Diskless workstations, Basic Computer Science

Diskless workstations:

   Most people assume that the operating system is stored on a disk that is connected directly to the computer, but this is not necessarily true. If the computer is attached to a network, it may obtain its programs, including the operating system, from another computer on the network. This has led to the concept of the diskless workstation, a personal computer that relies completely on the network for its data and program storage and access. Diskless workstations are also known as  thin clients. The size of the kernel and the particular services provided within a kernel vary from one operating system to another operating system, depending on the organization and capabilities of the system, as well as by the type of system.   

Posted Date: 10/23/2012 4:16:06 AM | Location : United States







Related Discussions:- Diskless workstations, Assignment Help, Ask Question on Diskless workstations, Get Answer, Expert's Help, Diskless workstations Discussions

Write discussion on Diskless workstations
Your posts are moderated
Related Questions
Server In a network, the resources of computers comprising network are usually shareable. In fact, one of the main objectives of networking is to make the computing resources

Given the scenario below, construct a conceptual model. The Seville, Spain soccer association is renovating their soccer arena. They are adding luxury boxes that will be offered to

The skill of Assembly Language Programming (AoA), Randy Hyde''s acclaimed text on assembly language programming, is the most-frequently recommended book on 80x86 assembly language

Programming Assignment CS252 Spring 2014 Write an ARM assembly language subroutine that performs according to the following specification (Caesar cypher). Given a mixed case al

Pebble Merchant Problem Description There is a pebble merchant. He sells the pebbles, that are used for shining the floor. His main duty is to take the length of the room’s sides.

4. Provide a list of productid’s, the name of the vendor and their credit rating. The results should be ordered by last name and then by credit rating. Write out the SQL that wo

what is the sql command to List all the join conditions or join paths (pairwise) existing between tables.

Security threats on internet:  The Internet has many advantages; however, it also opens up security threat. In this section we just want to highlight some of the threats that

Following are some causes why we use threads in designing operating systems. A process with several threads makes a great server for instance printer server. For the reason that t

text graphics audio video