System software

1234567891011121314151617181920212223242526272829303132
Across
  1. 2. (2words)A feature that allows users to revert their computer's state to a previous point in time, restoring system settings and files to a known good state.
  2. 4. (2words)Divides memory into non-contiguous segments, each representing a logical grouping of data.
  3. 8. (2words)Involves allocating resources and facilitating the sharing and exchange of data among processes running on a computer.
  4. 10. (2words)Tasks such as defining file naming conventions, performing file operations, maintaining directory structures, and managing access control.
  5. 11. (2words)Manages a computer's main memory, including optimization, organization, and protection to ensure efficient and secure memory usage.
  6. 12. Signals generated by hardware or software to request attention from the CPU, used for asynchronous events like hardware errors or user inputs.
  7. 14. (2words)A memory management technique that extends a computer's physical memory by using disk space as an overflow area, improving system performance.
  8. 16. (2words)Organization of files and folders on a storage device, maintained by file management systems.
  9. 19. (2words)Determines allocation and deallocation of computer memory for running applications, including swapping data to and from the HDD or SSD.
  10. 20. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules, enhancing network security.
  11. 23. (2words)Software that communicates with input and output devices, translating data and managing hardware resources.
  12. 24. (2words)Process of restoring lost, deleted, corrupted, or inaccessible data from storage devices, ensuring data availability and integrity.
  13. 25. (2words)Control and coordination of printing operations, including loading printer drivers, managing print queues, and handling error messages.
  14. 26. (2words)Mechanisms implemented by the operating system to detect, report, and recover from errors or exceptional conditions, maintaining system stability.
  15. 28. (2words)Splits memory into contiguous partitions and allocates partitions to applications, varying in size.
  16. 29. Activity (2words)Simultaneous use of a computer system by multiple users, facilitated by user accounts, passwords, and access rights management.
  17. 30. (2words)Ensures that competing applications cannot use the same memory locations simultaneously, preventing data loss, security issues, or system crashes.
  18. 31. (2words)Allocates fixed-size partitions of memory, used by virtual memory systems.
  19. 32. (2words)Allocates all memory to a single application, used by systems like MS-DOS and embedded systems.
Down
  1. 1. The process of loading and initializing the operating system kernel when a computer is powered on or restarted.
  2. 3. (2words)Involves managing physical and virtual devices connected to the computer system, including installation, configuration, and maintenance.
  3. 5. Ensuring consistency and coordination among processes or threads accessing shared resources, preventing conflicts and data corruption.
  4. 6. A temporary storage area used in hardware management to manage input/output operations.
  5. 7. A program running on a computer, managed by process management to allocate resources and synchronize data exchange.
  6. 9. (2words)Involves managing input and output peripheral devices, including communication, translation, and prioritization.
  7. 13. Permissions granted to users or processes, controlling access to system resources and ensuring data privacy.
  8. 15. (2words)Determines how memory is allocated to applications, including single allocation, partitioned allocation, paged memory, and segmented memory.
  9. 17. Software designed to detect, prevent, and remove malicious software, ensuring the security of the operating system.
  10. 18. (2words)Software that manages computer hardware and provides services for computer programs.
  11. 21. (2words)Ensures the integrity, confidentiality, and availability of data through measures like updates, antivirus software, firewalls, user privileges, and data recovery.
  12. 22. A data structure used in process management to schedule resources and resolve software conflicts.
  13. 27. (2words)Verifying the identity of users accessing the system, typically through methods like passwords, biometrics, or cryptographic keys.