1.5 – Systems software Flashcards

1
Q

What is systems software

A

. Systems Software runs the computer
hardware and applications. It allows the user to interact with the hardware and applications
and allows the user to actually use the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the two types of systems software

A

-Operating System
▪ Utility System Software (Utilities for short)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the role of an Operating System (OS) in a computer system

A

An Operating System (OS) serves as the backbone and core software of any computer system. It controls the computer, managing hardware, the user interface, and other software running on the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the six key functions or components that an Operating System is responsible for?

A

-Memory Management
-User Interface
-Multitasking
-Peripheral Management
-User Management
-File Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Memory Management in the context of an Operating System

A

Memory Management in the context of an Operating System (OS) involves the management of data transfer between memory units, including RAM (Random Access Memory), CPU, and storage devices (e.g., hard drive). The OS oversees the loading of programs from the hard drive to RAM, and it also manages the storage location of these programs within RAM once loaded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is User Interface, and why is it essential

A

User Interface is the means by which the Operating System (OS) provides users with a way to interact with and control the computer. It is crucial for users to control and utilize the computer effectively

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

GUI (Graphical User Interface)

A

Users navigate the computer’s features and applications through menus, icons, and lists. An example is Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Command Line

A

Users input specific commands in a text format to control and use the computer. These commands often resemble code and must be accurate for the computer to respond.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Voice Control

A

Users control the computer using their voice, providing commands verbally. The computer processes and executes the commands. Siri is given as an example of Voice Control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

GUI adv and disadv

A

Advantages: Easy to use with icons, menus, and buttons; No prior experience required.
Disadvantages: Consumes a large amount of storage space due to the extensive use of icons, menus, and buttons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

command line adv and disadv

A

Advantages: Takes up minimal storage space; Simple.
Disadvantages: Difficult to use, requires specific commands; Training and practice needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

voice control adv and disadv

A

Advantages: Allows control without additional peripherals; Suitable for people with disabilities.
Disadvantages: Consumes a significant amount of storage space; Not always accurate in recognizing and executing user commands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Multitasking

A

when the OS enables the simultaneous execution of more than one program. The OS achieves this by allocating processing time to each open program. It allows users to have multiple programs running concurrently, enhancing efficiency and convenience.without multitasking, users would be limited to running only one program at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Peripheral Management

A

the OS overseeing input and output devices connected to the computer, such as the keyboard and mouse. For the OS to effectively manage peripherals, it requires an understanding of the instructions received from these devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Device driver

A

” a software piece installed to enable proper functionality of a peripheral device on a computer. Device drivers contain instructions facilitating the connection and data exchange between the peripheral device and the computer. Without the appropriate driver, a peripheral device cannot function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what else does the os provide in peripheral management

A

the OS provides “buffers,” small temporary storage areas that hold data while it is processed by the device., buffers
are used in printing. Imagine you send 10 documents to print, they can’t all be printed at the
same time, so a queue is formed. The OS will create printing buffers enabling the print jobs to
be stored and queued until the printer can complete the job.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is User Management

A

the system’s capability to enable different users to log onto the same computer while preserving individual settings for each account, including desktop backgrounds, file access permissions, and program preferences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What functionalities does User Management offer within the OS?

A

the creation of new accounts on the device, along with the configuration of access rights, permissions, and security settings for each user.

19
Q

How does User Management handle users connected to a network?

A

may have a fixed profile imposed on a user, and login requests may be managed by the network instead. This ensures a standardized experience, as illustrated by school computers that automatically provide a set background and desktop icons upon login, which users cannot change.

20
Q

What is the significance of User Management in maintaining a secure and organized computing environment?

A

User Management is crucial for ensuring a secure and organized computing environment where multiple users share the same system. It helps manage individual user configurations and access permissions while allowing for the creation of new accounts with specific settings.

21
Q

Can users alter their settings in situations where a fixed profile is imposed, as mentioned in the example of school computers?

A

No, in scenarios where a fixed profile is imposed, such as when logging into school computers, users are automatically provided with a set background and list of desktop icons that cannot be changed.

22
Q

What is File Management

A

the system’s provision of a logical structure for the storage of data, offering users files to store data and the ability to create organized folder structures.

23
Q

How does File Management help organize data within the computer system?

A

allows users to create folders and store files in a structured manner, facilitating the organization and retrieval of data in an orderly fashion.

24
Q

What role does file extension play in File Management?

A

Each file is assigned a specific extension by the OS, indicating the type of file and the associated application for opening it. For example, a Word document might have the extension .docx, specifying that it should be opened in word processing software like Microsoft Word.

25
Q

an example of how file extensions work in File Management?

A

For instance, a slideshow presentation file may have the extension .pptx, indicating that it is a presentation file meant to be opened in slideshow presentation software, such as Microsoft PowerPoint.

26
Q

How does File Management contribute to a more efficient and organized use of computer resources?

A

enhances efficiency by providing a systematic approach to storing and accessing data. It ensures that files are logically arranged, making it easier for users to locate and work with their data based on the file types and associated applications.

27
Q

What is the purpose of Utility System Software, or Utilities, in a computer system?

A

Utilities assist users in managing their computers by maintaining, configuring, and optimizing both hardware and applications, ensuring efficient system performance.

28
Q

Why are Utilities essential for a computer system’s efficiency?

A

While a computer can function without Utilities, these tools are crucial for maintaining optimal performance. Without Utilities, computers may slow down, leading to user stress and operational issues.

29
Q

examples of different types of Utilities?

A

Some types of Utilities include Encryption Software, Defragmentation Software, and Data Compression Software.

30
Q

In what ways do Utilities contribute to system maintenance and efficiency?

A

Utilities support system maintenance by regularly checking for software updates, performing system clean-ups to remove unnecessary files, and enabling data backup processes.

31
Q

How does Utility Software assist in software updates?

A

Utility Software regularly checks for updates to applications on the computer and notifies the user when updates are available, ensuring that software remains current and secure.

32
Q

What is the role of Utility Software in system clean-up?

A

Utility Software conducts system clean-ups by identifying and removing old and unused files from storage, optimizing the system’s performance. This includes deleting old installation files that are no longer necessary.

33
Q

Explain the concept of data backup and its importance.

A

Data backup involves creating a copy of data and storing it in another location, such as an external hard drive. This practice ensures that if the original data is lost or damaged, it can be restored from the backup. This is crucial for preventing data loss in the event of system or storage media damage.

34
Q

What is encryption, and how does it work in terms of data protection?

A

Encryption involves scrambling data into a secret code, making it unreadable without a master key. Only the sender and receiver possess this key, preventing unauthorized access and understanding of the data.

35
Q

Why is the master key essential in encryption?

A

The master key is crucial as it allows for the decryption of the scrambled data. Without this key, it is practically impossible to understand the encrypted information.

36
Q

How do devices ensure they have the correct master key before sending encrypted data?

A

Prior to sending encrypted data, both devices involved in the communication process verify that they possess the correct master key. This ensures a secure and successful encryption and decryption process.

37
Q

Is Encryption Software typically part of Utility Software, or can it also run independently?

A

Encryption Software can be part of Utility Software, providing users with tools for encryption. Additionally, there are standalone software applications dedicated to encryption, offering users an independent means of securing their data.

38
Q

Why is encryption considered an essential security measure

A

Encryption is essential for protecting sensitive information during transmission. It adds a layer of security, especially in scenarios where data may be vulnerable to interception or hacking

39
Q

What is fragmentation, and how does it affect computer systems?

A

when data from the same file is split up and scattered across the hard drive.doesn’t harm the system but can lead to decreased efficiency and performance slowdown.

40
Q

What is the process of defragmentation, and why is it performed on hard drives?

A

Defragmentation is the reorganization of data stored on a hard drive to optimize space usage. It ensures that data linked to the same file is rearranged, consolidating it and improving access speed. The goal is to make better use of space and enhance overall system performance

41
Q

How does fragmentation impact computer performance?

A

While fragmentation itself doesn’t harm the computer system, it can lead to decreased efficiency and slower performance. Accessing fragmented data takes longer, causing delays in overall system responsiveness.

42
Q

Why is defragmentation important for hard drives?

A

Defragmentation is essential to maintain optimal hard drive performance. By reorganizing data and grouping related information together, it improves access speed and overall efficiency, mitigating the impact of fragmentation.

43
Q

What is the purpose of reorganizing data during the defragmentation process?

A

During defragmentation, the purpose is to reorganize data so that it is located together, making access quicker and more efficient. This optimization ensures that related data fragments are consolidated, reducing access times for improved performance.

44
Q

How does defragmentation contribute to making better use of hard drive space?

A

Defragmentation rearranges data on the hard drive, optimizing the space and ensuring that related data is grouped together. This process makes the best use of available space, preventing unnecessary fragmentation and enhancing storage efficiency.