Platform Technologies: FINAL BOSS JUNNEL

5.0(2)
studied byStudied by 36 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/333

flashcard set

Earn XP

Description and Tags

pa-rate naman 5 star plz - Jirah

Last updated 12:21 PM on 5/18/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

334 Terms

1
New cards

Operating System

Acts as an intermediary between the user of a computer and the computer hardware. The purpose is to provide an environment in which a user can execute programs in a convenient and efficient manner.

2
New cards

Operating System

Is a software that manages computer hardware.

3
New cards

Operating System

Controls the hardware and coordinates its use among the various application programs for the various users.

4
New cards

Hardware

The central processing unit (CPU), the memory, and the input/output (I/O) devices—provides the basic computing resources for the system.

5
New cards

Application Programs

Such as word processors, spreadsheets, compilers, and web browsers—define the ways in which these resources are used to solve users’ computing problems.

6
New cards

Users

People, machines, other computers

7
New cards

Computer-system operation

One or more CPUs, device controllers connect through common bus providing access to shared memory.

8
New cards

Interrupts

Alert the CPU to events that require attention

9
New cards

Trap/Exception

Is a software-generated interrupt caused either by an error or a user request

10
New cards

Interrupt-driven

An operating system is _________

11
New cards

System Call

Request to the OS to allow the user to wait for I/O completion

12
New cards

Device-status table

Contains an entry for each I/O device indicating its type, address, and state

13
New cards

Main Memory

Only large storage media that the CPU can access directly.

14
New cards

Main Memory

Random access. Typically volatile. Typically random-access memory in the form of Dynamic Random-access Memory (DRAM).

15
New cards

Secondary Storage

An extension of main memory that provides large nonvolatile storage capacity

16
New cards

Hard Disk Drivers (HDD)

Rigid metal or glass platters covered with the magnetic recording material.

17
New cards

Disk Controllers

Determines the logical interaction between the device and the computer

18
New cards

Non-volatile memory

Devices– faster than hard disks, nonvolatile. Various technologies. Becoming more popular as capacity and performance increases, price drops

19
New cards

Bootstrap Program

Is loaded at power-up or reboot

20
New cards

Firmware

Typically stored in ROM or EPROM

21
New cards

Caching

Copying information into faster storage system; main memory can be viewed as a cache for secondary storage

22
New cards

Device Driver

For each device controller to manage I/O

23
New cards

CPU

The hardware that executes instructions.

24
New cards

Processor

A physical chip that contains one or more CPUs.

25
New cards

Core

The basic computation unit of the CPU.

26
New cards

Multicore

Including multiple computing cores on the same CPU.

27
New cards

Multiprocessors

Including multiple processors.

28
New cards

Bit

The basic unit of computer storage

29
New cards

Bootstrap Program

Simple code to initialize the system, load the kernel into the memory. Once the kernel is loaded and executing, it can start providing services to the system and its users.

30
New cards

Multiprogramming

Increases CPU utilization, as well as keeping users satisfied, by organizing programs so that the CPU always has one to execute. In a multiprogrammed system, a program in execution is termed as process.

31
New cards

Multitasking

is a logical extension of multiprogramming. In multitasking
systems, the CPU executes multiple processes by switching among them, but the switches occur frequently, providing the user with fast response time.

32
New cards

User Mode

When the computer system is executing on behalf of a user application, the system is in ___________

33
New cards

Kernel Mode

When a user application requests a service from the operating system (via a system call), the system must transition from user to _________ to fulfill the request

34
New cards

Timer

Is used by the OS to ensure a user program is not stuck in an infinite loop or fails to call system services and never return to the OS.

35
New cards

Process

Is an instance of a program in execution.

36
New cards

File Management System

Files usually organized into directories. Access control on most systems to determine who can access what

  • OS activities include

    • Creating and deleting files and directories

    • Primitives to manipulate files and directories

    • Mapping files onto secondary storage

    • Backup files onto stable (non-volatile) storage media

37
New cards

Mass-Storage Management

Usually, disks used to store data that does not fit in main memory or data that must be kept for a “long” period of time. Proper management is of central importance. Entire speed of computer operation hinges on disk subsystem and its algorithms

  • OS activities

    • Mounting and unmounting

    • Free-space management

    • Storage allocation

    • Disk scheduling

    • Partitioning

    • Protection

38
New cards

I/O System Management

One purpose of OS is to hide peculiarities of hardware devices from the user.

  • I/O subsystem responsible for

    • Memory management of I/O including buffering (storing data temporarily while it is being transferred), caching (storing parts of data in faster storage for performance), spooling (the overlapping of the output of one job with the input of other jobs)

    • General device-driver interface

    • Drivers for specific hardware devices

39
New cards

Protection

Any mechanism for controlling access of processes or users to resources defined by the OS

40
New cards

Security

Defense of the system against internal and external attacks. Huge range, including denial-of-service, worms, viruses, identity theft, theft of service.

41
New cards

Virtualization

Is a technology that allows us to abstract the hardware of a single computer (the CPU, memory, disk drives, network interface cards, and so forth) into several different execution environments, thereby creating the illusion that each separate environment is running on its own private computer.

42
New cards

Emulation

Involves simulating computer hardware in software, is typically used when the source CPU type is different from the target CPU type.

43
New cards

Virtual Machine Manager

Runs the guest operating systems, manages their resource use, and protects each guest from the others.

44
New cards

Distributed System

Is a collection of physically separate, possibly heterogeneous computer systems that are networked to provide users with access to the various resources that the system maintains.

45
New cards

Network Operating System

Provides features between systems across a network. Communication scheme allows systems to exchange messages. Illusion of a single system.

46
New cards

Tree

A data structure that can be used to represent data hierarchically. Data values in a structure are linked through parent-child relationships.

47
New cards

Hash Function

Takes data as its input, performs a numeric operation on the
data, and returns a numeric value. Is used to retrieve data from a table.

48
New cards

Bitmap

Is a string of n binary digits that can be used to represent the status of n items.

49
New cards

Mobile Computing

Refers to computing on handheld smartphones and tablet
computers.

50
New cards

Client-Server Computing

Contemporary network architecture features arrangements in which server systems satisfy requests generated by client systems.

51
New cards

Computer Server

System provides an interface to which a client can send a request to perform an action (for example, read data).

52
New cards

File Server

System provides a file-system interface where clients can create, update, read, and delete files.

53
New cards

Peer To Peer Computing

All nodes within the system are considered peers, and each may act as either a client or a server, depending on whether it is requesting or providing a service. 

54
New cards

Cloud Computing

A type of computing that delivers computing, storage, and even applications as a service across a network.

55
New cards

Public Cloud

A cloud available via the Internet to anyone willing to pay for the services.

56
New cards

Private Cloud

A cloud run by a company for that company’s own use.

57
New cards

Hybrid Cloud

A cloud that includes both public and private cloud components.

58
New cards

Software As A Service (SaaS)

One or more applications (such as word processors or spreadsheets) available via the Internet

59
New cards

Platform As A Service

A software stack ready for application use via the Internet (for example, a database server)

60
New cards

Infrastructure As A Service

Servers or storage available over the Internet (for example, storage available for making backup copies of production data)

61
New cards

Real-time Embedded

Used when rigid time requirements have been placed on the
operation of a processor
or the flow of data; thus, it is often used to control the device in a dedicated application.

62
New cards

Graphic User Interface

Users employ a mouse-based window and-menu system characterized by a desktop metaphor. K Desktop Environment (or KDE) and the GNOME desktop by the GNU project, macOS, and Windows are examples.  

63
New cards

Touch Screen Interface

Users interact by making gestures on the touch screen

64
New cards

Command Line Interface

CLI

65
New cards

Program Execution

The system must be able to load a program into memory and to run that program. The program must be able to end its execution, either normally or abnormally (indicating error).

66
New cards

I/O Operations

The operating system must provide a means to do I/O.

67
New cards

File-system Manipulation

Programs need to read and write files and directories. They also need to create and delete them by name, search for a given file, and list file information. Some operating systems include permissions management to allow or deny access to files or directories based on file ownership. 

68
New cards

Communications

There are many circumstances in which one process needs to exchange information with another process.This may be implemented via shared memory, in which two or more processes read and write to a shared section of memory, or message passing, in which packets of information in predefined formats are moved between processes by the operating system.

69
New cards

Error Detection

The operating system needs to be detecting and correcting errors constantly. For each type of error, the operating system should take the appropriate action to ensure correct and consistent computing.

70
New cards

Resources Allocation

When there are multiple processes running at the same time, resources must be allocated to each of them.

71
New cards

Logging

We want to keep track of which programs use how much and what kinds of computer resources.

72
New cards

Protection and Security

The owners of information stored in a multiuser or networked computer system may want to control the use of that information.

73
New cards

Command Interface

The main function of this is to get and execute the next user-specified command.  C shell, Bourne-Again shell, and Korn shell are examples.

74
New cards

System Call

Programming interface to the services provided by the OS. Typically written in a high-level language (C or C++)

75
New cards

Application Programming Interface

Application developers design programs according to this. This specifies a set of functions that are available to an application programmer, including the parameters that are passed to each function and the return values the programmer can expect.

76
New cards

int fd

The file descriptor to be read

77
New cards

void *buf

A buffer which the data will be read

78
New cards

size_t count

The maximum number of bytes to be read into the buffer

79
New cards

Process Control

System Call: create process, terminate process, end, abort, load, execute, get process attributes, set process attributes, wait for time, wait event, signal event, allocate and free memory. Dump memory if error. Debugger for determining bugs, single-step execution. Locks for managing access to shared data between processes.

80
New cards

File Management

System Call: create file, delete file, open file, close file, read, write, reposition, get and set file attributes

81
New cards

Device Management

System Call: request device, release device, read, write, reposition, get device attributes, set device attributes, logically attach or detach devices

82
New cards

Information Maintenance

System Call: get time or date, set time or date, get system data, set system data, get and set process, file, or device attributes

83
New cards

Communications

System Call: Create, delete communication connection. Send, receive messages if message-passing model to hostname or process name. From client to server. Shared-memory model create and gain access to memory regions. Transfer status information. Attach and detach remote devices

84
New cards

Protection

System Call: Control access to resources. Get and set permissions. Allow and deny user access

85
New cards

File Management

System Services: These programs create, delete, copy, rename, print, list, and generally access and manipulate files and directories.

86
New cards

Status Information

System Services: Some programs simply ask the system for the date, time, amount of available memory or disk space, number of users, or similar information. Others are more complex, providing detailed performance, logging, and debugging information.

87
New cards

File Modification

System Services: Several text editors may be available to create and modify the content of files stored on disk or other storage devices. There may also be special commands to search the contents of files or perform transformations of the text.

88
New cards

Programming-language support

System Services: Compilers, assemblers, debuggers, and interpreters for common programming languages (such as C, C++, Java, and Python) are often provided with the operating system or available as a separate download.

89
New cards

Program loading and execution

System Services: Once a program is assembled or compiled, it must be loaded into memory to be executed. The system may provide absolute loaders, relocatable loaders, linkage editors, and overlay loaders. Debugging systems for either higher-level languages or machine language is needed as well.

90
New cards

Communications

System Services: These programs provide the mechanism for creating virtual connections among processes, users, and computer systems. They allow users to send messages to one another’s screens, to browse web pages, to send e-mail messages, to log in remotely, or to transfer files from one machine to another.

91
New cards

Background Services

System Services: All general-purpose systems have methods for launching certain system-program processes at boot time. Some of these processes terminate after completing their tasks, while others continue to run until the system is halted.

92
New cards

Linker

Combines relocatable object files into a single binary executable file.

93
New cards

Loader

Is used to load the binary executable file into memory, where it is eligible to run on a CPU core. 

94
New cards

User Goals

The operating system should be convenient to use, easy to learn, reliable, safe, and fast.

95
New cards

System Goals

The operating system should be easy to design, implement, and maintain, as well as flexible, reliable, error-free, and efficient.

96
New cards

Mechanisms

Determine how to do something.

97
New cards

Policies

Determine what will be done. 

98
New cards

Simple Structure

A large and complex system as a modern operating system must be engineered carefully if it is to function properly and be modified easily. A common approach is to partition the task into small components, or modules, rather than have one single system.

99
New cards

Monolithic Structure

A common technique for designing operating systems where all of the functionality of the kernel are placed into a single, static binary file that runs in a single address space. An example of such limited structuring is the original UNIX operating system, which consists of two separable parts: the kernel and the system programs.

100
New cards

Layered Approach

In which the operating system is broken into a number of layers (levels). The bottom layer (layer 0) is the hardware; the highest (layer N) is the user interface. With modularity, layers are selected such that each uses functions (operations) and services of only lower-level layers. This approach simplifies debugging and system verification.

Explore top notes

note
Unit 1: Kinematics (copy)
Updated 328d ago
0.0(0)
note
Ap History
Updated 1119d ago
0.0(0)
note
Biology 6
Updated 718d ago
0.0(0)
note
HUMAN GEOGRAPHY
Updated 1261d ago
0.0(0)
note
0.2: Pre-Colonial America
Updated 1237d ago
0.0(0)
note
Psychology KA4 notes
Updated 74d ago
0.0(0)
note
AP Macroeconomics Ultimate Guide
Updated 1058d ago
0.0(0)
note
Unit 1: Kinematics (copy)
Updated 328d ago
0.0(0)
note
Ap History
Updated 1119d ago
0.0(0)
note
Biology 6
Updated 718d ago
0.0(0)
note
HUMAN GEOGRAPHY
Updated 1261d ago
0.0(0)
note
0.2: Pre-Colonial America
Updated 1237d ago
0.0(0)
note
Psychology KA4 notes
Updated 74d ago
0.0(0)
note
AP Macroeconomics Ultimate Guide
Updated 1058d ago
0.0(0)

Explore top flashcards

flashcards
Sadlier-Oxford Level F - Unit 9
20
Updated 1098d ago
0.0(0)
flashcards
Chapter 9 Med Term
25
Updated 1192d ago
0.0(0)
flashcards
2.1 vocab El ciberespacio
67
Updated 638d ago
0.0(0)
flashcards
WWW 24
25
Updated 55d ago
0.0(0)
flashcards
Sadlier-Oxford Level F - Unit 9
20
Updated 1098d ago
0.0(0)
flashcards
Chapter 9 Med Term
25
Updated 1192d ago
0.0(0)
flashcards
2.1 vocab El ciberespacio
67
Updated 638d ago
0.0(0)
flashcards
WWW 24
25
Updated 55d ago
0.0(0)