table of contents - cengage...chapter 9 free resources operating systems: managing, coordinating,...
TRANSCRIPT
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 1
Table of Contents Tap or click any topic below to view its content.
TABLE OF CONTENTS .............................................................................................................................................. 1
DISCLAIMER ........................................................................................................................................................... 3
RESTARTING DESKTOPS AND LAPTOPS .................................................................................................................. 4
SINGLE TASKING, MULTITASKING, AND MULTIUSER OPERATING SYSTEMS ........................................................... 5
HIGH-TECH TALK: BENCHMARKING ........................................................................................................................ 6
Benchmarking Algorithms ..................................................................................................................................... 7
ETHICS & ISSUES 9-1: SHOULD MANUFACTURERS INCLUDE EXTRA PROGRAMS IN OPERATING SYSTEMS FOR
COMPUTERS AND MOBILE DEVICES? ..................................................................................................................... 9
Websites about Bloatware .................................................................................................................................... 9
SECURE IT 9-1: AUTOMATIC UPDATES – SAFE OR NOT? ....................................................................................... 10
Websites about Automatic Updates’ Safety ....................................................................................................... 10
SECURE IT 9-2: USING AND EVALUATING AN OPERATING SYSTEM’S BUILT-IN SECURITY TOOLS .......................... 11
Websites about Operating Systems’ Built-In Security Tools ................................................................................ 11
DEVICE-DEPENDENT AND DEVICE-INDEPENDENT OPERATING SYSTEMS .............................................................. 12
ETHICS & ISSUES 9-3: SHOULD YOU BE AN EARLY ADOPTER OF A NEW TECHNOLOGY? ....................................... 13
Website about Early Technology Adoption ......................................................................................................... 13
WINDOWS STORE ................................................................................................................................................ 14
MINI FEATURE 9-1: WINDOWS USER INTERFACE ................................................................................................. 16
MAC APP STORE .................................................................................................................................................. 19
MINI-FEATURE 9-2: MAC OS ................................................................................................................................ 21
TECHNOLOGY INNOVATOR: LINUS TORVALDS ..................................................................................................... 23
TECHNOLOGY TREND: LINUX POWERING THE INTERNET OF THINGS ................................................................... 24
SECURE IT 9-3: OPEN SOURCE OR CLOSED SOURCE – WHICH IS MORE SECURE? .................................................. 25
Websites about Open and Closed Source Security .............................................................................................. 25
LINUX DISTRIBUTIONS AND LIVE CDS/LIVE USBS ................................................................................................. 26
CHROMEBOOKS AND CHROMEBOXES ................................................................................................................. 27
HOW TO 9-3: VIRTUAL MACHINES ....................................................................................................................... 28
Websites about Virtual Machines ....................................................................................................................... 28
HIGH-TECH TALK: VIRTUALIZATION ..................................................................................................................... 29
Types of Virtualization ........................................................................................................................................ 30
WINDOWS SERVER AND OS X SERVER ................................................................................................................. 31
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 2
TECHNOLOGY INNOVATOR: SUN ......................................................................................................................... 32
TECHNOLOGY INNOVATOR: IBM .......................................................................................................................... 33
ETHICS & ISSUES 9-4: SHOULD TEXT MESSAGES SENT BY EMPLOYEES BE PRIVATE? ............................................ 34
Websites about Employee Text Message Privacy ............................................................................................... 34
SECURE IT 9-4: BYOD SECURITY ISSUES ................................................................................................................ 35
Websites about BYOD Security Issues ................................................................................................................. 35
ANDROID ............................................................................................................................................................. 36
IOS ....................................................................................................................................................................... 37
WINDOWS PHONE ............................................................................................................................................... 38
TECHNOLOGY TREND: MOBILE VERSUS DESKTOP OPERATING SYSTEM USAGE ................................................... 39
Websites about Mobile and Desktop Operating System Usage .......................................................................... 39
TECHNOLOGY @ WORK: METEOROLOGY ............................................................................................................. 40
Websites about Technology in Meteorology ...................................................................................................... 40
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 3
Disclaimer Cengage Learning and the Shelly Cashman authoring team do not support and are not responsible for
the content of material in third-party or external web/Internet sites. Opinions expressed at third-party
or external web/Internet sites do not necessarily reflect that of Cengage Learning or the Shelly Cashman
authoring team.
The Free Resources include links to web addresses at dscov.com. Web addresses with this domain will
redirect to the actual websites or resources listed and are provided as abbreviated links for students
who wish to type them into a browser.
Tap or click here to return to the Table of Contents.
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 4
Restarting Desktops and Laptops Options to restart a computer running the Windows 8 operating system include the following:
Tap or click the Shut down or Power Options button on the sign-in screen and then tap or click
Restart on the Shut down or Power Options menu
Tap or click the Settings charm on the Charms bar, tap or click the Power button on the Settings
menu, and then tap or click Restart
Press CTRL+ALT+DELETE, tap or click the Power button in the lower-right corner of the screen,
and then tap or click Restart
Options to restart computer running the Mac OS operating system include the following:
Click Restart on the Apple menu
Hold down the computer or device’s Power button or press its Restart button
Press CTRL+EJECT and then click Restart
Indicate whether the following statement is true or false by tapping or clicking your response, which
will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the
window or tab when you are finished viewing it.
The same procedures can be used to restart Windows computers and Apple computers.
True
False
Tap or click here to return to the Table of Contents.
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 5
Single Tasking, Multitasking, and Multiuser Operating Systems The following lists identify examples of single-tasking, multitasking, and multiuser operating systems.
You can find additional information by entering the list items as search text.
Single tasking operating systems
o MS-DOS
o Embedded operating systems found in electronics and machinery
Multitasking operating systems
o Linux
o Mac OS
o Windows
Multiuser operating systems
o Linux
o Mac OS X Serer
o UNIX
o Windows Server
Indicate whether the following statement is true or false by tapping or clicking your response, which
will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the
window or tab when you are finished viewing it.
UNIX is an example of a multiuser operating system.
True
False
Tap or click here to return to the Table of Contents.
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 6
High-Tech Talk: Benchmarking A benchmark is a surveyor’s reference mark — a point of reference from which other measurements can
be made. Benchmarking is used to evaluate various aspects of enterprises and is widely used in
computer technology. Additional types of benchmarking exist, such as process benchmarking and
performance benchmarking. In computer technology, a benchmark is a set of conditions used to
measure the performance of hardware or software. Benchmark testing involves running a set of
standard tests to compare the performance of two or more systems. Websites and programs are
available that can perform simple benchmark tests against parameters such as the speed of a
computer’s processor or the speed of the Internet connection. The computer industry, however, uses
far more complex benchmark tests.
Suppose you are a network administrator and need to buy new servers to support your organization’s e-
commerce website. To start, you can access published benchmark results from organizations such as
SPEC and TPC. Both SPEC (Standard Performance Evaluation Corporation) and TPC (Transaction
Processing Performance Counsel) are nonprofit groups that define and maintain benchmarks for the
computer industry. TPC, for example, tests using its TPC Benchmark W (TPC-W), which measures how
servers perform while supporting an e-commerce website. Reading published benchmark test results
from these groups can help you determine how one vendor’s system might perform relative to
another’s.
To understand benchmark results fully, you should understand the design and measurements (or
metrics) used for the test. The TPC-W benchmark, for example, uses two primary metrics: WIPS and
$/WIPS. WIPS is the number of web interactions per second that can be sustained by the system under
test, or SUT (in this case, multiple servers). The $/WIPS is the system cost per WIPS, which is the total
cost of the SUT divided by WIPS.
To calculate WIPS, TPC-W uses several algorithms, or formulas. One calculation is Web Interaction
Response Time (WIRT), which is the time it takes to complete a web interaction. A web interaction might
start when a user taps or clicks a link to request a webpage and ends when the browser receives all of
the data from the requested webpage. WIRT is calculated using the algorithm shown in the table below.
Using this algorithm, if a web interaction starts at 1:00:00 and the last byte of data is sent at 1:00:07, the
WIRT is 7 seconds.
WIRT is used to calculate the number of web interactions successfully completed during the length of
the benchmark test, or measurement interval. During the measurement interval, the browser
repeatedly cycles through requesting and then receiving a requested page, measuring the time to
receive it (WIRT), and then requesting the next page. To be considered a successful web interaction,
each type of web interaction must have a WIRT less than the TPC-specified constraint. For example, a
home page web interaction must have a WIRT of less than three seconds or it is not used when
calculating WIPS.
The total number of successful web interactions completed in a measurement interval is used to
calculate WIPS. WIPS is calculated using the algorithm shown in the table below. Using this algorithm, if
14,009,400 web interactions are completed successfully during a 30-minute test period, the WIPS rating
for the system is 14,009,400/1,800 or 7,783 WIPs. The higher the WIPS rating, the more requests the
web server can handle per second.
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 7
The $/WIPS rating is determined by dividing the price of the SUT by the WIPS value. Using this algorithm,
if a system rated as 7,783 WIPS costs $190,036, the $/WIPS rating is $190,036/7,783 or 24.42.
The TPC-W benchmark also measures the total number of connections a web server can handle. Using
the algorithm shown in the table below, if a website supports 35,000 browsers using 10 web servers,
each web server is supporting 2 * (35,000/10), or 7,000 connections.
Benchmarking Algorithms
Web Interaction Response Time (WIRT)
Defined by the algorithm, WIRT = T2 – T1, where T1 = time when the first byte of request is sent to the web server; and T2 = time after the last byte of a requested webpage is received by the browser
Web Interactions Per Second (WIPS)
Defined by the algorithm, WI/(MI), where: WI = total number of web interactions completed successfully; and MI = length of the measurement interval in seconds
System Cost Per WIPS ($/WIPS)
Defined by the algorithm, System Cost/WIPS, where: System Cost = entire price of the SUT, including all new hardware, software, and three-year maintenance charges; and WIPS = web interactions successfully completed
Total Number of Connections Supported by a Web Server
Defined by the algorithm, 2 * (Number of Browsers/Web Servers), where 2 represents the 2 connections per user (one nonsecure, one secure), Number of Browsers is the number of users browsing the website; and Web Servers is the number of web servers supporting the website
Data points such as WIPS, $/WIPS, and number of connections are the result of a benchmarking process.
These data points provide the detailed information required to make informed purchasing decisions. For
example, the WIPS and $/WIPS ratings in a benchmark report can help you better understand how the
servers will perform in the real-world environment of your e-commerce website.
The TPC-W benchmark is just one of numerous industry benchmarks used to test different aspects of
systems’ performance.
What other reasons make benchmarking important?
Indicate whether the following statement is true or false by tapping or clicking your response, which
will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the
window or tab when you are finished viewing it.
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 8
TPC-W is the number of web interactions per second that can be sustained by the system being tested.
True
False
Tap or click here to return to the Table of Contents.
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 9
Ethics & Issues 9-1: Should Manufacturers Include Extra Programs in
Operating Systems for Computers and Mobile Devices? The resources listed in the table below contain more information about bloatware. As an alternative to
tapping, clicking, or entering the web address, you can find desired information by entering search text
from the table’s Website Name or Description column.
Websites about Bloatware
Website Name Description Web Address
Business Insider Article titled “Lenovo: We're done with 'bloatware' and 'adware'”
dscov.com/16/09e1a
PC World Article about cleaning bloatware off of your computer
dscov.com/16/09e1b
Tap or click here to return to the Table of Contents.
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 10
Secure IT 9-1: Automatic Updates – Safe or Not? The resources listed in the table below contain more information about issues related to automatic
updates. As an alternative to tapping, clicking, or entering the web address, you can find desired
information by entering search text from the table’s Website Name or Description column.
Websites about Automatic Updates’ Safety
Website Name Description Web Address
About Tech Article titled “How To Fix Problems Caused by Windows Updates”
dscov.com/16/09s1a
CNET Article titled “How to troubleshoot software-update problems”
dscov.com/16/09s1b
Gizmo’s Freeware Article titled “Best Free Software Update Monitor”
dscov.com/16/09s1c
Tap or click here to return to the Table of Contents.
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 11
Secure IT 9-2: Using and Evaluating an Operating System’s Built-In
Security Tools The resources listed in the table below contain more information about an operating system’s built-in
security tools. As an alternative to tapping, clicking, or entering the web address, you can find desired
information by entering search text from the table’s Website Name or Description column.
Websites about Operating Systems’ Built-In Security Tools
Website Name Description Web Address
Microsoft Safety & Security Center
Article titled “See if your Windows operating system has protection built in”
dscov.com/16/09s2a
National Security Agency Article lists security configuration guides for Apple iOS and OS X, Red Hat Enterprise Linux, and Microsoft Windows
dscov.com/16/09s2b
TechTarget Article titled “Linux security guide: Linux, open source security tools and tips”
dscov.com/16/09s2c
Tap or click here to return to the Table of Contents.
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 12
Device-Dependent and Device-Independent Operating Systems The table below identifies popular device-dependent and device-independent operating systems. You
can find additional information by entering search text from the table’s Name column.
Name Device Dependent Device Independent
Apple iOS X
Chrome OS X
Google Android X
Linux X
Mac OS X Server X
OS X X
UNIX X
Windows X
Windows Phone X
Windows Server X
Discover More: To display search results about operating systems in a new browser window or tab, tap
or click this link: dscov.com/16/09r3. Close the window or tab when you are finished viewing it.
Tap or click here to return to the Table of Contents.
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 13
Ethics & Issues 9-3: Should You Be an Early Adopter of a New
Technology? The resource listed in the table below contains more information about early technology adoption. As
an alternative to tapping, clicking, or entering the web address, you can find desired information by
entering search text from the table’s Website Name or Description column.
Website about Early Technology Adoption
Website Name Description Web Address
idea couture Article titled “Innovation & Early Adopters: Beyond The Bell Curve”
dscov.com/16/09e3a
Tap or click here to return to the Table of Contents.
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 14
Windows Store Figure 1 shows some of the top free, new and rising, top grossing, and top paid apps on the Windows
Store.
Figure 1: The Windows Store.
The following list identifies categories of apps available through the Windows Store.
Books & Reference
Business
Education
Entertainment
Finance
Food & Dining
Games
Government
Health & Fitness
Lifestyle
Music & Video
News & Weather
Photo
Productivity
Security
Shopping
Social
Sports
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 15
Tools
Travel
Discover More: To display search results about Windows Store in a new browser window or tab, tap or
click this link: dscov.com/16/09r4. Close the window or tab when you are finished viewing it.
Tap or click here to return to the Table of Contents.
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 16
Mini Feature 9-1: Windows User Interface Microsoft introduced Windows 1.0 in 1985 as a graphical user interface extension of the command-line interface of MS-DOS. Current Windows versions include: Windows 8.1 (PCs), Windows Phone 8.1 (smartphones), Embedded 8 (embedded computers), and Server 2012 R2 (network servers).
Windows 10 currently is in technical preview and is expected to be released in late 2015. Expected updates include: the return of the Start menu, a device-dependent interface, text and voice input with Cortana, and a virtual desktop.
The table below includes a history of Windows versions.
Windows Version Year Released New or Updated Features
Windows 3.x 1990 Provided a GUI
An operating environment working with DOS
Windows NT 3.1 1993 Client OS that connected to a Windows NT Advanced Server
Interface similar to Windows 3.x
Windows 95 1995 True multitasking operating system
Improved GUI
Included support for networking, Plug and Play technology, longer file names, and email
Windows NT Workstation 4.0
1996 Client OS that connected to a Windows NT Server
Interface similar to Windows 95
Network integration
Windows 98 1998 Upgrade to Windows 95
More integrated with the Internet; included Internet Explorer (a browser)
Faster system start-up and shut down, better file management, support for multimedia technologies (e.g., DVDs), and USB connectivity
Windows 2000 Professional
2000 Upgrade to Windows NT Workstation 4.0
Complete multitasking client OS designed for business personal computers
Certified device drivers, faster performance, adaptive Start menu, image viewer, enhanced for mobile users
Windows Millennium Edition (Me)
2000 Upgrade to Windows 98
Designed for the home user who wanted music playing, video editing, and networking capabilities
Windows XP
2001
Upgrade to Windows Millennium Edition called Windows XP Home Edition
Upgrade to Windows 2000 Professional called Windows XP Professional
Windows XP Tablet PC Edition designed for Tablet PC users
Windows XP Media Center Edition designed for PCs used for home entertainment
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 17
Service Pack 1 Service Pack 2 Service Pack 3
2002 2004 2008
Windows XP Professional x64 Edition designed for workstations that use 64-bit processors
Improved interface and increased performance in all editions
Added a settings page that enabled users to set default programs and disable preinstalled programs
Added support for USB 2.0, .NET Framework, and tablet versions
More built-in security technologies, improved firewall utility, and automatic blocking of Internet pop-up advertisements
Improved security and Network Access Protection restricted computers that did not meet specified requirements
Windows Vista Service Pack 1 Service Pack 2
2006/2007 2008 2009
Upgrade to Windows XP
Easier to navigate user interface, simplified customization techniques, and improved performance and reliability
Enhanced administration of user accounts and improved firewall
New Instant Search improved searching capabilities
New Documents Explorer, Pictures Explorer, and Music Explorer improved organizing capabilities
Improved Instant Search feature, increased support for devices and drivers, compatibility with more application software, and enhanced security
Support for new hardware, increased performance, and increased security
Windows 7 2009 Upgrade to Windows Vista
Improved desktop interface and navigation
Simplified home and wireless networking
Enhanced searching capabilities
Improved performance for both desktop and laptop computers
Support for touch screen computers
Access to free, downloadable programs through the Windows Live website
Windows 8 2013 Modified user interface to be compatible with mobile device versions and touch screens
Introduced Windows Store, a marketplace to purchase and download apps
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 18
Included security features, such as built-in antivirus protection, a secure boot process, and user authentication
Start screen replaced the traditional Start menu
Windows 10 2015 (expected) Expected changes include:
Return of the Start menu
Additional integration of touch input features
Less storage space required
Added security features such as Passport (secure sign-in) and Hello (biometric sign-in)
Universal apps that run on and sync to various devices
What features do you see as benefits to Windows? What additional features would you like included
with future releases?
Indicate whether the following statement is true or false by tapping or clicking your response, which
will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the
window or tab when you are finished viewing it.
Siri is the text and voice input feature of Microsoft Windows.
True
False
Tap or click here to return to the Table of Contents.
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 19
Mac App Store Figure 2 shows some of the top paid, top free, and top grossing apps on the Mac App Store.
Figure 2: The Mac App Store.
The following list identifies categories of apps available through the Mac App Store.
Books
Business
Catalogs
Education
Entertainment & Finance
Food & Drink
Games
Health & Fitness
Kids
Lifestyle
Medical
Music
Navigation
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 20
News
Newsstand
Photo & Video
Productivity
Reference
Social Networking
Sports
Travel
Utilities
Weather
Discover More: To display search results about Mac App Store in a new browser window or tab, tap or
click this link: dscov.com/16/09r5. Close the window or tab when you are finished viewing it.
Tap or click here to return to the Table of Contents.
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 21
Mini-Feature 9-2: Mac OS In 2000, Apple introduced a brand new operating system, Mac OS X, which was vastly different from
previous versions of Mac OS. In addition to identifying each version of Mac OS X by a version number,
Apple also identifies each version with a unique name. The table below shows versions of Mac OS X that
have been released since the first version (10.0), as well as major features introduced with each new
version.
Mac OS X Version Number Year Released New or Updated Features
10.0 (Cheetah) 2001 Address book
Aqua interface
Dock
10.1 (Puma) 2001 DVD burning and playback
Increased printer support
10.2 (Jaguar) 2002 iChat
Improved Finder
Inkwell
Updated Address Book
Updated Mail app
Windows network support
10.3 (Panther) 2003 Fast user switching
FireVault
Preview
Safari 2
TextEdit
10.4 (Tiger) 2005 Dashboard
Dictionary
Mail 2
QuickTime 7
Spotlight
10.5 (Leopard) 2007 Back to My Mac
Boot Camp
iCal
Safari 3
Time Machine
10.6 (Snow Leopard) 2009 New Finder
Microsoft Exchange support
QuickTime X
Safari 4
10.7 (Lion) 2011 AirDrop
Apple Push Notification Service
FaceTime
Launchpad
Mac App Store
Mail 5
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 22
10.8 (Mountain Lion) 2012 Game Center
Messages
Notes
Notification Center
10.9 (Mavericks) 2013 Maps
Enhanced Calendar
iCloud Keychain
Finder tabs
Tags
10.10 (Yosemite) 2014 Handoff
iCloud Drive
Instant Hotspot
New Spotlight design
Screen sharing
Send and receive SMS messages
Indicate whether the following statement is true or false by tapping or clicking your response, which
will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the
window or tab when you are finished viewing it.
Game Center was introduced with Mac OS X 10.8.
True
False
Tap or click here to return to the Table of Contents.
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 23
Technology Innovator: Linus Torvalds When Linus Torvalds developed an operating system in 1991, he announced his project in an Internet
newsgroup. He made the source code available and asked readers for suggestions to enhance the
product. Computer users responded by reviewing the system and offering enhancements. Three years
later, he released a greatly enhanced version he called Linux. Torvalds developed this innovative
operating system when he was a 21-year-old computer science student in Finland.
Today, Torvalds leads the development of Linux as a fellow at OSDL (Open Source Development Labs), a
not-for-profit consortium of companies dedicated to developing and promoting the operating system.
Torvalds says his daily involvement with Linux involves coordinating and merging the lines of code
submitted by users so that the software runs smoothly. Although he was its original creator, because of
the number of collaborators and contributors, it is estimated that he wrote only 2 percent of the Linux
code in use today.
Among the many honors and recognitions bestowed upon Torvalds is the 2014 IEEE Computer Society
Computer Pioneer Award.
What are the advantages and disadvantages of using the Linux operating system? Why would
computer users prefer to use open source software?
Indicate whether the following statement is true or false by tapping or clicking your response, which
will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the
window or tab when you are finished viewing it.
As the key Linux developer, Linus Torvalds has written the majority of this operating system’s code being
used today.
True
False
Tap or click here to return to the Table of Contents.
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 24
Technology Trend: Linux Powering the Internet of Things You place your brainwave-sensing headband on your forehead and finish the word game you started on
your smartphone this morning simply by thinking of the words. You then strap on your smartwatch and
check your email inbox. These devices and billions more are expected to be connected wirelessly by
2020. They are part of the Internet of Things (IoT), which is discussed in the Consider This feature in
Chapter 3 and in Mini Feature 6-1 in Chapter 6.
Linux is the one operating system used to support and connect these devices. This software is necessary
to synchronize the technology and create an environment where communications can occur among the
products. The Institute of Electrical and Electronics Engineers Standards Association (IEEE-SA) is the
organization behind coordinating the Linux standards and giving engineers a common platform to design
and test their IoT products. By using these common Linux criteria, the self-driving cars, medical devices,
home appliances, Android smartphones and tablets, and billions of other products are ensured of
working together throughout the world.
What uses would you find for IoT devices? What type of IoT product would simplify your life?
Indicate whether the following statement is true or false by tapping or clicking your response, which
will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the
window or tab when you are finished viewing it.
The IEEE-SA coordinates the Linux operating system standards that synchronize IoT devices.
True
False
Tap or click here to return to the Table of Contents.
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 25
Secure IT 9-3: Open Source or Closed Source – Which Is More Secure? The resources listed in the table below contain more information about security issues associated with
open and closed source programs. As an alternative to tapping, clicking, or entering the web address,
you can find desired information by entering search text from the table’s Website Name or Description
column.
Websites about Open and Closed Source Security
Website Name Description Web Address
TechTarget Article titled “Open-source security model undermined by lack of resources”
dscov.com/16/09s3a
Veracode Article titled “Security Showdown: The Open Source vs. Closed Source Debate”
dscov.com/16/09s3b
ZDNet Article titled “Six open source security myths debunked – and eight real challenges to consider”
dscov.com/16/09s3c
Tap or click here to return to the Table of Contents.
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 26
Linux Distributions and Live CDs/Live USBs The following list identifies Live CD and Live USB providers for versions of the Linux operating system.
You can find additional information by entering the list items as search text.
Finnix
Grml
Knoppix
Puppy Linux
Slax Linux
Ubuntu
The following list identifies websites that describe available Live CDs and Live USBs for various operating
systems. Many of these also include descriptions of Linux distributions. You can find additional
information by entering the list items as search text.
DistroWatch.com
KDE UserBase Wiki
Linux.com Directory
Pendrivelinux
The LiveCD List
Discover More: To display search results about Linux distributions in a new browser window or tab, tap
or click this link: dscov.com/16/09r6. Close the window or tab when you are finished viewing it.
Tap or click here to return to the Table of Contents.
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 27
Chromebooks and Chromeboxes The following list identifies popular Chromebook and Chromebox manufacturers. You can find additional
information by entering the list items as search text.
Acer
ASUS
Dell
HP
Lenovo
Samsung
Toshiba
Discover More: To display search results about Chromebooks in a new browser window or tab, tap or
click this link: dscov.com/16/09r7. Close the window or tab when you are finished viewing it.
Tap or click here to return to the Table of Contents.
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 28
How To 9-3: Virtual Machines The resources listed in the table below contain more information about virtual machines. As an
alternative to tapping, clicking, or entering the web address, you can find desired information by
entering search text from the table’s Website Name or Description column.
Websites about Virtual Machines
Website Name Description Web Address
Digital Trends Website about the five best programs that create and run virtual machines
dscov.com/16/09h3a
How-To Geek Article titled “Beginner Geek: How to Create and Use Virtual Machines”
dscov.com/16/09h3b
VMware Website describing a popular program used to create and run virtual machines
dscov.com/16/09h3c
Tap or click here to return to the Table of Contents.
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 29
Programs and apps
Operating system
Virtual machine
Physical machine
Virtualization software
Operating system
Virtual machine
Operating system
Virtual machine
Programs and apps
Programs and apps
High-Tech Talk: Virtualization As mentioned in the text, virtualization is the practice of sharing or pooling computing resources, such
as servers or storage devices (Figure 3). Server virtualization is a type of virtualization that divides one
physical server into several virtual servers, where each virtual server can run its own server operating
system and perform its own function. The ability to run multiple virtual servers on a single physical
server can provide significant cost savings for IT departments because it is no longer necessary to
purchase a separate physical server each time you require additional functions and capabilities. For
instance, if a company requires a web server and a server to store and share files, two physical servers
used to be required, and each of the two servers might not have even been used near or at its full
capacity. In addition, one physical server running multiple virtual servers may consume less power and
require less cooling than multiple physical servers.
Today, one physical server using virtualization can host multiple virtual servers where each one
performs a unique function, such as hosting websites. Virtualization also results in a higher utilization of
each physical server. Most new servers today are very powerful and can be configured to run multiple
virtual servers simultaneously. Factors such as the number, type, and speed of processors, amount of
memory, and hard drive capacity all determine how many virtual servers can run on a single physical
server.
In addition to having the proper hardware to support virtualization, you also must have the proper
virtualization software running on the physical server to support the virtual servers. Virtualization
software, such as VMware Server, VMware ESXi, and Microsoft Hyper-V, allows you to create one or
more virtual servers. Virtualization software manages the resources on the physical server (also called
Figure 3: An example of virtualization.
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 30
the host server) by controlling the processing power, storage, and memory each virtual server can use. If
you do not allow a virtual machine access to enough resources, it may run slowly or may not run at all.
Carefully review the system requirements for the server operating system and software used on the
virtual server to help determine the resources you should make available to it. If you allocate too many
resources to a virtual server, those same resources may not be available to other virtual servers that
might need them.
Server virtualization is only one type of virtualization. The table below describes several additional types
of virtualization in use today:
Types of Virtualization
Type of Virtualization Description
Application virtualization Runs applications independently from the computer accessing it, and does not require installation of the application on the client computer.
Network virtualization Combines various resources, including hardware and software, to appear as if they are one, connected unit.
Operating system virtualization Allows you to run multiple operating systems on one physical computer. Many people use operating system virtualization to install multiple operating systems on their computer (such as installing Windows on a Mac).
Server virtualization Divides one physical server into multiple virtual servers, each performing a different function.
Storage virtualization Multiple storage devices that are connected to a network, appearing as a single storage device.
Have you seen examples of virtualization in use? Where? In what other ways might virtualization be
beneficial to businesses?
Indicate whether the following statement is true or false by tapping or clicking your response, which
will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the
window or tab when you are finished viewing it.
VMWare ESXi is an example of virtualization software.
True
False
Tap or click here to return to the Table of Contents.
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 31
Windows Server and OS X Server Current capabilities of the latest version of Microsoft’s Windows Server include the following:
Automatic rerouting around storage, server, and network failures
Data access management and information protection
Data center management
Diverse storage choices
Link with public cloud storage services
Multi-server manageability
Private clouds
Server virtualization
Support for open frameworks and open source software
Virtual Desktop Infrastructure (VDI)
Current capabilities of the latest version of OS X Server include the following:
Caching server
Calendar server
Contacts server
File sharing
Mail server
Messages server
NetInstall (provides capability to boot from a network)
Profile manager integrated with Apple Push Notification Service
Share folders, exchange files, and access documents within a group on a Mac, iPad, or PC
Supports UNIX permissions and access control lists (ACLs)
Time Machine backups
Virtual Private Network (VPN) server
Wiki server
Xsan (storage area network)
Discover More: To display search results about Windows Server and OS X Server in a new browser
window or tab, tap or click this link: dscov.com/16/09r8. Close the window or tab when you are finished
viewing it.
Tap or click here to return to the Table of Contents.
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 32
Technology Innovator: Sun “The network is the computer,” according to Sun Microsystems’ vision. Corporation leaders believed
network participation drives originality, development, and open source leadership. In 2010, Oracle
acquired Sun Microsystems for approximately $7.4 billion. Sun’s products now are marketed under the
Oracle name, but the company still is remembered for its many contributions in shaping the technology
of today.
Nearly every sector of society and industry uses products Sun originally developed. Sun created
software, systems, services, and electronics that help run billions of devices, ranging from the world’s
largest data centers to some of the smallest consumer electronics. The company was the creator and
leading advocate of Java technology. Other top products were the MySQL database management
system, the StorageTek tape and library storage system, and the UltraSPARC processor.
What contributions did Sun make to help shape the open source movement?
Answer the following question by tapping or clicking the best response, which will open a browser
window or tab that reveals whether your selection is correct or incorrect. Close the window or tab when
you are finished viewing it.
Which company acquired Sun in 2010?
a. Apple
b. Google
c. Microsoft
d. Oracle
Tap or click here to return to the Table of Contents.
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 33
Technology Innovator: IBM The impact of IBM, nicknamed “Big Blue,” on technology is indisputable. IBM is credited with inventing
floppy disks, hard drives, ATMs, magnetic stripe card technologies, and more. Its services, consulting,
and infrastructure components have helped companies develop new business ventures, and its systems
supply nearly one-half of the world’s supercomputing processing power. The company’s research is
focused on five initiatives: cloud, Big Data and analytics, mobile, social business, and security.
The corporation was founded in 1911 as the Computing Tabulating Recording Company when three
companies merged to sell business-related gadgets, including a machine that used punched cards to
catalog data. Nine years later, Thomas J. Watson became chairman and changed the company’s name to
International Business Machines (IBM), which reflected its new direction toward introducing innovative
products to a global market. For more than 20 years, IBM held the record for most U.S. patents granted
annually. The company’s clocks are among the more popular collectible products, and many are still in
use today.
In 2005, IBM sold its PC business, including the popular ThinkPad brand, to Japanese company Lenovo.
Lenovo now is one of the largest PC manufacturers in the world. IBM continues to develop innovative
products and has laboratories around the world devoted to research. Its Watson computer system can
read and understand natural language and is named for IBM’s founder, Thomas J. Watson.
Have you used any IBM products? How did IBM help shape the technology you use today?
Answer the following question by tapping or clicking the best response, which will open a browser
window or tab that reveals whether your selection is correct or incorrect. Close the window or tab when
you are finished viewing it.
IBM sold its PC business to which company?
a. Gateway
b. Lenovo
c. Samsung
d. Toshiba
Tap or click here to return to the Table of Contents.
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 34
Ethics & Issues 9-4: Should Text Messages Sent by Employees Be
Private? The resources listed in the table below contain more information about employee text message privacy.
As an alternative to tapping, clicking, or entering the web address, you can find desired information by
entering search text from the table’s Website Name or Description column.
Websites about Employee Text Message Privacy
Website Name Description Web Address
CIO Article titled “What Can Employers Really See on a BYOD Smartphone or Tablet?”
dscov.com/16/09e4a
Daily Mail Article titled “Is your boss reading your text messages? Two-thirds of employers are now using electronic monitoring on company equipment”
dscov.com/16/09e4b
Tap or click here to return to the Table of Contents.
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 35
Secure IT 9-4: BYOD Security Issues The resources listed in the table below contain more information about security issues associated with
BYOD (bring your own device). As an alternative to tapping, clicking, or entering the web address, you
can find desired information by entering search text from the table’s Website Name or Description
column.
Websites about BYOD Security Issues
Website Name Description Web Address
ComputerWeekly.com Article titled “BYOD: data protection and information security issues”
dscov.com/16/09s4a
Privacy Rights Clearinghouse Article titled “Fact Sheet 40: Bring Your Own Device . . . at Your Own Risk”
dscov.com/16/09s4b
TechTarget Article titled “BYOD security strategies: Balancing BYOD risks and rewards”
dscov.com/16/09s4c
Tap or click here to return to the Table of Contents.
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 36
Android The following list identifies types of computers and devices equipped with the Android operating
system. Apps for these devices are available from the Amazon Appstore for Android and the Google Play
store. You can find additional information by entering the text, android, followed by the list item as
search text.
Navigation systems
Smart TVs
Smartphones
Smartwatches
Tablets
Discover More: To display search results about devices that use the Android operating system in a new
browser window or tab, tap or click this link: dscov.com/16/09r9. Close the window or tab when you are
finished viewing it.
Tap or click here to return to the Table of Contents.
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 37
iOS The following list identifies types of computers and devices equipped with the iOS operating system.
Apps for these devices are available from the iTunes Store. You can find additional information by
entering the text, ios, followed by the list item as search text.
Digital media players
Portable media players
Smartphones
Smartwatches
Tablets
Discover More: To display search results about devices that use the iOS operating system in a new
browser window or tab, tap or click this link: dscov.com/16/09r10. Close the window or tab when you
are finished viewing it.
Tap or click here to return to the Table of Contents.
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 38
Windows Phone The Windows Phone operating system is found on smartphones developed by Microsoft. Apps for these
phones are available from the Windows Phone store. You can find additional information by entering
the text, windows phones.
Discover More: To display search results about devices that use the Windows Phone operating system in
a new browser window or tab, tap or click this link: dscov.com/16/09r11. Close the window or tab when
you are finished viewing it.
Tap or click here to return to the Table of Contents.
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 39
Technology Trend: Mobile versus Desktop Operating System Usage The resources listed in the table below contain more information about mobile and desktop operating
system usage. As an alternative to tapping, clicking, or entering the web address, you can find desired
information by entering search text from the table’s Website Name or Description column.
Websites about Mobile and Desktop Operating System Usage
Website Name Description Web Address
IDC Article describing how Android and iOS have grown to more than 96 percent of the smartphone operating system market
dscov.com/16/09t2a
IT World Article titled “How does Android stack up as a desktop operating system?”
dscov.com/16/09t2b
w3schools.com Article titled “OS Platform Statistics” dscov.com/16/09t2c
Tap or click here to return to the Table of Contents.
Chapter 9 Free Resources OPERATING SYSTEMS: Managing, Coordinating, and Monitoring Resources
Discovering Computers 2016 Page 40
Technology @ Work: Meteorology The resources listed in the table below contain more information about how the meteorology industry
uses technology. As an alternative to tapping, clicking, or entering the web address, you can find desired
information by entering search text from the table’s Website Name or Description column.
Websites about Technology in Meteorology
Website Name Description Web Address
Meteorological Technology World Expo
Website for the Meteorological Technology World Expo that showcases advances in meteorological technologies
dscov.com/16/09w1a
National Hurricane Center Information about the Technology and Science branch of the National Hurricane Center
dscov.com/16/09w1b
Science Daily Article titled “GPS technology improves weather forecasting”
dscov.com/16/09w1c
Tap or click here to return to the Table of Contents.