• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/118

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

118 Cards in this Set

  • Front
  • Back
A compiler allocates storage space and makes an entry in the symbol table when itencounters a(n) __________ in source code.
data declaration
A(n) __________ is produced as output during activities of the UP requirementsdiscipline.
system requirements model
A link editor searches an object code file for __________.
external function calls or unresolved references
A 4GL has a higher degree of __________ than a 3GL does.
instruction explosion
__________ code contains CPU instructions and external function calls.
Object
A(n) __________ produces a(n) __________ to show the location of functions ormethods in executable code.
link editor, memory map
The compiler adds the names of data items and program functions to the __________ asthey’re encountered in source code.
symbol table
A 2GL is translated into executable code by a(n) __________.
assembler
A(n) __________ translates an entire source code file before linking and execution. A(n)__________ interleaves translation, link editing, and execution.
compiler, interpreter
A Java __________ runs in the __________ of a Web browser.
applet, sandbox
__________ in source code instructions are translated into machine instructions toevaluate conditions or transfer control from one program module to another.
Control structures
A(n) __________ uses the symbol table’s contents to help programmers trace memorylocations to program variables and instructions.
symbolic debugger
FORTRAN, COBOL, and C are examples of __________.
third–generation languages or 3GLs
A(n) __________ tool supports system model development. A(n) __________ toolgenerates program source code from system models.
front–end CASE, back–end CASE
A link editor performs __________ linking. An interpreter performs __________ linking.
static, dynamic
Java programs are compiled into object code for a hypothetical hardware and OSenvironment called the __________.
JVM or Java Virtual Machine
Widely used scripting languages include __________, _________, and __________.
JavaScript, VBScript, PHP
A typical IDE includes an
–intelligent program editor, a
–compiler
–a link editor
–class
– an interactive tool for prototyping (JVM)
–symbolic debugger.
List two capabilities of a symbolic debugger
Shows break points


knows the addresses of symbols
What does a programming language define?
Converts machine lang
A(n) __________ OS supports multiple active processes or users.
multitasking
In virtual memory management, a memory page’s location is determined by searching a(n) __________.
page table
A(n) __________ occurs when a process or thread references a memory page not currently held inmemory.
page fault
Dispatching a thread moves it from the __________ state to the __________ state.
ready, running
The CPU periodically generates a(n) __________ to give the scheduler an opportunity to allocatethe CPU to another ready process.
timer interrupt
A(n) __________________ is an OS that enables dividing a single physical computer or clusterinto multiple virtual machines.
hypervisor
In the __________ scheduling method, threads are dispatched in order of their arrival.
FCFS
A(n) __________ process contains subunits that can be executed concurrently or simultaneously.
multithreaded
__________ scheduling guarantees that a thread receives enough resources to complete one__________ within a maximum time interval.
Real–time, thread cycle
Hardware resources consumed by an OS’s resource allocation functions are called __________.
system overhead
__________ scheduling refers to any type of scheduling in which a running thread can lose controlof the CPU to another thread.
Preemptive
The act of selecting a running thread and loading its register contents is called __________ and isperformed by the __________.
dispatching, scheduler
To achieve efficient use of memory and a large number of concurrently executing processes, mostOSs use __________ memory management.
virtual
When a thread makes an I/O service request, it’s placed in the __________ state until processingof the request is finished.
blocked
Memory pages not held in primary storage are held in the __________ of a secondary storagedevice.
swap space
On a computer with a single CPU, multitasking is achieved by __________ execution of multipleprocesses.
concurrent
With __________, all portions of a process must be loaded into sequential physical memorypartitions.
contiguous memory allocation
The __________, __________, and __________ are the main layers of an OS.
command layer, service layer, kernel
A(n) __________ is the unit of memory read from or written to the swap space.
page
A(n) __________ resource is apparent to a process or user, although it might not physically exist.
virtual
Under a(n) __________ memory allocation scheme, portions of a single process might bephysically located in scattered partitions of main memory.
noncontiguous
In virtual memory management, memory references by a process must be converted to an offset ina(n) __________.
page frame
Information about a process’s execution state, such as register values and process status, are storedin a(n) __________.
process control block or PCB
With the __________ scheduling method, threads requiring the least CPU time are dispatchedfirst.
shortest time remaining or STR
A(n) __________ causes the currently executing process to be __________ and control to bepassed to the __________.
interrupt, pushed, supervisor
The process of converting an address operand into a physical address in a memory partition orpage frame is called __________.
address resolution or address mapping
A(n) __________ is an executable subunit of a process that’s scheduled independently but sharesmemory and I/O resources.
thread
The __________ endian storage format places the __________ byte of a word in the lowestmemory address. The __________ endian storage format places the __________ byte of a word inthe lowest memory address.
big, most significant, little, least significant
In __________, program memory references correspond to physical memory locations. In__________, the CPU must calculate the physical memory location that corresponds to a programmemory reference.
absolute addressing, indirect (or relative) addressing
In indirect addressing, the content of a(n) __________ is added to calculate the correspondingphysical memory address.
offset register
Describe the role of an operating system
Gui for the user
List the three states of an active thread.
Ready, Running, Blocked
What are two goals of multitasking memory allocation?
preventing programs from interference


preventing a system crash
What is the difference between big endian and little endian?
big – stores the most significant byte 1st


little – stores the least significant byte 1st
A(n) __________ is the unit of file I/O accessed by an application program as a single unit. A(n)__________ is the unit of storage transferred between the device controller and memory in a file I/O operation.
logical record, physical record
The term ___________ describes the ratio of logical records to physical records.
blocking factor
A(n) __________ operation releases allocated buffers and flushes their content to secondarystorage.
file close
A(n) __________ operation allocates buffers for file I/O and updates a table of files in use.
file open
The content of a logically, but not physically, deleted file can be recovered in a(n) __________operation.
undelete
__________ describes tracking old file versions and moving them to archival and offline storagedevices.
File migration
In __________, changes to files are written to a log file as they’re made.
transaction logging
In an FMS, the __________ layer processes service calls from the command layer or applicationprogram. The __________ layer manages movement of data between storage devices and memory.
file control, storage I/O control
A(n) __________ specifies all directories leading to a specific file. A(n) __________ specifies filelocation based on the current or working directory.
complete path, relative path
In a(n) __________ directory structure, a file can be located in only one directory. This restrictiondoesn’t apply in a(n) __________ directory structure.
hierarchical or tree, graph
MS–DOS and some Windows versions record storage allocation information in the __________file system.
File Allocation Table or FAT
An FMS can implement __________ with disk mirroring or __________.
fault tolerance, RAID
A(n) __________ records the assignment of storage locations to files.
storage allocation table
When an old version of a master file is saved, the current version can be called the __________,the previous version is the __________, and the version before that is the __________.
child, parent, grandparent
RAID 10 combines disk mirroring and __________ to achieve fault tolerance and improveperformance.
data striping
In a(n) __________, multiple servers share access to the same storage server over a high–speeddedicated network.
storage area network or SAN
In __________, a storage server manages one or more file systems and responds to file I/Orequests sent across a LAN or WAN.
network–attached storage or NAS
Describe how secondary storage devices store bits, bytes, and blocks.
This is determined by the allocation size. When a file is stored, the OS determines how many "blocks" it will need to store the file. Typically the smaller the allocation size the better performance . However if you are storing large files you need to adjust your allocation size.
__________ architecture divides an application into multiple processes, some of which sendrequests, some of which respond to requests, and others that do both.
Client/server
System software that connects parts of a distributed application or enables users to locate andinteract with remote resources is called __________.
middleware
A(n) __________ is a process that sends a request. A(n) __________ is a process that responds torequests.
client, server
A server process creates a(n) __________ that allows clients to send data or messages via a sharedfilename.
named pipe
With the __________ protocol, a process on one machine can call a process on another machine asa subroutine with parameters passed in either or both directions.
RPC or Remote Procedure Call
Three–layer architecture divides an application into __________, __________, and __________layers.
view, business logic, data
A(n) __________ to a remote resource must be initialized by the user or a system administrator.
static connection
__________ is the original Internet e–mail standard. More recent e–mail standards include__________ and __________.
Simple Mail Transfer Protocol or SMTP, Post Office Protocol 3 or POP3, Internet Message AccessProtocol 4 or IMAP4
The __________ is a global collection of networks that are interconnected with TCP/IP.
Internet
Web pages are encoded in __________ and delivered from a Web server to a Web browser via__________.
HTML or XML, Hypertext Transfer Protocol or HTTP
The __________ standard defines methods for embedding graphics and other nontext data in e–mail messages and Web pages.
Multipurpose Internet Mail Extensions or MIME
The __________ is a collection of resources that can be accessed over the Internet by standardprotocols, such as FTP and HTTP.
World Wide Web, Web, or WWW
__________ is a family of component infrastructure and interoperability standards supported byMicrosoft.
COM+
__________ defines a standard for describing and accessing directories of users and distributedresources.
Lightweight Directory Access Protocol or LDAP
A(n) __________ contains a protocol, an Internet host, an optional socket, and a resource path.
Uniform Resource Locator or URL
__________ is a wide–ranging standard covering network directory services, file–sharing services,RPC, remote thread execution, system security, and distributed resource management.
Distributed Computing Environment or DCE
With the __________ protocol, a client can interact with a remote computer’s command layer asthough it were a directly connected VDT.
Telnet
A(n) __________ is a standardized, interchangeable, and executable software module that has aunique identifier and a well–known interface.
component
__________ is a family of component infrastructure and interoperability standards supported by abroad consortium of computer companies.
Common Object Request Broker Architecture or CORBA
The set of software layers for implementing network I/O and services is called a(n) __________.
protocol stack
Web/business tier components of the Java EE distributed application architecture include__________, __________, and __________.
JavaServer Pages or JSP, Java servlets, Enterprise JavaBeans or EJBs
__________ is a secure version of HTTP that encrypts HTTP requests and responses.
Hypertext Transfer Protocol Secure or HTTPS
__________ is an improved version of Telnet that encrypts data flowing between client andserver.
Secure Shell or SSH
A(n) __________ is a shared memory region that enables multiple processes executing on thesame machine to exchange messages.
pipe
____________ describes a cloud computing model in which users install their own applications onvendor–supplied hardware with vendor–supplied system software.
PaaS or platform as a service
____________ describes a cloud computing model in which users access vendor–owned software,running on vendor–owned hardware and system software, via the Internet.
SaaS or software as a service
What happens when a resource access request is sent to the local resource locator?
It attempts to find the resource by using registry and if it has no success it reaches out to a external resource.
Why are some organizations unwilling to embrace SaaS fully?
They would be storing potentially sensitive data on someone else servers. if the organizations files get compromised it would be their fault because they placed their security in the hands of someone else.
__________ are expected to provide service over a period of years.
Capital resources
__________ is the process of determining or verifying the identity of a user or process owner.
Authentication
__________ is the process of determining whether an authenticated user or process has enoughrights to access a resource.
Authorization
The term __________ usually refers only to creating and managing records of user activity orresource access.
auditing
A(n) __________ accepts service requests from an untrusted network and relays the requests tothe appropriate servers.
application firewall
Because IS resources can be considered __________, service standards and costs for operation,maintenance, and improvement are important components of the IS strategic plan.
infrastructure
A(n) __________ is a formal (legal) document that solicits bids from hardware and softwarevendors.
request for proposal or RFP
A(n) __________ is a program or program fragment that infects a computer by installing itselfpermanently, performing malicious acts, and replicating and spreading itself by using services of the infected computer.
virus
A(n) __________ detects and reports processing or I/O activity.
monitor
Opportunities to use IS resources for a __________ might be missed if these resources aremanaged only as infrastructure.
competitive advantage
A(n) __________ provides auxiliary power during blackouts and can notify the OS when it’sactivated.
uninterruptible power supply or UPS
Computer hardware must be protected against __________ and __________ in electrical power.
surges, sags
A(n) __________ tracks the progress of complex client/server interactions and blocks packets thatdon’t conform to normal activity patterns.
stateful firewall
A(n) __________ is a hardware device, software, or a combination of hardware and software thatprevents unauthorized users in one network from accessing resources in another network.
firewall
Long–range acquisition of hardware and software should be made in the context of an overall__________ for the organization.
strategic plan
16. The resource demands of an existing application program can be measured with a(n) __________.
program profiler
What, at a minimum, should goals for a strategic plan include?
What services will be provided?


How will users be charged?


What infrastructure is required to provide services?


How can the infrastructure be operated, maintained, and improved at minimal cost?
List three common capabilities of antivirus software.
Scan files and foldersPrevent downloadswarnings about out of date software