Microsoft OS Flashcards
you could switch between windows that contained tasks but only the foreground task got any CPU time
Task-Switching
The Start Button was introduced, providing direct access to system utilites and applications
windows desktop
enables the OS to detect and configure newly installed hardware
plug and play (PnP)
THE REGISTRY: a hierarchical database that provides:
- OS configuration
- Service and device driver information and configuration
-Software and application parameters - Hardware configuration
-Performance information
- Service and device driver information and configuration
- Desktop configuration
detects processes that appear stuck and present the option to close the without having to restart the OS
task supervisor
An unresponsive process is often referred to as a?
a hung task
the ability of a CPU to execute separate parts of a process at the same time
multithreading
W-ME implemented the enhanced PnP standard called ?
the Universal Plug and Play (UPnP)
a CPU operating mode that allows certain processes to execute privileged CPU instructions and access all memory location
privileged mode
an administrative and security boundary within which all member computers are subject to common administrative and security policies
a domain
responsible for keeping usernames and passwords for users wanting access
one primary domain controller (PCD):
a database that is used to store information about resources such as user accounts, computers, printers, and domain-wide usage and security policies
Active Directory
multiple servers could be designated as domain controllers, each containing a copy of Active Directory
distributed network architecture:
is a security system and authentication protocol that authenticates users and grants or denies access to network resources based on a user’s log-on name and password
Kerberos security
was intended to enable Windows 2000 clients to access the same desktop settings, applications, and files from wherever they accessed the network
IntelliMirror
is a mechanism to help ensure that software is not pirated
System activation:
Connection security rules can ensure communication sessions are?
authenticated and encrypted using the IP Security (IPsec) protocol
which restricts a service from performing activities in a critical OS structure that could cause harm
Windows Service Hardening (WSH
A read-only domain controller (RODC) was implemented so that:
hackers cannot make changes at remote locations to be replicated to the main domain controller at corporate headquarters
is a server OS feature in which two or more servers are linked
Failover and Load-Balancing Clusters
runs validation tests on the servers to be clustered
cluster validation wizard
is a configuration where server clusters provide scalability and fault tolerance
A network load-balancing (NLB) cluster
hypervisor service that allows Windows Server to host multiple virtual machines
hyper v
is a utility that runs in the background to correct hard disk problems
Self-healing NTFS:
bare-bones installation of Windows Server with a limited GUI that is meant to reduce hacker attacks to the OS
Server Core
powerful command-line interface and scripting language for performing administrative tasks on a Windows computer
powershell
a storage management and configuration tool: The ability to mount CD and DVD images with a double-click on an ISO file
storage spaces
- Added the option to sign in with a Microsoft online account rather than using a local user account
- Added the ability to sign in using a PIN or a picture password
- Added parental control options
security enhancemnts
is a directory service that enables administrators to create and manage users and groups, set network-wide user and computer policies, manage security, and organize network resources
active directory
let users create multiple desktops and switch between them to access application windows that are open in each desktop
virtual desktop
can use to browse your file systems and search for information
Cortana digital assistant
a File Explorer feature that lets you pin any folder or search result to the Quick access section in the left pane of File Explorer
quick access
improvements include nested virtualization, Linux Secure Boot, production checkpoints, “hot add and remove” for memory and network adapters, and more
hyper V
is designed for single-task servers running in a virtual environment, goes beyond Server Core, with an even smaller footprint, and doesn’t support a local logon
nano server
allows you to run applications that are isolated from one another, improving reliability
windows containers
is a computing model in which virtualization goes beyond VMs and extends to virtual storage networks and virtualized networking
A hyper-converged infrastructure (HCI):
Process execution consists of a cycle of CPU execution and I/O wait: CPU burst followed by I/O burst
CPU-I/O Burst Cycle
When CPU is running we call it ?
a burst
keep the CPU as busy as possible
CPU utilization
of processes that complete their execution per time unit
throughput
amount of time to execute a particular process
turnaround time
amount of time a process has been waiting in the ready queue
waiting time
amount of time it takes from when a request was submitted until the first response is produced, not output (for time-sharing environment)
respone time
short process behind long process
convoy effect
Waiting time is the time arrives - the time started
waiting time
the time it stopped running - the arrival time
turnaround time