module4 and 5 Flashcards

1
Q

Front

A

Back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Q45-1: What is sequential file organization?

A

Sequential file organization stores records one after the other in contiguous disk blocks, making it ideal for batch processing and sequential access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Q45-2: What is direct (hashed) file organization?

A

Direct file organization uses a hash function to calculate a record’s disk location, enabling fast direct access but may suffer from clustering and collisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Q45-3: What is indexed file organization?

A

Indexed file organization maintains an index (similar to a table of contents) that maps keys to record locations, providing quick lookup while balancing sequential and random access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Q45-4: What is clustered file organization?

A

Clustered organization groups similar records together in blocks to improve data locality and access speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Q45-5: What are the advantages of sequential file organization?

A

It offers a simple design with efficient sequential access, ideal for applications like log processing or batch jobs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Q45-6: How does direct (hashed) organization compare to indexed organization?

A

Direct organization provides very fast access through hashing while indexed organization offers structured lookups, though it requires extra storage for the index.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Q45-7: When is each file organization type most appropriate?

A

Sequential is best for batch processing; direct is suited for random-access databases; indexed works well for balanced performance; clustered is used when related records need to be accessed together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Q46-1: What is a single-level directory structure?

A

A single-level directory contains all files in one flat structure, without subdirectories, leading to a simple but potentially cluttered file space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Q46-2: What is a hierarchical directory structure?

A

A hierarchical directory structure organizes files into directories and subdirectories, forming a tree-like arrangement that supports better organization and scalability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Q46-3: What is a disadvantage of a single-level directory?

A

Single-level directories can lead to name conflicts and become difficult to manage as the number of files increases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Q46-4: How does a hierarchical directory structure resolve naming conflicts?

A

By allowing files with the same name to exist in different directories, hierarchical structures eliminate naming conflicts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Q46-5: What organizational benefit does a hierarchical directory provide?

A

It groups related files together, making navigation, file retrieval, and management easier and more efficient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Q46-6: How does file retrieval differ between single-level and hierarchical directories?

A

Hierarchical directories use structured paths for efficient retrieval, whereas single-level directories require scanning a large, unstructured list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Q46-7: In what scenarios might a single-level directory be sufficient?

A

In small systems or environments with few files, a single-level directory is simpler and may suffice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Q47-1: What is indexed allocation in file systems?

A

Indexed allocation assigns an index block to each file, which holds pointers to all of the file’s data blocks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Q47-2: What is the primary advantage of indexed allocation?

A

It eliminates external fragmentation and supports random access to any file block through the index.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Q47-3: What is a disadvantage of indexed allocation?

A

Maintaining the index adds overhead, and for large files, the index may require additional multi-level structures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Q47-4: How does indexed allocation support random access?

A

The index block allows the system to directly locate any data block without scanning the entire file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Q47-5: What is external fragmentation and how does indexed allocation address it?

A

External fragmentation is the scattering of free space; indexed allocation avoids this by keeping file pointers separate from the free space management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Q47-6: How might the index block become a performance bottleneck?

A

For very large files, a large or multi-level index may slow down access due to increased lookup complexity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Q47-7: In what scenarios is indexed allocation particularly useful?

A

It is especially beneficial in systems where frequent random access is required and minimal fragmentation is desired.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
26
Q48-1: What does file creation involve in file systems?
File creation involves establishing a new file entry by allocating an i-node and initializing its attributes in the directory.
27
Q48-2: What happens during file deletion?
File deletion removes the file’s directory entry, marks its i-node as free, and deallocates the data blocks used by the file.
28
Q48-3: What is the read operation in file management?
Reading a file transfers data from the disk into memory, allowing the content to be processed by an application.
29
Q48-4: What does the write operation entail?
Writing to a file involves transferring data from memory to disk, updating the file’s content and sometimes its metadata.
30
Q48-5: What is file modification?
File modification updates either the file's content or its metadata, such as timestamps or permissions.
31
Q48-6: Why are basic file operations important?
They manage the complete lifecycle of a file, ensuring data integrity and proper resource management.
32
Q48-7: How do file operations impact overall system performance?
Efficient file operations reduce system overhead, improve data integrity, and ensure timely access to data.
33
34
Q49-1: What does opening a file mean?
Opening a file establishes a connection between an application and the file system, loading file metadata into a file control block.
35
Q49-2: What does closing a file involve?
Closing a file terminates the connection, flushes any buffered data to disk, and releases system resources.
36
Q49-3: How is the file control block used when opening a file?
The file control block stores metadata such as the file's current position, mode, and access permissions.
37
Q49-4: Why is it important to close a file properly?
Properly closing a file ensures that all changes are saved and that system resources are released, preventing data loss.
38
Q49-5: What happens to buffered data during file closure?
Buffered data is written to disk to ensure consistency between in-memory and on-disk content.
39
Q49-6: How do opening and closing operations contribute to system stability?
They manage resource allocation and data integrity, ensuring that file access remains consistent and reliable.
40
Q49-7: What is the key operational difference between opening and closing a file?
Opening prepares the file for use by loading necessary metadata, while closing finalizes the transaction and cleans up resources.
41
42
Q50-1: What is Discretionary Access Control (DAC) for files?
DAC allows file owners to set and modify permissions, determining who can access their files.
43
Q50-2: What is Mandatory Access Control (MAC) for files?
MAC enforces access policies based on predefined system security labels, independent of user choices.
44
Q50-3: What is Role-Based Access Control (RBAC)?
RBAC assigns file permissions based on user roles, simplifying management in large organizations.
45
Q50-4: What are Access Control Lists (ACLs)?
ACLs are lists that specify which users or groups have access to a file and the types of operations they can perform.
46
Q50-5: How does DAC differ from MAC?
DAC is based on the discretion of the file owner, while MAC relies on system-enforced policies.
47
Q50-6: Why are access control mechanisms important for file security?
They restrict unauthorized access, protecting files from misuse and ensuring data integrity.
48
Q50-7: How do these mechanisms prevent unauthorized file access?
By defining explicit rules and permissions, they ensure that only authorized users can perform file operations.
49
50
Q51-1: What is contiguous allocation?
Contiguous allocation stores a file's data in consecutive disk blocks.
51
Q51-2: What is one advantage of contiguous allocation?
It offers fast sequential access because data is stored close together, reducing seek time.
52
Q51-3: What is a major disadvantage of contiguous allocation?
It can lead to external fragmentation and makes file growth problematic if adjacent free space is unavailable.
53
Q51-4: How does contiguous allocation simplify file management?
It requires only tracking the starting block and file length, reducing overhead.
54
Q51-5: Why can file growth be an issue in contiguous allocation?
Because the file requires a contiguous block, expanding a file may be difficult if there isn’t enough adjacent free space.
55
Q51-6: How does contiguous allocation affect read/write performance?
It improves performance by minimizing head movement, particularly for sequential access.
56
Q51-7: When is contiguous allocation most beneficial?
It is ideal for files with predictable sizes and where high-speed sequential access is essential.
57
58
Q52-1: What is an i-node in a file system?
An i-node is a data structure that stores metadata about a file, including its attributes and pointers to data blocks.
59
Q52-2: What key file attributes does an i-node typically contain?
It includes attributes such as owner, permissions, timestamps, and file size.
60
Q52-3: How does an i-node manage data blocks?
It contains pointers that direct the file system to the exact locations of the file's data blocks on disk.
61
Q52-4: Why is the i-node crucial in file system implementation?
It decouples file names from their data, enabling efficient file management and retrieval.
62
Q52-5: How does the i-node contribute to file security?
By storing permissions and ownership, the i-node helps enforce access controls.
63
Q52-6: What role does the i-node play in file retrieval?
It provides necessary metadata and pointers to quickly locate and access a file's content.
64
Q52-7: How does the i-node support scalability in file systems?
It abstracts file metadata and block pointers, simplifying file management even in very large systems.
65
66
Q53-1: What is the first step in creating a file?
The first step is selecting a directory and verifying that the chosen file name is unique.
67
Q53-2: What happens with the i-node during file creation?
An i-node is allocated and initialized with metadata such as permissions, timestamps, and file size.
68
Q53-3: How are data blocks allocated during file creation?
Data blocks may be allocated immediately if the file is to contain initial content or reserved space.
69
Q53-4: How is the directory updated during file creation?
A new entry is added to the directory linking the file name with its i-node.
70
Q53-5: What is the first step in deleting a file?
The file’s directory entry is located to initiate the deletion process.
71
Q53-6: What happens to the i-node when a file is deleted?
The i-node is marked as free and its pointers are cleared for reallocation.
72
Q53-7: How are data blocks handled during file deletion?
The data blocks used by the file are deallocated and returned to the pool of free space.
73
74
Q54-1: What is SCAN disk scheduling?
SCAN scheduling moves the disk arm in one direction, servicing requests until it reaches the end, then reverses direction.
75
Q54-2: How is the order of service determined in SCAN scheduling?
Requests are sorted in the direction of movement, and the disk arm services them sequentially until a reversal is needed.
76
Q54-3: How does the starting head position affect SCAN scheduling?
It determines the initial direction and the order in which requests are serviced.
77
Q54-4: In the given example, what is the first movement in SCAN scheduling?
From the starting head at track 53, the next upward request (e.g., track 68) is serviced first.
78
Q54-5: How is the reversal handled in SCAN scheduling?
Once the disk arm reaches the end of the disk, it reverses direction and services requests on the way back.
79
Q54-6: How is total head movement calculated in SCAN scheduling?
By summing the distance traveled in the initial direction plus the distance traveled after the reversal.
80
Q54-7: What factors must be verified in a SCAN calculation?
You must verify disk endpoints and the proper sorted order of requests to calculate total movement accurately.
81
82
Q55-1: What is FCFS disk scheduling?
FCFS (First Come First Serve) processes disk requests in the exact order they arrive.
83
Q55-2: How does FCFS determine the order of request servicing?
It does not reorder requests; they are serviced sequentially as they appear in the queue.
84
Q55-3: In the given example, what is the first move in FCFS scheduling?
The head moves from the starting position (53) to the first request (track 12).
85
Q55-4: How is the distance between requests calculated in FCFS?
By taking the absolute difference between the current head position and the next request track.
86
Q55-5: What potential performance drawback exists with FCFS scheduling?
It can lead to long seek times if requests are spread out, reducing overall efficiency.
87
Q55-6: How is the total head movement determined in FCFS?
By summing all individual movements between successive requests.
88
Q55-7: What is a key drawback of FCFS scheduling?
It does not optimize the order of requests, potentially leading to inefficient disk usage.
89
90
Q56-1: What is C-SCAN disk scheduling?
C-SCAN (Circular SCAN) services requests in one direction only and, upon reaching the end, jumps back to the beginning without servicing during the return.
91
Q56-2: How does C-SCAN differ from SCAN scheduling?
Unlike SCAN, C-SCAN always moves in one direction and resets to the start when the end is reached.
92
Q56-3: What is the initial phase of C-SCAN scheduling in the example?
The disk arm services all requests in the upward direction starting from track 53.
93
Q56-4: How is the jump handled in C-SCAN scheduling?
After reaching the end of the disk, the head jumps back to the beginning without servicing any requests during the return.
94
Q56-5: How are movements calculated in C-SCAN scheduling?
You calculate the distance moved in the servicing direction, add the fixed jump (equal to the disk size), and then add the distance to service the remaining requests.
95
Q56-6: What is an advantage of C-SCAN scheduling?
It provides more uniform wait times by treating all requests equally in one directional pass.
96
Q56-7: How does the reset phase affect the overall head movement in C-SCAN?
The reset adds a fixed movement equal to the disk's size, impacting the total head movement calculation.
97
98
Q57-1: What is the primary operational difference between SCAN and C-SCAN?
SCAN reverses direction at the disk's end, whereas C-SCAN jumps to the beginning without servicing on the return.
99
Q57-2: How does SCAN service disk requests?
It services requests in both directions as the disk arm moves back and forth along the track.
100
Q57-3: How does C-SCAN service disk requests?
It services requests only in one direction, ensuring a circular and uniform servicing pattern.
101
Q57-4: What is an advantage of using C-SCAN over SCAN?
C-SCAN provides more uniform wait times since every request is serviced in a single directional pass.
102
Q57-5: What is a potential disadvantage of SCAN scheduling?
SCAN may result in longer wait times for requests that are just missed during the reversal phase.
103
Q57-6: How does the reversal in SCAN impact disk performance?
Reversal can cause variability in wait times and may lead to less efficient head movement.
104
Q57-7: In what scenario might SCAN be preferred over C-SCAN?
SCAN might be chosen when bidirectional servicing is acceptable and request distribution is uneven.
105
106
Q58-1: What are file attributes?
File attributes are metadata properties associated with a file, such as name, size, creation date, and permissions.
107
Q58-2: Why are file attributes important?
They help the operating system manage, secure, and organize files effectively.
108
Q58-3: Which attribute typically indicates file ownership?
The ownership attribute specifies the user or group that owns the file.
109
Q58-4: How do file attributes assist in file management?
They enable sorting, searching, and applying access control measures to files.
110
Q58-5: What attribute specifies a file’s size?
The file size attribute indicates the amount of disk space the file occupies.
111
Q58-6: How do timestamps contribute to file attributes?
Timestamps record the creation, modification, and last access times, useful for auditing and maintenance.
112
Q58-7: How do file attributes enhance security?
Attributes like permissions and ownership are used to enforce access controls and protect file integrity.
113
114
Q59-1: What is file locking?
File locking is a mechanism that restricts concurrent access to a file, ensuring that only one process can modify it at a time.
115
Q59-2: What is advisory file locking?
Advisory locking requires processes to voluntarily check and honor locks, rather than enforcing them automatically.
116
Q59-3: What is mandatory file locking?
Mandatory locking is enforced by the operating system, preventing access by other processes until the lock is released.
117
Q59-4: Why is file locking important in multi-user environments?
It prevents data corruption and ensures consistency when multiple processes attempt to access the same file.
118
Q59-5: How does file locking affect file operations?
It may block access temporarily to ensure safe reading or writing, maintaining data integrity.
119
Q59-6: In which scenarios is file locking especially beneficial?
File locking is crucial in database applications and shared file systems with simultaneous access.
120
Q59-7: How does file locking contribute to system reliability?
By preventing conflicting file accesses, it helps maintain consistency and stability of the data.
121
122
Q60-1: What is one of the primary threats to operating system security?
Malware, such as viruses, worms, and trojans, poses a significant risk to OS security.
123
Q60-2: How does unauthorized access threaten an operating system?
Unauthorized access exploits vulnerabilities to compromise system integrity and expose sensitive data.
124
Q60-3: What is a Denial of Service (DoS) attack?
A DoS attack overwhelms system resources, preventing legitimate users from accessing the system.
125
Q60-4: How does privilege escalation pose a threat?
Privilege escalation involves exploiting vulnerabilities to gain higher access rights than permitted.
126
Q60-5: What is an insider threat?
An insider threat occurs when an authorized user misuses their privileges to compromise system security.
127
Q60-6: How do these threats affect overall system security?
They can lead to data breaches, service disruptions, and complete system compromise.
128
Q60-7: What measures help mitigate these security threats?
Implementing robust security practices, regular updates, and continuous monitoring helps reduce risks.
129
130
Q61-1: Why is user authentication critical in operating system security?
User authentication verifies identities before granting access, preventing unauthorized entry.
131
Q61-2: What methods are used for user authentication?
Methods include passwords, biometrics, tokens, and multi-factor authentication.
132
Q61-3: How does authentication prevent unauthorized access?
By ensuring that only verified users can access sensitive system resources.
133
Q61-4: What role does multi-factor authentication play?
It adds extra layers of verification, significantly enhancing overall security.
134
Q61-5: How does user authentication contribute to system integrity?
It prevents misuse of privileges and protects the system from unauthorized alterations.
135
Q61-6: What risks exist without proper authentication?
Without robust authentication, systems are vulnerable to unauthorized access and data breaches.
136
Q61-7: How does authentication serve as a foundation for further OS security measures?
It is the first line of defense that enables subsequent security protocols to function effectively.
137
138
Q62-1: What is Discretionary Access Control (DAC)?
DAC allows file owners to set and modify permissions, controlling access based on their discretion.
139
Q62-2: What is Mandatory Access Control (MAC)?
MAC enforces access policies based on system-wide security classifications, independent of user choices.
140
Q62-3: How does DAC offer flexibility?
It lets users customize access based on individual requirements and file sensitivity.
141
Q62-4: How does MAC enhance security?
By using non-discretionary, system-enforced policies, MAC ensures consistent and high-level security.
142
Q62-5: What is a key difference between DAC and MAC?
DAC is user-driven and flexible, whereas MAC is rigid and centrally enforced.
143
Q62-6: In what environments is DAC preferable?
DAC is used where user control and customization are important, such as in personal systems.
144
Q62-7: When is MAC typically implemented?
MAC is implemented in high-security environments requiring strict, non-negotiable access controls.
145
146
Q63-1: What is an open-source operating system?
An open-source operating system has its source code publicly available for review and modification.
147
Q63-2: How does open-source promote transparency?
Its open code allows users and developers to audit, improve, and verify security and quality.
148
Q63-3: What is a key cost advantage of open-source OSs?
They are often free to use, reducing licensing costs for users and organizations.
149
Q63-4: How does community support benefit open-source OSs?
A strong community contributes to rapid patching of vulnerabilities and continuous improvements.
150
Q63-5: How does customization play a role in open-source OSs?
Users can modify the OS to suit specific needs, enhancing flexibility and functionality.
151
Q63-6: How does open-source encourage innovation?
Open access to code fosters collaboration, experimentation, and the development of new features.
152
Q63-7: Why might organizations choose open-source over proprietary OSs?
For cost savings, transparency, flexibility, and the ability to tailor the system to their needs.
153
154
Q64-1: What is encryption in the context of an operating system?
Encryption converts readable data into ciphertext using an algorithm and a key.
155
Q64-2: How does encryption protect data at rest?
It secures stored data, making it unreadable without the appropriate decryption key.
156
Q64-3: How does encryption protect data in transit?
Encryption secures data being transmitted over networks, preventing interception and unauthorized access.
157
Q64-4: What role does an encryption key play?
The key is used to encode and decode data, ensuring that only authorized parties can access it.
158
Q64-5: How does encryption help maintain data integrity?
It safeguards data against unauthorized modifications and ensures that data remains confidential.
159
Q64-6: What are some common encryption algorithms used in OS security?
Algorithms such as AES and RSA are commonly used for secure data encryption and decryption.
160
Q64-7: Why is encryption considered a critical security measure?
Encryption protects confidentiality, integrity, and privacy of sensitive data against unauthorized access.
161
162
Q65-1: What is a firewall in operating system security?
A firewall is a system that monitors and controls incoming and outgoing network traffic based on predefined security rules.
163
Q65-2: How does a firewall filter network traffic?
It uses rules to allow or block data packets based on criteria such as IP addresses, ports, and protocols.
164
Q65-3: What is packet filtering in firewall technology?
Packet filtering examines individual packets and makes decisions based on defined criteria, offering basic security.
165
Q65-4: What is stateful inspection in a firewall?
Stateful inspection monitors active connections and makes context-based decisions for improved security.
166
Q65-5: What is an application-level gateway?
It filters traffic at the application layer, providing deeper inspection and enhanced control over data exchanges.
167
Q65-6: How does a firewall protect against external threats?
It acts as a barrier that blocks unauthorized access and prevents malicious traffic from entering the network.
168
Q65-7: What is the overall benefit of using a firewall?
It enhances system security by reducing exposure to external attacks and unauthorized network access.
169
170
Q66-1: What are packet-filtering firewalls?
Packet-filtering firewalls inspect packets at a basic level, offering fast but relatively limited security.
171
Q66-2: What are stateful inspection firewalls?
They track active connections and provide more detailed security by considering the context of traffic.
172
Q66-3: What are application-level gateway firewalls?
These firewalls operate at the application layer to filter traffic based on specific application protocols.
173
Q66-4: What are Next-Generation Firewalls (NGFW)?
NGFWs incorporate features like intrusion prevention, deep packet inspection, and application awareness for advanced security.
174
Q66-5: How does packet filtering compare with stateful inspection?
Packet filtering is faster but less secure, while stateful inspection provides more robust, context-aware protection.
175
Q66-6: What is a key benefit of using Next-Generation Firewalls?
They combine multiple security techniques to offer comprehensive protection against complex threats.
176
Q66-7: In which scenarios might different firewall types be applied?
The choice depends on network requirements: simpler packet filtering for speed versus stateful or NGFWs for deeper, multi-layered security.
177
178
Q67-1: What are security policies in an operating system?
Security policies are formal rules and guidelines that dictate how security is managed and enforced within the system.
179
Q67-2: Why are security policies important?
They provide a structured framework for preventing, detecting, and responding to security incidents.
180
Q67-3: What components are typically included in security policies?
They include user responsibilities, access controls, and procedures for incident response.
181
Q67-4: How do security policies contribute to system integrity?
They enforce consistent security practices and reduce vulnerabilities across the system.
182
Q67-5: How do security policies influence user behavior?
They set clear expectations and guidelines for acceptable use, helping prevent risky practices.
183
Q67-6: How can security policies aid in regulatory compliance?
They ensure that systems adhere to legal and industry standards for data protection and privacy.
184
Q67-7: What is the overall impact of robust security policies?
They form the foundation for a secure operating environment by guiding all subsequent security measures.
185
186
Q68-1: What is security hardening?
Security hardening is the process of reducing a system's vulnerabilities by configuring it securely and minimizing unnecessary features.
187
Q68-2: What common steps are involved in security hardening?
Steps include removing unused services, applying patches, and configuring secure settings.
188
Q68-3: How does security hardening improve system resilience?
It reduces the attack surface, making the system less vulnerable to exploits.
189
Q68-4: What role do patches play in security hardening?
Patches fix known vulnerabilities, ensuring the system remains protected against current threats.
190
Q68-5: How does disabling unnecessary services contribute to hardening?
It minimizes potential entry points for attackers by eliminating services that are not needed.
191
Q68-6: What is the ultimate goal of security hardening?
To create a more secure system by eliminating weaknesses and enforcing strict security configurations.
192
Q68-7: Why is security hardening an ongoing process?
New vulnerabilities and threats emerge continuously, so regular updates and audits are necessary.
193
194
Q69-1: What is a Linux distribution?
A Linux distribution is a packaged operating system that includes the Linux kernel, system libraries, and applications.
195
Q69-2: What components typically form a Linux distribution?
Components include the kernel, userland tools, a package management system, and often a desktop environment.
196
Q69-3: How do Linux distributions differ from one another?
They differ in target audiences, default configurations, package management systems, and included software.
197
Q69-4: What is an example of a user-friendly Linux distribution?
Ubuntu is known for its ease of use and extensive community support.
198
Q69-5: How does community support enhance a Linux distribution?
A strong community provides regular updates, security patches, and a wealth of software and documentation.
199
Q69-6: What role does package management play in Linux distributions?
It simplifies the installation, update, and removal of software, managing dependencies efficiently.
200
Q69-7: Why might a user choose a Linux distribution over a proprietary OS?
For greater customization, transparency, cost savings, and the benefits of an active open-source community.
201
202
Q70-1: What file systems are commonly used in Windows?
Windows commonly uses NTFS and FAT file systems for organizing and storing data.
203
Q70-2: What file systems are typically found in Linux?
Linux often uses ext3/ext4, XFS, or Btrfs as its primary file systems.
204
Q70-3: How does Windows organize its file system structure?
Windows uses drive letters with a hierarchical directory structure that often includes hidden system files.
205
Q70-4: How does Linux organize its file system structure?
Linux employs a single-rooted hierarchy (/) with mount points for additional file systems.
206
Q70-5: What are the key differences in access control between Windows and Linux file systems?
Windows integrates ACLs within NTFS, whereas Linux primarily uses user/group permissions and file modes.
207
Q70-6: What similarities exist between Windows and Linux file system structures?
Both systems use directories, store file metadata, and provide mechanisms for access control.
208
Q70-7: How do the file system structures reflect the design philosophies of Windows and Linux?
Windows emphasizes a user-friendly, drive-based structure, while Linux focuses on flexibility, security, and unified hierarchy.
209
210
Q71-1: What is the primary role of the kernel in an operating system?
The kernel is the core component that manages hardware resources, process scheduling, and memory management.
211
Q71-2: How does the Windows kernel operate?
Windows employs a hybrid kernel that combines aspects of microkernel and monolithic architectures to manage system operations.
212
Q71-3: How does the Linux kernel operate?
Linux uses a monolithic kernel that is modular, allowing dynamic loading of components and extensive configurability.
213
Q71-4: What common tasks are performed by both Windows and Linux kernels?
Both kernels handle process management, memory allocation, and input/output operations with hardware.
214
Q71-5: How do kernels abstract hardware resources from software?
They provide an interface that allows applications to access hardware without needing to know low-level details.
215
Q71-6: Why is kernel design critical for OS performance?
Efficient kernel design ensures quick response times, system stability, and robust security.
216
Q71-7: How do differences in kernel design impact system behavior?
Variations in design affect modularity, customization, and performance optimizations tailored to different use cases.