Operating System Overview Flashcards

(59 cards)

1
Q

An operating system is the ______ between applications and hardware

A

software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The operating system acts as a _____ ______ by managing resources and deciding between conflicting requests for efficient and fair resource use

A

resource allocator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The operating system acts as a _____ ______ by controlling execution of programs to prevent errors and improper use of the computer

A

control program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The goal of the operating system is to make the computer system ______ and ______ use the computer hardware

A

convenient, efficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 3 steps in the lifecycle of an OS?

A
  1. Initialize the system and load kernel with simple program via bootstrapping
  2. start system daemons
  3. Run user programs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The kernel is _____ driven

A

interrupt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A _____ is a program in execution

A

process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A _____ is a passive entity, while a ____ is an active entity

A

program, process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The CPU or I/O will not be kept busy all the time with _____ program

A

one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Most users want to run multiple _____ at the same time

A

programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is mulitprogramming?

A

Running multiple programs to keep the hardware busy as close to 100% of the time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Multiprogramming maintains high resource utilization by keeping multiple programs in _______ in memory

A

execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

___________ algorithms switches between processes when one process needs to wait for an I/O for example

A

Scheduling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is protection?

A

Mechanisms for controlling what processes can access and what resources users can access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

______ is the defense of the system against internal and external attacks

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some system attacks?

A
  • Denial-of-service
  • Worms
  • Viruses
  • Identity theft
  • Theft of service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

One user has one user ________ associated with them, which includes information like name and number

A

identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A user identity is associated with all ______ and _______ of that user to determine access control

A

files, processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A ______ identifier allows sets of users to be defined and control managed

A

group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A _____ ______ allows a user to change to an ID with more rights

A

privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Both the _____ and user ____ share the same hardware and software resources

A

kernel, code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

It is ______ to keep kernel code and kernel data intact

A

crucial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

User code can ______ hardware, OS, and other software/files

A

corrupt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

__________ instructions (like I/O control, timer management, and interrupts) are operation that may cause harm to the OS

25
To protect the system, allow only the OS to perform _______ _______
privileged instructions
26
In ____ mode, processes execute on behalf of the user
user
27
In ____ mode, processes execute on behalf of the kernel
kernel
28
Processes in _____ mode cannot execute privileged instructions
user
29
What is a mode bit?
A bit in hardware hat switches between user and kernel modes
30
A _____ user can only access their own files and programs
normal
31
A _______ can do anything
superuser
32
Kernel/____ mode and _____/super user modes are two separate things
user, normal
33
A user can access privileged instructions though ______ ______
system calls
34
______ _____ use software-generated interrupts to let users access to OS services
system calls
35
A system call asks the _____ to execute privileged instructions
OS
36
Describe the transition between user/kernel modes when syscalls are used
1. User code calls a system call 2. OS checks that everything (e.g., parameter values) is in order and legal, switch to kernel mode 3. OS executes system call which may contain multiple privileged instructions 4. Mode again set to user mode
37
System calls are typically written in __________ languages, like C or C++ and are accessed via _____
high-level, APIs
38
What are the 3 most common syscall APIs?
POSIX, Java, and Win32
39
A printf() in C calls the ________() syscall from the standard C library
write
40
To execute a program. all of its _________ and ____ must be in memory
instructions, data
41
_______ ___________ determines what is in memory and when to optimize CPU utilization
Memory management
42
Memory management keep track of which parts are being _____, decide which ______ and data to move into and out of memory, and _______ and ________ memory space as needed
used, processes, allocates, deallocates
43
The OS provides a ____ _______ _________ system, which shows a uniform, logical view of information storage
File System Management
44
______ are an abstract physical property translated to logical storage units
files
45
Files are usually organized into _______
directories
46
OS file activities include...
* Creating and deleting files and directories * Primitives to manipulate files and directories * Mapping files onto secondary storage * Backup files onto stable (non-volatile) storage media
47
One layer below the File system management is the _________ _________, or manage of space in storage devices (like disks and SSDs)
Storage management
48
OS storage management activities include...
* Mounting and unmounting * Partitioning, space management (allocation, deallocation) * I/O scheduling * Protection
49
________/Buffering is the act of keeping data in faster, but typically smaller storage to improve speed
caching
50
Caching/ Buffering can copy ___ from slower to faster storage, or faster to slower storage
data
51
Required data is first checked if it is in the _____ before checking slower storage
cache
52
What is cache coherence?
CPU hardware making sure all CPUs have the most recent value of a piece of data in their cache
53
_________ environments must be careful to use the most recent value of a piece of data for operations, no matter whether it is stored in disk, main memory, cache, or register
multitasking
54
______ allows an OS to run applications within other OSes
Virtualization
55
A benefit of virtualization is that there are lower _______ costs and easier _________
hardware, management
56
Some problems of virtualization include lower ________, data ________, and security and _______
performance, migration, privacy
57
What does VMM stand for?
virtual machine manager
58
_______ computing is computing with a collection of separate systems networked together with something like LAN
distributed
59
A ______ OS provides features between systems across the network
network