Linux Operating Systems Lec Chapter 1 Midterm

4.0(1)
studied byStudied by 33 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/100

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

101 Terms

1
New cards
Operating System
A program that acts as an intermediary between a user of a computer and the computer hardware.
2
New cards
Operating System
Execute user programs and make solving user problems easier. This also makes the computer system convenient to use and efficiently uses the computer hardware.
3
New cards
Hardware
A Computer System Structure. Provides basic computing resources.
4
New cards
Operating System
A Computer System Structure. Controls and coordinates use of hardware among various applications and users.
5
New cards
Application Programs
A Computer System Structure. Defines the ways in which the system resources are used to solve the computing problems of the users.
6
New cards
Users
A Computer System Structure. People, machines, other computers.
7
New cards
Operating System
A resource allocator and control program making efficient use of HW and managing execution of user programs.
8
New cards
Mobile
___________ devices like smartphones and tables are resource-poor, optimized for usability and battery life.
9
New cards
Embedded Computers
Some computers have little or no user interface. Examples include _______________ in devices and automobiles.

These primarily run without user intervention.
10
New cards
Kernel
The one program that runs at all times on the computer.

It manages system resources and provides low-level services to other parts of the operating system.
11
New cards
Application Program
all programs not associated with the operating system.
12
New cards
System Program
ships with the operating system, but not part of the kernel
13
New cards
Middleware
A set of software frameworks that provide additional services to application developers such as databases, multimedia, graphics.
14
New cards
Bus
One/more CPU(s) and device controllers connect through common ____________ to provide access to shared memory.
15
New cards
Interrupt
An event that occurs when the sevice controller informs CPU that it has finished its operation.
16
New cards
Interrupt Vector
A vector that contains the addresses of all the service routines. It is through here that Interrupt transfers control to the interrupt service routine.
17
New cards
Trap/Exception
A software-generated interrupt caused either by an error or a user request.
18
New cards
Interrupt Handling
The event where the operating system preserves the state of the CPU by storing the registers and the program counter.

This determines which interrupt type has occured, and separate segments of code determine what action should be taken for each type of interrupt.
19
New cards
System Call
When there is a request to the OS to allow user to wait for I/O completion.
20
New cards
Device-status table
A table that contains entry for each I/O device indicating its type, address, and state.
21
New cards
Main Memory
The only large storage media that the CPU can access directly.

This is typically Random Access (in the form of Dynamic Random-access Memory or DRAM) and volatile (maintains its data only while the device is powered)
22
New cards
Secondary Memory
The extension of main memory that provides large nonvolatile storage capacity.

This typically pertains to ROM memory, like your C:/ or D:/ drives which stores files, as it can still maintain data even if the device is off.
23
New cards
Hard Disk Drives
Rigid metal or glass platters covered with magnetic recording material.

Its disk surface is logically divided into tracks, which are subdivided into sectors.
24
New cards
Disk Controller
Part of the Hard Disk Drive.

This determines the logical interaction between the device and the computer.
25
New cards
Non-volatile Memory
Devices that are faster than hard disks, nonvolatile.

It makes use of various technologies, and it is becoming more popular as capacity and performance increases, and price drops.
26
New cards
Caching
The process of copying information into faster storage system; main memory (RAM) can be viewed as a cache for secondary storage.
27
New cards
Device Driver
Manages Input and Output for each device controller, such as, sound, Bluetooth, peripherals, etc.
28
New cards
Bootstrap Program
A program that contains simple code to initialize the system and load the kernel.
29
New cards
Software error
A type of Software Interrupt.

Example: Division by 0
30
New cards
System Call
A type of Software Interrupt.

Example: Request for operating system service.
31
New cards
Process Overlap or Infinite Loop
A type of Software Interrupt.

Example: Other process problems.
32
New cards
Interactive Computing
When the CPU switches jobs so frequently that users can interact with each job while it is running.
33
New cards
CPU Scheduling
When several jobs are ready to run at the same time.
34
New cards
Swapping
Moves processes in and out to run if they don’t fit in memory.
35
New cards
Virtual Memory
Allows the execution of processes not completely in memory.
36
New cards
Process
When each user has at least one program executing in memory.
37
New cards
Dual-Mode Operation
Allows OS to protect itself and other system components. Has User Mode and Kernel Mode. The Mode Bit is provided by hardware.
38
New cards
Privileged
Instructions designated as only executable in kernel mode.
39
New cards
Timer
Used to prevent infinite loop or process hogging resources. This is set to interrupt the computer after some time period.
40
New cards
Program Counter
Single-threaded process has one ____________________ specifying location of next instruction to execute.
41
New cards
Thread
Multi-threaded process has one program counter per ___________________.
42
New cards
Process Management
The operating system is responsible for the following activities in connection with _____________________:

* Creating and deleting both user and system processes
* Suspending and resuming processes
* Providing mechanisms for process synchronization
* Providing mechanisms for process communication
* Providing mechanisms for deadlock handling
43
New cards
Memory Management
OS Management that keeps track of which parts of memory are currently being used and by whom. Decides which processes (or parts thereof) and data to move into and out of memory and allocating and deallocating memory space as needed.
44
New cards
File-system Management
OS Management that organizes files into directories. It is an access control on most systems to determine who can access what.

OS activities include:

* Creating and deleting files and directories
* Primitives to manipulate files and directories
* Mapping files onto secondary storage
* Backup files onto stable (non-volatile) storage media
45
New cards
Mass-Storage Management
OS Management that stores and manages data that does not fit in main memory or data that must be kept for a “long” period of time.

\
OS activities

* Mounting and unmounting
* Free-space management
* Storage allocation
* Disk scheduling
* Partitioning
* Protection
46
New cards
Caching
The process of information in use is copied from slower to faster storage temporarily.

* Faster storage (cache) is checked first to determine if the information is there.
* If it is, information is used directly from the cache (fast). •
* If not, data is copied to the cache and used there.
47
New cards
Cache Coherency
Multiprocessor environment must provide _______________ in hardware such that all CPUs have the most recent value in their cache.
48
New cards
I/O Subsystem
An OS Subsystem that hides peculiarities of hardware devices from the user.

Responsible for:

* Memory management of I/O including buffering (storing data temporarily while it is being transferred), caching (storing parts of data in faster storage for performance), spooling (the overlapping of output of one job with input of other jobs)
* General device-driver interface
* Drivers for specific hardware devices
49
New cards
Protection
any mechanism for controlling access of processes or users to resources defined by the OS.
50
New cards
Security
defense of the system against internal and external attacks.

* Huge range, including denial-of-service, worms, viruses, identity theft, theft of service
51
New cards
user ID
User identities that include name and associated number, one per user.
52
New cards
group ID
Group identifier that allows set of users to be defined and controls managed, then also associated with each process, file.
53
New cards
Privilege Escalation
allows user to change to effective ID with more rights.
54
New cards
Virtualization
Allows operating systems to run applications within other OSes. OSes are natively compiled for CPU, and running guest OSes are also natively compiled.
55
New cards
Emulation
Generally the slowest method of virtualization, used when source CPU type different from target type (i.e. PowerPC to Intel x86).

In this process, the computer language not compiled to native code and mainly makes use of interpretation.
56
New cards
Virtual Machine Manager
AKA VMM, provides virtualization services.
57
New cards
Distributed Systems
A collection of separate, possibly heterogeneous, systems networked together.
58
New cards
Network
___________ is a communications path, TCP/IP most common.

* Local Area Network (LAN)
* Wide Area Network (WAN)
* Metropolitan Area Network (MAN)
* Personal Area Network (PAN)
59
New cards
Network Operating System
An Operating System that provides features between systems across networks.
60
New cards
Multiprocessors
Also known as parallel systems, tightly-coupled systems • Advantages include:


1. Increased throughput
2. Economy of scale
3. Increased reliability – graceful degradation or fault tolerance

\

Has two types:

* Asymmetric Multiprocessing
* Symmetric Multiprocessing

\
61
New cards
Asymmetric Multiprocessing
each processor is assigned a specic task.
62
New cards
Symmetric Multiprocessing
each processor performs all tasks
63
New cards
Dual-Core Design
A Processor Design that is multi-chip and multicore.

Systems containing all chips

* Chassis containing multiple separate systems
64
New cards
Clustered Systems
A system that is like multiprocessor systems, but multiple systems working together • Usually sharing storage via a storage-area network (SAN).

Provides a high-availability service which survives failures.

Two types:

* Asymmetric clustering
* Symmetric clustering
65
New cards
Asymmetric clustering
A Clustered System Type. Has one machine in hot-standby mode.
66
New cards
Symmetric clustering
A Clustered System Type. Has multiple nodes running applications, monitoring each other.
67
New cards
High-Performance Computing
A Type of Computing where applications must be written to use parallelization.
68
New cards
Distributed Lock Manager
Used by some Clustered Systems to avoid conflicting operations.
69
New cards
Traditional
A Computing Environment. Is a stand-alone general-purpose machine, blurred as most systems interconnect with others (i.e., the Internet).

* Portals provide web access to internal systems
* Network computers (thin clients) are like Web terminals.
* Mobile computers interconnect via wireless networks.
* Networking becoming ubiquitous – even home systems use firewalls to protect home computers from Internet attacks.
70
New cards
Mobile
A Computing Environment. Examples of devices making use of this are handheld smartphones, tablets, etc.

* Extra feature – more OS features (GPS, gyroscope)
* Allows new types of apps like augmented reality
* Use IEEE 802.11 wireless, or cellular data networks for connectivity
* Leaders are Apple iOS and Google Android
71
New cards
Client Server
A Computing Environment.

Dumb terminals supplanted by smart PCs.

* Many systems now servers, responding to requests generated by clients.
* Compute-server system provides an interface to client to request services (i.e., database)
* File-server system provides interface for clients to store and retrieve files.
72
New cards
Peer-to-Peer
A Computing Environment. Another model of distributed system.

* Does not distinguish clients and servers
* Instead all nodes are considered peers
* May each act as client, server or both
* Node must join network
* Registers its service with central lookup service on network, or
* Broadcast request for service and respond to requests for service via discovery protocol
* Examples include Napster and Gnutella, Voice over IP (VoIP) such as Skype.
73
New cards
Cloud Computing
A Computing Environment. Delivers computing, storage, and even apps as a service across a network.

Its environments are composed of traditional OSes, plus VMMs, plus cloud management tools.

* The logical extension of virtualization because it uses virtualization as the base for its functionality.
* Amazon EC2 has thousands of servers, millions of virtual machines, and petabytes of storage available across the Internet, and pay-based on usage.

\
Many types:

* Public cloud
* Private cloud
* Hybrid cloud
* Software as a Service (SaaS)
* Platform as a Service (PaaS)
* Infrastructure as a Service (IaaS)
74
New cards
Public cloud
A type of Cloud Computing. Available via Internet to anyone willing to pay.
75
New cards
Private cloud
A type of Cloud Computing. Run by a company for the company’s own use.
76
New cards
Hybrid cloud
A type of Cloud Computing. Includes both public and private cloud components.
77
New cards
Software as a Service/SaaS
A type of Cloud Computing. One or more applications available via the Internet (i.e., word processor).
78
New cards
Platform as a Service/PaaS
A type of Cloud Computing. Software stack ready for application use via the Internet (i.e., a database server).
79
New cards
Infrastructure as a Service/IaaS
A type of Cloud Computing. Servers or storage available over Internet (i.e., storage available for backup use).
80
New cards
Load Balancers
Part of cloud computing. Spreads traffic across multiple applications.
81
New cards
Firewalls
Internet connectivity requires security such as _______________.
82
New cards
Real-Time Embedded Systems
Systems that are the most prevalent form of computers. Real-time OS. Special purpose, limited purpose OS.

Many other special computing environments as well

* Some have OSes, some perform tasks without an OS
* Processing must be done within constraint
* Correct operation only if constraints met
83
New cards
Open-Source Operating Systems
Operating systems that are made available in source-code format rather than just binary closed-source and proprietary.

* Started by Free Software Foundation (FSF), which has “copyleft” GNU Public License (GPL).
* Examples include GNU/Linux and BSD UNIX (including core of Mac OS X), and many more.
84
New cards
Singly Linked List
A Kernel Data Structure.
A Kernel Data Structure.
85
New cards
Doubly Linked List
A Kernel Data Structure.
A Kernel Data Structure.
86
New cards
Circular Linked List
A Kernel Data Structure.
A Kernel Data Structure.
87
New cards
Binary Tree
A Kernel Data Structure.
A Kernel Data Structure.
88
New cards
Hash function
A Kernel Data Structure.
A Kernel Data Structure.
89
New cards
Bitmap
A Kernel Data Structure.
A Kernel Data Structure.
90
New cards
system daemons
services provided outside of the kernel
91
New cards
workstations
Users of dedicate systems such as _____________ have dedicated resources but frequently use shared resources from servers
92
New cards
interrupt-driven
An operating system and the kernel is ______________.
93
New cards
Multiprogramming
_____________ **organizes jobs (code and data) so the CPU always has one to execute.**

* One job is then selected and run via job scheduling.
* When a job has to wait (for I/O for example), OS switches to another job.
94
New cards
passive entity
Program is a ____________.
95
New cards
active entity
Process is a ______________.
96
New cards
portals
Traditional Computing.

______________ provide web access to internal systems.
97
New cards
Compute-server system
System in a Client Server that provides an interface to client to request services (i.e., database)
98
New cards
File-server system
System in a Client Server that provides interface for clients to store and retrieve files
99
New cards
Digital Rights Management
Free and Open-Source Operating Systems were made to counter the copy protection and _____________________ (DRM) movement
100
New cards
GNU
GNU/Linux and BSD UNIX are Operating Systems that are part of the ____________ Public License