1/22
Flashcards covering operating system types, hardware components, networking topologies, and system management concepts.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
What is a Batch operating system?
An operating system that manages large groups of jobs efficiently without direct communication between the user and the computer during program execution, similar to a washing machine that cannot be changed once started.
What are the pros and cons of a Batch operating system?
Pros: Minimal Idle Time, managing repetitive tasks, and improved throughput. Cons: Inefficient CPU utilization, increased response time, and lack of real-time feedback.
What is the definition of Multi Programming?
A technique where multiple programs are kept in memory at the same time, and the CPU switches between them to improve efficiency and keep the processor busy.
What are the pros and cons of Multi Programming?
Pros: Better CPU utilization, improved throughput, and efficient resource use. Cons: Complex design, security issues, and high memory requirements.
What is a Network Operating System (NOS)?
An operating system running on a server that manages data, users, security, applications, and network functions, allowing remote access to files and resources within a private network.
What are the characteristics of a Mobile Operating System?
Designed specifically for handheld devices like phones or tablets, featuring user-friendly interfaces and extensive app ecosystems, but facing challenges like limited battery life and fragmentation.
Why is Microsoft Windows widely used in workplaces?
It is built to be easy to use, compatible with most software, and links efficiently with tools like Active Directory and Azure for user and device management.
How does macOS differ from Windows in terms of hardware compatibility?
macOS only runs on Apple devices, ensuring consistency and stability because the hardware and software are built together.
What is the foundation of Linux and its primary use cases?
Linux is open source and Unix-based; it is known for being stable and flexible, making it very common in servers, cloud systems, and development environments.
Define Memory management in an Operating System.
The process of deciding how RAM is shared, ensuring programs get the resources they need while preventing them from interfering with each other.
What is the difference between x86 and x64 bit architectures regarding RAM?
x86 architecture (32-bit) can only use up to 4GB of RAM, while x64 architecture can manage up to 16 exabytes of RAM.
What is the function of the CPU?
The Central Processing Unit is the "brain" of the computer that processes instructions and performs calculations.
What is the difference between RAM and long-term storage (HDD/SSD)?
RAM is temporary memory used for active data storage so the CPU can access it quickly, whereas HDD/SSD storage keeps data and files saved even when the power is off.
What is a Network Interface Card (NIC)?
A component that allows a computer to connect to a network or the internet via Ethernet or Wi-Fi.
What are Drivers and why are they necessary?
Software that allows the operating system and a device to communicate by translating OS commands into instructions the hardware can understand.
What is the purpose of a Print Server in a workplace?
It acts as a central system that handles all printing on a network, managing print queues to prevent clashes and applying user permissions.
What are the benefits of a Print Management System like PaperCut?
It tracks usage by department, applies printing limits, reduces waste, and improves security through "pull" printing where users authenticate at the printer.
What key details should be included in an IT Asset Register?
Device name, location, serial number, model number, device age, user assigned, active status, warranty end date, and purchase date.
Describe Star Topology and its main vulnerability.
Every device connects to a central device like a switch; if the central device fails, the entire network goes down.
What is Mesh Topology and why is it used?
A layout where devices connect to multiple other devices; it is used for high reliability because data can take alternative paths if one connection fails.
What is the difference between a Wi-Fi Extender and an Access Point (AP)?
An AP connects to a wired network to provide Wi-Fi to other devices, while an extender picks up an existing wireless signal and rebroadcasts it to reach weak areas.
Which IEEE 802.11 standard is referred to as Wi-Fi 6?
802.11ax.
How does WPA3 security protect against brute force attacks?
The router will only allow one password login attempt at a time, making it harder for attackers to guess passwords repeatedly.