GMU IT 342 Final Exam Key Terms and CYUs 7 - Roundup (Holdener)

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/198

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:47 AM on 5/13/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

199 Terms

1
New cards

Aliases

a special type of file in a Macintosh system that points to a specific file.

2
New cards

B-tree

a self balancing tree data structure

3
New cards

Controlled sharing

the ability to share the file with end users and programs in a manner that also protects the contents from others.

4
New cards

Directory

a cataloging structure in a file system used to reference other files.

5
New cards

Efficient

You can quickly get to the data.

6
New cards

Extents

a contiguous range of clusters somewhere on the disk, described by a starting cluster number and a length (how many clusters after the starting one). They keep track of where a file's contents are located on the disk.

7
New cards

Fields

collection of data that has the same type and similar function.

8
New cards

File

collection of data that is available for use at some point in the future by one or more programs.

9
New cards

Hard links

a mapping between a name and a file.

10
New cards

iNode

a data structure in a file system that describes a file or directory.

11
New cards

iNumber

the file number of a file in a -nix system, the index used as the first step in locating a file.

12
New cards

Long-term existence

data survives Operating System, hardware, and program changes as well as untoward events to the system.

13
New cards

Named data

the ability for end users and application programs to provide names to the data.

14
New cards

Path

a string of characters used to identify the location of a file or directory in a system.

15
New cards

Records

collection of fields about the same object.

16
New cards

Reliability

data is present and is correct.

17
New cards

Shortcuts

a special type of file in a Windows system that points to a specific file.

18
New cards

Soft links

symbolic links that map a file name to another file name.

19
New cards

Volume

a collection of physical storage devices that constitute a file system.

20
New cards

Address translation

the process by which a virtual address is converted to a physical address.

21
New cards

Base register

a CPU register that holds the initial storage location for a grouping of continuously stored data.

22
New cards

Best fit

a dynamic memory algorithm that places processes in the smallest hole (empty location) of memory in which it will fit.

23
New cards

Bounds register

a CPU register that defines the end of a continuous grouping for stored data.

24
New cards

Clock

a page replacement algorithm that modifies the FIFO algorithm by ensuring the candidate page has not been used since the last time the frame was checked. It differs from second chance in the means it is implemented (a circular queue).

25
New cards

Concatenation

a simplified method of addition that puts things together as a connected series.

26
New cards

Dynamic partitioning

a method of memory allocation that puts processes in a single variable-sized partition to maintain separation from other processes. The size of the partition is tailored to the process.

27
New cards

First fit

a dynamic memory algorithm that places processes in the first hole (empty location) of memory in which it will fit.

28
New cards

First in, first out

a page replacement algorithm that swaps out the page that has been in memory the longest.

29
New cards

Fixed partition

a method of memory allocation that puts processes in a single partition to maintain separation from other processes. The size of the partition remains fixed at the size it was set during start-up.

30
New cards

Frame

a fixed-length continuous block of physical memory that stores a single page, most times shortened to this single word.

31
New cards

Hole

in dynamic memory schemes, locations of unused memory that are ready for allocation to a program.

32
New cards

Least recently used

a page replacement algorithm that swaps out the page that has not been used for the longest time.

33
New cards

Next fit

a dynamic memory algorithm that places processes in the first hole (empty location) of memory from the last touched memory area in which it will fit.

34
New cards

Optimal

a page replacement algorithm that swaps out the page whose next use will occur farthest in the future.

35
New cards

Overlays

an overlay is a technique that allows the application programmer some control of what part of their program is in memory, it allows programs to be larger than the memory space allocated for the application.

36
New cards

Page

a fixed-length contiguous block of virtual memory.

37
New cards

Page frames

a fixed-length continuous block of physical memory that stores a single page, most times shortened to a single word.

38
New cards

Page reference string

a list of pages of a process that are referenced in sequence.

39
New cards

Page table

a data structure used to store a mapping between pages (virtual) and page frames (physical).

40
New cards

Page table pointer

the physical address of the beginning of the page time for a process.

41
New cards

Relocation

the ability of a memory system to move sections of memory around without any effect to the program.

42
New cards

Second chance

a page replacement algorithm that modifies the FIFO algorithm by ensuring the candidate page has not been used since the last time the frame was checked. It differs from clock in the means it is implemented (a linear queue).

43
New cards

Thrashing

a condition in virtual memory systems when virtual memory must continuously be swapped out of physical memory to accommodate new requests. In the worst case, the system never gets to use a page because it is swapped out before being used.

44
New cards

Translation lookaside buffer

a memory cache that stores the recent translations of virtual memory to physical memory.

45
New cards

Worst fit

a dynamic memory algorithm that places processes in the largest hole (empty location) of memory in which it will fit. Obviously, this is the largest hole in existence at the time.

46
New cards

Compiler

a program that translates code from one language into code of another language, primarily used to translate high-level languages into machine code.

47
New cards

Heap

a large pool of memory from which dynamic memory allocations occur.

48
New cards

Multiprogramming

a computing technique that enables multiple programs to be loaded concurrently into a computer and gives the end user the impression that they are all simultaneously running.

49
New cards

Process

the instance of a computer program that is being executed in a computer system.

50
New cards

Process control block

the overhead space used by an Operating System to store all the information about a single process.

51
New cards

Process control table

the overhead space used by an Operating System to store all the information about a single process.

52
New cards

Program

a sequence of instructions that have been formatted for a specific microprocessor originating from a programming language.

53
New cards

Semantics

the meanings of words and word relationships in a programming language.

54
New cards

Speed up

the increase in performance over a single-core system as a result of parallel execution.

55
New cards

Stack

an area of memory typically used for local procedures fixed variables.

56
New cards

Syntax

the set of rules that are provided for a programming language.

57
New cards

Von Neumann machine

John von Neumann provided a computer architecture in 1945 that consisted of a processing unit, control unit, memory, external mass storage, and input/output mechanisms. Today, it is commonly agreed to mean any architecture that uses stored instructions.

58
New cards

7.1 What is a file attribute?

Metadata about a file.

59
New cards

7.1 What use are file attributes to the Information Technologist?

They can be used to determine untoward activities on the system.

60
New cards

7.1 The two biggest issues with using files are:

Performance and corruption.

61
New cards

7.1 What is one method a file system uses to determine which application program applies to a file?

The last three or four characters after the stop character determine the application program.

62
New cards

7.1 What is a file?

A collection of data for use in the future.

63
New cards

7.2 What is a directory?

A cataloging system used to reference files.

64
New cards

7.2 Which of the following types of paths is shortest?

Either, not enough information.

65
New cards

7.2 Which of the following could not be a volume?

File

66
New cards

7.2 How would you change the working directory of your system?

Through the cd command.

67
New cards

7.2 If the current working directory from figure 7.4 were Programming, what would be the relative path to the directory Fixed Wing?

./../../../Personal/RC Models/Fixed Wing

68
New cards

7.3 Updating a file allows a user to

modify, delete, or add to the files data

69
New cards

7.3 While sharing allows a user to access another user's files, security seeks to:

Keep track of the user's actions

70
New cards

7.3 A simple security mechanism uses

read, write, and execute.

71
New cards

7.3 What is not part of file security?

Digital Rights Management

72
New cards

7.3 Methods of sharing include

copying, third-party software, and hard links.

73
New cards

7.4 What is the internal fragmentation of a 26,934-byte file in a system with 1 KB blocks?

2.6%

74
New cards

7.4 A file system can work with only

an indexing and free space management system.

75
New cards

7.4 Transactions and journaling help with what aspect of a file system?

Integrity

76
New cards

7.4 With spanned blocking,

multiple secondary memory blocks may contain parts of the same record.

77
New cards

7.4 Locating a file involves

recursively locating each directory to the file from the root.

78
New cards

7.5 What is one security flaw in NTFS?

File contents can be fully in the MFT

79
New cards

7.5 What two techniques are required to ensure files are managed?

Indexing and Free space management

80
New cards

7.5 In the FAT file system, where are attributes stored?

FAT

81
New cards

7.5 The Apple File System indexes with

B-trees.

82
New cards

7.5 In the FFS file system, where are attributes stored?

In the iNodes

83
New cards

8.1 Why do microprocessors not directly control memory anymore?

The speed of microprocessors has outpaced memory.

84
New cards

8.1 What does an overlay offer?

The ability to use programs larger than the available memory

85
New cards

8.1 What is Logical Memory?

Memory that is set up by software and used by programs.

86
New cards

8.1 The advantages of virtual memory do not include

increased access time

87
New cards

8.1 Types of physical memory include all except

DROM

88
New cards

8.2 If the base register is 1D2F5 and the virtual address is CD4, what is the physical address?

1DFC9

89
New cards

8.2 If the base register is 5C65E and the virtual address is 24E, what value must the limit register contain for the physical address to be valid?

Must be less than 5C8AD

90
New cards

8.2 What is the point of address translation?

To convert the virtual address to a physical address

91
New cards

8.2 Which are located in the microprocessor

Base Register and Limit Register

92
New cards

8.2 What advantage does concatenation offer in translation?

Speeds up the calculation

93
New cards

8.3 Fixed partitioning methods suffer from

internal fragmentation

94
New cards

8.3 (T/F) Performance in paging always improves as the number of page frames increases.

FALSE

95
New cards

8.3 Dynamic portioning methods suffer from

external fragmentation

96
New cards

8.3 Which method allows for the most control over protection?

Paging

97
New cards

8.3 Paging allows for

Relocation

98
New cards

8.4 What is the internal fragmentation for a 5,754,234 program with 1 MB pages?

8.5%

99
New cards

8.4 What would cause a page fault to take twice as long as normal?

A dirty page

100
New cards

8.4 What is the most reasonable page reference string?

222222222222233333333333333333