CIT - 118 Operating Systems Key Terms Chapters 9, 11, 13-15

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/82

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:49 PM on 4/21/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

83 Terms

1
New cards

bridge

a data-link layer device used to interconnect multiple networks using the same protocol.

2
New cards

bus topology

network architecture to connect elements together along a single line.

3
New cards

circuit switching

a communication model in which a dedicated communication path is established between two hosts and on which all messages travel.

4
New cards

distributed operating system

an operating system that provides control for a distributed computing system, allowing its resources to be accessed in a unified way.

5
New cards

Domain Name Service (DNS)

a general-purpose, distributed, replicated data query service.

6
New cards

gateway

a communications device or program that passes data between networks having similar functions but different protocols.

7
New cards

International Organization for Standardization (ISO)

a voluntary, nontreaty organization responsible for creating international standards in many areas, including computers and communications.

8
New cards

local area network (LAN)

a data network intended to serve an area covering only a few square kilometers or less.

9
New cards

metropolitan area network (MAN)

a data network intended to serve an area approximating that of a large city.

10
New cards

network

a collection of loosely coupled processors interconnected by communications links using cables, wireless technology, or a combination of both.

11
New cards

network operating system (NOS)

the software that manages network resources for a node on a network, and may provide security and access control.

12
New cards

open shortest path first (OSPF)

a protocol designed for use in Internet Protocol (IP) networks, concerned with tracking the operational state of every network interface.

13
New cards

open systems interconnection (OSI) reference model

a seven-layer conceptual structure describing computer network architectures and the ways in which data passes through them.

14
New cards

packet switching

a communication model in which messages are individually routed between hosts, with no previously established communication path.

15
New cards

protocol

a set of rules to control the flow of messages through a network.

16
New cards

ring topology

a network topology in which each node is connected to two adjacent nodes.

17
New cards

routing information protocol (RIP)

a routing protocol used by IP, based on a distance-vector algorithm.

18
New cards

star topology

a network topology in which multiple network nodes are connected through a single, central node.

19
New cards

token bus

a type of local area network with nodes connected to a common cable using a CSMA/CA protocol.

20
New cards

token ring

a type of local area network with stations wired into a ring network.

21
New cards

topology

in a network, the geometric arrangement of connections (cables, wireless, or both) that link the nodes.

22
New cards

Transmission Control Protocol/Internet Protocol (TCP/IP)

a suite of transport-layer and application-layer protocols that operate over the Internet Protocol.

23
New cards

tree topology

a network architecture in which elements are connected in a hierarchical structure.

24
New cards

wide area network (WAN)

a network usually constructed with long-distance, point-to-point lines, covering a large geographic area.

25
New cards

wireless local area network (WLAN)

a local area network with wireless nodes.

26
New cards

access control

the control of user access to a network or computer system.

27
New cards

adware

a blended security threat that covertly collects data from system users and uses that data to target them with personalized advertisements and marketing messages.

28
New cards

antivirus software

software that is designed to detect and recover from attacks by viruses and worms. It is usually part of a system protection software package.

29
New cards

authentication

the means by which a system verifies that the individual attempting to access the system is authorized to do so.

30
New cards

backup

the process of making long-term archival file storage copies of files on the system.

31
New cards

blended threat

a system threat that combines into one program the characteristics of other attacks, including a virus, a worm, Trojans, spyware, and other malicious code.

32
New cards

biometrics

the science and technology that identifies authorized users based on their biological characteristics.

33
New cards

cleartext

in cryptography, a method of transmitting data without encryption in text that is readables by anyone by anyone who sees it.

34
New cards

cryptography

the science of coding messages or text so that unauthorized users cannot read them.

35
New cards

denial of service (DoS) attacks

an attack on a network that makes the network unavailable to perform the functions it was designed to do. This can be done by flooding the server with meaningless requests or information.

36
New cards

dictionary attack

the technique by which an intruder attempts to guess user passwords by trying words found in a dictionary.

37
New cards

encryption

the translation of a message or data item from its original form to an encoded form, thus hiding its meaning and making it unintelligible without the key to decode it.

38
New cards

ethics

the rules or standards of behavior that individuals are expected to follow, demonstrating the principles of right and wrong.

39
New cards

firewall

a set of hardware and software that disguises the internal network address of a computer or network to control how clients from outside can access an organization’s internal servers.

40
New cards

packet filtering

reviewing incoming and outgoing Internet packets to verify that the source address, destination address, and protocol are correct.

41
New cards

packet sniffers

software that intercepts Internet data packets sent in cleartext, and searches them for information, such as passwords.

42
New cards

passwords

a user-access authentication method. Typically, it is a series of keystrokes that a user enters in order to be allowed to log on to a computer system.

43
New cards

phishing

a technique used to trick consumers into revealing personal information by appearing as a legitimate way.

44
New cards

picture passwords

a sequence of strokes over a picture or graphic that is used to authenticate access to a computer system.

45
New cards

private key

a tool that’s used to decrypt a message that was encrypted using a public key.

46
New cards

proxy server

a server positioned between an internal network and an external network or the Internet to screen all requests and for information, and prevent unauthorized access to network resources.

47
New cards

public key

a tool that’s used to decrypt a message, to be decoded later using a private key.

48
New cards

social engineering

a technique whereby system intruders gain access to information about a legitimate user to learn active passwords, sometimes by calling the user and posing as a system technician.

49
New cards

spoofing

the creation of false IP addresses in the headers of data packets sent over the Internet, sometimes with the intent of gaining access when it would not otherwise be granted.

50
New cards

spyware

a security threat that covertly steals data from the system and sends it to a designated repository.

51
New cards

system survivability

the capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents.

52
New cards

Trojan

a malicious computer program with side effects that are not intended by the user who executes the program.

53
New cards

virus

a program that replicates itself by incorporating itself into other programs that are shared among other computer systems, including programs in secondary storage.

54
New cards

worm

a computer program that replicates itself, and is self-propagating in main memory.

55
New cards

argument

a value or option placed in the command that modifies how the command is to be carried out.

56
New cards

child process

a subordinate process that is created and controlled by a parent process.

57
New cards

CPU-bound

a job or process that requires a great deal of nonstop processing before issuing an interrupt; a CPU-bound job can tie up the CPU for an extended time.

58
New cards

device drivers

a device-specific program module that controls a particular type of device.

59
New cards

device independent

programs that can work with a variety of computers and devices in spite of their electronic variations.

60
New cards

directory

a logical storage unit that may contain files.

61
New cards

I/O-bound

a job or process that requires a large number of input/output operations, resulting in a lot of free time for the CPU.

62
New cards

kernel

the part of the operating system that resides in main memory at all times, and performs the most essential tasks, such as managing memory and handling disk input and output.

63
New cards

parent process

a process that creates and controls one or more child processes.

64
New cards

Portable Operating System Interface for Computer Environments (POSIX)

a set of IEEE standards that defines the standard user and programming interfaces for operating systems so that developers can port programs from one operating system to another.

65
New cards

script

a series of executable commands written in plain text that can be executed by the operating system in sequence as a single procedure.

66
New cards

sharable code

executable code in the operating system that can be shared by several processes.

67
New cards

Active Directory

Microsoft Windows’ directory service that offers centralized administration of application serving, authentication, and user registration for distributed networking systems.

68
New cards

cache manager

a component of the I/O system that manages the part of virtual memory known as cache. The cache expands or shrinks dynamically depending on the amount of memory available.

69
New cards

compatibility

the ability of an operating system to execute programs written for other operating systems or for earlier versions of the same system.

70
New cards

Domain Name System

a general-purpose, distributed, replicated, data query service. Its principal function is the resolution of Internet addresses based on fully qualified domain names, such as .com (for a commercial entity) or .edu (for an educational institution).

71
New cards

extensibility

one of an operating system’s design goals: to be easily enhanced as market requirements change.

72
New cards

fetch policy

the rules used by the Virtual Memory Manager to determine when a page is copied from disk to memory.

73
New cards

Kerberos

an authentication system that allows network managers to administer and manage user authentication at the network level.

74
New cards

kernel mode

the name given to indicate that processes are granted privileged access to the processor. Therefore, all machine instructions are allowed and system memory is accessible. This is contrasted with the more restrictive user mode.

75
New cards

Lightweight Directory Access Protocol (LDAP)

a protocol that defines a method for creating searchable directories of resources on a network.

76
New cards

New Technology File System (NTFS)

the file system introduced with Windows NT that offers file management services, such as permission management, compression, transaction logs, and the ability to create a single volume spanning two or more physical disks.

77
New cards

placement policy

the rules used by the Virtual Memory Manager to determine where the virtual page is to be loaded in memory.

78
New cards

portability

the ability to move an entire operating system to a machine based on a different processor or configuration with as little recoding as possible.

79
New cards

POSIX

Portable Operating System Interface for UNIX; an operating system application program interface developed by the IEEE to increase the portability of application software.

80
New cards

reliability

the ability of an operating system to respond predictably to error conditions, even those caused by hardware failures; or the ability of an operating system to actively protect itself and its users from accidental or deliberate damage by user programs.r

81
New cards

replacement policy

the rules used by the Virtual Memory Manager to determine which virtual page must be removed from memory to make room for a new page.

82
New cards

ticket granting ticket

a virtual ticket given by a Kerberos server indicating that the user holding the ticket can be granted access to specific application servers. The user sends this encrypted ticket to the remote application server, which can then examine it to verify the user’s identity and authenticate the user.

83
New cards

user mode

the name given to indicate the processes are not granted privileged access to the processor. Therefore, certain instructions are not allowed and system memory isn’t accessible.