CIS 230 Test 3

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

______ is an Application layer protocol that manages the dynamic distribution of IP addresses on a network. _____ allows automatic IP addresses and subnet mask assignment. It is an automated means of assigning a unique IP address to every device on a network.

DHCP (Dynamic Host Configuration Protocol)

A name server keeps the entries for each domain name that it knows about in a ____.

DNS record

__________is a client/server computing environment that uses SQL to retrieve data from the server.

Database management system (DBMS)

The ______ is a type of client network software that is associated with drive mapping. It exchanges a locally mapped drive letter with the correct network address of a directory share.

Designator

___ _____ ____ is a hierarchical way of tracking domain names and their addresses, devised in the mid-1980s.

Domain name system

_____ is a gateway that translates e-mail messages from one type of system to another.

E-mail gateway

Port Numbers FTP - Telnet - SMTP - HTTP -

FTP 21, Telnet 23, SMTP 25, HTTP 80

_______ processes require I/O operations with very little CPU processing.

I/O BOUND

_____ is a gateway that establishes and manages communication between a PC and an IBM mainframe computer.

IBM host

A(n) _____ is a logical address assigned to a device on a TCP/IP network.

IP address

A(n)____ is a unique 32-bit number consisting of 0's and 1's divided into four groups of octets (8-bit bytes) which are separated by periods, i.e., 10010001.11000011.00001111.10101001.

IP addresses

_____ is a gateway that allows and manages access between LANs and the Internet.

Internet gateway

In addition to a well-defined set of proper system backup and file maintenance procedures, ____________ extend this protection to include automated file recovery procedures in the event of a disk crash or system failure during file access operations.

Journaling File Systems

______ is a gateway that allows segments of a LAN running different protocols or different network models to communicate with each other.

LAN gateway

The _____ is the local address or physical address that is permanently embedded in a NIC. It uniquely identifies a device on a LAN. The physical address is expressed as six pairs of hexadecimal numbers and letters. An example is 00-A0-CC-E0-98-F1.

MAC address

All hosts on the same network must communicate by their _____, which are managed by the Data Link layer protocol that controls the network.

MAC addresses

Just like bridges, switches keep tables of the _______ of all the devices connected to the switch. Switches use these forwarding tables to determine which path to use when sending packets on the network.

MAC addresses

__________ is one of many operating systems built on the Mach microkernel. New features can be added easily without compromising the system.

Macintosh OS X

_________is the planned organization of programs and data into memory.

Memory management

________ allows an organization to use private IP addresses while their computers are connected to the Internet.

Network Address Translation (NAT)

_____ blocks are scattered all over the disk or tape.

Noncontiguous

_________ systems will allow a running process to continue running until it is completed or blocked.

Nonpreemptive

The _______ is a type of client network software that operates on both the server and the client at the presentation layer of the OSI model. It routes resource requests to the appropriate computer(s) or directly to a peripheral device. It is a very important component of the client network software.

Redirector

4 steps of the DHCP leasing process

Request Offer Select Acknowledge

The preferred method of interconnection of Linux computers and Windows computers on the same network is by adding ______ to Linux servers. This is an open-source server-based solution that allows a Linux machine to masquerade as a native Microsoft network server using Server Message Block (SMB).

Samba service

The __________ is the software installed on servers that handles resources and services to be distributed to clients. It allows the sharing of resources and provides data privacy and protection.

Server Network Software

______ is a method of switching on a LAN in which the switch reads the entire data frame into its memory and checks it for accuracy before transmitting it. It therefore transmits data more accurately.

Store and forward

_________is a standard database query language designed by IBM.

Structured Query Language (SQL)

T/F. When a browser wants to access a Web server, it uses the address and port of the Web server to make a request to the operating system

True

_____ are a means by which a switch can logically group a number of ports into a broadcast domain.

VLANS

________ is the near universally accepted solution to the problems inherent in memory management.

Virtual storage

Octet range: A - B- C-

a - 1-126 b - 128-191 c - 192-223

host addresses per network: a - b - c -

a - 16 million b - 65,000 c - 254

An _____ is a stream of bytes that describe some aspect of the file.

attribute

A(n)_____ is the server that has the most current information about a domain name.

authoritative name server

The state transition, when a process requires I/O is known as _____ and the process remains in this state until its I/O requirement is complete.

blocking

A ____, a device used to expand network capabilities, has a single input and single output port. It can interpret the data that it retransmits. It works at the _____layer of the OSI model.

bridge, Data Link

_____ are transmissions to all stations on a network.

broadcasts

The spawned process is known as a _____.

child

In data communication terminology, the application program acts as a _____, requesting displays services that it needs from the display server.

client

Operating system services outside the essential functionality are performed by programs in user mode. Each program acts as a server that performs specific operating system program tasks upon request of application programs as well as other operating system programs, the clients in this model. Clients request services by sending messages directly to the microkernel. The microkernel passes the messages to the appropriate server, which performs the required function and replies to the request by sending a message back to the client.

client/server model

The _____ is the smallest unit that the file management system can store or retrieve in a single read or write operation.

cluster

A _______ is a logically or physically distinct Ethernet network segment on which all participating devices must detect and accommodate data collisions. Because a switch limits the number of devices in this domain, it limits the potential for collisions.

collision domain

The file management system provides a ______ view of files across different I/O devices.

consistent

The dispatcher is also responsible for the actual transfer of control to the process that is being dispatched. This responsibility includes preservation of the previous running program's program counter, register values, and other parameters that represent the state of the program at the time it was stopped, as well as restoration, if necessary, of the exact previous state of the program being dispatched. This operation is called _____.

context switching

Every device has a______which is the gateway that first interprets its outbound requests and last interprets its inbound requests to and from other subnets.

default gateway

Ultimately, it becomes necessary to reorganize the space periodically to eliminate the fragments by collecting them together to form one new, usable space. This operation is called _______.

defragmentation.

The ______ provides a means of organization so that files may be located easily and efficiently in a file system. It provides the linkages between logical files identified by their names and their corresponding physical storage area.

directory structure

If there are multiple processors or a cluster under the operating system's control, the OS is responsible for ______a process to run on each available CPU.

dispatching

Moving from the ready state to the running state is called ______ the process.

dispatching

____ is responsible for the actual selection of processes that will be executed at any given instant by the CPU.

dispatching

X Window works by separating the software that actually produces the display image on the screen from the application program that creates the image and requests the display into a client-server arrangement. The program that produces the image on the screen is known as a ________.

display server

A ______ is a symbolic name that identifies an organization. They must be registered with the Internet naming authority, ICANN.

domain name

_______ are servers that contain databases of names and their associated IP addresses.

domain name servers

Every _____ is treated as a process. This includes not only application programs, but the programs within the operating system itself.

executing program

A ____ is an organized collection of data.

file

The ________ system provides and maintains the mapping between a file's logical storage needs and the physical location where it is stored.

file management

The _____________keeps track of free secondary storage space and maintains the file system and its directories.

file management system

Creating a new process from an older one is commonly called ______ or ______ a process

forking or spawning

______ occurs when a file is deleted or moved.

fragmentation

Assume that memory is divided into blocks called _____. They are all the same size.

frames

A ______ file system provides the additional ability to recover unsaved data and to write it to the proper file location, guaranteeing data integrity as well as file system integrity. Current examples of this type of a journaling file system include IBM JFS, Silicon Graphics XFS, and Linux ext3 and ext4.

full journaling

The_________ of any operating system is to load and execute programs.

fundamental purpose

A _____, a device used to expand network capabilities, translates information between protocols or between completely different networks, such as from TCP/IP to SNA. They can change the actual format of the data and actually repackage information so that it can read by another system. It operates at the ______ of the OSI model.

gateway, upper layers

______ page replacement selects pages from any process in the system. This type of replacement affects the working set size of different processes and must be managed carefully.

global

A ____ is any computer or any device with a network adapter that is connected to the network using the TCP/IP protocol suite.

host

A _____ is a symbolic name that describes a TCP/IP device.

host name

The _____ of an IP address is unique.

host portion

A____, a device used to expand network capabilities, is a multiport repeater containing one port that connects to a network's backbone and multiple ports that connect to a group of workstations. It operates at the _____ layer of the OSI model. It typically supports a ____ topology on an Ethernet network.

hub, physical layer, star topology

In the basic design of virtualization, an additional layer, called a _________, separates one or more operating systems from the hardware. It may consist of software or a mixture of software and hardware, if the CPU provides hardware virtualization support. Most recent CPUs do provide this type of support.

hypervisor

The directory entries in a UNIX/Linux system each contain just the name of the file plus a single pointer to an index block called a(n) ____. It contains the index pointers and also the attributes of the file.

i-node

Indexed allocation is similar to linked allocation with one major difference. The link pointers for a file are all stored together in one block, called a(n) _____.

index block

There is a separate _____ for each file.

index block

The ________ system provides device drivers that actually control the transfer of data between memory and the secondary storage devices.

input/output

The memory resident components of an operating system are commonly known as the _____ of the operating system.

kernel

A___ is an agreement between the DHCP server and client on how long the client will borrow a DHCP-assigned address.

lease

_______ page replacement selects pages to be replaced from the same process.

local

The way the user views the file is describing the file _____

logically

The ______ is an IP address reserved for communicating from a host to itself, which is useful for troubleshooting. The value is always 127.0.0.1.

loopback

The page tables reside in ____.

memory

The purpose of the __________ system is to load programs and program data into memory in such a way as to give each process everything that it requires for execution.

memory management

The __________ maintains the page tables for each program.

memory management software

One of the advantages of the _____ configuration is that it is possible to create different operating system designs simply by changing the service programs that reside outside the _______, while maintaining the security and stability of the _______.

microkernel

The _____ configuration constitutes a client-server system, where clients and servers reside on the same system.

microkernel

The __________ is an extremely small and simple multitasking system with many of the important internal features of larger systems.

miniature operating system (MINOS)

Nearly every modern operating system provides means and support for manipulating multiple programs on a single CPU, a technique known as ____.

multitasking

_____ are the databases of information needed to resolve domain names and IP addresses.

namespaces

The _____ of an IP address is common to all nodes on the network. It indicates whether the device belongs to a Class A, B or C network.

network portion

A ____ is any computer or any device with a network adapter that is connected to the network.

node

Commands that are loaded only as they are needed are called _________ commands.

non-resident commands

In _________ multitasking, the application voluntarily gives up control of the CPU or is I/O bound.

nonpreemptive/cooperative

The ______ of X Window is to produce as much of the display as possible using software located at the display and to minimize the amount of image data to be transmitted.

objective

An ______ may be defined as a collection of computer programs that integrate the hardware resources of the computer and make those resources available to the user, in a way that allows the user access to the computer in a productive, timely and efficient manner.

operating system

If a host does not know the MAC address of another host on a local area network, it uses the ______ to discover the MAC address.

operating system

If a page table entry is missing when the memory management hardware attempts to access it, the fetch-execute cycle will not be able to complete. In this case, the CPU hardware causes a special type of interrupt called a _____ or ______. This situation sounds like an error, but actually it isn't. This concept is part of the overall design of virtual storage.

page fault or page fault trap

If every memory frame is already in use, the software must pick a page in memory to be replaced. If a page being replaced has been altered, it must first be stored back into its own image, before the new page can be loaded. The process of page replacement is also known as _______.

page swapping

For each process, the operating system creates a _______, which keeps track of the corresponding frame location in physical memory where each page is stored. There is one entry in the table for each page in a program. The entry contains the page number and its corresponding frame number.

page table

With virtual storage, each process in a multitasking system has its own virtual memory and its own ______.

page table

Assume that the program is divided into blocks called ______. They are all the same size.

pages

The primary method of implementing virtual storage is called ____.

paging

The spawning process is called a _____.

parent

A disk drive may be divided into independent sections called_____, each with their own directory structure. They can also extend over the physical disk drive boundaries to include parts of two or more physically separate disk drives.

partitions

The _____ view of a file represents the way the data is actually stored on a disk. It is a collection of bits stored in blocks. Usually, the blocks are of a fixed size of 512 bytes.

physical

___________ is shared among all of the active processes in a system. There is a limited amount of _____available.

physical memory

List two types of user interfaces discussed in the notes.

1) GUI (graphical user interface) and the 2) CLI (command line interface)

There are ten major building blocks of an operating system to be considered, not all of which will necessarily be found in any one particular operating system.

1) The command processor, application program interface and user interface 2) The file management system 3) The input/output control system 4) Process control management and interprocess communication 5) Memory management 6) Scheduling and dispatching 7) Secondary storage management 8) Network management, communication support and communication interfaces 9) System protection management and security 10) Support for system administration

State two components of a Client/Server SQL environment.

1. Application (front end, or client) 2. Database server (back end, or server)

Two methods of implementing the Client/Server Environment.

1. Single database server 2. Multiple database servers (distributed or multi-tiered database)

Default Subnet masks A - B - C -

255.0.0.0 255.255.0.0 255.255.255.0

A ____ is a number used to address software or services running on a computer. It is a number between 0 and 65,535 that identifies a program running on a computer.

port

________ systems will limit the time that the program remains in the running state to a fixed length of time corresponding to one or more quanta.

preemptive

A network that supports DNS has two or more name servers, called the____ name server and ____ name server. The ____ server gets its information from the ____ server, and is sometimes called the slave name server.

primary, secondary

A _____ is an executing program. It is considered the standard unit of work within a computer system. It is defined as the program, together with all of the resources that are assigned to it including memory, I/O devices, time for execution, etc.

process

State the two major types of interface designs.

CLI - Command Line Interface • command prompt GUI - Graphical User Interface • Apple Macintosh, Windows, Sun workstations, most versions of Linux

_____ processes require extensive amounts of CPU time.

CPU-BOUND

A class ___ network is used by a few networks with a very large number of hosts per network.

Class A

A class ____ network is used by moderate-size networks with a moderately large number of hosts per network.

Class B

A class ___ network is used by a very large number of networks with just a few hosts per network.

Class C

__________ is a type of software installed on a workstation computer that enables the workstation to use network resources.

Client Network Software

A______ is defined to include a program together with all the system resources that are associated with that program as it is executed. Those resources may include I/O devices that have been assigned to the particular process, keyboard input data, files that have been opened, memory that has been assigned as a buffer for I/O data or as a stack, memory assigned to the program, CPU time, and many other possibilities.

process

To the operating system, the basic unit of work is a _____.

process

Each process control block contains a process identification name or number that uniquely identifies the block. In Linux, the process identification number is known as a ______ (PID).

process identifier

A _____ _____ is a computer, router or other device that acts as an intermediary between another computer and the Internet. It substitutes its own IP address for IP address of computer on the network making a request, so all traffic over the Internet appears to be coming from only this one IP address.

proxy server

Once a process has been created and admitted to the system for execution, it is brought into the _____, where it must compete with all other processes in this state for CPU execution time. Being in this state simply means that a process is capable of execution if given access to the CPU.

ready state

A _____, a device used to expand network capabilities, accepts a digital signal, cleans it, regenerates it and sends it down the line. It increases the length of the network by eliminating the effect of attenuation. It is suitable to ____ topology networks only. It operates at the _____ layer of the OSI model without concern for type of data being transmitted, packet address or protocol used.

repeater, bus topology, Physical layer

Some commands are built directly into the operating system. They remain in memory for immediate access. These are known as _________ commands.

resident commands

____ are any hosts on the Internet that need to look up domain name information. They are computers searching for the IP address for a domain name.

resolvers

The transition from the suspended state to the ready state is known as ______. Some operating systems will also swap out a suspended process from memory to secondary storage when the system becomes overloaded and will swap it back in when the load is lighter. Particularly in small systems, the use of swap files for this purpose is common. (swapping files)

resumption

Network Solutions maintains servers called _____ that act as the highest level of authority when locating domain name information.

root servers

The function of a _____ is to connect dissimilar networks. It interprets network layer information. It determines the best path for data to follow from point A to point B. It reroutes traffic if a primary path is down and another path is available.

router

A _____, a device used to expand network capabilities, is a multiport device that can connect dissimilar LANs and WANs running at different transmission speeds and using a variety of protocols. It will ______ the data into different frames. It operates at the______ of the OSI model.

router, repackage, Network layer

_____ are reference tables that include network information (IP addresses) and the next router in line for a particular path.

routing tables

At some point in time, presumably, the process will be given time for execution. The process is moved from the ready state to the _______.

running state

With a virtual machine, a user can operate in a _______. It is a user environment in which all activity is confined to it.

sandbox

A _________ multivendor solution is to load software on the server to provide a service to each particular client.

server-based

The ____________ is installed on a Windows server and allows Macintosh clients to access the network. This service automatically converts files to Macintosh format when retrieving them from the server.

services for macintosh

A __________ file system protects the integrity of the file system structure, but cannot guarantee the integrity of data that has not yet been written to the disk. The disk is simply restored to its pre-failure configuration. It is able to recover all of the file system metadata, but does not recover current data that had not yet been saved when the failure occurred. The Windows NTFS file system is an example of this type of a journaling file system.

simple journaling

A ____ is a logical address assigned to a specific process running on a computer. Its address combines the computer's IP address with the port number associated with a process. It forms a virtual connection between the host and client.

socket

________ is a situation that occurs when a process is never given the CPU time that it needs to execute.

starvation

A _____ is a special 32-bit number that, when combined with a device's IP address, informs the rest of the network about the network class to which the device is attached.

subnet mask

Some processes make heavy demands on particular resources, i.e. a disk drive, a printer or the CPU, in such a way that other processes are unable to complete their work in an efficient manner. In this case, the operating system may place a process in a __________ until the required resources can be made available.

suspended state

However, unlike a bridge, a _____ passes a packet only to its destination segment instead of to all segments other than the one from which the packet originated. As far as a host is concerned, it is not aware that a bridge or _____ exists in the network.

switch

A ____, a device used to expand network capabilities, subdivides a network into smaller logical pieces. It can open and close electrical circuits, complete or break an electrical path, and select paths or circuits. It works at the _____ layer of the OSI model. It can interpret MAC address information. It is ____.

switch, data link, multiport

A _____represents a piece of a process that can be executed independently of other parts of the process.

thread

The transition from the running state to the ready state is known as ________

time-out

The technique of switching rapidly between two programs executing a few instructions from each is called ____.

time-slicing

The most obvious function of the ______ is the execution of programs

user interface

The primary purpose of the ________ is to make the facilities of the computer system accessible to the user by providing the necessary services and commands and means of access to allow the user to get his/her work done conveniently and efficiently.

user interface

A secondary purpose of the _________ in an operating system is to provide______ to application programs that assure different programs have user interfaces that operate in the same way. We identify programs that use the operating system to provide similar interfaces as having a ___________.

user interface, common look and feel.

The second category of ______ is commands for the storage, retrieval, organization and manipulation of files.

user services

The individual virtual simulations that result are called ______.

virtual machines

The concept of ______ allows the system to extend the address space far beyond the actual physical memory that exists.

virtual storage

________ is a method of utilizing memory which includes hardware support for sophisticated memory management capability. It creates the illusion of a memory space that is potentially much larger than the actual amount of physical memory installed on the system. It is hard drive space that acts like memory.

virtual storage

It is possible to use a powerful computer to simulate a number of smaller computers. This process for doing so is called _______.

virtualization

In many computer systems, the file system for each partition or device is called a ____.

volume

When the I/O operation is complete, the operating system moves the process from the blocked state back to the ready state. This state transition is frequently called ______.

wake-up

A ______ is a portion of the screen that is allocated to the use of a particular program, document or process.

window

When the display terminal is separated by a distance from the computer, the graphical interface is more difficult to achieve. The difficulty is the large amount of data that must be transmitted from one location to the other to transmit graphic images. We observed that a single bit-mapped graphical image might contain thousands or millions of bytes of information. Clearly, it is not practical to transmit all this data on a continual basis. The _______standard is an attempt to solve this problem.

x window

The group of networks for which the name server is responsible collectively is called the name server's ____.

zone

____ blocks are stored together.

Contiguous

______ is a method of switching on a LAN in which the switch reads a frame's header and decides where to forward the data before it receives the entire packet. It will only read the header and no error checking is done. On the other hand, this method can detect runts, or packet fragments. These switches cannot detect corrupt packets.

Cut-through mode


संबंधित स्टडी सेट्स

Chapter 7 Distribution of Sample Means

View Set

Assessment Related to Hygiene and Personal Care

View Set

Upper & Lower Limb - BRS and Lippincotts

View Set

CHAPTER 12 EXCEPTIONS HANDLING OVERVIEW

View Set