Operating Systems

Question 1 of 200

Medal-premium 1

What are the 4 components of a computer system?

Select one or more of the following:

  • Hardware

  • Operating System

  • Kernel

  • Application Programs

  • ROM

  • User

Question 2 of 200

Medal-premium 1

An operating system is a resource allocator?

Select one of the following:

  • True
  • False

Question 3 of 200

Medal-premium 1

Fill the blank space to complete the text.

The bootstrap program is stored in

Question 4 of 200

Medal-premium 1

Fill the blank space to complete the text.

The occurrence of an event is usually signalled by an from either hardware or software.

Question 5 of 200

Medal-premium 1

Main memory is typically implemented in semiconductor technology called variable random memory (VRAM).

Select one of the following:

  • True
  • False

Question 6 of 200

Medal-premium 1

Since EEPROM can not be changed it only stores static programs like bootstrap

Select one of the following:

  • True
  • False

Question 7 of 200

Medal-premium 1

A typical instruction-execution cycle for a Von Neumann Architecture is:

Select one or more of the following:

  • 1. Fetch an instruction from memory and stores the instructions in the instruction register.
    2. Decode the operation and fetch operands from memory
    3. Instruction is executed and stored back in memory

  • 1. Decode the operation and fetch operands from memory
    2. Instruction is executed and stored back in memory
    3. Fetch an instruction from memory and stores the instructions in the instruction register.

Question 8 of 200

Medal-premium 1

We would like programs and data to both reside in main memory. This is not possible for two reasons:

Select one of the following:

  • 1. Main memory is usually too small to store all needed programs and data permanently
    2. Main memory is a volatile storage device that loses its contents when power is turned off

  • 1. Main memory is usually too small to store all needed programs and data permanently
    2. Main memory is a non-volatile storage device that loses its contents when power is turned off

  • 1. Using this approach would be to fast for the operating system to interpret and therefore would not be feasible
    2. Programs are not written this way and would be way to difficult to change the way a computer works now.

Question 9 of 200

Medal-premium 1

What is the main requirement for secondary-storage?

Select one of the following:

  • The ability to hold large quantities of data permanently

  • The ability to use as little power as possible

  • The smaller the size the better

  • The faster the better

Question 10 of 200

Medal-premium 1

The most common secondary storage is a which provides storage for both programs and data.

Drag and drop to complete the text.

    magnetic disk
    magnetic disk
    solid state drive
    solid state drive
    cloud drive
    cloud drive
    external disk
    external disk
    CD-ROM
    CD-ROM

Question 11 of 200

Medal-premium 1

The main difference among the various storage systems lie in:

Select one or more of the following:

  • speed

  • cost

  • size

  • volatility

  • power consumption

Question 12 of 200

Medal-premium 1

Volatile Storage loses its contents when power to the device is removed

Select one of the following:

  • True
  • False

Question 13 of 200

Medal-premium 1

What are the two types of Sold-State disks?

Select one or more of the following:

  • Solid-State disk stores data in large DRAM array during normal operation but also contains a hidden magnetic hard disk and a battery for backup-power

  • Solid-State disk is flash memory

  • Electromagnetic Varient Memory

  • Magnetic Allocation memory

Question 14 of 200

Medal-premium 1

A device controller must contain what?

Select one of the following:

  • some local buffer storage and a set of special-purpose registers

  • a device controller must house a single processor

  • must container at least one cache

Question 15 of 200

Medal-premium 1

How do we solve the problem of interrupt-driven I/O having high overhead when moving bulk data?

Select one of the following:

  • direct memory access (DMA)

  • device memory access (DMA)

  • process memory access (PMA)

  • local memory access (LMA)

Question 16 of 200

Medal-premium 1

What do single-processors not run?

Select one or more of the following:

  • kernel processes

  • user processes

  • I/O processes

Question 17 of 200

Medal-premium 1

Select from the dropdown list to complete the text.

( Multiprocessor systems, Singleprocessor systems, Complexprocessor systems, Dynamicprocessor systems ) have two or more processors in close communication, sharing the computer bus and sometimes the clock, memory, and peripheral devices.

Question 18 of 200

Medal-premium 1

advantages of multiprocessor systems?

Select one or more of the following:

  • increased throughput

  • economy of scale

  • increased reliability

  • power reduction

  • size of unit

Question 19 of 200

Medal-premium 1

is the ability to continue providing service proportional to the level of surviving hardware.

Drag and drop to complete the text.

    Graceful degradation
    Graceful degradation
    Steady wear
    Steady wear
    Graceful wear
    Graceful wear
    Slow deterioration
    Slow deterioration

Question 20 of 200

Medal-premium 1

Asymmetric multiprocessing is where each processor performs all tasks within the operating system.

Select one of the following:

  • True
  • False

Question 21 of 200

Medal-premium 1

Symmetric multiprocessing is where each processor is assigned a specific task

Select one of the following:

  • True
  • False

Question 22 of 200

Medal-premium 1

more multiprocessors increases computing power but if the CPU has an controller then adding CPUs also increase the amount of memory addressable in the system

Drag and drop to complete the text.

    integrated memory
    integrated memory
    I/O
    I/O
    cache memory
    cache memory
    processor
    processor

Question 23 of 200

Medal-premium 1

Select from the dropdown lists to complete the text.

multiprocessing can cause a system to change its memory access model from ( uniform memory access (UMA), non-uniform memory access (NUMA) ) to ( non-uniform memory access (NUMA), uniform memory access (UMA) )

Question 24 of 200

Medal-premium 1

is the situation in which access to RAM from any CPU takes time

Drag and drop to complete the text.

    UMA
    UMA
    NUMA
    NUMA
    NUSM
    NUSM
    UHM
    UHM
    the same
    the same
    more
    more
    less
    less

Question 25 of 200

Medal-premium 1

is some parts of memory may take to access than other parts

Drag and drop to complete the text.

    NUMA
    NUMA
    UMA
    UMA
    SLT
    SLT
    UHG
    UHG
    longer
    longer
    less time
    less time
    the same time
    the same time

Question 26 of 200

Medal-premium 1

multicore systems are multiprocessor systems, not all multiprocessor systems are multicore

Select one of the following:

  • True
  • False

Question 27 of 200

Medal-premium 1

are where each processor board boots independently and runs its own operating system

Drag and drop to complete the text.

    blade servers
    blade servers
    dynamic servers
    dynamic servers
    multiprocessors
    multiprocessors
    multi servers
    multi servers

Question 28 of 200

Medal-premium 1

What is NVRAM?

Select one of the following:

  • DRAM with battery backup

  • RAM with volatile memory

  • ROM with non-volatile memory

  • DRAM with volatile and non-volatile memory

Question 29 of 200

Medal-premium 1

Another type of multiprocessor system is a clustered system?

Select one of the following:

  • True
  • False

Question 30 of 200

Medal-premium 1

clustered computers are defined as:

Select one or more of the following:

  • sharing storage

  • are closely linked via a local-area network or a faster interconnect

  • share resources

  • share processing power

Question 31 of 200

Medal-premium 1

clustering is usually used to provide

Drag and drop to complete the text.

    high-availability service
    high-availability service
    faster processing
    faster processing
    higher security
    higher security
    multithreading
    multithreading

Question 32 of 200

Medal-premium 1

why is clustering used?

Select one of the following:

  • service will continue even if one or more systems in the cluster fail

  • higher processing used by having more than one processor work on a job

  • a boss processor will switch in and out jobs so there is no idle processors no matter what

Question 33 of 200

Medal-premium 1

What are the components of clustered systems?

Select one or more of the following:

  • gathers together multiple CPUs

  • are composed of two or more individual systems - or nodes - joined together

  • multiple operating systems run on the same board

  • each processor runs its own operating system

Question 34 of 200

Medal-premium 1

clustered systems are composed of two or more individual systems - or nodes - joined together. This is called loosely coupled

Select one of the following:

  • True
  • False

Question 35 of 200

Medal-premium 1

clustering can be structured asymmetrically or symmetrically

Select one of the following:

  • True
  • False

Question 36 of 200

Medal-premium 1

Fill the blank space to complete the text.

in asymmetric clustering one machine is in while the other is running the applications

Question 37 of 200

Medal-premium 1

what is the hot-standby host function?

Select one of the following:

  • the host machine does nothing but monitor the active server

  • the host machine allocates jobs to other servers

Question 38 of 200

Medal-premium 1

what does an asymmetric hot-standby host machine do if the server fails?

Select one of the following:

  • the hot-standby host becomes the active server

  • the hot-standby host reallocates the jobs to other servers

  • the hot-standby host cancels all jobs for that server and notifies all other servers of its failure

Question 39 of 200

Medal-premium 1

symmetric clustering is when two or more hosts are running applications and are monitoring each other

Select one of the following:

  • True
  • False

Question 40 of 200

Medal-premium 1

symmetric clustering is more efficient?

Select one of the following:

  • True
  • False

Question 41 of 200

Medal-premium 1

why is symmetric clustering more efficient?

Select one of the following:

  • is uses all of the available hardware

  • it talks between each processor more efficiently

Question 42 of 200

Medal-premium 1

what are the component(s) of cluster parallelization?

Select one or more of the following:

  • parallelization divides a program into separate components that run in parallel on individual computers in the cluster

  • these applications are designed so that once each computing node in the cluster has solved its portion of the problem, the results from all the nodes are combined into a final solution

  • parallelization concurrently divides jobs between nodes

Question 43 of 200

Medal-premium 1

to provide shared access, the system must also supply access control and locking to ensure that no conflicting operations occur. this is known as

Drag and drop to complete the text.

    distributed lock manager (DLM)
    distributed lock manager (DLM)
    eye lock manager (ELM)
    eye lock manager (ELM)
    protected access manager (PAM)
    protected access manager (PAM)
    distributed access manager (DAM)
    distributed access manager (DAM)

Question 44 of 200

Medal-premium 1

improvements to clustering are made possible by

Drag and drop to complete the text.

    storage-area networks (SANs)
    storage-area networks (SANs)
    dynamic-area networks (DANs)
    dynamic-area networks (DANs)
    symmetric-area networks (SANs)
    symmetric-area networks (SANs)

Question 45 of 200

Medal-premium 1

the advantage(s) of storage-area networks (SANs)

Select one or more of the following:

  • allows many systems to attach to a pool of storage

  • if the applications and their data are stored on the SAN, then the cluster software can assign the application to run on any host that is attached to the SAN

  • allows concurrent processing through allocation of storage

  • symmetric processing is possible through sharing of processing of programs

Question 46 of 200

Medal-premium 1

beowulf clusters are designed to solve high-performance computing tasks

Select one of the following:

  • True
  • False

Question 47 of 200

Medal-premium 1

beowulf computing nodes typically run Linux operating systems

Select one of the following:

  • True
  • False

Question 48 of 200

Medal-premium 1

why is beowulf clusters a low cost strategy for building a high-performance computing cluster?

Select one of the following:

  • uses open-source software

  • uses less power

  • less processors are needed

Question 49 of 200

Medal-premium 1

Fill the blank space to complete the text.

beowulf clusters nodes use a set of software libraries to communicate with one another

Question 50 of 200

Medal-premium 1

Fill the blank space to complete the text.

increases CPU utilization by organizing jobs (code and data) so that the CPU always has one to execute

Question 51 of 200

Medal-premium 1

the main idea(s) behind multiprogramming?

Select one or more of the following:

  • the jobs are prioritized so that the most important jobs are done first

  • the program uses all available processors to run the program concurrently

  • as long as at least one job needs to execute the CPU is never idle

Question 52 of 200

Medal-premium 1

what does time sharing require?

Select one of the following:

  • an interactive computer system

  • a dynamic computer system

  • a static computer system

  • a clustered computer system

  • a GUI computer system

Question 53 of 200

Medal-premium 1

a time-shared operating system allows many users to share the computer simultaneously

Select one of the following:

  • True
  • False

Question 54 of 200

Medal-premium 1

how do we achieve the goal of reasonable time from time-sharing?

Select one of the following:

  • we use swapping or virtual memory

  • multithreading

  • concurrent processing

  • we use a method called logical memory

Question 55 of 200

Medal-premium 1

what is virtual memory?

Select one of the following:

  • it abstracts main memory into a large, uniform array of storage separating logical memory as viewed by the user from physical memory

  • memory is run in the cloud

  • memory is constantly switched out between the main memory and cache to give the allusion of memory space larger than it actually is

Question 56 of 200

Medal-premium 1

Fill the blank space to complete the text.

modern systems are driven

Question 57 of 200

Medal-premium 1

Fill the blank space to complete the text.

bit is added to the hardware of the computer to indicate the current mode
- kernel (0)
- user (1)

Question 58 of 200

Medal-premium 1

what is the function of dual mode?

Select one of the following:

  • it provides the operating system the means of protecting it from errant users and errant users from one another

  • the operating systems is protected from hackers that are trying to gain remote access

  • it protects your files from errant users

Question 59 of 200

Medal-premium 1

has more privileges than the user processes but fewer than the kernel

Drag and drop to complete the text.

    virtual machine manager (VMM)
    virtual machine manager (VMM)
    dynamic machine manager (DMM)
    dynamic machine manager (DMM)
    file machine manager (FMM)
    file machine manager (FMM)
    force quite manager (FQM)
    force quite manager (FQM)
    processor machine manager (PMM)
    processor machine manager (PMM)

Question 60 of 200

Medal-premium 1

Fill the blank spaces to complete the text.

a timers period may be or

Question 61 of 200

Medal-premium 1

variable timer is generally implemented by a fixed-rate clock and counter

Select one of the following:

  • True
  • False

Question 62 of 200

Medal-premium 1

why do we use timers?

Select one of the following:

  • we can use timers to prevent a user program from running too long

  • to calculate the time efficiency of a program

  • to display the time of a files last update

Question 63 of 200

Medal-premium 1

Fill the blank spaces to complete the text.

a program is a entity, like the contents of a file stored on disk, whereas a process is an entity

Question 64 of 200

Medal-premium 1

Fill the blank space to complete the text.

a single-threaded process has one specifying the next instruction to execute

Question 65 of 200

Medal-premium 1

the operating system is responsible for the following activities in connection with process management:

Select one or more of the following:

  • scheduling processes and threads on the CPUs

  • creating and deleting both user and system processes

  • suspending and resuming processes

  • providing mechanisms for process synchronization

  • providing mechanisms for process communication

Question 66 of 200

Medal-premium 1

for a program to be executed it must be mapped to absolute addresses and loaded into memory

Select one of the following:

  • True
  • False

Question 67 of 200

Medal-premium 1

Fill the blank space to complete the text.

when selecting the memory-management scheme you must take into account many factors but especially the design of the system

Question 68 of 200

Medal-premium 1

the operating system is responsible for the following activities in connection with memory management:

Select one or more of the following:

  • keeping track of which parts of memory are currently being used and who is using them

  • deciding which processes (or parts of processes) and data to move into and out of memory

  • allocating and deallocating memory space as needed

  • allocating and deallocating processes to complete jobs

Question 69 of 200

Medal-premium 1

the operating system is responsible for the following activities in connection with the file management:

Select one or more of the following:

  • creating and deleting files

  • creating and deleting directories to organize files

  • supporting primitives for manipulating files and directories

  • mapping files onto secondary storage

  • backing up files on stable (nonvolatile) storage media

  • communicating between the clouds file system and the local file system on your computer

Question 70 of 200

Medal-premium 1

the operating system is responsible for the following activities in connection with the disk management:

Select one or more of the following:

  • free-space management

  • storage allocation

  • disk scheduling

Question 71 of 200

Medal-premium 1

the entire speed of operation of a computer may hinge on the speeds of the disk subsystem and the algorithms that manipulate that subsystem

Select one of the following:

  • True
  • False

Question 72 of 200

Medal-premium 1

when we need a particular piece of information, we first check wether it is in the cache

which of the following is true if any of the above statement?

Select one or more of the following:

  • if it is, we use the information directly from the cache

  • if it is not, we use the information from the source, putting a copy in the cache under the assumption that we will need it again soon

  • if it is not, we use the information directly from the cache

  • if it is, we use the information from the source, putting a copy in the cache under the assumption that we will need it again soon

Question 73 of 200

Medal-premium 1

Fill the blank space to complete the text.

with multiprocessors each has its own local cache so when the value of something changes you must make sure that value is changed computer wide. this is called

Question 74 of 200

Medal-premium 1

I/O subsystems consists of several component(s):

Select one or more of the following:

  • a memory-manamgment component that includes buffering, caching, and spooling

  • a general device-driver interface

  • drivers for specific hardware devices

Question 75 of 200

Medal-premium 1

Fill the blank space to complete the text.

most operating systems maintain a lot of user names and associated

Question 76 of 200

Medal-premium 1

in a , each item points to its successor

Drag and drop to complete the text.

    singly linked list
    singly linked list
    doubly linked list
    doubly linked list
    circularly linked list
    circularly linked list

Question 77 of 200

Medal-premium 1

in a , a given item can refer either to its predecessor or to its successor

Drag and drop to complete the text.

    doubly linked list
    doubly linked list
    singly linked list
    singly linked list
    circularly linked list
    circularly linked list

Question 78 of 200

Medal-premium 1

in a , the last element in the list refers to the first element, rather than to null

Drag and drop to complete the text.

    circularly linked list
    circularly linked list
    singly linked list
    singly linked list
    doubly linked list
    doubly linked list

Question 79 of 200

Medal-premium 1

Fill the blank space to complete the text.

tree is when a parent may have an unlimited number of children

Question 80 of 200

Medal-premium 1

Fill the blank space to complete the text.

tree is when a parent may have at most two children, which we term left child and the right child

Question 81 of 200

Medal-premium 1

Fill the blank space to complete the text.

tree, additionally requires an ordering between the parents two children in which left_child <= right_child

Question 82 of 200

Medal-premium 1

Fill the blank space to complete the text.

tree is when a tree containing n items as at most log(n) levels

Question 83 of 200

Medal-premium 1

Fill the blank space to complete the text.

takes data as input, performs a numeric operation on this data, and returns a numeric value

Question 84 of 200

Medal-premium 1

what is it called when two hash function have the same output

Select one of the following:

  • hash collision

  • hash interrupt

  • hash contact

  • hash dilapidation

Question 85 of 200

Medal-premium 1

in the event of a hash collision what method do we employ

Select one of the following:

  • we use a linked list at the table location that contains all of the items with the same hash value

  • we use a array at the table location that contains all of the items with the same hash value

  • we use a stack at the table location that contains all of the items with the same hash value

Question 86 of 200

Medal-premium 1

Fill the blank space to complete the text.

associates pairs using a hash function

Question 87 of 200

Medal-premium 1

Fill the blank space to complete the text.

is a string of n binary digits that can be used to represent the status of n items

Question 88 of 200

Medal-premium 1

when are bitmaps commonly used?

Select one of the following:

  • when there is a need to represent the availability of a large number of resources

  • when there is a need to represent the large number of processes

  • when there is a need to represent the large number of jobs

Question 89 of 200

Medal-premium 1

Fill the blank space to complete the text.

is a collection of physically separate, possibly heterogeneous computer systems that are networked to provide users with access to the various resources that the system maintains

Question 90 of 200

Medal-premium 1

Fill the blank space to complete the text.

is a communication path between two or more systems

Question 91 of 200

Medal-premium 1

what do distributed systems depend on for their functionality?

Select one of the following:

  • networking

  • GUI

  • multicore systems

  • multiprogramming

Question 92 of 200

Medal-premium 1

Fill the blank space to complete the text.

is the most common network protocol, and it provides the fundamental architecture of the Internet

Question 93 of 200

Medal-premium 1

connects computers within a room, a building or a campus

Drag and drop to complete the text.

    local-area network (LAN)
    local-area network (LAN)
    wide-area network (WAN)
    wide-area network (WAN)
    personal-area network (PAN)
    personal-area network (PAN)

Question 94 of 200

Medal-premium 1

usually links buildings, cities or countries

Drag and drop to complete the text.

    wide-area network (WAN)
    wide-area network (WAN)
    local-area network (LAN)
    local-area network (LAN)
    personal-area network (PAN)
    personal-area network (PAN)

Question 95 of 200

Medal-premium 1

connects a phone to a headset or a smartphone and a desktop computer

Drag and drop to complete the text.

    personal-area network (PAN)
    personal-area network (PAN)
    wide-area network (WAN)
    wide-area network (WAN)
    local-area network (LAN)
    local-area network (LAN)

Question 96 of 200

Medal-premium 1

Fill the blank space to complete the text.

is an operating system that provides features such as file sharing across the network, along with communication scheme that allows different processes on different computers to exchange messages

Question 97 of 200

Medal-premium 1

Fill the blank spaces to complete the text.

many of todays systems act as to satisfy requests generated by

Question 98 of 200

Medal-premium 1

the function of a computer-server system:

Select one of the following:

  • provides an interface to which client can send a request to perform an action. in response the server executes the action and sends the results to the client

  • provides a file-system interface where clients can create, update, read, and delete files

Question 99 of 200

Medal-premium 1

Fill the blank space to complete the text.

provides a file-system interface where clients can create, update, read, and delete files

Question 100 of 200

Medal-premium 1

an example of a computer-server system:

Select one of the following:

  • server running a database

  • server running a web browser

Question 101 of 200

Medal-premium 1

an example of a file-server system:

Select one of the following:

  • server running a database

  • server running a web browser

Question 102 of 200

Medal-premium 1

Fill the blank space to complete the text.

computing clients and servers are not distinguished from one another

Question 103 of 200

Medal-premium 1

Fill the blank spaces to complete the text.

in a system, the server is a bottleneck; but in a system, services can be provided by several nodes distributed throughout the network

Question 104 of 200

Medal-premium 1

deeming what services are available is accomplished in one of two general ways:

- when a node joins a network, it registers its services with a centralized lookup service on the network, Any node desiring a specific service first contacts this centralized lookup service to determine which node provides the service. the remainder of the communication takes place between the client and the service provider

- An alternative scheme uses no centralized lookup service. Instead, a peer acting as a client must discover what node provides a desired service by broadcasting a request for the service to all other nodes in the network. the node (or nodes) providing that service responds to the peer making the request. To support this approach, a discovery protocol must be provided that allows peers to discover services provided by other peers in the network

Select one of the following:

  • True
  • False

Question 105 of 200

Medal-premium 1

Fill the blank space to complete the text.

is used when the source CPU type is different from the target CPU type

Question 106 of 200

Medal-premium 1

process of emulation: every machine-level instruction that runs natively on the source system must be translated to the equivalent function on the target system

Select one of the following:

  • True
  • False

Question 107 of 200

Medal-premium 1

Fill the blank space to complete the text.

is a form of emulation in that the high-level language code is translated to native CPU instructions, emulating not another CPU but a theoretical virtual machine on which that language could run natively

Question 108 of 200

Medal-premium 1

Fill the blank space to complete the text.

is an operating system that is natively compiled for a particular CPU architecture runs within another operating system also native to that CPU

Question 109 of 200

Medal-premium 1

cloud computing is a type of computing that delivers computing, storage, and even applications as a service across a network

Select one of the following:

  • True
  • False

Question 110 of 200

Medal-premium 1

which is not a type of cloud computing

Select one or more of the following:

  • public cloud

  • private cloud

  • hybrid cloud

  • dynamic cloud

Question 111 of 200

Medal-premium 1

Fill the blank space to complete the text.

a is a cloud available vie the internet to anyone willing to pay for the services

Question 112 of 200

Medal-premium 1

Fill the blank space to complete the text.

a is a cloud run by a company for that company's own use

Question 113 of 200

Medal-premium 1

Fill the blank space to complete the text.

a is a cloud that includes both public and private cloud components

Question 114 of 200

Medal-premium 1

is one or more applications (such as word processors or spreadsheets) available via internet

Drag and drop to complete the text.

    Software as a service (SaaS)
    Software as a service (SaaS)
    Platform as a service (PaaS)
    Platform as a service (PaaS)
    Infrastructure as a service (IaaS)
    Infrastructure as a service (IaaS)
    Program as a service (PaaS)
    Program as a service (PaaS)

Question 115 of 200

Medal-premium 1

______________ is a software stack ready for application use via internet

Select one of the following:

  • Platform as a service (PaaS)

  • Software as a service (SaaS)

  • Infrastructure as a service (IaaS)

Question 116 of 200

Medal-premium 1

Infrastructure as a service (IaaS) is one or more applications available via internet

Select one of the following:

  • True
  • False

Question 117 of 200

Medal-premium 1

Fill the blank space to complete the text.

embedded systems almost always run operating systems

Question 118 of 200

Medal-premium 1

when do we use real-time systems?

Select one of the following:

  • when rigid time requirements have been placed on the operation or processor or the flow of data

  • when we need to run a process concurrently in the system

  • when we are running a blade-server system we want to use a real-time system

Question 119 of 200

Medal-premium 1

The types of user interfaces are:
- command-line interface (CLI)
- batch interface
- graphical user interface (GUI)

Select one of the following:

  • True
  • False

Question 120 of 200

Medal-premium 1

for efficiency and protection, users usually can control I/O

Select one of the following:

  • True
  • False

Question 121 of 200

Medal-premium 1

Fill the blank space to complete the text.

is when two or more processes read and write to a shared section of memory

Question 122 of 200

Medal-premium 1

Fill the blank space to complete the text.

is packets of information in predefined formats are moved between processes by the operating system

Question 123 of 200

Medal-premium 1

when several separate processes execute concurrently, it should be possible for one process to interfere with the others or with the operating system itself

Select one of the following:

  • True
  • False

Question 124 of 200

Medal-premium 1

Fill the blank space to complete the text.

the specifies a set of functions that are available to an application programmer, including the parameters that are passed to each function and return values the program can expect

Question 125 of 200

Medal-premium 1

system-call interface serves as the link to system calls made available by the operating system

Select one of the following:

  • True
  • False

Question 126 of 200

Medal-premium 1

what are the method(s) used to pass parameters to the operating system?

Select one or more of the following:

  • pass the parameters in registers

  • parameters are generally stored in a block, or table, in memory, and the address of the block is passed as a parameter in a register

  • parameters also can be placed, or pushed, onto the stack by the program and popped off the stack by the operating system

Question 127 of 200

Medal-premium 1

Fill the blank space to complete the text.

is a system program designed to aid the programmer in finding and correcting errors

Question 128 of 200

Medal-premium 1

what are the major categories of system calls?

Select one or more of the following:

  • process control

  • file management

  • device management

  • information maintenance

  • communications

  • cloud communication

  • network calls

Question 129 of 200

Medal-premium 1

what is part of the message-passing model?

Select one or more of the following:

  • communicating processes exchange messages with one another to transfer information

  • each computer in a network has a host name by which it is commonly known

  • each process has a process name

  • most processes that will be receiving connections are special-purpose daemons

  • the form of the data is determined by the processes and is not under the operating system control

  • the processes are also responsible for ensuring that they are not writing to the same location simultaneously

Question 130 of 200

Medal-premium 1

what is part of the shared-memory model?

Select one or more of the following:

  • shared memory requires that two or more processes agree to remove the restriction that one process cannot access another processes memory

  • the form of the data is determined by the processes and is not under the operating systems control

  • the processes are also responsible for ensuring that they are not writing to the same location simultaneously

  • each computer in a network has a host name by which it is commonly known

  • most processes that will be receiving connections are special-purpose daemons

Question 131 of 200

Medal-premium 1

what are the system utilities categories?

Select one or more of the following:

  • file management

  • status information

  • file modification

  • programming-language support

  • programming loading and execution

  • communications

  • background services

  • application programs

Question 132 of 200

Medal-premium 1

Fill the blank spaces to complete the text.

operating system requirements are divided into two basic groups: and

Question 133 of 200

Medal-premium 1

Fill the blank spaces to complete the text.

are how to do something and are what will be done

Question 134 of 200

Medal-premium 1

the advantage to writing in high level languages is that it is faster and lowers storage requirements

Select one of the following:

  • True
  • False

Question 135 of 200

Medal-premium 1

the main advantage to the layered approach when making an O.S. is

Select one of the following:

  • simplicity of construction and debugging

  • debugging and less time

  • less time and less cost

Question 136 of 200

Medal-premium 1

The main function of the microkernel is to provide communication between the client program and various services in the user space. Communication is provided through message passing

Select one of the following:

  • True
  • False

Question 137 of 200

Medal-premium 1

what is one benefit of the microkernel?

Select one of the following:

  • it makes extending the operating system easier. it also provides more security and reliability.

  • the performance of microkernels overhead is extremely small

Question 138 of 200

Medal-premium 1

what is the loadable kernel modules?

Select one of the following:

  • the kernel has a set of core components, and links to additional services via modules, either at boot time or during run time

  • remove all nonessential components from the kernel and implement them as system and user level programs

Question 139 of 200

Medal-premium 1

the best methodology to OS design is using loadable kernel modules

Select one of the following:

  • True
  • False

Question 140 of 200

Medal-premium 1

how is Mac OSX a hybrid system?

Select one of the following:

  • the top layer the user interface. below theses layers is the kernel environment which is MACH and BSD UNIX kernel

  • the top layer the user interface. below theses layers is the kernel environment which is cocoa api

Question 141 of 200

Medal-premium 1

Fill the blank space to complete the text.

a failure in the kernel is called a crash and information about it is saved in a

Question 142 of 200

Medal-premium 1

Fill the blank space to complete the text.

the operating can take a , a capture of the memory of the process, to be stored for later analysis

Question 143 of 200

Medal-premium 1

Fill the blank space to complete the text.

the operating system produces of system behaviour to try to find bottle necks

Question 144 of 200

Medal-premium 1

Fill the blank space to complete the text.

periodically samples the instruction pointer to determine which code is being executed. It can show stat trends but not individual activity.

Question 145 of 200

Medal-premium 1

an OS must be generated for each specific computer site, a process known as

Drag and drop to complete the text.

    system generation (SYSGEN)
    system generation (SYSGEN)
    operating system generation (OSYSGEN)
    operating system generation (OSYSGEN)
    kernel generation (KG)
    kernel generation (KG)
    kernel and user generation (KUG)
    kernel and user generation (KUG)

Question 146 of 200

Medal-premium 1

The SYSGEN is on the disk or ISO of the OS and it queries the user on hardware information such as:

Select one or more of the following:

  • What CPU is used? What options are installed?

  • How will the boot disk be formatted? How many partitions are there?

  • How much memory is available?

  • What devices are available?

  • What operating system options are desired?

Question 147 of 200

Medal-premium 1

Fill the blank space to complete the text.

after the OS is generated, it must be loaded into the kernel using a . This program is placed in ROM.

Question 148 of 200

Medal-premium 1

a bootstrap can also run diagnostics on a system to ensure it is properly working before booting

Select one of the following:

  • True
  • False

Question 149 of 200

Medal-premium 1

Fill the blank spaces to complete the text.

a system executes jobs, whereas a system has user programs, or tasks

Question 150 of 200

Medal-premium 1

Select from the dropdown lists to complete the text.

a ( process, text section, program counter ) is more than the program code, which is sometimes known as the ( text section, process, program counter ). It also includes the current activity, represented by the ( program counter, process, text section )

Question 151 of 200

Medal-premium 1

what does the process stack generally contain?

Select one of the following:

  • contains temporary data. as well as a data section

  • contains temporary data. as well as a process section

  • contains program counter as well as a data section

Question 152 of 200

Medal-premium 1

what can a process also include? and what is its function?

Select one of the following:

  • heap - memory that is dynamically allocated during process run time

  • hash - memory that is dynamically allocated during process run time

  • hash - memory that is asymmetrically allocated during process run time

  • heap - memory that is asymmetrically allocated during process run time

Question 153 of 200

Medal-premium 1

the program itself is not a process. A program is a ___________

Select one of the following:

  • passive entity

  • static entity

  • dynamic entity

  • active entity

Question 154 of 200

Medal-premium 1

a process is a(n) __________________

Select one of the following:

  • active entity

  • passive entity

  • dynamic entity

  • static entity

Question 155 of 200

Medal-premium 1

a program becomes a process when it is loaded into memory

Select one of the following:

  • True
  • False

Question 156 of 200

Medal-premium 1

select the common ways of executing a program:

Select one or more of the following:

  • double click an icon representing the executable file

  • entering the name of the executable file on the command line

  • using the program counter

  • using a system call to start a program

  • using the command startx

Question 157 of 200

Medal-premium 1

although two processes can be related to the same program, they are not considered two separate execution sequences

Select one of the following:

  • True
  • False

Question 158 of 200

Medal-premium 1

a process itself can be an execution environment for other code

Select one of the following:

  • True
  • False

Question 159 of 200

Medal-premium 1

Fill the blank spaces to complete the text.

as a program executes, it changes . The of a process is defined in part by the current activity of the process

Question 160 of 200

Medal-premium 1

what are not common states or a process?

Select one or more of the following:

  • new

  • running

  • waiting

  • ready

  • terminated

  • halted

  • overhaul

Question 161 of 200

Medal-premium 1

Fill the blank spaces to complete the text.

it is important to know that only process can be running at a time, while can be ready or waiting

Question 162 of 200

Medal-premium 1

each process is represented in the operating system by a also called the control block.

Drag and drop to complete the text.

    process control block (PCB)
    process control block (PCB)
    heap control block (HCB)
    heap control block (HCB)
    process counter control block (PCCB)
    process counter control block (PCCB)
    accounting control block (ACB)
    accounting control block (ACB)

Question 163 of 200

Medal-premium 1

which is not part of the process control block?

Select one of the following:

  • process state

  • program counter

  • cpu registers

  • cpu-scheduling information

  • memory-manamgent information

  • accounting information

  • I/O status information

  • program heap

Question 164 of 200

Medal-premium 1

- the state may be new, running, halted, ect.

Drag and drop to complete the text.

    Process State
    Process State
    Program counter
    Program counter
    CPU registers
    CPU registers
    CPU-scheduling information
    CPU-scheduling information
    Memory-management information
    Memory-management information
    Accounting information
    Accounting information
    I/O status information
    I/O status information

Question 165 of 200

Medal-premium 1

- the counter indicates the address of the next instruction to be executed for this process

Drag and drop to complete the text.

    Program counter
    Program counter
    Process sate
    Process sate
    CPU registers
    CPU registers
    CPU-scheduling information
    CPU-scheduling information
    Memory-management information
    Memory-management information
    Accounting information
    Accounting information
    I/O status information
    I/O status information

Question 166 of 200

Medal-premium 1

- the registers vary in number and type, depending on the computer architecture. They include accumulators, index registers, stack pointers, and general purpose registers, as well as condition code information. All this information must be saved when an interrupt occurs.

Drag and drop to complete the text.

    CPU registers
    CPU registers
    Process registers
    Process registers
    Heap registers
    Heap registers

Question 167 of 200

Medal-premium 1

______________ - this information includes a process priority, pointers to scheduling queues, and any other scheduling parameters

Select one of the following:

  • CPU-scheduling

  • Process-scheduling

Question 168 of 200

Medal-premium 1

Fill the blank space to complete the text.

-management information - This information may include such items as the value of the base and limit registers and the page tables, or the segment tables, depending on the memory system used by the operating system.

Question 169 of 200

Medal-premium 1

Fill the blank space to complete the text.

information - This information includes the amount of CPU and real time used, time limits, account numbers, job process numbers, and so on

Question 170 of 200

Medal-premium 1

Fill the blank space to complete the text.

I/O information - This information includes the list of I/O devices allocated to the process, a list of open files, and so on

Question 171 of 200

Medal-premium 1

Fill the blank spaces to complete the text.

a process is a program that performs a single of execution. Many systems now have upgraded this to allow a program to run multiple of execution.

Question 172 of 200

Medal-premium 1

On a system that supports threads, the is extended to include the information for each thread.

Drag and drop to complete the text.

    PCB
    PCB
    ACB
    ACB
    GPD
    GPD
    PCCB
    PCCB

Question 173 of 200

Medal-premium 1

we want to have processes running at all times to maximize CPU utilization

Select one of the following:

  • True
  • False

Question 174 of 200

Medal-premium 1

what is the objective of time sharing?

Select one of the following:

  • is to switch the CPU among processes so frequently that users can interact with each program while it is running

  • is to switch the CPU among processes so that each process gets equal time to compute its job

Question 175 of 200

Medal-premium 1

Fill the blank space to complete the text.

to meet the objective of time sharing, the selects an available process for the program execution on the CPU

Question 176 of 200

Medal-premium 1

on single cores, only one process can run at a time

Select one of the following:

  • True
  • False

Question 177 of 200

Medal-premium 1

as a process enters a system, it is put into a , which consists of all processes in the system

Drag and drop to complete the text.

    job queue
    job queue
    process stack
    process stack
    job linked list
    job linked list
    process linked list
    process linked list

Question 178 of 200

Medal-premium 1

Fill the blank space to complete the text.

the processes that are residing in main memory and are ready and waiting to execute are kept on a list called the .

Question 179 of 200

Medal-premium 1

Fill the blank space to complete the text.

a new process is put on the ready queue until it is selected for execution or

Question 180 of 200

Medal-premium 1

Once a process gets the CPU, one of several events may occur:

Select one or more of the following:

  • The process could issue an I/O request and be put on an I/O queue

  • The process could create a new child process and wait for the child's termination

  • The process could be forcibly removed from the CPU, as a result of an interrupt and put back in the ready queue

Question 181 of 200

Medal-premium 1

Fill the blank space to complete the text.

the operating system must select processes from the queues using an appropriate

Question 182 of 200

Medal-premium 1

The or selects processes from the batch pool and loads them into memory for execution

Drag and drop to complete the text.

    long-term scheduler
    long-term scheduler
    short-term scheduler
    short-term scheduler
    job scheduler
    job scheduler
    CPU scheduler
    CPU scheduler

Question 183 of 200

Medal-premium 1

The or selects from among the processes that are ready for execution and allocates the CPU to one of them

Drag and drop to complete the text.

    shot-term scheduler
    shot-term scheduler
    long-term scheduler
    long-term scheduler
    CPU scheduler
    CPU scheduler
    job scheduler
    job scheduler

Question 184 of 200

Medal-premium 1

The short term scheduler must select a new process for the CPU frequently

Select one of the following:

  • True
  • False

Question 185 of 200

Medal-premium 1

The long term scheduler controls the degree of multiprogramming (the number of processes in memory)

Select one of the following:

  • True
  • False

Question 186 of 200

Medal-premium 1

when is the degree of multiprogramming stable?

Select one of the following:

  • the average number of process creation is equal to the average departure rate of the processes leaving the system

  • the average number of process creation is more than the average departure rate of the processes leaving the system

  • the average number of process creation is less than the average departure rate of the processes leaving the system

  • the average number of process creation is two times more than the average departure rate of the processes leaving the system

Question 187 of 200

Medal-premium 1

An I/O bound process generates I/O requests infrequently, spending more time doing computations and a CPU bound process is one that spends most of its time doing I/O rather than computations.

Select one of the following:

  • True
  • False

Question 188 of 200

Medal-premium 1

Fill the blank spaces to complete the text.

some systems such as time sharing systems may introduce -term schedulers. The idea is that sometimes it is advantageous to remove a process from memory to reduce the degree of multiprogramming. Later the process can be reintroduced to memory and start off where they left off, in a process called .

Question 189 of 200

Medal-premium 1

Fill the blank space to complete the text.

when an interrupt occurs, the system needs to save the current of the process running on the CPU so that it can restore that context when processing is done

Question 190 of 200

Medal-premium 1

Select from the dropdown lists to complete the text.

Gernerally, we perform a ( state save, state restore, state copy ) of the current state of the CPU, be it in kernel mode or user mode, then use a ( state restore, state save, state copy, state resume ) to resume operation

Question 191 of 200

Medal-premium 1

Select from the dropdown list to complete the text.

the process of completing a state save and state restore is known as a ( context switch, context swap, context flip )

Question 192 of 200

Medal-premium 1

Fill the blank space to complete the text.

the process is a child of init and is responsible for creating additional processes that perform tasks on behalf of the kernel

Question 193 of 200

Medal-premium 1

Fill the blank space to complete the text.

the process is a child of init and is responsible for the managing clients that connect to a system using ssh

Question 194 of 200

Medal-premium 1

Fill the blank space to complete the text.

the process is also a child of init and it is used to manage clients that directly log onto the system

Question 195 of 200

Medal-premium 1

When a process creates a new process. Which are possible for execution:

Select one or more of the following:

  • the parent continues to execute concurrently with the children

  • the parent waits until some or all of its children have terminated

Question 196 of 200

Medal-premium 1

with a new process what could happen with address space?

Select one or more of the following:

  • the children process is duplicate of the parent process (it has the same program and data as the parent)

  • the child process has a new program loaded into it

Question 197 of 200

Medal-premium 1

A parent may terminate the execution of one of its children for a variety of different reasons, such as:

Select one or more of the following:

  • The child has exceeded its usage of some of the resources that it has been allocated

  • The task assigned to the child is no longer required

  • The parent is existing, and the operating system does not allow a child to continue if its parent terminates

Question 198 of 200

Medal-premium 1

is when a parent is terminated, and all of its children are terminated as well

Drag and drop to complete the text.

    Cascading termination
    Cascading termination
    Family termination
    Family termination
    Mass termination
    Mass termination

Question 199 of 200

Medal-premium 1

Fill the blank space to complete the text.

A process that is terminated, but whose parents do not call wait is called a process. All processes transition to this state briefly but are often resolved once wait() is called by the parent

Question 200 of 200

Medal-premium 1

Fill the blank spaces to complete the text.

If a parent terminates before a child, it can not call wait(), so the child process becomes and . Linux and Unix solve this problem by assigning to be the new parent of a child process whose parent prematurely terminates.

Icon_fullscreen

Operating Systems

Matthew Warner
Quiz by , created about 1 year ago

this is a description

Eye 8
Pin 0
Balloon-left 0
Tags
Matthew Warner
Created by Matthew Warner about 1 year ago
Close