Question 1.

Open source operating systems are usually developed by a community of developers and the source code of the operating system is usually freely available for coders to change and develop. An example of an open source operating system is Linux. Google is also currently in the process of finishing its open source operating system Chrome OS (Economides & Katsamakas, 2006).


  1. Open source operating systems are more secure than proprietary operating systems like Windows. This is why server operating systems, mostly use Linux because of the inherent security vulnerabilities of Windows.
  2. Open source operating systems also benefit from funding from both OS developers and software developers while proprietary operating systems like Windows.


  1. Open source software cannot much up to the user friendliness of proprietary operating systems like Windows.
  2. It is costly for firms and individuals to migrate from proprietary systems like Windows to Linux. For firms this involves training costs for employees.

Question 2.

Task scheduling is simply the process by which the computer determines which task gets executed first. The process uses the system clock to schedule tasks. Each process is allocated a time slice. There are several factors to consider. The short term scheduling provides a greater degree of control over which task is executed by the use of system interrupts while swap scheduling improves efficiency by moving idle tasks from main memory to leave space for active processes.

The factor to consider for kernels is mainly performance. Monolithic kernels are considered faster because all the code is located in the kernel space despite the recent developments in hybrid kernels have significantly increased their speed as well. Clustering ability is preferred for data arrangement and organization (Silberschatz & Baer Galvin, 2005).


Question 3.

There are a number of factors to consider when upgrading to a new hardware technology. One factor to consider is the time it is expected to take for the operating system to support the features of the new hardware technology. If operating system is expected sooner rather than later then the benefits would likely outweigh the costs. Another factor is whether the existing operating system would perform better or the same with the new hardware. If so, the firm would likely acquire the new hardware technology.  Lastly, whether the new hardware technology represents a significant change either in processing power, networking capabilities or memory, otherwise it would make more sense to invest in the new hardware technology once the operating system provides support.

Question 4.

Operating systems can detect intrusions by either detecting abnormalities in the system or verifying digital signatures and keys. Some of the abnormalities that the operating system searches for include: If a user enters the passwords incorrectly more than a certain number of times on a login screen, or a client computer scanning all of the network ports for any network vulnerabilities. Keys are checked to verify the digital signatures of authentication keys (Azimi, 2010; Buntwal Somayaji, 1994).

Intrusions that can adversely affect the operating system include packet sniffing where hackers monitor the network traffic to intercept packets of data including passwords. This is a serious threat unless data sent and received from a host computer are encrypted (Azimi, 2010).


Question 5.

The performance of the various Unix operating system versions is assessed in terms of memory management ability, and its ability to handle various IO devices and its network capabilities. The stability is the ability of the version of the operating system to handle any unexpected changes in the operating system. Scalability is the ability of the operating system to handle new changes and advancements in hardware development. For example, changes in the graphics cards, advancement in processors such as the number of cores in a single chip. Also the user friendliness of various Unix systems differ due to differences in the user interfaces. Lastly functionality of the different of Unix systems differs e.g. network based systems are fundamentally different from client Unix systems (Peek, Todino & Strang, 2002).


Question 6.

The two concepts that are applicable to information technology management is the open source movement and security. The development of open source software has been on the steady increase in recent years with big firms like Google investing in open source platforms like chrome OS (Reynolds, 2010).

The two concepts that are best applicable to information technology management are security and networking. Due to the increasing threat of hackers, most firms are seeking for information technology managers with the skills necessary to secure the firms´ servers and networking.

The future trends of information technology and computing is cloud computing, where is stored in a centralized location for various firms to access. This will greatly reduce storage costs and enhance data security. The other trend is in outsourced data management. Cloud computing is set to be the future of data management.




Azimi, R. (2010). Intrusion Detection in Operating Systems. Retrieved October 22, 2014, from <

Buntwal Somayaji, A. (1994). Operating System Stability and Security through Process Homeostasis. Retrieved October 22, 2014, from <

Economides, N. & Katsamakas, E. (2006). Linux vs. Windows: A Comparison of Application and Platform Innovation Incentives for Open Source and Proprietary Software Platforms. Retrieved October 22, 2014, from <

Peek, J., Todino, G., & Strang, J. (2002). Learning the UNIX operating system. Sebastopol, Calif: O’Reilly & Associates, Inc.

Reynolds, G. W. (2010). Information technology for managers. Boston, MA: Course Technology, Cengage Learning.

Silberschatz, A. & Baer Galvin, P. (2005). Operating System Concepts: Seventh Edition. Retrieved October 22, 2014, from <




"Are you looking for this answer? We can Help click Order Now"