Submit Search
Upload
Computer Architecture - Software - Lesson 13 - Printers, Mac OS and Linux - Eric Vanderburg
•
Download as PPT, PDF
•
0 likes
•
434 views
Eric Vanderburg
Follow
Computer Architecture - Software - Lesson 13 - Printers, Mac OS and Linux - Eric Vanderburg
Read less
Read more
Technology
Report
Share
Report
Share
1 of 11
Download now
Recommended
Embedded Systems: Lecture 7: Lab 1: Preparing the Raspberry Pi
Embedded Systems: Lecture 7: Lab 1: Preparing the Raspberry Pi
Ahmed El-Arabawy
Selecting and Installing Operating System
Selecting and Installing Operating System
Amir Villas
9781111306366 ppt ch1
9781111306366 ppt ch1
Dr. Ahmed Al Zaidy
9781111306366 ppt ch11
9781111306366 ppt ch11
Dr. Ahmed Al Zaidy
Course 102: Lecture 25: Devices and Device Drivers
Course 102: Lecture 25: Devices and Device Drivers
Ahmed El-Arabawy
Optimizing and Troubleshooting Windows
Optimizing and Troubleshooting Windows
Amir Villas
9781111306366 ppt ch4
9781111306366 ppt ch4
Dr. Ahmed Al Zaidy
Module 4 Embedded Linux
Module 4 Embedded Linux
Tushar B Kute
Recommended
Embedded Systems: Lecture 7: Lab 1: Preparing the Raspberry Pi
Embedded Systems: Lecture 7: Lab 1: Preparing the Raspberry Pi
Ahmed El-Arabawy
Selecting and Installing Operating System
Selecting and Installing Operating System
Amir Villas
9781111306366 ppt ch1
9781111306366 ppt ch1
Dr. Ahmed Al Zaidy
9781111306366 ppt ch11
9781111306366 ppt ch11
Dr. Ahmed Al Zaidy
Course 102: Lecture 25: Devices and Device Drivers
Course 102: Lecture 25: Devices and Device Drivers
Ahmed El-Arabawy
Optimizing and Troubleshooting Windows
Optimizing and Troubleshooting Windows
Amir Villas
9781111306366 ppt ch4
9781111306366 ppt ch4
Dr. Ahmed Al Zaidy
Module 4 Embedded Linux
Module 4 Embedded Linux
Tushar B Kute
Embedded Linux Basics
Embedded Linux Basics
Marc Leeman
Linux operating system
Linux operating system
ITz_1
Embedded Systems: Lecture 5: A Tour in RTOS Land
Embedded Systems: Lecture 5: A Tour in RTOS Land
Ahmed El-Arabawy
9781111306366 ppt ch2
9781111306366 ppt ch2
Dr. Ahmed Al Zaidy
Linux basics
Linux basics
Santosh Khadsare
Introduction to Linux basic
Introduction to Linux basic
f114n
Device drivers Introduction
Device drivers Introduction
vijay selva
Operating System..!
Operating System..!
benremoz
Module 3 Using Linux Softwares.
Module 3 Using Linux Softwares.
Tushar B Kute
The Future of the Operating System - Keynote LinuxCon 2015
The Future of the Operating System - Keynote LinuxCon 2015
Steven Francia
Course 101: Lecture 4: A Tour in RTOS Land
Course 101: Lecture 4: A Tour in RTOS Land
Ahmed El-Arabawy
Windows OS Architecture in Summery
Windows OS Architecture in Summery
Asanka Dilruk
Introduction to linux
Introduction to linux
Luis Terron
Introduction to Embedded Linux
Introduction to Embedded Linux
Hossain Reja
Dheeraj chugh -_presentation_on_ms-dos
Dheeraj chugh -_presentation_on_ms-dos
REXY J
Embedded Linux from Scratch to Yocto
Embedded Linux from Scratch to Yocto
Sherif Mousa
Windows Architecture
Windows Architecture
Amrith Krishna
comparing windows and linux ppt
comparing windows and linux ppt
Shivalik college of engineering
Linux Operating System
Linux Operating System
KunalKewat1
Window architecture
Window architecture
IGZ Software house
Mac os x
Mac os x
Saksham Khurana
Mac os
Mac os
edualba
More Related Content
What's hot
Embedded Linux Basics
Embedded Linux Basics
Marc Leeman
Linux operating system
Linux operating system
ITz_1
Embedded Systems: Lecture 5: A Tour in RTOS Land
Embedded Systems: Lecture 5: A Tour in RTOS Land
Ahmed El-Arabawy
9781111306366 ppt ch2
9781111306366 ppt ch2
Dr. Ahmed Al Zaidy
Linux basics
Linux basics
Santosh Khadsare
Introduction to Linux basic
Introduction to Linux basic
f114n
Device drivers Introduction
Device drivers Introduction
vijay selva
Operating System..!
Operating System..!
benremoz
Module 3 Using Linux Softwares.
Module 3 Using Linux Softwares.
Tushar B Kute
The Future of the Operating System - Keynote LinuxCon 2015
The Future of the Operating System - Keynote LinuxCon 2015
Steven Francia
Course 101: Lecture 4: A Tour in RTOS Land
Course 101: Lecture 4: A Tour in RTOS Land
Ahmed El-Arabawy
Windows OS Architecture in Summery
Windows OS Architecture in Summery
Asanka Dilruk
Introduction to linux
Introduction to linux
Luis Terron
Introduction to Embedded Linux
Introduction to Embedded Linux
Hossain Reja
Dheeraj chugh -_presentation_on_ms-dos
Dheeraj chugh -_presentation_on_ms-dos
REXY J
Embedded Linux from Scratch to Yocto
Embedded Linux from Scratch to Yocto
Sherif Mousa
Windows Architecture
Windows Architecture
Amrith Krishna
comparing windows and linux ppt
comparing windows and linux ppt
Shivalik college of engineering
Linux Operating System
Linux Operating System
KunalKewat1
Window architecture
Window architecture
IGZ Software house
What's hot
(20)
Embedded Linux Basics
Embedded Linux Basics
Linux operating system
Linux operating system
Embedded Systems: Lecture 5: A Tour in RTOS Land
Embedded Systems: Lecture 5: A Tour in RTOS Land
9781111306366 ppt ch2
9781111306366 ppt ch2
Linux basics
Linux basics
Introduction to Linux basic
Introduction to Linux basic
Device drivers Introduction
Device drivers Introduction
Operating System..!
Operating System..!
Module 3 Using Linux Softwares.
Module 3 Using Linux Softwares.
The Future of the Operating System - Keynote LinuxCon 2015
The Future of the Operating System - Keynote LinuxCon 2015
Course 101: Lecture 4: A Tour in RTOS Land
Course 101: Lecture 4: A Tour in RTOS Land
Windows OS Architecture in Summery
Windows OS Architecture in Summery
Introduction to linux
Introduction to linux
Introduction to Embedded Linux
Introduction to Embedded Linux
Dheeraj chugh -_presentation_on_ms-dos
Dheeraj chugh -_presentation_on_ms-dos
Embedded Linux from Scratch to Yocto
Embedded Linux from Scratch to Yocto
Windows Architecture
Windows Architecture
comparing windows and linux ppt
comparing windows and linux ppt
Linux Operating System
Linux Operating System
Window architecture
Window architecture
Viewers also liked
Mac os x
Mac os x
Saksham Khurana
Mac os
Mac os
edualba
Macintosh Operating System
Macintosh Operating System
Jasmine Garbo
Operating System Mac OS X
Operating System Mac OS X
mirazhosain
Mac os x kernel
Mac os x kernel
Purev-Oidov Gonchigsuren
Inside the Mac OS X Kernel
Inside the Mac OS X Kernel
OpenSlidesArchive
Mac os x
Mac os x
Geovanny Rosero
Implementation of MAC-level sleep-scheduling
Implementation of MAC-level sleep-scheduling
Olivier Cervello
SELinux Kernel Internals and Architecture - FOSS.IN/2005
SELinux Kernel Internals and Architecture - FOSS.IN/2005
James Morris
Reflection on hunger and starvation
Reflection on hunger and starvation
Francisco José Nardi Filho
Hyper threading
Hyper threading
ankita_mistry
Ppt on mac
Ppt on mac
1vicky
A History of Mac OS
A History of Mac OS
Damian T. Gordon
Presentación mac
Presentación mac
Jimmy Ramos
Hyper threading technology
Hyper threading technology
deepakmarndi
Android OS Presentation
Android OS Presentation
hession25819
My presentation on Android in my college
My presentation on Android in my college
Sneha Lata
Presentation on Android operating system
Presentation on Android operating system
Salma Begum
Mac OS(Operating System)
Mac OS(Operating System)
Faizan Shaikh
Viewers also liked
(19)
Mac os x
Mac os x
Mac os
Mac os
Macintosh Operating System
Macintosh Operating System
Operating System Mac OS X
Operating System Mac OS X
Mac os x kernel
Mac os x kernel
Inside the Mac OS X Kernel
Inside the Mac OS X Kernel
Mac os x
Mac os x
Implementation of MAC-level sleep-scheduling
Implementation of MAC-level sleep-scheduling
SELinux Kernel Internals and Architecture - FOSS.IN/2005
SELinux Kernel Internals and Architecture - FOSS.IN/2005
Reflection on hunger and starvation
Reflection on hunger and starvation
Hyper threading
Hyper threading
Ppt on mac
Ppt on mac
A History of Mac OS
A History of Mac OS
Presentación mac
Presentación mac
Hyper threading technology
Hyper threading technology
Android OS Presentation
Android OS Presentation
My presentation on Android in my college
My presentation on Android in my college
Presentation on Android operating system
Presentation on Android operating system
Mac OS(Operating System)
Mac OS(Operating System)
Similar to Computer Architecture - Software - Lesson 13 - Printers, Mac OS and Linux - Eric Vanderburg
11. operating-systems-part-1
11. operating-systems-part-1
Muhammad Ahad
Basics of Computer hardware and Software
Basics of Computer hardware and Software
vaibhav jindal
Computer Architecture - Software - Lesson 8 - Managing Windows XP - Eric Vand...
Computer Architecture - Software - Lesson 8 - Managing Windows XP - Eric Vand...
Eric Vanderburg
unixoperatingsystem-130327073532-phpapp01.pdf
unixoperatingsystem-130327073532-phpapp01.pdf
IxtiyorTeshaboyev
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 5 - System ...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 5 - System ...
yaminohime
K04 software
K04 software
Coky Fauzi Alfi
Net essentials6e ch8
Net essentials6e ch8
APSU
Chap2
Chap2
ngdinhdu
Unit 4
Unit 4
pm_ghate
Uc14 chap05
Uc14 chap05
ayahye
Uc14 chap05
Uc14 chap05
Rashid Yahye
Ms dos commands for Multimedia Students and Facultyes
Ms dos commands for Multimedia Students and Facultyes
SEO SKills
CNIT 152: 13 Investigating Mac OS X Systems
CNIT 152: 13 Investigating Mac OS X Systems
Sam Bowne
Introduction to Operating system CBSE
Introduction to Operating system CBSE
PrashantChahal3
Types of Computer softwares
Types of Computer softwares
Haider Ali Malik
Mac Memory Analysis with Volatility
Mac Memory Analysis with Volatility
Andrew Case
Net essentials6e ch1
Net essentials6e ch1
APSU
Systems Performance: Enterprise and the Cloud
Systems Performance: Enterprise and the Cloud
Brendan Gregg
CNIT 152 13 Investigating Mac OS X Systems
CNIT 152 13 Investigating Mac OS X Systems
Sam Bowne
Linux操作系统01 简介
Linux操作系统01 简介
lclsg123
Similar to Computer Architecture - Software - Lesson 13 - Printers, Mac OS and Linux - Eric Vanderburg
(20)
11. operating-systems-part-1
11. operating-systems-part-1
Basics of Computer hardware and Software
Basics of Computer hardware and Software
Computer Architecture - Software - Lesson 8 - Managing Windows XP - Eric Vand...
Computer Architecture - Software - Lesson 8 - Managing Windows XP - Eric Vand...
unixoperatingsystem-130327073532-phpapp01.pdf
unixoperatingsystem-130327073532-phpapp01.pdf
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 5 - System ...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 5 - System ...
K04 software
K04 software
Net essentials6e ch8
Net essentials6e ch8
Chap2
Chap2
Unit 4
Unit 4
Uc14 chap05
Uc14 chap05
Uc14 chap05
Uc14 chap05
Ms dos commands for Multimedia Students and Facultyes
Ms dos commands for Multimedia Students and Facultyes
CNIT 152: 13 Investigating Mac OS X Systems
CNIT 152: 13 Investigating Mac OS X Systems
Introduction to Operating system CBSE
Introduction to Operating system CBSE
Types of Computer softwares
Types of Computer softwares
Mac Memory Analysis with Volatility
Mac Memory Analysis with Volatility
Net essentials6e ch1
Net essentials6e ch1
Systems Performance: Enterprise and the Cloud
Systems Performance: Enterprise and the Cloud
CNIT 152 13 Investigating Mac OS X Systems
CNIT 152 13 Investigating Mac OS X Systems
Linux操作系统01 简介
Linux操作系统01 简介
More from Eric Vanderburg
GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Eric Vanderburg
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Eric Vanderburg
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Eric Vanderburg
Mobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
Eric Vanderburg
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Eric Vanderburg
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
Eric Vanderburg
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
Eric Vanderburg
Principles of technology management
Principles of technology management
Eric Vanderburg
Japanese railway technology
Japanese railway technology
Eric Vanderburg
Evaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
Eric Vanderburg
Japanese current and future technology management challenges
Japanese current and future technology management challenges
Eric Vanderburg
Technology management in Japan: Robotics
Technology management in Japan: Robotics
Eric Vanderburg
Incident response table top exercises
Incident response table top exercises
Eric Vanderburg
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Eric Vanderburg
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
Eric Vanderburg
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Eric Vanderburg
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
Eric Vanderburg
More from Eric Vanderburg
(20)
GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Mobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
Principles of technology management
Principles of technology management
Japanese railway technology
Japanese railway technology
Evaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
Japanese current and future technology management challenges
Japanese current and future technology management challenges
Technology management in Japan: Robotics
Technology management in Japan: Robotics
Incident response table top exercises
Incident response table top exercises
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
Recently uploaded
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
soniya singh
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Memoori
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Alan Dix
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
HostedbyConfluent
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
ThousandEyes
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
AndikSusilo4
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Paola De la Torre
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions
Recently uploaded
(20)
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Slack Application Development 101 Slides
Slack Application Development 101 Slides
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
Computer Architecture - Software - Lesson 13 - Printers, Mac OS and Linux - Eric Vanderburg
1.
Computer Architecture: OS
Technologies Chapter 13 Printers, Mac OS & Linux Eric Vanderburg Eric Vanderburg – OS Technologies © 2005
2.
Review (Printers) •
Sharing a printer – How to – Permissions – DOS LPT & PRN commands • Connecting to a shared printer – Network Neighborhood – AD Eric Vanderburg – OS Technologies © 2005
3.
Windows Printing Process
1. User prints from app 2. App contacts GDI (Graphical Device Eric Vanderburg – OS Technologies © 2005 Interface) 3. GDI contacts print driver for printer info, renders (combines printer info & document) 4. GDI sends rendered job to the print spooler 5. Client side spooler contacts server side spooler 6. Server side spooler contacts print router
4.
Printing Process (continued)
7. Print router determines if the printer is local or remote. a. Local: job forwarded to local print provider b. Remote: finds remote print provider for that print server & that print provider sends the data to the print server local print provider 7. Local print provider finds a print processor that can process the print job 8. Print processor contacts GDI for further rendering (if required) 9. Print processor sends job to separator Eric Vanderburg – OS Technologies © 2005 processor 10.Job is sent to the port monitor which is connected to the printer.
5.
Mac OS Startup
• ROM self test • Settings are pulled from PRAM (Parameter RAM) • Bootable disk is located • Active system folder is found • Mac OS ROM file is loaded • Mac icon displays as system files, libraries, and kernel is loaded • Drivers (enablers) are loaded for devices • Disk first aid runs if bad shut down • Control panels are loaded • Desktop displayed • Finder and startup apps loaded Eric Vanderburg – OS Technologies © 2005
6.
Mac Components •
Dock • Finder • Spotlight • Widgets • Expose • Apple menu • Apps share a menu bar • Notification area in upper right • No registry Eric Vanderburg – OS Technologies © 2005
7.
File System •
HFS (Hierarchical File System) • HFS+ - Mac Extended Format • Blocks instead of clusters • Can mount FAT16 & FAT32 drives • Can read NTFS & Linux partitions with apps • Components – boot blocks – location of system folder (like boot record) – Volume info block – size block size, name, ect – Volume bit map (which blocks are used) – Catalog tree – database of files & permissions – Extents tree – links for additional blocks called extents Eric Vanderburg – OS Technologies © 2005
8.
Other info •
System is defragged when new software is installed • Disk First Aid is like checkdisk • Drive Setup can format • Linux apps can run on Mac OS Eric Vanderburg – OS Technologies © 2005
9.
Linux • Root
is starting point, not drives • More logical in nature instead of physical • Shells – command line interfaces – different support for commands, scripting languages – Echo $shell – shows current shell • Text editors Eric Vanderburg – OS Technologies © 2005 – Vi – Emacs • GUIs – Gnome – KDE
10.
Folders • /bin
– programs and commands • /boot – boot loaders and boot files • /dev – device config files • /etc – config data for users, system settings, and services • /home – user data • /lib – libraries – code modules • /lost+found – orphaned files • /mnt – mounted volumes • /opt – other program files • /root – home directory for root • /sbin – admin commands • /tmp – temp files • /usr – linux file system (read only) • /var – email, news, print spools, admin files Eric Vanderburg – OS Technologies © 2005
11.
Commands • See
pg 578-580 Eric Vanderburg – OS Technologies © 2005
Download now