3.2.1 operating system (user management)
access control: the OS uses log in name and passwords and or some form of biometric identification to authenticate users and control who can log in.
file permissions: control who can do what with each file
(read, write, execute, delete)
3.2.1 Main tasks
process management: overseeing the execution of programs by the CPU and allocating each of them a share of main memory and CPU time.
File management: organising and keeping track of the contents of secondary storage, managing files and folders and using permissions to control user access to programs and files.
user management: providing a user interface to enable users to interact with the computer
peripheral management: communicating with device drivers to control peripheral devices
3.2.2 Data compression
purpose and how it works
purpose
to reduce the size of a file so that it takes up less space in secondary storage and is quicker to transfer across networks
how it works it repackages (lossless) or removes (lossy) some of the files data to reduce its size.
3.2.3 audit trail
what is it:
version control software
3.2.3 three things programmer can do to make their programs robust?
adhere to good programming practises
carry out regular code reviews
keep an audit trail
3.2.3 bad programming practises:
1) poor planning that does not take account of potential security issues
2) using a quick fix rather than taking time to solve a problem properly
3) poorly structured code that does not here to agreed standards.
4) insufficient testing
3.2.3 four things to look for in a code review?
errors in code
code inefficiencies
bad programming practises
requirements are fully implemented
3.2.3 code reviews
how it works:
3.2.3 code reviews : purpose
purpose to a code review is: