System software Flashcards

1
Q

what are the 3 main functions of the operating system

A

provide user interface
load and run programs
manage computers resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

command line interface

A

text based interface
commands typed at command prompt
over 270 commands
in early operating systems (MS DOS)
commands must be entered precisely- difficult to remember
therefore difficult compared to GUI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

GUI

A

graphical user interface
uses WIMP (windows,icons,/mouse control, pull down menus
icons and options represent folders, apps and commands
activated when selected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what activities does the OS control (Resource Management)

A

Input and Output I/O - help user interact w computer
File Management- create,save,delete,move,copy files into 2nd,☁️ed storage
Memory Management- each program has enough memory;no 2 programs use same memory space
Process Management- each process getting enough CPU time to run right

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

drivers

A

link hardware to software so computer can perform tasks when applications need to send instructions to particular hardware device

program that provides OS with info needed for it to work with device

driver software embedded on device, installed together w any application software when device connected to computer for first time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

programming tool

A

computer program used to create programs that work on their own , support other programs/applications and interact with resources on device.
eg IDE (integrated development environment)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IDE

A

integrated development environment
IDE consists of source code editor, compiler/intepreter and other add ons
IDE support multiple programming languages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

game development applications

A

ability to create both 2D and 3D games for multiple platforms
-mobile app development complex- different platforms app should execute

—cross platform mobile app developments—write once,run anywhere (WORA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

source code vs executable code

A

source code- original code written by programmer
.pas/.java

executable code- source code compiled to separate file called object code
.exe (can be executed) .class (cannot be directly executed in windows unless Java Runtime Environment (JRE) is installed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what are utilities

A

provided by system software
help user manage, analyse,maintain, optimise and control computer
available in control panel area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is the control panel

A

program apart of system software that allows user to control operating system and utilities
has programs+features option- allows uninstallation/modification of installed program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

name utilities (8)

A

defragmentation
scheduling tasks
updating
file compression and extraction
archive
backup
install and uninstall software
security-firewall and anti-malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

defragmentation

A

DISK defragmenter
rearranges fragmented data( data stored in multiple locations) on HDD( ONLY) so work can be done more effeciently

time taken depends on size + degree of fragmentation on disk

impossible if not enough space to create copy of files being rearranged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is the purpose of file compression

A

reduces size of files (through advanced programming techniques) so:
-take up less storage space
-transferred more quickly over internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

examples of compression programming techniques

A

WinZip, 7 Zip, WinRAR,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

decompression of extraction

A

extract compressed files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

archiving

A

remove files + store in compresssed separate archive location for space saving+later use

files stay resident w/o being used for long time
causes occupation of necessary space; but files necessary for future

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

backup

A

making copy in case of data loss in separate location [ remote(☁️ storage) , local drives, network drives, external drives)

usually made of data files, can include apps+ OS’s + drives

uses compression or copying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

backup utility options

A

-types of files to be backed up
-how often data is backed up
-whether prev backups should be overwritten
-setting backup schedule from w/in utility
-saving backup settings for future use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

installation software

A

installation program used when new software is installed, to install program so it is ready to use

registry records settings+ changes that affect system when installations take place
installer program- takes care of placing exe files, creating folders for supporting software, registering necessary software in registry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what options does the user have in terms of the way the software products are installed

A

want standard features- typical/standard installation

want to adapt way software installed/change settings- custom installation

want all features- full installation (will take more hardware space than typical installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

product key

A

unique code that ensures licensed software was purchased legally, and is licensed to you

aka activation key/code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

why do you not install license for google+office 365

A

using cloud-based version on internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

uninstall programs

A

safely remove program from computer system by remiving all+updating registry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
scheduling
run programs automatically at specified conditions -allows updates+ process configuration in background while computer runs
26
updating
old-update w service packs (distributed on CD) now- most updating done over internet (scheduled task set to check on vendor update site for available update downloads can choose if updates automatically or should be requested
27
firewall
-set of devices designed to to permit+deny network transmissions based on set of rules - protects networks from unauthorised access+threats from internet -permits legitimate communications only
28
malware
malicious software program/file harmful to computer
29
viruses
-programs illegally loaded onto computer-cause damage to system -can modify themselves-avoid detection -spread from computer via removable media or downloading from internet (infecting files on computer and downloading, attaching to emails, send to email address before internet popular-transferred by inserting infected disk into computer now- internet connectivity commonplace- easier to transmit
30
anti-malware
safeguard from malicious threats prevent malware software from access to computer antivrus software + firewalls
31
software license
legally describes how software can be used+copied protects copyright of software restricts copying of software onto multiple machines
32
license manager
controls software license enforces license terms to protect software vendor from piracy
33
piracy definition
illegal copying of software
34
2 main types of software license
proprietary + free and open source licenses proprietary (owner) does not allow software to be freely distributed/copied (activation/product keys) does not give access to source code restrict user’s use of software eg GNU(general public license)- gives user permission to modify+redistribute software- but obliged to include source code so others may use new improvements therefore produce community that contribute to software product sharing the enhancements eg Linux free and open source license aka copyleft licenses (direct contrast to proprietary) shares source code of software
35
EULA
end user license agreement describes rights bought when software bought
36
creative commons license
keep copyright of your work but allows others to copy and distribute your work as long as acknowledgment given.
37
freeware
copyrighted but given away by author at no cost for user to use,not to resell
38
freemium software
variant of freeware limited functions provided at no cost, additional,advanced features incur cost(license key)
39
user profile
unique includes docs, pictures, desktop
40
anti virus
find signature (identifying piece of code embedded in virus program take appropriate action-delete or quarantine file. should be able to supply features: -update signature database from internet -offering variety of protection categories (network security, email security,computer protection -variety of scanning options - full system,selected drives,individual drives
41
user profile contents
unique profile that includes docs folder,pictures folder,desktop etc username and password customisable desktop theme+structure
42
public profile
docs can be shared by all users
43
desktop
first window that appears after user logs on serves as surface for desk( like top of actual desk) includes taskbar shows programs running and allows to switch between contains start button-access programs,folders,computer settings app can be pinned to taskbar linked to a particular person on OS that uses GUI for each user in multi-user environment
44
why is not advisable to add files and folders to desktop
-login process will be slower if desktop has large files/folders -become cluttered and difficult to locate things (rather leave shortcuts only) - if OS must be reinstalled, user desktop may be deleted ; files+ folders lost
45
what file structure does computer use and why
hierarchical structure necessary for computer to know where files stored orderly and functional
46
hierarchical structure
file structure necessary for computer to know where files are stored drive folder folder folder l folder folder folder highest level is drive(physical hard drive) drive have (any no) immediate child folders folders have sub folders files live in folders- address known as path of file \ \ \
47
File explorer
GUI utility view,edit,save, delete folders/files
48
cloud based storage
extension of secondary storage data stored remotely as opposed to locally storage accessible through internet and apps (google file stream, icloud,dropbox)
49
sharing and permissions cloud based vs local
local-access controlled by default profile settings of OS and administrator sharing+permissions can be set on folders+files exist on multi-user comp. or files on servers connected by network cloud-owner (person who created shared folder) can ads users, can provide editing permission
50
hot swappable
replacement/addition of components successfully w/o restarting computer eg most USB devices
51
spyware
installed secretively on PC to intercept/take partial control of user’s interactions w computer w/o consent eg keystroke-logging program - used to record each keystroke of user on infected computer -transmits data via internet to white collar criminal responsible for creation -criminal reconstructs relevant login data+passwords and gains illegal access to infos (eg bank account)
52
adware
unwanted+annoying software automatically displays/downloads to comp. benign/not harmful software - slow down operation of comp. access cookies,small text files w personal data stored by internet browser (customise adverts according to activity in browser eg pop up windows
53
control panel
program that allows users to control operating system and facilities
54
task manager
program that allows user to manage operating system and utilities
55
spyware
software installed surreptitiously on personal computer to intercept and take partial control over users interactions w/ computer w/o user’s consent
56
keystroke logging
form of spyware that records each keystroke of users infected computer and transmits data via internet to criminals who reconstruct login data and passwords to gain illegal access to information
57
adware
unwanted benign software that autonomy displays/downloads to a computer slows down operation of computer access cookies stored by internet to customise displayed adverts
58
anti virus software
find signature- identifying code embedded in virus program- and take appropriate action (delete/quarantine offending file)
59
plug and play
operating systems detect new hardware as soon as it is connected to computer system driver program installed and settings for device stored on computer
60
BIOS
basic input output system firmware- resides in non volatile ROM chip responsible for POST (power on self test)
61
BIOS process
1. BIOS begins power on self test to check hardware. An inventory of the hardware connected to the computer is obtained from the cmos. the hardware is tested to determine if it is functioning correctly. BIOS locates the mbr (master boot record- section of code stored on hdd and is responsible for loading and executing kernel)
62
kernel
core of computer OS handles memory and peripherals
63
cmos
complementary metal-oxide semiconductor battery backed volatile memory that stores hardware and user settings
64
UEFI
Unified Extensible Firmware Interface replaced BIOS ( cant switch on same computer) more efficient start up system
65
interrupts
signal sent to CPU from hardware or software which indicates the need for the CPUs attention generated, so CPU can be told to switch to a new process so CPU can carry out many different processes without having to run an entire process to completion Software interrupt – generated from programs. Hardware interrupt – signal sent from device each device has unique Interrupt request number (IQ) – CPU identify which device is interrupting it
66
IO range
temporary storage area in RAM used to speed up input from a slow device
67
multitasking
processing technique where CPU appears as it is running several programs at same time system uses interrupts to work on another job CPU switches between very short bursts of processing time
68
multithreading
software technique of running multiple programs w in one task multiple threads running at same time occurs when more than one task is on the same program being carried out
69
translators
Software programming tools that can convert from one code language to another can be interpreter, compiler or assembler
70
high level langauges
Used by programmer Closer to humans than computer high level of abstraction
71
low- level languages
Hardware understands. Closer to computers than humans. machine language- lowest level - binary assembly - slightly easier than machine
72
interpreters
Programme that executes the high level language instructions written by programmer Converts source code to machine code Runs line by line interpreted languages: python, javaScript disadvantages of interpreted languages - must be re-interpreted every time code is ran
73
compilers
transform languages into executable form before running 2 types machine code generation: source code directly into machine code using object code (machine dependent). .exe intermediate representations language interpreted into bytecode which must be further compiled to execute (Java Virtual machine) without re-reading source file
74
plug and play vs hot swappable
Plug and Play technology enables devices to be recognized and configured by the computer automatically, allowing for seamless integration without manual intervention. Hot swapping takes this a step further by allowing devices to be added or removed while the system is running.