17
EAGLE_EYE 1 CS604 - Operating Systems FAQs Question: Is there any concrete reason behind selecting Linux as a major OS for study in this course instead of Windows because most of us has windows already installed and we are also familiar with it, kindly explain Answer: Yes. Linux is open source. You have complete code of Linux operating system whereas in Windows you do not have the privilege to see its code. While programming in C in the Linux environment you get a better understanding of the OS concepts. Question: i have purchased a Fedora Core 2 redhat 11 for linux OS which consists of 4 CDs, is it ok and tell me is there any specific system requirements and like that etc, kindly explain. Answer: Yes it is fine. I think you will find the system requirements on the CD cover. I think that 512 RAM and 1 plus Gb processor will be OK Question: Please provide us the link of Virtual Machine for which I would be able to install both Operating System Window XP and Linux. Answer: You can download the VMware from the following link: http://www.vmware.com/download/ As far as Linux is concerned, try to get the cd of Linux from the market as it is not easy to download complete Linux from internet. But if you have fast internet then you may try Question: Tell me the name of recommended book or reference books for this subject. Answer: Operating Systems by Silberschatz is the text book. For reference, consult Operating System by Tannenbaum Moreover consult CS604 handouts. Question: kindly explain a major difference between hard & soft real time systems with the help of an example. Answer: Real time systems need to provide the desired output in the given amount of time. Hard real time systems are those that guarantees the critical tasks should be completed within specified time. For example you have a system of ECG where a patients pulse is seen on the monitor screen. The working of ECG is critical and hence it must show the desired output in the given amount of time and delay in getting the output my lead to serious consequences therefore it should be guaranteed that the machine should be able to provide the output in specific amount of time. Whereas Soft real time system are less restrictive. Though getting the output in these systems are also important but not so critical as compared to hard real time systems. Here one task can get priority over other task. For example if you are using a real time system in a washing machine then the output of the system ( e.g buzzer alarm) is not so critical and it may happen that this system allows washing machine to stop first and then rung the Buzzer instead of normal flow of ringing the Buzzer before stopping the machine. Question: What is an efficient operating system, what is the main parameter to judge the efficiency of an OS? Answer: We can call an OS to be efficient if it can perform all the necessary functions like resource management, memory management, CPU and process scheduling etc. in an efficient manner. Question: what was the main reason that user could not interact with a multi programmed batched computer system? Was it only due to slow response? Answer: The main reason is that the operating system design did not allow the user to interact with the running jobs. Later Kernel were designed in such a way that they provided the facility of interactivity along with multiprogramming. Question: Historically, single user systems were evolved before or after time sharing systems? Answer: Single user systems were invented before time sharing systems. Question: Kindly give an example of a signal ? Answer: A signal is an event to get the attention of a process. . A signal can be send from one process to an other process. For example if a file exceeds limits then the process may be asked to produce the output until the file size is increased. Similarly you can use ctr+z command on Linux shell to stop the running process. Question: Is this necessary that all the privileged instructions reside in kernel area of memory. Answer: Yes. Privileged instructions can be used by Application programmer with the help of system calls. Question: Explain something about 32bit OS and 64bit OS as we hear lots of these in our daily life just like vista is 64 bit software and like that, what is the difference there and we need special hardware for these OS Answer: Computer systems stores and process data in the form of bits; 0 and 1. A 32 bit means the size of the word is 32 bit and processor can present the data in 32 bits and similar is the case for 64 bits. So this is actually the processor's capability to store and manipulate the data in the form of 32 bit or 64 bit. Operating systems are then designed according to the processors and hence named as for example , VISTA is 64 bit. It means that VISTA can run on processors that are 64 bit processors.

CS604 - Operating Systems FAQZ Glossry - Press Pages · PDF fileCS604 - Operating Systems ... You can download the VMware from the followi ng link: ... Tell me the name of recommended

  • Upload
    haphuc

  • View
    219

  • Download
    1

Embed Size (px)

Citation preview

Page 1: CS604 - Operating Systems FAQZ Glossry - Press Pages · PDF fileCS604 - Operating Systems ... You can download the VMware from the followi ng link: ... Tell me the name of recommended

EAGLE_EYE

1

CS604 - Operating Systems

FAQs

Question: Is there any concrete reason behind selecting Linux as a major OS for study in this course instead of Windows because most of us has windows already installed and we are also familiar with it, kindly explain

Answer: Yes. Linux is open source. You have complete code of Linux operating system whereas in Windows you do not have the privilege to see its code. While programming in C in the Linux environment you get a better understanding of the OS concepts.

Question: i have purchased a Fedora Core 2 redhat 11 for linux OS which consists of 4 CDs, is it ok and tell me is there any specific system requirements and like that etc, kindly explain.

Answer: Yes it is fine. I think you will find the system requirements on the CD cover. I think that 512 RAM and 1 plus Gb processor will be OK

Question: Please provide us the link of Virtual Machine for which I would be able to install both Operating System Window XP and Linux.

Answer: You can download the VMware from the following link: http://www.vmware.com/download/ As far as Linux is concerned, try to get the cd of Linux from the market as it is not easy to download complete Linux from internet. But if you have fast internet then you may try

Question: Tell me the name of recommended book or reference books for this subject.

Answer: Operating Systems by Silberschatz is the text book. For reference, consult Operating System by Tannenbaum Moreover consult CS604 handouts.

Question: kindly explain a major difference between hard & soft real time systems with the help of an example.

Answer: Real time systems need to provide the desired output in the given amount of time. Hard real time systems are those that guarantees the critical tasks should be completed within specified time. For example you have a system of ECG where a patients pulse is seen on the monitor screen. The working of ECG is critical and hence it must show the desired output in the given amount of time and delay in getting the output my lead to serious consequences therefore it should be guaranteed that the machine should be able to provide the output in specific amount of time. Whereas Soft real time system are less restrictive. Though getting the output in these systems are also important but not so critical as compared to hard real time systems. Here one task can get priority over other task. For example if you are using a real time system in a washing machine then the output of the system ( e.g buzzer alarm) is not so critical and it may happen that this system allows washing machine to stop first and then rung the Buzzer instead of normal flow of ringing the Buzzer before stopping the machine.

Question: What is an efficient operating system, what is the main parameter to judge the efficiency of an OS?

Answer: We can call an OS to be efficient if it can perform all the necessary functions like resource management, memory management, CPU and process scheduling etc. in an efficient manner.

Question: what was the main reason that user could not interact with a multi programmed batched computer system? Was it only due to slow response?

Answer: The main reason is that the operating system design did not allow the user to interact with the running jobs. Later Kernel were designed in such a way that they provided the facility of interactivity along with multiprogramming.

Question: Historically, single user systems were evolved before or after time sharing systems?

Answer: Single user systems were invented before time sharing systems.

Question: Kindly give an example of a signal ?

Answer: A signal is an event to get the attention of a process. . A signal can be send from one process to an other process. For example if a file exceeds limits then the process may be asked to produce the output until the file size is increased. Similarly you can use ctr+z command on Linux shell to stop the running process.

Question: Is this necessary that all the privileged instructions reside in kernel area of memory.

Answer: Yes. Privileged instructions can be used by Application programmer with the help of system calls.

Question: Explain something about 32bit OS and 64bit OS as we hear lots of these in our daily life just like vista is 64 bit software and like that, what is the difference there and we need special hardware for these OS

Answer: Computer systems stores and process data in the form of bits; 0 and 1. A 32 bit means the size of the word is 32 bit and processor can present the data in 32 bits and similar is the case for 64 bits. So this is actually the processor's capability to store and manipulate the data in the form of 32 bit or 64 bit. Operating systems are then designed according to the processors and hence named as for example , VISTA is 64 bit. It means that VISTA can run on processors that are 64 bit processors.

Page 2: CS604 - Operating Systems FAQZ Glossry - Press Pages · PDF fileCS604 - Operating Systems ... You can download the VMware from the followi ng link: ... Tell me the name of recommended

EAGLE_EYE

2

Question: Explain something about 32bit OS and 64bit OS as we hear lots of these in our daily life just like vista is 64 bit software and like that, what is the difference there and we need special hardware for these OS

Answer: Computer systems stores and process data in the form of bits; 0 and 1. A 32 bit means the size of the word is 32 bit and processor can present the data in 32 bits and similar is the case for 64 bits. So this is actually the processor's capability to store and manipulate the data in the form of 32 bit or 64 bit. Operating systems are then designed according to the processors and hence named as for example , VISTA is 64 bit. It means that VISTA can run on processors that are 64 bit processors.

Question: What are Non-privileged instructions?

Answer: The instructions that are not related to the hardware operations are termed as non-privileged instructions. For example manipulating the user's data.

Question: What is the difference between MEMORY SPACE and ADDRESS SPACE?

Answer: They are both same thing by meaning nut in lecture # 3 handouts address space refers to the region in the memory that a process is allowed to access whereas memory pace is region of the memory where operating system resides.

Question: What is the difference between USER PROCESS and SYSTEM PROCESS?

Answer: User process is the one created by the user while the process created by the Operating System is called System process.

Question: What is the difference between USER PROCESS and SYSTEM PROCESS?

Answer: User process is the one created by the user while the process created by the Operating System is called System process.

Question: What is the difference between PROCESS SYNCHRONIZATION and PROCESS COMMUNICATION?

Answer: Process Synchronization means that process working should be synchronized so that processes should finish their working in a desired order so that they can contribute in producing the correct result whereas Process communication is the communication of processes between them known as inter process communication.

Question: What is DEADLOCK?

Answer: Deadlock is a condition in the system in which a process A is waiting for the resources held by process B and process B is waiting for the resources held by process A

Question: How STACK is defined and maintained in main memory?

Answer: A stack is created in the main memory so as to keep the necessary output of the processes when required.

Question: What is FILE SYSTEM? What is the difference between FAT32 and NTFS file system? LINUX use which FILE SYSTEM?

Answer: File System is a system of managing the files in the computer system.FAT, FAT 32, NTFS are used in Windows operating system. They are different with respect to performance, storage capacity of files etc. Linux uses ext2 file system.

Question: What is FILE SYSTEM? What is the difference between FAT32 and NTFS file system? LINUX use which FILE SYSTEM?

Answer: File System is a system of managing the files in the computer system.FAT, FAT 32, NTFS are used in Windows operating system. They are different with respect to performance, storage capacity of files etc. Linux uses ext2 file system.

Question: What is the difference between BUFFERING and CASHING?

Answer: Buffer is a temporary memory for holding a specific data (input or output) for some period of time. Some devices also have buffer with them for example a keyboard, you may have experienced that sometimes you type alphabet letters but they do not readily display on the screen and stay in the buffer until the CPU becomes free to process it. Cache is a fast memory used for readily accessing the data.

Question: What is the difference between BOURNE SHELL and DOS?

Answer: DOS is Disk Operating System whereas Shell is a terminal (like a command prompt) in Linux/Unix.

Question: What is the difference between LIBRARY CALL and SYSTEM CALL?

Answer: Library calls are made by library functions which are defined in the header files of the library whereas System calls are defined by the operating system and provide an interface to the application programmers to use the services of the Kernel.

Question: What is the difference between VIRTUAL MACHINE and VIRTUAL MEMORY?

Answer: A virtual machine is actually a software that gives you the functionality of a complete machine. Means that you can install complete Os inside a virtual machine. VMWare is ad famous virtual machine. Virtual

Page 3: CS604 - Operating Systems FAQZ Glossry - Press Pages · PDF fileCS604 - Operating Systems ... You can download the VMware from the followi ng link: ... Tell me the name of recommended

EAGLE_EYE

3

memory is a memory management technique that you will study in coming lectures. It is pre-mature to explain virtual memory here in detail.

Question: ~/courses/cs604. In this path what ~ represent? Please explain

Answer: ~ is used to represent HOME directory

Question: Which software will be used during this course ?

Answer: Insha Allah we will be using Linux Operating System in this course. So you need to install this OS as soon as possible as you will be given assignments that you will have to do in C language using Linux environment.

Question: In DOS if we want to enter into a directory we write "cd dirName" and same is the case in Linux. In MS-DOS if we want to go to the beginning of the current drive then we type "cd\". In Linux we just type "cd" to go to the home directory. In DOS we can go to the parent directory of the current directory by type command "cd.." but please, inform that how can we go to the parent directory of the current directory in Linux.

Answer: You can come back to the home directory by cd ~ command.

Question: Explain significant difference between process & program.

Answer: We usually say that a program in execution is called a process. Program is actually sequence of well defined code instructions. explain significant difference between process & program.

Question: Where do I practice the Linuxands such as ls, mkdir etc.

Answer: Open the Terminal and practice these commands at its prompt.

Question: Where do I practice the Linuxands such as ls, mkdir etc.

Answer: Open the Terminal and practice these commands at its prompt.

Question: What are the contents of Swapper directory in Unix tree hierarchy?

Answer: Swap space is a temporary memory location. Swap space is used when physical memory is not sufficient to hold all the running processes. If the system needs more memory resources and the physical memory is full, inactive pages in memory are moved to the swap space. So usually swap space holds the contents of the man memory temporarily.

Question: When a process is doing IO, even then CPU is doing all the work i.e CPU has to execute the instructions for IO . So how we differentiate between IO bound and CPU bound process?

Answer: Actually, while working on the computer, we get the feeling that I/O operations as well as CPU operations are running in parallel. We get this feeling because of excellent processor and time sharing algorithms. Otherwise a single CPU can do only I/O burst or CPU burst at a given time.

Question: At the end of lecture 6, in the last few minutes the professor says that after the fork() system call the parent and the child share the following: • Environment • Open file descriptor table • Signal handling settings • Nice value • Current working directory • Root directory • File mode creation mask (umask) The professor says that the Open file descriptor will be explained later but he did not say anything about the Nice Value and File Mode creation mask. Please explain the Nice Value and File Mode creation mask in the context of fork() system call.

Answer: Nice value is a number that influence the property of the process. If the nice value is high, it makes the process to run at lower priority and if the value of nice is lower, the process runs at higher priority. The file mode creation mask (often called the umask) determines the default permissions for any file created by the process. For example, a file created by the create command has the permissions specified by the umask unless the create command specifies explicit permissions. (Ref: http://www.mkssoftware.com/docs/man1/umask.1.asp)

Question: Last few lines of the handouts of lecture 6 say that "Child has its own copy of parent’s file descriptors." What does it mean? Please explain

Answer: It means that the file descriptor of the child is different from that of the parent and child maintain its own file descriptor.

Question: In Unix/Linux process tree, each does each process corresponds to a directory? Suppose I am in /home/aamir directory; and here I create an other directory test ie "mkdir /home/aamir test", does it mean a new process named "test " is created?

Answer: If you create a directory or a file then the process of creation of that directory or file could be termed as a process while directory 'test' is not a process itself.

Question: What is difference between a logical and physical resource, could you please give one example of each?

Answer: Example of Physical resource is I/O devices, CPU etc. Whereas example of Logical resource are processes, shared memory or variables.

Page 4: CS604 - Operating Systems FAQZ Glossry - Press Pages · PDF fileCS604 - Operating Systems ... You can download the VMware from the followi ng link: ... Tell me the name of recommended

EAGLE_EYE

4

Question: Could you please give a short example where a parent passes resources to its child process?

Answer: When a child process is created through fork system call, it may happen that child manipulate some data (e.g. some calculation) and pass its result to the parent process and same could be case from parent to child. Similarly both processes can interact with each other through shared variable as well.

Question: What is FILE MODE CREATION MASK?

Answer: The file mode creation mask (often called the umask) determines the default permissions for any file created by the process. For example, a file created by the create command has the permissions specified by the umask unless the create command specifies explicit permissions. (Ref: http://www.mkssoftware.com/docs/man1/umask.1.asp)

Question: What is SIGNAL HANDLING SETTING?

Answer: As you have read that when there is need to invoke a signal, there are multiple options. Whether to execute Kernel defined default action or to take programmer defined action or just simply ignore it. So this setting is Signal Handling Setting.

Question: What is FILE DESCRIPTOR TABLE? What type of information it contain?

Answer: A File Descriptor table is created for each process. It is used to locate the relevant data of that process on the disk and is indexed by an integer value called as File Descriptor. Basically, each entry of file descriptor table contains a flag and a pointer. Pointer helps in traversing the file and inode tables.

Question: What is the difference between PROCESS MEMORY SPACE and PROCESS ADDRESS SPACE?

Answer: Both are same thing.

Question: Why RETURN CODE for the FORK system call is ZERO for the CHILD PROCESS?

Answer: The system call fork ( ) is written (in Kernel) in such a way that when it executes successfully, it returns 0 to the child process and process id of the child to the Parent process.

Question: Give some examples of LOGICAL RESOURCES and PHYSICAL RESOURCES?

Answer: Logical resource can be some variable or shared memory or file etc. whereas physical resources are hard disc, keyboard etc

Question: What is MEMORY IMAGE?

Answer: Memory image here means that the position/ status of the memory (number of variables, their names and operations etc) seen by a Parent process is also visible to a Child process because child process is the copy of the parent process. After execution of Fork system call, a child is created which is the exact copy (memory image) of its parent. Therefore after formation of these two separate processes, one of the process execute execlp system call, this system call destroy the memory image of the process which calls this execlp system call. This makes both the processes to further proceeds their own execution independently.

Question: What is SWAP SPACE?

Answer: Depending upon the process scheduling algorithm (as in medium term schedulers), some process may be swap out of main memory on hard disc for some time and then brought back into the main memory. So the space on hard disc where these processes are kept is called Swap Space.

Question: Why the long-term scheduler must select a good mix of I/O bound and CPU BOUND JOBS?

Answer: Because selecting a good mix of I/O bound and CPU bound jobs will enable the CPU to schedule the tasks equally between I/O bound and CPU bound processed. If there are more CPU hungry processed then I/O bound processes may find processor lesser amount of time as similarly vice-versa for I/O hungry processes. Therefore selecting a good mix of both type of processes will enable to optimize the functionality of CPU and system at large.

Question: What is the difference between I/O BOUNDS JOB and CPU BOUNDS JOB?

Answer: The jobs or processes which requires more I/O operations like typing on text editors are called as I/O bound processes while the processes in which intense calculations are involved and CPU has to give maximum time to perform those calculations are called CPU bound jobs/ processes.

Question: What is CPU BURST?

Answer: CPU burst is the time taken by the process to use the CPU.

Question: What is the difference between THREAD and PROCESS?

Answer: A thread is created by a process. Existence of a thread is dependent on the existence of a process. It is sometimes called as Light weight process. But threads execute within the address space of the process. A thread has a thread id, program counter, register set. A thread can also communicate with other threads of the same process whereas a process can exist independently.

Question: What is the difference between USER PROCESS and SYSTEM PROCESS?

Page 5: CS604 - Operating Systems FAQZ Glossry - Press Pages · PDF fileCS604 - Operating Systems ... You can download the VMware from the followi ng link: ... Tell me the name of recommended

EAGLE_EYE

5

Answer: The processes run by the user are called User processes while the processes performed by the Kernel are called as System processes.

Question: "In Indirect Communication, two processes can only communicate if they mail box." Sharing a mail box is like sharing memory. I am bit confused that the main theme of IPC is to avoid sharing memory for process communication. But here the technique is based on sharing the mail box?

Answer: No, we can not say that basic goal of IPC is to avoid sharing. Its main goal is to provide the facility of communication between the processes. And there are ways to achieve IPC which includes both direct as well as indirect communication. Mail box are different in a way that the sender do not specify the address of the receiver. The receiving process itself have to contact the mailbox to get its message. So this is basically a way of indirect communication.

Question: What is the concept of port in Indirect Communication?

Answer: Ports are used in IPC through sockets because network is involved and communication takes place through sockets.

Question: Pls refer Indirect Communication:-"Allow a link to be associated with at most two processes." Does it mean that allow only two processes to share a mail box?

Answer: In direct communication as the sender specify the name of the recipient therefore the link established between only two processes. This is the basic property of Direct communication

Question: Why can't we use only one file descriptor in case of pipe? Using it we can access the pipe for read operation and for write operation ?

Answer: OS provides standard file descriptors, 0 and 1 for reading and writing. Therefore we are bounded by the operating system to use it that way.

Question: Can we say that a pipe is a sort of shared memory but defined in Kernel area of memory?

Answer: PIPES are created by an API in which Kernel establishes a communication channel between related processes.

Question: Can we say that the concurrent cooperating process is a thread?

Answer: Not necessarily. Concurrent cooperating processes can also be independent processes like client and server processes.

Question: Can 64bit OS can run on a 32bit processor and 32bit OS can run on a 64bit processor?

Answer: A 32 bit OS can run on both 32-bit and 64-bit processor. A 64 bit OS can not run on 32 bit machine.

Question: explain the difference between multi-programmed system and time sharing system.

Answer: Those systems that can run multiple programs simultaneously are called Mutli-programmed systems and to support multi-programming and concurrent execution of processes, OS schedule the CPU in such a way that it runs all the programs by sharing CPU between them and hence help in completing the tasks of all the programs simultaneously. These systems are known as time sharing systems.

Question: What is BOUNDED BUFFER?

Answer: Bounded buffer is fixed sized memory, whereas buffer itself is temporary memory location. You will study a classical problem known as Bounded Buffer problem in coming lectures.

Question: What is function of UNLINK() statement?

Answer: unlink is a system call and is used to delete a file.

Question: What is the difference between FILEDESCRIPTOR and BUFFER?

Answer: Bounded Buffer is a buffer of fixed length. A buffer is a temporary storage space usually attached with input and output devices. File Descriptor is an intger assigned to a per process file descriptor table created against an opened file. File descriptor is then used in different system calls like read, write, etc.

Question: What is the difference between NON BLOCKING RECEIVER and NON BLOCKING SEND?

Answer: In non blocking send, sending process sends the message and resumes operations. In non blocking receive, the receiver receives either a valid message or a null.

Question: What is MAILBOX? How to implement MAILBOX?

Answer: Mail box is a way of indirect inter process communication. In mail box, we do not send the message directly to the recipient instead we send a message to a 'mail box' from where the receiver selects its appropriate message

Question: What is the difference between SYMMETRIC and DIRECT process communication?

Answer: In Direct communication, the sender directly send the message to the receiver. Similar sized messages are passed from the sender to the receiver is symmetric communication through message passing.

Page 6: CS604 - Operating Systems FAQZ Glossry - Press Pages · PDF fileCS604 - Operating Systems ... You can download the VMware from the followi ng link: ... Tell me the name of recommended

EAGLE_EYE

6

Question: What is the difference between execlp() and wait() systems call?

Answer: execlp () system call is used after fork system call by any process (parent or child). This system call will replace the calling process's memory space with a new program. wait system call suspends the calling program until one of its immediate children terminates.

Question: What is the difference between execlp() and wait() systems call?

Answer: execlp () system call is used after fork system call by any process (parent or child). This system call will replace the calling process's memory space with a new program. wait system call suspends the calling program until one of its immediate children terminates.

Question: What is the difference between Parent () process and init() process?

Answer: A process which creates a child is called as Parent process while a process which take care of child's return value in case of parent's death (exit from the system) is called init process.

Question: What is the difference between BATCH SYSTEMS and MULTI PROGRAMMED SYSTEMS?

Answer: In Batch system, a single job is executed at a time. These systems can not interact with the user while performing a particular task. Multi-programmed systems are those which can perform multiple programs simultaneously. They are usually interactive and time sharing system.

Question: What is the difference between Statically linked and Dynamically Linked executable files?

Answer: When procedures /libraries are linked with the program at compile time, then this linkage is called Statically linkage while are linked at run time, then its called as Dynamically linkage.

Question: Give an example of SIBBILING PROCESS?

Answer: Sibling process with respect to pipe system call means that the related processes can communicate through pipe system call. One is parent child relationship and the other is brother-brother (sibling) relationship. For example a parent has created two children A and B. Then these children A and B are siblings and hence can communicate through pipe system call.

Question: What is the difference between FIFO and PIPE?

Answer: PIPES are created between related processes. For example a pipe can be created between a parent and a child process. Whereas FIFO can be used for communication between unrelated processes. (Unrelated processes are those that can exist independently)

Question: What is NICE VALUE?

Answer: Nice value is a property of a process that helps in determining its priority in the system. Consult the following link to know more about the nice value: http://linux.die.net/man/3/nice

Question: What is PROCESS IMAGE?

Answer: The process image means that when fork system call is executed, a child process is created and that child process is exact memory image of the parent process.

Question: How to practice the command fork() and wait() in Linux?

Answer: Fork and Wait system calls are used inside C programs. For that I will suggest you to practice the examples given in lectures and handouts

Question: How can we write and compile a C program in Linux?

Answer: Write the code in a text file and save it with .c extension. Then open the terminal and go to that location where you have saved that file(with the help of cd command). After that you can write gcc fileName.c and then press enter. If it runs successfully, it will not show any error otherwise correct the highlighted error. Then you have to type ./a.out, this will run the program. I will suggest you to first compile and run a small program. (just print "Assalam O Alaikum" through printf)

Question: What is NICE VALUE?

Answer: Nice value is a property of a process that helps in determining its priority in the system. Consult the following link to know more about the nice value: http://linux.die.net/man/3/nice

Question: What is PROCESS IMAGE?

Answer: The process image means that when fork system call is executed, a child process is created and that child process is exact memory image of the parent process.

Question: What are the advantages of having multiple threads per process instead of single thread per process?

Answer: Having multiple threads enable to accomplish multiple tasks using the same process space. As well as this helps in concurrent execution of the several tasks that increases efficiency of the system. For example, you use MS-WORD; in this single application several processes(you may call them threads) are working concurrently. You are typing as well as spelling check and grammar check is also being done at the same time.

Page 7: CS604 - Operating Systems FAQZ Glossry - Press Pages · PDF fileCS604 - Operating Systems ... You can download the VMware from the followi ng link: ... Tell me the name of recommended

EAGLE_EYE

7

Question: A 64 bit OS can not run on 32 bit machine. Can you explain exactly why is it not possible.

Answer: The underline hardware architecture has been designed in such a way that a 32 bit machine do not allow 64 bit OS because the registers in 32 bit machine do not support the result obtained from 64 bit processing OS.

Question: How hidden files are represented in LINUX?

Answer: Hidden files can be displayed using ls -a command.

Question: What is the functionality of FILE SYSTEMS? For example NTFS and FAT?

Answer: File System is a system of organizing file on storage medium like disc. File system is maintained by the operating system. FAT, NTFS are examples of file systems. You will study the file system in detail in later chapters.

Question: I had read in the handouts that to run compiled program a.out command is used but if there are multiple program then do all of them will be stored in a.out file? And how can we run a particular program out of them

Answer: When you compile a program using gcc command and do not give the name of the .exe file explicitly then a.out file is created. You can run that program by ./a.out command . A better way is to use the gcc command in the following way: $ gcc programName.c -o MyProgram the above line will compile a program and make an exe file with the name MyProgram. now you can run the exe in the following way $ ./MyProgram

Question: Wat is the difference between the process and the jobs, I mean “ps” and “jobs” command.

Answer: You can use "jobs" command to show the status of the background or suspended process on your terminal screen. "ps" command will display the status of the all the current processes. There are some options like -u, -l, -e that can be used with ps command. You can see their detail in handouts.

Question: Explain how to create a C file on Linux?

Answer: You can create C file by just opening a simple file and saving it with .c extension. Write C program in it. Compile and run this program using gcc command (as explained in handouts)

Question: Is it possible that those C programs that we can compile and run in Linux environment can also be runnable in Windows, if yes then which compiler we have to install to compile the code in handouts.

Answer: You can not compile them using Turbo C or Borland C because they need support of Linux environment. The system calls that you have studied in this course is supported by Linux Kernel. But using Cygwin, you can be able to compile these C programs even in Windows. For the detail of Cygwin, consult the yesterday's announcement on Announcement Page.

Question: What are the differences between TRAP and INTERRUPTS?

Answer: Interrupt is a signal generated by a hardware device (like keyboard) to get the CPU attention to process its request. Trap is a type of exception generated when an illegal operation is performed. For example if you try to divide a number by zero.

Question: What is SPOOLING?

Answer: Spooling is to send files to some device or program that puts them in a queue for later processing, e.g. controlling output of jobs to a printer, other peripherals or input devices; used when two devices or pieces of software have different speeds. (Source: http://www.gregvogl.net/courses/os/glossary.htm)

Question: Is it possible that a certain given time windows automatically shuts down and startups automatically at a give time, if yes then how.

Answer: Yes you can do it with shutdown command in Windows. Open your command prompt and explore the command shutdown. By writing shutdown and pressing enter key you will come to know all possible functionality of shutdown command in detail. Here you will find an option where specifying the time, you system will shutdown at the specified time. There are also some software available that can help you in performing this task

Question: What is BURST TIME and WAITING TIME?

Answer: Burst time is the time taken by the CPU to run a process. Waiting time is the time for which a process waits to acquire the CPU. For example when time quantum expires or when a process is preempted, the process is taken from the CPU for some time and then given back to the CPU. This time for which a process remains away from the CPU due to some reason (as stated above) is the waiting time of that process.

Question: What is CONVOY EFFECT?

Answer: Convoy effect is the result of mechanism in which some one has to follow an order like the movement of a convoy. In FCFS, a process whether shorter or smaller has to follow a queue to be assigned to a CPU. That's why FCFS exhibits convoy effect.

Question: What is CONVOY EFFECT?

Page 8: CS604 - Operating Systems FAQZ Glossry - Press Pages · PDF fileCS604 - Operating Systems ... You can download the VMware from the followi ng link: ... Tell me the name of recommended

EAGLE_EYE

8

Answer: Convoy effect is the result of mechanism in which some one has to follow an order like the movement of a convoy. In FCFS, a process whether shorter or smaller has to follow a queue to be assigned to a CPU. That's why FCFS exhibits convoy effect.

Question: What is the difference between THROUGHPUT and TURNAROUND TIME?

Answer: Time around time is the interval between time of submission and time of completion of a process. With the help of scheduling we wan to minimize the turn around time. The number of processes completed per unit time is called throughput of the system. One of the benefits of scheduling is that maximum processes can be completed at a given time. This is related to maximizing the CPU utilization.

Question: What is the difference between SURE KILL and KILL command?

Answer: A process can be terminated by kill command. sure kill command is used for special processes which are programmed in such a way that they have the ability to ignore the signal sent to them. To terminate these processes sure kill command is used.

Question: What is the difference between SURE KILL and KILL command?

Answer: A process can be terminated by kill command. sure kill command is used for special processes which are programmed in such a way that they have the ability to ignore the signal sent to them. To terminate these processes sure kill command is used.

Question: What is the difference between suspended process and background process?

Answer: Background processes are those that usually do not require input/ output from the user like server processes. Therefore we can run them as background as we do not have to interact with them and keep on doing our normal function. Try to implement client-server code given under FIFOs and then try bg command with server process. The suspended processes are those that get suspend their execution and can be invoked again when required.

Question: What happens to process when we make it to background? It is suspended?

Answer: No, it is not suspended. Background processes keep on running in the background. in BG processes we do not have direct interaction with those processes but they keep on running in the background whereas suspended processes are concerned, their execution is suspended until invoked later.

Question: What is the difference between JOB ID and PROCESS ID?

Answer: Both are same. The term job is often use for batch systems.

Question: What is the difference between exit(0) and exit(1) statements?

Answer: exit (0) is used for successful termination of the program and exit(1) is used if the program has encountered an error and needs to be terminate.

Question: I have downloaded and installed it but it is simply giving me command prompt like interface where I can run my commands. But I don't know where to write my c program in Cygwin??

Answer: You have to write your C program in simple text file. Save that file with .c extension. Then go to that location where this file is saved with the help of cygwin (using cd command) and compile (using gcc command) and run the C program.

Question: Turn around time of a process = waiting time of a process + process CPU bursts Is it right?

Answer: Turnaround time is the total time between the submission time and completion time of process. After submission of a process, a process undergoes several stages like waiting, running, doing I/O so turnaround time is the sum of all the time these intermediate stages take.

Question: Why does the critical section problem or synchronization problem do not occurs in threads as they also shared the memory of one process, and if yes then what do we do to avoid this.

Answer: Yes, Thread also face the same problem of synchronization. As they share the process address space therefore threads can be synchronized using those techniques that are applied when processes share the same memory like semaphores, monitors etc.

Question: Why does the critical section problem or synchronization problem do not occurs in threads as they also shared the memory of one process, and if yes then what do we do to avoid this.

Answer: Yes, Thread also face the same problem of synchronization. As they share the process address space therefore threads can be synchronized using those techniques that are applied when processes share the same memory like semaphores, monitors etc.

Question: Why does the critical section problem or synchronization problem do not occurs in threads as they also shared the memory of one process, and if yes then what do we do to avoid this.

Answer: Yes, Thread also face the same problem of synchronization. As they share the process address space therefore threads can be synchronized using those techniques that are applied when processes share the same memory like semaphores, monitors etc.

Page 9: CS604 - Operating Systems FAQZ Glossry - Press Pages · PDF fileCS604 - Operating Systems ... You can download the VMware from the followi ng link: ... Tell me the name of recommended

EAGLE_EYE

9

Question: What is meant by Serialization?

Answer: Serialization means to execute the code statement in a sequence.

Question: Where we will have to place wait () and signal () operations in the code? And why we place them there?

Answer: Wait and signal are actually used to implement synchronization through semaphores. I will recommend you to first hear the lecture related to semaphore then you will be in a good position to understand the concept of wait and signal operations.

Question: How Semaphores don’t be a good solution?

Answer: The problem with semaphore arises when the wait and signal operations are misplaced in the code. And misplaced wait and signal can even cause deadlocks

Question: What is meant by Synchronization? Also process synchronization?

Answer: Synchronization is a process of executing the program in such a way that it should access shared data/ code sequentially.

Question: I am a bit confused and mixing the concepts of Critical section, process synchronization & concurrent cooperating processes as these 3 terms are used interchangeably . I know that there is some difference in between but I think the implementation solution is the same that’s why I am mixing the concept, kindly clear this ambiguity.

Answer: Critical section is a piece of code which is shared between processes. It means that several processes can access that code at the same time. But we do not want that shared code be accessed by every process at any time. Infact we want to synchronize their execution i.e. when one process is executing a shared piece of code then no other process should be able to modify it otherwise it could result in incorrect result.. And concurrent processes are those processes that can run simultaneously. For example if you create a child process using fork system call then a child process is created. This child and parent process can run simultaneously. This simultaneous running processes are called concurrent processes.

Question: What is the similarity OR difference among • Bounded-Buffer Problem • Readers and Writers Problem • Dining Philosophers Problem

Answer: There is no similarity or difference between these. These are all independent classical problems to solve the critical sections. Actually when we have to test an algorithm related to critical section then firstly we test that algorithm on these classical problems.

Question: What is the reason for SYSTEM HANG?

Answer: System can hang due to several reasons. System usually hang due to insufficient resources. For example you have requested the OS to load a program but the system does not have required memory to load.

Question: What is reason for SYSTEM CRASH?

Answer: System crash due to some defect in the application. Some bugs are not visible unless a specific condition is met e.g. system may fail at a particular input or at a particular date.

Glossary 32-bit/16-bit: : 32 bit applications have several advantages over their 16 bit brothers. They run in their separate

address space and they can rarely crash the system. They are always running in a preemptive multitasking environment and they can have multiple threads running in parallel. In addition they run generally faster than their corresponding 16 bit counterparts. 16 bit applications all run in the same, shared, address space meaning that the crash of a 16 bit application can easily bring down the entire system. In addition, the 16 bit application cannot handle long filenames. When you use a 16 bit application you will only be able to see the 8.3 short filenames.

Access Point : A hardware device or a computer's software that acts as a communication hub for users of a wireless device to connect to a wired LAN.

ACPI : Short for Advanced Configuration and Power Interface, a power management specification developed by Intel, Microsoft, and Toshiba. ACPI, which will be part of the next version of Windows, enables the operating system to control the amount of power given to each device attached to the computer. With ACPI, the operating system can turn off peripheral devices, such as a CD-ROM players, when they're not in use. As another example, ACPI will enable manufacturers to produce computers that automatically power up as soon as you touch the keyboard.

AGP : Short for Accelerated Graphics Port, a new interface specification developed by Intel Corporation. AGP is based on PCI, but is designed especially for the throughput demands of 3-D graphics. Rather than using the PCI bus for graphics data, AGP introduces a dedicated point-to-point channel so that the graphics controller can directly access main memory. The AGP channel is 32 bits wide and runs at 66 MHz. This translates into a total bandwidth of 266 MBps, as opposed to the PCI bandwidth of

Page 10: CS604 - Operating Systems FAQZ Glossry - Press Pages · PDF fileCS604 - Operating Systems ... You can download the VMware from the followi ng link: ... Tell me the name of recommended

EAGLE_EYE

10

133 MBps. AGP also supports two optional faster modes, with throughputs of 533 MBps and 1.07 GBps. In addition, AGP allows 3-D textures to be stored in main memory rather than video memory.

ASCII : It stands for American Standard Code Information Exchange and is pronounced (ask-ee). A standard code or protocol for displaying characters and transferring data between computers and associated equipment. It was developed for the purpose of information exchange among the following: Associated equipment Data communications systems Data processing systems There are 128 standard ASCII codes each of which can be represented by a 7 digit binary number: 0000000 through 1111111.

Asynchronous

:

1 : not synchronous; not occurring or existing at the same time or having the same period or phase. 2 : of, used in, or being digital communication (as between computers) in which there is no timing requirement for transmission and in which the start of each character is individually signaled by the transmitting device.

ATA : AT Attachment - also known as IDE.

Administrator:

:

Typically the owner, primary user, or designated technician of a computer and/or computer network. Typically, the administrator is any user with privileged access to most files and folders on the computer.

Application : Any program that allows the user to perform a particular task or set of tasks. For example, Microsoft Word is an application which allows the user to type and format text documents.

Paging : The process of realizing virtual memory in physical memory by moving blocks of physical memory to and from a slower storage media (usually a disk).

Partition : Sub-division of a disk into smaller logical disks.

Process : A collection of threads that share resources.

Protected

Mode :

Refers to the Intel 80286 Protected Mode architecture. When the CPU runs in this mode, it supports virtual memory, memory access restrictions and task-switching in hardware. This is the prefered mode for all new operating system and the only mode where you can access memory above 1 MB.

Real Mode : Refers to the Intel 80286 Protected Mode architecture. The mode in which the 8086 ran. It supports upto 1 MB of address space and has no access restrictions whatsoever.

Ring 0 : Refers to the Intel 80286 Protected Mode architecture. The least restricted level with access to all system resources. Should only be used by the OS and its drivers.

Ring 3 : Refers to the Intel 80286 Protected Mode architecture. The most restricted level of protection. Should be used by all user applications.

Sector : Smallets unit data storage on a disk. Often blocks with a size of 512, 1024, 2048 or 4096 bytes (CD-ROM can use 2352).

Storage Media

:

A media capable of storing data permanently. Often the shape of a disc or as a tape.

UID : User ID - a number or a string that represents the user uniquely within the OS.

UMB : Upper Memory Block - in DOS 5 or later, unused blocks of memory in the 640 KB - 1 MB memory range can be used to store device drivers.

UniCode : A newer way of supporting all foregin languages special characters. Used instead of DBCS. Uses two bytes to represent one character, supports upto 65536 different characters. Used primarily in WinNT and Win95/98.

V86 Mode : Refers to the Intel 80386 Protected Mode architecture. A mode where the CPU emulates the 8086 real mode addressing but maintains support for paging and certain access restrictions. Often used by OS's to implement virtual DOS machines and can be used to implement a EMS memory manager (like QEMM386 or EMM386).

Virtual

Memory :

A CPU-addressible memory area, which does not exist in real memory, but is created on a slower storage media. The process of swapping virtual memory in and out of real memory is called paging.

Volume : An area of a disk containing a filesystem of some kind.

XMS : eXtended Memory Specification - a system to access additional memory in DOS. It uses a copying mechanism to copy to/from conventional memory to/from extended memory.

GUI -

Graphical

User Interface:

:

A program interface that takes advantage of the computer's graphics capabilities to make the program easier to use. Well-designed graphical user interfaces can free the user from learning complex command languages. On the other hand, many users find that they work more effectively with a command-driven interface, especially if they already know the command language.

Hot Fix: : Novell, Inc.'s term for the feature of their network file server operating system, Novell NetWare,

Page 11: CS604 - Operating Systems FAQZ Glossry - Press Pages · PDF fileCS604 - Operating Systems ... You can download the VMware from the followi ng link: ... Tell me the name of recommended

EAGLE_EYE

11

which handles errors in disk write operations. The OS re-reads every block it writes to disk while it holds the data to be written in memory. In the case of an error, the data block is written to a spare area on the disk. The feature lost much of its importance with the widespread use of hard disk drives with built-in error correction and bad block re-mapping.

Algorithm : A formal set of instructions that can be followed to perform a specific task, such as a mathematical formula or a set of instructions in a computer program.

AMD : (Advanced Microchip Devices) A semiconductor manufacturer and is a major competitor of Intel. They manufacture the Athlon, Duron, and K6 CPU chips.

GUI : Any computer operating system where commands are executed visually on the screen, and directory structures and files are represented by pictures (icons). Popular examples of GUI's today are Microsoft Windows and the MacOS.

Mac OS 9 (and

earlier): :

The name given to earlier versions of the Macintosh Operating System (MacOS). The MacOS has gone through many versions since its inception in 1984, and it is heralded as the first successful Graphical User Interface (GUI) available to the public.

Mac OS X: : The newest operating system from Apple Computer, designed to run on the newest Macintosh computers. Unlike the Classic Mac OS, Mac OS X is based on a UNIX architecture known as FreeBSD. Mac OS X is currently in version 10.2.3.

Menu Bar: : The strip running across the top of the screen or along the top of a window that usually contains pull-down menus such as File, Edit, View, etc.

Network: : Within companies and university settings, the company’s internal network is often called a LAN (local-area network). A network is a system of cabling and file servers that allows one to access remote printers, and any remote file servers residing on the same network as the computer you are using. Most networks allow access to other networks, as well, enabling email and Internet browsing. At Purdue Calumet, most Mac and Windows computers are attached to a campuswide LAN. At home, you may use a modem to connect to your Internet Service Provider's network, such as America Online or MSN.

Operating

System: :

The basic set of instructions by which a computer functions. The operating system tells the physical components of the computer what to do and when, and provides the user with a method by which he or she may command the computer, run applications, and create files. Current examples of operating systems include Microsoft Windows XP, Windows 95 through 2000, Mac OS X and below, Linux, and DOS.

File Server: : A computer that stores files and allows them to be retrieved over a network by designated users of the system. File servers can also host web sites, but not every file server is necessarily a web server. Any computer can become a file or web server using software such as Novell Netware, Mac OS X Server, or Windows NT Server.

Home

Directory: :

A folder containing a particular user's documents, pictures, movies, et cetera. Generally refers to UNIX-based operating systems, where Home is the default storage location for a user’s created documents. Only the owner of a Home Directory may see its contents; i.e., Sally, when logged in as herself, cannot see Bob's Home Directory contents, except for what is in the Public folder. Likewise, Bob can see his Home Directory when he is logged in, but he cannot see Sally’s.

Privileges: : In computing terms, a user with privileged access to a file may read, copy, and modify that file at will. An unprivileged user, or non-administrator, only has privileges within certain directories, particularly his or her Home directory.

Pull-Down

Menus: :

A list of commands that can be “pulled down” and selected from the Menu Bar by clicking the menu name. In most operating systems that contain these menus, commands to perform routine tasks are located in the same place regardless of the application you are using. For example, the File menu always contains commands such as Save, Print, and New Document.

Start Button: : Appears on the far left of the taskbar, and provides quick access to programs, files, control panels, help, and search features in Windows 95 or higher.

Disk : A circular storage media, on which data can be recorded, usually in sectors. Often magnetically or optically coded.

SCSI : Small Computer Systems Interface - a general bus for connecting additional devices to a computer. Modified and exists in serveral variations today, known as SCSI-2, SCSI-3, Ultra-SCSI 1+2, Fast SCSI 1+2, Wide SCSI and serveral other combinations. Basic SCSI uses a 8-bit parallel bus running at 5 MHz giving it a transfer rate of 5MB/s.

Thread : A thread of execution is the series of machine instructions that the CPU executes.

Online : Connected and accessible to the computer. For example, most disk storage at UIC is online and is

Page 12: CS604 - Operating Systems FAQZ Glossry - Press Pages · PDF fileCS604 - Operating Systems ... You can download the VMware from the followi ng link: ... Tell me the name of recommended

EAGLE_EYE

12

therefore easily and quickly accessed.

OS : The controlling program(s) that oversee the operation of the computer. Some operating system functions are job scheduling, low level input/output handling, and job accounting. Often abbreviated as "o/s".

Output : (1) Data transferred from a computer's internal storage unit to some storage or output device. (2) The final result of data that have been processed by the computer or a particular computer program.

Packet : The unit of data sent across a network -- a sequence of bits including data and call control signals (headers), arranged in a specific format, which is sent (switched) together as a single identity. Also known as frame, datagram, segment, or message, sometimes with a little different meaning. Sometimes "packet" is used more specifically to refer to a unit of data on a physical network.

Parity Bit : An extra check bit added to the binary representation a character to make it conform to the parity checking method used.

Parity Check : A method of error detection that checks whether the sum of bits in each character received conforms to a given protocol. In odd parity, the sum of the bits (including the parity bit) must be odd; if a pattern would otherwise be even, the parity bit is set to 1 to maintain oddity. In even parity, the opposite convention is used. In mark or no parity, no parity checking is done.

Peripherals : Any device which is attached to a computer system or LAN. Devices such as printers, disks and tape drives which are often attached to computers or LANs.

PING : Packet INternet Groper: The ICMP (Internet Control Message Protocol) provides message packets to report errors and other information in IP processing; PING uses ICMP echo messages and its reply to test the reachability of a network device. See Using Ping.

Spooling : Acronym for simultaneous peripheral operations on-line, spooling refers to putting jobs in a buffer, a special area in memory or on a disk where a device can access them when it is ready. Spooling is useful because devices access data at different rates. The buffer provides a waiting station where data can rest while the slower device catches up. The most common spooling application is print spooling. In print spooling, documents are loaded into a buffer (usually an area on a disk), and then the printer pulls them off the buffer at its own rate. Because the documents are in a buffer where they can be accessed by the printer, you can perform other operations on the computer while the printing takes place in the background. Spooling also lets you place a number of print jobs on a queue instead of waiting for each one to finish before specifying the next one.

Port : A pathway for data flow in and out of a computer. On PCs, a port is a slot or plug where cables for input and output devices are attached.

Post

Processing :

A post processing program process the output from another program. The most common use of a post processor is with systems which have one general program which processes user input and generate generic output, which contains no system or device dependent information. This device independent output is then passed to a post processor which creates final output which is specific for a particular machine or output device.

PPP : Point-to-Point Protocol, defined in RFC 1171, provides a method for transmitting packets over serial point-to-point links. See internet.com's PC Webopaedia entry on PPP, the Network Service Kit, and the NETNEWS/Usenet PPP FAQ. See also: SLIP.

Print server : Like a file server, a print server allows the machines on a LAN to share a single printer and also handles the printing queue for the printer.

Protocols : A set of rules or procedures implemented in both hardware and software to facilitate communications provide a well defined interface between different systems. The protocol govern format, timing, sequencing, error handling. A converter is device which translates one to another.

Response Time

:

The time measured from when you enter a command until you receive a response at the terminal.

COM : Stands for Component Object Module. In DOS systems, the name of a serial communications port. DOS supports four serial ports: COM1, COM2, COM3, and COM4. However, most software uses system interrupts to access the serial ports, and there are only two IRQ lines reserved. This means that the four COM ports share the same two IRQ lines. Typically, COM1 and COM3 use IRQ4, while COM2 and COM4 use IRQ3. So in general, if you have two devices, one of which is attached to COM1 and the other to COM3, you cannot use them simultaneously.

DMA : Hardware devices attached to PCs (ranging from keyboards to sound cards) can be designed to send their instructions to and from main memory in one of two ways. The default is to ask the CPU to do the work. The more efficient way is to allocate one of the PC's DMA channels to send instructions directly to memory. This leaves the CPU free to do more important things. Like IRQs, DMA

Page 13: CS604 - Operating Systems FAQZ Glossry - Press Pages · PDF fileCS604 - Operating Systems ... You can download the VMware from the followi ng link: ... Tell me the name of recommended

EAGLE_EYE

13

channels are limited in number, and you can't allocate one channel to more than one device (unless you want to grind your system to a halt). Most users come in contact with DMA when they install a sound card that--if they're lucky--picks the right channel during setup.

Expanded

Memory: :

Also known as EMS (Expanded Memory Specification), expanded memory is a technique for utilizing more than 1MB (megabyte) of main memory in DOS -based computers. The limit of 1MB is built into the DOS operating system. The upper 384K is reserved for special purposes, leaving just 640K of conventional memory for programs.

Extended

Memory: :

Memory above and beyond the standard 1MB (megabyte) of main memory that DOS supports. Extended memory is only available in PCs with an Intel 80286 or later microprocessor. Two types of memory can be added to a PC to increase memory beyond 1MB: expanded memory and extended memory. Expanded memory conforms to a published standard called EMS that enables DOS programs to take advantage of it. Extended memory, on the other hand, is not configured in any special manner and is therefore unavailable to most DOS programs. However, MS-Windows and OS/2 can use extended memory.

FAT : Stands for File Allocation Table. Basically this is a table of contents in a directory that tells the computer what all is in there. Look at your Netscape cache, you'll see a FAT. It'll be the first file.

FAT 32 : A new version of the file allocation table (FAT) available in Windows 95 OSR 2 and Windows 98. FAT32 increases the number of bits used to address clusters and also reduces the size of each cluster. The result is that it can support larger disks (up to 2 terabytes) and better storage efficiency (less slack space).

Interleaving : A recording method that reduces data errors during playback. Instead of the file being written in a contiguous data stream, the data sectors are intermixed along the recording track. If a disc should have a smudge or scratch, the entire data file is generally recoverable because a smaller amount of the file data is affected

Interrupt : A signal informing a program that an event has occurred. When a program receives an interrupt signal, it takes a specified action (which can be to ignore the signal). Interrupt signals can cause a program to suspend itself temporarily to service the interrupt. Interrupt signals can come from a variety of sources. For example, every keystroke generates an interrupt signal. Interrupts can also be generated by other devices, such as a printer, to indicate that some event has occurred. These are called hardware interrupts. Interrupt signals initiated by programs are called software interrupts. A software interrupt is also called a trap or an exception. PCs support 256 types of software interrupts and 15 hardware interrupts. Each type of software interrupt is associated with an interrupt handler -- a routine key on your keyboard, this triggers a specific interrupt handler. The complete list of interrupts and associated interrupt handlers is stored in a table called the interrupt vector table, which resides in the first 1 K of addressable memory.

API : Application Programming Interface - the set of routines/functions made available to a program developer.

ATAPI : ATA Packet Interface - minor extension to IDE to control additional device types

Desktop: : The work area on which you place files and folders in many operating systems, such as Windows and the MacOS. The Desktop is usually the first thing you see when you begin working with the computer, and on it are the icons that, when clicked, can lead you into the various directories of the system.

Taskbar: : The bar typically located at the bottom of the screen in Windows 95 and above that houses the Start button, and displays all currently open windows, each of which may be made active at any time by clicking on the appropriate name in the taskbar.

UNIX : A computer operating system originally invented in the early 1970's. UNIX has come to be a general term describing a wide array of operating systems, some graphical and some command-line only. Some of the more popular examples of UNIX in use today are Solaris, Linux, Mac OS X, BSD, and BeOS.

Windows

Operating

System: :

The operating system developed by the Microsoft Corporation in the mid-1980s as a competitor to Apple’s MacOS. Windows began not as an actual operating system but as a simple shell alternative to MS-DOS (Windows 3.1 being the most popular). Windows 95 is the first complete Windows operating system, using DOS as a base architecture but not requiring its installation in order to function. The most current version of Windows is XP, although Windows 2000 is still in wide use.

DLL : Dynamic Link Libary - a set of routines stored in a file. Addresses to the routines are determined by the OS on load or at run-time.

DOS : Disk Operating System - a simple single user single tasking OS bought by Bill Gates as QDOS and used on the first IBM PC's. A clone, DR-DOS is available.

Page 14: CS604 - Operating Systems FAQZ Glossry - Press Pages · PDF fileCS604 - Operating Systems ... You can download the VMware from the followi ng link: ... Tell me the name of recommended

EAGLE_EYE

14

GID : Group ID - a number or a string that represents the group to which a user belongs uniquely within the OS.

Handle : Usually a number used by the operating system to identify an object, like an open file or a window.

IDE : Integrated Drive Electronics - a system for connecting harddisks to your computer. Used in PC. Supports upto 2 units. Replaced by EIDE.

LFN : Long File Name - a filename that is longer than the DOS 8.3 specification.

Boot Disk : A diskette from which you can boot your computer. Normally, your computer boots from a hard disk, but if the hard disk is damaged (for example, by a virus), you can boot the computer from a bootable diskette. For this reason, it's a good idea to make sure you always have a bootable diskette on hand. In Windows 95, you can create a bootable diskette by following these steps: 1. Insert a blank, formatted diskette in the floppy drive 2. Select Start->Settings->Control Panel 3. Open Add/Remove Programs 4. Select the Startup Disk tab and press the Create Disk... button A bootable diskette is also called a bootable floppy, boot disk, and startup disk.

Clock Speed: : The clock speed is the frequency which determines how fast devices that are connected to the system bus operate. The speed is measured in millions of cycles per second (MHz or megahertz) and is generated by a quartz crystal on the motherboard which acts as a kind of metronome. Devices that are synchronized with the clock may run faster or slower but their speed is determined by multiplying or dividing a factor by the clock speed.

Clustering: : A technique in which two or more servers are interconnected and can access a common storage pool. Clustering prevents the failure of a single file server from denying access to data and adds computing power to the network for large numbers of users.

CMOS : Abbreviation of complementary metal oxide semiconductor. Pronounced see-moss, CMOS is a widely used type of semiconductor. CMOS semiconductors use both NMOS (negative polarity) and PMOS (positive polarity) circuits. Since only one of the circuit types is on at any given time, CMOS chips require less power than chips using just one type of transistor. This makes them particularly attractive for use in battery-powered devices, such as portable computers. Personal computers also contain a small amount of battery-powered CMOS memory to hold the date, time, and system setup parameters.

Command

Line :

Commands you type to run an application. You can type commands at an MS-DOS prompt or in the Run dialog box in the Program Manager of Windows. Interfaces in which you type commands rather than choose them from a menu are often called command line interfaces. MS-DOS has a command line interface while the Macintosh does not.

Compile : This is an application that converts a programming language into a machine language program.

Config.SYS : The configuration file for DOS systems. Whenever a DOS computer boots up, it reads the CONFIG.SYS file (if it exists) and executes any commands in it. The most common commands are BUFFERS= and FILES=, which enable you to specify the buffer size and the number of files that can be open simultaneously. In addition, you can enter commands that install drivers for devices.

Conventional

Memory: :

On DOS systems, conventional memory refers to the portion of memory that is available to standard DOS programs. DOS systems have an address space of 1MB (megabyte), but the top 384K (called high memory) is reserved for system use. This leaves 640K of conventional memory. Everything above 1MB is either extended or expanded memory.

Data

Conversion :

The translation of data from one format to another. Often when data are moved from one system to another, some form of data conversion is required to convert the data to a format the receiving system can interpret. Sometimes it is necessary to have an intermediate format

DHCP: : Dynamic Host Configuration Protocol. This protocol provides a mechanism for allocating IP addresses dynamically so that addresses can be reused. Often used for managing the IP addresses of all the cable modems in a cable plant and the PC's connected to the cable modems.

Dial-Up

Networking :

A component in Windows 95 that enables you to connect your computer to a network via a modem. If your computer is not connected to a LAN and you want to connect to the Internet, you need to configure Dial-Up Networking (DUN) to dial a Point of Presence (POP) and log into your Internet Service Provider (ISP). Your ISP will need to provide certain information, such as the gateway address and your computer's IP address. You access DUN through the My Computer icon. You can configure a different profile (called a connectoid) for each different online service you use. Once configured, you can copy a connectoid shortcut to your desktop so that all you need to do to make a connection is double-click the connectoid icon.

Direct X: : A set of APIs developed by Microsoft that enables programmers to write programs that access hardware features of a computer without knowing exactly what hardware will be installed on the

Page 15: CS604 - Operating Systems FAQZ Glossry - Press Pages · PDF fileCS604 - Operating Systems ... You can download the VMware from the followi ng link: ... Tell me the name of recommended

EAGLE_EYE

15

machine where the program eventually runs. DirectX achieves this by creating an intermediate layer that translates generic hardware commands into specific commands for particular pieces of hardware. In particular, DirectX lets multimedia applications take advantage of hardware acceleration features supported by graphics accelerators. DirectX 2, released in 1996, supports the Direct3D architecture. DirectX 5, released in 1998, adds new layers to the DirectX API. In addition to the low-level layer that communicates directly with multimedia hardware, DirectX 5 also includes a Media layer that enables programmers to manipulate multimedia objects and streams. DirectX 5 also supports USB and IEEE 1394 buses, AGP, and MMX.

Driver : A program that controls a device. Every device, whether it be a printer, disk drive, or keyboard, must have a driver program. Many drivers, such as the keyboard driver, come with the operating system. For other devices, you may need to load a new driver when you connect the device to your computer. In DOS systems, drivers are files with a .SYS extension. In Windows environments, drivers often have a .DRV extension. A driver acts like a translator between the device and programs that use the device. Each device has its own set of specialized commands that only its driver knows. In contrast, most programs access devices by using generic commands. The driver, therefore, accepts generic commands from a program and then translates them into specialized commands for the device.

Dumb

Terminal: :

This a video screen that is seeing manipulation in another computer. Example: If you log in to AOL, your computer is not doing the work -- AOL's computer is. You are just being offered a window into that world. That window is your screen. It's a terminal, but it's just watching -- thus a dumb terminal.

EBCDIC : Extended Binary Coded Decimal Interchange Code. It is also called the Extended ASCII Code, as it adds an eighth digit to the normal seven-digit code.

ECC Memory:

:

Error Checking and Correction. A method of detecting and correcting system memory errors by adding additional bits and using a special algorithm.

EDO Memory:

:

Short for Extended Data Output Dynamic Random Access Memory, a type of DRAM that is faster than conventional DRAM. Unlike conventional DRAM which can only access one block of data at a time, EDO RAM can start fetching the next block of memory at the same time that it sends the previous block to the CPU.

EEPROM: : Acronym for electrically erasable programmable read-only memory. Pronounced double-ee-prom or e-e-prom, an EEPROM is a special type of PROM that can be erased by exposing it to an electrical charge. Like other types of PROM, EEPROM retains its contents even when the power is turned off. Also like other types of ROM, EEPROM is not as fast as RAM. EEPROM is similar to flash memory (sometimes called flash EEPROM). The principal difference is that EEPROM requires data to be written or erased one byte at a time whereas flash memory allows data to be written or erased in blocks. This makes flash memory faster.

EIDE: : (Enhanced Integrated Development Environment), also called EIDE, is a term that Western Digital coined in 1994 to represent a particular set of extensions it devised to the original AT Attachment standard. At that time, the official ATA standard was rather limiting, and work was progressing towards the new ATA-2 standard. Western Digital decided that it did not want to wait for the new standard, and also that it could better position itself as a market leader by creating a new feature set for (then) future drives. The name "Enhanced IDE" was presumably selected to build upon the common name for ATA then in popular use: IDE.

Emulation : Refers to the ability of a program or device to imitate another program or device. Many printers, for example, are designed to emulate Hewlett-Packard LaserJet printers because so much software is written for HP printers. By emulating an HP printer, a printer can work with any software written for a real HP printer. Emulation tricks the software into believing that a device is really some other device. Communications software packages often include terminal emulation drivers. This enables your PC to emulate a particular type of terminal so that you can log on to a mainframe. It is also possible for a computer to emulate another type of computer. For example, there are programs that enable an Apple Macintosh to emulate a PC.

Encryption: : Encryption is the process of converting data into "unreadable code" is so that unauthorized people cannot understand the content. Encryption may be used to make stored data private (e.g., data that is stored on a potentially vulnerable hard disk), or to allow a nonsecure communications channel to serve as a private communications channel. Encryption is sometimes described as the process of converting plaintext into ciphertext. To decipher the message, the receiver of the encrypted data must have the proper decryption key.

EPROM: : Acronym for erasable programmable read-only memory, and pronounced ee-prom, EPROM is a special type of memory that retains its contents until it is exposed to ultraviolet light. The ultraviolet light clears its contents, making it possible to reprogram the memory. To write to and erase an EPROM, you need a special device called a PROM programmer or PROM burner. An EPROM

Page 16: CS604 - Operating Systems FAQZ Glossry - Press Pages · PDF fileCS604 - Operating Systems ... You can download the VMware from the followi ng link: ... Tell me the name of recommended

EAGLE_EYE

16

differs from a PROM in that a PROM can be written to only once and cannot be erased. EPROMs are used widely in personal computers because they enable the manufacturer to change the contents of the PROM before the computer is actually shipped. This means that bugs can be removed and new versions installed shortly before delivery.

Executable

File: :

A file in a format that the computer can directly execute. Unlike source files, executable files cannot be read by humans. To transform a source file into an executable file, you need to pass it through a compiler or assembler. In DOS systems, executable files have either a .COM or .EXE extension and are called COM files and EXE files, respectively.

FDISK : A program found in all Aptiva software loads that allows modification of the partitions and/or logical drives on the hard drive. It can Display, Delete and Create partitions and logical drives, defining them for DOS, OS/2 or Windows, depending on which version of FDISK is used and how it is used. Type FDISK and hit Enter to start the program. This is a DESTRUCTIVE command and incorrect use will result in data loss!

File Sharing: : This is the most important feature of the Internet. This is a method of allowing one server to give the same file to many different end users.

FSB : Stands for Front Side Bus, which denotes the speed at which your processor interacts with the components on the motherboard. Typically the FSB is 100Mhz or 133Mhz, but overclockers often manipulate this value to increase the speed at which their processor runs. i.e. 100Mhz FSB X 5.0 clock multiplier = 500Mhz processor.

General

Protection

Fault: :

GPF, short for General Protection Fault, is a computer condition that causes a Windows application to crash. The most common cause of a GPF is two applications trying to use the same block of memory, or more specifically, one application trying to use memory assigned to another application. The following situations can also cause GPFs: Running an application with insufficient resources Using improper hardware device drivers Corrupted or missing Windows files Applications exchanging data that cannot be read GPFs are often preceded by an invalid page fault.

Classic: : A program layer within Mac OS X that contains the resources necessary to run applications designed for Mac OS 9 and earlier. Requires the presence of a valid Mac OS 9.1 or higher System Folder.

Command-line

Interface: :

Any computer operating system where commands are entered into the computer by the user typing in a set of phrases. Many types of UNIX are command-line interfaces, as was the precursor to Windows, MS-DOS.

Directory: : Often known as a folder, and usually displayed as a folder icon on-screen. A floppy, Zip, CD-ROM, file server, or hard disk are all also examples of directories. All files reside in a directory of some kind.

Dock: : The Dock in Mac OS X contains shortcuts to applications, folders, and the Trash. The Dock also shows currently open applications visually by placing a triangle next to the appropriate icons.

File: : Any data file that is not a directory (folder or disk). Includes applications, documents, and system resources.

Trash or

Recycle Bin: :

A directory usually found on the Desktop that acts as a repository for deleted files. Items placed in the trash or recycle bin may be retrieved by the user at any time until the user chooses to “empty” the directory.

User: : You! In other words, the person currently logged in and using the computer. In many systems in use today, each user is designated by a username and password that is specific to him or her.

GPF : General Protection Fault - a process violated its assigned resources and tried to access a resource which it was not granted (often unavailable memory due to pointer errors).

HMA : High Memory Area - a 64 KB block of memory accessible by the i80286 and later above 1 MB when running in real mode.

Offline : Logically or physically disconnected from the computer. For example, a reel of tape is offline storage.

Server : Server is a special device used to "serve" some system or facility. A server is usually a microcomputer, or, on CMS, a special account which runs automatically without interactive supervision. Servers act in response to requests which are sent to it.

Shared File

System (SFS) :

A file system on CMS that let users organize their files into directory trees.

SLIP : Serial Line Internet Protocol: SLIP is currently a de facto standard, commonly used for point-to-point serial connections running TCP/IP. It is not an Internet standard but is defined in RFC 1055. The ACCC's dial-up lines that give ADN and Internet service support SLIP. See internet.com's PC Webopaedia entry on SLIP and the Network Service Kit. See also PPP.

Page 17: CS604 - Operating Systems FAQZ Glossry - Press Pages · PDF fileCS604 - Operating Systems ... You can download the VMware from the followi ng link: ... Tell me the name of recommended

EAGLE_EYE

17

SMTP : Simple Mail Transfer Protocol: A protocol from the Internet suite (e.g., TCP/IP) that is used to send electronic mail between users on different host systems. SMTP is defined in the Internet RFC 821. For more information on SMTP as it is used at the UIC, see Changing to your ISP's SMTP server.

Spooler : A program which manages requests or jobs submitted to it for execution, selection requests for execution in an orderly manner from a queue. Print spoolers are a common example.

statistical

multiplexing :

ATM networking: If bursts of data result in more data being put on an ATM network than it can handle at one time, the excess data is buffered and put in subsequent free cells. This allows the peak bandwidth on ATM networks to be higher than the network's physical media can carry. The network's administrators use "statistical" estimates to decide by how much they can oversubscribe the network's total bandwidth. (In other words, they hope that simultaneous multiple bursts like this will be statistically unlikely.)

Backup : To copy files to a second medium (a disk or tape) as a precaution in case the first medium fails. One of the cardinal rules in using computers is. Back up your files regularly. Even the most reliable computer is apt to break down eventually. Many professionals recommend that you make two, or even three, backups of all your files. To be especially safe, you should keep one backup in a different location from the others. You can back up files using operating system commands, or you can buy a special-purpose backup utility. Backup programs often compress the data so that backups require fewer disks. (1) The act of backing up. (2) A substitute or alternative. The term backup usually refers to a disk or a tape that contains a copy of data.

BIOS : Stands for Basic Input/Output System. The BIOS gives the computer a little built-in starter kit to run the rest of softwares from floppy disks (FDD) and hard disks (HDD). The BIOS is responsible for booting the computer by providing a basic set of instructions.

Buffer: : A place, especially in RAM, for the temporary storage of data for the purpose of speeding up an operation such as printing or disk access. Data from a buffer is available more quickly than data from where the buffer got it. Typically buffers get data before it is needed so it will be ready quickly when it is needed. Similar to cache.

Cache RAM : Cache (usually SRAM) stores frequently requested data and instructions. It is a small block of high-speed memory located between the CPU and the main memory. When your computer processor needs data, it will check the Cache first to see if it is there. If the data is not there, it will retrieve it from the slower main memory.

Fault

Tolerance: :

The ability of a system to respond gracefully to an unexpected hardware or software failure. There are many levels of fault tolerance, the lowest being the ability to continue operation in the event of a power failure. Many fault-tolerant computer systems mirror all operations -- that is, every operation is performed on two or more duplicate systems, so if one fails the other can take over.