Operating Systems Flashcards
(108 cards)
Purpose(s) of Operating System
- To provide a user-friendly interface between the user and the hardware.
- To manage memory, and processor to ensure they are used efficiently.
- To manage peripheral devices, such as printers and keyboards.
- To protect the hardware and software from incompetence and inexperience.
- To provide similar environment on different machines. This should make programs more transportable.
- To avoid duplication by incorporating commonly used routines.
- Monitor the user and protect data on the computer from unauthorized access.
Batch Processing: Define
The data is collected together before processing which is then carried out without human interaction e.g. Payroll
Single User
A mode operation where the operating system deals with just a single user.
Multi User
A mode of operation where the computer can deal with number of users at the same time. E.g. scales system in a supermaket.
Multi Tasking
The ability of the operating system to have several programs loaded and the user can switch between them.
Multi Programming
That ability of the operating system to have several programs loaded and the operating system can rapidly switch between them giving the impression they are all running at the same time.
Interrupt
A signal sent from a peripheral device to the processor requesting attentions.
Typical causes of interrupt
(Hardware)
- Mouse movement.
- Keyboard key press
- Printer running out of paper.
(Software)
- Program run time error.
- Clock reaching specified time.
Process of Interrupt
(1) –The current state of the processor is stored (on a stack).
(2) –A jump is then made to a subroutine that deals with the interrupts.
(3) –The interrupt is processed.
(4) –The previous state of the processor is retrieved (from the stack).
Priority of Interrupt
Where data loss will result a high level of interrupt is allocated.
Where the user is waiting for a response a medium level of interrupt is allocated.
Other cases a low level of interrupt is allocated.
Polling
Polling is the checking by the OS of a number of devices, in turn, to see if they need attention.
Buffers
A buffer is a portion of RAM allocated as a temporary storage while data is being transferred to and from a peripheral. It deals with speed difference between the devices.
Buffer is used when
- There is a speed difference between the computer and the peripheral device.
- Where data needs to be sent in batches rather than one bit/byte at a time.
Example of Buffer
Keyboard Buffer. When a key is pressed on a keyboard an interrupt is generated that places the character into a buffer. Applications take characters from the keyboard buffer when they require input.
A word processor can send data very rapidly to a printer. A printer, since it is mechanical, can only use the data slowly. To free up the word processor a print buffer may be used.
Double Buffering
A single buffer can suffer from buffer underflow which results in pauses. There is also a problem in allowing the memory to be written to whilst it is being read. To avoid this two buffers are used.
By using double buffering a continuous flow of data from the buffer is possible.
Device Driver
Software that converts OS instructions into the actual commands needed by a piece of hardware such as a printer.
Logical device
The way in which a device e.g. hard disc is referred to, it may or may not match the physical hardware. E.g. one physical disc can be partitioned to appear as several discs.
Security
The process of protecting data from unauthorized access or damage.
Weakness of username/password security
- Can be forgotten.
- Obvious password, guessable.
- Using same password on multiple systems
- Can be observed - key logger.
Alternatives to username/password security.
Biometric (additional hardware):
- Retina scan.
- Finger print.
- voice pattern.
Smart card.
Administrator
A user who has full rights on a multi-user computer. They can create and modify other user accounts.
File Protection
Methods of stopping deliberate and accidental access to or damage of a file. It is achieved by access rights.
File encryption
Scrambling the contents of a file in order to make it unreadable by anyone who does not know how to unscramble it.
Access log
A record of what each user has done on a computer. Maintained by OS.