Technical Support Fundamentals - Week 3

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

How long do you have to complete each Qwiklab?

1 hour

The Secure Shell protocols are used in several file transfer mechanisms such as?

1) - Secure copy (SCP), which evolved from RCP protocol over SSH 2) - rsync, intended to be more efficient than SCP. Generally runs over an SSH connection. 3) - SSH File Transfer Protocol (SFTP), a secure alternative to FTP (not to be confused with FTP over SSH or FTPS) 4) - Files transferred over shell protocol (a.k.a. FISH), released in 1998, which evolved from Unix shell commands over SSH 5) - Fast and Secure Protocol (FASP), aka Aspera, uses SSH for control and UDP ports for data transfer.

What is a SSH server?

A SSH is a software program which uses the secure shell protocol to accept connections from remote computers. SFTP/SCP file transfers and remote terminal connections are popular use cases for an SSH server.

What is a Time Slice?

A Time Slice is a very short interval of time that gets allocated to a process for CPU execution.

What is Networking?

A distributed system is a group of processors which do not share memory, hardware devices, or a clock. The processors communicate with one another through the network.

What is another name for virtual machine?

A process VM, sometimes called an application virtual machine, or Managed Runtime Environment (MRE), runs as a normal application inside a host OS and supports a single process. It is created when that process is started and destroyed when it exits.

What is a process?

A process is a program that's executing, like our internet browser or text editor.

What is a program?

A program is an application that we can run, like Chrome.

Which of these are true? Check all that apply. A program is an application that we can run. A process is a program that is executed. A program is initially stored in RAM. A process is initially stored in the hard drive. A program is a process that is executed. A process is a program that we can run. You can have many processes running for one program.

A program is an application that we can run. A process is a program that is executed. You can have many processes running for one program.

What is a Shell?

A shell is basically a program that interprets text commands and sends them to the Operating System (O/S) to execute.

What is a shell is a computer program?

A shell is basically a program that interprets text commands and sends them to the Operating System (O/S) to execute.

What is a virtual machine?

A virtual machine (or "VM") is an emulated computer system created using software. It uses physical system resources, such as the CPU, RAM, and disk storage, but is isolated from other software on the computer. These applications allow you to run multiple VMs on a single computer.

What are the advantage of using Operating System (OS)?

Allows you to hide details of hardware by creating an abstraction Easy to use with a GUI Offers an environment in which a user may execute programs/applications The operating system must make sure that the computer system convenient to use Operating System acts as an intermediary among applications and the hardware components It provides the computer system resources with easy to use format Acts as an intermediator between all hardware's and software's of the system

What is an Operating System (O/S)?

An Operating System (O/S) is the whole package that manages our computer's resources and lets us interact with it.

What is an Operating System (OS)?

An Operating System (OS) is a software that acts as an interface between computer hardware components and the user.

Is android considered a operating system (OS)?

Android is a mobile operating system (OS) based on a modified version of the Linux kernel and other open-source software, designed primarily for touchscreen mobile devices such as smartphones and tablets.

Name some of the popular types of Operating System (OS)?

Batch Operating System. Multitasking/Time-Sharing OS. Multiprocessing OS. Real-Time OS. Distributed OS. Network OS. Mobile OS.

What do you need to do to finish a lab and have your grade posted to Coursera?

Click the red "End Lab" button

What is Communication management?

Coordination and assignment of compilers, interpreters, and another software resource of the various users of the computer systems.

What is Device Management?

Device management keeps tracks of all devices. This module also responsible for this task is known as the I/O controller. It also performs the task of allocation and de-allocation of the devices.

What are Input and Output (I/O) devices?

Devices that perform input and output, are known as I/O devices.

What are the disadvantage of using Operating System (OS)?

Disadvantages of using Operating System: 1) If any issue occurs in Operating System (OS), you may lose all the contents which have been stored in your system 2) Operating system software is quite expensive for small size organizations which adds a burden on them. eg, Windows 3) It is never entirely secure as a threat can occur at any time

True or false: If you have a 32-bit CPU architecture, it's recommended to use a 64-bit operating system.

FALSE - To have better compatibility with your OS and CPU, you should be using the same CPU and OS architecture.

What are the features of Kennel?

Features of Kennel are: Low-level scheduling of processes Inter-process communication Process synchronization Context switching

What are the main components of file management? Check all that apply. File data NTFS Metadata File system

File data Metadata File system

What is the file manager in macOS called?

Finder - The file manager in MacOS is called Finder.

If you want to boot into a USB drive, how do you change your boot settings?

Go into the BIOS settings and change the boot settings - To change any boot settings, you'll need to modify your BIOS settings before the computer loads up the operating system.

What are Features of an Operating System (OS)?

Important features of an Operating System (OS) are: Protected and supervisor mode Allows disk access and file systems Device drivers Networking Security Program Execution Memory management Virtual Memory Multitasking Handling intake & output (I/O) operations Manipulation of the file system Error Detection and handling Resource allocation Information and Resource Protection

What are the other features of OpenSSH?

In addition, OpenSSH provides a large suite of secure tunneling capabilities, several authentication methods, and sophisticated configuration options. OpenSSH is integrated into several operating systems, namely macOS and most Linux operating systems, while the portable version is available as a package in other systems.

How is the CPU able to execute multiple processes at once?

It is done as it executes processes one by one through something known as a time slice.

What is File management?

It manages all the file-related activities such as organization storage, retrieval, naming, sharing, and protection of files.

What is Job accounting?

Keeping track of time & resource used by various job and users.

What are the two main parts that make up an operating system? Kernel and Userspace Users and Software Windows and Mac Kernel and Packages

Kernel and Userspace

What are the two main parts that make up an operating system?

Kernel and user space

What is Memory management?

Memory management module performs the task of allocation and de-allocation of memory space to programs in need of this resources.

Are you able to access your work once you click the "End Lab" button?

NO

What is NTFS (New Technology File System)?

NTFS (New Technology File System) is a proprietary journaling file system developed by Microsoft. Starting with Windows NT 3.1, it is the default file system of the Windows NT family.

What is I/O System Management?

One of the main objects of any OS is to hide the peculiarities of that hardware devices from the user.

What is OpenSSH?

OpenSSH (also known as OpenBSD Secure Shell) is the premier connectivity tool for remote login with the SSH protocol. It is not a single computer program, but rather a suite of programs that serve as alternatives to unencrypted protocols like Telnet and FTP.

How primarily does OpenSSH work?

OpenSSH encrypts all traffic to eliminate eavesdropping, connection hijacking, and other attacks and provides secure networking utilities based on the Secure Shell (SSH) protocol, which provides a secure channel over an unsecured network in a client-server architecture.

What is Process management?

Process management helps OS to create and delete processes. It also provides mechanisms for synchronization and communication among processes.

What is PuTTY?

PuTTY is a free and open-source terminal emulator, serial console, and network file transfer application. It supports several network protocols, including SCP, SSH, Telnet, rlogin, and raw socket connection. It can also connect to a serial port. The name "PuTTY" has no official meaning.

Is PuTTY system specific?

PuTTY was originally written for Microsoft Windows, but it has been ported to various other operating systems. Official ports are available for some Unix-like platforms, with work-in-progress ports to Classic Mac OS and macOS, and unofficial ports have been contributed to platforms such as Symbian, Windows Mobile, and Windows Phone.

What is ReFS?

ReFS is Resilient File System (ReFS), codenamed "Protogon", is a Microsoft proprietary file system introduced with Windows Server 2012 with the intent of becoming the "next generation" file system after NTFS.

Name the tools which can be found in an OpenSSH suite?

Remote operations are done using ssh, scp, and sftp. Key management with ssh-add, ssh-keysign, ssh-keyscan, and ssh-keygen. The service side consists of sshd, sftp-server, and ssh-agent.

What is Security?

Security module protects the data and information of a computer system against malware threat and authorized access.

Which of these are considered I/O devices? Check all that apply. Speakers Monitors Hard disk drives Web cams

Speakers Monitors Hard disk drives Web cams

What are the characteristics of virtual memory? Check all that apply. Stores pages that are currently not in use by physical memory. Allows our computer to have more memory than it physically has. Combination of RAM and hard drive space. It is where we store pages that are being executed

Stores pages that are currently not in use by physical memory. Allows our computer to have more memory than it physically has. Combination of RAM and hard drive space.

What is Secondary-Storage Management?

Systems have several levels of storage which includes primary storage, secondary storage, and cache storage. Instructions and data must be stored in primary storage or cache so that a running program can reference it.

What is the Kernel?

The Kernel controls access to our computer's resources, by handling files, managing file storage, juggling all the different processes running on our computer, and allocating memory.

What is the Bootloader?

The bootloader is a small program that loads the operating system.

What is the cluster size of a ReFS volume?

The cluster size of a ReFS volume is either 4 KiB or 64 KiB.

What is the last step in booting a computer?

The last step in booting a computer is launching the user space, like a login window, GUI, and more.

What are the main components of file management?

The main components of file management are the storage of data, the file metadata, and the filesystem.

What NTFS features are not implemented in ReFS?

The object IDs, 8.3 filename, NTFS compression, Encrypting File System (EFS), transactional NTFS, hard links, extended attributes, and disk quotas

Name the two most popular types of Kernels?

The two most popular kernels are: 1.Monolithic 2. Microkernels

How are the Input and Output (I/O) devices managed?

These Input and Output (I/O) devices are all managed by the kernel, the kernel needs to be able to load up drivers that are used so that we can recognize and speak to these different types of hardware.

What is Command interpretation?

This module is interpreting commands given by the and acting system resources to process that commands.

What command can you use to create a file using bash?

Touch - Use the touch command to create a file using bash.

Which of these represent a GUI? Check all that apply. MS-DOS Terminal Word Application iOS Desktop BASH

Word Application

True or false: It can take some time for the labs to load once you click "start lab."

True

True or false: It can take some time for the working instance of Linux and Windows OS to load.

True

What is Ubuntu?

Ubuntu is a Linux distribution based on Debian and composed mostly of free and open-source software.

SSH is a protocol that can be used for many applications across many platforms such as?

Unix variants (Linux, the BSDs including Apple's macOS, and Solaris), Microsoft Windows

A ______________ is an emulation of a physical machine.

virtual machine - A virtual machine is used to emulate a physical machine.


Set pelajaran terkait

Chapter 13 Transition to Parenthood

View Set

Chapter 49 - Hazardous Materials

View Set

Entrepreneurship Final Exam Study Guide

View Set

Programmering Final Exam fall 2022

View Set

8. THE REFORMATION: ZWINGLI, GREBEL, CALVIN, AND KNOX

View Set