Topic > Essay on Operating System - 695

An operating system (OS) is basically used to run a certain application. It is one of the most important parts of an application (Hill, 2012). An operating system gives the ability for a software or application to learn and manage things perfectly and in an organized way (Wierenga, 2000). The essence of the operating system is very important in the production of mobile phones. There is yet another important type of operating system called Mobile Phone Operating System (MPOS), also known as Mobile OS. It is basically an operating system used to run a smartphone, tablet, and other devices such as personal digital assistant. MPOS has the ability to use several features accordingly on personal computers and also other GPS-based mobile navigation. Apple Google's Android and IOS are the leaders in the smartphone era, because in the last five years there has been a revolutionary change in the use of mobile phones. Apple's iPhone series created ripples in the market, but in 2007, Google Android was launched, which became a challenge for the operating system in the domain of Apple iOS. There are many famous platforms in the world of information technology, such as Android, Facebook, Twitter and many others. Android has adopted a permission-based model in their consideration. With the help of these particular templates, applications (apps) are needed and known for their functionality. Due to the prevalence of privacy-invading spyware and malware in the traditional computing environment, new and efficient platforms have now moved towards permission-based models. , which are mainly Facebook and Android (McLoughlin, 2010). Browsers and smartphone operating systems provide certain development platforms... middle of paper... a general review process accordingly. The Android application provides all kinds of access to phones, microphones, cameras, text messages and even the GPS system. Apart from these applications, Bluetooth and Wi-Fi are some of the major examples where access is controlled through effective permissions and a person cannot use or share the device without prior permission or intimation. The basic competitiveness of this Android application is that the other party has the option to reject or accept the other party's proposal through any of the above-mentioned applications. Previous research has shown that relying on the user is invalid because most users do not understand the information or authority to be considered. We propose a solution that uses a method to assign a risk score to each application and displays a summary of the information to the user.