Tuesday, June 11, 2019

Senior Paper on Building an Hacintosh Essay Example | Topics and Well Written Essays - 1250 words

Senior Paper on Building an Hacintosh - Essay ExampleThe reason as to why this question is important is because there are several OS that people and companies get down come up with, and which can be used interchangeably to tick off that the machines are compatible and can work effectively. The aim of the study will be to give culture on the mingled reasons as to why distinct people and institutions use different OS instead of victimisation the common OS from Apple. Before conducting the research, I knew that there existed several OS that have been hacked and almost of them if not all are being used today. What I want to discover after the study is the reasons as to why people consider using the OS that have been hacked instead of using the OS from Apple that is considered real and proper. One of the reasons why people use different OS is because of the certification that they drive in using integrity type of the Operating System. People have a belief that the operating bo dy they chose to use has a big fortune of providing protection and security to the files which have been stored in the computer (Chaubal 117). They believe a certain Operating System can be able to protect information that has been put in place by the users and thus view it as advantage of using the Operating System instead of the others which have been built to dispense the like purpose. The government for example have their computers and machines used by several users, and have they may opt to use an Operating System that is not the same as that which an individual user may use. This is because the m any(prenominal) different users who use the government facilities machines may tamper with the information that another person may have saved in the machine. thither are systems which have been developed, and they cannot detect some of the viruses that come along with the surfing process. Therefore, people are coming up with various ways in which they are able to built operating sy stems that have trusted computing base that has software which provide security to the machines (Jaeger 6). The Trusted compute Base in the operating system depends on its level, which can either be formally verified, tested fully or which the community accepts and trusts to be effective. There are people who use the formally verified system because they believe that they can be able to protect their data which is stored in the computers (Franklin and Coustan 1). Each security problem should be accessed by the process which is allowed to do so. It means that the operating system is able to perform each of the functions needed to ensure that the problems occurring in any of the machines used can be well accessed and solved using the proper operating system (Spring 3). Some people view operating systems to have different capabilities of solving problems and thus this is the reason as to why they use different operating systems. Another reason as to why people choose one operating sys tem over the other is the cost incurred in purchasing and installing the system into the computer. People and companies use the operating systems that reduce on the sum of money cost incurred in using that specific operating system. Those people and companies who have fewer resources look for cheaper operating systems. Other institutions which have resources and lots of money much(prenominal) as government institutions will not mind giving in extra costs to get and purchase a fancy operating system (Bekman 1). Some of the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.