1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mariulka [41]
3 years ago
6

The audience for your security assessment report (SAR) is the leadership of your company, which is made up of technical and nont

echnical staff. Some of your audience will be unfamiliar with operating systems. Therefore, you will begin your report with a brief explanation of OS fundamentals and the types of information systems.
Read the following resources that provide essential information you need to know before creating a thorough and accurate OS explanation:O operating systems fundamentalsO the applications of the OSO The Embedded OSO information system architectureO cloud computingO web architectureAfter reviewing the resources, begin drafting the OS overview to incorporate the following:1. Explain the user's role in an OS.2. Explain the differences between kernel applications of the OS and the applications installed by an organization or user.
3. Describe the embedded OS.4. Describe how the systems fit in the overall information system architecture, of which cloud computing is an emerging, distributed computing network architecture..

Computers and Technology
1 answer:
DaniilM [7]3 years ago
4 0

Answer:

<em>The audience for your security assessment report (SAR) is the leadership of your company, which is made up of technical and nontechnical staff. Some of your audience will be unfamiliar with operating systems. Therefore, you will begin your report with a brief explanation of OS fundamentals and the types of information systems. </em>

Read the following resources that provide essential information you need to know before creating a thorough and accurate OS explanation:

  • Operating systems fundamentals

An operating system is the fundamental software which is needed to run a hardware every electronic hardware need an instruction set to make the hardware working. We can say that operating system is communication medium between the user as well other software to the hardware. Hardware don’t know the language of user and user don’t know the language of hardware how to give instructions to the hardware to perform some specific task so Operating system do this functionality to meet the needs of both user and hardware.

  •  The applications of the OS

Applications of operating system are following  

  • Security

Operating system make sure that all the user data is secured and an unauthorize source cannot access the computer to make any changes in user data or any other program.

  • Communication b/w application software and user

The other application of operating system is that it provides a communication channel b/w user and other application program by using some sort of compilers, interpreter to meet the user needs.  

  • File Management

Operating system also provide an essential feature of managing files. It provides complete directory and easy navigation of files and their usage access. It keeps track that where the information is stored and all other details that thing is known as file system.

  • Device Management  

Operating system also keep track of all the devices connected to it install their respective device drivers if available and make them available. OS do communication with the devices connected to it and then perform instructions via hardware and allocate which instruction set should be assign to which device.

  • Processor Management

OS control the multitasking feature of the processor. It makes an order of list of all the tasks which need to be done on processor and assign them according to there priority and also manage for how much time that task is assigned to the processor.

  • Error Detecting

OS keep track of all the information of the health of the computer and detect errors if available to avoid malfunctioning of the computer.

  • The Embedded OS

Embedded operating system are specially designed operating system which are used to for special purpose hardware/embedded system. These OS are more efficient than the simple OS and have limited features. They are designed to be compact and resource efficient. It perform real time operations and very responsive to the instructions. In our daily life ATM machine have an embedded OS, smart phones also have and in medical like MRI machine.  

  • Information system architecture

The information system is defined as formal definition of the business processes, product technologies and working system structure and other technical framework for a business organization. Information system architecture have four layers “Business Process Architecture”, “System Architecture”, “Technical Architecture” and “Product Architecture”.

Information system architecture consist of the software and hardware used to meet the consumer needs. It consists of a documented detail of software hardware used and networked and future plan to add some other features if needed to upgrade or change the system.

  • Cloud computing

Cloud computing is defined as on demand availability of computer resources over the network/internet like storage, software or processing without using the current system all the work is done on a system far away which is available on internet and can be accessed from anywhere. For such services there are data centers which store data on servers to make them available to there user.  

Cloud computing have some types like SaaS (Software as service), Storage, Database, Security, Platform as service.

You might be interested in
Quick SearchLinks to an external site. lets you refine or narrow your search results using links on the right side of the screen
nikdorinn [45]

Answer:

Answer is

By topic, By collection.

Refer below.

Explanation:

Quick SearchLinks to an external site. lets you refine or narrow your search results using links on the right side of the screen. Do a search on wind power. Some criteria that can refine your search results in Quick Search are:

By topic

By collection

5 0
3 years ago
Which of the following will most likely result in a decrease in population?
balu736 [363]
The correct answer is B
4 0
3 years ago
Read 2 more answers
When a support agent does not know the answer to a question, a good incident management strategy is to tell the user ____.
laiz [17]

When you don't know the answer to a question, a good incident management strategy is to tell the user that you'll research the question and get back to him or her.

<h3>What is incident management?</h3>

Incident management can be defined as a strategic process through which a business organization or company identifies, analyzes, and correct hazards, so as to ensure that normal service operation is restored as quickly as possible to end users after a disruption, as well as to prevent a re-occurrence of these hazards in the future.

As a support agent, if you don't know the answer to a question, a good incident management strategy is to tell the user that you'll research the question and get back to him or her at a latter time.

Read more on incident management here: brainly.com/question/11595883

4 0
2 years ago
Which logic gate produces an output of 1 only if both its inputs are 0
Anettt [7]

0=false

1=true

false + false = true

0+0=1

+ operator = and function

AND GATE

8 0
3 years ago
Read 2 more answers
Why are my images blocked on brainly<br><br> i just see gray and on every avatar and image
o-na [289]

Answer:

they are not its just that people haven't changed their profile picture. i haven't yet lol

Explanation:

5 0
2 years ago
Read 2 more answers
Other questions:
  • If you don't know whether to write too, two, or to, you should use the spell-checker to help you decide. true or false?
    7·1 answer
  • Gemima wants to show the amount of vitamin C a fruit salad contains in the blue cell of the table below. To do this, she needs t
    9·2 answers
  • Among the rights you have as a user of computing resources is the right to​ _______.
    12·2 answers
  • Ebba received a message from one of her tech support employees. In violation of company policy, a user had downloaded a free pro
    14·1 answer
  • Microsoft words spell checker
    9·1 answer
  • A customer would like you to install a high-end video card suitable for gaming. Your installation and configuration SHOULD inclu
    7·1 answer
  • List any three importance of computer points​
    8·1 answer
  • A short-range wireless network is called:
    10·1 answer
  • Write a pseudocode algorithm that prompts the user to enter a three-digit number and outputs the hundreds, tens and units.
    6·1 answer
  • A(n) ____ is a live internet presentation that supports interactive communications between the presenter and the audience.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!