Computer Structure Final 2 Flashcards
An OS is a program which acts as an…… between what and what ?
interface between computer system users and the computer hardware
The OS provides a …….in which a user may ……
It provides a user friendly environment in which a user may easily develop and execute programs
If not for the OS Hardwar knowledge would be….
Mandatory for computer programming
The OS hides…
the complexity of hardware from uninterested users!
What is an Operating System?
Software which manages the overall operation of the computer system including: Hardware( CPU, RAM, I/O) Security System interface application interface
What is First Generation ?
Vacuum tube, single user, early operating systems
What is Second Generation?
Job scheduling, JCL, faster I/O, spooling, batch, files
What is Third Generation?
Shared processing, multiprogramming, virtual memory, DBMS
What is Fourth Generation?
Distributed computing, personal computers, high-speed communication, multi-media
What are the functions of an operation system? name 4
Manages and interacts with computer hardware
Provides and manages system security
Provides the system interface
Provides the interface for application software
Who created Linux
Linus Torvalds
Tell me three important features of Linux
- Scientific cooperation model
- Open source implications
- Matured over 14 years
What is the internet?
The largest network of networks in the world
Uses TCP/IP protocols and packet switching
Runs on any communications substrate
Name two examples of Social engineering
- An attacker calls a user on a network and claims they are from the computer support division of the network.
- The attacker tells the user that they are having trouble with their account and then ask for the user’s name and password
Define a dictionary attack
uses know passwords and many variations (upper and lower case and combinations ) to try to log in to your account
Define brute force attack
means the attackers uses every possible combination of characters for the password
Name some ways to prevent password cracking name 6
1.Don’t use passwords that are dictionary words
2.Don’t use your user name
3.Don’t use your user name backwards
4Limit the number of log in attempts
5.Make your password sufficiently long with an alpha numeric combination
6. Change passwords often
name a way to enhance security with strong passwords
A sentence
Biometrics technology can be used for what two different purposes
Verification and identification
Name five different biometric verifications
- Fingerprinting matching
- hand geometry
- Iris or retinal scans
- Speech recognition
- Face recognition