System software Flashcards

1
Q

what are the 3 main functions of the operating system

A

provide user interface
load and run programs
manage computers resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

command line interface

A

text based interface
commands typed at command prompt
over 270 commands
in early operating systems (MS DOS)
commands must be entered precisely- difficult to remember
therefore difficult compared to GUI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

GUI

A

graphical user interface
uses WIMP (windows,icons,/mouse control, pull down menus
icons and options represent folders, apps and commands
activated when selected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what activities does the OS control (Resource Management)

A

Input and Output I/O - help user interact w computer
File Management- create,save,delete,move,copy files into 2nd,☁️ed storage
Memory Management- each program has enough memory;no 2 programs use same memory space
Process Management- each process getting enough CPU time to run right

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

drivers

A

link hardware to software so computer can perform tasks when applications need to send instructions to particular hardware device

program that provides OS with info needed for it to work with device

driver software embedded on device, installed together w any application software when device connected to computer for first time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

programming tool

A

computer program used to create programs that work on their own , support other programs/applications and interact with resources on device.
eg IDE (integrated development environment)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IDE

A

integrated development environment
IDE consists of source code editor, compiler/intepreter and other add ons
IDE support multiple programming languages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

game development applications

A

ability to create both 2D and 3D games for multiple platforms
-mobile app development complex- different platforms app should execute

—cross platform mobile app developments—write once,run anywhere (WORA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

source code vs executable code

A

source code- original code written by programmer
.pas/.java

executable code- source code compiled to separate file called object code
.exe (can be executed) .class (cannot be directly executed in windows unless Java Runtime Environment (JRE) is installed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what are utilities

A

provided by system software
help user manage, analyse,maintain, optimise and control computer
available in control panel area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is the control panel

A

program apart of system software that allows user to control operating system and utilities
has programs+features option- allows uninstallation/modification of installed program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

name utilities (8)

A

defragmentation
scheduling tasks
updating
file compression and extraction
archive
backup
install and uninstall software
security-firewall and anti-malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

defragmentation

A

DISK defragmenter
rearranges fragmented data( data stored in multiple locations) on HDD( ONLY) so work can be done more effeciently

time taken depends on size + degree of fragmentation on disk

impossible if not enough space to create copy of files being rearranged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is the purpose of file compression

A

reduces size of files (through advanced programming techniques) so:
-take up less storage space
-transferred more quickly over internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

examples of compression programming techniques

A

WinZip, 7 Zip, WinRAR,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

decompression of extraction

A

extract compressed files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

archiving

A

remove files + store in compresssed separate archive location for space saving+later use

files stay resident w/o being used for long time
causes occupation of necessary space; but files necessary for future

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

backup

A

making copy in case of data loss in separate location [ remote(☁️ storage) , local drives, network drives, external drives)

usually made of data files, can include apps+ OS’s + drives

uses compression or copying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

backup utility options

A

-types of files to be backed up
-how often data is backed up
-whether prev backups should be overwritten
-setting backup schedule from w/in utility
-saving backup settings for future use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

installation software

A

installation program used when new software is installed, to install program so it is ready to use

registry records settings+ changes that affect system when installations take place
installer program- takes care of placing exe files, creating folders for supporting software, registering necessary software in registry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what options does the user have in terms of the way the software products are installed

A

want standard features- typical/standard installation

want to adapt way software installed/change settings- custom installation

want all features- full installation (will take more hardware space than typical installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

product key

A

unique code that ensures licensed software was purchased legally, and is licensed to you

aka activation key/code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

why do you not install license for google+office 365

A

using cloud-based version on internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

uninstall programs

A

safely remove program from computer system by remiving all+updating registry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

scheduling

A

run programs automatically at specified conditions
-allows updates+ process configuration in background while computer runs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

updating

A

old-update w service packs (distributed on CD)

now- most updating done over internet (scheduled task set to check on vendor update site for available update downloads

can choose if updates automatically or should be requested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

firewall

A

-set of devices designed to to permit+deny network transmissions based on set of rules
- protects networks from unauthorised access+threats from internet
-permits legitimate communications only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

malware

A

malicious software
program/file harmful to computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

viruses

A

-programs illegally loaded onto computer-cause damage to system
-can modify themselves-avoid detection
-spread from computer via removable media or downloading from internet
(infecting files on computer and downloading, attaching to emails, send to email address

before internet popular-transferred by inserting infected disk into computer

now- internet connectivity commonplace- easier to transmit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

anti-malware

A

safeguard from malicious threats
prevent malware software from access to computer
antivrus software + firewalls

31
Q

software license

A

legally describes how software can be used+copied
protects copyright of software
restricts copying of software onto multiple machines

32
Q

license manager

A

controls software license
enforces license terms to protect software vendor from piracy

33
Q

piracy definition

A

illegal copying of software

34
Q

2 main types of software license

A

proprietary + free and open source licenses

proprietary (owner)
does not allow software to be freely distributed/copied (activation/product keys)
does not give access to source code
restrict user’s use of software

eg GNU(general public license)- gives user permission to modify+redistribute software- but obliged to include source code so others may use new improvements

therefore produce community that contribute to software product sharing the enhancements

eg Linux

free and open source license
aka copyleft licenses (direct contrast to proprietary)
shares source code of software

35
Q

EULA

A

end user license agreement
describes rights bought when software bought

36
Q

creative commons license

A

keep copyright of your work but allows others to copy and distribute your work as long as acknowledgment given.

37
Q

freeware

A

copyrighted but given away by author at no cost for user to use,not to resell

38
Q

freemium software

A

variant of freeware
limited functions provided at no cost, additional,advanced features incur cost(license key)

39
Q

user profile

A

unique
includes docs, pictures, desktop

40
Q

anti virus

A

find signature (identifying piece of code embedded in virus program
take appropriate action-delete or quarantine file.

should be able to supply features:
-update signature database from internet
-offering variety of protection categories (network security, email security,computer protection
-variety of scanning options - full system,selected drives,individual drives

41
Q

user profile contents

A

unique profile that includes docs folder,pictures folder,desktop etc
username and password
customisable desktop theme+structure

42
Q

public profile

A

docs can be shared by all users

43
Q

desktop

A

first window that appears after user logs on
serves as surface for desk( like top of actual desk)
includes taskbar
shows programs running and allows to switch between
contains start button-access programs,folders,computer settings
app can be pinned to taskbar

linked to a particular person
on OS that uses GUI
for each user in multi-user environment

44
Q

why is not advisable to add files and folders to desktop

A

-login process will be slower if desktop has large files/folders
-become cluttered and difficult to locate things (rather leave shortcuts only)
- if OS must be reinstalled, user desktop may be deleted ; files+ folders lost

45
Q

what file structure does computer use and why

A

hierarchical structure
necessary for computer to know where files stored
orderly and functional

46
Q

hierarchical structure

A

file structure necessary for computer to know where files are stored

drive

folder folder folder
l
folder folder folder

highest level is drive(physical hard drive)
drive have (any no) immediate child folders
folders have sub folders
files live in folders- address known as path of file \ \ \

47
Q

File explorer

A

GUI utility
view,edit,save, delete folders/files

48
Q

cloud based storage

A

extension of secondary storage
data stored remotely as opposed to locally
storage accessible through internet and apps (google file stream, icloud,dropbox)

49
Q

sharing and permissions cloud based vs local

A

local-access controlled by default profile settings of OS and administrator
sharing+permissions can be set on folders+files exist on multi-user comp.
or files on servers connected by network

cloud-owner (person who created shared folder) can ads users, can provide editing permission

50
Q

hot swappable

A

can be successfully installed w/o restarting computer
eg most USB devices

51
Q

spyware

A

installed secretively on PC to intercept/take partial control of user’s interactions w computer w/o consent

eg keystroke-logging program
- used to record each keystroke of user on infected computer
-transmits data via internet to white collar criminal responsible for creation
-criminal reconstructs relevant login data+passwords and gains illegal access to infos (eg bank account)

52
Q

adware

A

unwanted+annoying software
automatically displays/downloads to comp.
benign/not harmful software - slow down operation of comp.
access cookies,small text files w personal data
stored by internet browser (customise adverts according to activity in browser

eg pop up windows

53
Q

control panel

A

program that allows users to control operating system and facilities

54
Q

task manager

A

program that allows user to manage operating system and utilities

55
Q

spyware

A

software installed surreptitiously on personal computer to intercept and take partial control over users interactions w/ computer w/o user’s consent

56
Q

keystroke logging

A

form of spyware that records each keystroke of users infected computer and transmits data via internet to criminals who reconstruct login data and passwords to gain illegal access to information

57
Q

adware

A

unwanted benign software that autonomy displays/downloads to a computer
slows down operation of computer
access cookies stored by internet to customise displayed adverts

58
Q

anti virus software

A

find signature- identifying code embedded in virus program- and take appropriate action (delete/quarantine offending file)

59
Q

plug and play

A

operating systems detect new hardware as soon as it is connected to computer system
driver program installed and settings for device stored on computer

60
Q

BIOS

A

basic input output system
firmware- resides in non volatile ROM chip
responsible for POST (power on self toast)

61
Q

BIOS process

A
  1. BIOS begins power on self test to check hardware. An inventory of the hardware connected to the computer is obtained from the cmos. the hardware is tested to determine if it is functioning correctly. BIOS locates the mbr (master boot record- section of code stored on hdd and is responsible for loading and executing kernel)
62
Q

kernel

A

core of computer OS
handles memory and peripherals

63
Q

cmos

A

battery backed volatile memory that stores hardware and user settings

64
Q

UEFI

A

unified extended firmware initiative
replaced BIOS ( cant switch on same computer)
more efficient start up system

65
Q

interrupts

A

signal isn’t too CPU from hardware or software indicates the need for the CPUs attention
generated, so CPU can be told to switch to a new process
So CPU can carry out many different processes without having to run an entire process to completion
Software interrupt – generated from programs.
Hardware interrupt – signal sent from device
each device has unique Interrupt request number (IQ) – CPU identify which device is interrupting it

66
Q

IO range

A

temporary storage area in RAM
used to speed up input from a slow device

67
Q

multitasking

A

processing technique where CPU appears as it is running several programs at same time
system uses interrupts to work on another job
CPU switches between very short bursts of processing time

68
Q

multithreading

A

software technique of running multiple programs w in one task
multiple threads running at same time
occurs when more than one task is on the same program being carried out

69
Q

translators

A

Software programming tools that can convert from one code language to another
can be interpreter, compiler or assembler

70
Q

high level langauges

A

Used by programmer
Closer to humans than computer
high level of abstraction

71
Q

low- level languages

A

Hardware understands.
Closer to computers than humans.
machine language- lowest level - binary
assembly - slightly easier than machine

72
Q

interpreters

A

Programme that executes the high level language instructions written by programmer
Converts source code to machine code
Runs line by line
interpreted languages: python, javaScript
disadvantages of interpreted languages - must be re-interpreted every time code is ran

73
Q

compilers

A

transform languages into executable form before running
2 types
machine code generation:
source code directly into machine code using object code (machine dependent). .exe

intermediate representations
language interpreted into bytecode which must be further compiled to execute (Java Virtual machine) without re-reading source file