Property:Summary

From COMP15212 Wiki

Text A summary of the page.

Showing 20 pages using this property.
D
For many years the magnetic disk has been the choice for backing store - i.e. ‘memory’ which is not directly addressable by a processor. This is typically, but not always exclusively, for files. Sometimes other technologies are (inaccurately) called “disks” too!  +
F
Fragmentation is when something - such as a file - which would be nice to have as one big item has been split into several smaller parts.  +
M
Gaining access to files by <i>making them appear</i> as arrays in the address space.  +
S
Granting permission whilst maintaining security.  +
F
How Unix processes can create more Unix processes.  +
How files are organised.  +
How files may be written and read.  +
D
In Unix, a daemon is a background process belonging to the system.  +
U
In Unix, a set of “signals” allow system-level inter-process communication. For example, this allows one process to destroy another (permissions permitting). A target process can intercept and handle most signals in its own way.  +
S
In Unix, the software which provides a command line interface - and more.  +
L
In this context, means of connecting a file <i>tree</i> structure into a directed <i>graph</i>.  +
M
Increasing security by limiting access to various memory areas. This includes preventing one process from corrupting any others' spaces.  +
E
Information about Unix command-line interfaces.  +
S
Issues connected with memory made visible to more than one process.  +
M
Memory is the fundamental element in conventional contemporary computers, (apparently) containing all the code and data of executing programs. Its management as a resource is a fundamental task.  +
Metadata provides information <i>about</i> the ‘main’ data.  +
U
Methods by which the software can communicate with the I/O devices.  +
M
Mutual exclusion means “one at a time”. In this case it is largely about only allowing one of many possible threads to change some structure or I/O device.  +
P
Not restricted to OS code, pointers are used in all computer programming. They are used extensively in (and around) an OS and a thorough understanding is important.  +
S
OS provided calls that provide privileged, protected services using trusted code. Used to provide access to I/O devices, system variables etc.  +