Operating Systems

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Coomand-line and graphical

Two types of user interface

Diagnostic utility

compiles technical information about your computer's hardware and certain system software programs and then prepares a report outlining any identified problems

Booting

is the process of starting or restarting a computer

Plug and Play

means the operating system automatically configures new devices as you install them.

Restore program

reverses the process and returns backed up files to their original form

Spooling

sends print jobs to a buffer instead of sending them immediately to the printer.

file compression utility

shrinks the size of a file(s)

Print spooler

A program called a ______, intercepts print jobs from the operating system and places them in the queue

In most cases, the operating system is installed and resides on the

Computer's hard disk

fault-tolerant computer

Continues to operate when one of its components fails, ensuring that no data is lost A computer with separate processors

Queue

Multiple print jobs line up in a ____

On handheld computers and many mobile devices, the operating system reside on a

ROM chip

embedded operating system

The operating system on most PDAs and small devices, called an __________, resides on a ROM chip. Popular embedded operating systems include Windows CE, Windows Mobile, Palm OS, BlackBerry, embedded Linux, and Symbian OS.

Platform

The operating system that a computer uses sometimes is called the ____

Command-line interface

To configure devices, manage system resources, and troubleshoot network connections, network administrators and other advanced users work with a command line interface a user types commands or presses special keys on the keyboard to enter data and instructions.

Operating systems and utility programs

Two types of system software

Cold boot

When turning on a computer that has been powered off completely, you are performing a

pop-up

ad is an Internet advertisement that appears in a new window in the foreground of a Web page displayed in your browser.

A single user/multitasking operating system

allows a single user to work on two or more programs that reside in memory at the same time

single user/single tasking operating system

allows only one user to run one program at a time. PDAs, smart phones, and other small computing devices often use a single user/single tasking operating system.

Backup utility

allows users to copy, or back up, selected files or an entire hard disk to another storage medium such as CD, DVD, external hard disk, tape, or USB flash drive

System Software

consists of the programs that control or maintain the operations of the computer and its devices. Serves as the interface between the user, the application software and the computer's hardware

User interface

controls how you enter data and instructions and how information is displayed on the screen

Worm

copies itself repeatedly, for example, in memory or over a network, using up system resources and possibly shutting the system down.

computer virus

describes a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission.

multi user operating system

enables two or more users to run programs simultaneously

Trojan horse

hides within or looks like a legitimate program such as a screen saver. A certain condition or action usually triggers the Trojan horse

Stand-alone operating system

is a complete operating system that works on a desktop computer, notebook computer, or mobile computing device.

Virtual memory

is a concept in which the operating system allocates a portion of a storage medium, usually the hard disk, to function as additional RAM.

anti-spam program

is a filtering program that attempts to remove spam before it reaches your inbox

Password

is a private combination of characters associated with the user name that allows access to certain computer resources.

Spyware

is a program placed on a computer without the user's knowledge that secretly collects information about the user, often related to Web browsing habits.

media player

is a program that allows you to view images and animation, listen to audio, and watch video files on your computer.

Performance monitor

is a program that assesses and reports information about various computer resources and devices.

Search utility

is a program that attempts to locate a file on your computer based on criteria you specify

spyware remover

is a program that detects and deletes spyware, adware, and similar programs

adware

is a program that displays an online advertisement in a banner or pop-up window on Web pages, e-mail, or other Internet services. Sometimes, spyware is hidden in adware.

Web filtering software

is a program that restricts access to certain material on the Web

Buffer

is a segment of memory or storage in which items are placed while waiting to be transferred from an input device or to an output device.

Operating System

is a set of programs containing instructions that coordinate all the activities among computer hardware resource. They perform similar functions that include starting ac computer, providing a user, interface, managing programs, managing memory, scheduling jobs, configuring devices, establishing an internet connection, monitoring performance, and providing file management utilities

Driver

is a small program that tells the operating system how to communicate with a specific device

Folder

is a specific named location on a storage medium that contains related documents.

Utility program

is a type of system software that allows a user to perform maintenance-type tasks, usually related to managing a computer, its devices, or its programs.

Image viewer

is a utility that allows users to display, copy, and print the contents of a graphics file.

Screen saver

is a utility that causes a display device's screen to show a moving image or blank screen if no keyboard or mouse activity occurs for a specified time

Personal firewall

is a utility that detects and protects a personal computer from unauthorized intrusions

File manager

is a utility that performs functions related to file management. Some of the file management functions that a file manager performs are displaying a list of files on a storage medium; organizing files in folders; and copying, renaming, deleting, moving, and sorting files

Uninstaller

is a utility that removes a program, as well as any associated entries in the system files.

Kernel

is the core of an operating system that manages memory and devices, maintains the computer's clock, starts applications, and assigns the computer's resources, such as devices, programs, data, and information.

Warm boot

is the process of using the operating system to restart a computer

Memory management

optimizes the use of random access memory (RAM)

antivirus program

protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files.

multiprocessing operating system

supports two or more processors running programs at the same time

Graphical User Interface

you interact with menus and visual images such as buttons and other graphical objects to issue commands

personal computer maintenance

utility identifies and fixes operating system problems, detects and repairs disk problems, and includes the capability of improving a computer's performance

Disk defragmenter

is a utility that reorganizes the files and unused space on a computer's hard disk so the operating system accesses data more quickly and programs run faster.

Disk scanner

is a utility that searches for and removes unnecessary files

Network operating system (Network OS)

is an operating system that organizes and coordinates how multiple users access and share resources on a network.

spam

is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once

Cross-platform program

is one that runs the same on multiple operating systems

Hacker

is someone who tries to access a computer or network illegally. Users with broadband Internet connections, such as through DSLand Internet cable television service, are even more susceptible than those with dial-up access because the Internet connection is always on.

CD/DVD burning software

writes text, graphics, audio, and video files on a recordable or rewritable CD or DVD, including Blu-ray and HD DVD.

Network administrator

the person overseeing network operations, uses the network OS to add and remove users, computers,and other devices to and from the network.

file conversion utility

transforms the contents of a file or data from one format to another


Ensembles d'études connexes

Prep U/ Qs - Chapter 14: Assessing Skin, Hair, and Nails

View Set

Unit 29 - Florida Laws and Rules Pertinent to Health Insurance

View Set

Security Fundamentals Module 8 Review Questions

View Set

Introduction to Cognitive Psychology (Chapter 1- Test Questions)

View Set

P Level 4 Test #1 TPN, IV Solutions, Blood Products.

View Set

Managerial Accounting Final Prep MC

View Set

Chapter 46 - Acute & chronic kidney injury (Med Surg) EAQ's

View Set