Computer Systems: Chapter 5 (Computer Software) Flashcards

1
Q

What is the bootstrap loader?

A

The bootstrap loader is a program held in ROM that loads the operating system when the computer is switched on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 6 main functions of a single user operating system?

A
  • Interpreting user commands
  • File management
  • Memory management
  • Input/Output management
  • Process Management
  • Resource allocation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the Computer Language Interpreter? (CLI)

A

The CLI is the outer layer of the operating system, which the user interacts with in order to give instructions to the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the File Management System? (FMS)

A

The FMS is the second layer of the operating system, and it organises and tracks files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the functions of the File Management System (FMS)? (2)

A
  • Maintaining a directory which keeps track of where files are stored
  • Providing a connections between the user’s logical view of the files and the actual physical location of the files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the Memory Management System? (MMS)

A

The MMS is the third layer of the operating system, and controls where programs and data are placed in memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the functions of the Memory Management System (MMS)? (2)

A
  • Monitoring the use of memory

* Freeing memory locations where data is no longer needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Input/Output Management System? (BIOS)

A

The BIOS is the fourth layer of the operating system, and it communicated directly with the peripherals and handles the transfer of data between the peripherals and the processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the functions of the Input/Output Management System (BIOS)? (2)

A
  • Data buffering to regulate the speed between the processor and main memory
  • Detecting errors such as mechanical or electrical faults
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Process Management?

A

Managing processes takes place in the Kernel, which is the bottom layer of the operating system. The Kernel manages processes and handles any interrupts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the functions of the Kernel (Process Management)? (2)

A
  • Schedules CPU time

* Maintains the integrity of the process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Resource Allocation?

A

Resource Allocation is the way of managing which resource is available for use at any one time by a process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Utility Program?

A

A Utility Program is a program designed to carry out .specific tasks related to the management or maintenance of a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are examples of Utility programs? (3)

A
  • Virus Checker
  • Disk Editor
  • Disk Defragmenter
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Virus Checker?

A

A Virus Checker is a program that can detect a virus infection and remove it from a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Disk Editor?

A

A Disk Editor is a program that allows the user to get rid of any unnecessary files that clutter up a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a Disk Defragmenter?

A

A Disk Defragmenter is a program that rearranges the contents of the hard disk so that data blocks that make up files are next to each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are 2 advantages of using a Disk Defragmenter?

A
  • It speeds up access times

* It frees up space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Name 3 standard graphic file formats

A
  • .jpeg (joint photographic experts group)
  • .gif (graphics interchange format)
  • .tiff (tagged image file format)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the advantages of using a .jpeg? (2)

A
  • It uses lossy compression to cut out data which cannot be seen by the human eye
  • They take up less storage space than most formats so can be sent easily
21
Q

What are the advantages of using a .gif? (2)

A
  • Only uses 8 bit colour so takes up less space

* It uses lossless compression so can be used on the Internet

22
Q

What are the advantages of using a .tiff? (2)

A
  • Uses 24 bit colour so can be used in desktop publishing packages
  • It can represent every type of graphic from monochrome to greyscale graphics
23
Q

What software would you used to produce a multimedia catalogue and why? (2)

A
  • Mediator Pro 7
  • It is a multimedia authoring package
  • It allows you to create interactive multimedia presentations combining text, sound, graphics and video
24
Q

What software would you use to set up a LAN in a school and why? (2)

A
  • Windows 2000 Professional
  • It is a network operating system application
  • It allows you to configure network aspects such as the security, group permissions and network protocols
25
Q

What software would you use to produce a school website and why? (2)

A
  • Microsoft FrontPage
  • It is a web authoring package
  • It allows you to create web pages using a full GUI interface, and gives you access to feature such as page templates and sound and video
26
Q

What are 3 software compatibility issues?

A
  • Memory requirements
  • Storage requirements
  • OS compatibility
27
Q

Why is memory requirement a software compatibility issue? (2)

A
  • Software needs RAM to hold programs and data when it is being processed
  • If there is not enough RAM then it will take too long to process.
28
Q

Why is storage requirement a software compatibility issue? (2)

A
  • Software requires a certain amount of backing storage space to be installed
  • If there is not enough space then a program cannot fit in backing storage
29
Q

Why is OS compatibility a software compatibility issue? (2)

A
  • Some software will have been designed for one specific operating system
  • If a computer does not have a certain type of operating system then software may not work on the computer
30
Q

What is a virus?

A

A virus is a destructive piece of software that attaches itself to a file, reproduces itself and spreads to other files.

31
Q

What is a worm?

A

A worm is a destructive piece of software that spreads from computer to computer via security holes in a network, and then reproduces itself.

32
Q

What is a trojan horse?

A

A trojan horse is a piece of software that appears to be carrying out a legitimate operation, but is secretly damaging or copying files in the background.

33
Q

What is the difference between a virus and a worm?

A

A virus needs to attach to another file to spread from computer to computer, a worm does not need to.

34
Q

Name 3 typed of viruses

A
  • File virus
  • Boot sector virus
  • Macro virus
35
Q

What is a file virus?

A

A file virus attaches itself to an application file, and is then activated when the program is loaded

36
Q

What is a boot sector virus?

A

A boot sector virus infects the system files that your computer uses every time you power up

37
Q

What is a macro virus?

A

A macro virus is when a destructive macro is attached to a file, and when it is opened this macro duplicates itself into the macro library and spreads even further

38
Q

Name 4 techniques used by a virus to disrupt a system

A
  • Replication
  • Camouflage
  • Watching
  • Delivery
39
Q

What is ‘replication’?

A

Replication is when a virus makes copies of itself to infect other files on a computer

40
Q

What is ‘camouflage’?

A

Camouflage is when a virus disguises itself to avoid being detected by anti-virus software, by adding fake instructions to mask its distinct virus pattern.

41
Q

What is ‘watching’?

A

Watching is when a virus waits until a particular action or data before its activated, to infect the greatest number of systems

42
Q

What is ‘delivery’?

A

Delivery is the method in which the virus carries out destructive tasks to computer systems to infect them

43
Q

Name 4 techniques used by anti-Virus software

A
  • Searching for virus signatures
  • Use of checksum
  • Memory resident monitoring
  • Heuristic detectors
44
Q

What is ‘Searching for virus signatures’?

A

Anti-virus software looks for virus signatures, which are characteristic patterns of bytes which are parts of virus, to notify the user of the virus in the file.

45
Q

What is ‘Use of checksum’?

A

Anti-virus software can carry out a calculation using binary values of an uninfected program. If this calculation changes after it has been run, then the code has been altered, possibly by a virus.

46
Q

What is ‘Memory resident monitoring’?

A

Anti-virus software can constantly monitor a computer for the presence of viruses when it’s switched on. If any unusual activity is detected the user is notified.

47
Q

What are ‘Heuristic detectors’?

A

Anti-virus software can look for code that would generally be considered to look like a virus, and notifies the user of these viruses.

48
Q

Why does Fragmentation reduce system performance? 2)

A
  • Unused data blocks are spread across a hard disk and each requires a separate disk access
  • This slows down access times for files made up of these blocks