Command processor and user interface, Basic Computer Science

Assignment Help:

Command Processor and User Interface:

To the user, the most important and visible services provided by the OS is the user interface and the capabilities that it provides to execute commands which may not be a part of OS.  

Instead these systems consider the user interface as a separate shell that is provided with the operating system and that interacts with the kernel to provide the necessary-user command  capabilities. In UNIX, three different shells, the C shell, the Bourne shell, and the Korn shell are in common use, and many other shells for UNIX are available. Each of these shells provides different command structures and different capabilities.  

Different types of user interface exist. The most common are the graphical user interface, or GUI, and the command line interface. The graphical user interface accepts commands primarily in the form of drop-down menus, mouse movements, and mouse clicks. The command line interface relies on typed commands which provide direct access to various methods within operating system such as File system, I/O system, and network services.

UNIX allows certain class of users called  superusers  to use some kind of commands for  changing the platform or access rights. Command languages extend the power and flexibilities of the operating system and simplify use of the system for less sophisticated users.  


Related Discussions:- Command processor and user interface

Explain briefly about gnome desktop, Question 1 Brief about the shells of ...

Question 1 Brief about the shells of Linux operating system Question 2 Explain briefly about GNOME desktop Question 3 Write note on the following Encryption Sig

Perverse software, Perverse software: Perverse software is a program w...

Perverse software: Perverse software is a program which causes hindrances in other programs execution in such a way resulting in modification or complete destruction of data w

Data mining analysis, Using Weka 3.6 (basketball or cloud data set). Using ...

Using Weka 3.6 (basketball or cloud data set). Using the EM clustering method, how many clusters did the algorithm decide to make? If we change from "Use Training Set" to "Percenta

Ipx for lan, explain ipx for lan and spx

explain ipx for lan and spx

Programs - programming language, Programs - programming language: Prog...

Programs - programming language: Programs to implement algorithms on the computer must be written in a language that the computer can understand. It is fruitful, therefore, to

Artificial intelligence-intelligence performanc of computer , "Just how are...

"Just how are we capable to get a computer to performe intelligent tasks?" One thing to answer the question is to tell that: Logic generate a science out of many forms of re

Create a flowchart that displays the student''s avera, Ask questiCreate a f...

Ask questiCreate a flowchart that displays the student''s average score for three quizzes. + Assume that there are 3 sections each having 5 students + The only valid number to be

Rooted tree, Ask qu The figure below shows a rooted tree, 756_Find the hei...

Ask qu The figure below shows a rooted tree, 756_Find the height.png 1.1. Find the height/level of the tree as shown above?estion #Minimum 100 words accepted#

RMO CSMS marketing subsystem, I need to write a narrative n overview of the...

I need to write a narrative n overview of the diagram and an analysis of the actors

Define server clustering, Question 1 Discuss the impacts of disaster faced...

Question 1 Discuss the impacts of disaster faced by the organization Question 2 Explains the steps involved in disaster recovery planning Question 3 What do you mean by

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd