OPERATING SYSTEMS FUNDAMENTALS Flashcards

1
Q

Input

A

A user running a word-processing program types the letter A on the keyboard, which results in sending a code to the computer representing the letter A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Processing

A

The computer’s CPU determines what letter was typed by looking up the keyboard code in a table that resides within the computer’s memory and is part
of the operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Output

A

The CPU sends instructions to the graphics cards to display the letter A, which is then sent to the computer monitor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

operating system (OS) Features

A

User interface, Storage management, Process and service management, Memory and I/O management, Security and resource protection, The kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

User interface

A

The user interface provides a method for users to interact with the computer, usually with a keyboard and mouse or touch screen. A user clicks, touches, or types; the computer processes the input and provides some type of output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Storage management

A

A key function of business computers is the storage of
information. The file system is the method by which an OS stores and organizes files and manages access to files on a storage device, such as a disk drive, SD card, or USB flash drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Process and service management

A

A process is a program that’s loaded into memory
and run by the CPU. It can be an application a user interacts with, such as a Web browser, or a program with no user interface that communicates with and provides
services to other processes. A process without a user interface that runs in the background is usually called a service in Windows and a “daemon” in Linux. Most
operating systems have built-in services to handle network communication, control access to various input/output devices, manage the file system, and so forth. The
operating system controls the loading, execution, and termination of both built-in and user-installed processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Memory and I/O management

A

When a user performs an action that starts an
application, the OS must determine if sufficient memory exists to load the application and where in memory it should be loaded. When an application terminates, the OS must mark the memory used by the application as free so other
applications may use it. In addition, the OS ensures that I/O devices such as USB ports and video cards are accessed by only one process at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security and resource protection

A

Operating systems used on business systems provide
methods for securing access to resources. This function includes protection from accidental unauthorized access, such as when a poorly written program attempts
to access memory outside of its allocated space, and from purposeful unauthorized access, such as from malware or an outside attacker. The OS also provides access
controls that can be configured to limit which users can access particular files or make system configuration changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The kernel

A

The kernel is the heart of the OS and runs with the highest priority. It performs many of the tasks mentioned in this list. The kernel schedules processes to run, making sure high-priority processes are taken care of first; performs memory and I/O management; and provides a number of security and resource protection functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

single-tasking operating system

A

execute only a single process at a time. This means that if you are browsing the Internet with a Web browser,
you can’t be listening to Spotify at the same time on the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A multitasking operating system

A

quickly switches between all the processes
that are loaded into memory and scheduled to run, so Spotify can play music while you’re typing a document and the Chrome browser is downloading a file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An embedded system

A

is a computing device designed for a specific task, such as
controlling a dishwasher or handling the braking system in an automobile. They often use inexpensive microcontrollers that run at speeds as low as 1 MHz, don’t have multitasking
capabilities, might have as little as 8 KB of memory, and run a simple OS that does little more than load a program and start it. That isn’t to say that all embedded systems are
single-tasking, but many are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

cooperative multitasking.

A

In this method, the operating system gives CPU control to a process and waits for it to terminate or enter a waiting state, thereby giving up control of the CPU. The OS then gives CPU control to the next process waiting for CPU time. The problem with this method of multitasking occurs when a process doesn’t relinquish control of the CPU timely manner, either due to poor software design or an error that keeps the process in an infinite loop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

preemptive multitasking

A

the running process can be replaced with another
process at any time based on a system interrupt, a higher-priority task requiring the CPU, or the time-slice timer expiring. Operating systems used on server, desktop, and laptop computers developed since the early 2000s use preemptive multitasking operating systems. In preemptive multitasking, the operating system is in strict control of which processes get CPU time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

single-user operating system

A

allows only one user at a time to interact with the OS
user interface, start processes, make system configuration changes, and interact directly with the file system. Single-user systems may be single-tasking systems as well, but they
don’t have to be. However, all single-tasking systems, such as those mentioned in the previous section, are also single-user systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

multiuser operating system

A

allows multiple users to sign in to it, start and
stop processes (that is, run user applications), interact with the user interface, and access the local file system. Linux/UNIX operating systems have always supported multiple users, and Windows Server versions also allow multiple users through RDP, where one user can be signed in to the local console and other users can be signed in remotely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

general-purpose operating system

A

is designed to provide a convenient
user interface and run applications in a home or business environment with reasonable performance. These operating systems usually require a responsive user interface because
users expect a file or application to load quickly when they double-click it. Users are not typically concerned with background processes unless they affect the application that
is currently running.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A real-time operating system (RTOS)

A

is designed to process inputs and produce outputs not just in a reasonable amount of time, but in a very specific
and repeatable amount of time. Real-time systems perform tasks like controlling assembly line robotic systems, controlling Federal Express sorting facilities, managing the electrical grid, running amusement park rides, and controlling self-driving automobiles. In such
systems, the difference between completing a task in .5 seconds or .7 seconds could mean a restart of the assembly line at least or the loss of life at worst.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

client operating system

A

client operating system is to run applications requested by
a user and request data from network servers as necessary. Many OSs classified as client operating systems, such as Windows 10 and macOS, and client distributions of Linux,
such as Ubuntu Desktop, can perform some server functions, but their primary purpose is to be used as a client.

21
Q

server operating system

A

server operating system is to share network resources
such as storage and printers and provide network services to clients. Windows Server, macOS Server, UNIX, and many Linux distributions fall in this category. A server OS is tuned to share files efficiently and perform network operations in response to client requests. It usually comes with server services such as a DHCP server, a DNS server, a
file server protocol, a Web server, and perhaps a directory service such as Microsoft’s Active Directory.

22
Q

standalone operating system,

A

standalone operating system, as the name suggests, is not designed to interact with other OSs or access network resources. You may be hard-pressed to find a standalone OS
today, as almost every computing device has a network interface and can, at the very least, connect to the Internet. You’re most likely to find a standalone OS running in an embedded system. If the system has no need to communicate with a network, it can be designed with
a very basic OS that has no network interface or an OS with disabled network functions to save memory and maximize performance.

23
Q

Fault tolerance

A

Fault tolerance is the ability of a system to recover from a hardware or software failure.

24
Q

clustering

A

clustering, which is the ability of two or more servers to act as one, for fault tolerance, load sharing, or both.

25
Q

A load-sharing cluster, or load-balancing cluster,

A

A load-sharing cluster, or load-balancing cluster, has two or more servers that alternate in taking client requests, which provides faster response time to clients.

26
Q

hot swapping

A

hot swapping of components such as hard disks, memory, and even processors so that if a component fails, a new component can be swapped in without shutting the system down

27
Q

The boot procedure

A

The boot procedure is a series of steps performed by every computing device that starts with the application of power to the CPU and other hardware components and ends with a running system ready to perform work.
1. Power is applied to the CPU and other hardware components.
2. The CPU starts
4. The operating system is located by the firmware.
5. The OS is loaded into RAM.
6. OS processes and services are started.
3. The CPU executes the firmware startup routines.

28
Q

Firmware

A

Firmware is program code that is stored on computer hardware in non-volatile memory and is responsible for performing diagnostic tests and booting the operating system. On newer PCs, the firmware is called the BIOS or UEFI.

29
Q

Non-volatile memory

A

Non-volatile memory is memory that maintains its contents when no power is applied to the system. Non-volatile memory is typically flash memory in modern systems or electrically erasable programmable read-only memory (EEPROM) in older systems. On newer PCs, the firmware is called the BIOS or UEFI.

30
Q

bootstrap program
bootloader program,

A

bootstrap program that locates and then loads the bootloader program, which is responsible for loading the initial process that makes up the operating system. With general-purpose OSs like Windows and Linux, the bootloader is typically stored on the disk where the OS is stored. The bootloader for Windows Vista and later versions is called Boot Manager (BOOTMGR); NTLDR is used in older versions of Windows. Linux systems use a variety of
bootloaders, including Grub and LILO.

31
Q

basic input/output system (BIOS) and Unified Extensible
Firmware Interface (UEFI)

A

basic input/output system (BIOS) and Unified Extensible
Firmware Interface (UEFI) are firmware programs that play an important part in the boot process of a computer and the loading of an OS

32
Q

BIOS has the following
properties and performs the following tasks:

A
  • Resides on a chip on the computer’s motherboard; it is usually flash memory or EEPROM in older systems
  • Initializes I/O devices
  • Performs tests at startup, such as memory and hardware component tests, called the power-on self-test (POST)
  • Provides a user interface to allow hardware configuration such as CPU overclocking or disk configuration
  • Locates and loads the operating system that interfaces with the user
33
Q

CMOS - complementary metal oxide semiconductor

A

The BIOS configuration is stored in a memory
chip called the complementary metal oxide semiconductor (CMOS). A CMOS chip uses a low-power memory technology that is powered by a small battery. Users can make
changes to the BIOS configuration by accessing the BIOS setup screen before the computer boots.

34
Q

Kernel mode

A

Kernel mode is a CPU mode in which a process has unrestricted access to the computer hardware and has access to privileged CPU instructions. Privileged CPU instructions include those that switch between kernel and
user mode and those that configure interrupts, timers, and I/O devices.

35
Q

User mode

A

User mode is a CPU mode in which the process can only access memory locations allocated to it by the OS, must ask the OS to access I/O devices on its behalf, and can’t execute privileged CPU instructions.

36
Q

process ID (PID).

A

The PID identifies the process, allowing other
processes to communicate with it and the user to manage it.

37
Q

A file handle

A

A file handle is an identifier for a file that contains
all the information the file system needs to locate and access the file. When a process is terminated, the resources are released back to the operating system so they can be used by other processes.

38
Q

A device driver

A

A device driver is usually a kernel mode process that accesses hardware devices directly on behalf of user mode processes or other kernel mode processes. Ideally, the operating system loads a device driver for each I/O
device on the computer. The driver understands how to communicate with the device and keeps track of requests to read or write to the device from multiple processes

39
Q

polling

A

polling—the OS checks each device one after the other in a round-robin fashion to see if it requires attention. In general, polling is not a very efficient method of handling I/O unless there are few I/O devices and the system doesn’t have to do a lot of non-I/O processing

40
Q

interrupt

A

interrupt is a signal, usually generated by an I/O device, that alerts the CPU and OS that a device needs attention (data needs to be read or written, for example). Many interrupts are hardware interrupts in which a signal generated by an I/O device causes a pin on the CPU to change state (from on to off or vice versa).

41
Q

interrupt request (IRQ) lines.

A

These pins on a CPU are usually called interrupt request (IRQ) lines. When the CPU detects the IRQ line, it stops what
it is doing, determines the source of the interrupt, and starts execution of the interrupt service routine (ISR),

42
Q

interrupt service routine (ISR), also referred to as an interrupt handler.

A

interrupt service routine (ISR), also referred to as an interrupt handler. If the interrupt is caused by an I/O device, the ISR calls the relevant device driver to service the device. After the device is serviced, program control resumes with the process that was running when the interrupt occurred.

43
Q

trap

A

software interrupt is called a TRAP and can be generated by user mode programs when they need immediate kernel services. You can see a list of IRQs and the devices or processes using them in the Microsoft System Information app

44
Q

interrupt masking.

A

To prevent unnecessary interruptions, ISRs turn off
interrupts of equal or lower priority; this is called interrupt masking. Higher-priority interrupts can, however, interrupt a lower-priority interrupt. Because some interrupts
are turned off while an ISR is running, it must do its work quickly so other devices that need attention can be serviced in a timely manner.

45
Q

non-maskable interrupts

A

A certain class of interrupts called non-maskable interrupts (NMI) cannot be turned off. NMIs are primarily reserved for
error conditions such as divide by zero or memory errors, but they can also be used for system debugging.

46
Q

Authentication

A

Authentication verifies that an account trying to access a
system is valid and has provided valid credentials (username and password, for example)

47
Q

Authorization

A

Authorization verifies that an authenticated account has permission to perform an action on a system, such as open a file or perform configuration changes.

48
Q

BASIC Beginner’s All-purpose Symbolic Instruction Code

A

mid-1960s, right after the first interactive computer game was invented at the Massachusetts Institute of Technology (MIT), a simple programming language was developed at Dartmouth College, aimed at the non programmer It was dubbed BASIC, or Beginner’s All-purpose Symbolic Instruction Code, and became a widely used programming language for many years to follow.

49
Q

Microsoft Disk Operating System, or MS-DOS.

A

MS-DOS was designed as a command-line interface, which means that users typed in commands instead of using the graphical user interface (GUI) point-and-click method that is
common today.