System software
Across
- 2. (2words)A feature that allows users to revert their computer's state to a previous point in time, restoring system settings and files to a known good state.
- 4. (2words)Divides memory into non-contiguous segments, each representing a logical grouping of data.
- 8. (2words)Involves allocating resources and facilitating the sharing and exchange of data among processes running on a computer.
- 10. (2words)Tasks such as defining file naming conventions, performing file operations, maintaining directory structures, and managing access control.
- 11. (2words)Manages a computer's main memory, including optimization, organization, and protection to ensure efficient and secure memory usage.
- 12. Signals generated by hardware or software to request attention from the CPU, used for asynchronous events like hardware errors or user inputs.
- 14. (2words)A memory management technique that extends a computer's physical memory by using disk space as an overflow area, improving system performance.
- 16. (2words)Organization of files and folders on a storage device, maintained by file management systems.
- 19. (2words)Determines allocation and deallocation of computer memory for running applications, including swapping data to and from the HDD or SSD.
- 20. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules, enhancing network security.
- 23. (2words)Software that communicates with input and output devices, translating data and managing hardware resources.
- 24. (2words)Process of restoring lost, deleted, corrupted, or inaccessible data from storage devices, ensuring data availability and integrity.
- 25. (2words)Control and coordination of printing operations, including loading printer drivers, managing print queues, and handling error messages.
- 26. (2words)Mechanisms implemented by the operating system to detect, report, and recover from errors or exceptional conditions, maintaining system stability.
- 28. (2words)Splits memory into contiguous partitions and allocates partitions to applications, varying in size.
- 29. Activity (2words)Simultaneous use of a computer system by multiple users, facilitated by user accounts, passwords, and access rights management.
- 30. (2words)Ensures that competing applications cannot use the same memory locations simultaneously, preventing data loss, security issues, or system crashes.
- 31. (2words)Allocates fixed-size partitions of memory, used by virtual memory systems.
- 32. (2words)Allocates all memory to a single application, used by systems like MS-DOS and embedded systems.
Down
- 1. The process of loading and initializing the operating system kernel when a computer is powered on or restarted.
- 3. (2words)Involves managing physical and virtual devices connected to the computer system, including installation, configuration, and maintenance.
- 5. Ensuring consistency and coordination among processes or threads accessing shared resources, preventing conflicts and data corruption.
- 6. A temporary storage area used in hardware management to manage input/output operations.
- 7. A program running on a computer, managed by process management to allocate resources and synchronize data exchange.
- 9. (2words)Involves managing input and output peripheral devices, including communication, translation, and prioritization.
- 13. Permissions granted to users or processes, controlling access to system resources and ensuring data privacy.
- 15. (2words)Determines how memory is allocated to applications, including single allocation, partitioned allocation, paged memory, and segmented memory.
- 17. Software designed to detect, prevent, and remove malicious software, ensuring the security of the operating system.
- 18. (2words)Software that manages computer hardware and provides services for computer programs.
- 21. (2words)Ensures the integrity, confidentiality, and availability of data through measures like updates, antivirus software, firewalls, user privileges, and data recovery.
- 22. A data structure used in process management to schedule resources and resolve software conflicts.
- 27. (2words)Verifying the identity of users accessing the system, typically through methods like passwords, biometrics, or cryptographic keys.