Term
|
Definition
| Master Boot Record: a sequence of 512 bytes located at the first sector of a data storage device such as a hard disk |
|
|
Term
|
Definition
| Operating System: a set of programs that manage computer hardware resources and provide common services for application software |
|
|
Term
| 2 Important Functions of OS |
|
Definition
1. Provides User Interface 2. Manage basic hardware operations |
|
|
Term
|
Definition
| Information Database that stores configuration settings, locations, and options for applications running on the OS |
|
|
Term
|
Definition
| HAL(Hardware Abstraction Layer), Kernel, Applications |
|
|
Term
|
Definition
| Hardware Abstraction Layer: Layer between hardware and kernal. Its function is to hide differences in hardware from most of the kernel, so that most of the kernel-mode code does not need to be changed to run on systems with different hardware |
|
|
Term
|
Definition
| The main component of most computer operating systems; it is a bridge between applications and hardware |
|
|
Term
| Hyper-Threading (HT or HTT) |
|
Definition
| Processor duplicates the setup sections of the processor to allow the operating system to schedule two threads or processes simultaneously. Increases Performance 5-10% |
|
|
Term
|
Definition
| An authentication protocol aimed primarily at a client–server model, and provides mutual authentication—both the user and the server verify each other's identity. Uses port 88 by default |
|
|
Term
|
Definition
| Unicode Transformation Format: has 8, 16, and 32 bit formats with 64 on the way. UTF-8 is default character encoding |
|
|
Term
|
Definition
| Portable Operating System Interface: a family of standards specified by the IEEE for maintaining compatibility between operating systems. POSIX defines the application programming interface (API) |
|
|
Term
|
Definition
| Application Programming Interface: source code based specification intended to be used as an interface by software components to communicate with each other. An API may include specifications for routines, data structures, object classes, and variables. |
|
|
Term
|
Definition
| Virtual Machine Manager: hardware virtualization techniques allowing multiple operating systems, termed guests, to run concurrently on a host computer. |
|
|
Term
|
Definition
| Extended File Allocation Table: a proprietary file system designed especially for flash drives. Theoretical file size limit of 2^64 bytes |
|
|
Term
|
Definition
| A measure of the number of possible keys which can be used in a cipher |
|
|
Term
| Number of Possible Keys based on Key Length? (formula to determine) |
|
Definition
| 2^n Where n is the length of the key. So a key that is 16 characters long will have 2^16 (65,536) possible keys |
|
|
Term
|
Definition
| The location that all processors always start processing at bootup |
|
|
Term
|
Definition
| Extensible Firmware Interface: A specification that defines a software interface between an operating system and platform firmware |
|
|
Term
|
Definition
| Unified Extensible Firmware Interface: evolved from EFI1.10 and is not restricted to any specific processor architecture |
|
|
Term
|
Definition
Can boot from large disks Faster Bootup CPU-Independent drivers and architecture Flexible pre-OS environment Modular design |
|
|
Term
|
Definition
| Software that runs directly on a given hardware platform. Guest Operating System runs at the second level above the hardware |
|
|
Term
|
Definition
| Software that runs within an Operating system enviroment. Gues operating system runs at the third level above the hardware |
|
|
Term
|
Definition
| Data Encryption Standard developed by IBM around 1974 and adopted as standard in 1977. 3 times slower than normal DES but billions of times more secure. 3 64-bit keys combine for a 192 bit key (24 Characters) |
|
|
Term
|
Definition
| Advanced Encryption Standard |
|
|
Term
|
Definition
| Security Accounts Manager: sits in register |
|
|
Term
|
Definition
| Lightweight Directory Access Protocol: Used to Access AD |
|
|
Term
|
Definition
| Active Directory: derivative of X.500 that serves as a security database |
|
|
Term
|
Definition
| Massive Information database |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Access Controls List: provides ability to put security on some object |
|
|
Term
|
Definition
| Many domains linked together |
|
|
Term
|
Definition
Global Groups Domain Level Groups Universal Groups |
|
|
Term
| What do we use LDAP for at Cal Poly |
|
Definition
|
|
Term
|
Definition
Security Groups Distribution Groups |
|
|
Term
|
Definition
| Command used to install or remove Active Directories |
|
|
Term
|
Definition
|
|