COE128 Exam - 1 Flashcards

1
Q

Is a program that manages the computer hardware

A

Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It provides a basis for application programs and acts as an intermediary between the computer user and the computer hardware

A

Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Examples of Operating Systems

A

Mac OS
IOS
Android OS
Linux
Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of OS

A

Batch OS
Time Sharing OS
Distributed OS
Network OS
Real Time OS
MultiProgramming/Tasking OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Functions of OS

A
  • It is an interface between the User and the Hardware
  • Allocation of Resources
  • Management of Memory, Security, ect.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Goals of OS

A
  • Convenience
  • Efficiency
  • Both
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Its function is to synchronize access to the memory

A

Memory Controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The initial program that runs when a computer is powered up or rebooted.

A

Bootstrap Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Refers to the process of starting up a computer or initializing a computer.

A

Booting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The occurrence of an event is usually signaled by an ________ from hardware or software.

A

Interrupt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

During the ____________, the computer’s hardware is initialized, and the operating system’s kernel is loaded into memory. Once the kernel is loaded, it takes over control of the system and starts executing the necessary system services and drivers to bring the computer to a fully operational state.

A

Booting Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hardware may trigger an _________ at any time by sending a signal to the CPU, usually by the ways of the system bus.

A

Interrupt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Software may trigger an interrupt by executing a special operation called ________.

A

System Call

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The fixed location usually contains the starting address where the ____________ is located.

A

Service Routine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Storage-device Hierarchy

A

Register ↔ Cache ↔ Main Memory ↔ Electronic Disk ↔ Magnetic Disk ↔ Optical Disk ↔ Magnetic Tapes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Memory that last only while the power is on (and thus would be lost after a restart).

A

Volatile Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Types of Computer Memory

A

Volatile Memory and Non-Volatile Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Is a type of computer memory that can retain stored information even after power is removed.

A

Non-Volatile Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Why is it not possible to store program and data to the main memory?

A
  • It is too small to store all needed programs and data permanently
  • It is volatile storage device that loses its contents when power is turned off.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Able to hold large quantities of data permanently.

A

Secondary Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

An extension to the main memory

A

Secondary Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Types of Computer System

A
  • Single Processor System
  • Multi Processor System
  • Clustered System
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

One main CPU capable of executing a general purpose instruction set, including instructions from user processes.

A

Single Processor System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Also known as parallel systems or tightly coupled system

A

Multiprocessor System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Has two or more processors in close communication, sharing the computer bus and sometimes clock, memory and peripheral devices.
Multiprocessor System
26
Advantages of Multiprocessor Systems
- Increase throughput - Economy of Scale - Increase Reliability
27
Types of Multiprocessor Systems
Symmetric Multiprocessing and Asymmetric Multiprocessing
28
It gather together multiple CPUs to accomplish computational work.
Clustered Systems
29
It is composed of two or more individual systems coupled together.
Clustered Systems
30
It provides high availability and can be structured asymmetrically or symetrically.
Clustered Systems
31
Two things that every OS must be capable of doing.
- Multiprogramming - Time Sharing (Multitasking)
32
The capability of running multiple programs by the CPU.
Multiprogramming
33
Increases the CPU utilization by organizing jobs (code and data) so that the CPU always has one to execute.
Multiprogramming
34
Provides an environment in which the various system resources are utilized effectively, but they do not provide for user interaction with the computer system.
Multiprogrammed System
35
The CPU executes multiple jobs by switching among them.
Time Sharing (Multitasking)
36
Switches occur so frequently that the user can interact with each program while it is running.
Time Sharing (Multitasking)
37
It requires an interactive (or hands-on) computer system, which provides direct communication between the user and the system.
Time Sharing (Multitasking)
38
A ________ allows many users to share the computer simultaneously.
Time-Shared Operating System
39
Uses CPU scheduling and multiprogramming to provide each user with a small portion of the time-share computer.
Time Sharing (Multitasking)
40
A program loaded into the memory and is executed is called _______.
Process
41
9 Operating System Services
- User Interface - Program Execution - I/O Operations - File System Manipulation - Communication - Error Detection - Resource Allocation - Accounting - Protection and Security
42
Human to computer interaction and communication in a device.
User Interface
43
Two Types of User Interface
CLI - Command Line Interface GUI - Graphical User Interface
44
Run the program in the computer.
Program Execution
45
Transfer data to or from a computer.
I/O Operation
46
The OS controls how the files in your system are manipulated or managed.
File System Manipulation
47
It controls the permission that is given to certain programs or users for the access of certain files.
File System Manipulation
48
Process of exchanging information between different components of an OS.
Communications
49
When error occur, your system must not break down completely and it should not just seize your computing ability completely.
Error Detection
50
The OS should allocate the required resource to the processes which are asking for those resources.
Resource Allocation
51
The OS must allocate the resources in an efficient way such that all the processes get the resources that they need.
Resource Allocation
52
Having usage of statistics can be valuable for researchers who wish to reconfigure the systems or to improve the computing services.
Accounting
53
When several different processes are executing at the same time, they should not interfere with each other's operation. And it involves ensuring that all access to system resources are controlled.
Protection and Security
54
Provides an interface to the services made available by an Operating System.
System Calls
55
Two modes of operation on which a program can execute.
- User Mode - Kernel Mode
56
- Does not have direct access to memory, to the hardware and other resources. - Safe Mode
User Mode
57
- Has direct access to memory, hardware and other resources. - Privileged Mode
Kernel Mode
58
When a program is switching from user mode to kernel mode (vice versa) that is known as _________.
Context Switching
59
It is the programmatic way in which a computer program requests a service from the kernel of the OS.
System Call
60
end, abort
Process Control
60
5 Types of System Call
1. Process Control 2. Device Control 3. File Manipulation 4. Information Maintainance 5. Communications
60
load, execute
Process Control
60
create process, terminate process
Process Control
60
get process attributes, set process attributes
Process Control
60
wait for time
Process Control
61
wait event, signal event
Process Control
61
allocate and free memory
Process Control
61
create file, delete file
File Manipulation
62
open, close
File Manipulation
63
read, write, reposition
File Manipulation
64
get file attributes, set files attributes
File Manipulation
65
request device, release device
Device Management
66
get device attributes, set device attributes
Device Management
67
logically attach or detach devices
Device Management
68
get time or date , set time or date
Information Maintenance
69
get system data, set system data
Information Maintenance
70
get process, file, or device attributes
Information Maintenance
71
set process, file, or device attributes
Information Maintenance
72
create, delete communication connection
Communications
73
send, receive messages
Communications
74
transfer status information
Communications
75
attach or detach remote devices
Communications
76
Also known as system utilities, provide convenient environment for program development and execution.
System Programs
77
6 Categories of System Programs
1. File Management 2. File Modification 3. Status Information 4. Programming-language Support 5. Program Loading and Execution 6. Communication
78
Create, Delete, Copy, Rename, Print, Dump, List, and generally manipulate file and directions.
File Management
79
Ask the system for: - Date, Time - Amount of available memory or disk space - Number of users - Detailed performance - Logging and debugging information
Status Information
80
Several text editors may be available to create and modify the content of files stored on disk or other storage device.
File Modification
81
- Compilers - Assemblers - Debuggers - Interpreters for common programming languages
Programming-language Support
82
Once a program is assembled or compiled, it must be loaded into memory to be executed.
Program Loading and Execution The system may provide: - Absolute loaders - Relocatable loaders - Linkage editors - Overlay loaders
83
These programs provide the mechanism for: - Creating virtual connections among processes, users, and computer systems. - Allowing users to send messages to one another's screens -To browse Web pages - To send electronic-mail messages - To log in remotely, and to transfer files from one machine to another .
Communications
84
The system should be convenient to use, easy to learn and to use, reliable, safe, and fast.
User Requirements (User Goals)
85
The system should be easy to design, implement, and maintain; and it should be flexible, reliable, error free, and efficient.
Designer/ Engineer Requirements (System Goals)
86
Determines how to do something.
Mechanism
87
Determines what will be done.
Policies
88
Advantages of writing in high level languages.
- The code can be written faster - It is more compact - It is easier to understand - It is easier to port
89
The fundamental idea behind a ____________ is to abstract the hardware or a single computer into several different execution environment, thereby creating the illusion that each separate execution environment is running its own private computer.
Virtual Machines
90
Two Modes of Virtual Machine
Virtual user mode Virtual kernel mode
91
Advantages of Virtual Machines
- Isolation - Resource Sharing - Convenience - Security - Compatibility - Software Development and Testing
92
VMs provide a high degree of isolation between the guest operating system (OS) and the host OS.
Isolation
93
VMs can efficiently share physical resources, such as CPU, RAM, and storage, with the host and other VMs.
Resource Sharing
94
Can simultaneously run multiple operating systems on a single physical machine
Convenience
95
VMs are often considered more secure because any issue or malware in one VM are isolated from other VMs and the host OS.
Security
96
VMs allow you to run operating systems that may not be compatible with the host hardware.
Compatibility
97
Developers can create isolated environments to test different software configurations or conduct cross-platform testing.
Software Development and Testing
98
Examples of Virtual Machine Software
Oracle VirtualBox VMware Workstation Microsoft Hyper-V KMV(Kernel-based Virtual Machine)