1/23
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Operating System
A program that manages the computer hardware and provides a user-friendly interface for resource sharing.
RTOS (Real-Time OS)
A specialized operating system that responds immediately to input and is used in robots and automobiles.
Process Management
Deals with running multiple processes and manages CPU time slices for multitasking.
Multi-tasking
Managing multiple processes that use the computer hardware simultaneously, giving the illusion of concurrent execution.
Multi-processing
Distributing tasks across multiple processors or processor cores.
Memory Management
Coordinates the use of different memory types in a computer, including virtual memory.
Disk and File Systems
Organizes and manages files on permanent storage, including creation and deletion of files.
Networking
Enables communication and file sharing between different computers and devices.
Multi-user
Allows multiple users to access a single computer or network simultaneously.
Security (internal)
Ensures that processes do not access unauthorized memory locations.
Virus
A piece of code that replicates itself and attaches to a host file, often causing damage.
File Infectors
Viruses that attach themselves to program files and are activated when the file is opened.
Macro Viruses
Viruses that typically cause minimal damage by inserting unwanted content into documents.
Malware
Software designed to disrupt computer operation or gain unauthorized access.
Worms
Malware that replicates itself across networks without user intervention.
Trojan Horse
Malware disguised as legitimate software that opens a backdoor for further access.
Spyware
Malware that monitors user activity and can collect sensitive information without consent.
Keylogger
A type of spyware that records keystrokes to capture sensitive information.
Ransomware
Malware that encrypts files and demands payment for unlocking them.
Exploit
A vulnerability in hardware or software that allows unauthorized access.
Patch
An update designed to fix vulnerabilities and protect against exploits.
Zero-day Exploit
An unpatched security vulnerability that hackers can exploit.
Backdoor
A method of bypassing normal authentication to access a system.
Encryption
The process of converting information into a coded format to prevent unauthorized access.