Будь умным!


У вас вопросы?
У нас ответы:) SamZan.net

Plnning mchine one tht is vstly more powerful thn pocket clcultor

Работа добавлена на сайт samzan.net:


For most people, a computer is a tool for solving problems. When running a word processor, a computer becomes a machine for arranging words and ideas. With a spreadsheet, the computer is a financial-planning machine, one that is vastly more powerful than a pocket calculator. Connected to an electronic network, a computer becomes part of a powerful communications system.

At the heart of every computer is a master set of programs called the operating system. This is the software that communicates with the system hardware to control the computer's input/output systems, such as keyboards and disk drives, and that loads and runs other programs. The operating system is also a set of mechanisms and policies that help define controlled sharing of system resources.

Along with the operating system is a large set of standard utility programs for performing common functions such as copying files and listing the contents of directories. Although these programs are not technically part of the operating, they can have a dramatic impact on a computer system's security.

All of Unix can be divided into three parts:

  1.  The kernel, or heart of the Unix system, is the operating system. The kernel is a special program that is loaded into the computer when it is first started. It controls all of the computer's input and output systems, allows multiple programs to run at the same time, and allocates the system's time and memory among them. The kernel includes the filesystem, which controls how files and directories are stored on the computer's storage devices (e.g., disks). The filesystem is one main mechanism by which security is enforced. Some modern versions of the Unix system allow user programs to load additional modules, such as device drivers, into the kernel after the system starts running.
  2.  Standard utility programs are run by users and by the system. Some programs are small and serve a single function - for example, /bin/Is lists files and /bin/cp copies them. Other programs are large and perform many functions - for example, /bin/sh and /bin/csh, Unix shells that process user commands, are themselves programming languages.
  3.  System database files, most of  which are relatively small, are used by a variety of programs on the system. One file, /etc/passwd, contains the master list of every user on the system. Another file, /etc/group, describes groups of users with similar access rights.

From the point of view of Unix security, these three parts interact with a fourth entity:

  1.  Security policy, which determines how the computer is run with respect to the users and system administration. Policy plays as important a role in determining your computer's security as the operating system software. A computer that is operated without regard to security cannot be trusted, even if it is equipped with the most sophisticated and security-conscious software. For this reason, establishing and codifying policy plays a very important role in the overall process of operating a secure system.




1. методическим объединением вузов России по педагогическому образованию Министерства общего и профессио
2. по теме ПРОИЗВОДНАЯ И ЕЕ ГЕОМЕТРИЧЕСКИЙ СМЫСЛ Вариант 1 А
3. Нагноительные заболевания легких лечение и профилактика
4. составитель заданий- Синева Наталия Викторовна к
5. за рубежа в самых различных формах
6. це мораль любові бо Бог є Любов це форма всіх чеснот це двигун і мета морального життя
7. ВВЕДЕНИЕ Современная телекомуникационная аппаратура вычислительные и радиотехнические комплексы треб
8. демократическими убеждениями
9.  Що таке безпечність виробничого устаткування за рахунок чого вона досягається Безпечність виробничог
10. Ромашка ст. Гиагинской Гиагинского района Рецензенты- Бондаренко Н
11. . Эволюция въездного туризма в России
12. Под этим понятием будем подразумевать выбросы в биосферу от промышленных и иных объектов различных вид.html
13. во Всего руб
14. .to explode ner the metro entrnce
15. на тему- Налог на прибыль организаций порядок исчисления и уплаты на примере организации
16. хозяйственным планом осуществлялся переход экономики республики на военный лад
17. Статья 1 Основные понятия В целях настоящего Федерального закона используются следующие основные понятия
18. Основні поняття авторського права
19. Система ГУЛАГа как элемент власт
20. РЕФЕРАТ дисертації на здобуття наукового ступеня кандидата медичних наук