Study Guides (380,000)
CA (150,000)
York (10,000)
MECH (2)
Study Guide

MECH 2301 Study Guide - Winter 2018, Comprehensive Midterm Notes - File Manager, Operating System, File System


Department
Mechanical Engineering
Course Code
MECH 2301
Professor
Hossam Sadek
Study Guide
Midterm

This preview shows pages 1-3. to view the full 83 pages of the document.
MECH 2301
MIDTERM EXAM
STUDY GUIDE
Fall 2018

Only pages 1-3 are available for preview. Some parts have been intentionally blurred.

Only pages 1-3 are available for preview. Some parts have been intentionally blurred.

MECH 2301 Lecture 1 Notes
Introduction
Operating Multiple Servers
The development of virtualization technology has reached the state that even small
computers can be virtualized easily, effectively, and securely, with complete isolation
between virtual machines operating on the same host.
Recent virtualization software and hardware also supports a wider range of different
operating systems.
The obvious application for virtual machines is the ability to consolidate servers by
operating multiple servers on the same hardware platform
There are a number of other useful purposes as well
A server can be set up to create a separate virtual machine for each client.
This protects the underlying system and other clients from malware and other client-
generated problems.
A system analyst can evaluate software on a virtual machine without concern for its
behavior.
If the software crashes or damages the operating system, the analyst can simply kill the
virtual machine without damage to the underlying system or any other virtual machine
that is running on the host.
A software developer or Web developer can test his software on different operating
systems, with different configurations, all running on the same host.
For example, a database specialist can test changes to the database without affecting
the production system and then place them into production easily and efficiently.
A user can operate in a sandbox.
A sandbox is a user environment in which all activity is confined to the sandbox itself.
A virtual machine is a sandbox.
For example, a user can access dangerous resources on the Internet for testing a system
against malware safely.
find more resources at oneclass.com
find more resources at oneclass.com
You're Reading a Preview

Unlock to view full version

Only pages 1-3 are available for preview. Some parts have been intentionally blurred.

Malware loaded into a virtual machine disappears when the virtual machine is closed.
The sandbox is also useful for Web research, where the safety of the Web sites accessed
is not assured.
Virtualization creates an important illusion.
Hardware also supports a wider range of different operating systems.
The obvious application for virtual machines is the ability to consolidate servers by
operating multiple servers on the same hardware platform
There are a number of other useful purposes as well
A server can be set up to create a separate virtual machine for each client.
This protects the underlying system and other clients from malware and other client-
generated problems.
A user can operate in a sandbox.
A sandbox is a user environment in which all activity is confined to the sandbox itself.
A virtual machine is a sandbox.
A system analyst can evaluate software on a virtual machine without concern for its
behavior.
If the software crashes or damages the operating system, the analyst can simply kill the
virtual machine without damage to the underlying system or any other virtual machine
that is running on the host.
A software developer or Web developer can test his software on different operating
systems, with different configurations, all running on the same host.
For example, a database specialist can test changes to the database without affecting
the production system and then place them into production easily and efficiently.
find more resources at oneclass.com
find more resources at oneclass.com
You're Reading a Preview

Unlock to view full version