Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
93 Cards in this Set
- Front
- Back
hash map |
In computing, a hash table (also hash map) is a data structure used to implement an associative array, a structure that can map keys to values. |
|
host |
a computer or other device connected to a computer network. A network host may offer information resources, services, and applications to users or othernodes on the network. A network host is a network node that is assigned a network layer host address. |
|
host-standby mode |
A method of redundancy in which the primary and secondary (i.e., backup) systems run simultaneously. The data is mirrored to the secondary server in real time so that both systems contain identical information. |
|
interrupt driven |
they start down the list of computer instruction s in one program (perhaps an application such as a word processor) and keep running the instructions until either (A) they can't go any further or (B) an interrupt signal is sensed. After the interrupt signal is sensed, the computer either resumes running the program it was running or begins running another program. |
|
interrupt vector |
is the memory location of an interrupt handler, which prioritizesinterrupts and saves them in a queue if more than one interrupt is waiting to be handled. |
|
Amazon Elastic Compute Cloud ( EC2) |
provides scalable computing capacity in the Amazon Web Services cloud |
|
apple ios |
an easy to use interface |
|
Application Programs |
Word processors, spreadsheets, compilers, and web browsers |
|
application-specific integrated circuit (ASIC)- |
a kind of integrated circuit that is specially built for a specific application or purpose. |
|
Asymmetric Clustering- |
one machine is in hot-standby mode while the other is running applications |
|
Asymmetric Multiprocessing |
each processor is assigned specific tasks by a "Master processor |
|
balancing binary search tree |
any node-based binary search tree that automatically keeps its height small in the face of arbitrary item insertions and deletions. |
|
bit |
basic unit of computer storage (0 or 1) |
|
binary search tree |
abinary tree where each node has a Comparable key and satisfies the restriction that the key in any node is larger than the keys in all nodes in that node's left subtree and smaller than the keys in all nodes in that node's right subtree |
|
binary tree |
a data structure in which a record is linked to two successor records, usually referred to as the left branch when greater and the right when less than the previous record. |
|
bitmap |
a representation in which each item corresponds to one or more bits of information, especially the information used to control the display of a computer screen |
|
blade servers |
multiple processor boards, I/O boards, and networking boards are placed in the same chassis |
|
Bootstrap program |
automatic procedure whereby basic OS is reloaded following a complete shutdown or loss of memory |
|
BSD Unix |
started in 1978 as a derivative of AT&T's unix |
|
byte |
8 bits, smallest convenient chunk of storage |
|
Cache Coherency- |
Makes sure that an update of a value of A in one cache is immediately reflected in all other caches where A resides
|
|
Cache Management- |
-Makes sure that the cache size and replacement policy can result in greatly increased performance |
|
Caching |
storing data in a cache memory |
|
Central Processing Unit (CPU) |
Main Processor
|
|
client-server |
denoting a computer system in which a central server provides data to a number of networked workstations. |
|
Client System |
A computer used to access the maestro HUB or LUI components |
|
Closed-Source- |
made available as compiled binary code |
|
cloud computing
|
is a type of computing that delivers computing, storage , and even apps as a service across a network
|
|
Clustered System |
composed of two or more individual systems or odes joined together over a LAN or faster interconnect (Infiniband) |
|
Compute-Server System |
provides an interface to which a client can send a request to perform an action |
|
Computer Core |
multiprocessor chips, can be more efficient than multiple chips with single cores because on-chip communication is faster than between-chip communication |
|
Control Program- |
manages the execution of user programs to prevent errors and improper use of the computer |
|
copy protection- |
is any effort designed to prevent the reproduction of software, films, music, and other media, usually for copyright reasons. |
|
CPU Scheduling- |
if several jobs are ready to run at the same time, the system must choose among them |
|
Device Driver- |
Understands device controller and presents a uniform interface to the device to the rest of the OS |
|
digital rights management (DRM) |
a class of technologies that are used by hardware manufacturers, publishers, copyright holders, and individuals with the intent to control the use of digital content and devices after sale
|
|
Direct Memory Access (DMA)- |
When a device controller transfers an entire block of data from its own buffer storage to memory without CPU intervention
|
|
disk blocks |
medium-sized disk drive might be divided into several thousand individual units
|
|
Distributions |
system is a software system in which components located on networked computers communicate and coordinate their actions by passing messages.
|
|
Distributed Lock Manager- |
to provide shared access to data, system must supply access control and locking to ensure that no conflicting operations occur
|
|
Dynamic random- |
access memory(DRAM)-a type of random access memory that stores each bit of data in a separate capacitor within an integrated circuit.
|
|
Ease of Use |
how convenient it is for a user to use a PC
|
|
-EEPROM |
electrically erasable programmable read only memory
|
|
Effective User ID
|
-user id with extra privileges |
|
Electronic Disk |
-can be either volatile or nonvolatile, it stores data in large DRAM array
|
|
Escalate Privileges |
changing privileges to gain extra permissions for an activity |
|
Emulation |
is hardware or software or both that duplicates the functions of one computer system in another computer system , different from the first one, so that the emulated behavior closely resembles the behavior of the real system
|
|
Fault Tolerant |
-can suffer a failure of any single component and still continue operation
|
|
file-server system |
-provides a file-system interface where clients can create, update, read and delete files
|
|
firewalls |
protects the network from security breaches
|
|
firmware |
same thing as EEPROm |
|
Free Software Foundation (FSF)- |
encourages the free exchange of software source code and the free use of software |
|
files |
are links or shortcuts to an executable located elsewhere on the Windows operating system.
|
|
FIFO(first in,first out) |
-is an acronym for First In, First Out, a method for organizing and manipulating a data buffer, or data stack, where the oldest entry, or 'bottom' of the stack, is processed first.
|
|
GNU General Public License (GPL)- |
codifies copylefting and is a common license under which free software is released. Requires that the source code by distributed with any binaries and that any changes made to the source code be released under the same GPL license
|
|
GNU/Linux |
example of an open-source operating system (produced many UNIX-compatible tools, including compilers, editors, and utilities - never released a kernel)
|
|
Graceful Degradation |
Ability to continue providing service proportional to the level of surviving hardware
|
|
Group ID- |
group functionality that can be implemented as a system-wide list of group names |
|
Hardware |
-CPU, Memory, I/O devices which provide basic computing resources for the system |
|
High-Availability Service |
service continues even if one or more systems in the cluster fail
|
|
High-Performance computing |
supply significantly greater computational power than a single-processor or even SMP systems because they are capable of running an application concurrently on all computers in the cluster |
|
Input/Output devices |
-devices that are used to input to a computer (keyboard, mouse) or output (monitor) |
|
Instruction Register |
Used to hold the current instruction that is being executed |
|
Interactive Computer
|
-provides direct communication between the user and the system
|
|
Job Pool |
consists of all processes residing on disk awaiting allocation of main memory
|
|
Job Scheduling- |
if several jobs are ready to be brought into memory and if there is not enough room for all of them - system must choose among them |
|
Kernel |
the one program running at all times on the computer
|
|
Kernel Mode |
when a user application requests a service from the operation system |
|
Local-Area Network (LAN) |
connects computer within a room, a floor or building |
|
Magnetic Disk |
provides storage for both programs and data |
|
Mainframe |
-large and powerful data processing system
|
|
Memory |
-Dynamic data storage unit
|
|
Minicomputer- |
-Middle range of computing systems, between mainframes and PCs
|
|
Mode Bit-bit |
added to the hardware of the computer to indicate the current mode: kernel(0) or user (1). Distinguishes between a task that is executed on behalf of the OS and one is that executed on behalf of the user
|
|
Multi-processor system |
parallel systems that have more than one processor in close communication
|
|
Multiprogramming- |
increases CPU utilization by organizing jobs (code and data) so that the cpu always has one to execute |
|
Network |
a communication path between two or more systems |
|
Network operating system |
OS that provides features such as file sharing across the network and includes a communication scheme that allows different processes on different computers to exchange messages |
|
Non-Uniform Memory Access (NUMA)- |
, in which some parts of memory take longer to access than other parts |
|
Nonvolatile storage |
storage that does not lose its contents when power is removed NVRAM-nonvolatile storage which is DRAM with battery backup power |
|
Open-Source operating systems |
OS's made available in source-code format rather than as compiled binary code
|
|
Operating System |
Program that manages computer hardware |
|
Parallelization |
consist of dividing a program into separate components that run in parallel on individual computers in the cluster |
|
Privileged Instruction |
A computer instruction that can be executed only by a supervisory program - can only be executed only in kernel mode
|
|
Process |
a program loaded into memory and executing
|
|
Random Access Memory (RAM) |
memory that is erased as soon as the computer is turned off |
|
Read-only memory (ROM) |
memory that cant be removed |
|
Real-Time operating system- |
an OS intended for real time applications --> almost always used in embedded systems
|
|
resource allocator |
job of the operating system, allocates and manages hardware resources
|
|
Resource Utilization |
-how various hardware and software resources are shared
|
|
Response Time- |
-time it takes for the computer to give results |
|
Protection- |
any mechanism for controlling the access of processes or users to the resource defined by a computer system |
|
Interrupt |
signal sent from hardware or software to CPU to transfer execution to some other instructions |