SlideShare a Scribd company logo
1 of 6
Download to read offline
NIET Journal of Engineering & Technology (NIETJET)
Volume 7, Issue Summer 2019 ISSN: 2229-5828 (Print)
1 | Page
Publisher: Noida Institute of Engineering & Technology,
19, Knowledge Park-II, Institutional Area, Greater Noida (UP), India.
Abstract: This study provides a comparative analysis of three well-known operating systems: Windows, Linux, and
Macintosh. The most important factors to consider when studying them are memory and file management, architecture,
security, versatility, and other themes. This study compares and contrasts these subjects. This research study provides an
outline of the major subjects as well as the different similarities and variances in operating system fundamentals. Every
operating system has its own set of differences in terms of composition and structure, and this research focuses on the
operating system's fundamental strengths and shortcomings.Linux, Windows, Mac, UI, Architecture, File Management,
and Security are some of the terms used in this article.
1. Introduction
The operating system is a piece of software that serves as a link between a computer's user and the hardware
system, as well as managing and coordinating hardware usage among several applications and users. It is a set
of programs that aid in the management of hardware resources and provide common functions for computer
programs. It is one of the most important components of a computer. Process generation, Processing state,
Process synchronization, Process communication, and Deadlock avoidance are the five major tasks of an
operating system. Applications require an operating system (OS) to run, and the computer itself requires an OS
to keep the system secure and provide a GUI/CLI interface for users to access and do operations on. To aid
comprehension, a tabular comparison of three operating systems is offered after each feature. Real-Time
Operating System (RTOS), Single-user single task, single-user multi-tasking, and multi-user are the four
primary types of operating systems among the many distinct varieties. Control machinery, research instruments,
and industrial systems all employ RTOS. Because the system will be offered as a "sealed box," an RTOS will
likely have limited user interface capabilities and no end-user tools. Single-user, single-task design systems are
used to allow a single user to successfully operate the system. It's primarily utilized for mobile devices. Single-
user multitasking allows a single user to conduct or run multiple programs at once.
This is the operating system that is most typically found on desktops and laptops. This type of operating system
includes Windows and Mac OS.A multi-user operating system allows numerous users to consume resources in
a balanced fashion at the same time. It ensures that there are enough resources to ensure that none of the active
users are inconvenienced. UNIX, VMS, and mainframe OS are all examples of multi-user operating systems.
Linux is a widely used operating system that is used not only in personal computers but also in supercomputers
and data centers around the world. Because of its various security and flexibility features, it has supplanted
Windows and Mac OS. Anyone can use and alter the system to their taste, and it is the basis for a vast number
of distributions. Windows is a Microsoft operating system that was released in its initial version on November
20, 1985. It's based on the Disk Operating System (DOS), which is famous for its black screen and command
prompt. Following the debut of Windows 95, Microsoft began to dominate the market. This was due to the fact
that Windows 95 was the first operating system to feature a Graphical User Interface (GUI) in the front and
DOS in the back. For a non-computer person, this was a true revolution.
Apple Inc. created the Mac operating system in 1984. The Motorola PowerPC Chip, which is set with an
advanced architecture optimized for graphics and multimedia interface and usability, was utilised in Macintosh
computers. The Macintosh operating systems were all GUI-based, with no command-line options. The Apple
Comparative Research in Recent Times,
Various Designs and Functionalities in
Various Operating Systems
1
Mayank Shukla, 2
Anuj Kumar
MCA, NIET Gr. Noida
NIET Journal of Engineering & Technology (NIETJET)
Volume 7, Issue Summer 2019 ISSN: 2229-5828 (Print)
2 | Page
Publisher: Noida Institute of Engineering & Technology,
19, Knowledge Park-II, Institutional Area, Greater Noida (UP), India.
Mac series of computers has been Intel-based since 2005, but the Mac OS, the first multitasking operating
system, is only licensed to run on an Apple Mac. Because of its UNIX roots, Mac OS X allows us to use a
character-based interface. Apple is the only company that makes Macintosh computers.
TABLE I. COMPARISON OF OS BASIC FEATURES
Linux Windows MacOS
In 1991, a Finnish university
released the film. Designed
mostly for GNU developers. It
was later merged into Linux.
It was planned to be a Graphical
User Interface (GUI) on top of
MS-DOS when it was released in
1985. Later, when Windows 95
was released, all of the functions
were merged. This was a
commercial revolution of sorts.
It is the oldest out of the three and
was released in 1984. From the
beginning, it was a Graphical
User Interface (GUI). Later in
2005, its design and architecture
were changed to Intel x86 based
architecture.
2. LINUX Versus WINDOW Versus MACINTOSH
2.1Booting Process
It is the initial step that occurs when we turn on a computer or a process that occurs when a computer is turned
on. It can be accomplished using both hardware (by pressing the start button) and software (by issuing a
command).
LINUX - There are six steps to the booting procedure. The basic Input/Output system executes the MBR
(Master Boot Record) first. The MBR then runs the Grand Unified Bootloader (GRB). After that, GRB executes
the kernel. The kernel then executes /sbin /init. Init then executes run level programs, which are then executed
from the command line.
WINDOWS - A cold boot begins the booting process when the machine is turned on. When you turn on your
computer, it runs a Power On Self Test (POST). The MBR is sought in the bootable device. The MBR is now
used to locate the boot sector and BOOTMGR. BOOTMGR looks for an active partition and reads the BCD
file from the active partition's boot directory. Winloader loads drivers and sets them to start at boot, after which
control is passed to the Windows kernel.
MAC-The OF or EFI code is executed here when the power is turned on. After that, all hardware information
is gathered and initialised. The boot loader now has control of the system. BOOTX loads the kernel and, if
applicable, the OS badges. The routine kernel is now being executed. Firmware is no longer accessible because
the root device of the booting system has been discovered. Following that, the I/O kit is initialised, and the
kernel is started.
TABLE II. COMPARISON OF VARIOUS OS BOOTING PROCESSES
OS Features Windows Linux MAC
BIOS Yes Yes No
POST Yes Yes Yes
Boot Loader NLTDR GRUB or LILO BOOTX
Kernel NTOSKERNEL INIT Mach_init
The POST step is the same in all three operating systems. This investigation also reveals that, of the three
operating systems, Mac is the only one that does not use BIOS and instead uses BootROM, which includes a
boot loader named BootX or Boot. Efi
2.2 Information on the User Interface
NIET Journal of Engineering & Technology (NIETJET)
Volume 7, Issue Summer 2019 ISSN: 2229-5828 (Print)
3 | Page
Publisher: Noida Institute of Engineering & Technology,
19, Knowledge Park-II, Institutional Area, Greater Noida (UP), India.
The part of an operating system that allows users to enter and edit data is known as the user interface. In other
words, it serves as a communication channel between users and the operating system.
LINUX is a free operating system. You can utilise both the GUI and the CLI in Linux. Although the CLI
appears to be superior to the GUI, this is not the case. CLI can never be used to edit movies, and a graphical
audio player is considerably more likely to be used to create playlists, for example. A graphical user interface
is also plainly required for image editing.
MAC OS - "AQUA" is the name of Apple's graphical user interface and visual motif. Its original theme was
'water,' and it included droplet-like elements as well as reflection and translucency motifs. Its goal in macOS
applications is to "incorporate colour, depth, and sophisticated textures into a visually pleasing interface." Figure
5 depicts the various user interfaces for the three operating systems and how they compare to one another.
Clearly, each of the three has its own aesthetic and provides a pleasant user experience.
WINDOWS- Because the Graphical User Interface (GUI) is an essential part of Windows, it cannot be
replaced. A command shell programme (cmd) can also be run directly. Programs are run in distinct "windows,"
as the name implies. Because each application runs in its own window, we can have multiple programmes
running at the same time. For home computers, this is the most prevalent operating system. Windows 10 is the
most recent version of the operating system.
2.3 Managing System Assets
Troubleshooting requires constant monitoring of system resources such as memory, mass storage, network
connectivity, and the processor.
LINUX is a free operating system. In Linux, the 'TOP' command aids in the monitoring of programmes, which
is frequently used by administrators to keep track of system performance. This command keeps a running and
active realtime processes list, which is updated on a regular basis. It may show CPU use, RAM consumption,
swap memory, cache size, buffer size, process pid, user, and instructions, among other things. The command
'Vmstat' then displays information about virtual memory, system processes, drives, I/O blocks, interrupts, and
CPU activity, among other things. The command 'lsof' displays a list of all open files and processes.
WINDOWS - When a software in Windows requires hardware resources, it sends a request to the operating
system. The appropriate software is then provided by Windows in response to the request. The simplest
approach to keep track of resources in Windows is to open the Task Manager window from the Performance
Tab, as shown in Figure 6. Ctrl+Shift+Esc is the shortcut for opening this window. Here we can check how
much CPU and RAM is being used.
MAC OS - The 'Activity Monitor' in Mac OS displays the processes that are now running on our system. We
can control resources and see how Mac's activity and performance can be evaluated this way. As seen in figure
7, we may either find it using 'Spotlight' or open it from the Utilities folder of Application. Activity Monitor
displays programs that are not visible, such as user apps, system apps utilized by Mac OS, and background
processes.
2.4 File Administration
One of the most fundamental but crucial functions of an operating system is file management. It can handle a
wide range of file formats and extensions. It has the ability to create, update, and delete files.
LINUX FILE SYSTEMS - Linux file systems describe how Linux computers organize, store, and track system
files. The file system is essentially a collection of directories or folders that act as placeholders for the locations
of other files. Under other words, in the Linux file system, there is no distinction between a file and a directory,
because a directory is regarded a file with the names of other files. As a result, files include software programs,
services, messages, photographs, and so on.
In the same way, according to the file system, input and output devices are considered files. It also includes the
namespace, which contains the naming standard for naming files in terms of length and character combinations.
It also comprises the organizational framework, which is the logical structure of the files on disc, which is
commonly organized using folders in a hierarchical manner.
WINDOWS- In Windows, the 'Windows Explorer' program handles file management. It displays a list of our
computer's files, directories, and hard discs. When a file needs to be copied, for example, we open the folder
containing the file to be copied or relocated, then drag and drop the file to the appropriate folder or disc. The
NIET Journal of Engineering & Technology (NIETJET)
Volume 7, Issue Summer 2019 ISSN: 2229-5828 (Print)
4 | Page
Publisher: Noida Institute of Engineering & Technology,
19, Knowledge Park-II, Institutional Area, Greater Noida (UP), India.
following instructions will open Windows Explorer: 1. Go to Start->All Programs->Accessories->Windows
Explorer
MAC OS - To organise and manage our files, we use 'FINDER.' Finder, in conjunction with tools like
Automator, may assist users in finding documents, searching for files, managing folders, and organising them.
Press the "Command" and "N" keys at the same time. Apple's proprietary file system is APFS (Apple File
System). The Apple File System is largely concerned with encryption, as well as flash and solid-state drive
optimization. storage. It uses inode numbers that are 64 bits long. For better space management and efficiency,
the APFS uses commands like TRIM. Apple File System uses checksums to maintain metadata data integrity.
2.5 Device Administration
It is the act of device drivers and device controllers collaborating between computer devices. It's used to keep
track of hardware, storage, and input/output devices. It monitors the status of all connected devices to a
computer.
LINUX is a free operating system. Only a few devices are still compatible with the Linux operating system.
Hardware devices that are compatible but not supported, on the other hand, function on all versions of Linux.
Linux is also a developer-friendly operating system that allows developers from all around the world to
contribute to its database. Linux is widely utilised in non-mobile telecommunication networks due to its low
cost and ease of customization. Linux is also used by the majority of customer premises equipment and
embedded systems.
WINDOWS - Device management is a Control Panel applet in Windows OS that allows users to view and
control the computer's hardware. It allows all apps and system features to be notified in a consistent manner of
any changes that may affect their operation or access to resources. It also enables us to update and reinstall
individual device drivers.
MAC OS - Thanks to its multi-layered secure basis, Apple devices can not only safely access network services
but also protect vital data. The mobile device management (MDM) solution for iOS and macOS enforces a
passcode and password policy, ensuring security. If an Apple device falls into the wrong hands, a remote
command can be performed with the help of a user or an administrator to erase all private information. The
following steps can be taken to create a safe computing platform for Apple devices:
i) Techniques are used to prevent illegal use of gadgets.
ii) Data protection at rest, in the event that the device is stolen or lost.
iii) Adherence to networking protocols and data encryption during transmission
iv) Apps run safely without jeopardizing the platform's integrity.
These features work together to create a safe computer environment.
2.6 Safety and security
It is the process of putting in place methods to protect an operating system both externally and internally. This
is mostly accomplished through assuring the operating system's integrity, confidentiality, and availability.
LINUX is a free operating system. Although Linux OS is known for having stronger security than other
operating systems, most distributions are still vulnerable to some attacks since they are designed with privacy,
information security, and anonymity in mind. Linux OS is still subject to viruses that can be downloaded from
the internet, similar to the threats that most PCs face. Basic security measures, such as virus scanning, firewalls,
and file permissions, can help prevent this.
WINDOWS- Microsoft Windows is the most widely used consumer operating system in the world, and this is
why. Many office contexts adopt it as a norm. However, because of its popularity, it is a target for viruses. Users
and the security community do not have access to the source code of Windows because it is a closed source
operating system. [8] As a result, we can select privacy-protecting features while installing Windows: - i) We
must accept 'Express settings' while installing Windows; otherwise we can just click on Customize settings.
ii) Then, on the initial Customize settings page, we must enable all of the options.
iii) Select 'NEXT' to go to the next step of customizing options.
iv) On the second Customize Settings screen, click the "Exit" button. Use the Smart Screen online service to
assist defend against harmful material and downloads on websites loaded by Windows browsers and Store
apps that have been activated, as this will improve security. To alter the remaining options to 'off,' click 'on'.
v) Then we must proceed with the Windows installation.
NIET Journal of Engineering & Technology (NIETJET)
Volume 7, Issue Summer 2019 ISSN: 2229-5828 (Print)
5 | Page
Publisher: Noida Institute of Engineering & Technology,
19, Knowledge Park-II, Institutional Area, Greater Noida (UP), India.
MAC OS- The MAC operating system is distinct from the rest because it was created particularly for Apple
devices. There is no such thing as a third-party developer. As a result, MAC is surrounded by a powerful shield
that protects it from malware and viruses. In addition, MAC allows the user to acknowledge a file while it is
being executed. Apple publishes Mac OS updates on a regular basis to improve security.
2.7 Flexibility
A versatile operating system allows the user to run many programmes and do various tasks at the same time.
It allows the user to customise and adapt the system to their preferences.
LINUX - The most significant advantage of Linux is the user's flexibility to customise the distribution to their
preferences, particularly on the desktop.
Because the operating system is open source, it is simple to use and allows the user to personalize it to their
liking and comfort. The majority of linux distributions is adaptable enough to function on a wide range of
devices (including mobile phones) and is stable enough for mission-critical applications.
WINDOWS- Since 1985, when it was first released, Windows has evolved significantly. It can be used for a
variety of things. Windows 10 has been redesigned to better protect data from security attacks. Windows Hello
is a password-free sign-in service that allows users to access their devices without having to remember their
passwords. A number of new security features, including as fingerprint and face unlock, have been included.
Device Guard protects intellectual property as well. Windows 10 has recently been updated to include new
features such as Windows Ink, Windows Edge, and Cortana.
Windows 10 is available in four different versions:
i)Windows Pro ii) Windows Home iii) Windows Enterprise iv) Windows Education.
3.Conclusions
As a result, the operating system serves as a conduit between users and computer hardware. On the basis of
some features, we compared operating systems such as Linux, Windows, and Mac OS in this article. As a result
of our comparison, we can conclude that none of them are particularly bad. Each has its own set of benefits and
drawbacks. Our goal is to provide consumers with an overview that will assist them in selecting an operating
system that best suits their needs.
References
[1] (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (1), 2015, 542-
544. Noopur Bardhan and Pooja Singh, "Operating System Used in Cloud Computing," (IJCSIT)
International Journal of Computer Science and Information Technologies, Vol. 6 (1), 2015, 542- 544.
[2] "Windows, Linux, and Mac Operating System Booting Process: a Comparative Study," International
Journal of Research in Computer and Communication Technology, volume 2(11), 2013, 2278-5841. Amar
Rajendra Mudiraj, "Windows, Linux, and Mac Operating System Booting Process: a Comparative Study,"
International Journal of Research in Computer and Communication Technology, volume 2(11), 2013,
2278-5841.
[3] "Modeling the Evolution of Operating Systems: An Empirical Study," by Yi Peng and colleagues. pp. 1–
15 in The Journal of Systems & Software, vol. 80, no. 1, Jan. 2007. doi:10.1016/j.jss.2006.03.049,
EBSCOhost
[4] 156-160 in S. Cahya's "Designing Operating System Simulator: A Learning Tool."
[5] Operating System Selection Using AHP on the Basis of Security, Cost, and Boot Time, Varun Chaudhary
and Rajeev Mishra, Volume
[6] Goran Martinovic, Josip Balen, and Bojan Cukic, "Performance evaluation of contemporary Windows
Operating Systems," Journal of Universal Computer Science, vol. 18, no. 2 (2012), pp. 218-263.
[7] Sahil Hussain, Faisal Bahadur, Fariq Gul, Arif Iqbal, Ghazala Ashraf, and Sumat Nazeer, "Survey on
Windows and Linux as Server Operating Systems," International Journal of Computer (IJC), ISSN 2307-
4523.
[8] Hussain A. Alhassan and Dr. Christian Bach, "Operating System and Decision Making," ASEE 2014
Zone I Conference, University of Bridgeport, Bridgeport, Connecticut, USA, April 3-5, 2014.
[9] "OSISS: An operating system integrity surveillance system based on VMM," by W. Liu, X. Li, W.
Huang, and others, pp. 546-549.
NIET Journal of Engineering & Technology (NIETJET)
Volume 7, Issue Summer 2019 ISSN: 2229-5828 (Print)
6 | Page
Publisher: Noida Institute of Engineering & Technology,
19, Knowledge Park-II, Institutional Area, Greater Noida (UP), India.
[10] Goran Martinovic, Josip Balen, and Bojan Cukic, "Performance evaluation of contemporary Windows
Operating Systems," Journal of Universal Computer Science, vol. 18, no. 2 (2012), pp. 218-263.
[11] Samidha Garg, S.N.Singh; 'Performance Comparison Of High Frequency Single Phase PWM Inverters
Using PSpice',Volume No.1,Issue No.1,2013,PP.001-008,ISSN :2229-5828
[12] Satyendra Sharma, Dr.Brahmjit Singh; 'Planning and Optimization of UMTS Network Radio Link with
Limited Interference',Volume No.2,Issue No.1,2013,PP.009-012,ISSN :2229-5828
[13] L.NavinkumarRao, S Gairola; 'Steady -State and Dynamic Performance of the Static Var Compensator
(SVC) Phasor Model',Volume No.2,Issue No.1,2013,PP.013-016,ISSN :2229-5828
[14] Rishi Singhal, S.P. Singh and Dr V. K. Pandey; 'Design of Phase Compen-sation Circuits For Multistage
OP-AMP',Volume No.2,Issue No.1,2013,PP.017-019,ISSN :2229-5828
[15] Mohd Yunus Khan, Saroj Kumar Padhi and R.K. Singh; 'Extraction ,Characterization And Engine
Performance of Jatropha Curcas Oil',Volume No.2,Issue No.1,2013,PP.021-028,ISSN :2229-5828
[16] Srivastav, Vivek; 'Analytical Study of Traffic Behaviour in a Network on Chip Architecture',Volume
No.2,Issue No.1,2013,PP.029-032,ISSN :2229-5828

More Related Content

Similar to Comparative Analysis of Linux, Windows, and Mac Operating Systems

Evolution of OS (Operating System)/CS.pptx
Evolution of OS (Operating System)/CS.pptxEvolution of OS (Operating System)/CS.pptx
Evolution of OS (Operating System)/CS.pptxcetaw81672
 
IT109 Microsoft Windows 7 Operating Systems Unit 01
IT109 Microsoft Windows 7 Operating Systems Unit 01IT109 Microsoft Windows 7 Operating Systems Unit 01
IT109 Microsoft Windows 7 Operating Systems Unit 01blusmurfydot1
 
Introduction to Operating System and its Types
Introduction to Operating System and its TypesIntroduction to Operating System and its Types
Introduction to Operating System and its Typessundas Shabbir
 
OPERATING SYSTUM class 9 Information.pptx
OPERATING SYSTUM class 9 Information.pptxOPERATING SYSTUM class 9 Information.pptx
OPERATING SYSTUM class 9 Information.pptxrajdeepcs10
 
Lesson2 Operating System
Lesson2 Operating SystemLesson2 Operating System
Lesson2 Operating Systemguevarra_2000
 
The Pc And Its Operating Systems
The Pc And Its Operating SystemsThe Pc And Its Operating Systems
The Pc And Its Operating SystemsAmber Wheeler
 
209979479 study-material
209979479 study-material209979479 study-material
209979479 study-materialhomeworkping8
 
Windows 10
Windows 10Windows 10
Windows 10Anoop SP
 
Features Of A Operating System
Features Of A Operating SystemFeatures Of A Operating System
Features Of A Operating SystemAlexis Naranjo
 
Operating systems11 9-07
Operating systems11 9-07Operating systems11 9-07
Operating systems11 9-07ainfara
 
Operating Systems
Operating SystemsOperating Systems
Operating SystemsLeon Lei
 

Similar to Comparative Analysis of Linux, Windows, and Mac Operating Systems (20)

Evolution of OS (Operating System)/CS.pptx
Evolution of OS (Operating System)/CS.pptxEvolution of OS (Operating System)/CS.pptx
Evolution of OS (Operating System)/CS.pptx
 
IT109 Microsoft Windows 7 Operating Systems Unit 01
IT109 Microsoft Windows 7 Operating Systems Unit 01IT109 Microsoft Windows 7 Operating Systems Unit 01
IT109 Microsoft Windows 7 Operating Systems Unit 01
 
Introduction to Operating System and its Types
Introduction to Operating System and its TypesIntroduction to Operating System and its Types
Introduction to Operating System and its Types
 
MS-CIT Unit 4 (slide share)
MS-CIT Unit 4 (slide share)MS-CIT Unit 4 (slide share)
MS-CIT Unit 4 (slide share)
 
OPERATING SYSTUM class 9 Information.pptx
OPERATING SYSTUM class 9 Information.pptxOPERATING SYSTUM class 9 Information.pptx
OPERATING SYSTUM class 9 Information.pptx
 
Lesson2 Operating System
Lesson2 Operating SystemLesson2 Operating System
Lesson2 Operating System
 
Operating System
Operating SystemOperating System
Operating System
 
The Pc And Its Operating Systems
The Pc And Its Operating SystemsThe Pc And Its Operating Systems
The Pc And Its Operating Systems
 
209979479 study-material
209979479 study-material209979479 study-material
209979479 study-material
 
Windows 10
Windows 10Windows 10
Windows 10
 
Operating system
Operating systemOperating system
Operating system
 
training report
training reporttraining report
training report
 
Features Of A Operating System
Features Of A Operating SystemFeatures Of A Operating System
Features Of A Operating System
 
MIS assignement
MIS assignementMIS assignement
MIS assignement
 
Windows8
Windows8Windows8
Windows8
 
OPERATING SYSTEM
OPERATING SYSTEMOPERATING SYSTEM
OPERATING SYSTEM
 
Operating systems11 9-07
Operating systems11 9-07Operating systems11 9-07
Operating systems11 9-07
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Operating system
Operating systemOperating system
Operating system
 

More from NIET Journal of Engineering & Technology (NIETJET)

More from NIET Journal of Engineering & Technology (NIETJET) (20)

Design and Implementation of Automatic Fire Sensing and Fire Extinguishing Ro...
Design and Implementation of Automatic Fire Sensing and Fire Extinguishing Ro...Design and Implementation of Automatic Fire Sensing and Fire Extinguishing Ro...
Design and Implementation of Automatic Fire Sensing and Fire Extinguishing Ro...
 
Fake News Detection using Deep Learning
Fake News Detection using Deep LearningFake News Detection using Deep Learning
Fake News Detection using Deep Learning
 
SMART DUSTBIN USING ARDUINO NANO
SMART DUSTBIN USING ARDUINO NANOSMART DUSTBIN USING ARDUINO NANO
SMART DUSTBIN USING ARDUINO NANO
 
Design & analysis various basic logic gates usingQuantum Dot Cellular Automat...
Design & analysis various basic logic gates usingQuantum Dot Cellular Automat...Design & analysis various basic logic gates usingQuantum Dot Cellular Automat...
Design & analysis various basic logic gates usingQuantum Dot Cellular Automat...
 
A detailed analysis of the supervised machine Learning Algorithms
A detailed analysis of the supervised machine Learning AlgorithmsA detailed analysis of the supervised machine Learning Algorithms
A detailed analysis of the supervised machine Learning Algorithms
 
A Clustering Based Approach for knowledge discovery on web.
A Clustering Based Approach for knowledge discovery on web.A Clustering Based Approach for knowledge discovery on web.
A Clustering Based Approach for knowledge discovery on web.
 
A Review paper on Artificial Neural Network: Intelligent Traffic Management S...
A Review paper on Artificial Neural Network: Intelligent Traffic Management S...A Review paper on Artificial Neural Network: Intelligent Traffic Management S...
A Review paper on Artificial Neural Network: Intelligent Traffic Management S...
 
Integrated MANET Mutual Authentication System - A Review
Integrated MANET Mutual Authentication System - A ReviewIntegrated MANET Mutual Authentication System - A Review
Integrated MANET Mutual Authentication System - A Review
 
Evaluation Of Latency In Delay Sensitive Cloud Services
Evaluation Of Latency In Delay Sensitive Cloud ServicesEvaluation Of Latency In Delay Sensitive Cloud Services
Evaluation Of Latency In Delay Sensitive Cloud Services
 
A Analysis Of Utilization Factor Of Fee-Counter In Colleges
A Analysis Of Utilization Factor Of Fee-Counter In CollegesA Analysis Of Utilization Factor Of Fee-Counter In Colleges
A Analysis Of Utilization Factor Of Fee-Counter In Colleges
 
Simulation Of Steady State And Dynamic Response Of Multi -Effect Evaporators ...
Simulation Of Steady State And Dynamic Response Of Multi -Effect Evaporators ...Simulation Of Steady State And Dynamic Response Of Multi -Effect Evaporators ...
Simulation Of Steady State And Dynamic Response Of Multi -Effect Evaporators ...
 
A Bi-Directional DC-DC Converter Feeding PMBLDC Motor Drive System
A Bi-Directional DC-DC Converter Feeding PMBLDC Motor Drive SystemA Bi-Directional DC-DC Converter Feeding PMBLDC Motor Drive System
A Bi-Directional DC-DC Converter Feeding PMBLDC Motor Drive System
 
Enhancing The Performance Of Multi Area AGC In Deregulatd Enviroment Tuned Wi...
Enhancing The Performance Of Multi Area AGC In Deregulatd Enviroment Tuned Wi...Enhancing The Performance Of Multi Area AGC In Deregulatd Enviroment Tuned Wi...
Enhancing The Performance Of Multi Area AGC In Deregulatd Enviroment Tuned Wi...
 
Micro -Strip Slot Antenna With High Efficiency
Micro -Strip Slot Antenna With High EfficiencyMicro -Strip Slot Antenna With High Efficiency
Micro -Strip Slot Antenna With High Efficiency
 
Analysis Of XPM-Induced Cross Talk In The Optical Order Disper-Sion With Resp...
Analysis Of XPM-Induced Cross Talk In The Optical Order Disper-Sion With Resp...Analysis Of XPM-Induced Cross Talk In The Optical Order Disper-Sion With Resp...
Analysis Of XPM-Induced Cross Talk In The Optical Order Disper-Sion With Resp...
 
Design Philosophy Of Microwave Gunn Oscillator
Design Philosophy Of Microwave Gunn OscillatorDesign Philosophy Of Microwave Gunn Oscillator
Design Philosophy Of Microwave Gunn Oscillator
 
UHF RFID Reader Antena Using Double Slot Loaded Circular Patch
UHF RFID Reader Antena Using Double Slot Loaded Circular PatchUHF RFID Reader Antena Using Double Slot Loaded Circular Patch
UHF RFID Reader Antena Using Double Slot Loaded Circular Patch
 
Planned Outline For Indian Sign Language Recognition
Planned Outline For Indian Sign Language RecognitionPlanned Outline For Indian Sign Language Recognition
Planned Outline For Indian Sign Language Recognition
 
Routing Protocol In Mobile Network : A Review
Routing Protocol In Mobile Network : A ReviewRouting Protocol In Mobile Network : A Review
Routing Protocol In Mobile Network : A Review
 
Classification Of Bug Report Using Naïve Bayes Classifier With Gain Ratio
Classification Of Bug Report Using Naïve Bayes Classifier With Gain RatioClassification Of Bug Report Using Naïve Bayes Classifier With Gain Ratio
Classification Of Bug Report Using Naïve Bayes Classifier With Gain Ratio
 

Recently uploaded

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 

Recently uploaded (20)

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 

Comparative Analysis of Linux, Windows, and Mac Operating Systems

  • 1. NIET Journal of Engineering & Technology (NIETJET) Volume 7, Issue Summer 2019 ISSN: 2229-5828 (Print) 1 | Page Publisher: Noida Institute of Engineering & Technology, 19, Knowledge Park-II, Institutional Area, Greater Noida (UP), India. Abstract: This study provides a comparative analysis of three well-known operating systems: Windows, Linux, and Macintosh. The most important factors to consider when studying them are memory and file management, architecture, security, versatility, and other themes. This study compares and contrasts these subjects. This research study provides an outline of the major subjects as well as the different similarities and variances in operating system fundamentals. Every operating system has its own set of differences in terms of composition and structure, and this research focuses on the operating system's fundamental strengths and shortcomings.Linux, Windows, Mac, UI, Architecture, File Management, and Security are some of the terms used in this article. 1. Introduction The operating system is a piece of software that serves as a link between a computer's user and the hardware system, as well as managing and coordinating hardware usage among several applications and users. It is a set of programs that aid in the management of hardware resources and provide common functions for computer programs. It is one of the most important components of a computer. Process generation, Processing state, Process synchronization, Process communication, and Deadlock avoidance are the five major tasks of an operating system. Applications require an operating system (OS) to run, and the computer itself requires an OS to keep the system secure and provide a GUI/CLI interface for users to access and do operations on. To aid comprehension, a tabular comparison of three operating systems is offered after each feature. Real-Time Operating System (RTOS), Single-user single task, single-user multi-tasking, and multi-user are the four primary types of operating systems among the many distinct varieties. Control machinery, research instruments, and industrial systems all employ RTOS. Because the system will be offered as a "sealed box," an RTOS will likely have limited user interface capabilities and no end-user tools. Single-user, single-task design systems are used to allow a single user to successfully operate the system. It's primarily utilized for mobile devices. Single- user multitasking allows a single user to conduct or run multiple programs at once. This is the operating system that is most typically found on desktops and laptops. This type of operating system includes Windows and Mac OS.A multi-user operating system allows numerous users to consume resources in a balanced fashion at the same time. It ensures that there are enough resources to ensure that none of the active users are inconvenienced. UNIX, VMS, and mainframe OS are all examples of multi-user operating systems. Linux is a widely used operating system that is used not only in personal computers but also in supercomputers and data centers around the world. Because of its various security and flexibility features, it has supplanted Windows and Mac OS. Anyone can use and alter the system to their taste, and it is the basis for a vast number of distributions. Windows is a Microsoft operating system that was released in its initial version on November 20, 1985. It's based on the Disk Operating System (DOS), which is famous for its black screen and command prompt. Following the debut of Windows 95, Microsoft began to dominate the market. This was due to the fact that Windows 95 was the first operating system to feature a Graphical User Interface (GUI) in the front and DOS in the back. For a non-computer person, this was a true revolution. Apple Inc. created the Mac operating system in 1984. The Motorola PowerPC Chip, which is set with an advanced architecture optimized for graphics and multimedia interface and usability, was utilised in Macintosh computers. The Macintosh operating systems were all GUI-based, with no command-line options. The Apple Comparative Research in Recent Times, Various Designs and Functionalities in Various Operating Systems 1 Mayank Shukla, 2 Anuj Kumar MCA, NIET Gr. Noida
  • 2. NIET Journal of Engineering & Technology (NIETJET) Volume 7, Issue Summer 2019 ISSN: 2229-5828 (Print) 2 | Page Publisher: Noida Institute of Engineering & Technology, 19, Knowledge Park-II, Institutional Area, Greater Noida (UP), India. Mac series of computers has been Intel-based since 2005, but the Mac OS, the first multitasking operating system, is only licensed to run on an Apple Mac. Because of its UNIX roots, Mac OS X allows us to use a character-based interface. Apple is the only company that makes Macintosh computers. TABLE I. COMPARISON OF OS BASIC FEATURES Linux Windows MacOS In 1991, a Finnish university released the film. Designed mostly for GNU developers. It was later merged into Linux. It was planned to be a Graphical User Interface (GUI) on top of MS-DOS when it was released in 1985. Later, when Windows 95 was released, all of the functions were merged. This was a commercial revolution of sorts. It is the oldest out of the three and was released in 1984. From the beginning, it was a Graphical User Interface (GUI). Later in 2005, its design and architecture were changed to Intel x86 based architecture. 2. LINUX Versus WINDOW Versus MACINTOSH 2.1Booting Process It is the initial step that occurs when we turn on a computer or a process that occurs when a computer is turned on. It can be accomplished using both hardware (by pressing the start button) and software (by issuing a command). LINUX - There are six steps to the booting procedure. The basic Input/Output system executes the MBR (Master Boot Record) first. The MBR then runs the Grand Unified Bootloader (GRB). After that, GRB executes the kernel. The kernel then executes /sbin /init. Init then executes run level programs, which are then executed from the command line. WINDOWS - A cold boot begins the booting process when the machine is turned on. When you turn on your computer, it runs a Power On Self Test (POST). The MBR is sought in the bootable device. The MBR is now used to locate the boot sector and BOOTMGR. BOOTMGR looks for an active partition and reads the BCD file from the active partition's boot directory. Winloader loads drivers and sets them to start at boot, after which control is passed to the Windows kernel. MAC-The OF or EFI code is executed here when the power is turned on. After that, all hardware information is gathered and initialised. The boot loader now has control of the system. BOOTX loads the kernel and, if applicable, the OS badges. The routine kernel is now being executed. Firmware is no longer accessible because the root device of the booting system has been discovered. Following that, the I/O kit is initialised, and the kernel is started. TABLE II. COMPARISON OF VARIOUS OS BOOTING PROCESSES OS Features Windows Linux MAC BIOS Yes Yes No POST Yes Yes Yes Boot Loader NLTDR GRUB or LILO BOOTX Kernel NTOSKERNEL INIT Mach_init The POST step is the same in all three operating systems. This investigation also reveals that, of the three operating systems, Mac is the only one that does not use BIOS and instead uses BootROM, which includes a boot loader named BootX or Boot. Efi 2.2 Information on the User Interface
  • 3. NIET Journal of Engineering & Technology (NIETJET) Volume 7, Issue Summer 2019 ISSN: 2229-5828 (Print) 3 | Page Publisher: Noida Institute of Engineering & Technology, 19, Knowledge Park-II, Institutional Area, Greater Noida (UP), India. The part of an operating system that allows users to enter and edit data is known as the user interface. In other words, it serves as a communication channel between users and the operating system. LINUX is a free operating system. You can utilise both the GUI and the CLI in Linux. Although the CLI appears to be superior to the GUI, this is not the case. CLI can never be used to edit movies, and a graphical audio player is considerably more likely to be used to create playlists, for example. A graphical user interface is also plainly required for image editing. MAC OS - "AQUA" is the name of Apple's graphical user interface and visual motif. Its original theme was 'water,' and it included droplet-like elements as well as reflection and translucency motifs. Its goal in macOS applications is to "incorporate colour, depth, and sophisticated textures into a visually pleasing interface." Figure 5 depicts the various user interfaces for the three operating systems and how they compare to one another. Clearly, each of the three has its own aesthetic and provides a pleasant user experience. WINDOWS- Because the Graphical User Interface (GUI) is an essential part of Windows, it cannot be replaced. A command shell programme (cmd) can also be run directly. Programs are run in distinct "windows," as the name implies. Because each application runs in its own window, we can have multiple programmes running at the same time. For home computers, this is the most prevalent operating system. Windows 10 is the most recent version of the operating system. 2.3 Managing System Assets Troubleshooting requires constant monitoring of system resources such as memory, mass storage, network connectivity, and the processor. LINUX is a free operating system. In Linux, the 'TOP' command aids in the monitoring of programmes, which is frequently used by administrators to keep track of system performance. This command keeps a running and active realtime processes list, which is updated on a regular basis. It may show CPU use, RAM consumption, swap memory, cache size, buffer size, process pid, user, and instructions, among other things. The command 'Vmstat' then displays information about virtual memory, system processes, drives, I/O blocks, interrupts, and CPU activity, among other things. The command 'lsof' displays a list of all open files and processes. WINDOWS - When a software in Windows requires hardware resources, it sends a request to the operating system. The appropriate software is then provided by Windows in response to the request. The simplest approach to keep track of resources in Windows is to open the Task Manager window from the Performance Tab, as shown in Figure 6. Ctrl+Shift+Esc is the shortcut for opening this window. Here we can check how much CPU and RAM is being used. MAC OS - The 'Activity Monitor' in Mac OS displays the processes that are now running on our system. We can control resources and see how Mac's activity and performance can be evaluated this way. As seen in figure 7, we may either find it using 'Spotlight' or open it from the Utilities folder of Application. Activity Monitor displays programs that are not visible, such as user apps, system apps utilized by Mac OS, and background processes. 2.4 File Administration One of the most fundamental but crucial functions of an operating system is file management. It can handle a wide range of file formats and extensions. It has the ability to create, update, and delete files. LINUX FILE SYSTEMS - Linux file systems describe how Linux computers organize, store, and track system files. The file system is essentially a collection of directories or folders that act as placeholders for the locations of other files. Under other words, in the Linux file system, there is no distinction between a file and a directory, because a directory is regarded a file with the names of other files. As a result, files include software programs, services, messages, photographs, and so on. In the same way, according to the file system, input and output devices are considered files. It also includes the namespace, which contains the naming standard for naming files in terms of length and character combinations. It also comprises the organizational framework, which is the logical structure of the files on disc, which is commonly organized using folders in a hierarchical manner. WINDOWS- In Windows, the 'Windows Explorer' program handles file management. It displays a list of our computer's files, directories, and hard discs. When a file needs to be copied, for example, we open the folder containing the file to be copied or relocated, then drag and drop the file to the appropriate folder or disc. The
  • 4. NIET Journal of Engineering & Technology (NIETJET) Volume 7, Issue Summer 2019 ISSN: 2229-5828 (Print) 4 | Page Publisher: Noida Institute of Engineering & Technology, 19, Knowledge Park-II, Institutional Area, Greater Noida (UP), India. following instructions will open Windows Explorer: 1. Go to Start->All Programs->Accessories->Windows Explorer MAC OS - To organise and manage our files, we use 'FINDER.' Finder, in conjunction with tools like Automator, may assist users in finding documents, searching for files, managing folders, and organising them. Press the "Command" and "N" keys at the same time. Apple's proprietary file system is APFS (Apple File System). The Apple File System is largely concerned with encryption, as well as flash and solid-state drive optimization. storage. It uses inode numbers that are 64 bits long. For better space management and efficiency, the APFS uses commands like TRIM. Apple File System uses checksums to maintain metadata data integrity. 2.5 Device Administration It is the act of device drivers and device controllers collaborating between computer devices. It's used to keep track of hardware, storage, and input/output devices. It monitors the status of all connected devices to a computer. LINUX is a free operating system. Only a few devices are still compatible with the Linux operating system. Hardware devices that are compatible but not supported, on the other hand, function on all versions of Linux. Linux is also a developer-friendly operating system that allows developers from all around the world to contribute to its database. Linux is widely utilised in non-mobile telecommunication networks due to its low cost and ease of customization. Linux is also used by the majority of customer premises equipment and embedded systems. WINDOWS - Device management is a Control Panel applet in Windows OS that allows users to view and control the computer's hardware. It allows all apps and system features to be notified in a consistent manner of any changes that may affect their operation or access to resources. It also enables us to update and reinstall individual device drivers. MAC OS - Thanks to its multi-layered secure basis, Apple devices can not only safely access network services but also protect vital data. The mobile device management (MDM) solution for iOS and macOS enforces a passcode and password policy, ensuring security. If an Apple device falls into the wrong hands, a remote command can be performed with the help of a user or an administrator to erase all private information. The following steps can be taken to create a safe computing platform for Apple devices: i) Techniques are used to prevent illegal use of gadgets. ii) Data protection at rest, in the event that the device is stolen or lost. iii) Adherence to networking protocols and data encryption during transmission iv) Apps run safely without jeopardizing the platform's integrity. These features work together to create a safe computer environment. 2.6 Safety and security It is the process of putting in place methods to protect an operating system both externally and internally. This is mostly accomplished through assuring the operating system's integrity, confidentiality, and availability. LINUX is a free operating system. Although Linux OS is known for having stronger security than other operating systems, most distributions are still vulnerable to some attacks since they are designed with privacy, information security, and anonymity in mind. Linux OS is still subject to viruses that can be downloaded from the internet, similar to the threats that most PCs face. Basic security measures, such as virus scanning, firewalls, and file permissions, can help prevent this. WINDOWS- Microsoft Windows is the most widely used consumer operating system in the world, and this is why. Many office contexts adopt it as a norm. However, because of its popularity, it is a target for viruses. Users and the security community do not have access to the source code of Windows because it is a closed source operating system. [8] As a result, we can select privacy-protecting features while installing Windows: - i) We must accept 'Express settings' while installing Windows; otherwise we can just click on Customize settings. ii) Then, on the initial Customize settings page, we must enable all of the options. iii) Select 'NEXT' to go to the next step of customizing options. iv) On the second Customize Settings screen, click the "Exit" button. Use the Smart Screen online service to assist defend against harmful material and downloads on websites loaded by Windows browsers and Store apps that have been activated, as this will improve security. To alter the remaining options to 'off,' click 'on'. v) Then we must proceed with the Windows installation.
  • 5. NIET Journal of Engineering & Technology (NIETJET) Volume 7, Issue Summer 2019 ISSN: 2229-5828 (Print) 5 | Page Publisher: Noida Institute of Engineering & Technology, 19, Knowledge Park-II, Institutional Area, Greater Noida (UP), India. MAC OS- The MAC operating system is distinct from the rest because it was created particularly for Apple devices. There is no such thing as a third-party developer. As a result, MAC is surrounded by a powerful shield that protects it from malware and viruses. In addition, MAC allows the user to acknowledge a file while it is being executed. Apple publishes Mac OS updates on a regular basis to improve security. 2.7 Flexibility A versatile operating system allows the user to run many programmes and do various tasks at the same time. It allows the user to customise and adapt the system to their preferences. LINUX - The most significant advantage of Linux is the user's flexibility to customise the distribution to their preferences, particularly on the desktop. Because the operating system is open source, it is simple to use and allows the user to personalize it to their liking and comfort. The majority of linux distributions is adaptable enough to function on a wide range of devices (including mobile phones) and is stable enough for mission-critical applications. WINDOWS- Since 1985, when it was first released, Windows has evolved significantly. It can be used for a variety of things. Windows 10 has been redesigned to better protect data from security attacks. Windows Hello is a password-free sign-in service that allows users to access their devices without having to remember their passwords. A number of new security features, including as fingerprint and face unlock, have been included. Device Guard protects intellectual property as well. Windows 10 has recently been updated to include new features such as Windows Ink, Windows Edge, and Cortana. Windows 10 is available in four different versions: i)Windows Pro ii) Windows Home iii) Windows Enterprise iv) Windows Education. 3.Conclusions As a result, the operating system serves as a conduit between users and computer hardware. On the basis of some features, we compared operating systems such as Linux, Windows, and Mac OS in this article. As a result of our comparison, we can conclude that none of them are particularly bad. Each has its own set of benefits and drawbacks. Our goal is to provide consumers with an overview that will assist them in selecting an operating system that best suits their needs. References [1] (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (1), 2015, 542- 544. Noopur Bardhan and Pooja Singh, "Operating System Used in Cloud Computing," (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (1), 2015, 542- 544. [2] "Windows, Linux, and Mac Operating System Booting Process: a Comparative Study," International Journal of Research in Computer and Communication Technology, volume 2(11), 2013, 2278-5841. Amar Rajendra Mudiraj, "Windows, Linux, and Mac Operating System Booting Process: a Comparative Study," International Journal of Research in Computer and Communication Technology, volume 2(11), 2013, 2278-5841. [3] "Modeling the Evolution of Operating Systems: An Empirical Study," by Yi Peng and colleagues. pp. 1– 15 in The Journal of Systems & Software, vol. 80, no. 1, Jan. 2007. doi:10.1016/j.jss.2006.03.049, EBSCOhost [4] 156-160 in S. Cahya's "Designing Operating System Simulator: A Learning Tool." [5] Operating System Selection Using AHP on the Basis of Security, Cost, and Boot Time, Varun Chaudhary and Rajeev Mishra, Volume [6] Goran Martinovic, Josip Balen, and Bojan Cukic, "Performance evaluation of contemporary Windows Operating Systems," Journal of Universal Computer Science, vol. 18, no. 2 (2012), pp. 218-263. [7] Sahil Hussain, Faisal Bahadur, Fariq Gul, Arif Iqbal, Ghazala Ashraf, and Sumat Nazeer, "Survey on Windows and Linux as Server Operating Systems," International Journal of Computer (IJC), ISSN 2307- 4523. [8] Hussain A. Alhassan and Dr. Christian Bach, "Operating System and Decision Making," ASEE 2014 Zone I Conference, University of Bridgeport, Bridgeport, Connecticut, USA, April 3-5, 2014. [9] "OSISS: An operating system integrity surveillance system based on VMM," by W. Liu, X. Li, W. Huang, and others, pp. 546-549.
  • 6. NIET Journal of Engineering & Technology (NIETJET) Volume 7, Issue Summer 2019 ISSN: 2229-5828 (Print) 6 | Page Publisher: Noida Institute of Engineering & Technology, 19, Knowledge Park-II, Institutional Area, Greater Noida (UP), India. [10] Goran Martinovic, Josip Balen, and Bojan Cukic, "Performance evaluation of contemporary Windows Operating Systems," Journal of Universal Computer Science, vol. 18, no. 2 (2012), pp. 218-263. [11] Samidha Garg, S.N.Singh; 'Performance Comparison Of High Frequency Single Phase PWM Inverters Using PSpice',Volume No.1,Issue No.1,2013,PP.001-008,ISSN :2229-5828 [12] Satyendra Sharma, Dr.Brahmjit Singh; 'Planning and Optimization of UMTS Network Radio Link with Limited Interference',Volume No.2,Issue No.1,2013,PP.009-012,ISSN :2229-5828 [13] L.NavinkumarRao, S Gairola; 'Steady -State and Dynamic Performance of the Static Var Compensator (SVC) Phasor Model',Volume No.2,Issue No.1,2013,PP.013-016,ISSN :2229-5828 [14] Rishi Singhal, S.P. Singh and Dr V. K. Pandey; 'Design of Phase Compen-sation Circuits For Multistage OP-AMP',Volume No.2,Issue No.1,2013,PP.017-019,ISSN :2229-5828 [15] Mohd Yunus Khan, Saroj Kumar Padhi and R.K. Singh; 'Extraction ,Characterization And Engine Performance of Jatropha Curcas Oil',Volume No.2,Issue No.1,2013,PP.021-028,ISSN :2229-5828 [16] Srivastav, Vivek; 'Analytical Study of Traffic Behaviour in a Network on Chip Architecture',Volume No.2,Issue No.1,2013,PP.029-032,ISSN :2229-5828