5.1 Flashcards
The person using the computer/device.
User
Executable code designed to carry out specific tasks on the computer, also referred to as programs or software.
Application
Allow the user to interface with applications, system software, and hardware.
OS Interface
The heart of the OS. Manages the interaction between each layer.
OS Kernel
The OS Kernel and OS Interface make up the _________.
System Software
The mechanical, magnetic, electronic, and electrical components of a computer.
Hardware
What three functions must every OS perform?
- ) File System Management
- ) Process Management
- ) Device Management
Defines the way data is named, stored, organized, and accessed on a hard drive.
File System
Containers used to organize files and data for the benefit of usability and retrieval of data.
Directory
A singular named resource that is used for storing information/data.
File
An executing instance of an application.
Process
Any hardware component or peripheral attached to the computer.
Device
The communications path between the OS and a device is made possible by ______..
Device drivers
What are the five OS categories?
- ) Single User
- ) Multiuser
- ) Client
- ) Server
- ) Distributed
Only one user can perform a task at any time.
Single User, Single-Tasking
Only one user can perform multiple tasks (programs) at a time.
Single User, Multi-Tasking
One or more users can perform one or more tasks each at one time.
Multiuser
Operates in a networked environment allowing a user to connect to another computer (server) to retrieve information.
Client
Provides various services, including email, file sharing, and printer access, as well as ensuring security, to other computers (clients) across a network.
Server
One or more tasks are spread among two or more computers.
Distributed
Composed of more than one computer or device in which all communicate with one another using a common language or protocol.
Network
Every OS has inherent vulnerabilities posing risks that must be acknowledged and managed by what is known as __________.
Information Assurance (IA)
IA measures are taken to assure what?
- ) Confidentiality
- ) Integrity
- ) Availability
- ) Non-repudiation
- ) Authentication
Assurance that information is not disclosed to unauthorized individuals, processes, or devices.
Confidentiality
Assurance that no unauthorized modification or destruction of information occurred.
Integrity
Assurance of reliable access to data and services for authorized users.
Availability
Assurance that data delivery is proven to be from a reliable source.
Non-repudiation
Assurance of properly verifying a user’s credentials. The process of the user proving who they claim to be, by providing the credentials for a valid account on the system. May be provided in what forms?
Authentication;
- ) Username and/or Password
- ) Card or Token
- ) Biometrics