C191 small set (mario)

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Error detection service

Determines if a problem has occurred — for example a bit in DRAM spontaneously changed from a 0 to a 1, the contents of a network packet changed during transmission, or a block of data changed between when it was written and when it was read.

Server

In general, any computer, no matter the size, that provides resources to other computers.

Fragmentation

In the context of a hard disk, is a condition in which the contents of a single file are stored in different locations on the disk rather than in a contiguous space

Magnetic Storage Devices

Includes magnetic tape, floppy disks and hard-disk drives.

Aging page replacement algorithm

It does not maintain pages sorted in the exact LRU order, but groups together pages referenced during a period of d consecutive references. Each period is represented by 1 bit in a periodically shifting aging register.

Present Bit

It is a binary flag in each page table entry that indicates whether the corresponding page is currently resident in memory. If a page is resident, then the entry points to the frame that holds the page.

Virtual Memory

It is a collection of one or more logical address spaces, each of which may exceed the size of physical memory

translation look aside buffer

It is a fast and associative It maintains recent translations of logical addresses to frames in physical memory for faster retrieval.

a page frame

It is a fixed-size contiguous block of physical memory identified by a single number, the page frame number.

Partition

It is a logical division of a hard disk that is treated as a separate unit by operating systems (OSes) and file systems

a segment

It is a space identified by a single number, the segment number.

a page table

It is an array that keeps track of which pages of a given logical address space reside in which page frames. Each page table entry corresponds to one page and contains the number or the starting address of the frame containing the page.

segment table

It is an array that keeps track of which segment resides in which area of physical memory. Each entry corresponds to one segment and contains the starting address of the segment.

Thrashing

It is an execution state during which most of the time is spent on moving pages between the memory and the disk while the CPU is mostly idle and no process is making any real progress.

Page Fault

It is an interrupt that occurs when a program attempts to reference a non-resident page. The interrupt triggers the operating system to find the page on disk, copy the page into a frame, and set the present bit to 1.

page fault

It is an interruption that occurs when a software program attempts to access a memory block not currently stored in the system's RAM. This exception tells the operating system to find the block in virtual memory so it can be sent from a device's storage (SSD or HD) to RAM

Referenced bit (r-bit)

It is associated with a page and is set automatically by the hardware whenever the page is referenced by any instruction.

Aging register

It is associated with a page and is shifted periodically to the right by 1 bit. Unless the most significant bit is set to 1, the page is aging in the sense that the associated register value is steadily decreasing.

Virtualization

It is the act of creating the illusion of having one or more objects with more desirable characteristics than the real object. OSs rely on virtualization to create virtual CPUs, memory, I/O devices, and other system components that facilitate the work of programmers and users.

Load control

It is the activity of determining how many processes should be running concurrently at any given time to maximize overall system performance.

Effective access time

It is the average time to access memory in the presence of page faults.

Kernel

It is the minimal set of functions necessary to manage the system resources safely and efficiently

RSA Encryption

It is the most common internet encryption and authentication system. The system used an algorithm that involves multiplying two large prime numbers to generate a public key, used to encrypt data and decrypt an authentication, and a private key, used to decrypt the data and encrypt an authentication. Asymmetric

Page Fault Rate

It is the number of page faults, f, occurring during a number of memory references, t. It can be expressed as P = f/t, where 0 ≤ P ≤ 1. P = 1 means that every memory reference results in a page fault, and P = 0 means that no page faults occur.

Demand Paging

It is the principle of loading a page into memory only when the page is needed, rather than at the start of the execution. And it makes the implementation of virtual memory possible by moving pages to main memory only as needed.

Reference String

It is the sequence of page numbers referenced by an executing program during a given time interval. They are used to compare different page replacement algorithms by counting the number of page faults generated.

Optimal Working Set of a process

It is the set of resident pages that will still be needed in the immediate future and thus should remain resident

preemptive scheduling

It is used when a process switches from running state to ready state or from the waiting state to ready state

Least Recently Used (LRU)

It selects the page that has not been referenced for the longest time.

Replacement Algorithm

It selects the page that will not be referenced for the longest time in the future.

page-fault-frequency replacement algorithm

It takes a direct approach to controlling the page fault rate by adjusting the current resident set based on how frequently consecutive page faults occur.

Working set page replacement algorithm

It uses a trailing window of size d superimposed on the RS to determine the size and composition of the working set at time t.

read-only memory (ROM)

It's a type of computer storage containing non-volatile, permanent data that, normally, can only be read, not written to.

Principle of locality

Locations accessed recently are more likely to be accessed again than locations accessed in the distant past

Trapdoor (aka Backdoor)

Mechanism that bypasses user authentication. Ex: A systems programmer could modify the login utility to accept a specific user without requiring a password, thus permitting unauthorized access to the system at a later time

Swapping

Move between main memory and a backing store. A process may be swapped out to free main memory temporarily and then swapped back in to continue execution.

Abstraction

Programs do not interact directly with hardware allowing different varieties of hardware to all be accessed the same way

Page Fault Consequences

Results in a significant overhead, which increases the average access time to memory.

rotational latency

Rotational latency (in milliseconds) describes the time required to position a specific sector under the read-write head. Average latency is typically given as the time it takes the drive to perform half a rotation of the platter, and is directly dependent on its RPM rating.

Firmware

Storage that is infrequently written to and is nonvolatile. Also Software stored in ROM or EEPROM for booting the system and managing low level hardware.

Kernel Mode

The CPU state where both privileged and non-privileged instructions may be used

User Mode

The CPU state where only non-privileged instructions may be used

del command

The DEL command is used to delete files and directories at the command line.

page-fault-frequency replacement algorithm

1. Add the currently referenced page causing the page fault to the resident set. 2. When the time since the previous page fault is greater than d, remove all pages from the resident set that have not been referenced since the previous page fault.

Storage Manager

A program module that provides the interface between the low-level data stored in the database and the application programs and queries submitted to the system.

Least Recently Used (LRU)

A replacement scheme in which the block replaced is the one that has been unused for the longest time.

System Call

A request from an application for an OS service

Direct Memory Access (DMA)

A resource-conserving and performance-improving operation for device controllers allowing devices to transfer large amounts of data directly to and from main memory.

Deadlock Detection

A set of methods intended to ensure that at least one of the necessary conditions for deadlock cannot hold.

Time sharing (multitasking)

An extension of multiprogramming where the CPU is switched periodically among all active computations to guarantee acceptable response times to each user.

Buffer Overflow

An intrusion technique that exploits the fact that many programs do not check for array overflow, allowing an attacker to overwrite portions of memory beyond the legitimate scope of an input buffer.

Working set page replacement algorithm

Analogous to the forward-looking window of the optimal working set, pages visible in the trailing window belong to the working set.

login spoofing

Approach where a legitimate user presents a fake login screen to an unsuspecting user, who unwittingly supplies a valid login name and password to the imposter program. A possible solution to prevent login spoofing is to display the login screen only after the user has typed in a special character sequence that automatically invokes the OS and which a user program cannot intercept (Ex: CTRL-ALT-DEL).

Working set page replacement algorithm

At each memory reference, it follows the steps: 1. Advance the sliding window by 1 to include the current reference. 2. Keep resident only the pages that appear in the window.

Working Set of a process

At time t, it is the set of pages referenced during the past d memory operations preceding t.

copy command

Command in the command line interface for making a copy of a file and pasting it in another location.

dir command

Command typed in a Command Prompt window to list the directory contents.

Random Access Memory (RAM)

Computer location where instructions and data are stored on a temporary basis. This memory is volatile, rewritable. Can be called Main Memory

disk block

a fixed sequence of bytes on the disk, which can only be accessed as a single unit using low-level read-block and write-block operations

Critical Section

a piece of code that only one thread can execute at a time

Internal Fragmentation

a situation in which a partition is only partially used by the program; the remaining space within the partition is unavailable to any other job and is therefore wasted.

challenge response

a sort of public duel whereby one person offers a word, gesture, question or action and the other must respond in a way that answers in equal measure or ups the ante.

Command Line Interface

a user types commands represented by short keywords or abbreviations or presses special keys on the keyboard to enter data and instructions

wc command

counts lines , words and characters in a file. it can use " -l , -w or -c " to displaay only lines , characters , or words

Global data

data items that are automatically available to all modules throughout the system

A page

is a fixed-size contiguous block of a logical address space identified by a single number, the page number.

Role of operating system

is the software that runs on the bare hardware of a computer and provides essential support for users to develop and use applications in the most efficient and safe manner.

Multi-threaded process

multiple threads within a single process, each having their own program counter, stack and set of registers, but sharing common code, data, and certain structures such as open files.

shared code

one copy of read only code shared among processes

Mainframe

type of computer that Supports a high volume of data processing and the management of a large amount of storage.

Data Encryption Standard (DES)

A cipher (algorithm for doing encryption and decryption) provided by the U.S. National Institute of Standards and Technology (NIST).

Partition

A logical division of a hard disk that is treated as a separate unit by operating systems (OSes) and file systems

Magnetic hard disk

A magnetic disk is a storage device that uses a magnetization process to write, rewrite and access data.

Segmentation and paging

A process address space is broken into VARIABLE sized blocks A process address space is broken into FIXED sized blocks

Advanced Encryption Standard (AES)

A symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES.

Multiprogramming

A technique that keeps several programs active in memory and switches execution among the different programs to maximize the use of the CPU and other resources.

Cache Memory

A type of memory used to temporarily store frequently used data or programs for quick access; similar to RAM but faster.

Graphical User Interface (GUI)

A visual display on a computer's screen that allows you to interact with your computer more easily by clicking graphical elements.

Non-preemptive scheduling

CPU scheduling that occurs when the currently executing process gives up the CPU voluntarily

Denial of service attack

How: Overload of system Effects: Legitimate users can't access systems

Flash Memory

Non-volatile memory that can be read from and written to. It is suitable for secondary storage.

non-contiguous

Not adjacent to one another.

Thrashing

Occurs when too many processes are sharing memory concurrently and no process has enough pages to operate without frequent page faults.

50% rule in external fragmentation

One-third of memory may be lost If the probability of finding an exact match for a request approaches 0, one third of all memory partitions are holes and two thirds are occupied blocks. Formally, n = 0.5 m, where n is the number of holes and m is the number of occupied block

Privileged Instruction

Only the OS kernel is allowed to execute this

Long-term scheduler

selects which processes should be brought into the ready queue

thread

Part of a process that can run concurrently with other parts, a lightweight subprocess. It is a separate path of execution.It is called separate path of execution because each thread runs in a separate stack frame.

Privileged Instruction

Performs critical operations that access I/O devices and the CPU's status and control registers.

System Service

The additional functionality provided by a program that has been incorporated into and started as part of the operating system.

Message Digests

The calculation resulting from a hash function.

Dynamic Random Access Memory (DRAM)

The common version of RAM, which features high read and write speeds.

external fragmentation

The loss of usable memory space due to holes between allocated blocks of variable sizes.

Backing Store

The secondary storage area used for process swapping.

External fragmentation vs internal fragmentation

Total memory space exists to satisfy a request, but it is not contiguous Internal Fragmentation - a situation in which a partition is only partially used by the program; the remaining space within the partition is unavailable to any other job and is therefore wasted.

Embedded Systems

Type of computer that is: -Most prevalent -Real Time -Primitive -Works within time constraints -Could have an OS or not

Kernel

Typically provides the most essential services for memory and device management

logic bomb

Unauthorized code inserted into the system and executed at a specified time to perform some destructive action. The main use of a logic bomb is for blackmail or an act of revenge.

A process

What is a computer program in execution called?

The fourth generation

Which generation of computers were large-scale integrated circuits used to develop personal computers for desktop and laptop operating systems?

Short-term scheduler

selects from among the processes in ready queue, and allocates the CPU to one of them


Kaugnay na mga set ng pag-aaral

ACSR 8 - Commercial Auto Loss Exposures and the Business Auto Coverage Form

View Set

C214 WGU Financial Management End of Section Questions

View Set

Biochemistry of Foods: Vitamins Review Questions

View Set

Silvestri Comprehensive Review for the NCLEX-PN® Exam, 7th Edition - Pain Flashcard Set

View Set

리딩파워 유형편[완성] 10과 2번 해석

View Set

Speech Quiz #2 Lecture Quiz Questions

View Set

Exam 2 Video Questions Intro To Supply Chain

View Set