Glossary Flashcards
Edges refer to
Edges refer to: the connections or relationships between entities in a resource allocation graph.
A back door (trapdoor)
A back door (trapdoor): is a mechanism that bypasses user authentication.
A bad block (bad sector)
A bad block (bad sector): is a storage block that is no longer reliable for storing and retrieving data due to physical damage.
A batch process
A batch process: performs a long-running and generally repetitive task that does not require any intervention from the user.
A binary semaphore
A binary semaphore: can take only the values 0 or 1.
A bitmap is a data structure where
A bitmap is a data structure where: each bit represents one disk block. A 1 indicates that the block is allocated and a 0 indicates that the block is free.
A buffer is a
A buffer is a: register or an area of main memory used to hold data generated by a producer process or an input device and removed from the buffer at a later time by a consumer process or an output device.
A buffer overflow attack
A buffer overflow attack: is an intrusion technique that exploits the fact that many programs do not check for array overflow, allowing an attacker to overwrite portions of memory beyond the legitimate scope of an input buffer.
A capability list (CL)
A capability list (CL): associated with a domain D contents entries of the form (O, rights), where rights specify what operations a process in domain D may apply to object O.
A child process
A child process: c of process p is a process created by p.
A circular buffer
A circular buffer: is a fixed array of buffer slots filled by the producer and emptied by the consumer one slot at a time in ascending order, modulo the buffer size.
A clustered block allocation scheme
A clustered block allocation scheme: links together sequences of contiguous blocks. The last block of any cluster points to the beginning of the logically next cluster.
A computer’s physical memory (RAM) is
A computer’s physical memory (RAM) is: a hardware structure consisting of a linear sequence of words that hold a program during execution.
A condition variable is
A condition variable is: a named queue on which processes can wait for some condition to become true.
A critical section is
A critical section is: a segment of code that cannot be entered by a process while another process is executing a corresponding segment of the code.
A device controller (device adapter) is
A device controller (device adapter) is: an electronic circuit capable of operating a specific I/O device using binary signals.
A device driver is a
A device driver is a: device-specific program that implements I/O operations, requested by user applications or the OS, by interacting with the device controller.
A digital signature is
A digital signature is: a bit string that uses public-key cryptography to undeniably link a document to the producer and guarantees that the document has not been altered in any way.
A directed acyclic directory hierarchy
A directed acyclic directory hierarchy: organizes directories such that any directory at a given level may point to zero or more files or other directories at lower levels but also permits any file or directory to have more than one parent directory.
A disk block cache
A disk block cache: is a set of main memory buffers that contain the most recently accessed disk blocks.
A disk block is
A disk block is: a fixed sequence of bytes on the disk, which can only be accessed as a single unit using low-level read-block and write-block operations.
A File allocation table (FAT) is
A File allocation table (FAT) is: an array where each entry corresponds to a disk block. The FAT keeps track of which disk blocks belong to a file by linking the blocks in a chain of indices.
A File control block (FCB) is a
A File control block (FCB) is a: data structure associated with a filename that contains all relevant attributes of the file. FCBs are stored apart from file directories and are pointed to by the corresponding directory entries.
A file directory (or folder) is
A file directory (or folder) is: a special-purpose file that records information about other files and possibly other directories.
A file extension is
A file extension is: a sequence of one or more characters following the file name.
A file header
A file header: is a portion of the file preceding the actual data and is visible to only the FS itself.
A file is
A file is: a named collection of information managed on secondary storage by the FS.
A file system (FS) is
A file system (FS) is: an integral part of every OS, whose function is to implement the concept of files.
A load module is
A load module is: a program or combination of programs in a form ready to be loaded into main memory and executed.
A lock
A lock: is a synchronization barrier through which only one process can pass at a time.
A logic bomb
A logic bomb: is unauthorized code inserted into the system and executed at a specified time to perform some destructive action.
A logical address is
A logical address is :an integer in the range [0 : m-1] that identifies a word in a logical address space.
A logical address space is
A logical address space is: an abstraction of physical memory, consisting of a sequence of imaginary memory locations in a range [0 : m-1], where m is the size of the logical address space.
A man-in-the-middle attack (MITM)
A man-in-the-middle attack (MITM): is an attack where the attacker secretly listens to, and possibly alters, the communication between two systems.
A message authentication code (MAC)
A message authentication code (MAC): is a short bit string attached to a message and used to confirm that the message came from the stated sender and has not been modified in transit.
A modified-bit (m-bit) is
A modified-bit (m-bit) is: a binary flag in each page table entry that indicates whether the corresponding page has been modified during execution.
A monitor is
A monitor is: a high-level synchronization primitive implemented using P and V operations.
A non-preemptive scheduling algorithm
A non-preemptive scheduling algorithm: allows a running process to continue until the process terminates or blocks on a resource.
A non-resident page refers to
A non-resident page refers to: a page that is not currently present in the main memory (RAM).
A one-time password
A one-time password: can be used only once and thus becomes useless when stolen.
A one-way hash
A one-way hash: function converts a variable-length input string into a fixed-length output string in a manner that cannot be inverted.
A page fault is
A page fault is: an interrupt that occurs when a program attempts to reference a non-resident page.
A page frame is
A page frame is: a fixed-size contiguous block of physical memory identified by a single number, the page frame number.
A page is
A page is: a fixed-size contiguous block of a logical address space identified by a single number, the page number.
A page table is
A page table is: an array that keeps track of which pages of a given logical address space reside in which page frames. Each page table entry corresponds to one page and contains the number or the starting address of the frame containing the page.
A parity bit
A parity bit: is a bit added to a string of bits to ensure that the total number of 1’s in the string is even or odd.
A period
A period: is a time interval (typically in milliseconds or even microseconds) within which each input item must be processed.
A physical address is
A physical address is: an integer in the range [0 : n-1] that identifies a word in a physical memory of size n.
A physical CPU
A physical CPU: is a real hardware instance of a CPU.
A preemptive scheduling algorithm
A preemptive scheduling algorithm: may stop the currently running process and choose another process to run.
A present bit is
A present bit is: a binary flag in each page table entry that indicates whether the corresponding page is currently resident in memory.
A priority wait
A priority wait: has the form c.wait(p), where c is a conditional variable and p is an integer specifying a priority according to which processes blocked on c are reactivated.
A privileged instruction
A privileged instruction: performs critical operations that access I/O devices and the CPU’s status and control registers.
A process creation hierarchy
A process creation hierarchy: is a graphical representation of the dynamically changing parent-child relationships among all processes.
VALUE!
A process is deadlocked in a state s if the process is blocked in s and if no matter what state transitions occur in the future, the process remains blocked.
A process p is blocked on a resource r if
A process p is blocked on a resource r if: one or more request edges directed from p to r exist and r does not contain sufficient free units to satisfy all requests.
A process
A process: is an instance of a program being executed by an OS.
A protection domain
A protection domain: is a set of pairs , where rights specify what operations a process may perform on the object.
A RAID (Redundant Array of Independent Disks)
A RAID (Redundant Array of Independent Disks): is a set of disks viewed by the OS as a single mass storage device.
A read file operation
A read file operation: copies data from an open file to a specified area in main memory.
A real-time process is
A real-time process is: characterized by continual input, which must be processed fast enough to generate nearly instantaneous output.
A record is
A record is: a structure of related data items, possibly of different data types, identified within a file by a record number or a unique key field.
A reference count is
A reference count is: a non-negative integer associated with a file f, which indicates how many directories are pointing to the file.
A reference string is
A reference string is: the sequence of page numbers referenced by an executing program during a given time interval.
A referenced bit (r-bit) is
A referenced bit (r-bit) is: a bit associated with a page and is set automatically by the hardware whenever the page is referenced by any instruction.
A relative path name is
A relative path name is: a concatenation of file names starting with the current directory.
A relocation register contains
A relocation register contains: the physical starting address of a program or program component in memory.
A resource acquisition (acq r, m)
A resource acquisition (acq r, m): by a process p of m units of a resource r reverses the direction of the corresponding request edges to point from the units of r to p.
A resource allocation graph is completely reducible if
A resource allocation graph is completely reducible if: at the termination of the graph reduction algorithm all processes have been deleted.
A resource allocation graph
A resource allocation graph: shows the current allocation of resources to processes and the current requests by processes for new resources.
A resource claim graph is
A resource claim graph is: an extension of the general resource allocation graph. The extended graph shows the current allocation of resources to processes andall current as well as all potential future requests by processes for new resources..
A resource control block (RCB)
A resource control block (RCB): is a data structure that represents a resource.
A resource is allocated to a process if
A resource is allocated to a process if: the process has access to and is able to utilize the resource.
A resource is free if
A resource is free if: the resource may be allocated to a requesting process.
A resource release
A resource release: (rel r, m) operation by a process p of m units of a resource r deletes m allocation edges between p and r.
A resource request (req r, m)
A resource request (req r, m): by a process p for m units of a resource r creates m new edges directed from p to r.
A sandbox
A sandbox: is a small area of memory within which a program may execute and which guarantees that the program cannot access and jump to any location outside of the designated area.
A schedule is feasible if
A schedule is feasible if: the deadlines of all processes can be met.
A sector
A sector: is a portion of a track and is the smallest unit of data that can be read or written with a single r/w operation.
A seek operation
A seek operation: moves the current position of an open file to a new specified position.
A segment is
A segment is: a variable-size block of a logical address space identified by a single number, the segment number.
A segment table is
A segment table is: an array that keeps track of which segment resides in which area of physical memory. Each entry corresponds to one segment and contains the starting address of the segment.
A semaphore s is
A semaphore s is: a non-negative integer variable that can be accessed using only two special operations, P and V.
A source module is
A source module is: a program or a program component written in a symbolic language, like C, or an assembly language, that must be translated by a compiler or assembler into executable machine code.
A stable read
A stable read: guarantees to return a valid copy of any block.
A stable write
A stable write: guarantees that every block is updated atomically.
A state s is a safe state if
A state s is a safe state if: no sequence of state transitions exists that would lead from s to a deadlock state.
A state s is called a deadlock state if
A state s is called a deadlock state if: s contains two or more deadlocked processes.
A supervisor call (kernel call)
A supervisor call (kernel call): is a privileged instruction that automatically transfers execution control to a well-defined location within the OS kernel.
A symbolic link (or shortcut) is a
A symbolic link (or shortcut) is a: directory entry that points to a file or directory just like a regular entry but is treated differently with respect to deletion. A delete operation only removes the link but not the file itself.
A system call
A system call: is a request from an application for an OS service.
A thread control block (TCB)
A thread control block (TCB): is a data structure that holds a separate copy of the dynamically changing information necessary for a thread to execute independently.
A thread
A thread: is an instance of executing a portion of a program within a process.
A time quantum, Q
A time quantum, Q: is a small amount of time (typically 10 to 100 milliseconds) during which a process is allowed to use the CPU.
A track
A track: is one of many concentric rings on a magnetic disk surface.
A translation lookaside buffer (TLB) is
A translation lookaside buffer (TLB) is: a fast associative memory buffer that maintains recent translations of logical addresses to frames in physical memory for faster retrieval.
A trap (also called an internal interrupt)
A trap (also called an internal interrupt): is an interrupt triggered by the currently executing instruction.
A tree-structured directory hierarchy is
A tree-structured directory hierarchy is: a collection of directories organized such that (1) every directory points to zero or more files or directories at the next lower level, and (2) every file and directory except the root is pointed to by exactly one parent directory at the next higher level.
A Trojan horse
A Trojan horse: is a program that appears to provide a useful service but also contains a hidden function intended to violate computer security.
A virus
A virus: is a piece of executable code that embeds itself into legitimate programs and copies itself to other programs and systems with the intention of causing harm.
A wait-for graph is
A wait-for graph is: a resource allocation graph containing only processes where each process can have multiple incoming resource allocation edges but only one outgoing resource request edge.
A waiting list
A waiting list: is associated with every resource and contains all processes blocked on that resource because the resource is not available.
A word is
A word is: a fixed-size unit of data.
A worm
A worm: is an unauthorized program, which exploits one or more systems weaknesses to spawn copies of itself on other systems via computer networks.
A write file operation
A write file operation: copies data from an area in main memory to a specified open file.
Abstraction
Abstraction: is the act of removing unimportant details or attributes of objects in order to construct more general and less complex objects.
access right
access right: The ability to execute an operation on an object.
advanced configuration and power interface (ACPI)
advanced configuration and power interface (ACPI): Firmware common to PCs and servers that manages certain aspects of hardware, including power and device information.
advanced technology attachment (ATA)
advanced technology attachment (ATA): An older-generation I/O bus.
An absolute path name of a file
An absolute path name of a file: uniquely identified by an internal ID, f, is the concatenation of the directory and file names leading from the root to the file f.
An access list (AL)
An access list (AL): associated with an object O contains entries of the form (D, rights), where rights specify what operations a process in domain D may apply to object O.
An access matrix
An access matrix: is a representation of protection domains, where each row corresponds to one domain Di, each column corresponds to one object Oi, and the intersection of the row and the column records the rights that a process in domain Di has with respect to the object Oi).
An access method is
An access method is: a set of operations provided by the OS as part of the user interface to access files.
An aging register is
An aging register is: associated with a page and is shifted periodically to the right by 1 bit. Unless the most significant bit is set to 1, the page is aging in the sense that the associated register value is steadily decreasing.
An error correcting code (ECC)
An error correcting code (ECC): includes multiple parity bits in a string to permit the detection and automatic correction of some number of erroneous bits.
An interactive process
An interactive process: communicates with the user in the form of a dialog by receiving commands or data from the keyboard or a pointing device and responding by generating output on the user’s terminal or another output device.
An interrupt handler
An interrupt handler: is a kernel function, invoked whenever an interrupt occurs, that determines the cause of the interrupt and invokes the appropriate kernel function to provide the response.
An interrupt
An interrupt: is an event that diverts the current execution of a program to a predefined location in the kernel in order to respond to an event.
An object module is
An object module is: the machine-language output of a compiler or assembler generated from a source module.
anonymous memory
anonymous memory: Memory not associated with a file. Pages not associated with a file, if dirty and paged out, must not lose their contents and are stored in swap space as anonymous memory.
Application program
Application program: A program designed for end-user execution, such as a word processor, spreadsheet, compiler, or Web browser.
asynchronous write
asynchronous write: A write that is buffered and written in arbitrary order, with the requesting thread continuing execution after the write is requested.
attack surface
attack surface: The sum of the methods available to attack a system (e.g., all of the network ports that are open, plus physical access).
attack
attack: An attempt to break a computer system’s security.
attacker
attacker: Someone attempting to breach a computer system’s security.
audit trail
audit trail: The collection of activities in a log for monitoring or review.
authentication
authentication: The process of correctly identifying a person or device. In cryptography, constraining the set of potential senders of a message.
back door
back door: A daemon left behind after a successful attack to allow continued access by the attacker. In cryptography, a method of gaining access to encrypted information without first having the secret keys. More generally, a method of passing arbitrary commands or information when an interface does not provide a standard method.
bad block
bad block: An unusable sector on an HDD.
basic file system
basic file system: A logical layer of the operating system responsible for issuing generic commands to the I/O control layer, such as “read block x,” and also buffering and caching I/O.
Best-fit searches
Best-fit searches: the entire list and chooses the smallest hole large enough to accommodate the request.
Biometrics
Biometrics: are user authentication methods that measure, record, and analyze unique physical or behavioral characteristics of a person.
bit-level striping
bit-level striping: The splitting of data at the bit level, with each bit in a byte or word stored on a separate device.
block-device interface
block-device interface: The interface for I/O to block devices.
block-level striping
block-level striping: The splitting of data at the block level, with each block stored on a separate device.
block
block: A self-contained unit of work. The smallest physical storage device storage unit, typically 512B or 4KB. In the Grand Central Dispatch Apple OS scheduler, a language extension that allows designation of a section of code that can be submitted to dispatch queues.
blocking
blocking: In interprocess communication, a mode of communication in which the sending process is blocked until the message is received by the receiving process or by a mailbox and the receiver blocks until a message is available. In I/O, a request that does not return until the I/O completes.
boot block
boot block: A block of code stored in a specific location on disk with the instructions to boot the kernel stored on that disk. The UFS boot control block.
boot control block
boot control block: A storage block of data containing information needed by the system to boot from the volume containing the block.
boot disk
boot disk: A disk that has a boot partition and a kernel to load to boot the system. A device that has a boot partition and can store an operating system for booting the computer.
boot partition
boot partition: A storage device partition containing an executable operating system.
boot sector
boot sector: The first sector of a Windows boot device, containing the bootstrap code.
bootstrap loader
bootstrap loader: The small program that loads the kernel as part of the bootstrap procedure.
bootstrap
bootstrap: The set of steps taken at computer power-on to bring the system to full operation.
buffer cache
buffer cache: In file I/O, a cache of blocks used to decrease device I/O.
Buffer swapping is a
Buffer swapping is a: technique that allows the operations of a producer process and a consumer process to overlap by using two buffers.
buffer
buffer: A memory area that stores data being transferred (e.g., between two devices or between a device and a process).
Busy-waiting is
Busy-waiting is: the act of repeatedly executing a loop while waiting for some condition to change.
The C-Scan scheduling algorithm
The C-Scan scheduling algorithm: is a variant of the Scan algorithm that services requests in only one direction. When the outermost request is reached, the r/w head sweeps back to the opposite end of the disk and starts servicing requests again in the same direction.
C.signal
C.signal: reactivates the process at the head of the queue associated with the condition variable c.
C.wait causes the executing process to
C.wait causes the executing process to: block and be placed on a waiting queue associated with the condition variable c.
cache
cache: A temporary copy of data stored in a reserved memory area to improve performance. In the slab allocator, a cache consists of two or more slabs.
Ceph
Ceph: A brand of object storage management software.
Challenge-response
Challenge-response: is a method of user authentication that has the form of a dialogue between the user and the system.
character-stream interface
character-stream interface: The interface for I/O to character devices (like keyboards).
cloud storage
cloud storage: Storage accessed from a computer over a network to a distant, shared resource data center.
cluster
cluster: In Windows storage, a power-of-2 number of disk sectors collected for I/O optimization.
compartmentalization
compartmentalization: The process of protecting each system component through the use of specific permissions and access restrictions.
Computer security
Computer security: is the freedom from theft of or damage to hardware, software, or information, and from disruption or misdirection of services.
Concurrency
Concurrency: is the act of multiple processes (or threads) executing at the same time.
constant angular velocity (CAV)
constant angular velocity (CAV): A device-recording method in which the medium spins at a constant velocity and the bit density decreases from inner to outer tracks.
constant linear velocity (CLV)
constant linear velocity (CLV): A device-recording method that keeps a constant density of bits per track by varying the rotational speed of the medium.
content addressable storage
content addressable storage: Another term for object storage; so called because objects can be retrieved based on their contents.
context switch
context switch: A context switch is the transfer of control from one process to another.
controller
controller: A special processor that manages I/O devices.
copy semantics
copy semantics: The meaning assigned to data copying—e.g., whether a block write from a process allows the data to be modified after the write has been requested.
copy-on-write
copy-on-write: Generally, the practice by which any write causes the data to first be copied and then modified, rather than overwritten. In virtual memory, on a write attempt to a shared page, the page is first copied, and the write is made to that copy.
Cryptography
Cryptography: is a technique that allows a sender to transform plaintext into a ciphertext, which the receiver can transform back to the original plaintext.
cylinder
cylinder: On an HDD, the set of tracks under the read-write heads on all platters in the device.
data striping
data striping: The splitting of data across multiple devices.
Decryption
Decryption: is the act of transforming ciphertext into the original plaintext.
defense in depth
defense in depth: The theory that more layers of defense provide stronger defense than fewer layers.
Demand paging is
Demand paging is: the principle of loading a page into memory only when the page is needed, rather than at the start of the execution.
denial-of-service
denial-of-service: Preventing legitimate use of a system.
device controller
device controller: The I/O managing processor within a device.
device-status table
device-status table: A kernel data structure for tracking the status and queues of operations for devices.