Command processor and user interface, Basic Computer Science

Assignment Help:

Command Processor and User Interface:

To the user, the most important and visible services provided by the OS is the user interface and the capabilities that it provides to execute commands which may not be a part of OS.  

Instead these systems consider the user interface as a separate shell that is provided with the operating system and that interacts with the kernel to provide the necessary-user command  capabilities. In UNIX, three different shells, the C shell, the Bourne shell, and the Korn shell are in common use, and many other shells for UNIX are available. Each of these shells provides different command structures and different capabilities.  

Different types of user interface exist. The most common are the graphical user interface, or GUI, and the command line interface. The graphical user interface accepts commands primarily in the form of drop-down menus, mouse movements, and mouse clicks. The command line interface relies on typed commands which provide direct access to various methods within operating system such as File system, I/O system, and network services.

UNIX allows certain class of users called  superusers  to use some kind of commands for  changing the platform or access rights. Command languages extend the power and flexibilities of the operating system and simplify use of the system for less sophisticated users.  


Related Discussions:- Command processor and user interface

Applications software, Applications Software: General aspects on appli...

Applications Software: General aspects on applications software. Applications software is the program that allow the user to get the required work done. In other words, applic

Briefly explain registers, Question 1 Briefly explain Registers Que...

Question 1 Briefly explain Registers Question 2 What are complier and interpreter? Question 3 Explain the process of installing Windows XP Question 4 Wr

Cipher program in java, Cryptography, the study of secret writing, has been...

Cryptography, the study of secret writing, has been around for a very long time, from simplistic techniques to sophisticated mathematical techniques. No matter what the form howeve

Introduction to FCB , There are two kinds of FCB, the normal, whose length...

There are two kinds of FCB, the normal, whose length is 37 bytes and the expanded one of 44 bytes. The FCB is created of data given by the programmer and by data which it takes dir

Compact diskette (cd), Compact Diskette (CD) CD-ROM ...

Compact Diskette (CD) CD-ROM CD-ROM stands for Compact Disk-Read Only Memory. This disk comes with data already stored in it. It can store around 640 MB of

Ms-powerpoint presentation for promoting national parks, Ms-PowerPoint Pres...

Ms-PowerPoint Presentation for Promoting National Parks You have been hired by Tourism Department to make a presentation to the travel agents from different countries. Design

Process killed, 1. What actions need to be taken when a program terminates ...

1. What actions need to be taken when a program terminates or a process is killed? What if that process destruction is not the consequence of normal termination, but rather is the

REMOTE DESKTOP, I WANT TO CONNECT A PC WIYH MY PC THROUGH REMOTE DESKTOP. W...

I WANT TO CONNECT A PC WIYH MY PC THROUGH REMOTE DESKTOP. WHAT I DO TELL ME PLEASE

Meaning of primary data, Problem 1 Research designs have a critical and...

Problem 1 Research designs have a critical and directive role to play in the research process. Explain the meaning of research design. Describe the various types of research de

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd