• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/93

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

93 Cards in this Set

  • Front
  • Back

hash map

In computing, a hash table (also hash map) is a data structure used to implement an associative array, a structure that can map keys to values.

host

a computer or other device connected to a computer network. A network host may offer information resources, services, and applications to users or othernodes on the network. A network host is a network node that is assigned a network layer host address.

host-standby mode

A method of redundancy in which the primary and secondary (i.e., backup) systems run simultaneously. The data is mirrored to the secondary server in real time so that both systems contain identical information.

interrupt driven

they start down the list of computer instruction s in one program (perhaps an application such as a word processor) and keep running the instructions until either (A) they can't go any further or (B) an interrupt signal is sensed. After the interrupt signal is sensed, the computer either resumes running the program it was running or begins running another program.

interrupt vector

is the memory location of an interrupt handler, which prioritizesinterrupts and saves them in a queue if more than one interrupt is waiting to be handled.

Amazon Elastic Compute Cloud ( EC2)

provides scalable computing capacity in the Amazon Web Services cloud

apple ios

an easy to use interface

Application Programs

Word processors, spreadsheets, compilers, and web browsers

application-specific integrated circuit (ASIC)-

a kind of integrated circuit that is specially built for a specific application or purpose.

Asymmetric Clustering-

one machine is in hot-standby mode while the other is running applications

Asymmetric Multiprocessing

each processor is assigned specific tasks by a "Master processor

balancing binary search tree

any node-based binary search tree that automatically keeps its height small in the face of arbitrary item insertions and deletions.

bit

basic unit of computer storage (0 or 1)

binary search tree

abinary tree where each node has a Comparable key and satisfies the restriction that the key in any node is larger than the keys in all nodes in that node's left subtree and smaller than the keys in all nodes in that node's right subtree

binary tree

a data structure in which a record is linked to two successor records, usually referred to as the left branch when greater and the right when less than the previous record.

bitmap

a representation in which each item corresponds to one or more bits of information, especially the information used to control the display of a computer screen


blade servers


multiple processor boards, I/O boards, and networking boards are placed in the same chassis

Bootstrap program

automatic procedure whereby basic OS is reloaded following a complete shutdown or loss of memory

BSD Unix

started in 1978 as a derivative of AT&T's unix

byte

8 bits, smallest convenient chunk of storage

Cache Coherency-

Makes sure that an update of a value of A in one cache is immediately reflected in all other caches where A resides


Cache Management-

-Makes sure that the cache size and replacement policy can result in greatly increased performance

Caching

storing data in a cache memory


Central Processing Unit (CPU)

Main Processor


client-server

denoting a computer system in which a central server provides data to a number of networked workstations.

Client System

A computer used to access the maestro HUB or LUI components

Closed-Source-

made available as compiled binary code

cloud computing


is a type of computing that delivers computing, storage , and even apps as a service across a network


Clustered System

composed of two or more individual systems or odes joined together over a LAN or faster interconnect (Infiniband)

Compute-Server System

provides an interface to which a client can send a request to perform an action

Computer Core

multiprocessor chips, can be more efficient than multiple chips with single cores because on-chip communication is faster than between-chip communication

Control Program-

manages the execution of user programs to prevent errors and improper use of the computer

copy protection-

is any effort designed to prevent the reproduction of software, films, music, and other media, usually for copyright reasons.

CPU Scheduling-

if several jobs are ready to run at the same time, the system must choose among them

Device Driver-

Understands device controller and presents a uniform interface to the device to the rest of the OS


digital rights management (DRM)

a class of technologies that are used by hardware manufacturers, publishers, copyright holders, and individuals with the intent to control the use of digital content and devices after sale



Direct Memory Access (DMA)-


When a device controller transfers an entire block of data from its own buffer storage to memory without CPU intervention



disk blocks


medium-sized disk drive might be divided into several thousand individual units



Distributions


system is a software system in which components located on networked computers communicate and coordinate their actions by passing messages.



Distributed Lock Manager-


to provide shared access to data, system must supply access control and locking to ensure that no conflicting operations occur



Dynamic random-


access memory(DRAM)-a type of random access memory that stores each bit of data in a separate capacitor within an integrated circuit.



Ease of Use

how convenient it is for a user to use a PC


-EEPROM


electrically erasable programmable read only memory



Effective User ID



-user id with extra privileges

Electronic Disk

-can be either volatile or nonvolatile, it stores data in large DRAM array


Escalate Privileges


changing privileges to gain extra permissions for an activity

Emulation

is hardware or software or both that duplicates the functions of one computer system in another computer system , different from the first one, so that the emulated behavior closely resembles the behavior of the real system



Fault Tolerant


-can suffer a failure of any single component and still continue operation




file-server system


-provides a file-system interface where clients can create, update, read and delete files



firewalls

protects the network from security breaches



firmware


same thing as EEPROm


Free Software Foundation (FSF)-

encourages the free exchange of software source code and the free use of software


files


are links or shortcuts to an executable located elsewhere on the Windows operating system.



FIFO(first in,first out)


-is an acronym for First In, First Out, a method for organizing and manipulating a data buffer, or data stack, where the oldest entry, or 'bottom' of the stack, is processed first.


GNU General Public License (GPL)-

codifies copylefting and is a common license under which free software is released. Requires that the source code by distributed with any binaries and that any changes made to the source code be released under the same GPL license



GNU/Linux


example of an open-source operating system (produced many UNIX-compatible tools, including compilers, editors, and utilities - never released a kernel)



Graceful Degradation


Ability to continue providing service proportional to the level of surviving hardware


Group ID-

group functionality that can be implemented as a system-wide list of group names

Hardware

-CPU, Memory, I/O devices which provide basic computing resources for the system

High-Availability Service


service continues even if one or more systems in the cluster fail


High-Performance computing

​supply significantly greater computational power than a single-processor or even SMP systems because they are capable of running an application concurrently on all computers in the cluster

Input/Output devices

-devices that are used to input to a computer (keyboard, mouse) or output (monitor)


Instruction Register

Used to hold the current instruction that is being executed

Interactive Computer


-provides direct communication between the user and the system


Job Pool

consists of all processes residing on disk awaiting allocation of main memory


Job Scheduling-

if several jobs are ready to be brought into memory and if there is not enough room for all of them - system must choose among them

Kernel

the one program running at all times on the computer


Kernel Mode

when a user application requests a service from the operation system

Local-Area Network (LAN)

connects computer within a room, a floor or building

Magnetic Disk

provides storage for both programs and data

Mainframe

-large and powerful data processing system



Memory

-Dynamic data storage unit



Minicomputer-

-Middle range of computing systems, between mainframes and PCs


Mode Bit-bit

added to the hardware of the computer to indicate the current mode: kernel(0) or user (1). Distinguishes between a task that is executed on behalf of the OS and one is that executed on behalf of the user



Multi-processor system


parallel systems that have more than one processor in close communication



Multiprogramming-

increases CPU utilization by organizing jobs (code and data) so that the cpu always has one to execute

Network

a communication path between two or more systems


Network operating system

OS that provides features such as file sharing across the network and includes a communication scheme that allows different processes on different computers to exchange messages


Non-Uniform Memory Access (NUMA)-


, in which some parts of memory take longer to access than other parts


Nonvolatile storage


storage that does not lose its contents when power is removed


NVRAM-nonvolatile storage which is DRAM with battery backup power

Open-Source operating systems

OS's made available in source-code format rather than as compiled binary code



Operating System


Program that manages computer hardware

Parallelization

consist of dividing a program into separate components that run in parallel on individual computers in the cluster

Privileged Instruction

A computer instruction that can be executed only by a supervisory program - can only be executed only in kernel mode


Process


a program loaded into memory and executing


Random Access Memory (RAM)

memory that is erased as soon as the computer is turned off


Read-only memory (ROM)

memory that cant be removed

Real-Time operating system-

an OS intended for real time applications --> almost always used in embedded systems


resource allocator

job of the operating system, allocates and manages hardware resources


Resource Utilization


-how various hardware and software resources are shared


Response Time-

-time it takes for the computer to give results

Protection-

any mechanism for controlling the access of processes or users to the resource defined by a computer system

Interrupt

signal sent from hardware or software to CPU to transfer execution to some other instructions