Command processor and user interface, Basic Computer Science

Assignment Help:

Command Processor and User Interface:

To the user, the most important and visible services provided by the OS is the user interface and the capabilities that it provides to execute commands which may not be a part of OS.  

Instead these systems consider the user interface as a separate shell that is provided with the operating system and that interacts with the kernel to provide the necessary-user command  capabilities. In UNIX, three different shells, the C shell, the Bourne shell, and the Korn shell are in common use, and many other shells for UNIX are available. Each of these shells provides different command structures and different capabilities.  

Different types of user interface exist. The most common are the graphical user interface, or GUI, and the command line interface. The graphical user interface accepts commands primarily in the form of drop-down menus, mouse movements, and mouse clicks. The command line interface relies on typed commands which provide direct access to various methods within operating system such as File system, I/O system, and network services.

UNIX allows certain class of users called  superusers  to use some kind of commands for  changing the platform or access rights. Command languages extend the power and flexibilities of the operating system and simplify use of the system for less sophisticated users.  


Related Discussions:- Command processor and user interface

Explain Modern architecture of microprocessor, There are many other techniq...

There are many other techniques in which companies who manufacture microprocessors have attempted to get better the performance of their CPUs. Cache memory this is a small quantit

Ms word, what is ms words in parts ms words in life?

what is ms words in parts ms words in life?

Internet searching algorithm, Internet searching algorithm: Searching: Wh...

Internet searching algorithm: Searching: When a user enters a query into a search engine, the engine examines its index and provides a listing of best-matching web pages accordin

Why is the random class in the .net framework not suitable, QUESTION (a...

QUESTION (a) (i) Why is the Random class in the .NET framework not suitable for generating random bytes for cryptography purposes? (ii) Mention two characteristics required

Pep8, Write an Assembly program that reads an integer (-32,768 through 32,7...

Write an Assembly program that reads an integer (-32,768 through 32,767) in decimal and prints its equivalent in binary. The output must show all 16 bits. And you must use a loop

Packet switching, Packet Switching: This is one of recent techniques o...

Packet Switching: This is one of recent techniques of switching. Packet switching was originally developed for use by ARPA network by the Defence Department of US. According t

Technology partnerships, Technology Partnerships: Such agreements prov...

Technology Partnerships: Such agreements provide the consumer un-limited access to vendor's technology. Such contracts are typically multi-year in nature where the consumer pa

Define levels of abstraction in a dbms, Define Levels of Abstraction in a D...

Define Levels of Abstraction in a DBMS, explain briefly, Conceptual Schema, Physical Schema, External Schema

Innovation, role of an system analyst as an innovator

role of an system analyst as an innovator

Trap doors and Logic Bombs, Trap doors:  This is a way of bypassing normal...

Trap doors:  This is a way of bypassing normal authentication procedure (windows/ operating system user name  and password) to access a system. Once a system is compromised (impac

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd