Preview

Unixlinux Comparison Matrix

Satisfactory Essays
Open Document
Open Document
757 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unixlinux Comparison Matrix
University of Phoenix Material

Unix® and Linux® Comparison Matrix

Directions: Choose three different versions of the UNIX® or Linux® operating systems to compare. Insert the three chosen versions and fill out the requested information in the Components column.

UNIX® or Linux® operating system version: Red Hat Linux Server

|Components |Your response |
|Role of shell |The Shell provides the ability to interact and access a computer system. This is mostly |
| |used for administrative purpose to either update the server, or add a role to server, or |
| |install a program. |
|Three features and roles of each |Mail: E-mail Server |
|feature |File Server: To store files or server as a directory for users to have their /home drive |
| |Print Server: Manage the printers on a network for users to point to. |
|Comments on security |Linux can use firewalls, IPS, IDS, and antivirus software. It can also be configured to |
| |serve in these rolls to protect these systems unlike Windows, **additional software has to be|
| |purchased**, while you can download free packages for Linux. |
|Comments on administration |The administration is incredibly powerful on Linux, there are shadow passwords that can be |
| |used to access the system if a password is forgotten. |
|Comments on networking

You May Also Find These Documents Helpful

  • Good Essays

    Mis589 Week 2 You Decide

    • 796 Words
    • 4 Pages

    Recommendation: Install a print server to handle print requests on the LAN. This will offload the management of printing from the main LAN and increase network efficiency. In addition a 24 port switch will need to be installed to assist with communications between the printers and networked devices. This will alleviate the printer collisions and allow print jobs to complete much more quickly.…

    • 796 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Pos420 Final Paper

    • 2424 Words
    • 10 Pages

    When beginning a discussion of computer security, a number of variables come into play. From patch availability to OS popularity, antivirus offerings, user/administrator knowledge and even physical user controls, many elements must be considered to create a computing environment that is secure. While Windows and Linux each have their advantages and disadvantages, neither operating system is, at its core, more or less safe than the other from attacks and data theft. All operating systems have vulnerabilities before they ever ship, and it is up to the administrator of those systems to maintain a level of security that protects the valuable data stored on those servers.…

    • 2424 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    | |control method whereby the |through the use of lists is |network some additional |…

    • 572 Words
    • 3 Pages
    Good Essays
  • Good Essays

    | Access control allows the network to prevent outside access that is unauthorized and really watch what is happening on the network.…

    • 489 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Bus 210 - Appendix E

    • 346 Words
    • 2 Pages

    |Network computers |Network computers means a series (more than one) of computers that can communicate to |…

    • 346 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Study Guide

    • 2629 Words
    • 11 Pages

    |Security |Linux users are not burdened with the need for anti |Windows users are burdened with the need for |…

    • 2629 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    |Administration |Administrative information is |All the different |Is to keep connection |It connects with all | |…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Mis 535 Course Paper

    • 2829 Words
    • 12 Pages

    The world is changing daily and many companies are looking to develop ways to save on production and hardware. The idea of having a system that allows a company to store files away from the main server will help a company to store more and free space on the main server. As companies are using more and more technology, the hardware (servers and website space) and Infrastructure is having problems with available space to help free up hard drives and server space. Many computer owners have issues with trying to find a place to store files and other media. The idea is to allow one to place a file in a central location away from the main computer, or cloud storage.…

    • 2829 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Intro to Unix Project 2

    • 636 Words
    • 3 Pages

    Redirection operators are formed mainly from three characters: the leftward pointing angle bracket ( < ), the rightward pointing angle bracket ( > ) and the vertical bar ( | ). In some cases the ampersand ( & ) and the numeral 2 are also used.…

    • 636 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    | |allowing easy modifications |access but all the same safe. A |performance but is not what…

    • 1522 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Shell is a piece of software that provides an interface for users of an operating system. Shell provides access to the services of a kernel. Shell makes the user’s job faster and easier in many ways.…

    • 1455 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    comparison matrix

    • 439 Words
    • 2 Pages

    Directions: Choose three different versions of the UNIX® or Linux® operating systems to compare. Insert the three chosen versions and fill out the requested information in the Components column.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    11. To show what an attacker would have access to if they were in the system.…

    • 263 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Netw250

    • 2162 Words
    • 9 Pages

    Overview | UNIX, the Precursor to Linux | The Introduction of Linux | General Public License and Linux | Linux Distributions | The Linux Kernel | Linux Installation | Linux Application Packages…

    • 2162 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Proper procedures insure that a system is not compromised or destroyed based on a simple mistake or miss management of access.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays

Related Topics