Computer Basics: Bits and Processes
44 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the smallest convenient chunk of storage on most computers?

  • Kilobyte
  • Byte (correct)
  • Bit
  • Word
  • How many bits are there in one byte?

  • 4 bits
  • 32 bits
  • 16 bits
  • 8 bits (correct)
  • What is a terabyte equivalent to in bytes?

  • 1,024 kilobytes
  • 1,024 bytes
  • 1,024 megabytes
  • 1,024 gigabytes (correct)
  • What term describes a computer's native unit of data consisting of one or more bytes?

    <p>Word</p> Signup and view all the answers

    Why is computer storage generally measured in bytes and collections of bytes?

    <p>Because most operations are executed in native word size</p> Signup and view all the answers

    What is the primary role of a process in an operating system?

    <p>To execute a program's instructions in a sequential manner.</p> Signup and view all the answers

    Which of the following describes a multi-threaded process?

    <p>It has multiple program counters for each thread.</p> Signup and view all the answers

    Which activity is NOT a responsibility of the operating system regarding process management?

    <p>Executing program instructions directly.</p> Signup and view all the answers

    What must be in memory for a program to execute properly?

    <p>A portion of instructions and related data.</p> Signup and view all the answers

    How does an operating system achieve concurrency among processes?

    <p>By multiplexing the CPUs among processes or threads.</p> Signup and view all the answers

    Which method is generally considered the slowest for executing computer programs?

    <p>Interpretation</p> Signup and view all the answers

    What is the primary advantage of utilizing virtualization technologies like VMM?

    <p>Running multiple guest operating systems on a single host</p> Signup and view all the answers

    Which type of cloud computing is exclusively used by a single organization?

    <p>Private cloud</p> Signup and view all the answers

    Which of the following is an example of Infrastructure as a Service (IaaS)?

    <p>Virtual servers available over the Internet</p> Signup and view all the answers

    What is a key requirement for a real-time operating system?

    <p>Well-defined fixed time constraints</p> Signup and view all the answers

    What aspect differentiates open-source operating systems from closed-source versions?

    <p>Source code accessibility to users</p> Signup and view all the answers

    Which of the following accurately describes cloud computing?

    <p>It delivers storage, applications, and computing as a service over a network.</p> Signup and view all the answers

    Which licensing model started the movement towards open-source operating systems?

    <p>GNU Public License (GPL)</p> Signup and view all the answers

    What role do load balancers play in cloud computing environments?

    <p>They spread traffic across multiple applications.</p> Signup and view all the answers

    What distinguishes a hybrid cloud from other cloud environments?

    <p>It combines both public and private cloud components.</p> Signup and view all the answers

    Which feature allows new types of applications like augmented reality to be developed?

    <p>GPS and gyroscope integration</p> Signup and view all the answers

    What is the primary function of a network operating system in distributed computing?

    <p>To provide a communication scheme between systems</p> Signup and view all the answers

    In client-server computing, what role do compute-server systems primarily serve?

    <p>Responding to client requests for services</p> Signup and view all the answers

    Which of the following best describes a peer-to-peer (P2P) network?

    <p>Nodes can act as either clients or servers.</p> Signup and view all the answers

    What kind of networks is TCP/IP most commonly used in?

    <p>All types of networking scenarios</p> Signup and view all the answers

    Which statement about virtualization is true?

    <p>It allows applications to run within other operating systems.</p> Signup and view all the answers

    What is one characteristic of a dumb terminal in client-server computing?

    <p>It has limited functionality compared to smart PCs.</p> Signup and view all the answers

    What distinguishes a file-server system in a client-server architecture?

    <p>It interfaces with clients to store and retrieve files.</p> Signup and view all the answers

    Which of these examples are considered P2P systems?

    <p>VoIP applications like Skype and Napster</p> Signup and view all the answers

    When a node joins a P2P network, what must it do first?

    <p>Register its service with a central lookup service or broadcast a service request</p> Signup and view all the answers

    What is the primary function of memory management in an operating system?

    <p>To keep track of memory usage and allocate resources</p> Signup and view all the answers

    Which OS activity is NOT typically associated with file-system management?

    <p>Conducting disk scheduling</p> Signup and view all the answers

    How does an operating system manage mass storage?

    <p>Through free-space management and disk scheduling</p> Signup and view all the answers

    What distinguishes protection from security in an operating system?

    <p>Protection deals with preventing unauthorized access, while security focuses on threats.</p> Signup and view all the answers

    What is one of the primary functions of the operating system concerning file management?

    <p>Backing up files to stable storage</p> Signup and view all the answers

    In a multitasking environment, why is it important to use the most recent value of data?

    <p>To reduce data corruption and ensure information accuracy.</p> Signup and view all the answers

    Which of the following statements about tertiary storage is correct?

    <p>It requires management whether accessed frequently or not.</p> Signup and view all the answers

    In a distributed environment, what complicates data management?

    <p>The necessity of having multiple copies of data.</p> Signup and view all the answers

    What is the role of cache coherency in a multiprocessor environment?

    <p>To ensure that all CPUs access the most recent data value.</p> Signup and view all the answers

    What is a crucial aspect of the OS's role in protecting user access?

    <p>Tracking user identifiers and controlling access to resources.</p> Signup and view all the answers

    Which of the following is a characteristic of devices managed by an OS?

    <p>Devices have varying properties including access speed and capacity.</p> Signup and view all the answers

    What is typically a focus in mobile computing environments compared to traditional computing?

    <p>Increased interconnectivity and wireless network usage.</p> Signup and view all the answers

    How does an operating system abstract physical storage properties?

    <p>By creating file systems to organize files logically.</p> Signup and view all the answers

    What is a common activity in free-space management within mass storage?

    <p>Allocating space for new data.</p> Signup and view all the answers

    Study Notes

    Bits and Bytes

    • A bit represents a 0 or a 1.
    • A byte is composed of 8 bits.
    • A word is a computer's native unit of data, and it is made of one or more bytes; A 64-bit computer will have 8-byte words.
    • A computer's storage and throughput are measured in bytes.
    • A kilobyte (KB) is 1,024 bytes
    • A megabyte (MB) is 1,024² bytes
    • A gigabyte (GB) is 1,024³ bytes
    • A terabyte (TB) is 1,024⁴ bytes
    • A petabyte (PB) is 1,024⁵ bytes
    • Computer manufacturers will round off these numbers to say a megabyte is 1 million bytes and a gigabyte is 1 billion bytes.
    • Networking measurements are made in bits because networks move data a bit at a time.

    Processes

    • A program is a passive entity and a process is an active entity.
    • A process needs the following resources: CPU, memory, I/O, files, initialization data.
    • Process termination requires reclaiming reusable resources.
    • A single-threaded process has one program counter that specifies the location of the next instruction to execute.
    • A multi-threaded process has one program counter per thread.
    • Most systems have multiple processes running concurrently on one or more CPUs.

    Operating System Process Management Activities

    • Create and delete processes (both user and system).
    • Suspend and resume processes.
    • Provide mechanisms for process synchronization.
    • Provide mechanisms for process communication.
    • Provide mechanisms for deadlock handling.

    Memory Management

    • All or part of a program's instructions and data need to be in memory for it to execute.
    • Memory determines what is in memory and when.
    • Memory management aims to optimize CPU utilization and computer response to users.
    • Memory management activities include:
      • Tracking which parts of memory are in use and by whom.
      • Deciding which processes or parts of processes and data to move in and out of memory.
      • Allocating and deallocating memory space as needed.

    Storage Management

    • The OS provides a uniform, logical view of information storage.
    • Information is abstracted to a logical storage unit called a file.
    • Each medium is controlled by a device (i.e., disk drive, tape drive).
    • Different devices will vary in access speed, capacity, data-transfer rate, and access method (sequential or random).
    • File-system management:
      • Files are usually organized into directories.
      • Access control on most systems determine who can access what.
      • OS activities include:
        • Creating and deleting files and directories.
        • Providing primitives to manipulate files and directories.
        • Mapping files onto secondary storage.
        • Backing up files onto stable (non-volatile) storage media.

    Mass-Storage Management

    • Disks are used to store data that does not fit in main memory or data that needs to be kept long-term.
    • Mass-storage management is critical because it affects the overall speed of the computer system.
    • OS activities:
      • Free-space management.
      • Storage allocation.
      • Disk scheduling.
    • Tertiary storage includes optical storage and magnetic tape.
    • Tertiary storage is managed by the OS or applications.
    • Tertiary storage can be write-once, read-many-times (WORM) or read-write (RW).

    Data Migration

    • Multitasking environments must use the most recent value, no matter where it is stored in the storage hierarchy.
    • Multiprocessor environments must provide cache coherency in hardware to guarantee that all CPUs have the most recent value in their cache.
    • Distributed environments have complex situations with several copies of a datum existing; solutions are covered in Chapter 17.

    Protection and Security

    • Protection: Any mechanism for controlling access of processes or users to resources defined by the OS.
    • Security: Defense of the system against internal and external attacks including denial-of-service, worms, viruses, identity theft, and theft of service.
    • Systems distinguish between users based on user IDs, security IDs, group IDs, and privilege escalation.

    Computing Environments - Traditional

    • Stand-alone general purpose machines are becoming interconnected.
    • Portals provide web access to internal systems.
    • Network computers are like Web terminals.
    • Mobile computers connect via wireless networks.
    • Networking is becoming ubiquitous even in home systems using firewalls to protect home computers from Internet attacks.

    Computing Environments - Mobile

    • Handheld smartphones, tablets, etc.
    • Mobile devices have extra features like GPS and gyroscopes.
    • Mobile devices allow for different app types like augmented reality.
    • Mobile devices use IEEE 802.11 wireless or cellular data networks for connectivity.
    • Popular mobile operating systems include Apple's iOS and Google's Android.

    Computing Environments - Distributed

    • A collection of separate, possibly heterogeneous, systems networked together.
    • Network is a communications path using TCP/IP. Networks include:
      • Local Area Network (LAN).
      • Wide Area Network (WAN).
      • Metropolitan Area Network (MAN).
      • Personal Area Network (PAN).
    • A Network Operating System provides features between systems across the network.
    • Network operating systems provide a communication scheme for exchanging messages and the illusion of a single system.

    Computing Environments - Client-Server

    • Client-Server computing.
    • Dumb terminals have been replaced by smart PCs.
    • Many systems are now servers, responding to requests generated by clients.
    • Server types:
      • Compute-server systems provide an interface for clients to request services (i.e., database).
      • File-server systems provide an interface for clients to store and retrieve files.

    Computing Environments - Peer-to-Peer (P2P)

    • All nodes considered peers.
    • Nodes may act as both clients and servers.
    • Nodes must join the P2P network by:
      • Registering its service with a central lookup service on the network.
      • Broadcasting a request for service and responding to requests for service via a discovery protocol.
    • Examples of P2P networks include Napster, Gnutella, and Voice over IP (VoIP) such as Skype.

    Computing Environments - Virtualization

    • Allows operating systems to run applications within other OSes.
    • Emulation is used when the source CPU type is different from the target type (i.e., PowerPC to Intel x86) and is generally the slowest method.
    • Interpretation is used when the computer language is not compiled to native code.
    • Virtualization allows the OS to be natively compiled for the CPU, and guest OSes are also natively compiled.
    • A virtual machine manager (VMM) provides virtualization services.

    Computing Environments - Cloud Computing

    • Delivers computing, storage, and applications as a service across a network.
    • An extension of virtualization using virtualization as a base for its functionality.
    • Amazon EC2 has thousands of servers, millions of virtual machines, and petabytes of storage available across the Internet on a pay-as-you-go basis.
    • Types of cloud computing:
      • Public cloud: Available via the internet to anyone willing to pay.
      • Private cloud: Run by a company for the company's own use.
      • Hybrid cloud: Includes both public and private cloud components.
      • Software as a service (SaaS): One or more applications available via the Internet, such as a word processor.
      • Platform as a service (PaaS): Software stack ready for application use via the Internet such as a database server.
      • Infrastructure as a service (IaaS): Servers or storage available over the Internet such as storage available for backup use.

    Computing Environments - Cloud Computing

    • Cloud computing environments are composed of traditional OSes, VMMs and cloud management tools.
    • Internet connectivity requires security such as firewalls.
    • Load balancers distribute traffic across multiple applications.

    Computing Environments - Real-Time Embedded Systems

    • Real-time embedded systems are the most prevalent form of computers. They can vary considerably in terms of purpose and have special purpose OSes or real-time OSes.
    • Real-time embedded systems use is expanding.
    • Many other special computing environments exist, some with OSes and some performing tasks without an OS.
    • A real-time OS has well-defined fixed time constraints and processing must be done within these constraints.
    • Correct operation is only possible if the constraints are met.

    Open-Source Operating Systems

    • Operating systems made available in source-code format rather than just binary closed-source.
    • An alternative to copy protection and Digital Rights Management (DRM).
    • Started by the Free Software Foundation (FSF), which has a "copyleft" GNU Public License (GPL).
    • Examples include GNU/Linux, BSD UNIX (including core of Mac OS X), and many more.
    • Open-source systems can use virtual machine managers like VMware Player (free on Windows), or Virtualbox (open source and free on many platforms - http://www.virtualbox.com).
    • Open-source operating systems allow users to run guest systems for exploration purposes.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    ch1.pdf

    Description

    This quiz covers the fundamental concepts of bits and bytes as well as the distinctions between programs and processes. Understand the structure of data in computing and learn how processes operate within a computer system. Test your knowledge on these essential computing topics.

    More Like This

     Bits & Bytes: Binary Data Storage
    10 questions
    Basics of Data: Bits, Bytes, and Nibbles
    5 questions
    Introducción a Bits y Bytes
    5 questions

    Introducción a Bits y Bytes

    PolishedComprehension7871 avatar
    PolishedComprehension7871
    Use Quizgecko on...
    Browser
    Browser