Final Study Guide
This is simply a guide of topics that I consider important for the midterm.
I don’t promise to ask you about them all, or about any of these in particular;
but I may very well ask you about any of these, as well as anything we discussed
in class, in discussion section, in the text, or that is in the reading.
- Anything from the midterm study guide
- Memory management
- Paging and page tables
- Segmentation and segment tables
- Optimizations: cache, hit ratio, effective memory access time
- Views of memory: program vs. operating system, address translation
- Protection
- Segmented paging (segment the page table)
- Paged segmentation (page the segments)
- Virtual memory: demand paging, page faults, pure demand paging
- Page replacement and victims and dirty bits: FIFO, OPT, LRU, stack algorithms
- Minimum number of pages per process
- Global vs. local allocation
- Working set: thrashing, principle of locality, working set principle and model
- Prepaging, I/O interlock, choosing page size, restructuring program
- Device I/O
- Device drivers and transparency
- Structure of a device driver
- Character code independence, device independence, uniform treatment of devices
- Device drivers: lower, upper parts
- Disk scheduling algorithms: FCFS, pick-up, SSTF, SCAN, LOOK, N-Step SCAN, C-SCAN, C-LOOK
- File, system calls for I/O
- Blocking vs. non-blocking I/O
- File Systems
- Virtual vs. physical; names; directory structures
- Access control: rights, ACLs, UNIX abbreviations
- Access via create, open, close, read, write, rewind, delete system calls or commands
- Access methods: sequential, direct mapped, structured
- Disk directory: free list implementations, allocation methods (contiguous, linked, indexed)
- Computer Security
- Confidentiality, integrity, availability
- Policy vs. mechanism
- Saltzer’s and Schroeder’s Design Principles
- Access control: subjects, objects, access control matrix, ACLs, C-Lists, protection rings
- Classical ciphers
- Public key ciphers
- Cryptographic hashes
- Networks, computers, and security