Systems Software Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Operating System

A

Collection of programs/software that MANAGE HARDWARE and PROVIDE AN INTERFACE FOR USER AND APPLICATION SOFTWARE.

EXAMPLES: Windows, Linux.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the OS handle

A

-Memory Management
-Interrupt Handling
-Processor scheduling
-File management
-Providing user interface
-I/O management
-Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Different types of OS

A

-Distributed
-Embedded
-Multi tasking
-Multi user
-Real time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Different types of memory management

A

Paging: Memory split into EQUAL SIZED CHUNKS called pages. Memory allocation is NON-CONTIGUOUS.

Segmentation: Memory split into LOGICAL SIZED CHUNKS called segments. Each segment represents one part of a program (i.e subroutine). CONTIGUOUS.

Virtual Memory: Section of Hard Drive used as RAM for programs not being used. Moved to VM via paging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Problems with Virtual Memory

A

Can cause Disk Thrashing - Computer freezes due to frequent swapping of pages between hard disk and memory.
MORE TIME SPENT TRANSFERRING PAGES THEN RUNNING PROGRAMS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does the OS handle interrupts

A

-Stores interrupts in a priority queue in an interrupt register.

-Uses interrupt service routine to ensure interrupts handled fairly by checking interrupt register at end of FDE cycle.

-If an interrupt exists with Higher priority than interrupt being handled, contents pushed to a stack.

  • Processor responds to interrupt by loading ISR to RAM, flag is set (signalling beginning of ISR)

-Rest of queue is checked for higher priority processes. If so, process repeats.

-Otherwise, contents of stack loaded back into registers and FDE cycle continues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Different forms of processor scheduling

A

(PRE EMPTIVE)
-Round robin
-Shortest Remaining time
-Multi-level feedback queues
(NON PRE EMPTIVE)
-First come first served
-Shortest Job first

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Round robin

A
  • Each job allocated a time slice to execute a process.
    -Once all jobs have used a slice, each job that still needs to be completed is allocated another slice.
    -Continues until all jobs are executed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Shortest Remaining Time and its risk

A

-Queue is ordered based on time left for completion, with least time being completed first.
Issue: Risk of processor starvation for larger jobs if small jobs keep being added.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Multi level feedback queue

A

Makes use of multiple queues, each ordered based on different priority. Difficult to implement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

First come first served

A

Jobs processed in chronological order, does not allocate time based on priority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Shortest Job first and Issues

A

Queue ordered according to time required to complete job.
Requires processor to know how long each job will take which is not known always.
Risk of processor starvation for larger jobs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

BIOS

A

Basic Input Output System - Runs when computer is turned on.
PC points to location of BIOS upon startup.
Responsibilities include:
- Running the Power On Self Test to ensure all hardware components are functioning
- Checking if CPU clock memory and processor are operating.
- Testing for external memory devices connected to computer.
- Loads OS into RAM AFTER ALL CHECKS ARE COMPLETE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Device Drivers

A

Computer Programs provided by OS to allow it to interact with hardware.
- Driver communicates request made by user to produce relevant output.
- They are specific to a computers architecture and the OS installed on the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Virtual Machines

A

Theoretical computers that is a software implementation of a computer.
Provides environment with the translator for intermediate code to run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Intermediate code

A

Lies between machine and object code, used to translate source code into machine code.
Independent of processor architecture and can be used across different machines.

17
Q

Uses of Virtual machines

A

Create a development environment for programmers to test programs on different OS.
- Saves time and money of having to purchase multiple devices. Intermediate code can also be slower than low level code designed for VM.

Protection from malware as the VM is affected instead of actual device.

Running incompatible software (programs specific of different OS can be run within VM saving time and money).

18
Q

Systems software

A

Low level software responsible for running computer system smoothly, interacting with hardware and providing platform for applications software to run.

19
Q

Applications software

A

Software designed to be used for one specific task, requires system software.

Examples: word processors, web browsers, spreadsheets, desktop publishing.

20
Q

Utilities

A

Key pieces of system software that ensure consistently high performance of OS. Each utility has a specific function linked to maintenance of OS
Examples:
Compression
Disk defragmentation
Antivirus
Automatic updates
Backup

21
Q

Types of utility

A

Compression: Used on files of large size. Reducing the size of a file.

Disk defragmentation: Rearranges contents of hardware so files can be accessed faster, improving performance.

Antivirus: Detects potential threats to the user, receiving threat and alerting user.

Automatic Updates: Ensure OS is kept up to date, updates occur when computer restarts. Tackle bugs and security flaws ensuring system is less vulnerable to malware.

Backup: Automatically creates routine copies of specific files selected by the user. Frequency of backup chosen by user. Files can be recovered in case of power failure or malicious attack.

22
Q

Source code

A

Object code before it has been compiled. Either open or closed.

23
Q

Open source

A

Can be used by anyone without a license, distributed with source code.

ADV: Can be modified and improved by anyone. Technical support from online community can be modified and sold on.

DISADV: Support online may be insufficient/incorrect. No user manuals. Lower security as not developed in a controlled environment.

24
Q

Closed Source

A

Requires user to hold a license to use it. Users cannot access source code as company owns copyright license.

ADV: Thorough, regular, well tested updates. Company providing software provides expert support and user manuals. High levels of security.

DISADV: License restricts how many people can use it. Users cannot modify and improve software themselves.