Episode Transcript
Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:29):
And welcome to
Technology Tap.
I'm Professor J-Rod.
In this episode is OperatingSystems Part 2.
Let's get to it.
Alright, welcome to TechnologyTap.
(01:08):
Thank you for joining us.
For those of you who don't knowme, my name is Professor J-Rod
as J-R-O-D, and I am Professorof Cyber Security, and I make
this podcast to help studentspass their A-plus, network plus
and security plus series ofexams.
Every now and then I dabbleinto Cloud Plus and CYSA Plus,
(01:29):
because that's thecertifications that I have, but
for now mostly is A-plus,network plus and security plus.
I'm also on Instagram atProfessor J-Rod.
I'm also on TikTok.
I'm becoming more active inTikTok, at Professor J-Rod, and
in TikTok I do one, one, twominute videos on questions or a
(01:50):
topic.
So join me there if you want so, and welcome to Technology Tap.
Alright, on the last episode wetalked about operating systems
and the different uses, so we'regonna continue with that.
This is part two of operatingsystems.
So next we're gonna use theuser interface.
The user interface is anoperating system.
(02:11):
Serves as the primary means forusers to interact with the
system, accesses features andmanage the computing task, and
we're gonna go over some of thedifferent types of interfaces
commonly found in operatingsystems.
One is the command lineinterface, which is a text based
interface which allows users tointeract with the operating
(02:32):
system by typing text commandsinto a command line shell.
You don't want your usersgetting into the command line.
Our commands and parameters useenter commands followed by
parameters and options toperform tasks such as file
management, process control andsystem configurations.
Examples of these could becommand shows like bash, command
(02:54):
prompt from Windows and alsopower show from Windows, which
they provide CLI or command lineinterfaces.
Graphic user interface or GUI.
They have your graphicalelements.
Gui uses graphical elementssuch as Windows icons, menus,
buttons and dialogue boxes torepresent system functions and
user actions.
Users interact with the GUI byusing a mouse, touchpad or
(03:18):
touchscreen to navigate throughmenus, manipulate objects and
perform tasks.
Examples are Windows Explorer,finder, mac OS, jamon, genome in
Unix, linux and KDE, also inUnix and Linux environments.
Next, we have touch basedinterfaces.
Touch based interfaces areoptimized for touchscreen
(03:39):
devices like smartphones,tablets and interactive kiosk.
Users interact with touchscreenby tapping, swiping, pinching
and performing other gestures tocontrol applications and
navigate through content.
Some examples of these iOS,apple, android from Google and
Windows 10 from Microsoft offertouch based interfaces for most
(04:03):
mobile devices and tablets.
Next, voice user interface GUIenables users to interact with
the operating system andapplication using spoken words
and natural language.
You have virtual assistantslike Siri for Apple, google
assist for Google, cortana fromMicrosoft.
They use voice recognitiontechnologies to respond to users
(04:26):
queries, perform tasks andprovide information.
Hence free interactions GUIoffers this, making it a
convenient for users to controldevices and access information
while driving, cooking orperforming other activities.
Next, we have natural languageinterface.
Natural language interfaceallows users to interact with
(04:49):
the operating system usingnatural language commands and
conversational dialogue.
Operating system employ naturallanguage processing algorithms
to interpret user input,understand content and generate
appropriate response.
I guess the example of thatwill be chatbots, virtual
assistants and intelligentagents using natural language
(05:10):
interface to facilitate user'sinteraction and automated tasks.
So like when you're writing anemail and then you're typing
something like I'll be and thenit'll type myself right back.
So that's an example of that.
Next, we have gesture-basedinterfaces.
Gesture-based interfaces detectand interpret hand gestures,
(05:33):
body movements and facialexpressions to control devices
and interact with applications.
Kinetic and Microsoft leadmotion and other motion sensing
technologies enable users tointeract with games, multimedia
content and virtual environmentsthrough gestures and body
movements.
Accessibility features I knowMicrosoft does a really good job
(05:56):
with helping people that areneed.
Accessibility Operating systemprovide accessibility features
and assistive technologies toaccommodate users with
disabilities and special needsScreen readers, magnifiers,
voice command and otheraccessibility tools to help
users with visual impairment,motor disabilitation and
cognitive challenge navigate theUI and access system features.
(06:19):
Operating systems offer avariety of user interface
options to accommodate differentuser's preference.
Accessibility requires formfactors and accessibility
requirements.
The choice of UI depends onfactors such as user familiarity
, task complexity, devicecapabilities and accessibility
(06:41):
consideration.
Next we're going to go tonetworking.
Network being in operatingsystems refer to the ability of
an operating system to managenetwork connections, facilitate
communication between devicesand enable access to network
systems.
First one that we're going totalk about is network stack.
Most modern operating systemimplement the TCP IP protocol
(07:05):
suite, which includes protocollike TCP transmission control
protocol and IP internetprotocol, so you get TCP IP from
these protocol govern datatransmission, addressing and
routing on the internet.
Network layering consists.
The TCP IP stacks consist ofmultiple layers this part of the
(07:26):
OSI model guys including thephysical layer, data link layer,
network layer, transport layerand application layer.
Each layer performs specificfunctions related to data
transmission and networkcommunications.
Next we have networkconfigurations.
Operating systems provideinterfaces for configuring
network settings, such as IPaddress, subnet mask, default
(07:49):
gateway, dns servers and proxysettings.
Then we have network adapters,which are hardware components
that enable computers to connectto networks.
Operating systems detect andconfigure network adapters to
establish network connections,like your wireless adapter or
your Nick card Right.
Those are examples of networkadapters, network protocols and
(08:12):
services.
Tcp and UDP transmission controlprotocol provides reliable
connection orientedcommunications between
applications.
That's a three way handshakeright Send, acknowledge and
synchronization, acknowledge.
While user diagram protocol,udp, offers lightweight
(08:34):
connection communicationsuitable for real time
applications like YouTube andNetflix.
Domain name systems resolvedomain names to IP address,
enabling users to accesswebsites and network services
using human readable namesinstead of the IP address right.
If you had to know the IPaddress of your favorite
(08:54):
websites, would you go to theinternet as much as you do now?
Probably not.
Next, dynamic hostconfiguration protocol, or DHCP,
will automatically assigns IPaddress and network
configuration settings tocomputer and devices on a
network.
That's how you get your IPaddress and there's a whole set
of rules for DHCP, dhcp andHTTPS.
(09:19):
Hypertext transfer protocol,which uses port what guys?
It's port 80.
And it's secure variant HTTPS,which uses.
What port guys uses?
Port 443 facilitatecommunication between web
browsers and web servers,enabling access to websites and
web based applications.
(09:39):
Https not really around as much, as Google has punished
websites that have HTTPS byputting them lower on on the
search list, so they kind offorced almost everybody to go to
HTTPS.
So I guess that's a good thing.
Right, our network services andutility, ping the ping utility
(10:05):
test Test network connectivityby sending internet control
message protocol echo requestmessages To a target host while
rates while I'm waiting forreplies.
That's how you can tell that ifyour internet connection is
working or if their website isup.
It's not 100% accurate becausethere are companies like banks
(10:28):
who Refuse to accept ICNPs orping requests.
They'll just just just say noto them.
Next we have trace route, whichtraces the route and packets
take from the local host toremote destination, providing
information about the networkhops and latency.
This is good if you want to seehow how many hops it takes or
(10:51):
how many routers it will take togo from your Computer to like a
website like NBC.
So if you do trace RT Space,that NBC comm, you see how long
it takes to get To your, to yoursite, and it gives you a lot of
information.
If you look at it I Trace routeyou see a lot of information.
(11:11):
It's trace route for Apple andLinux is trace RT for Windows.
Next we have the nest thatcommand, which is place network
connections, routing tables andnetwork interface statistics on
a local system.
Then we have wire shark, whichis a network protocol analyzer
(11:36):
that captures and analyzenetwork traffic in Real-time,
helping diagnose network issuesand security threats.
And if you ever had a chance tomess with a wire shark, I would
do it.
It's actually pretty fun.
It's a little complicated, butthere's YouTube videos for that.
So Next we have network security.
We start with firewalls.
(11:57):
Operating system may include abuilt-in firewall Software to
monitor and filter networktraffic, blocking unauthorized
access Attempts and maliciousconnections.
You have Windows firewall forthat.
Next we have securecommunications protocols like
SSL and TLS, encrypt networktraffic To protect data
confidentiality and integrityduring transmission.
(12:19):
Then you have ideas and IPSsoftware which detects and
prevents Network based a task toattack intrusion attempts and
suspicious activity on thenetwork.
The difference betweenIntrusion detection and
intrusion prevention isintrusion detection lets you
know and intrusion preventiondoes something about it.
(12:42):
Next we have network filesharing Operating system support
network file sharing protocolslike server message block, smb,
and Network file systems, nfs,to enable file sharing and
access to share resources onremote servers.
Users can map network drives tolocal drive letters or mount
(13:03):
network file system to accessremote files and directories as
they were stored locally.
You could do that through theserver or, if you have like a
Network attached storage, a NASdrive not the wrapper NAS, but
you know, nas storage drive, itdoes that.
Next, we have VPN.
Operating systems include a VPNclient software that allow the
(13:26):
users to establish Secure,encrypted connections to remote
VPN servers over the Internet.
Vpn use tunneling protocolslike PPTP, l2tp, ipsec and
OpenVPN to encapsulate or wrapand encrypt network traffic,
(13:46):
ensuring policy andconfidentiality.
Network capabilities areessential for modern operating
systems, enabling the users toconnect to the internet, access
network resources, communicatewith remote devices and
collaborate with others acrossdistributed computing
environments.
Operating systems provide awide range of networking
(14:08):
features, protocols andutilities to support diverse
network configurations andcommunication requirements.
Next, we have what type ofoperating systems that they have
.
Desktop operating systems aredesigned to provide a user
friendly environment forpersonal computing tasks on the
(14:31):
desktop and laptop computers.
Let's take a look at some ofthe popular ones.
First off, you're going to knowthis one Windows right.
Windows 11 is the latestversion.
Right Windows is known for thiswide compatibility with
hardware and software, extensivedriver support and a rich
(14:51):
ecosystem of applications andgames.
It offers a GUI with featureslike start menu taskbar and
Windows Explorer for filemanagement.
Windows integrates withMicrosoft series of services
like Office 365, onedrive andCortana for productivity and
(15:12):
cloud storage.
Windows offers versionstailored for enterprise
environments, such as Windows 11Pro, with features like
BitLocker, encryption, grouppolicy management and remote
desktop.
Always try to buy the Windowsthat is going to suit you.
I bought Windows home for yearsbecause, honestly, it was
(15:35):
cheaper.
When we started doing Zoom, Irealized this is not going to
work, because a lot of the stuffthat I was asking my students
to do, I could even do it on myown computer.
From now on, it's Pro all theway, all right.
Next we have Mac OS.
Mac OS is known for its sleekdesign, stability and
(15:56):
integration with Apple'secosystems.
It offers features like thedock spotlight, search and
mission control and the finderfor file management.
Mac OS integrates tightly withother Mac products and services,
such as iCloud, imessage,facetime, continuity, features
like Handoff and UniversalClipboard.
(16:18):
I've never used Handoff.
I'm not really too familiarwith that one.
It also includes Delerper toolslike Xcode, apple's integrated
development environment forsoftware development across iOS,
mac OS, watch OS and TV OSplatforms.
Wow, that's a lot.
(16:39):
Apple rules the world, I think,or pretty soon.
Next we have everybody'sfavorite, linux.
Linux is available in variousdistribution or distros, like
Ubuntu, fedora, debian, centosand Linux Mint.
Linux is an open source andhighly customizable, with
different desktop environmentsand package managers.
(17:02):
Linux is a vibrant community ofdevelopers and users who
contribute to this development,provide support and create a
wide range of softwareapplications and tools.
While Linux is popular forservers and cloud environment,
many desktop users appreciateits stability, security and
flexibility for personalcomputing tasks.
(17:24):
Next we have Chrome.
Chrome OS is a lightweight,cloud-centric operating system
developed by Google primarilyfor its Chromebooks and
Chromebox devices.
Chrome OS relies heavily oncloud services, with
applications and data stored inaccess primarily online through
the Chrome browser and GoogleWorkspace, or formerly G Suite,
(17:48):
apps.
Chrome OS emphasized securitythrough sandboxing, automatic
updates, verified boot andbuilt-in malware protection.
Chrome OS is popular ineducation.
It is extremely popular.
Google is making a killing withChromebooks in schools, and
(18:08):
only because, one, it's cheapand, two, everything is saved in
the cloud.
You don't have to worry aboutthe students deleting stuff.
I mean, at least unless theydelete from the cloud, but still
it's a better environment forschools.
I mean, they killed it whenthey did that.
Honestly, they're making moneyhandover full out of schools and
(18:29):
enterprise environments due tosimplicity, low cost and
centralized management throughGoogle Admin Console and they
have a good support.
When I was a high schoolteacher, I was also the tech.
They have pretty good techsupport.
Each desktop operating systemhas its strength, user interface
, software ecosystems and targetuser base.
(18:53):
The choice of an operatingsystem often depends on factors
such as user preference,hardware compatibility, software
requirements and workflow needs.
Next, we have server operatingsystems.
Server operating system, aspecialized operating system
designed to manage serverhardware resources and provide
(19:13):
services to clients over anetwork.
Let's take a look at some ofthe popular ones here.
Of course, windows Server right.
The latest is Windows 2022.
Windows Server offers a rangeof features for file and print
service, active Directory,domain services with server
roles, web server roles, remoteaccess, virtualization with
(19:36):
Hyper-V and cloud integrationwith Azure services.
Windows Server comes indifferent editions, such as
standard, data center andessential, each tailor for
specific workloads and licensingneeds.
We use data center.
At school, I teach a serverclass it's actually one of my
favorite classes because it'svery hands-on and we use Windows
(19:59):
Server data center.
Windows Server integrates withMicrosoft's ecosystem of
productivity and managementtools, including system center,
powershell and Azure ActiveDirectory.
Next we have Linux.
Linux Server operating systemsare available in various
distributions such as Ubuntuservers, centos, red Hot
(20:21):
Enterprise, debian and Fedoraserver.
Linux is open source and offersflexibility, stability and
security for server deployment.
It supports a wide range ofserver roles, including web
servers like Apache, databaseservers like MySQL and
application servers like Tomcat.
Containerization Linux serversare commonly used for
(20:44):
containerization workloads withtechnology like Docker and
container orchestrationplatforms such as Red Hat
OpenShift.
Linux servers are often managedand configured via the command
line, using tools such as SSH,bash Scripting and package
management such as APT and YUM.
(21:08):
Unix is next.
Unix-based operating systemslike FreeBDS, openbds and
Solaris are used for specificserver workloads and
environmental enterprises.
Scalability Unix systems offerscalability, reliability and
advanced features forhigh-performance computing,
(21:29):
large-scale database andmission-critical applications.
Unix systems are known fortheir robust security features,
access control and auditingcapability, making them suitable
for environments with stringentsecurity requirements.
Many legacy systems andenterprise applications still
run on Unix-based platforms,leveraging their stability and
(21:53):
compatibility with legacysoftware.
Next, we have VMware ESXi, whichI actually use in my server
class, which is it's a baremetal hypervisor used for server
virtualization, allowingmultiple virtual machines to run
on a single physical server.
Esxi offers features forresource allocation, high
(22:17):
availability for tolerance andlive migration.
The motion of virtual machines,vmware and vSphere provides
centralized management platformfor deploying, monitoring and
managing virtualized environment, with features like vCenter
server, vsphere client andvRealize Suite.
Vmware solutions integrate withcloud platform storage systems
(22:42):
and network technology toprovide a comprehensive
virtualization infrastructure.
And it's very good.
I actually I'm a big fan.
I started using it last yearand I'm a big fan of it.
We install a server on the boxand then we, using Hyper-V, we
(23:05):
install another server and thenWindows 10 workstation, windows
11 workstation, and then weconnect them, we install Active
Directory, we go on the commandline.
Students have a lot of fun.
It's a very hands-on class.
They also have Delerpril tools.
(23:29):
Server operating system no,that's a server.
Operating systems play acrucial role in developing
network services, hostingapplication, managing data
storage and ensuring theavailability, scalability and
security of enterprise ITenvironments.
The choice of server operatingsystems depend on factors such
as performance requirements,application compatibility,
(23:50):
licensing costs and organizationpreference.
And then we have mobileoperating systems, which are
specialized software platformsdesigned to power smartphones,
tablets, wearables and othermobile device.
Let's take a look at someAndroid developed by Google.
Android is based on the Linuxkernel and its open source,
(24:13):
allowing device manufacturersand developers to customize and
extend its features.
Customization Android offersextensive customization options
for device manufacturers andusers, allowing them to modify
the user interface, installcustom ROM and customize system
settings.
Android devices, such as theGoogle Play Store, which offers
(24:37):
I'm sorry, android devices,access the Google Play Store,
which offers a vast ecosystem ofapps, games and digital content
.
Android integrates with Googleservices such as Gmail, google
Maps, google Assist and GoogleDrive for a seamless user
experience across devices.
Next, we have iOS, and that wasdeveloped by Apple.
(24:58):
Ios is a closed sourceoperating system exclusive to
Apple's mobile device, such asiPhones, ipads and iPod touch.
Ios features a sleek, intuitiveuser interface with features
like the App Store ControlCenter and Siri.
Ios devices access the AppleApp Store, which offers a high
(25:22):
selection of quality apps, gamesand media content.
Ios integrates tightly withother Apple products and
services, such as iCloud,imessage, facetime, apple Pay,
for seamless experience acrossdevices.
I'm actually a big Apple that'sApple Mac guy but a lot of the
other stuff I like the phone,you know, the, the IWALA, apple
(25:47):
Pay.
I'm a big fan of that.
Ipados, again developed by Apple, ipados is the derivative of
iOS specifically optimized forthe Apple iPad tablets, offering
features tailored for largescreens and productivity tasks.
Ipados introduced advancedmultitasking features like split
(26:09):
views side over andpicture-in-picture mode,
allowing users to run multipleapps simultaneously and enhance
productivity.
Ipados offers native supportfor the Apple Pencil style,
enabling users to sketch, drawand take handwritten notes where
precision is.
That's really good.
I bought one during COVIDDesktop class browsing.
(26:33):
Ipados provides a desktop classbrowsing experience with
features like desktop websitesin Safari download manager and
improved text editingcapabilities.
Another one that I came across,too, is Harmony OS, developed by
Huey.
Harmony OS is designed as aunified operating system for
(26:55):
wide-ranging devices includingsmartphones, tablets,
smartwatches, smart TVs andInternet of Things devices.
Harmony OS adopts a distributedarchitecture enabling seamless
collaboration and communicationbetween devices for cohesive
user experience.
Harmony OS supports Androidapps, allowing users to access a
(27:16):
vast ecosystem of third-partyapplications while offering
enhanced performance andsecurity features.
Also, harmony enablescross-device collaboration
features such as multi-screen,allowing users to seamless
transfer tasks and contentbetween devices.
Mobile operating system play acrucial role in powering the
(27:36):
modern mobile communityexperience, offering users
access to a wide range of apps,services and digital content,
while providing seamlessintegration with cloud services
and Internet of Things devices.
The choice of mobile operatingsystem depends on factors such
as device preference, ecosystemintegration, app availability
(27:59):
and user experience requirements.
Yeah, I was a big fan of theAndroid, and then the Android
kind of reminds me of a computer.
After a while it doesn't workas fast.
I think it's missing a scandisk or a defrag on it, because
(28:21):
after a while, just to get abaseball highlight to open up,
it takes forever.
Anyway, it looks like we'regoing to have to do a part three
on operating systems, which isgood, right.
We're getting into the granularof how and the different
choices of operating systems andhow they work and how they
function, which is somethingthat we need for the or need to
(28:42):
understand for our CompTIA forthe A plus exam.
So this is a good topic.
It's a little long it's goingto take me three episodes to
cover the whole thing but it'ssomething that we need,
something that is good for us tohave.
So I don't forget, guys, I'mtrying to build an audience on
TikTok.
I'm under Professor J Rod,j-r-o-d.
(29:05):
Click the like.
If I get a thousand likes I cango live.
And if I go live I can do, likequick, you know, question and
answers on live.
Or if you have an issue maybeyou have an issue with why are
you having difficulty passingthe CompTIA exam and if we can
have a one on one on TikTok, I'mmore than happy to help you.
I mean, this is what I do, thisis what I'm here for.
(29:27):
Guys, take advantage, takeadvantage.
This is how we, you know, witheducation, this is how we get,
you know, have the ability tomake more money and provide what
our families buy by education.
And this is the way.
As they say in what is thatshow?
(29:47):
Star Wars, right?
This is the way.
So, yeah, you know, look outfor me, email me.
You know, get in touch with me.
You know it's various ways andyou know we can.
We can build this community andcontinue to, you know, help
(30:07):
each other out and become big,big players in CompTIA.
So, until next time, I will seeyou on the next episode, which
should arrive within about Idon't know a couple of days.
Right, I'm trying to be, I'mtrying to be a little bit more
(30:31):
cautious.
I know things get busy.
You know I get busy and stuff Iforget.
I apologize for that, but youknow, as you know, there's a lot
of things that I'm doing andhopefully a lot of great things
happen in the future, for youknow I can play forward.
You know, in this journey, alot of people have helped me.
My job is to help you and helpother people in this journey,
(30:53):
just like people have helped me.
So until next time.
So until next time, bye.
(31:22):
This has been a presentation ofLittle Chacha Productions.
Art by Sarah.
Music by Joe Kim.
You can reach me by email atprofessorjrodd at gmailcom.
You can also reach me onInstagram at Professor Jrodd, or
on TikTok at Professor Jrodd.
(31:42):
Turn on your notitions everyday until next week.