WIRT is 7 seconds.

WIRT is used to calculate the number of web interactions successfully completed during the length of

the benchmark test, or measurement interval. During the measurement interval, the browser

repeatedly cycles through requesting and then receiving a requested page, measuring the time to

receive it (WIRT), and then requesting the next page. To be considered a successful web interaction,

each type of web interaction must have a WIRT less than the TPC-specified constraint. For example, a

home page web interaction must have a WIRT of less than three seconds or it is not used when

calculating WIPS.

The total number of successful web interactions completed in a measurement interval is used to

calculate WIPS. WIPS is calculated using the algorithm shown in the table below. Using this algorithm, if

14,009,400 web interactions are completed successfully during a 30-minute test period, the WIPS rating

for the system is 14,009,400/1,800 or 7,783 WIPs. The higher the WIPS rating, the more requests the

web server can handle per second.

Page 7: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 7

The $/WIPS rating is determined by dividing the price of the SUT by the WIPS value. Using this algorithm,

if a system rated as 7,783 WIPS costs $190,036, the $/WIPS rating is $190,036/7,783 or 24.42.

The TPC-W benchmark also measures the total number of connections a web server can handle. Using

the algorithm shown in the table below, if a website supports 35,000 browsers using 10 web servers,

each web server is supporting 2 * (35,000/10), or 7,000 connections.

Benchmarking Algorithms

Web Interaction Response Time (WIRT)

Defined by the algorithm, WIRT = T2 – T1, where T1 = time when the first byte of request is sent to the web server; and T2 = time after the last byte of a requested webpage is received by the browser

Web Interactions Per Second (WIPS)

Defined by the algorithm, WI/(MI), where: WI = total number of web interactions completed successfully; and MI = length of the measurement interval in seconds

System Cost Per WIPS ($/WIPS)

Defined by the algorithm, System Cost/WIPS, where: System Cost = entire price of the SUT, including all new hardware, software, and three-year maintenance charges; and WIPS = web interactions successfully completed

Total Number of Connections Supported by a Web Server

Defined by the algorithm, 2 * (Number of Browsers/Web Servers), where 2 represents the 2 connections per user (one nonsecure, one secure), Number of Browsers is the number of users browsing the website; and Web Servers is the number of web servers supporting the website

Data points such as WIPS, $/WIPS, and number of connections are the result of a benchmarking process.

These data points provide the detailed information required to make informed purchasing decisions. For

example, the WIPS and $/WIPS ratings in a benchmark report can help you better understand how the

servers will perform in the real-world environment of your e-commerce website.

The TPC-W benchmark is just one of numerous industry benchmarks used to test different aspects of

systems’ performance.

What other reasons make benchmarking important?

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

Page 8: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 8

TPC-W is the number of web interactions per second that can be sustained by the system being tested.

True

False

Tap or click here to return to the Table of Contents.

Page 9: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 9

Ethics & Issues 9-1: Should Manufacturers Include Extra Programs in

Operating Systems for Computers and Mobile Devices? The resources listed in the table below contain more information about bloatware. As an alternative to

tapping, clicking, or entering the web address, you can find desired information by entering search text

from the table’s Website Name or Description column.

Websites about Bloatware

Website Name Description Web Address

Business Insider Article titled “Lenovo: We're done with 'bloatware' and 'adware'”

dscov.com/16/09e1a

PC World Article about cleaning bloatware off of your computer

dscov.com/16/09e1b

Tap or click here to return to the Table of Contents.

Page 10: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 10

Secure IT 9-1: Automatic Updates – Safe or Not? The resources listed in the table below contain more information about issues related to automatic

updates. As an alternative to tapping, clicking, or entering the web address, you can find desired

information by entering search text from the table’s Website Name or Description column.

Websites about Automatic Updates’ Safety

Website Name Description Web Address

About Tech Article titled “How To Fix Problems Caused by Windows Updates”

dscov.com/16/09s1a

CNET Article titled “How to troubleshoot software-update problems”

dscov.com/16/09s1b

Gizmo’s Freeware Article titled “Best Free Software Update Monitor”

dscov.com/16/09s1c

Tap or click here to return to the Table of Contents.

Page 11: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 11

Secure IT 9-2: Using and Evaluating an Operating System’s Built-In

Security Tools The resources listed in the table below contain more information about an operating system’s built-in

security tools. As an alternative to tapping, clicking, or entering the web address, you can find desired

information by entering search text from the table’s Website Name or Description column.

Websites about Operating Systems’ Built-In Security Tools

Website Name Description Web Address

Microsoft Safety & Security Center

Article titled “See if your Windows operating system has protection built in”

dscov.com/16/09s2a

National Security Agency Article lists security configuration guides for Apple iOS and OS X, Red Hat Enterprise Linux, and Microsoft Windows

dscov.com/16/09s2b

TechTarget Article titled “Linux security guide: Linux, open source security tools and tips”

dscov.com/16/09s2c

Tap or click here to return to the Table of Contents.

Page 12: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 12

Device-Dependent and Device-Independent Operating Systems The table below identifies popular device-dependent and device-independent operating systems. You

can find additional information by entering search text from the table’s Name column.

Name Device Dependent Device Independent

Apple iOS X

Chrome OS X

Google Android X

Linux X

Mac OS X Server X

OS X X

UNIX X

Windows X

Windows Phone X

Windows Server X

Discover More: To display search results about operating systems in a new browser window or tab, tap

or click this link: dscov.com/16/09r3. Close the window or tab when you are finished viewing it.

Tap or click here to return to the Table of Contents.

Page 13: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 13

Ethics & Issues 9-3: Should You Be an Early Adopter of a New

Technology? The resource listed in the table below contains more information about early technology adoption. As

an alternative to tapping, clicking, or entering the web address, you can find desired information by

entering search text from the table’s Website Name or Description column.

Website about Early Technology Adoption

Website Name Description Web Address

idea couture Article titled “Innovation & Early Adopters: Beyond The Bell Curve”

dscov.com/16/09e3a

Tap or click here to return to the Table of Contents.

Page 14: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 14

Windows Store Figure 1 shows some of the top free, new and rising, top grossing, and top paid apps on the Windows

Store.

Figure 1: The Windows Store.

The following list identifies categories of apps available through the Windows Store.

Books & Reference

Business

Education

Entertainment

Finance

Food & Dining

Games

Government

Health & Fitness

Lifestyle

Music & Video

News & Weather

Photo

Productivity

Security

Shopping

Social

Sports

Page 15: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 15

Tools

Travel

Discover More: To display search results about Windows Store in a new browser window or tab, tap or

click this link: dscov.com/16/09r4. Close the window or tab when you are finished viewing it.

Tap or click here to return to the Table of Contents.

Page 16: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 16

Mini Feature 9-1: Windows User Interface Microsoft introduced Windows 1.0 in 1985 as a graphical user interface extension of the command-line interface of MS-DOS. Current Windows versions include: Windows 8.1 (PCs), Windows Phone 8.1 (smartphones), Embedded 8 (embedded computers), and Server 2012 R2 (network servers).

Windows 10 currently is in technical preview and is expected to be released in late 2015. Expected updates include: the return of the Start menu, a device-dependent interface, text and voice input with Cortana, and a virtual desktop.

The table below includes a history of Windows versions.

Windows Version Year Released New or Updated Features

Windows 3.x 1990 Provided a GUI

An operating environment working with DOS

Windows NT 3.1 1993 Client OS that connected to a Windows NT Advanced Server

Interface similar to Windows 3.x

Windows 95 1995 True multitasking operating system

Improved GUI

Included support for networking, Plug and Play technology, longer file names, and email

Windows NT Workstation 4.0

1996 Client OS that connected to a Windows NT Server

Interface similar to Windows 95

Network integration

Windows 98 1998 Upgrade to Windows 95

More integrated with the Internet; included Internet Explorer (a browser)

Faster system start-up and shut down, better file management, support for multimedia technologies (e.g., DVDs), and USB connectivity

Windows 2000 Professional

2000 Upgrade to Windows NT Workstation 4.0

Complete multitasking client OS designed for business personal computers

Certified device drivers, faster performance, adaptive Start menu, image viewer, enhanced for mobile users

Windows Millennium Edition (Me)

2000 Upgrade to Windows 98

Designed for the home user who wanted music playing, video editing, and networking capabilities

Windows XP

2001

Upgrade to Windows Millennium Edition called Windows XP Home Edition

Upgrade to Windows 2000 Professional called Windows XP Professional

Windows XP Tablet PC Edition designed for Tablet PC users

Windows XP Media Center Edition designed for PCs used for home entertainment

Page 17: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 17

Service Pack 1 Service Pack 2 Service Pack 3

2002 2004 2008

Windows XP Professional x64 Edition designed for workstations that use 64-bit processors

Improved interface and increased performance in all editions

Added a settings page that enabled users to set default programs and disable preinstalled programs

Added support for USB 2.0, .NET Framework, and tablet versions

More built-in security technologies, improved firewall utility, and automatic blocking of Internet pop-up advertisements

Improved security and Network Access Protection restricted computers that did not meet specified requirements

Windows Vista Service Pack 1 Service Pack 2

2006/2007 2008 2009

Upgrade to Windows XP

Easier to navigate user interface, simplified customization techniques, and improved performance and reliability

Enhanced administration of user accounts and improved firewall

New Instant Search improved searching capabilities

New Documents Explorer, Pictures Explorer, and Music Explorer improved organizing capabilities

Improved Instant Search feature, increased support for devices and drivers, compatibility with more application software, and enhanced security

Support for new hardware, increased performance, and increased security

Windows 7 2009 Upgrade to Windows Vista

Improved desktop interface and navigation

Simplified home and wireless networking

Enhanced searching capabilities

Improved performance for both desktop and laptop computers

Support for touch screen computers

Access to free, downloadable programs through the Windows Live website

Windows 8 2013 Modified user interface to be compatible with mobile device versions and touch screens

Introduced Windows Store, a marketplace to purchase and download apps

Page 18: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 18

Included security features, such as built-in antivirus protection, a secure boot process, and user authentication

Start screen replaced the traditional Start menu

Windows 10 2015 (expected) Expected changes include:

Return of the Start menu

Additional integration of touch input features

Less storage space required

Added security features such as Passport (secure sign-in) and Hello (biometric sign-in)

Universal apps that run on and sync to various devices

What features do you see as benefits to Windows? What additional features would you like included

with future releases?

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

Siri is the text and voice input feature of Microsoft Windows.

True

False

Tap or click here to return to the Table of Contents.

Page 19: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 19

Mac App Store Figure 2 shows some of the top paid, top free, and top grossing apps on the Mac App Store.

Figure 2: The Mac App Store.

The following list identifies categories of apps available through the Mac App Store.

Books

Business

Catalogs

Education

Entertainment & Finance

Food & Drink

Games

Health & Fitness

Kids

Lifestyle

Medical

Music

Navigation

Page 20: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 20

News

Newsstand

Photo & Video

Productivity

Reference

Social Networking

Sports

Travel

Utilities

Weather

Discover More: To display search results about Mac App Store in a new browser window or tab, tap or

click this link: dscov.com/16/09r5. Close the window or tab when you are finished viewing it.

Tap or click here to return to the Table of Contents.

Page 21: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 21

Mini-Feature 9-2: Mac OS In 2000, Apple introduced a brand new operating system, Mac OS X, which was vastly different from

previous versions of Mac OS. In addition to identifying each version of Mac OS X by a version number,

Apple also identifies each version with a unique name. The table below shows versions of Mac OS X that

have been released since the first version (10.0), as well as major features introduced with each new

version.

Mac OS X Version Number Year Released New or Updated Features

10.0 (Cheetah) 2001 Address book

Aqua interface

Dock

Mail

10.1 (Puma) 2001 DVD burning and playback

Increased printer support

10.2 (Jaguar) 2002 iChat

Improved Finder

Inkwell

Updated Address Book

Updated Mail app

Windows network support

10.3 (Panther) 2003 Fast user switching

FireVault

Preview

Safari 2

TextEdit

10.4 (Tiger) 2005 Dashboard

Dictionary

Mail 2

QuickTime 7

Spotlight

10.5 (Leopard) 2007 Back to My Mac

Boot Camp

iCal

Safari 3

Time Machine

10.6 (Snow Leopard) 2009 New Finder

Microsoft Exchange support

QuickTime X

Safari 4

10.7 (Lion) 2011 AirDrop

Apple Push Notification Service

FaceTime

Launchpad

Mac App Store

Mail 5

Page 22: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 22

10.8 (Mountain Lion) 2012 Game Center

Messages

Notes

Notification Center

10.9 (Mavericks) 2013 Maps

Enhanced Calendar

iCloud Keychain

Finder tabs

Tags

10.10 (Yosemite) 2014 Handoff

iCloud Drive

Instant Hotspot

New Spotlight design

Screen sharing

Send and receive SMS messages

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

Game Center was introduced with Mac OS X 10.8.

True

False

Tap or click here to return to the Table of Contents.

Page 23: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 23

Technology Innovator: Linus Torvalds When Linus Torvalds developed an operating system in 1991, he announced his project in an Internet

newsgroup. He made the source code available and asked readers for suggestions to enhance the

product. Computer users responded by reviewing the system and offering enhancements. Three years

later, he released a greatly enhanced version he called Linux. Torvalds developed this innovative

operating system when he was a 21-year-old computer science student in Finland.

Today, Torvalds leads the development of Linux as a fellow at OSDL (Open Source Development Labs), a

not-for-profit consortium of companies dedicated to developing and promoting the operating system.

Torvalds says his daily involvement with Linux involves coordinating and merging the lines of code

submitted by users so that the software runs smoothly. Although he was its original creator, because of

the number of collaborators and contributors, it is estimated that he wrote only 2 percent of the Linux

code in use today.

Among the many honors and recognitions bestowed upon Torvalds is the 2014 IEEE Computer Society

Computer Pioneer Award.

What are the advantages and disadvantages of using the Linux operating system? Why would

computer users prefer to use open source software?

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

As the key Linux developer, Linus Torvalds has written the majority of this operating system’s code being

used today.

True

False

Tap or click here to return to the Table of Contents.

Page 24: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 24

Technology Trend: Linux Powering the Internet of Things You place your brainwave-sensing headband on your forehead and finish the word game you started on

your smartphone this morning simply by thinking of the words. You then strap on your smartwatch and

check your email inbox. These devices and billions more are expected to be connected wirelessly by

2020. They are part of the Internet of Things (IoT), which is discussed in the Consider This feature in

Chapter 3 and in Mini Feature 6-1 in Chapter 6.

Linux is the one operating system used to support and connect these devices. This software is necessary

to synchronize the technology and create an environment where communications can occur among the

products. The Institute of Electrical and Electronics Engineers Standards Association (IEEE-SA) is the

organization behind coordinating the Linux standards and giving engineers a common platform to design

and test their IoT products. By using these common Linux criteria, the self-driving cars, medical devices,

home appliances, Android smartphones and tablets, and billions of other products are ensured of

working together throughout the world.

What uses would you find for IoT devices? What type of IoT product would simplify your life?

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

The IEEE-SA coordinates the Linux operating system standards that synchronize IoT devices.

True

False

Tap or click here to return to the Table of Contents.

Page 25: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 25

Secure IT 9-3: Open Source or Closed Source – Which Is More Secure? The resources listed in the table below contain more information about security issues associated with

open and closed source programs. As an alternative to tapping, clicking, or entering the web address,

you can find desired information by entering search text from the table’s Website Name or Description

column.

Websites about Open and Closed Source Security

Website Name Description Web Address

TechTarget Article titled “Open-source security model undermined by lack of resources”

dscov.com/16/09s3a

Veracode Article titled “Security Showdown: The Open Source vs. Closed Source Debate”

dscov.com/16/09s3b

ZDNet Article titled “Six open source security myths debunked – and eight real challenges to consider”

dscov.com/16/09s3c

Tap or click here to return to the Table of Contents.

Page 26: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 26

Linux Distributions and Live CDs/Live USBs The following list identifies Live CD and Live USB providers for versions of the Linux operating system.

You can find additional information by entering the list items as search text.

Finnix

Grml

Knoppix

Puppy Linux

Slax Linux

Ubuntu

The following list identifies websites that describe available Live CDs and Live USBs for various operating

systems. Many of these also include descriptions of Linux distributions. You can find additional

information by entering the list items as search text.

DistroWatch.com

KDE UserBase Wiki

Linux.com Directory

Pendrivelinux

The LiveCD List

Discover More: To display search results about Linux distributions in a new browser window or tab, tap

or click this link: dscov.com/16/09r6. Close the window or tab when you are finished viewing it.

Tap or click here to return to the Table of Contents.

Page 27: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 27

Chromebooks and Chromeboxes The following list identifies popular Chromebook and Chromebox manufacturers. You can find additional

information by entering the list items as search text.

Acer

ASUS

Dell

Google

HP

Lenovo

Samsung

Toshiba

Discover More: To display search results about Chromebooks in a new browser window or tab, tap or

click this link: dscov.com/16/09r7. Close the window or tab when you are finished viewing it.

Tap or click here to return to the Table of Contents.

Page 28: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 28

How To 9-3: Virtual Machines The resources listed in the table below contain more information about virtual machines. As an

alternative to tapping, clicking, or entering the web address, you can find desired information by

entering search text from the table’s Website Name or Description column.

Websites about Virtual Machines

Website Name Description Web Address

Digital Trends Website about the five best programs that create and run virtual machines

dscov.com/16/09h3a

How-To Geek Article titled “Beginner Geek: How to Create and Use Virtual Machines”

dscov.com/16/09h3b

VMware Website describing a popular program used to create and run virtual machines

dscov.com/16/09h3c

Tap or click here to return to the Table of Contents.

Page 29: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 29

Programs and apps

Operating system

Virtual machine

Physical machine

Virtualization software

Operating system

Virtual machine

Operating system

Virtual machine

Programs and apps

Programs and apps

High-Tech Talk: Virtualization As mentioned in the text, virtualization is the practice of sharing or pooling computing resources, such

as servers or storage devices (Figure 3). Server virtualization is a type of virtualization that divides one

physical server into several virtual servers, where each virtual server can run its own server operating

system and perform its own function. The ability to run multiple virtual servers on a single physical

server can provide significant cost savings for IT departments because it is no longer necessary to

purchase a separate physical server each time you require additional functions and capabilities. For

instance, if a company requires a web server and a server to store and share files, two physical servers

used to be required, and each of the two servers might not have even been used near or at its full

capacity. In addition, one physical server running multiple virtual servers may consume less power and

require less cooling than multiple physical servers.

Today, one physical server using virtualization can host multiple virtual servers where each one

performs a unique function, such as hosting websites. Virtualization also results in a higher utilization of

each physical server. Most new servers today are very powerful and can be configured to run multiple

virtual servers simultaneously. Factors such as the number, type, and speed of processors, amount of

memory, and hard drive capacity all determine how many virtual servers can run on a single physical

server.

In addition to having the proper hardware to support virtualization, you also must have the proper

virtualization software running on the physical server to support the virtual servers. Virtualization

software, such as VMware Server, VMware ESXi, and Microsoft Hyper-V, allows you to create one or

more virtual servers. Virtualization software manages the resources on the physical server (also called

Figure 3: An example of virtualization.

Page 30: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 30

the host server) by controlling the processing power, storage, and memory each virtual server can use. If

you do not allow a virtual machine access to enough resources, it may run slowly or may not run at all.

Carefully review the system requirements for the server operating system and software used on the

virtual server to help determine the resources you should make available to it. If you allocate too many

resources to a virtual server, those same resources may not be available to other virtual servers that

might need them.

Server virtualization is only one type of virtualization. The table below describes several additional types

of virtualization in use today:

Types of Virtualization

Type of Virtualization Description

Application virtualization Runs applications independently from the computer accessing it, and does not require installation of the application on the client computer.

Network virtualization Combines various resources, including hardware and software, to appear as if they are one, connected unit.

Operating system virtualization Allows you to run multiple operating systems on one physical computer. Many people use operating system virtualization to install multiple operating systems on their computer (such as installing Windows on a Mac).

Server virtualization Divides one physical server into multiple virtual servers, each performing a different function.

Storage virtualization Multiple storage devices that are connected to a network, appearing as a single storage device.

Have you seen examples of virtualization in use? Where? In what other ways might virtualization be

beneficial to businesses?

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

VMWare ESXi is an example of virtualization software.

True

False

Tap or click here to return to the Table of Contents.

Page 31: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 31

Windows Server and OS X Server Current capabilities of the latest version of Microsoft’s Windows Server include the following:

Automatic rerouting around storage, server, and network failures

Data access management and information protection

Data center management

Diverse storage choices

Link with public cloud storage services

Multi-server manageability

Private clouds

Server virtualization

Support for open frameworks and open source software

Virtual Desktop Infrastructure (VDI)

Current capabilities of the latest version of OS X Server include the following:

Caching server

Calendar server

Contacts server

File sharing

Mail server

Messages server

NetInstall (provides capability to boot from a network)

Profile manager integrated with Apple Push Notification Service

Share folders, exchange files, and access documents within a group on a Mac, iPad, or PC

Supports UNIX permissions and access control lists (ACLs)

Time Machine backups

Virtual Private Network (VPN) server

Wiki server

Xsan (storage area network)

Discover More: To display search results about Windows Server and OS X Server in a new browser

window or tab, tap or click this link: dscov.com/16/09r8. Close the window or tab when you are finished

viewing it.

Tap or click here to return to the Table of Contents.

Page 32: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 32

Technology Innovator: Sun “The network is the computer,” according to Sun Microsystems’ vision. Corporation leaders believed

network participation drives originality, development, and open source leadership. In 2010, Oracle

acquired Sun Microsystems for approximately $7.4 billion. Sun’s products now are marketed under the

Oracle name, but the company still is remembered for its many contributions in shaping the technology

of today.

Nearly every sector of society and industry uses products Sun originally developed. Sun created

software, systems, services, and electronics that help run billions of devices, ranging from the world’s

largest data centers to some of the smallest consumer electronics. The company was the creator and

leading advocate of Java technology. Other top products were the MySQL database management

system, the StorageTek tape and library storage system, and the UltraSPARC processor.

What contributions did Sun make to help shape the open source movement?

Answer the following question by tapping or clicking the best response, which will open a browser

window or tab that reveals whether your selection is correct or incorrect. Close the window or tab when

you are finished viewing it.

Which company acquired Sun in 2010?

a. Apple

b. Google

c. Microsoft

d. Oracle

Tap or click here to return to the Table of Contents.

Page 33: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 33

Technology Innovator: IBM The impact of IBM, nicknamed “Big Blue,” on technology is indisputable. IBM is credited with inventing

floppy disks, hard drives, ATMs, magnetic stripe card technologies, and more. Its services, consulting,

and infrastructure components have helped companies develop new business ventures, and its systems

supply nearly one-half of the world’s supercomputing processing power. The company’s research is

focused on five initiatives: cloud, Big Data and analytics, mobile, social business, and security.

The corporation was founded in 1911 as the Computing Tabulating Recording Company when three

companies merged to sell business-related gadgets, including a machine that used punched cards to

catalog data. Nine years later, Thomas J. Watson became chairman and changed the company’s name to

International Business Machines (IBM), which reflected its new direction toward introducing innovative

products to a global market. For more than 20 years, IBM held the record for most U.S. patents granted

annually. The company’s clocks are among the more popular collectible products, and many are still in

use today.

In 2005, IBM sold its PC business, including the popular ThinkPad brand, to Japanese company Lenovo.

Lenovo now is one of the largest PC manufacturers in the world. IBM continues to develop innovative

products and has laboratories around the world devoted to research. Its Watson computer system can

read and understand natural language and is named for IBM’s founder, Thomas J. Watson.

Have you used any IBM products? How did IBM help shape the technology you use today?

Answer the following question by tapping or clicking the best response, which will open a browser

window or tab that reveals whether your selection is correct or incorrect. Close the window or tab when

you are finished viewing it.

IBM sold its PC business to which company?

a. Gateway

b. Lenovo

c. Samsung

d. Toshiba

Tap or click here to return to the Table of Contents.

Page 34: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 34

Ethics & Issues 9-4: Should Text Messages Sent by Employees Be

Private? The resources listed in the table below contain more information about employee text message privacy.

As an alternative to tapping, clicking, or entering the web address, you can find desired information by

entering search text from the table’s Website Name or Description column.

Websites about Employee Text Message Privacy

Website Name Description Web Address

CIO Article titled “What Can Employers Really See on a BYOD Smartphone or Tablet?”

dscov.com/16/09e4a

Daily Mail Article titled “Is your boss reading your text messages? Two-thirds of employers are now using electronic monitoring on company equipment”

dscov.com/16/09e4b

Tap or click here to return to the Table of Contents.

Page 35: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 35

Secure IT 9-4: BYOD Security Issues The resources listed in the table below contain more information about security issues associated with

BYOD (bring your own device). As an alternative to tapping, clicking, or entering the web address, you

can find desired information by entering search text from the table’s Website Name or Description

column.

Websites about BYOD Security Issues

Website Name Description Web Address

ComputerWeekly.com Article titled “BYOD: data protection and information security issues”

dscov.com/16/09s4a

Privacy Rights Clearinghouse Article titled “Fact Sheet 40: Bring Your Own Device . . . at Your Own Risk”

dscov.com/16/09s4b

TechTarget Article titled “BYOD security strategies: Balancing BYOD risks and rewards”

dscov.com/16/09s4c

Tap or click here to return to the Table of Contents.

Page 36: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 36

Android The following list identifies types of computers and devices equipped with the Android operating

system. Apps for these devices are available from the Amazon Appstore for Android and the Google Play

store. You can find additional information by entering the text, android, followed by the list item as

search text.

Navigation systems

Smart TVs

Smartphones

Smartwatches

Tablets

Discover More: To display search results about devices that use the Android operating system in a new

browser window or tab, tap or click this link: dscov.com/16/09r9. Close the window or tab when you are

finished viewing it.

Tap or click here to return to the Table of Contents.

Page 37: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 37

iOS The following list identifies types of computers and devices equipped with the iOS operating system.

Apps for these devices are available from the iTunes Store. You can find additional information by

entering the text, ios, followed by the list item as search text.

Digital media players

Portable media players

Smartphones

Smartwatches

Tablets

Discover More: To display search results about devices that use the iOS operating system in a new

browser window or tab, tap or click this link: dscov.com/16/09r10. Close the window or tab when you

are finished viewing it.

Tap or click here to return to the Table of Contents.

Page 38: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 38

Windows Phone The Windows Phone operating system is found on smartphones developed by Microsoft. Apps for these

phones are available from the Windows Phone store. You can find additional information by entering

the text, windows phones.

Discover More: To display search results about devices that use the Windows Phone operating system in

a new browser window or tab, tap or click this link: dscov.com/16/09r11. Close the window or tab when

you are finished viewing it.

Tap or click here to return to the Table of Contents.

Page 39: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 39

Technology Trend: Mobile versus Desktop Operating System Usage The resources listed in the table below contain more information about mobile and desktop operating

system usage. As an alternative to tapping, clicking, or entering the web address, you can find desired

information by entering search text from the table’s Website Name or Description column.

Websites about Mobile and Desktop Operating System Usage

Website Name Description Web Address

IDC Article describing how Android and iOS have grown to more than 96 percent of the smartphone operating system market

dscov.com/16/09t2a

IT World Article titled “How does Android stack up as a desktop operating system?”

dscov.com/16/09t2b

w3schools.com Article titled “OS Platform Statistics” dscov.com/16/09t2c

Tap or click here to return to the Table of Contents.

Page 40: Table of Contents - Cengage...Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources Discovering Computers 2016 Page 1 Table of Contents Tap or

Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources

Discovering Computers 2016 Page 40

Technology @ Work: Meteorology The resources listed in the table below contain more information about how the meteorology industry

uses technology. As an alternative to tapping, clicking, or entering the web address, you can find desired

information by entering search text from the table’s Website Name or Description column.

Websites about Technology in Meteorology

Website Name Description Web Address

Meteorological Technology World Expo

Website for the Meteorological Technology World Expo that showcases advances in meteorological technologies

dscov.com/16/09w1a

National Hurricane Center Information about the Technology and Science branch of the National Hurricane Center

dscov.com/16/09w1b

Science Daily Article titled “GPS technology improves weather forecasting”

dscov.com/16/09w1c

Tap or click here to return to the Table of Contents.