Operating systems basic terms and introduction
Tasks of the kernel, operating system, RAM, processor etc
Applications use the kernel to connect to computer system resources (CPU; memory and devices). It manages input/output requests from software, translating them into data processing instructions for the central processing unit. It is also responsible for managing memory, and for managing and communicating with computing peripherals, like printers, speakers, etc. It is crucial part of the operating system.
Tasks:
CPU time planning
Real time vs Package processing
Syncing
Multitasking with multiple CPUs
Memory management
MMU - memory management unit
Cache and swap
I/O management
Syncronous
Asyncronous
File management
Permissions
File system hierarchy
An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs (API).
Tasks:
Hardware management
CPU time
Memory management
Input/output management
Network management
Computer system management
Application management
Input/output device management
User authentication and authorization
Data management between devices
User management
What is authorization and authentication?
What is password salt and what is it used for?
Working with files and permissions
Explain the way why permissions are needed and how they are set for users
Explain special permissions
User environment
What are user environment variables used for? Name two reasons
Processes
How to stream data between processes
What are different type of processes (running, stopped, killed, zombie etc)
Different examples of how to benefit from sending signals between processes
Software management
Name various ways how to manage software in LInux
What are the pros and cons of Linux software management
What are software repositories?
What are libraries?
Filesystem hierarchy
Explain the hierarchy according to FHS
Name specific folder meanings and usage
Documentation
Best practices of a good documentation
Why should we document?
Security
List the different type of security breaches
What should the user/admin do to prevent the attack?
Partitioning and swap area
What are the primary, extended and logical partitions? What limitations are set with these partitions types?
When isn’t it a good idea to use swap area?
RAID and LVM technologies
Name main uses and features of both technologies
SAN, NAS and CAS technologies
Name main uses and features of all the technologies
Backup and recovery
Backup and recovery plans
Monitoring and log files
Active and passive monitoring
Types of alerts
Benefits of monitoring
Centralized logs
Ethical, social and personal aspects of working in IT field
Impostor syndrome, teamwork, burnout