Systems Software

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/30

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 10:20 AM on 4/6/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

31 Terms

1
New cards

Operating system

An essential piece of software that controls the operations of the computer

2
New cards

Applications

Programs that are called up by the operating system that perform specific tasks

3
New cards

Basic Input/Output (BIOS) System

Controls the computer when it is first switched on, tests the system hardware and loads the operating system.

4
New cards

Operating System Examples

Windows, iOS, Android and Linux

5
New cards

Functions of an operating system

Provides the interface between the user and computer, manages how data is received from input devices, manages how computer interacts with other computers, controls access and security

6
New cards

O/S Layer 1

User interacts with an application program

7
New cards

O/S Layer 2

Application program carries out specific tasks

8
New cards

O/S Layer 3

Application layer communicates with the operating system

9
New cards

O/S Layer 4

Operating system controls how the application interacts with the computer’s hardware

10
New cards

User Interface

Means by which the user provides an input to the computer and the computer conveys and output to the user through use of input/output devices

11
New cards

Graphical User Interface(GUI)

Provides visual representations of the files and devices on a computer and allows you to use these resources by clicking, dragging and touching their graphical representation using WIMP

12
New cards

Windows-Icon-Menu-Pointer (WIMP)

Programs and files are represented by icons, and run in movable windows. User interaction is through a moving pointer via a mouse, keyboard or touchscreen

13
New cards

Command Line Interface

An interface predating GUIs where the user has to type in commands for the operating system and receives feedback in form of text.

14
New cards

Peripherals

External devices that are connected to a computer

15
New cards

Device Manager

Keeps track of which devices are connected to which ports and allows applications to read data from and send data to each peripheral

16
New cards

Memory manager

Controls the allocation of the computer’s primary memory (RAM) to each process that is running

17
New cards

File Manager

Keeps track of where specific files and folders are physically located in secondary storage

18
New cards

User Manager

Keeps track of which users can access the system and which are currently logged in

19
New cards

User Access Control

A security measure that prevents a standard user from installing applications and changing the master password

20
New cards

Anti-virus software

Scans and removes malicious files

21
New cards

Encryption software

Uses an algorithm to scramble a file according to the key which is needed to decrypt the file back to its original form

22
New cards

Firewall

Prevents unwanted access to a computer over a network

23
New cards

Spyware detector

Blocks and removes programs designed to collect personal information and transmit it to another user

24
New cards

Backup programs

Configured to back up sensitive data at specific times and also compresses data so it takes up less storage space

25
New cards

Full backup

Where all specified data is backed up

26
New cards

Incremental backup

Where only new files or ones that have changed since the last backup are saved which saves time

27
New cards

Resource management

How the operating system controls and coordinates the computer’s hardware resources such as CPU time, memory (RAM), secondary storage and input/output devices

28
New cards

File management

How the operating system organises and keeps track of files on storage devices like hard drives and ensures they can be created, accessed or modified when needed

29
New cards

Firmware

Software embedded into into hardware devices

30
New cards

Ransomware

Malicious software(malware) that threatens to publish or block access to data or a computer system by encrypting it until the victim pays a ransom fee to the attacker

31
New cards

Measures to reduce a cyberattack

Anti-virus software, security systems such as firewalls or VPNs and encryption

Explore top notes

note
Microbiology
Updated 873d ago
0.0(0)
note
Italian 3 Oral
Updated 1385d ago
0.0(0)
note
AP Calculus AB - Ultimate Guide
Updated 1086d ago
0.0(0)
note
Sources of Finance for Businesses
Updated 372d ago
0.0(0)
note
AP Q3
Updated 778d ago
0.0(0)
note
AP Biology Ultimate Guide
Updated 697d ago
0.0(0)
note
Microbiology
Updated 873d ago
0.0(0)
note
Italian 3 Oral
Updated 1385d ago
0.0(0)
note
AP Calculus AB - Ultimate Guide
Updated 1086d ago
0.0(0)
note
Sources of Finance for Businesses
Updated 372d ago
0.0(0)
note
AP Q3
Updated 778d ago
0.0(0)
note
AP Biology Ultimate Guide
Updated 697d ago
0.0(0)

Explore top flashcards

flashcards
Chapter 11 - Human Development
87
Updated 1112d ago
0.0(0)
flashcards
Unit 4B Terms List
27
Updated 523d ago
0.0(0)
flashcards
Period 3: Terms
63
Updated 215d ago
0.0(0)
flashcards
Bio 2 Exam 2
197
Updated 756d ago
0.0(0)
flashcards
Ch 5: Soil Systems and Societies
53
Updated 1170d ago
0.0(0)
flashcards
Chapter 11 - Human Development
87
Updated 1112d ago
0.0(0)
flashcards
Unit 4B Terms List
27
Updated 523d ago
0.0(0)
flashcards
Period 3: Terms
63
Updated 215d ago
0.0(0)
flashcards
Bio 2 Exam 2
197
Updated 756d ago
0.0(0)
flashcards
Ch 5: Soil Systems and Societies
53
Updated 1170d ago
0.0(0)