Wednesday, July 24, 2019
Senior Paper on Building an Hacintosh Essay Example | Topics and Well Written Essays - 1250 words
Senior Paper on Building an Hacintosh - Essay Example The reason as to why this question is important is because there are several OS that people and companies have come up with, and which can be used interchangeably to ensure that the machines are compatible and can work effectively. The aim of the study will be to give information on the different reasons as to why different people and institutions use different OS instead of using the common OS from Apple. Before conducting the research, I knew that there existed several OS that have been hacked and most of them if not all are being used today. What I want to discover after the study is the reasons as to why people consider using the OS that have been hacked instead of using the OS from Apple that is considered real and proper. One of the reasons why people use different OS is because of the security that they find in using one type of the Operating System. People have a belief that the operating system they chose to use has a big probability of providing protection and security to t he files which have been stored in the computer (Chaubal 117). They believe a certain Operating System can be able to protect information that has been put in place by the users and thus view it as advantage of using the Operating System instead of the others which have been built to serve the same purpose. The government for example have their computers and machines used by several users, and have they may opt to use an Operating System that is not the same as that which an individual user may use. This is because the many different users who use the government facilities machines may tamper with the information that another person may have saved in the machine. There are systems which have been developed, and they cannot detect some of the viruses that come along with the surfing process. Therefore, people are coming up with various ways in which they are able to built operating systems that have trusted computing base that has software which provide security to the machines (Jaeg er 6). The Trusted Computing Base in the operating system depends on its level, which can either be formally verified, tested fully or which the community accepts and trusts to be effective. There are people who use the formally verified system because they believe that they can be able to protect their data which is stored in the computers (Franklin and Coustan 1). Each security problem should be accessed by the process which is allowed to do so. It means that the operating system is able to perform each of the functions needed to ensure that the problems occurring in any of the machines used can be well accessed and solved using the proper operating system (Spring 3). Some people view operating systems to have different capabilities of solving problems and thus this is the reason as to why they use different operating systems. Another reason as to why people choose one operating system over the other is the cost incurred in purchasing and installing the system into the computer. P eople and companies use the operating systems that reduce on the total cost incurred in using that specific operating system. Those people and companies who have fewer resources look for cheaper operating systems. Other institutions which have resources and lots of money such as government institutions will not mind giving in extra costs to get and purchase a fancy operating system (Bekman 1). Some of the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.