CMN Unit 3 Flashcards
(69 cards)
What was the first storage method used by early computers?
Punch cards, paper tape, magnetic tape, audio cassettes
These were the initial methods before modern storage devices like hard drives and flash storage became available.
What is the purpose of the Disk Operating System (DOS)?
To enable data storage devices to read and write files
DOS provides a file system which organizes files on the disk.
Who developed MS-DOS?
Microsoft
Microsoft bought DOS and developed MS-DOS as a version of the Disk Operating System.
What type of interface does MS-DOS use?
Command line interface
Users interact with MS-DOS by typing commands at the prompt.
True or False: MS-DOS is a single-process, single-user operating system.
True
This contrasts with modern operating systems that support multiple user processes.
What does Windows NT stand for?
New Technologies
Windows NT is the architecture that modern versions of Windows are built upon.
What significant change occurred with the release of Windows XP?
Introduction of a 64-bit edition
This was a major architecture shift allowing for more memory addressing.
How much RAM can a 32-bit Windows OS address?
Less than 4 GB
In contrast, a 64-bit OS can theoretically address up to 16.8 million terabytes.
Fill in the blank: Windows 10 is considered the last version of Windows, as Microsoft states that Windows has become a _______.
Service
Users will update Windows 10 rather than purchasing new operating systems.
What is the main area of the Windows GUI called?
Desktop
The Desktop is where users can manage files, folders, and applications.
What functionality does the Task Bar provide?
Access to Start menu, quick launch icons, and notification area
These components help users manage applications and receive notifications.
What is a Context Menu in Windows?
A list of additional functions that appears upon right-clicking an icon
This menu provides commonly used functions like copy, delete, and share.
What is a vulnerability in the context of operating systems?
A flaw or weakness that can be exploited by an attacker
Vulnerabilities can lead to unauthorized control over the computer or theft of data.
What is the goal of an attacker exploiting a vulnerability?
To gain unauthorized control, change permissions, or manipulate/stole data
Attackers aim to bypass the intended design of the computer.
List some common recommendations for Windows OS security.
- Regular updates
- Use antivirus software
- Implement firewalls
- Back up data
- Practice safe browsing
These measures help protect against vulnerabilities and attacks.
What is the significance of the NT operating system in Windows versions?
More than 20 releases of Windows have been based on the NT operating system, primarily for public and business use due to enhanced file security.
What types of Windows operating systems were built specifically for businesses?
- Workstation
- Professional
- Server
- Advanced Server
- Datacenter Server
What major architectural change occurred with the introduction of Windows XP?
The introduction of a 64-bit edition, featuring a 64-bit address space instead of a 32-bit address space.
How much RAM can 32-bit and 64-bit Windows theoretically address?
32-bit Windows can address a little less than 4 GB, while 64-bit Windows can theoretically address 16.8 million terabytes.
What are some applications that benefit from 64-bit operating systems?
- Very large databases
- Scientific computing
- Manipulation of high definition digital video with special effects
True or False: 64-bit programs can be run on older, 32-bit hardware.
False
How many editions were offered with Windows 7?
Six different editions.
What did Microsoft announce regarding Windows 10?
Windows 10 is the last version of Windows, transitioning to a service model rather than standalone OS purchases.
What is the main area of the Windows graphical user interface (GUI) called?
The Desktop.