Operating Systems Flashcards

1
Q

Purpose(s) of Operating System

A
  1. To provide a user-friendly interface between the user and the hardware.
  2. To manage memory, and processor to ensure they are used efficiently.
  3. To manage peripheral devices, such as printers and keyboards.
  4. To protect the hardware and software from incompetence and inexperience.
  5. To provide similar environment on different machines. This should make programs more transportable.
  6. To avoid duplication by incorporating commonly used routines.
  7. Monitor the user and protect data on the computer from unauthorized access.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Batch Processing: Define

A

The data is collected together before processing which is then carried out without human interaction e.g. Payroll

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Single User

A

A mode operation where the operating system deals with just a single user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Multi User

A

A mode of operation where the computer can deal with number of users at the same time. E.g. scales system in a supermaket.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Multi Tasking

A

The ability of the operating system to have several programs loaded and the user can switch between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Multi Programming

A

That ability of the operating system to have several programs loaded and the operating system can rapidly switch between them giving the impression they are all running at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Interrupt

A

A signal sent from a peripheral device to the processor requesting attentions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Typical causes of interrupt

A

(Hardware)

  • Mouse movement.
  • Keyboard key press
  • Printer running out of paper.

(Software)

  • Program run time error.
  • Clock reaching specified time.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Process of Interrupt

A

(1) –The current state of the processor is stored (on a stack).
(2) –A jump is then made to a subroutine that deals with the interrupts.
(3) –The interrupt is processed.
(4) –The previous state of the processor is retrieved (from the stack).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Priority of Interrupt

A

Where data loss will result a high level of interrupt is allocated.
Where the user is waiting for a response a medium level of interrupt is allocated.
Other cases a low level of interrupt is allocated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Polling

A

Polling is the checking by the OS of a number of devices, in turn, to see if they need attention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Buffers

A

A buffer is a portion of RAM allocated as a temporary storage while data is being transferred to and from a peripheral. It deals with speed difference between the devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Buffer is used when

A
  • There is a speed difference between the computer and the peripheral device.
  • Where data needs to be sent in batches rather than one bit/byte at a time.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Example of Buffer

A

Keyboard Buffer. When a key is pressed on a keyboard an interrupt is generated that places the character into a buffer. Applications take characters from the keyboard buffer when they require input.

A word processor can send data very rapidly to a printer. A printer, since it is mechanical, can only use the data slowly. To free up the word processor a print buffer may be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Double Buffering

A

A single buffer can suffer from buffer underflow which results in pauses. There is also a problem in allowing the memory to be written to whilst it is being read. To avoid this two buffers are used.

By using double buffering a continuous flow of data from the buffer is possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Device Driver

A

Software that converts OS instructions into the actual commands needed by a piece of hardware such as a printer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Logical device

A

The way in which a device e.g. hard disc is referred to, it may or may not match the physical hardware. E.g. one physical disc can be partitioned to appear as several discs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Security

A

The process of protecting data from unauthorized access or damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Weakness of username/password security

A
  • Can be forgotten.
  • Obvious password, guessable.
  • Using same password on multiple systems
  • Can be observed - key logger.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Alternatives to username/password security.

A

Biometric (additional hardware):

  • Retina scan.
  • Finger print.
  • voice pattern.

Smart card.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Administrator

A

A user who has full rights on a multi-user computer. They can create and modify other user accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

File Protection

A

Methods of stopping deliberate and accidental access to or damage of a file. It is achieved by access rights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

File encryption

A

Scrambling the contents of a file in order to make it unreadable by anyone who does not know how to unscramble it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Access log

A

A record of what each user has done on a computer. Maintained by OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Record locking

A

Restricting access to a record whilst it is being updated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

High-level scheduler*

A

With a batch processing system this is responsible for deciding the order in which jobs are to be started

Based on: -

  • Resources needed.
  • Processor.
  • Print etc..
  • Estimated running time.
  • Priority (set by user).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Low-level scheduler

A

Maintains a queue of all of the currently active jobs and decides which task is to currently have access to the processor. The order might depend upon the priority, the required resources and the available resources, also the closeness to complete of a job.

Time slices may be fixed in length or variable (last as long as a task can use it, or longer for more import tasks).

Time slices may be allocated more of often to more important tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Time slice

A

In a multi programming system the time slice is the amount of processor time given to a task before the processing moves to another task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Scheduler Strategies - Round robin

A

Each job is given an equal time slice of the processor, provided it can be executed i.e. is not waiting for input/output. The time slice may be 10ms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Scheduler Strategies - Run time method

A

A task is executed until completion or processing comes to a halt (awaiting I/O) or a previous request for I/O has been answered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Scheduler Strategies - Job Priorities

A

Some Operating Systems allow jobs to be given different priorities. A high priority job might be be given more processor time by ‘Bigger time slice’ or ‘More frequent time slices.’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Five state Process Model

A

A model that shows the possible states of a program on a multi-tasking computer.

  1. New.
  2. Ready.
  3. Running.
  4. Blocked.
  5. Exit.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Five state Process Model - Stage: New

A

A process has been created but has not yet been admitted to the pool of executable processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Five state Process Model - Stage: Ready

A

Processes that are prepared to run if given an opportunity. That is, they are not waiting on anything except the CPU availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Five state Process Model - Stage: Running

A

Process that is currently being executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Five state Process Model - Stage: Blocked

A

A process that cannot execute until a specified event such as user input or reading a record from a file completes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Five state Process Model - Stage: Exit

A

A process that has been released by OS either after normal termination or after abnormal termination (error).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Memory structure

A

The main store of the computer consists of RAM (used for holding most running programs and data that is being processed) and ROM (holding at least the instructions to start the computer). On a hand held computer without a hard disc the whole of the operating system and some applications will be on ROM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Partitioning

A

On a multitasking computer partitioning refers to dividing up the main store so that each of the current programs can have part of it. The OS must ensure that one program cannot corrupt another program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Variable/memory Partitioning

A

Each task is allocated a variable sized section of memory depending on how much memory the task needs.

The task has exclusive use of the partition.

This process allows more than one program to be in the memory at a time.

After many programs start and end memory may become fragmented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Paging

A

The dividing of memory into blocks for management purpose.

The main store is often divided into pages. Each task will be given a number of pages. They may in practice not be next to each other but the operating systems memory management system will make it appear to the application that the pages are consecutive. When a task accesses memory the memory manager intercepts the request and routes it to the correct page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Swapping

A

The process of exchanging the contents of two storage locations.

In order to allow more programs to be in main memory than the capacity of the main store a very high speed swapping disc may be used to swap out currently suspended tasks (between time slices). In practice only the programs varaibles need to be saved each time since the program will not be changed during execution. When execution is resumed the program and variables are recalled from the swapping disc. (The program must be saved once on the swapping disc).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Virtual Memory (Virtual storage)

A

Temporary transfer of part of the main store (RAM) onto hard disc to free space in RAM. The contents are then bought back when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Cache

A

Fast storage (RAM) containing a copy of frequently used data.

Because of the time taken to get to the main memory (RAM) many high speed devices have a small amount of RAM built into them for very fast temporary storage.
This RAM is known as a cache
Such devices include processors and hard discs.

45
Q

Advantages of digital over analogue

A
  • Data transfer is less prone to interference.

- Values are precise.

46
Q

Serial transmission

A

Example: From keyboard to a computer

The bits travel one at a time down a single pair of wires.

47
Q

Simplex

A

Data can only flow in one direction.
Broadcast digital radio (DAB) and digital television are Simplex transmission as data only goes from the transmitter to the receiver.

48
Q

Half duplex

A

A half-duplex system provides for communication in both directions, only one direction at a time (not simultaneously). An example is a “walkie-talkie” style two way radio or many entry phones.

49
Q

Full Duplex

A

Data can flow in both directions at the same time. Example include a mobile phone.

50
Q

Parallel Transmission

A

A number of bits (typically 64) are transferred simultaneously through a series (e.g 64) of parallel wires.

51
Q

Advantage of serial transfer

A

Simple, smaller, cheaper

52
Q

Advantage of parallel transfer

A

Faster

53
Q

Digital transmission

A

If data is being sent down a copper or fiber optic cable the pattern of bits can be represented by two different voltages (0v and 5v) or by a light being off or on. Such a transmission system is called baseband.

54
Q

Modulation

A

Varying a carrier wave in some way in order to represent binary data, Eg changing amplitude or frequency.

55
Q

Modulated signals

A

A more complex arrangement where the binary data is used to vary some other signal is known as a modulated transmission.

Modem performs modulation and it’s reverse demodulation.

56
Q

Modulation Allows

A

-Binary data to be sent over systems that were not designed to carry binary data.
E.G: By using two different tones data can be sent over a telephone system.

-Several bits to be sent at the same time by each bit being sent using a different carrier wave.
E.G: A wireless system may use eight different carrier frequencies to enable eight bits to be sent at the same time.
E.G . In a fiber optic system different colourer light may be used, each colour carries a different bit.

57
Q

ADSL

A

A system of sending data over telephone lines by using a number of modulated carrier waves.

58
Q

Multiplexing

A

Multiplexing is the process of combining serial signals down a single communication channel and splitting them up at the receiver.

59
Q

Time division multiplexing

A

Sending multiple sets of data down a single line by switching rapidly from one (sender-receiver) to the next (sender-receiver).

60
Q

Frequency division multiplexing

A

Sending multiple sets of data down a single line with different frequencies.

61
Q

Data packets

A

When a file is sent across a network it is broken into blocks of data and placed into packets.

Each packet will have the packet number, the address of the machine it came from, the address of the machine it is going to, the data and a checksum to ensure the data has not been corrupted on route.

62
Q

Baseband

A

A transmission system that does not use modulation. Eg in a copy cable where 0 and 1 are represented by 0v and 5v.

63
Q

Biometric test

A

A security test that confirms identifies the user by measuring a characteristic of their body e.g .fingerprint.

64
Q

Bio-metric process

A
  • Person’s voice (print) originally captured, digitized and stored.
  • On attempted entry, person’s voice (print) captured and digitized.
  • Digitized data compared and entry allowed if successful).
65
Q

Switching (Network)

A

Switching prevents all data being sent to all parts of a network/ makes efficient use of the data lines.

66
Q

Circuit switching

A

A route is negotiated.

The bandwidth on the route is guaranteed.

The data is sent, all data following the same path.

The connection is closed.

67
Q

Packet Switching

A

With packet switching each packet is individually routed through the network.

Different packets may follow different paths so the packets may arrive out of order.

68
Q

Advantages of Packet Switching

A

Better use of network.

Fault tolerant.

69
Q

Advantages of Circuit Switching

A

Speed of transfer is known.

Packets arrive in order.

70
Q

CSMA / CD

A

The collision avoidance and detection system generally used on a LAN.

71
Q

Token Networks

A
  1. A token (permission to send) is transferred from machine to machine.
  2. Only when the token is received can the data be sent, by adding it to the token.
  3. When the token reaches the receiving machine the data is removed.
72
Q

Why are Token Networks not used?

A

Why are Token Networks not used? They need specialist hardware making them expensive.

They tend to have a slower basic data rate that n CSMA/CD

73
Q

Bridge

A

It’s piece of hardware that joins two (or more) networks together. The networks must use the same protocol.

74
Q

Collision Domains

A

An area of the network that can only transfer one data packet at a time.

75
Q

Gateway

A

It joins a network to another network that may have a different protocol.

76
Q

Router

A

A router is a device in a network which holds information about the addresses of computers in the network or other networks. A router looks at the destination address of a data packet and forwards the packet to its destination or another router closer to the destination. Router may choose optimum path.

77
Q

Collision (Files)

A

In a hash file a collision occurs when the hash function give the same record position for two records.

78
Q

Protocol

A

It’s an agreement between two devices about how they should exchange data. To communicate both devices must use the same protocol.

79
Q

TCP/IP (Protocol)

A

Transfer Control Program/Internet Protocol. The most widely used protocol for networks. It defines how machines are identified using addresses and how data packets are constructed and forwarded.

80
Q

IP Address

A

The unique 32bit value used to identify a machine one the internet.

81
Q

ISP

A

Internet Service Provider is a company that provides individuals and other companies access to internet.

82
Q

HTTP

A

The protocol used to request and send WEB pages.

83
Q

ICANN

A

One of the controlling bodies of the internet.

84
Q

VLE

A

Virtual Learning Environment. The use of the Internet to publish teaching resources (e.g Blackboard, moodle/iLearn).

85
Q

Intranet

A

The use of internet technology but private and only accessible from within an organisation. Used for:
Notices.
Access to resources e.g. standard documents.
As a parthole to other service.

86
Q

A feature web page should have (E)

A
  • Should comply with established web standards (legislation).
  • Optimum for different accessibility.
  • Should be easily navigable/ should be hyperlinks (accept buttons) to allow navigation.
87
Q

Extranet

A

Remotely accessing an intranet across the internet. This will require the user to “log in” to gain access.

88
Q

E-Commerce

A

Carrying out commercial operations using the Internet.

89
Q

E-Commerce - Auction Sites

A

Sites that auctions items and charge commissions for the service.

Advantage is a large number of possible buyers.

Disadvantage is that items have to be sent. Problems of buyer/seller trust.

90
Q

E-Commerce - On line shopping

A

Selling goods or services to the public.

Advantage: Easy price comparison, rapid ordering.
Disadvantage: Can’t get the item immediately (tangible item), cannot see/feel/try-on the item (tangible item), website may be fraudulent - may not receive goods or credit card details may be stolen.

91
Q

E-Commerce - Banking services

A

Access to banking facilities remotely across the internet Quick and easy access to account. Disadvantage is security.

92
Q

E-Commerce - Audio/video download

A

Selling of music/video for downloading (e.g. I-Tunes) or streaming (e.g. Spotify).

93
Q

Communication - Blog (WEB LOG)

A

A personal commentary, diary etc. this is frequently updated and made publicly available.

94
Q

Distributed Databases

A

Database (data stores) that have different parts (possibly different entities) stored on different servers. Queries (searches) might involve extracting data from a number of servers using the Internet.

95
Q

Distributed Processing

A

A software application where different parts of the same application execute on different computers connected via the internet.

96
Q

Distributed Software

A

Some software updates itself automatically across the Internet. Particularly used for software that needs regular updates e.g. Virus Checkers, Operating Systems.

97
Q

Cloud Computing

A

The use of a third party to host data and applications. All access is through web browser.

98
Q

URL

A

Uniform/Universal Resource Locator

99
Q

Applet

A

An applet is a small program, written in Java, that runs within a web page. Applets are machine independent.

100
Q

ASP

A

Active server pages. These are web pages written on request e.g. the web page that shows the result of search from a search engine.

101
Q

Bookmarks

A

In a browser it is a shortcut to a page.

102
Q

Browser

A

Displays WWW pages written in HTML.

103
Q

Cashe

A

Fast storage (RAM) containing a copy of frequently used data.

104
Q

Cookies

A

Small data file stored by a web page site on a browser so it can “remember” when the user goes back to the site.

105
Q

Domain names

A

It’s a text based substitution for an IP address.

106
Q

FTP

A

File Transfer Protocol, a method by which files can be transferred from a remote computer to a local computer.

107
Q

MetaTags

A

Key words added to an HTML to summarize its contents.

108
Q

Modem

A

Any device that converts binary data into another form, using modulation, for transmission.