Preview

comparison matrix

Satisfactory Essays
Open Document
Open Document
439 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
comparison matrix
University of Phoenix Material

Unix® and Linux® Comparison Matrix

Directions: Choose three different versions of the UNIX® or Linux® operating systems to compare. Insert the three chosen versions and fill out the requested information in the Components column.

UNIX® or Linux® operating system version: Fedora

Components
Your response
Role of shell
Gives a command line with built in commands
Three features and roles of each feature
Security-there is a firewall tool provided with a task bar that lets the user know of any security issues. Shell- Is environment friendly for the user and has functions that run like a PC. Rescue-This feature which is in the disk of the program, can unlock a system to let the user continue their work.
Comments on security
This is a main important feature for the OS
Comments on administration
It is easy for ADMIN use and the tools are not as difficult
Comments on networking
Networking is ok even though the security firewall is good
Comments on performance
Neat and clean
Comments on programmability
The functions are easier to navigate for the programming.
Other

UNIX® or Linux® operating system version: LINUX XP

Components
Your response
Role of shell
Built in commands
Three features and roles of each feature
Security-there is a firewall tool provided with a task bar that lets the user know of any security issues. Shell- Is environment friendly for the user and has functions that run like a PC. Rescue-This feature which is in the disk of the program, can unlock a system to let the user continue their work
Comments on security
Has a firewall built into the system
Comments on administration
Very easy to use and navigate
Comments on networking
Great for a beginner
Comments on performance
Performance is ok but could be better
Comments on programmability
Some of the features are a bit confusing and could be a little bit more standardized
Other

UNIX® or Linux® operating system version: SunOS

You May Also Find These Documents Helpful

  • Powerful Essays

    Unit 7 P3 Research Paper

    • 1234 Words
    • 5 Pages

    Virus protection – virus protection protects a computer system from malicious viruses and Trojans and worms which you can be infected by through the internet or email or downloading files or through a USB flash drive etc. virus protection usually consists of a firewall, virus scanner, virus remover and spyware. With virus protection you can perform a scan on your computer to check if you have been infected by any viruses or Trojans or worms. With some virus protections software’s you can scan your computer then it will ask you if you want the viruses removed, also if any programs have been infected the virus protection will ask you if you want the infected program deleted, most virus…

    • 1234 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Lkt2 - Task 3

    • 871 Words
    • 4 Pages

    connection to the internet. While this provides fewer points of entry for malicious activity, it…

    • 871 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    | * OS Level * Patch history Configuration hardening Desktop access, Application access * File Access * File Storage * VPN Authentication Browsing * Emails * Backups…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    nt1420

    • 272 Words
    • 2 Pages

    b. Telnet is a terminal emulator application. A terminal emulator lets users on one computer see the command line of another computer as though the actions displayed on the screen were happening on the local computer. SSH is called Secure Shell. It is also a terminal emulator…

    • 272 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    | A lot of features are able to be performed without the admin sitting doing them. For example automatic dynamic reconfiguration allows for load based operations. This means the system bases its usage of the system load, the administrator does not need to allocate space.…

    • 489 Words
    • 2 Pages
    Good Essays
  • Good Essays

    It-260 Worksheet

    • 512 Words
    • 3 Pages

    Which of the previous tasks could be completed using Server Manager instead of other consoles?…

    • 512 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Directions: Choose three different versions of the UNIX® or Linux® operating systems to compare. Insert the three chosen versions and fill out the requested information in the Components column.…

    • 757 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    MGS 351 FINAL TIPS

    • 313 Words
    • 2 Pages

    9. intusion detection software: look ppl who should not be there. back up:copy the info. security auditing software: checks out the weakness of your computer.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    4. What is a shell? How does it work with the kernel? With the user?…

    • 1455 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    7. What is a shell? How does it work with the kernel? With the user?…

    • 392 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Comparison Matrix Paper

    • 1012 Words
    • 4 Pages

    Article one seeks to address what effects workplace bullying has on the individual and the environment. The second article's purpose is to connect being exposed to harmful actions and if trait anxiety and trait anger are related to self label oneself as a victim. The third article aims to address how unethical leadership leads to workplace bullying.…

    • 1012 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Sonicwall

    • 1842 Words
    • 8 Pages

    High performance security engine Integrated intrusion prevention Advanced IPSec and SSL VPN Streamlined GUI and advanced management wizards Application intelligence, control and visualization Dual-band wireless Content/URL filtering Gateway Anti-Virus and Anti-Spyware Service Comprehensive Anti-Spam Service Multiple security zones WAN/ISP redundancy and failover Comprehensive centralized management Enforced Client Anti-Virus…

    • 1842 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Involvement in all aspects of technical support including networks, desktop, UNIX administration, backups, disaster recovery, internal/external interfaces, security and software, Help Desk support.…

    • 265 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Resume

    • 686 Words
    • 3 Pages

    ➢ Diagnostics, Anti Virus and Anti Spyware Applications: ERD Commander, Hirens, Norton Internet Security, McAfee Internet Security Suite, Ad-aware, Spy Sweeper and Antivirus.…

    • 686 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Unix Architecture

    • 880 Words
    • 4 Pages

    The shell or the command interpreter is the mediator which interprets the commands we give and then conveys them to the Kernel which ultimately executes them. It provides the user interface to the Kernel. It is basically an expensive program running on the computer all the time and provides an interactive interface between the user and the computer functions.…

    • 880 Words
    • 4 Pages
    Good Essays