Computer Systems, Operating Systems, and Software: Key Concepts for IT Students

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/123

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

124 Terms

1
New cards

Components of a computer system

Hardware, software, and users.

2
New cards

IPOS cycle

Input → Processing → Output → Storage.

3
New cards

True/False: A computer system is just hardware and software.

False — it also includes users.

4
New cards

Examples of peripheral devices

printer, keyboard, mouse, monitor, external drive.

5
New cards

Short-term vs. long-term storage: which is volatile?

Short-term (main memory/RAM) is volatile; long-term (disk/SSD) is non-volatile.

6
New cards

What does a system administrator do?

Installs, configures, maintains, and supports systems, including user training and documentation.

7
New cards

What does a network administrator do?

Designs, configures, and maintains networks (LAN/WAN), addressing, routing, and connectivity.

8
New cards

What is 'software' and its two broad forms?

Programs that run on hardware; system software (OS, utilities) and application software.

9
New cards

Example of how a change at one layer of a socio-technical system can ripple to others

New regulation (society) → change to business processes → updates to application software → OS/config changes.

10
New cards

True/False: Most people who work in IT must have a 4‑year IT degree.

False — many paths exist; roles are diverse.

11
New cards

What is the motherboard?

The main circuit board that houses the CPU, memory, and expansion components.

12
New cards

Define 'storage capacity'

The amount of data that can be stored on a device or medium (e.g., bytes, GB, TB).

13
New cards

Give two responsibilities of a security administrator

Managing firewalls and access controls; monitoring security events and enforcing policies.

14
New cards

What is a MODEM used for?

Modulation/demodulation to send digital data over analog channels.

15
New cards

Define 'application system' in a socio-technical stack

Applications that implement business processes and interact with users and other layers.

16
New cards

Fill-in: The system unit houses the CPU and memory on the ________.

Motherboard.

17
New cards

Define an operating system (OS)

System software that manages hardware, provides services, and runs programs.

18
New cards

Kernel vs. shell

Kernel manages resources at a low level; shell is a user interface (CLI or GUI) to the OS.

19
New cards

Program vs. process

Program = passive code on disk; Process = active instance of a program in execution with state.

20
New cards

Define context switch

The CPU saves one process's state and loads another's, switching execution.

21
New cards

True/False: The OS is hardware.

False — the OS is software.

22
New cards

Competitive (preemptive) multitasking means...

A timer interrupt preempts processes periodically to switch among them.

23
New cards

What data structure maps virtual pages to physical frames?

The page table.

24
New cards

Define a page fault

An event when a referenced virtual page is not in RAM, requiring it to be loaded from disk.

25
New cards

Virtual memory enables...

Programs to use address spaces larger than physical RAM via paging.

26
New cards

Swapping is...

Moving process memory between RAM and disk to free RAM.

27
New cards

Device driver

Software that lets the OS talk to hardware devices like printers or keyboards.

28
New cards

Role: protection vs. security

Protection: mechanisms to control access; Security: broader policies/practices for safeguarding systems.

29
New cards

File permissions are part of which OS role?

Protection.

30
New cards

True/False: 'Process' and 'program' are interchangeable terms.

False — program ≠ process.

31
New cards

Name four major OS responsibilities

Process management, memory management, file systems, I/O devices (plus networking, protection).

32
New cards

CPU scheduling purpose

To decide which ready process runs next on the CPU.

33
New cards

Interrupt

A hardware or software signal that causes the CPU to stop current execution and run a handler.

34
New cards

Ready queue

The set of processes that are ready to run but waiting for CPU time.

35
New cards

Atomic operation

An operation that runs completely or not at all; can’t be interrupted.

36
New cards

Critical section problem is about...

Coordinating access to shared data to avoid race conditions.

37
New cards

Program counter

holds the address of the next instruction; part of the saved state, but doesn’t cause context switches.

38
New cards

Page table

Maps a program’s virtual addresses to physical memory locations.

39
New cards

Context switch

When the CPU saves one process’s state and loads another’s, allowing multitasking between programs.

40
New cards

CLI vs. GUI

CLI accepts text commands; GUI uses windows, icons, menus, and pointers.

41
New cards

File allocation table / inode map

A system map that shows where each file’s data is stored on the disk so the OS can find and read it.

42
New cards

Memory management goal

Allocate RAM fairly/efficiently, isolate processes, and support virtual memory.

43
New cards

System call

A controlled interface by which a program requests a service from the OS.

44
New cards

Protection

Rules in the operating system that control who or what can access files, memory, or devices.

45
New cards

Compilation vs. interpretation

Compilation translates source to machine code ahead of time; interpretation executes source step-by-step via an interpreter.

46
New cards

High-level vs. low-level language

High-level is human-friendly (e.g., Python, Java); low-level is close to machine (assembly).

47
New cards

Algorithm

A step-by-step, finite procedure to solve a problem.

48
New cards

Pseudocode purpose

Express algorithmic steps in structured, language-agnostic form.

49
New cards

Variable

A named storage location with a type and value.

50
New cards

Compiler output

Object/machine code (and possibly intermediate files) for the target platform.

51
New cards

Runtime error vs. compile-time error

Compile-time: detected by the compiler; Runtime: occurs during execution (e.g., divide-by-zero).

52
New cards

Scripting language example

Bash, PowerShell, Python, JavaScript.

53
New cards

Control structures

Sequence, selection (if/else/switch), and iteration (for/while).

54
New cards

Function/procedure

A named block of code that can be called with arguments and may return a value.

55
New cards

Structured programming

Programming style from 1970s using sequence, selection, and loops for clarity.

56
New cards

Object-oriented programming core concepts

Encapsulation, abstraction, inheritance, polymorphism.

57
New cards

Source code management purpose

Track changes, collaborate, and manage versions (e.g., Git).

58
New cards

Debugger

Lets you step through code, inspect variables, and set breakpoints to find bugs.

59
New cards

Unit testing

Testing individual components in isolation to ensure correctness.

60
New cards

Compilation

Translating human-readable code to machine code.

61
New cards

IPv4 address length

32 bits (four octets).

62
New cards

Octet

An 8-bit byte; IPv4 addresses have 4 octets separated by dots.

63
New cards

Subnet mask

Identifies the network vs. host portion of an IP address.

64
New cards

Default route purpose

Where packets are sent when no specific route is known (usually a router/gateway).

65
New cards

LAN vs. WAN

LAN = local area network (campus/office/home); WAN = wide area network (large geographic).

66
New cards

Bandwidth vs. latency

Bandwidth is capacity (throughput); latency is delay (time to deliver).

67
New cards

Role of a router

Connects different networks and forwards packets between them.

68
New cards

Role of a switch

Connects devices within a LAN and forwards frames based on MAC addresses.

69
New cards

DNS purpose

Translates human-readable domain names to IP addresses.

70
New cards

TCP vs. UDP

TCP is connection-oriented and reliable; UDP is connectionless and best-effort.

71
New cards

NAT purpose

Maps private internal IPs to a public IP for Internet access.

72
New cards

CIDR notation example

255.255.255.0 = /24 (first 24 bits are network)

73
New cards

Port number

Endpoint identifier for transport-layer services on a host (e.g., HTTP 80, HTTPS 443).

74
New cards

ARP

Resolves IP addresses to MAC addresses on a LAN.

75
New cards

Ping

Tests connectivity and round-trip time to a host.

76
New cards

Traceroute

Shows the path (hops/routers) a packet takes to reach a destination.

77
New cards

DHCP

Provides automatic IP settings: address, mask, gateway, DNS.

78
New cards

Private IPv4 ranges

10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16.

79
New cards

Loopback IPv4 address

127.0.0.1.

80
New cards

Applying a netmask with AND yields the ________ address.

Network.

81
New cards

True/False: If two devices have different network addresses, they must use a router to talk.

True.

82
New cards

True/False: DNS translates IP addresses into MAC addresses.

False — ARP maps IP→MAC; DNS maps name→IP.

83
New cards

Broadcast in IPv4

Packet sent to all hosts on the local network (e.g., 192.168.1.255 with /24).

84
New cards

Database vs. DBMS

Database: organized collection of data; DBMS: software to create, read, update, and manage databases.

85
New cards

Table/row/column meanings

Table = relation; row = record/tuple; column = attribute/field.

86
New cards

Primary key

A column (or set) whose values uniquely identify each row.

87
New cards

Foreign key

A column in one table that references the primary key of another table.

88
New cards

Normalization purpose

Reduce redundancy and update anomalies by structuring tables into normal forms.

89
New cards

SQL SELECT

Query to retrieve columns from one or more tables with optional filtering and joins.

90
New cards

JOIN

Combines rows from two tables using a shared column (key).

91
New cards

Index

Auxiliary data structure that accelerates lookups for specific columns.

92
New cards

Transaction

A unit of work that is atomic, consistent, isolated, and durable (ACID).

93
New cards

View

A virtual table defined by a query.

94
New cards

Schema

The structure of the database: tables, columns, data types, relationships.

95
New cards

Integrity constraint example

NOT NULL, UNIQUE, PRIMARY KEY, FOREIGN KEY, CHECK.

96
New cards

True/False: A table can have multiple primary keys.

False — only one primary key (but it may be composite).

97
New cards

True/False: A foreign key must match values in the referenced primary key or be NULL (if allowed).

True.

98
New cards

A ________ key uniquely identifies a row.

Primary.

99
New cards

A ________ key references a primary key in another table.

Foreign.

100
New cards

Which file lists currently mounted file systems in Linux?

/etc/mtab.