Operating Systems Pre-midterms

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/123

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

124 Terms

1
New cards

Operating system

A program that controls the execution of application programs and is an interface between applications and hardware

2
New cards

processor

The operating system relinquishes the control of the _____________

3
New cards

executed

An operating system is a program that is _______________

4
New cards
  1. Convenience

  2. Efficiency

  3. Ability to evolve

Objectives of an Operating System

5
New cards
  • Application Programs

  • Utilities

  • Operating System

  • Computer Hardware

What are the layers of a Computer System

6
New cards

Utilities and Operating System

Which layer of the OS does the programmer interact with?

7
New cards

Application Programs

Which layer of the OS does the end user interact with?

8
New cards

Computer Hardware

Which layer of the OS does the OS designer interact with?

9
New cards
  1. Program development

  2. Program execution

  3. Access I/O devices

  4. Controlled access to files

  5. System Access

  6. Error detection and response

  7. Accounting

List the services provided by the OS

10
New cards

Nucleus

What is the other name for the kernel

11
New cards

main memory

The kernel is a portion of the operating system within the ____________________.

12
New cards

monitor

Job control is a special type of programming language that provides instruction to the _______________.

13
New cards

compiler, data

The job control language provides instructions on what _____________ and ______________ to use.

14
New cards

Memory protection

Which hardware feature does not allow the memory area containing the monitor to be altered?

15
New cards

Timer

Which hardware feature prevents a job from monopolizing the system?

16
New cards

Privilege instructions

Which hardware feature makes it so that certain machine-level instructions can only be executed by the monitor?

17
New cards

Interrupts

Which hardware feature was not present in early computer models?

18
New cards

User

Memory protection makes sure that user programs execute in __________ mode

19
New cards

System

Memory protection makes sure that monitor execute in __________ mode

20
New cards

Uniprogramming

Type of programming wherein the processor must wait for I/O instructions to complete before proceeding

21
New cards

Multiprogramming

Type of programming wherein when one job needs to wait for I/O, the processor can switch to another job

22
New cards

Batch Multiprogramming

What is is the usage of multiprogramming to handle multiple interactive jobs.

23
New cards

Time Sharing

Compared to Batch Multiprogramming, this minimizes processor use and commands are entered at the terminal.

24
New cards

Process

A ___________ is a program in execution.

25
New cards

An executable program, associated data needed by the program, execution context of the program

The three components of a process

26
New cards

Execution context

All the information the operating system needs to manage the process

27
New cards
28
New cards

Virtual Memory

Which part of the memory implements long-term storage

29
New cards

Files

Within the virtual memory, information is stored in named objects called ___________

30
New cards

Paging

Allows a process to be comprised of a number of fixed-size blocks

31
New cards

page number

The virtual address is a _______________ and an offset within the page

32
New cards

Main memory

Consists of a number of fixed-length frames, each equal to the size of a page.

33
New cards

Secondary memory (disk)

Can hold many fixed-length pages

34
New cards

Availability

Concerned with protecting the system against interruption

35
New cards

Confidentiality

Assuring that users cannot read data for which access is unauthorized

36
New cards

Data integrity

Give equal and fair access to resources

37
New cards

Authenticity

Discriminate among different classes of jobs

38
New cards

Efficiency

Maximize throughput, minimize response time, and accommodate as many uses as possible

39
New cards

System structure

The _______________ allows us to view the system as a series of levels.

40
New cards

Microkernel architecture

Assigns only a few essential functions to the kernel including address spaces, interprocess communication (IPC), and basic scheduling.

41
New cards

Multithreading

Divides a process into threads that can run concurrently.

42
New cards

Thread

Dispatchable unit of work that executes sequentially and is interruptable.

43
New cards

Distributed operating systems

Provides the illusion of a single main memory space and single secondary memory space

44
New cards

Object-oriented design

Enables programmers to customize an operating system without disrupting system integrity

45
New cards

Process Management

An Operating System’s fundamental task is ________________________

46
New cards

Program code (possibly shared), a set of data, a number of attributes describing the state of the process

A process consists of

47
New cards

process control block

It is created and processed by the operating system and allows support for multiple processes.

48
New cards

Trace

A list of the sequence of instructions that are executed.

49
New cards

Dispatcher

A small program that switches the processor from one process to another.

50
New cards

Not-running

In a two-state process model, the state may be in two states: running and _____________

51
New cards

Process Creation

The OS builds a data structure to manage the process

52
New cards

Process spawning

When the OS lets a running process create another.

53
New cards

Parent

The ______________ process is the original and creating process

54
New cards

Child

In process swapping, the _________ process is the new process

55
New cards

Interrupt

A HALT instruction generates an ___________ alert to the OS

56
New cards

HALT instruction

The way that a process can indicate its completion may be through a __________________ (1)

57
New cards

A user action (e.g. log off, quitting an application)

The way that a process can indicate its completion may be through a __________________ (2)

58
New cards

A fault or error

The way that a process can indicate its completion may be through a __________________ (3)

59
New cards

Parent process terminating

The way that a process can indicate its completion may be through a __________________ (4)

60
New cards

New

The first state of a five-state process model

61
New cards

Ready

The second state of a five-state process model

62
New cards

Running

The third state of a five-state process model

63
New cards

Blocked

The fourth state of a five-state process model

64
New cards

Exit

The fifth state of a five-state process model

65
New cards

Blocked

The state that follows after an event wait

66
New cards

Ready

When the process experiences a timeout, it returns to the ______________ state

67
New cards

Suspended

The blocked state becomes a ___________________ state when swapped to disk

68
New cards

Ready/Suspend

The state of a process (with two suspend states) when it fails to activate and reach the Ready state.

69
New cards

Block/Suspend

The state of a process (with two suspend states) when it fails to activate and reach the Blocked state.

70
New cards

Swapping

The reason for suspension where the OS needs to release sufficient main memory to bring in a process that is ready to execute.

71
New cards

Timing

The reason for suspension where the process may be suspended while waiting for the next time.

72
New cards

Memory tables

OS control structure used to keep track of both main and secondary memory.

73
New cards

I/O Tables

OS control structure used to manage the I/O devices and channels of the computer.

74
New cards

Files table

OS control structure that provides information about files.

75
New cards

File management system

Maintains the information within a file table

76
New cards

Process table

OS control structure used to know the details of the processes.

77
New cards

Process control block

The most important data structure in an OS because it defines the state of the OS.

78
New cards

Process image

The collection of program, e.g., data, stack, and attributes.

79
New cards

Process Identification

Category of process control block wherein each process is assigned a unique numeric identifier.

80
New cards

Processor State Information

Category of process control block that consists of the contents of processor registers.

81
New cards

Process Control Information

Category of process control block that consists of the additional information needed by the OS to control and coordinate the various active processes.

82
New cards

User mode, system mode

Most processors support at least two modes of execution, namely:

83
New cards

User mode

Mode of execution with less privilege.

84
New cards

System mode

Mode of execution with more privilege executed at the OS’ kernel.

85
New cards

Interrupt

Possible event where a process switch may occur.

Use: Reaction to an asynchronous external event

86
New cards

Trap

Possible event where a process switch may occur.

Use: Handling of an error or an exception condition

87
New cards

Supervisor call

Possible event where a process switch may occur.

Use: Call to an operating system function

88
New cards

Non-process Kernel

The operating system code is executed as a separate entity that operates in privileged mode.

89
New cards

administrator, supervisor, or root access

Highest level of privilege within the OS

90
New cards

prevent anything (user or process) from gaining unauthorized privileges

A key security issue in the design of any OS.

91
New cards

Masquerader

Outsider system access threat

92
New cards

Misfeasor

Insider system access threat

93
New cards

Clandestine user

Outsider or insider system access threat

94
New cards

Intrusion detection

Systems typically designed to detect human intruders and malicious software behavior.

95
New cards

Authentication

Has two stages: Identification and Verification

96
New cards

Access Control

A policy governing access to resources.

97
New cards

Auditing function

An ______________ monitors and keeps a record of user access to system resources.

98
New cards

Firewalls

Traditionally a dedicated computer that interfaces with computers outside a network and has special security precautions built into it to protect sensitive files on computers within the network.

99
New cards

Resource ownership

Process characteristic wherein process includes a virtual address space to hold process image.

100
New cards

Scheduling/execution

Process characteristic which follows an execution path that may be interleaved with other processes.