Comparative Analysis of Microcomputer Operating Systems ITON1011

This course provides a historical perspective and an overview of operating systems significant to the development of microcomputer. Students will study vocabulary, usage, and basic functionality of a wide variety of previous and current versions.

Correlated Learning Outcomes

  • AR-06 Decompose the organization and major functional units of the classical von Neumann machine. [Analyzing]
  • AR-07 Diagram how high-level language patterns map to assembly/machine language, including subroutine calls. [Applying]
  • AR-09 Demonstrate the basic concepts of interrupts and I/O operations. [Understanding]
  • CYB-01 Describe security as a continuous process of tradeoffs, balancing between protection mechanisms and availability. [Understanding]
  • CYB-02 Illustrate through examples the concepts of risk, threats, vulnerabilities, attack vectors, and exploits, noting there is no such thing as perfect security. [Applying]
  • CYB-05 Explain the concepts of trust and trustworthiness related to cybersecurity. [Understanding]
  • CYB-06 Examine ethical issues related to cybersecurity. [Analyzing]
  • CYB-07 Illustrate various ways to minimize privacy risks and maximize anonymity. [Applying]
  • CYB-18 Examine the need to update software to fix security vulnerabilities. [Analyzing]
  • CYB-19 Examine likely attack types against standalone and networked systems. [Analyzing]
  • OS-01 Examine major objectives, functions, features, and concepts of modern operating systems. [Analyzing]
  • OS-02 Compare prevailing types of operating systems. [Analyzing]
  • OS-03 Illustrate potential threats to operating systems and appropriate security measures. [Applying]
  • OS-04 Diagram the interaction of an Application Programming Interface (API) with an operating system [Applying]
  • OS-05 Illustrate how computing resources are used by applications and managed by the operating system. [Applying]
  • OS-10 Investigate the features and limitations of an operating system used to provide protection and security. [Applying]
  • OS-13 Diagram the physical hardware devices and the virtual devices maintained by an operating system. [Applying]
  • SF-04 Describe how computing systems are constructed of layers upon layers. [Understanding]
  • SP-01 Investigate both positive and negative ways in which computing technology impacts information exchange and social interaction. [Applying]
  • SP-02 Examine developers’ assumptions and values embedded in hardware and software design, especially with respect to underrepresented groups and diverse populations. [Analyzing] See also HCI-06.
  • SP-03 Analyze the impact of diversity on the computing profession. [Analyzing]
  • SP-04 Investigate social engineering attacks and the types of bad actors who might perform them. [Applying]
  • SP-07 Examine various ethics scenarios in computing. [Analyzing]
  • SP-08 Support the ethical responsibility of ensuring software correctness, reliability, and safety. [Evaluating]
  • SP-16 Use effective oral, written, electronic, and visual communication techniques with stakeholders. [Applying]
  • SP-17 Interpret the impact of both verbal and nonverbal cues during communication among team members. [Understanding]
  • SP-18 Develop technical artifacts. [Creating]