• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/72

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

72 Cards in this Set

  • Front
  • Back
Deadlock
A problem occurring when the resources needed by some jobs to finish execution are held by other jobs, which in turn are waiting for other resources to become available. This problem completes when the remainder of the system comes to a standstill
Batch
a type of system developed for the earliest computer systems that used punch cards or tape from input.
interactive system
a system that allows each user to interact directly with the operating system via commands entered from a keyboard.
real-time system
the computing system used in time-critical enviroments that require guaranteed response times, such as navigation systems, rapid transit systems, and industrial control systems.
Locking
a technique used to guarantee the integrity of the data in a database through which the user locks out all other users while working with the database
Spooling
a technique developed to speed I/O by collecting in a disk file either input received from slow input devices or output going to slow output devices such as printers.
Mutual Exclusion
one of four conditions for deadlock in which only one process is allowed to have access to a resource. It is typically shortened to mutex in algorithms describing synchronization between processes.
Circular Wait
one of four conditions for deadlock through which each process involved is waiting for a resource being held by another; each process is blocked and can't continue, resulting in deadlock.
Prevention
a design strategy for an operating system where resources are managed in such a way that some of the necessary conditions for deadlock do not hold.
Avoidance
A strategy for deadlock avoidance. It is a dynamic strategy, attempting to ensure that resources are never allocated in such a way as to place a system in an unsafe state.
Starvation
the result of conservative allocation of resources in which a single job is prevented from execution because it is kept waiting for resources that never become available.
Master/Slave Configuration
an asymmetric multiprocessing configuration consisting of a single processor system connected to slave processors, each of which is managed by the primary master processor, which provides the scheduling functions and jobs.
Loosely coupled configuration
a multiprocessing configuration in which each processor has a copy of the operating system and controls its own resources.
Symmetric configuration
a multi-processing configuration in which processor scheduling is decentralized and each processor is of the same type. A single copy of the operating system and a global table listing each process and its status is stored in a common area of memory so every processor has access to it. Each processor uses the same scheduling algorithm to select which process it will run next.
Test-and-Set
an indivisible machine instruction known simply as TS, which is executed in a single machine cycle to determine whether the processor is available.
Wait and Signal
a modification of the test-and-set synchronization mechanism that is designed to remove busy waiting.
Readers and Writers
A problem that arises when two types of processes need to access a shared resource such as a file or a database. Their access must be controlled to preserve data integrity.
Dedicated Devices
a device that can be assigned to only one job at a time; it serves that job for the entire time the job is active.
Shared Device
a device that can be assigned to several active processes at the same time.
Virtual Device
a dedicated device that has been transformed into a shared device through the use of spooling techniques.
Interrupts
a hardware signal that suspends execution of a program and activates the execution of a special program known as the interrupt handler. It breaks the normal flow of the program being executed.
Buffers
the temporary storage areas residing in main memory, channels, and control units. They are used to store data read from an input device before it is needed by the processor and to store data that will be written to an output device.
I/O Traffic Controller
one of the modules of the I/O subsystem that monitors the status of every device, control unit, and channel.
F.C.F.S
the simplest scheduling algorithm for direct access storage devices that satisfies track requests in the order in which they are received.
S.S.T.F
a scheduling strategy for direct access storage devices that is used to optimize seek time. The track requests are ordered so the one closest to the currently active track is satisfied first and the ones farthest away are made to wait.
SCAN
a scheduling strategy for direct access storage devices that is used to optimize seek time.
C-SCAN
a scheduling strategy for direct access storage devices that is used to optimize seek time.
Field
A group of related bytes that can be identified by the user with a name, type, and size.
File
a group of related records that contains information to be used by specific application programs to generate reports.
Database
a group of related files that are interconnected at various levels to give users flexibility of access to the data stored.
Directory
a logical storage unit that contains files.
Volume
any secondary storage unit, such as hard disks, or tapes.
Sub-Directory
a directory created by the user within the boundaries of an existing directory. Some operating systems call this a folder.
Non-Contiguous Storage
a type of file storage in which the information is stored in nonadjacent locations in a storage medium. Data records can be accessed directly by computing their relative addresses.
Data Compression
a procedure used to reduce the amount of space required to store data by reducing encoding or abbreviating repetitive terms or characters.
Device Allocation Deadlock
The use of a group of dedicated devices, such as a cluster of DVD read/write drives, can also deadlock the system.
Network Deadlocks
A congested network that has filled a large percentage of its I/O buffer space can become deadlocked if it doesn't have protocols to control the flow of messages through the network.
Disk Sharing Deadlock
An active type of deadlock known as a live-lock in which the ability to share a disk causes programs to never reach fulfillment.
4 conditions for Deadlock
mutual exclusion
resource holding
no pre-emption
circular wait
Deadlock Victim
an expendable job that is selected for removal from a deadlocked system to provide more resources to the waiting jobs and resolve the deadlock.
Parallel Processing
the process of operating two or more CPU's in parallel that is more than one CPU executing instructions simultaneously.
Multi Processing
when two or more CPUs share the same main memory, most I/O devices, and the same control program routines. They service the same job stream and execute distinct processing programs concurrently.
Process Manager
a composite of two submanagers, the job scheduler and the process scheduler. It decides how to allocate the cpu, monitors whether it is executing a process or waiting, and controls job entry to ensure balanced use of resources.
Role of Master Processor in a Master/Slave configuration
it maintains the status of all processes in the system performs storage management activities, schedules the work for the other processors, and executes all control programs.
Advantages of the Master/Slave configuration.
This configuration is well suited for computing environments in which processing time is divided between front-end and back-end processors
Disadvantages of the Master/Slave configuration.
- if the master fails, the entire system fails
- can lead to poor use of resources.
- increases the number of interrupts
Producers and Consumers
a classic problem in which a process produces data that will be consumed, or used, by another process. It exhibits the need for process cooperation.
States of Threads
1 Creation
2 Ready
3 Waiting
4 Delayed
5 Blocked
6 Running
7 Finished
USB Controller
acts as an interface between the operating system, device drivers, and applications and the devices that are attached via the USB host.
Transfer Rate
? = density of the tape X transport speed
Direct Access Storage Devices
devices that can read or write to a specific place. IE. magnetic disks, optical discs, and flash memory
Fixed Head
Much faster than movable head, disadvantage is the high cost and reduced storage space.
Movable Head
magnetic disks, such as computer hard drives, that have one read/write head that floats over each surface of each disk.
Cylinder
for a disk or disk pack it is when two or more read/write heads are positioned at the same track, at the same relative position, on their respective surfaces.
Pit
An indentation burnt onto the disc that represents a 0
Lands
Flat surfaces on an optical disc that represent 1's
Flash Memory
a nonvolatile removable medium that emulates random access memory, but unlike RAM, stores data securely even when it's removed from it power source.
Movable Head Access Times
Seek time (arm movement) +
search time (rotational delay) +
transfer time (data transfer) =
access time
Fixed Head Access Times
search time +
transfer time =
Access time
RAID 0
well suited to transferring large quantities of non-critical data. No error correction methods, excellent I/O request rate, Excellent Data transfer rate.
RAID 1
provides redundancy by having a duplicate set of all data in a mirror array of disks, which act as a backup system in the event of hardware failure.
RAID 5
Parity strips are distributed across all disks alleviating the bottleneck created in RAID 4. however regenerating data from a failed drive is far more complicated.
RAID 6
raid configuration that writes two parity strips for an extra degree of protection. However read/write functions are slower as a result.
File Manager
The software responsible for creating, deleting, modifying, and controlling access to files--as well as for managing the resources used by the files.
File manager responsibilities
1. Keep track of where each file is stored
2. Use a policy that will determine where and how the files will be stored making sure to efficiently use the available storage space and provide efficient acces to the files.
3. Allocate each file when a user has been cleared for access to it, then record its use.
4. Deallocate the file when the file is to be returned to storage, and communicate its availability to others who may be waiting for it.
Master File Directory
this is stored immediately after the volume descriptor and lists the names and characteristics of every file contained in that volume.
Volume Descriptor on DVD
an easy to access place on each unit; the innermost part of the CD or DVD, the beginning of the tape or the first sector of the outermost track of the disk pack. Once identified, the operating system can interact with the storage unit.
File extensions
a 3 digit extension at the end of a files name used to identify the type of files and their contents.
Sub directory
also known as a current directory or a working directory. This is the directory that the user is currently working in.
Types of File Storage
Files are usually declared to be either sequential or direct when they're created, so the file manager can select the most efficient method of storage allocation; contiguous for direct files and non-contiguouis for sequential.
File Management and the Device Driver
Each level of the file management system is implemented using structured heirarchy passing modules down to the lowest level where they interact with the device intended for use with the file.
Data Compression
These algorithms consist of two types; lossless algorithms typically used for text or arithmetic files, which retain all the data in the file throughout the compression-decompression process; and lossy algorithms, which are typically used for image and sound files and remove data permanently.