Section 1

Preview this deck

graceful degradation

Front

Star 0%
Star 0%
Star 0%
Star 0%
Star 0%

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Active users

0

All-time users

0

Favorites

0

Last updated

6 years ago

Date created

Mar 1, 2020

Cards (148)

Section 1

(50 cards)

graceful degradation

Front

The ability to continue providing service proportional to the level of surviving hardware is called

Back

middleware

Front

a set of software frameworks that provide additional services to application developers. supports databases, multimedia, and graphics (to name only a few).

Back

application programs

Front

define the ways in which hardware resources are used to solve users' computing problems

Back

How does software signal an interrupt?

Front

executing a special operation called a system call (also called a monitor call).

Back

user's view

Front

varies according to the interface being used.

Back

What are three main advantages of Multiprocessor systems?

Front

1. Increased throughput. 2. Economy of scale. 3. Increased reliability

Back

Increased reliability

Front

If functions can be distributed properly among several processors, then the failure of one processor will not halt the system, only slow it down.

Back

operating system

Front

a program that manages a computer's hardware. It also provides a basis for application programs and acts as an intermediary between the computer user and the computer hardware.

Back

How is the occurrence of an event signaled

Front

by an interrupt from either the hardware or the software.

Back

device driver

Front

understands the device controller and provides the rest of the operating system with a uniform interface to the device.

Back

How does hardware signal an interrupt?

Front

by sending a signal to the CPU, usually by way of the system bus.

Back

Where is the bootstrap program stored

Front

within the computer hardware in read-only memory (ROM) or electrically erasable programmable read-only memory (EEPROM), known by the general term firmware.

Back

System View

Front

computer's point of view, the operating system is the program most intimately involved with the hardware. In this context, we can view an operating system as a resource allocator.

Back

direct memory access (DMA)

Front

After setting up buffers, pointers, and counters for the I/O device, the device controller transfers an entire block of data directly to or from its own buffer storage to memory, with no intervention by the CPU. one interrupt is generated per block, much faster than sending one interrupt per byte

Back

system daemons

Front

programs that run the entire time the kernel is running.

Back

small computer-systems interface (SCSI) controller

Front

I/O device , seven or more devices can be attached

Back

What are two other names for a multiprocessor system?

Front

parallel systems multicore system

Back

What is the goal of a user view for a user that is sitting in front of a PC?

Front

ease of use, with some attention paid to performance and none paid to resource utilization optimized for the single-user experience

Back

What does the bootstrap program load

Front

The Kernel

Back

device controller

Front

responsible for moving the data between the peripheral devices that it controls and its local buffer storage

Back

store instruction

Front

moves the content of a register to main memory.

Back

control program

Front

manages the execution of user programs to prevent errors and improper use of the computer. It is especially concerned with the operation and control of I/O devices.

Back

What are four components that a computer system can be divided into?

Front

hardware, operating system, application programs, users

Back

asymmetric multiprocessing

Front

in which each processor is assigned a specific task. A boss processor controls the system; the other processors either look to the boss for instruction or have predefined tasks.

Back

What is the hierarchy of storage relating to speed?

Front

registers cache main memory solid state disk hard disk optical disk magnetic tapes

Back

What is the method for handling interrupts quickly?

Front

only a predefined number of interrupts is possible, a table of pointers to interrupt routines can be used instead to provide the necessary speed. table is na array

Back

Where do general purpose computers run programs from?

Front

re-writable memory called main memory (also called random-access memory, or RAM).

Back

volatile storage device that loses its contents when power is turned off or otherwise lost.

Front

volatile storage device that loses its contents when power is turned off or otherwise lost.. Main memory is volatile storage

Back

Switch architecture

Front

one interrupt is generated per block

Back

In addition to the kernel, what are the two other types of programs?

Front

system programs, which are associated with the operating system but are not necessarily part of the kernel application programs, which include all programs not associated with the operation of the system.

Back

What is the goal of a user view for a users that sit at workstations connected to networks of other workstations and servers.

Front

operating system is designed to compromise between individual usability and resource utilization.

Back

Uniform Memory Access (UMA)

Front

the situation in which access to any RAM from any CPU takes the same amount of time

Back

Economy of scale.

Front

can cost less than equivalent multiple single-processor systems,

Back

Hardware

Front

central processing unit (CPU), memory, input/output (I/O) devices —provides the basic computing resources for the system

Back

fault tolerant

Front

can suffer a failure of any single component and still continue operation

Back

secondary storage as an extension of main memory. The main requirement for secondary storage is that it be able to hold large quantities of data permanently.

Front

an extension of main memory. The main requirement for secondary storage is that it be able to hold large quantities of data permanently.

Back

What is the most common secondary storage device for both programs and data?

Front

hard disk drive (HDD)

Back

Increased throughput

Front

The speed-up ratio with N processors is not N, however; rather, it is less than N

Back

What is another name for an operating system?

Front

Kernel

Back

How is symmetric and asymmetric multiprocessing achieved

Front

may result from either hardware or software

Back

bootstrap program

Front

when a computer is powered up or rebooted—it needs to have an initial program to run. This initial program, or bootstrap program

Back

symmetric multiprocessing (SMP)

Front

most common each processor performs all tasks, including operating system functions and user processes. SMP means that all processors are peers; no boss-worker relationship exists between processors.

Back

load instruction

Front

moves a byte or word from main memory to an internal register within the CPU

Back

What semiconductor technology is used for RAM?

Front

dynamic random-access memory (DRAM).

Back

Moore's Law

Front

predicted that the number of transistors on an integrated circuit would double every eighteen months, and that prediction has held true

Back

What is the benefit of having an integrated memory controller with mutliple CPUs?

Front

can increase the amount of memory addressable in the system

Back

What are examples of computers that have little or no user view?

Front

embedded computers in home devices and automobiles may have numeric keypads and may turn indicator lights on or off to show status, but they and their operating systems are designed primarily to run without user intervention.

Back

What is the goal of a user view for a user that is sitting in front of a mainframe or a minicomputer

Front

operating system isdesigned to maximize resource utilization—to assure that all available CPU time, memory, and I/O are used efficiently and that no individual user takes more than her fair share.

Back

system processes

Front

system programs that are loaded into memory at boot time

Back

NVRAM

Front

DRAM with battery backup power. This memory can be as fast as DRAM and (as long as the battery lasts) is nonvolatile.

Back

Section 2

(50 cards)

CPU scheduling,

Front

if several jobs are ready to run at the same time, the system must choose which job will run first.

Back

How does the central procssor read and write data on a von Nuemann architecture?

Front

reads instructions from main memory during the instruction-fetch cycle and both reads and writes data from main memory during the data-fetch cycle

Back

tertiary storage devices

Front

Magnetic tape drives and their tapes and CD and DVD drives and platters

Back

cache

Front

Information is normally kept in some storage system (such as main memory). As it is used, it is copied into a faster storage system on a temporary basis.

Back

symmetric clustering

Front

two or more hosts are running applications and are monitoring each other. This structure is obviously more efficient, as it uses all of the available hardware. However it does require that more than one application be available to run.

Back

job pool

Front

main memory is too small to accommodate all jobs, the jobs are kept initially on the disk This pool consists of all processes residing on disk awaiting allocation of main memory.

Back

What do parallel clusters allow for?

Front

clustering over a wide-area network (WAN). allow multiple hosts to access the same data on shared storage.

Back

blade servers

Front

relatively recent development in which multiple processor boards, I/O boards, and networking boards are placed in the same chassis. The difference between these and traditional multiprocessor systems is that each blade-processor board boots independently and runs its own operating system. Some blade-server boards are multiprocessor as well,

Back

distributed lock manager (DLM)

Front

included in some cluster technology, provides access control and locking when multiple computers data on the same data on shared storage. to ensure that no conflicting operations occur. This function, commonly known as a

Back

What does windows call user identifiers (user IDs)

Front

security ID (SID)

Back

Why is clustering used?

Front

to provide high-availability service—that is, service will continue even if one or more systems in the cluster fail.

Back

What type of computing environment can clusters provide

Front

high-performance computing environments.

Back

BEOWULF CLUSTERS

Front

designed to solve high-performance computing tasks. consists of commodity hardware—such as personal computers—connected via a simple local-area network. No single specific software package is required to construct a cluster. Rather, the nodes use a set of open-source software libraries to communicate with one another

Back

clustered system

Front

which gathers together multiple CPUs. Clustered systems differ from the multiprocessor systems described in Section 1.3.2 in that they are composed of two or more individual systems—or nodes—joined together. Such systems are considered loosely coupled. share storage and are closely linked via a local-area network LAN or a faster interconnect, such as InfiniBand.

Back

What is required of the response time for an interactive computer system?

Front

should be short—typically less than one second.

Back

Multiprogramming

Front

ability of operating system to run more than one program at once. increases CPU utilization by organizing jobs (code and data) so that the CPU always has one to execute.

Back

interrupt driven

Front

. If there are no processes to execute, no I/O devices to service, and no users to whom to respond, an operating system will sit quietly, waiting for something to happen.

Back

Time sharing (or multitasking)

Front

is a logical extension of multiprogramming. In time-sharing systems, the CPU executes multiple jobs by switching among them, but the switches occur so frequently that the users can interact with each program while it is running.

Back

kernel mode.

Front

whenever the operating system gains control of the computer,

Back

What activities is the operating system responsible for in connection with file management?

Front

Creating and deleting files Creating and deleting directories to organize files Supporting primitives for manipulating files and directories Mapping files onto secondary storage Backing up files on stable (nonvolatile) storage media

Back

what does an operating system do?

Front

An operating system provides the environment within which programs are executed.

Back

virtual memory

Front

a technique that allows the execution of a process that is not completely in memory Helps ensure reasonable response time.

Back

array

Front

a simple data structure in which each element can be accessed directly. For example, main memory is constructed as an array.

Back

What happens when a virtual machine manager(VMM) is in control of the system?

Front

has more privileges than user processes but fewer than the kernel.

Back

asymmetric clustering.

Front

one machine is in hot-standby mode while the other is running the applications. The hot-standby host machine does nothing but monitor the active server. If that server fails, the hot-standby host becomes the active server

Back

WORM

Front

write-once, read-many-times storage

Back

What activities is the operating system responsible for in connection with memory management?(3)

Front

Keeping track of which parts of memory are currently being used and who is using them Deciding which processes (or parts of processes) and data to move into and out of memory Allocating and deallocating memory space as needed

Back

Protection

Front

any mechanism for controlling the access of processes or users to the resources defined by a computer system. This mechanism must provide means to specify the controls to be imposed and to enforce the controls.

Back

What type of operating system does a Beowulf cluster usually run?

Front

Linux operating system

Back

parallelization,

Front

application must have been written specifically to take advantage of the cluster, divides a program into separate components that run in parallel on individual cores in a computer or computers in a cluster.

Back

RW

Front

read-write storage

Back

interactive computer system

Front

which provides direct communication between the user and the system

Back

What are some examples of privileged instructions

Front

The instruction to switch to kernel mode I/O control, timer management, interrupt management.

Back

timer

Front

ensure that the operating system maintains control over the CPU. We cannot allow a user program to get stuck in an infinite loop or to fail to call system services and never return control to the operating system A timer can be set to interrupt the computer after a specified period. The period may be fixed (for example, 1/60 second) or variable (for example, from 1 millisecond to 1 second).

Back

swapping

Front

processes are swapped in and out of main memory to the disk. Helps ensure reasonable response time.

Back

What activities is the operating system responsible for in connection with disk management?

Front

Free-space management Storage allocation Disk scheduling

Back

What is an important benefit of SANs?

Front

If the host fails, then any other host can take over.

Back

privileged instructions

Front

designation some of the machine instructions that may cause harm as If an attempt is made to execute a privileged instruction in user mode, the hardware does not execute the instruction but rather treats it as illegal and traps it to the operating system.

Back

What is added to hardware to indicate whether an operating system is in Kernel mod or user mode?

Front

the mode bit, is added to the hardware of the computer to indicate the current mode: kernel (0) or user (1).

Back

file

Front

a logical storage unit The operating system maps files onto physical media and accesses these files via the storage devices.

Back

What is the main advantage of virtual memory?

Front

it enables users to run programs that are larger than actual physical memory. Further, it abstracts main memory into a large, uniform array of storage, separating logical memory as viewed by the user from physical memory. This arrangement frees programmers from concern over memory-storage limitations.

Back

non-uniform memory access (NUMA).

Front

some parts of memory may take longer to access than other parts, creating a performance penalty. Operating systems can minimize the NUMA penalty through resource management

Back

process

Front

A program loaded into memory

Back

I/O subsystem

Front

A memory-management component that includes buffering, caching, and spooling A general device-driver interface Drivers for specific hardware devices

Back

What is used to implement group functionality (user groups with certain permissions)

Front

group identifiers.

Back

list

Front

represents a collection of data values as a sequence. The most common method for implementing this structure is a linked list, in which items are linked to one another.

Back

job scheduling

Front

Time sharing and multiprogramming require that several jobs be kept simultaneously in memory. If several jobs are ready to be brought into memory, and if there is not enough room for all of them, then the system must choose among them.

Back

storage-area networks (SANs)

Front

allow many systems to attach to a pool of storage. If the applications and their data are stored on the SAN, then the cluster software can assign the application to run on any host that is attached to the SAN.

Back

What activities is the operating system responsible for in connection with process management?(5)

Front

Scheduling processes and threads on the CPUs Creating and deleting both user and system processes Suspending and resuming processes Providing mechanisms for process synchronization Providing mechanisms for process communication

Back

trap (or an exception)

Front

a software-generated interrupt caused either by an error (for example, division by zero or invalid memory access) or by a specific request from a user program that an operating-system service be performed

Back

Section 3

(48 cards)

What is an advantage of peer to peer networks over client server networks?

Front

In a client-server system, the server is a bottleneck; but in a peer-to-peer system, services can be provided by several nodes distributed throughout the network.

Back

When a node joins a peer to peer network, how are the services available determined?

Front

When a node joins a network, it registers its service with a centralized lookup service on the network. Any node desiring a specific service first contacts this centralized lookup service to determine which node provides the service. The remainder of the communication takes place between the client and the service provider. An alternative scheme uses no centralized lookup service. Instead, a peer acting as a client must discover what node provides a desired service by broadcasting a request for the service to all other nodes in the network. The node (or nodes) providing that service responds to the peer making the request. To support this approach, a discovery protocol must be provided that allows peers to discover services provided by other peers in the network. Figure 1.19 illustrates such a scenario.

Back

Open-source operating systems

Front

are those available in source-code format rather than as compiled binary code. Linux is the most famous open-source operating system,

Back

What can be a disadvantage of using a list?

Front

performance for retrieving a specified item in a list of size n is linear—O(n), as it requires potentially traversing all n elements in the worst case.

Back

binary tree,

Front

a parent may have at most two children, which we term the left child and the right child.

Back

real-time operating systems

Front

used when rigid time requirements have been placed on the operation of a processor or the flow of data; thus, it is often used as a control device in a dedicated application. Sensors bring data to the computer. The computer must analyze the data and possibly adjust controls to modify the sensor inputs. Systems that control scientific experiments, medical imaging systems, industrial control systems, and certain display systems are real-time systems.

Back

tree

Front

a data structure that can be used to represent data hierarchically. Data values in a tree structure are linked through parent-child relationships.

Back

What class of software does virtualization belong to

Front

Emulation is used when the source CPU type is different from the target CPU type example, when Apple switched from the IBM Power CPU to the Intel x86 CPU for its desktop and laptop computers, it included an emulation facility called "Rosetta," which allowed applications compiled for the IBM CPU to run on the Intel CPU.

Back

What are the 3 types of linked lists?

Front

singly linked list, each item points to its successor doubly linked list, a given item can refer either to its predecessor or to its successor circularly linked list, the last element in the list refers to the first element, rather than to null,

Back

how do you implement a hash map?

Front

One use of a hash function, associates (or maps) [key:value] pairs using, example user name and password

Back

What are the time constraints like on a real time system?

Front

has well-defined, fixed time constraints. Processing must be done within the defined constraints, or the system will fail.

Back

Embedded computers

Front

the most prevalent form of computers in existence. These devices are found everywhere, from car engines and manufacturing robots to DVDs and microwave ovens. They tend to have very specific tasks.

Back

local-area network (LAN)

Front

connects computers within a room, a building, or a campus

Back

queue

Front

a sequentially ordered data structure that uses the first in, first out (FIFO) principle: items are removed from a queue in the order in which they were inserted. ex. jobs that are sent to a printer

Back

network operating system

Front

operating system that provides features such as file sharing across the network, along with a communication scheme that allows different processes on different computers to exchange messages.

Back

What did Sun move to as it's operating system base in 1991?

Front

AT&T's System V UNIX

Back

application-specific integrated circuits (ASICs)

Front

hardware devices that perform their tasks without an operating system.

Back

metropolitan-area network (MAN)

Front

could link buildings within a city.

Back

stack

Front

a sequentially ordered data structure that uses the last in, first out (LIFO) principle for adding and removing items, meaning that the last item placed onto a stack is the first item removed.

Back

GNU/Linux

Front

Linus Torvalds, released a rudimentary UNIX-like kernel using the GNU compilers and tools and invited contributions worldwide. The advent of the Internet meant that anyone interested could download the source code, modify it, and submit changes to Torvalds. Releasing updates once a week allowed this so-called Linux operating system to grow rapidly, enhanced by several thousand programmers.

Back

Cloud computing

Front

a type of computing that delivers computing, storage, and even applications as a service across a network. In some ways, it's a logical extension of virtualization, because it uses virtualization as a base for its functionality.

Back

server systems

Front

Server systems can be broadly categorized as compute servers and file servers: The compute-server system provides an interface to which a client can send a request to perform an action (for example, read data). In response, the server executes the action and sends the results to the client. A server running a database that responds to client requests for data is an example of such a system. The file-server system provides a file-system interface where clients can create, update, read, and delete files. An example of such a system is a web server that delivers files to clients running web browsers.

Back

hash function

Front

takes data as its input, performs a numeric operation on this data, and returns a numeric value. This numeric value can then be used as an index into a table (typically an array) to quickly retrieve the data. used extensively in operating systems

Back

A network,

Front

in the simplest terms, is a communication path between two or more systems.

Back

What is the heavy price of emulation?

Front

Every machine-level instruction that runs natively on the source system must be translated to the equivalent function on the target system, frequently resulting in several target instructions. If the source and target CPUs have similar performance levels, the emulated code can run much slower than the native code.

Back

Originally, who was Sun's SunOS operating system based on?

Front

BSD UNIX

Back

Solaris

Front

the commercial UNIX-based operating system of Sun Microsystems

Back

What is the open source kernel for Mac OS X?

Front

Darwin, Apple uses hybrid approach of open source kernel and closed source system components

Back

closed-source operating systems

Front

Microsoft Windows

Back

Who was BSDUNIX's development slowed by?

Front

a lawsuit by AT&T, but eventually a fully functional, open-source version, 4.4BSD-lite, was released in 1994.

Back

Virtualization

Front

is a technology that allows operating systems to run as applications within other operating systems.

Back

wide-area network (WAN)

Front

usually links buildings, cities, or countries

Back

BSD UNIX

Front

started in 1978 as a derivative of AT&T's UNIX. Releases from the University of California at Berkeley (UCB) came in source and binary form, but they were not open-source because a license from AT&T was required

Back

binary search tree .

Front

requires an ordering between the parent's two children in which left_child <= right_child

Back

The GNU General Public License (GPL) .

Front

codifies copylefting and is a common license under which free software is released

Back

How does a distributed operating system vary from that of a network?

Front

A distributed operating system provides a less autonomous environment. The different computers communicate closely enough to provide the illusion that only a single operating system controls the network.

Back

U.S. Digital Millennium Copyright Act (DMCA),

Front

make it illegal to reverse-engineer DRM code or otherwise try to circumvent copy protection.

Back

in 1983 started the GNU project

Front

Richard Stallman, also formed the Free Software Foundation (FSF)

Back

What are the operations for inserting and removing items from a stack called?

Front

push and pop, respectively

Back

bitmap

Front

is a string of n binary digits that can be used to represent the status of n items suppose we have several resources, and the availability of each resource is indicated by the value of a binary digit: 0 means that the resource is available, while 1 indicates that it is unavailable (or vice-versa). The value of the ith position in the bitmap is associated with the ith resource

Back

What are the 6 different type of cloud computing types available?

Front

Public cloud—a cloud available via the Internet to anyone willing to pay for the services Private cloud—a cloud run by a company for that company's own use Hybrid cloud—a cloud that includes both public and private cloud components Software as a service (SaaS)—one or more applications (such as word processors or spreadsheets) available via the Internet Platform as a service (PaaS)—a software stack ready for application use via the Internet (for example, a database server) Infrastructure as a service (IaaS)—servers or storage available over the Internet (for example, storage available for making backup copies of production data)

Back

personal-area network (PAN) .

Front

devices use wireless technology to communicate over a distance of several feet,

Back

general tree,

Front

a parent may have an unlimited number of children.

Back

distributed system

Front

a collection of physically separate, possibly heterogeneous, computer systems that are networked to provide users with access to the various resources that the system maintains.

Back

hash collision

Front

two inputs can result in the same output value—that is, they can link to the same table location.

Back

augmented-reality applications,

Front

which overlay information on a display of the current environment.

Back

digital rights management (DRM)

Front

copy protection, Operating systems and other programs can limit the ability to play back movies and music or display electronic books to authorized computers.

Back

peer-to-peer (P2P) system model.

Front

clients and servers are not distinguished from one another. Instead, all nodes within the system are considered peers, and each may act as either a client or a server, depending on whether it is requesting or providing a service.

Back