OS2 Flashcards

(41 cards)

1
Q

Describe an open shop operating system.

A

A single CPU machine with 1 user running 1 program at a time. All programming is in machine code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe a batch system operating system.

A

It runs a set of programs in batch to increase efficiency. Supports spooling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is spooling?

A

Spooling allows the overlap of I/O with computation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe a multiprogramming operating system.

A

A single CPU machine running many loaded programs. Uses a job scheduler.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does a job scheduler do?

A

Selects jobs to load. Then selects which loaded jobs to run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define timesharing.

A

Switching jobs frequently to create the illusion of many jobs running simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does CPU scheduling do?

A

Selects which of the many ready jobs to run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a consequence of timesharing?

A

Interactive computing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe how a program is ran in a single-tasking OS.

A

The program is loaded in memory. The instruction pointer is set to the start of the program. An exit error code is available to the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does dual-mode operation work?

A

A mode bit is used to distinguish between two modes of operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe the two modes in dual-mode operation.

A

User mode when executing on behalf of a user. Kernel mode when executing on behalf of the OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does dual-mode operation provide protection?

A

Some instructions are designated as privileged, only executable in kernel mode. This allows OS to stop malicious code from doing bad things.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

State the purpose of the kernel.

A

The kernel provides OS services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does the kernel protect I/O devices?

A

I/O are done through the kernel instead of by the applications directly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe how OS services are accessed.

A

Through system calls. Invoked by a trap. Vector enforces code run when mode switch occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

State the purpose of system calls.

A

Provide a language agnostic, standard interface to the OS services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Describe how a system call is invoked.

A

Each system call is identified by a number that indexes a system call table. Invoked by putting the number and required parameters in the right places and trapping.

18
Q

State the 3 main ways of passing parameters when invoking a system call.

A

Load into registers, Place onto stack, Place into memory and put address to register.

19
Q

Describe microkernels.

A

The minimum amount of programs in kernel space. OS services provided by servers. Message passing is used to access servers.

20
Q

State the benefits of microkernels.

A

Increased modularity and extensibility. Less code so less likely for something in kernel space to crash.

21
Q

Define virtualisation.

A

Virtualisation allows operating systems to be run alongside each other above a hypervisor.

22
Q

Describe the difference between the two types of hypervisors.

A

Type 1 hypervisor runs directly on host hardware. Type 2 hypervisor runs above a full OS kernel.

23
Q

What are the two methods of supporting cross-architecture in virtualisation?

A

Emulation: slower. Interpretation: only if program is not natively compiled.

24
Q

Define virtual machines.

A

VMs encapsulate an entire running system. The VM is boot over a hypervisor.

25
What do containers do?
Containers expose functionality in the kernel so each container acts as a separate entity. Even though they share the same underlying kernel.
26
What are user IDs?
User ID includes name and associated number, one per user.
27
What are group IDs?
Group ID allows a set of users to be defined and controls managed.
28
Define privilege escalation.
Privilege escalation allows users to change effective ID with more rights.
29
State the principle of least privilege.
Objects should be given just enough privileges to perform their tasks.
30
State the two types of objects, give examples of each type.
Hardware objects: devices. Software objects: files, programs.
31
What is the goal of the principle of least privilege?
To limit damage if an object has a bug and gets abused.
32
What are covert channels?
Covert channels leak information using side effects.
33
Define a domain of protection.
A domain is a set of access rights.
34
On UNIX, what is a domain of protection?
A user ID.
35
Describe the access matrix.
A matrix of domains against objects. Each cell contains the set of operations allowed on the object.
36
Describe how the access matrix can be viewed as a set of tuples.
A set of triples (domain, object, rights set).
37
Why is the access matrix not represented using a set of triples?
The set is sparse and too large to fit in memory.
38
State and describe the common representations of the access matrix.
Access control list: index first by object, then by domain. Capabilities: index first by domain, then by object.
39
Where are access control lists commonly used?
In storage systems.
40
Explain why user authentication is needed.
Required as protection systems depend on user ID.
41
How does the system handle authentication?
Typically through a password, hashed with a salt. Failed attempts are logged.