Software Issues Flashcards

(48 cards)

1
Q

What is the OS?

A

The OS is the foundational software layer that manages hardware and software resources and provides common services for programs. It serves as the crucial interface between physical hardware and the end users application software. It has several core functions.

Operating systems coordinates these processes to ensure smooth execution and a fair distribution of resources like CPU time and memory, so that each process gets an appropriate share. This prevents any single process from monopolizing resources and ensures that no process is starved of resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is resource management in the OS?

A

The OS optimally allocates hardware resources such as CPU time, memory space, and input-output channels to various software programs, ensuring efficient system performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is file system management in the OS?

A

Operating systems organize data into files and directories, managing storage space on hard drives and other media. This includes tasks like reading, writing, creating, and deleting files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is process management in the OS?

A

The OS handles process creation, scheduling, and termination, as well as process states like running and waiting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is security and access control in the OS?

A

Operating systems enforce security protocols, manage user permissions, and protect data integrity against unauthorized access or alterations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the interface or UI?

A

The OS provides a user interface, such as a command line or graphical user interface, also known as GUI, that allows users to interact with the system and run applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are applications?

A

Applications, also known as software programs, are sets of instructions that direct a computer to perform specific tasks. These tasks range from simple functions like text editing to complex operations such as data analysis or network management. Applications are built on programming languages and use the operating system as an intermediary to access necessary hardware resources such as the CPU, memory, and network interfaces.

Software programs depend on the OS for three reasons. The OS abstracts the hardware details, providing applications with the standard interface to access hardware resources. And, as you just learned it also manages the allocation and scheduling of cpu time, memory, and storage, balancing the needs of different applications. Furthermore, it provides application programming interfaces, or APIs, for applications to send and receive data over networks, manage files, and communicate with other services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is utility software?

A

Utility software encompasses a variety of programs designed to assist in managing, maintaining, and optimizing computer systems. These tools serve specific functions that enhance the performance, security, and usability of computers. Possible problems with utility software include the following. Some utilities might interfere with the normal operation of other software, particularly if they require deep system access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are drivers?

A

Drivers, essential software components that make communication between the OS and hardware devices possible. Each driver is specifically designed to communicate with a particular device or class of devices, translating general OS commands into device-specific actions that hardware can execute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are (3) common software issues?

A

-Installation
-Compatiblity
-Updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are (3) troubleshooting techniques?

A

-Step-by-step troubleshooting guide
-Built in troubleshooters
-Checking system requirements and compatibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are (4) tools and utlities for troubleshooting?

A

-Task Manager, Resource Monitor, and Activity
Monitor
-Event Viewer and Console
-Linux
-Third-party diagnostic tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are (3) preventative measures and best practices?

A

-Regular updates and patches
-Proper configuration management
-Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define log analysis?

A

Log analysis is a crucial technique in software troubleshooting, particularly in environments that are dependent on Microsoft technologies. Logs, such as event logs, application logs, and system logs offer a deep dive into the workings of software applications and operating systems. They provide essential clues that can help diagnose and resolve a wide range of issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are event logs?

A

The most common type of logs are Windows event logs, which can be accessed using the Event Viewer. This is a built in Windows tool that organizes logs into categories like application, security, and system. To access these logs, you have to navigate to the Event Viewer in Windows. This can be done by pressing the Windows button and R at the same time. Then type eventvwr.msc in the entry field and press Enter. In Event Viewer, logs are systematically organized, making it easier to find the specific logs you need.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are filering logs?

A

Filtering logs are a function is especially important in a Microsoft environment due to the volume of logs that window systems can generate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is an event ID?

A

The event ID, is critical for identifying specific errors and warnings. This ID, along with the error description and faulting module path provided in the details pane, helps in pinpointing the cause of the crash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the Internet Information Services (IIS) log?

A

The Internet Information Services or IIS log, which records all HTTP server communication. Analyzing these logs can provide insights into HTTP errors, user activity, and other web server operations for web applications running on IIS. It is the web server software from Microsoft that hosts web applications and services on Window servers.

To access IIS logs, open File Explorer by pressing the Windows and E keys at the same time. Navigate to the IIS logs directory by entering this file path in the address bar of File Explorer. These logs are not part of Windows event logs and need to be analyzed separately using tools like Log Parser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Log Parser?

A

Log Parser provides universal query access to text-based data such as log files. This command helps identify which pages are throwing server errors, which is a vital step in troubleshooting web applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Go into further detail on advanced log analysis including tools?

A

For advanced log analysis, modern systems often use tools like Microsoft’s System Center Operations Manager, or SCOM, Splunk, and others. These are essential for managing the complexities of large scale or cloud based infrastructures.

SCOM provides comprehensive monitoring across servers and applications, delivering alerts, visual data, and detailed reports to help system administrators manage IT environments proactively.

Similarly, Splunk offers extensive log management and analysis capabilities, enabling you to search, monitor, and analyze big data with real time processing.

This is crucial for generating actionable insights through graphs, reports, and dashboards. These advanced tools are critical for maintaining operational efficiency and quickly addressing system issues.

21
Q

What are some (5) software issues and their causes?

A

-Operating system compatibility
-Hardware limitations
-Software dependencies
-Cross-platform operation
-User interface inconsistencies

22
Q

What are (5) ways to resolve compatibility issues?

A

-Compatibility testing
-Use of virtualization and emulation tools
-Regular dependency updates and management
-Version control systems
-Compatibility layers and shims

23
Q

What are (6) ways to manage software updates?

A

-Automated testing
-Staged rollouts
-User feedback systems
-Professional development
-Critical update alerts
-Version compatibility checks

24
Q

What are (5) benefits of effective compatibility and update management?

A

-Improved security
-Enhanced performance
-Extended software lifecycle
-Patch management policies
-Better user satisfaction

25
What is BIOS?
The basic input output system commonly referred to as BIOS, initializes hardware during the boot process and provides essential runtime services.
26
What is firmware?
Firmware, on the other hand, refers to the specialized software permanently installed in hardware. A computer's operating system is a core layer of software that coordinates computer hardware and software resources offering essential services for applications.
27
what is boot failure?
Boot failure, which occurs when the computer fails to boot into the operating system due to various reasons. Misconfigured BIOS settings such as incorrect boot order can prevent the system from detecting the bootable drive. Faulty hardware, such as malfunctioning hard drives or defective RAM modules, can also disrupt the boot process. Additionally, corrupted boot files on the storage device can make it impossible for the computer to locate the operating system.
28
What is BIOS corruption?
BIOS corruption, renders the system unbootable. A corrupted BIOS typically shows itself through power-on self-test, or POST errors, or the system continuously rebooting into it. Power surges, failed updates, and malware infections can damage the BIOS firmware. Recovery methods include using backup BIOS features provided by modern motherboards, updating the BIOS from a USB drive, or employing specialized recovery tools to restore the firmware.
29
What is CMOS battery failure?
CMOS battery failure. CMOS stands for complimentary metal oxide semiconductor. This battery powers a small memory chip that stores BIOS settings, ensuring they persist even when the computer is powered off. When the battery fails, the BIOS reverts to its default settings, which might be incompatible with the system configuration. This can prevent booting or lead to inaccurate system time. Replacing the CMOS battery is usually a straightforward task, restoring the retention of customized BIOS settings.
30
How do firmware updates work?
Updates enhance system performance, fix bugs, and introduce new features. However, incorrect or interrupted updates can destabilize the system or worse, break the device, rendering it unusable. To prevent problems, it is crucial to adhere carefully to the manufacturer's update guidelines and ensure stable power during the update process. If an update fails, recovery often requires manually updating the firmware again or seeking help from a specialist.
31
What is slow loading?
Slow loading happens when web pages take longer than expected to show content, and it's different from overall slow browser performance. It can result from unoptimized images, inefficient code, and excessive advertisements, impacting user experience and requiring optimization techniques for improved page load times.
32
What are (3) causes of slow loading?
-Unoptimized images -Inefficient code -Excessive advertisements
33
What are (3) solutions to slow loading?
-Image optimization -Code optimization -Ad management
34
What is an expired SSL certificate?
When an SSL certificate expires, browsers flag the website as insecure. This often results in users seeing a "Not Secure" warning message, which signifies that the website cannot establish a secure connection. Such warnings create a sense of distrust among visitors, leading them to abandon the site out of fear of having their data compromised.
35
What are the (3) technical issues with expired SSL certificates?
-Encryption failure -Man-in-the-middle (MitM) attacks -Decreased SEO rankings
36
What are the (3) technical solutions with expired SSL certificates?
-Monitoring systems -Automated renewals -Certificate management platforms
37
what is a broken link?
Broken links occur when a webpage's URL is altered or deleted, leading to "404 Not Found" errors.
38
What are (4) causes of broken links issues?
-Website restructuring -Content removal -Typos and misconfigurations -Expired external links
39
What are (5) solutions to broken links issues?
-Regular link audits -Redirects -Custom 404 pages -Content Management Systems (CMS) -Backlink monitoring
40
What does reduced browser performance include?
Reduced browser performance can stem from various factors, distinct from slow loading times. It often involves issues like excessive cached data, memory-hogging extensions, and software conflicts that collectively impact browsing speed and responsiveness.
41
What are the (5) causes of reduced browser performance?
-Excessive cached data -Excessive extensions -Too many open tabs -Memory leaks -Software conflicts
42
What are (5) solutions of reduced browser performance?
-Clear cache regularly -Optimize extensions -Manage tabs efficiently -Update software -Reset browser settings
43
What are pop-ups and trackers?
Pop-ups, ads, and trackers are intrusive elements embedded within websites to display advertisements or monitor user behavior. They can disrupt browsing experiences and compromise privacy, necessitating tools and settings to block or manage them effectively.
44
What are the (4) causes of pop-up/tracker issues?
-Embedded scripts -Tracking pixels -Third-party cookies -Malicious software
45
What are the (6) solutions to pop-up/tracker issues?
-Enable pop-up blockers -Use privacy-oriented extensions -Browser privacy settings -Disable JavaScript -Regular security scans -Private browsing modes:
46
what are language and region setting issues?
Language and region settings issues affect how web content is displayed and accessed, potentially leading to mismatches in language preferences or region-specific content. Addressing these issues involves configuring browser and operating system settings to align with user preferences and ensuring consistent application behavior across different locales.
47
What are the (4) causes of language and region setting issues?
-Incorrect language display -Region-specific content mismatch -Search engine misdirection -Locale-based behavior issues
48
What are the (5) solutions to language and region setting issues?
-Browser language settings -Operating system locale settings -Region settings in online accounts -Manual language selection -Clear cache and cookies