Chapter 5 - System Software Flashcards

1
Q

CMOS

A

Complimentary metal-oxide semi-conductor
BIOS configuration stored here, meaning it can be altered/deleted as required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Operating system

A

Software that provides an environment in which applications can run and provides an interface between hardware and human operators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HCI

A

Human-Computer Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

GUI

A

Graphical User Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CLI

A

Command Line interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Icon

A

Small picture/symbol used to represent an application on a screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WIMP

A

Windows, Icons, Menu and Pointing device
One of the first commonly used GUI environments
Developed for use on PCs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Post-WIMP

A

Interfaces that go beyond WIMP and use tough screen technology rather than a pointing device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Memory management

A

Part of the operating system that controls the main memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Memory optimisation

A

Function of memory management that determines how memory is allocated and deallocated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Memory organisation

A

Function of memory management that determines how much memory is allocated to a location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security management

A

Part of the operating system that ensures the integrity, confidentiality and availability of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Virtual memory systems

A

Memory management (part of OS) that makes use of hardware + software to enable a computer to compensate for shortage of actual physical memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Memory protection

A

Function of memory management that ensures 2 competing applications can’t use same memory locations at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Process management

A

Part of OS that involves allocation of resources and permits the sharing and exchange of data. Thus allowing all processes to be fully synchronised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hardware management

A

Part of OS that controls all input/output devices connected to a computer (made up of sub-management systems such as printer management, secondary storage management etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Device driver

A

Software that communicates with the OS and translates data into a format understood by the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Utility program

A

Parts of the OS which carry out certain functions, such as virus checking, defragmentation or hard disk formatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Disk formatter

A

Utility that prepares a disk to allow data/files to be stored and retrieved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Bad sector

A

Faulty sector on an HDD which can be soft or hard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Anti virus software

A

Software that quarantines and deletes files/programs infected by malware. It can run in the background or be initiated by the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Heuristic checking

A

Checking of software for behaviour that could indicate a possible virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Quarantine

A

File/program identified as being infected by a virus which has been isolated by anti-virus software before it is deleted at a later stage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

False positive

A

File/program identified by a virus checker as being infected but the user knows this cannot be correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Disk defragmenter
Utility that reorganises the sectors on a hard disk so that files can be stored in contiguous data blocks
26
Disk content analysis software
Utility that checks disk drivers for empty space and disk usage by reviving files and folders
27
Data compression
Software that compresses data before storage on an HDD
28
Back-up utility
Software that makes copies of files on another portable storage device
29
Program library
Library on a computer where programs and routines are stored which can be freely accessed by other software developers for use in their own programs
30
Library program
Program stored in a library for future use by other programmers
31
Library routine
A tested and ready-to-use routine available in the development system of a programming language that can be incorporated into a program
32
DLL
Dynamic Link file Library routine that can be linked to another program at the run time stage
33
Translator
Systems software used to translate a source program written in any language other than machine code
34
Why computers need an operating system (5)
A set of programs designed to run in the background on a computer system which: Controls operation of computer system Provides a user interface Controls how computer responds to user’s requests Controls how hardware communicate Provides an environment in which application software can be executed
35
Storage of BIOS
Configuration stored in CMOS memory meaning it can be deleted or altered as required
36
RAM + operating system
Only part of the OS is copied into the RAM since the computer’s performance would be affected if the whole thing was loaded at once
37
Common OS examples (4)
Microsoft Windows Apple Mac OS Google Android IOS
38
How HCI is achieved
Through GUI or CLI if the user wishes to directly communicate with the computer
39
Disadvantages of CLI (3)
Command Line Interface Requires a user to type instructions to choose options from menus, open software etc. User has to learn a number of commands to carry out basic operations Takes time to key in commands every time an operation has to be carried out
40
Advantages of CLI (2)
The user is in direct communication with the computer Not restricted to a number of pre-determined options
41
Advantage of GUI
It allows the user to interact with a computer using pictures or symbols, meaning a whole line of CLI code can be replaced by a single icon
42
Windows manager
Looks after interaction between windows, the application and the windowing system which handles the pointing devices and the cursor’s position
43
Operating system tasks (5)
Memory management Security management Process management File management Hardware management
44
Memory management partitions (3)
Memory protection Memory optimisation Memory organisation
45
Memory optimisation (4)
Used to determine how computer memory is allocated + de allocated when a number of applications are running simultaneously. Determines where the applications are stored in the memory Keeps track of all allocated + free memory available for use Swaps data to and from HDD/SSD to maintain optimisation
46
Memory organisation
Determines how much memory is allocated to application and how the memory can be split up most appropriate/efficiently
47
How can memory organisation be done (4)
Single (contiguous) action-all memory made available to single application. Used by MS-DOS + embedded systems Partitioned allocation- memory split up into contiguous blocks then memory management allocates a partition to applications Paged memory - similar to partitioned, but each partitioned is a fixed size. Used by virtual memory systems Segmented memory- memory blocks not contiguous, each segment is a logical grouping of data
48
Memory protection
Ensures 2 competing computers can’t use the same memory locations at the same time. Otherwise data could be lost, incorrect results produced, security issues or a computer crash.
49
Why must memory protection always be apart of any type of memory organisation used
To prevent 2 applications from occupying the same part of memory
50
How to achieve security management (7)
Carry out OS updates as they become available Ensure anti-virus software is up to date Communicate with firewall to check computer traffic Maintain access rights for all users Offer ability to recover lost/corrupted data Prevent illegal intrusion to computer system
51
Functions of hardware management (3)
Communicate with all input + output systems using device drivers Translate data from file to format the input/output device can understand using device drivers Ensure each hardware resource has priority so it can be used and released as required
52
Actions of printer management (5)
Locates + loads printer driver into memory Sends data to printer buffer ready for printing Sends data to printer queue Sends control commands to printer throughout printing process Receives + handles error messages + interrupts from the printer
53
Main tasks of file management (6)
Defining file naming conventions Performing specific tasks, open, close etc. Maintaining directory structures Ensure access control mechanisms are maintained Specify logical file storage format Ensuring memory allocation for a file be reading it from the HDD/SSD and loading it into memory
54
Utility software offered by most OS (6)
Hard disk fragmenter Virus checker Defragmentation software Disk contents analysis/repair File compression Back up software3
55
Hard bad sectors (3)
(Difficult to repair) Caused by manufacturing errors Damage to disk surface caused by allowing read-write head to touch the disk surface System crash could damage disk surface
56
Soft bad sectors (2)
Sudden loss of power leading to data corruption in some of the sectors Effect of static electricity leading to corruption of data in some sectors in Hard disk surfaces
57
What back-up utility does (2)
Allow backing up schedule to be made Only carry out backup procedure if changes have been made to a file
58
Versions of a file for total security (3)
Current stored on internal HDD Locally backed up copy on portable SSD eg. Remote back-up version
59
Function of a hard disk formatter (4)
New hard disk drive needs to be initialised ready for formatting Organises storage space by assigning it to data blocks (partitions - contiguous blocks of data) Writes files which holds directory data and tables of contents at the beginning of each partition - allows the OS to recognise a file to find it on the disk surface Do carry out tests on each sector of the hard disk.
60
Carrying out full formatting using NTFS
All disk sectors are filled with zeros which are read back thus testing the sector but losing any data already stored there.
61
What happens when you reformat an HDD which has already been used
Data is lost during the formatting procedure
62
Repairing a faulty disk
If bad sectors are discovered the sectors are flagged as bad and the file tracking records are reorganised by replacing bad sectors with new, unused sectors. A Damaged file will now contain an ‘empty’ sector which allows the file to be read but it will be corrupted since the bad sector will have contained important data. It is important to delete damaged files for the rest of the HDD to be effectively repaired.
63
Features of antivirus software (4)
Check software/files before they are run/loaded on a computer Compare possible viruses against a database of known viruses Carry out heuristic checking Put possibly infected files into quarantine to automatically delete the virus or let the user identify a false positive
64
Why defragmentation software is important
Without it as the HDD becomes full files become scattered all over the disk surface as they are deleted, partially deleted, extended etc. This leads to slower data access time and the HDD read-write head requiring several movements to find data.
65
Function of back-up utility (2)
Allows a schedule for backing up files to be made Only carry out a back-up -to édite if there haven’t been any changes made to a file
66
When are program libraries used (2)
When software is under development and the programmer can utilise pre-written sub-routines in their own programs, saving considerable development time To help a software developer who wishes to use DLL subroutines in their own programs, so they must be available at run time
67
Benefits of using programming libraries (5)
Removes the need to rewrite the routines every single time (saves time + cost) Leads to modular programming which means several programmers can work on the same software simultaneously Allows continuity with other games that form part of a range Allows maintenance of a ‘corporate’ image in all software being developed by a particular company Saves development time testing each routine since routines are tested and(should be)error free
68
Static library
Software being developed is linked to executable code in the library at the time of compilation. Library routines would be embedded directly into the new program code
69
Pros of using DLL files (4)
Executable code of main program is much smaller since DLL files are only loaded into memory at run time Possible to make changes to DLL files independently of the main program and it will not be necessary to recompile the main program Can be made available to a number of applications at the same time Memory and execution time is saved
70
Cons of using DLL files (4)
Executable code is not self contained, so all DLL files need to be available at runtime time to prevent software crashes and error messages Any DLL linking software in main program needs to be available at run time to allow links with DLL file to be made If any DLL files have been changed it could lead to unexpected results or crashing of the main program Malicious changes to files due to Malware could be a threat to the main program through the linking process
71
Translator
System software used to translate a source program written in any language other than machine code
72
Compiler
Computer program that translates a source written program in a HLL to machine code or p-code, object code
73
Interpreter
Computer program that analyses and executes a program written in HLL line by line
74
Pretty printing
Practice of displaying or printing well set out and formatted source code, making it easier to read and understand
75
IDE
Integrated Development Environment Suite of programs used to write and test a computer program written in HLL
76
Syntax error
Error in the grammar of a source program
77
Logic error
Error in the logic of a program
78
Debugging
Process of finding logic errors in a program by running or tracing the program
79
Single stepping
Practice of running a program one line/instruction at a time
80
Breakpoint
Deliberate pause in the execution of a program during testing so that the contents of variables, registers etc. can be inspected to aid debugging
81
Translators (3)
Assemblers Interpreters Compilers
82
Assembler (4)
Source program written in assembly language Machine dependent Object program generated and stored on disk (needs a loader program) or in main memory Each line of source code program generates one machine code instruction,one to one translation
83
Compiler (4)
Source program written in HLL Not machine dependent Object program generated and stored on a disk/in main memory Each line of source program generates many machine code instructions, instruction explosion
84
Interpreter (4)
Source program written in HLL Not machine dependent No object program generated, instructions are executed under the control of the interpreter Each line of source program generates many machine code instructions, instruction explosion
85
Pros of compilers (5)
End user only needs the executable code, so no need to purchase a compiler to translate Developer keeps hold of source code so they can charge for upgrades and alterations Compiled programs have no syntax or semantic errors Source program can be translated on one type of computer and executed on another Compiled programs are a hucher to execute as translation has been compiled and machine code may already have been optimised
86
Cons of interpreter (5)
End user needs to purchase a compiler/interpreter to translate source code before use Developer relinquishes control of source code and can’t charge and could have intellectual property used. Interpreted programs can’t be interpreted on one type of computer and executed on another Interpreted programs still contain syntax/semantic errors which need to be debugged. Interpreted program takes longer to execute since each line needs to be translated
87
Cons of compilers (4)
Untested programs may cause computer to crash End users don’t have access to source code + run time libraries so are reliant on developer During development, special routines are needed to view partial results Finds all errors in a program, one error detected means computer finds other dependent errors. More errors found than the actual number
88
Pros of interpreters (4)
Untested programs should not cause computer to crash Partial results can be viewed during development If program is purchased, end users have all source code and libraries enabling modification Easier to develop and debug as errors can be corrected on each line
89
Partial compiling and interpreting
Achieves shorted execution times by source code being checked and translated by a compiler into object code which is now a low level machine independent code called intermediate code, p-code or bytecode. To execute the program, the object code can be interpreter]d by an interpreter or compile day a compiler
90
Features of IDEs (4)
Source code editor Compiler, interpreter, or both Run-time environment with a debugger Auto documenter
91
Source code editor
Allows a program to be written and edited without the need to use separate text files. It speeds up the development process as editing can be done without changing to a different piece of software each time the program needs correcting or adding to. Most offer pretty printing. Some offer time sensitive prompts with text completion and provide dynamic syntax checking
92
Dynamic syntax checking
Finds possible syntax errors as the program code is being typed im
93
Auto documenter
Explains the function and purpose of programming code
94
Run time environment with a debugger
Program that runs the program under development and aids the process of debugging. It allows the programmer to single step through the program one line at a time or to set a breakpoint to stop the execution at a certain point. A report window shows the contents of the variable and expressions evaluated at that point in the program allowing the programmer to see if the program works as intended