Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
87 Cards in this Set
- Front
- Back
Program that manages the computer hardware. Also provides a basis for application programs and acts as an intermediary between the computer user and computer hardware.
|
Operating System
|
|
Central processing unit (CPU), the memory, and the input/output (I/O) devices
|
Hardware
|
|
Word processors, spreadsheets, compilers, and web browsers
|
Application Programs
|
|
A system designed for one user to monopolize its resources and maximize the work the user is performing.
|
Ease of Use
|
|
How various hardware and software resources are shared.
|
Resource Utilization
|
|
A role of the OS, that manages CPU time, memory space, file-storage space, I/O devices, ...
|
Resource Allocator
|
|
Manages the execution of user programs to prevent errors and improper use of the computer.
|
Control Program
|
|
Basic unit of computer storage. Can contain 0 or 1.
|
Bit
|
|
8 bits, often the smallest convenient chunk of storage
|
Byte
|
|
A given computer architecture's native storage unit.
|
Word
|
|
The one program running at all times on the computer.
|
Kernel
|
|
Programs associated with the operating system but are not part of the kernel.
|
System Programs
|
|
All programs not associated with the operation of the system.
|
Application Programs
|
|
Initial program to run typically stored in read only memory (ROM) or electrically erasable programmable read-only memory
|
bootstrap program
|
|
Signals the occurrence of an event
|
Interrupt
|
|
A special operation for software to trigger an interrupt
|
System Call (Monitor Call)
|
|
Rewritable Memory, also called Main memory
|
random-access memory (RAM)
|
|
A semiconductor technology used to implement main memory
|
dynamic random-access memory (DRAM)
|
|
Architecture where an instruction execution cycle consists of first fetching the instruction from memory, storing it in the instruction register, and then decoded.
|
von Neumann
|
|
The area where instructions are stored to be executed in a von Neumann architecture
|
instruction register
|
|
An extension of main memory that is able to hold large quantities of data permanently.
|
Secondary Storage
|
|
Most common secondary-storage device which provides storage for both programs and data.
|
Magnetic Disk
|
|
Storage that loses its contents when the power to the device is removed.
|
Volatile Storage
|
|
DRAM with battery backup power.
|
NVRAM
|
|
Understands the device controller and presents a uniform interface to the device to the rest of the operating system.
|
Device Driver
|
|
The direct transfer of an entire block of data from a device to the memory, with no intervention by the CPU
|
Direct Memory Access (DMA)
|
|
The ability to continue providing service proportional to the level of surviving hardware
|
Graceful Degradation.
|
|
Systems that can suffer a failure of any single component and still continue operation
|
Fault Tolerant
|
|
System in which multi-processor systems assign specific tasks to each processor. This is done by a master processor.
|
Asymmetric multiprocessing
|
|
Each processor performs all tasks within the operating system.
|
Symmetric multiprocessing (SMP)
|
|
The situation in which access to any RAM from any CPU takes the same amount of time.
|
Uniform Memory Access (UMA)
|
|
Multiple processor boards, I/O boards, and networking boards are placed in the same chassis.
|
Blade Servers
|
|
System that gathers together multiple CPUs to accomplish computation work, typically sharing storage and linked via a local-area network.
|
Clustered System
|
|
A service that will continue even if one or more systems in the cluster fail. Generally achieved with a level of redundancy.
|
High-Availability
|
|
Clustering where one machine is in hot-standby mode while the other is running the applications.
|
Asymmetric Clustering
|
|
Clustering where two or more hosts are running applications and are monitoring each other
|
Symmetric Mode
|
|
A machine that does nothing but monitor the active server, and becomes the active server if the server fails.
|
Hot-Standby Mode
|
|
Technique which consists of dividing a program into separate components that run concurrently on individual computers in the cluster
|
Parallelization
|
|
Software that tracks access to a shared disk that controls access and prevents conflicting operations from occurring .
|
Distributed Lock Manager (DLM)
|
|
The organizing of jobs (code and data) so that the CPU always has one to execute, increasing CPU utilization.
|
Multiprogramming
|
|
The CPU executes multiple jobs by switching among them, but the switches occur so frequently that the users can interact with each program while it is running.
|
Time Sharing (Multitasking)
|
|
A mean of communication (such as keyboard or mouse) that provides direct communication between the user and the system.
|
Interactive Computer System
|
|
The process where the system must choose among several jobs to allocate into memory if there is not enough room for all of them.
|
Job Scheduling
|
|
The process where the system must choose among several jobs to run.
|
CPU Scheduling
|
|
The process where processes are moved in and out of main memory to the disk.
|
Swapping
|
|
A technique that allows the execution of a process that is not completely in memory. Allows users to run programs that are larger than actual physical memory.
|
Virtual Memory
|
|
A software-generated interrupt caused either by an error or by a specific request from a user program that an operating-system service be performed.
|
Trap (exception)
|
|
The mode where the computer system is executing on behalf of a user application
|
User Mode
|
|
The mode where services from the operating systems and privileged instructions can be executed.
|
Kernel Mode (Supervisor Mode, System Mode, or Privileged Mode)
|
|
A bit added to the hardware of the computer to indicated the current mode .
|
Mode Bit
|
|
Instructions that can only be executed in kernel mode.
|
Privileged instructions
|
|
A tool to interrupt the computer after a specified period.
|
Timer
|
|
A timer implemented by a fixed-rate clock and a counter.
|
Variable Timer
|
|
A logical storage unit abstracted from the physical properties of its storage devices.
|
File
|
|
Storage based on CD and DVD disks
|
Tertiary Storage
|
|
The copying of information from the main memory to a faster storage system on a temporary basis.
|
Caching
|
|
The careful selection of cache size and a replacement policy.
|
Cache Management
|
|
Electronic RAM disks
|
Solid-State Disks
|
|
Maintaining consistency of values across caches in a multiprocessor environment.
|
Cache Coherency
|
|
Numerical unique IDs to distinguish between users
|
User Identifiers (user IDs) or Security ID (SID) in Windows
|
|
A method to allow users to run a restricted application based on the permissions of another user.
|
Escalate Privileges
|
|
The ID a process runs under when a user escalates privileges.
|
effective UID
|
|
A communication path between two or more systems.
|
Network
|
|
A network that connects computers within a room, floor, or building.
|
Local Area Network (LAN)
|
|
Network that usually links buildings, cities, or countries.
|
Wide Area Network (WAN)
|
|
A network that could link buildings within a city.
|
Metropolitan Area Network (MAN)
|
|
A network using wireless technologies to communicate over a distance of several feet.
|
Small Area Network
|
|
An operating system that provides features such as file sharing across the network and includes a communication scheme that allows different processes on different computers to exchange messages.
|
Network Operating System
|
|
Hardware devices with circuits that perform their tasks without an operating system.
|
Application Specific Integrated Circuits (ASICs)
|
|
Operating systems with rigid time requirements, often used as a control device in a dedicated application.
|
Real-time Operating Systems
|
|
The displaying of only a small subset of a Webpage to a handheld device.
|
Web Clipping
|
|
Provide web accessibility to internal servers.
|
Portals
|
|
Terminals that understand Web-based computing.
|
Network Computers
|
|
Systems that satisfy requests generated by client systems.
|
Server Systems
|
|
A system where a client can send a request to perform an action. The server executes the action and sends back results to the client.
|
Computer-Server System
|
|
A file system interface where clients can create, update, read, and delete files.
|
File-Server System
|
|
Devices which distribute network connections among a pool of similar servers.
|
Load Balancers
|
|
Operating systems that are made available in source-code format rather than as compiled binary code.
|
Open-source operating systems
|
|
Staring from binary code, and trying to produce source code
|
Reverse engineering
|
|
Copy protection to limit the ability to play back movies and music
|
Digital Rights Management (DRM)
|
|
Foundation with the goal of encouraging the free exchange of software source code and the free use of that software.
|
Free Software Foundation (FSF)
|
|
Common copyleft license under which free software is released.
|
GNU General Public License (GPL)
|
|
Custom builds of a system.
|
Distribution
|
|
Operating System that can be booted and run from a CD-ROM.
|
LiveCD
|
|
A longer and more complicated history than Linux, started as a derivative of AT&T's Linux.
|
BSD UNIX
|
|
Open source operating system that originated in 1991, when a student released a rudimentary kernel.
|
GNU Linux
|
|
Commercial UNIX-based operating system of Sun Microsystems. (Now Oracle).
|
Solaris
|