Ciphertext - This is a string of characters, symbols, or numbers, that represent an encrypted message., Plaintext - This is the original text of a message, before or after any encryption has been carried out., Encryption Key - This contains an advanced algorithm that can take a plaintext message and convert it to unreadable ciphertext., Defragmentation - This utility software can speed up a drive by taking separated pieces of a file and re-allocating them next to each other in a drive., Utility Software - A system software that is small, single purpose, and concerned with the essential upkeep of running an operating system., Application Software - A program designed to help us do useful things with an operating system that are not standard or requierd for its upkeep., Operating System - A type of systems software that manages the interactions between the user led hardware, and the software, to perform tasks through applications., WIMP - A modern type of interface that contains cursors, clickable icons, menus, and individual clickable programs., Command Line Interface - A compact, fast, interface that the user uses through single line commands to access parts of the memory and programs., User Interface - The way in which users can interact with any device., Device Drivers - Small, single purpose programs that control communication between a peripheral and the operating system., Peripheral Management - The way in which an operating system handles connected external devices., File Management - The way in which an operating system allows the user to engage with items stored to the memory drives., User Management - The way in which a user or administrator can handle access levels, create, or use, accounts, or delete them from the operating system., Time slicing - A method of simulating multitasking by performing small chunks of multiple tasks in quick succession and looping through them., Paging - A method of managing memory by breaking up memory into fixed size blocks, called pages, and loading the entire page together to memory., Memory Management - The way in which an operating system manages the drives of the system, choosing where to allocate files, how to use the memory to simulate multitasking, and where the kernel is kept to keep it safe., Kernel - The bulk of the protected operating system code, secured away from the users accessible areas, to keep it safe.,
0%
1.5: Systems Software
Megosztás
Megosztás
Megosztás
szerző:
Cfreeman10
Secondary
Computing
Computer Systems
Cybersecurity
Tartalom szerkesztése
Nyomtatás...
Beágyazás
Egyebek
Hozzárendelések
Ranglista
Több megjelenítése...
Részletek elrejtése
Ez a ranglista jelenleg privát. Kattintson a
Megosztás
és tegye nyílvánossá
Ezt a ranglistát a tulajdonos letiltotta
Ez a ranglista le van tiltva, mivel az opciók eltérnek a tulajdonostól.
Beállítások visszaállítása
a(z) Egyezés
egy nyílt végű sablon. Nem hoz létre pontszámokat egy ranglistán.
Bejelentkezés szükséges
Vizuális stílus
Betűtípusok
Előfizetés szükséges
Beállítások
Kapcsoló sablon
Az összes megjelenítése
További formátumok jelennek meg a tevékenység lejátszásakor.
Nyílt eredmények
Link másolása
QR-kód
Törlés
Automatikus mentés visszaállítása :
?