Quiz 2

0.0(0)
studied byStudied by 12 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/88

flashcard set

Earn XP

Description and Tags

Modules 2 and 3

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

89 Terms

1
New cards

Operating System Architecture

Describes how operating systems interact with hardware and users, with layers including hardware, operating system, application software, and user interface.

2
New cards

Processor Architecture

Refers to specific architectures like X86, Itanium, and AMD, which the operating system is designed for, requiring architecture-dependent code.

3
New cards

Device Drivers

Software components that enable the operating system to communicate with hardware devices like managing memory and network.

4
New cards

Kernel

The memory-resident core of the operating system that manages processes, interacts with hardware, and supports user applications.

5
New cards

Privileged Levels

Hierarchical levels of privilege in an operating system, with the kernel at the highest level, followed by drivers, the shell, and application programs.

6
New cards

Process

The unit of work in an operating system, consisting of an executable file and associated resources, which can be further divided into threads.

7
New cards

Threads

Subunits of a process that can run independently but share resources with the parent process, allowing for concurrent execution on CPUs.

8
New cards

Process ID

A unique identifier for each process used by the operating system to track and manage processes and threads.

9
New cards

Multicore CPU

A CPU with multiple cores that can run threads from the same process concurrently, improving performance by utilizing multiple cores efficiently.

10
New cards

Multi-threaded process

Involves having multiple processes with multiple threads per thread to take advantage of multi-core CPUs.

11
New cards

CPU (Central Processing Unit)

The primary component of a computer responsible for actual processing, typically consisting of multiple components.

12
New cards

Moore's Law

A prediction by Intel's co-founder Gordon Moore that the number of transistors on a chip will double approximately every two years, leading to increased computing capacity.

13
New cards

Silicon

The underlying substrate material used to create CPUs and other computational units, with current manufacturing processes approaching physical limits.

14
New cards

Cache

Storage within a CPU where data and applications to be executed next are stored, with modern CPUs utilizing multiple layers of cache.

15
New cards

Intel Architecture

Common personal computer architecture also popular on the server side, known for its cost efficiency and interaction with system memory.

16
New cards

Multi-core architecture

Involves CPUs with multiple cores, each core acting as a "brain" with unique cache, enabling parallel processing and increased efficiency.

17
New cards

Multi-core processing

Utilizing multiple CPU cores with shared caches and memory subsystems for enhanced computing capability.

18
New cards

Cache hierarchy

Involves level one, level two, and shared level three caches across multiple CPU cores to store instructions and data for efficient processing.

19
New cards

Memory controller

Manages the flow of data between the CPU and memory, with DDR being the current standard for memory.

20
New cards

Virtualization

Understanding CPU architecture to create virtual systems, essential for building cloud infrastructure.

21
New cards

Chiplets

Small components assembled together to form a single device, allowing for cost-effective manufacturing and improved CPU capabilities.

22
New cards

Quantum computing

Utilizing qubits that can exist in multiple states simultaneously for parallel processing, potentially the future beyond silicon-based computing.

23
New cards

Spintronics

Representing digital bits by switching between two different states based on the spin of electrons, offering new capabilities in computing.

24
New cards

Operating system components

Kernel, processes, threads, and CPU cores play crucial roles in executing applications across different devices and architectures.

25
New cards

Network Architecture

The design and structure of a network, including components like backboard networks and virtual networks.

26
New cards

Backboard Networks

Networks that connect different parts of an enterprise in one physical location, facilitating communication and data transfer.

27
New cards

Virtual Networks

Networks independent of physical wiring, allowing for reconfiguration using software and enhancing flexibility.

28
New cards

TCP/IP

Transmission Control Protocol/Internet Protocol, fundamental for network communication, and OSI models, essential for network design.

29
New cards

Reliable Data Movement

Ensuring efficient and secure transfer of data packets from a source to a destination, complying with organizational security policies.

30
New cards

Types of Networks

Categorized based on geographic span into Local Area Networks (LANs), Metropolitan Area Networks (MANs), and Wide Area Networks (WANs).

31
New cards

Internetwork

Interconnected networks forming a larger network, exemplified by the Internet, a global network of networks.

32
New cards

Internet Ownership

The Internet is not collectively owned but comprises networks owned by various entities, connected by Internet Service Providers (ISPs).

33
New cards

Backbone Network

High-speed network connecting local area networks within an organization, facilitating communication within the enterprise and beyond.

34
New cards

Wide Area Networks

Networks that connect far-flung locations of an enterprise.

35
New cards

Third Party Service Provider

A provider that offers wide area network services, similar to an Internet service provider.

36
New cards

Ethernet

A dominant technology for backboard networks, capable of running at various speeds like one gigabit per second, ten gigabit per second, or 40 gigabit per second.

37
New cards

Fiber Optic Cable

Utilized for higher capacity networks, removing distance constraints compared to copper wiring.

38
New cards

Backbone Network

High-speed connectivity in data centers connecting shared systems like servers, application servers, web servers, and database servers.

39
New cards

Switch

Device that connects computers into a network, commonly used in local area networks.

40
New cards

Router

Device that connects multiple local area networks together, used in larger networks.

41
New cards

Gateway

Router used to connect a network to another network owned by a different entity.

42
New cards

Routed Backbone

Moves data based on the network layer address (IP address) using Ethernet connectivity.

43
New cards

Virtual LAN (VLAN)

Assigns computers to LAN segments using software, dissociating physical layout from logical data flow.

44
New cards

Layer 2 Switch

Uses the data link layer or physical address to move data.

45
New cards

Layer 3 Switch

Uses the IP address to move data.

46
New cards

Triple IEEE 802.1Q

Standard for VLANs, specifying designs for single or multiple switch virtual LANs.

47
New cards

Port-Based VLAN

Assigns computers to LAN segments based on physical port numbers on the switch.

48
New cards

MAC-Based VLAN

Uses the MAC address to form virtual LANs.

49
New cards

IP-Based VLAN

Uses the network layer address (IP address) to form virtual LANs.

50
New cards

Application-Based VLAN

Combines layer four (transport) and layer five (application) for forming VLANs.

51
New cards

Port plus IP combination

Utilized to assign systems by grouping applications together based on ports and IP addresses for traffic control.

52
New cards

802.1Q

A standard that inserts a 16-byte tag into Ethernet packets for virtual LAN identification and traffic prioritization.

53
New cards

Access layer

The first layer in network architecture that connects devices to the network, such as laptops, servers, and application servers.

54
New cards

Distribution layer

Part of the backbone that links local area networks together within a building or cluster of buildings.

55
New cards

Core layer

Connects all distribution layers together and links the internal network to the external world, like the Internet.

56
New cards

Layer 2 switch

Typically used in smaller networks where individual devices connect directly to the access layer.

57
New cards

Layer 3 switch

Commonly used in larger networks to connect layer 2 switches and provide routing functionalities.

58
New cards

Backboard network

Connects multiple networks to form an enterprise network with access, distribution, and core layers for efficient data movement and security compliance.

59
New cards

Enterprise Network Architecture

The design and structure of a network that aims to efficiently move data while ensuring compliance with organizational security policies.

60
New cards

Zone Diagram

A logical network diagram that results from a secure network design process, illustrating how data moves within the network in compliance with organizational policies.

61
New cards

Security Zones

Logical entities containing one or more tiers that segregate and separate parts of the network, allowing for the definition and application of policies for risk mitigation at a zone level.

62
New cards

Tiers

Logical sets of systems collectively addressed as one, based on the function they provide, such as application servers or database clusters, designed for reliability, scalability, or redundancy.

63
New cards

Public Zone

A network area where corporate-owned systems available to the general public reside, lacking strict security controls and accessible externally.

64
New cards

Private Zone

A network area behind a firewall containing systems owned and controlled by the organization, allowing for the imposition of security standards and controls.

65
New cards

Host

Systems within the network, assigned to specific tiers within the private zone to facilitate the organization's control and management of its assets.

66
New cards

Zone Assignment

Process of assigning each tier to a specific zone based on restrictions and requirements.

67
New cards

Trust Level

The degree of confidence in the security and integrity of data within a specific zone.

68
New cards

Perimeter Zone

Area directly exposed to the public zone, containing systems like public-facing websites and communication devices.

69
New cards

Internal Zone

Area where internal systems and applications reside, including web applications, traditional applications, and data storage.

70
New cards

Core Zone

Central zone in enterprise computing, encompassing infrastructure, internet, application, and data zones.

71
New cards

Source Zone

Originating zone of data transmission.

72
New cards

Destination Zone

Receiving zone of data transmission.

73
New cards

Port Number

Specific numerical identifier for communication endpoints in a network.

74
New cards

Protocol

Set of rules governing data exchange between devices.

75
New cards

Transport Layer Protocol

Protocol responsible for end-to-end communication in a network.

76
New cards

Tiers

Different systems like Oracle, SQL, and IBM's DB categorized based on their level within the data zone.

77
New cards

PeopleSoft

Application used for HR services in the university.

78
New cards

SIS (Student Information System)

System where student records are maintained.

79
New cards

Quality

Financial ERP system used for managing university finances.

80
New cards

Laptops and Desktops

Client devices, with laptops posing security risks due to mobility.

81
New cards

Availability

Measure of system uptime, crucial for business continuity.

82
New cards

Downtime

Unplanned system unavailability, measured in a "nines" rating.

83
New cards

Default Deny

Security principle where only explicitly allowed traffic passes through the system.

84
New cards

Firewall

Device that permits permitted data and blocks unauthorized traffic.

85
New cards

Network Segments

Connectivity that links switches, routers, and physical systems together.

86
New cards

Logical Segments

Virtual lines defining network connectivity.

87
New cards

Physical Segments

Traditional LANs connecting physical systems.

88
New cards

Zone Diagramming

Logical way of creating network architectures with defined zones, tiers, and segments.

89
New cards

Microsoft Documentation

Basis for creating network architectures in a structured and secure manner.