Unit 2 - Operating Systems Overview

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/23

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

24 Terms

1
New cards

Operating System

A program that manages the computer hardware and provides a user-friendly interface for resource sharing.

2
New cards

RTOS (Real-Time OS)

A specialized operating system that responds immediately to input and is used in robots and automobiles.

3
New cards

Process Management

Deals with running multiple processes and manages CPU time slices for multitasking.

4
New cards

Multi-tasking

Managing multiple processes that use the computer hardware simultaneously, giving the illusion of concurrent execution.

5
New cards

Multi-processing

Distributing tasks across multiple processors or processor cores.

6
New cards

Memory Management

Coordinates the use of different memory types in a computer, including virtual memory.

7
New cards

Disk and File Systems

Organizes and manages files on permanent storage, including creation and deletion of files.

8
New cards

Networking

Enables communication and file sharing between different computers and devices.

9
New cards

Multi-user

Allows multiple users to access a single computer or network simultaneously.

10
New cards

Security (internal)

Ensures that processes do not access unauthorized memory locations.

11
New cards

Virus

A piece of code that replicates itself and attaches to a host file, often causing damage.

12
New cards

File Infectors

Viruses that attach themselves to program files and are activated when the file is opened.

13
New cards

Macro Viruses

Viruses that typically cause minimal damage by inserting unwanted content into documents.

14
New cards

Malware

Software designed to disrupt computer operation or gain unauthorized access.

15
New cards

Worms

Malware that replicates itself across networks without user intervention.

16
New cards

Trojan Horse

Malware disguised as legitimate software that opens a backdoor for further access.

17
New cards

Spyware

Malware that monitors user activity and can collect sensitive information without consent.

18
New cards

Keylogger

A type of spyware that records keystrokes to capture sensitive information.

19
New cards

Ransomware

Malware that encrypts files and demands payment for unlocking them.

20
New cards

Exploit

A vulnerability in hardware or software that allows unauthorized access.

21
New cards

Patch

An update designed to fix vulnerabilities and protect against exploits.

22
New cards

Zero-day Exploit

An unpatched security vulnerability that hackers can exploit.

23
New cards

Backdoor

A method of bypassing normal authentication to access a system.

24
New cards

Encryption

The process of converting information into a coded format to prevent unauthorized access.