exam 4 chapter 11 Flashcards

1
Q

provides a convenient interface for users and applications to access computer hardware components

A

An operating system (OS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is the method by which an OS stores, organizes, and manages access to files on a storage device (such as a hard drive)

A

A file system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

File systems have the following objectives

A

Provide a convenient interface for users and applications to open and save files
Provide an efficient method to organize space on a drive
Provide a hierarchical filing method to store files
Provide an indexing system for fast retrieval of files
Provide secure access to files for authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

interacts with the file system

A

The user interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

on a disk drive is divided into sectors

A

Storage space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Storage space

A

Sectors are grouped to make a cluster (or block)
A Cluster is the smallest amount of space that can be occupied by a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A disk’s cluster size is selected when the disk

A

is formatted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If you know that that you’re going to store many files under 2K bytes, choose

A

a smaller cluster size when you format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The formatting process groups sectors into

A

clusters and maps all disk clusters for fast access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Most file systems organize files in a hierarchy of

A

folders or directories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Top of the hierarchy is called the

A

“root”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The root often represents a

A

disk drive or other mass storage drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Most file systems include an indexing system that enables users to search for a

A

file based on all or part of a filename

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

maintains a database that’s updated as files are created

A

The indexing system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

controls (permissions) can be used to allow only authorized users to access certain files or folder

A

A file system’s access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

can be used to secure OS files from accidental corruption or deletion

A

Access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Most current OSs include access controls except

A

Older DOS and Windows FAT16 and FAT 32 don’t support file and folder permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

is a program that is loaded into memory and run by the CPU

A

A process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Can be an application or a program that communicates with and provides services to other processes (called a “service” in Windows and a “daemon” in Linux)

A

a process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

allow your computer and applications to perform tasks they otherwise couldn’t

A

Network services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

An OS can run many processes at the same time by using

A

multitasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A computer multitasks by using a method called

A

time slicing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

occurs when a CPU’s computing cycles are divided between more than one process

A

time slicing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Two types of multitasking

A

Preemptive and cooperative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
preemptive
OS controls which process gets access to the CPU and for how long
26
OS can’t stop a process, a process maintains control until it satisfies its computing needs
Cooperative
27
Many applications are now designed so that different parts can be scheduled to run separately Each part that can be scheduled to run is called
a thread
28
a thread
(the smallest unit of software scheduled
29
has two or more threads that can be scheduled separately for execution by the CPU
multithreaded application
30
allows performing multiple tasks or threads simultaneously, each by a different CPU or CPU core
Multiprocessing
31
the kernel
Schedules process to run Making sure high-priority processes are taken care of first Manages memory to ensure that two applications don’t attempt to use the same memory space Makes sure I/O devices are accessed by only one process at a time
32
is usually shown as the layer just above the hardware
The kernel
33
Client OSs usually come with client software, such as
Web browsers, DNS and DHCP clients, and file-sharing clients
34
The main purpose of the client OS is to run applications
Which often access network resources
35
Most desktop computers have the following network client software
DHCP client DNS client HTTP client (Web browser) File-sharing client E-mail client
36
client allows the computer to access files and printers on the network
A file-sharing
37
intercepts the request and examines it to determine whether the resource is local (on the computer) or remote (on the network)
A redirector
38
With redirectors, network resources can be
accessed as though they were local
39
shared network folders are accessed just like a drive that is physically attached to the system
with drive mapping
40
In Windows, the two most common ways to access a shared resource are using the
UNC path or mapping a drive
41
UNC example:
\\server-name\sharename\subfolder\file.extension
42
Using the net command example
Net use drive-letter:\\server-name\sharename
43
The protocol used in Windows to share files and printers is
SMB, also known as Common Internet File System (CIFS)
44
also supports SMB implemented as an installation option called Samba
Linux
45
The native file-sharing protocol in the Linux environment is
Network File System (NFS)
46
The most common e-mail protocols
Post Office Protocol version 3 (POP3) , Simple Mail Transport Protocol (SMTP) , Internet Message Access Protocol (IMAP)
47
used to download incoming messages from an e-mail server to local desktops
POP3
48
standard protocol for sending Internet and other TCP/IP based email
Simple Mail Transport Protocol (SMTP)
49
has advanced message controls, including the capability to manage messages locally yet store them on a server
Internet Message Access Protocol (IMAP)
50
in an OS: Memory, CPU, and disk usage on client OSs is
optimized to run user applications and client network software
51
Most server OSs in a typical network provide:
Centralized user account and computer management Centralized storage Infrastructure services, such as name resolution and address assignment Server and network fault tolerance
52
A server-based network is centralized management of network resources, which includes the following functions
User authentication and authorization Account management Security policy management
53
is the process of identifying who has access to the network Most common form is a logon with a username and password Other forms include digital certificates, smart cards, and biometric scanners
Authentication
54
is the process of granting or denying an authenticated user’s access to network resources
Authorization
55
The server version of Windows OSs includes a
centralized account management, authentication, and authorization system called Active Directory
56
When Active Directory is installed on a server
the server becomes a domain controller and users and computer with accounts are referred to as domain members
57
Accounts in Active Directory are used to distribute and enforce policies for network use and security These policies are called
group policies
58
Network Information Service (NIS) supports both Windows and Linux user authentication and authorization
Linux OSs have a basic directory service called Lightweight Directory Access Protocol (LDAP) supports both Windows and Linux user authentication and authorization
59
Network storage includes
File sharing Storing e-mail, user files, application databases, data backups and more
60
Many network administrators are using specialized devices to help manage their storage
Network-attached storage devices Storage area networks Cloud-based storage
61
device is a dedicated server designed solely for providing shared storage for network users
network-attached storage (NAS)
62
technology allows multiple servers to access a large amount of storage that appears as locally attached drives
Storage Area Network (SAN)
63
some or all of an organization’s data is stored on servers located offsite and maintained by a storage hosting company
Cloud-Based Storage
64
can be removed, replaced, or added to a server while it is running
Support for hot-swappable devices
65
Two or more servers configured to operate as a single unit
Server clustering
66
if one server fails, the other takes over
Failover cluster
67
spreading the workload among multiple computers
Load-balancing cluster
68
disk controllers capable of a disk arrangement know as redundant array of independent disks (RAID) where if one disk fails, the data is preserved and the server can continue to operate
Redundant/high-end disk systems
69
Most server OSs support virtual private networks (VPNs) and older dial-up method of remote access
Remote Access
70
Server OSs support advanced database systems such as MySQL, SQL Server, and Oracle
Database server
71
Corporate email systems and web-based application are examples
Client/server applications
72
allows multiple OSs to run on the same physical computer at the same time
Virtualization
73
a process that creates a software environment to emulate a computer’s hardware and BIOS
Virtualization
74
is the virtual environment that emulates a physical computer’s hardware and BIOS
Virtual machine
75
the operating system installed on a VM
Guest OS
76
the physical computer on which the VM software is installed
Host Computer
77
creates and manages VMs and creates the virtual environment in which a guest OS is installed
Virtualization software
78
creates and monitors the virtual hardware environment, which allows multiple VMs to share physical hardware resources
Hypervisor
79
runs directly on the host computer’s hardware and controls and monitors guest OSs (also called bare-metal virtualization)
Type 1 hypervisor
80
is installed in a general-purpose host OS and the host OS access host hardware on behalf of the guest OS (also called hosted virtualization)
Type 2 hypervisor
81
consists of files residing on the host computer that represent a virtual machine’s hard drive
A virtual disk
82
is a network configuration created by virtualization
A virtual network
83
is a partial copy of a VM made at a particular moment
A snapshot
84
Only hardware requirement is enough memory to support the host and guest OSs, adequate CPU power, and enough space to store the virtual disk
type 2 hypervisor
85
Has an advantage of supporting a wider variety of guest OSs because there are few incompatibility problems between the guest OS and hardware
type 2 hypervisor
86
Hosted Virtualization Applications
OS Training Software Training Application isolation Network isolation Software development What-if-scenarios Use of legacy applications Physical-to-virtual conversion
87
After installed, a wizard takes you through the steps of creating a virtual machine
Using VMware Workstation
88
flexible networking options allowing you to configure the NIC on your VM to use of the three virtual network options or you can create your own custom virtual network
VMware Workstation
89
Three preconfigured options:
Bridged NAT Host-only
90
stripped down version of VMware that offers the basics of desktop virtualization
Using VMware player
91
Includes an option to download a virtual appliance, which is a ready-to-use VM that contains a guest OS with preconfigured applications or network services A good option for new virtualization users and for classroom and training centers
VMware player
92
runs only in Windows 7 Professional, Enterprise, or Ultimate
Using Microsoft Virtual PC
93
it can be installed on Windows, Mac OS X, Linux, and Solaris hosts and supports a wide range of Windows, Linux, and other guest OSs
using VirtualBox
94
The user interface consists of a console where you can create VMs and view the status of all VMs
VirtualBox
95
Targeted mainly for production virtualization in data centers Installed directly on hardware and have more stringent host machine requirements Offer more features for managing VMs than hosted virtualization A little more complicated to install and use as well
Type 1 hypervisor
96
Retire old or unreliable hardware: converting physical machines to VMs Maintain application separation
Consolidate servers
97
Bare-Metal Virtualization Applications
Test installation and upgrades Test a preconfigured application Test what-if scenarios Live migration Dynamic provisioning
98
introduced with Windows Server 2008 and can be installed as a server role
Microsoft Hyper-V
99
Uses Linux as a management OS on the host
Citrix XenServer
100
includes VMware ESX Server, which is installed directly on the physical server without a management OS
VMware vSphere
101
Minimum requirement is a 1.4 GHz CPU
CPU architecture
102
SAS vs. SATA
Disk subsystem
103
Minimum requirement is 512 MB RAM
memory
104
suitable for businesses managing huge amounts of data, using virtualization on a large scale, running high-end applications
Datacenter Edition
105
suitable for most small to medium businesses
Standard Edition
106
aimed at small businesses with 25 or fewer users
Essentials Edition
107
entry-level edition, suitable for small businesses that need to purchase a complete server solution
Foundation Edition