Operating Systems (Final) Flashcards

1
Q

File System

A

A way to organize and manage files on a storage device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

File System Components

A

Files, FCB’s, directories, and hardware/software used to implement the secondary storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Speed of Secondary Storage

A

Secondary storage is much slower than CPU and main memory, but still faster than disk drives and tape drives (I/O stuff)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Random Access of Sec Storage

A

CD writers, Hard Drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Sequential Access of Sec Storage

A

Tape Drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Seq. vs Random Access

A

Sequential is faster! Its cheaper too! However, what is best depends on the situation. It is more effective to use random access when dealing with a large database, because otherwise the entire database would have to be loaded in sequential.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Indexed Files

A

A file with an index that allows easy random access, if the computer is given the index.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

FCB

A

File Control Block. Holds file metadata. Can include: name, owner, date, path, type, and more properties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Seek()

A

Place file pointer at a location in bytes. Used to navigate a file. Can be used by index files to retrieve the location to specific records even faster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Tell()

A

Return current byte location. Used to navigate a file. Can be used by index files to retrieve the location to specific records even faster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

chmod 666 a.out error

A

Running a.out with those permissions set is impossible. 666 means read and write permissions is given to everyone, but not execution permissions. Give execution permissions to fix it (done with +x).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Disk

A

A drive with a spinning disk where data is written and read by a disk head.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Track

A

A ring on the disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Sector

A

A piece (like a slice) on the disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Block

A

A logical unit of storage on the disk, located by a specific track/sector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Contiguous versus linked allocation

A

Files must be allocated in a contiguous manner, while in linked allocation, files can be anywhere, as blocks point to other blocks until the last block in the file reads EOF.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Linked allocation benefits

A

There is much less fragmentation, Dynamic allocation, and easier file expansion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

FAT benefits

A

It is better than linked allocation because all linking information is held in a separate table, instead of it being tied to the blocks. The table is also stored in cache memory.

19
Q

How is block size determined?

A

By factors such as the size of the disk, the size of the files to be stored, and system performance requirements all play a factor.

20
Q

Logical to physical mapping of blocks

A

Contiguous, linked, and multi-indexed allocation. Any of these schemes can be used to translate blocks, but it depends on the storage system requirements.

21
Q

FCSF Disk Head Algorithm

A

Serves read/write requests in the order they are received.

22
Q

Shortest Seek Time First

A

Serves requests by shortest seek time.

23
Q

Scan

A

Services requests in a single direction, it reverses and serves the requests in the other direction.

24
Q

Cyclic Scan

A

Similar to scan, but instead of reversing direction, it starts back at the beginning of the disk before continuing.

25
Q

Security

A

A system is secure if its resources are used as intended under all circumstances.

26
Q

Physical Threats

A

Put systems in well-protected places! Flood, fire, lightning, etc are all dangerous.

27
Q

Human Threats

A

Certain people should have access and must be screened beforehand. Levels of security.

28
Q

Password Threats

A

Passwords can be compromised by multiple ways.

29
Q

Password Guess

A

Know something about the person, or past passwords.

30
Q

Accidental Exposure

A

Looks over shoulder.

31
Q

Illegal Transfer

A

Spying

32
Q

Legal Transfer

A

Here’s my password! Here’s my friends password! ….

33
Q

Password Encryption

A

Done by 2 stage hashing, stored in password file.

34
Q

More Software/Security Vulnerabilities

A
35
Q

Shared Memory Multiprocessor

A

Large memory with multiple cpus.

36
Q

Memory passing multi-computer

A

A connection allows for multiple cpus to be connected with their own memory.

37
Q

Wide Area Distributed

A

Internet shares multiple computers

38
Q

High bus load

A

Multiple cpus all sharing memory on a bus.

39
Q

No private memory

A

Multiple cpus each have their own cache sharing memory on a bus

40
Q

Private memory with lower bus load

A

Multiple cpus on a bus with cache memory and private memory using a shared memory.

41
Q

Problem with CPUs with its own OSs

A

Have to share a copy of the same OS. Private data has to be stored on the individual memory.

42
Q

Problem with each OS scheduling processes.

A

A user can use a CPU and stay there w/o sharing any memory or resources. Solved by using a master CPU.

43
Q

Symmetric Multiprocessing

A

Run a shared OS Process with multiple cpus. The shared memory has a set of semaphores with the shared OS process.