Matthew Warner
Quiz by , created more than 1 year ago

this is a description

192
0
0
Matthew Warner
Created by Matthew Warner over 8 years ago
Close

Operating Systems

Question 1 of 200

1

What are the 4 components of a computer system?

Select one or more of the following:

  • Hardware

  • Operating System

  • Kernel

  • Application Programs

  • ROM

  • User

Explanation

Question 2 of 200

1

An operating system is a resource allocator?

Select one of the following:

  • True
  • False

Explanation

Question 3 of 200

1

Fill the blank space to complete the text.

The bootstrap program is stored in

Explanation

Question 4 of 200

1

Fill the blank space to complete the text.

The occurrence of an event is usually signalled by an from either hardware or software.

Explanation

Question 5 of 200

1

Main memory is typically implemented in semiconductor technology called variable random memory (VRAM).

Select one of the following:

  • True
  • False

Explanation

Question 6 of 200

1

Since EEPROM can not be changed it only stores static programs like bootstrap

Select one of the following:

  • True
  • False

Explanation

Question 7 of 200

1

A typical instruction-execution cycle for a Von Neumann Architecture is:

Select one or more of the following:

  • 1. Fetch an instruction from memory and stores the instructions in the instruction register.
    2. Decode the operation and fetch operands from memory
    3. Instruction is executed and stored back in memory

  • 1. Decode the operation and fetch operands from memory
    2. Instruction is executed and stored back in memory
    3. Fetch an instruction from memory and stores the instructions in the instruction register.

Explanation

Question 8 of 200

1

We would like programs and data to both reside in main memory. This is not possible for two reasons:

Select one of the following:

  • 1. Main memory is usually too small to store all needed programs and data permanently
    2. Main memory is a volatile storage device that loses its contents when power is turned off

  • 1. Main memory is usually too small to store all needed programs and data permanently
    2. Main memory is a non-volatile storage device that loses its contents when power is turned off

  • 1. Using this approach would be to fast for the operating system to interpret and therefore would not be feasible
    2. Programs are not written this way and would be way to difficult to change the way a computer works now.

Explanation

Question 9 of 200

1

What is the main requirement for secondary-storage?

Select one of the following:

  • The ability to hold large quantities of data permanently

  • The ability to use as little power as possible

  • The smaller the size the better

  • The faster the better

Explanation

Question 10 of 200

1

The most common secondary storage is a which provides storage for both programs and data.

Drag and drop to complete the text.

    magnetic disk
    solid state drive
    cloud drive
    external disk
    CD-ROM

Explanation

Question 11 of 200

1

The main difference among the various storage systems lie in:

Select one or more of the following:

  • speed

  • cost

  • size

  • volatility

  • power consumption

Explanation

Question 12 of 200

1

Volatile Storage loses its contents when power to the device is removed

Select one of the following:

  • True
  • False

Explanation

Question 13 of 200

1

What are the two types of Sold-State disks?

Select one or more of the following:

  • Solid-State disk stores data in large DRAM array during normal operation but also contains a hidden magnetic hard disk and a battery for backup-power

  • Solid-State disk is flash memory

  • Electromagnetic Varient Memory

  • Magnetic Allocation memory

Explanation

Question 14 of 200

1

A device controller must contain what?

Select one of the following:

  • some local buffer storage and a set of special-purpose registers

  • a device controller must house a single processor

  • must container at least one cache

Explanation

Question 15 of 200

1

How do we solve the problem of interrupt-driven I/O having high overhead when moving bulk data?

Select one of the following:

  • direct memory access (DMA)

  • device memory access (DMA)

  • process memory access (PMA)

  • local memory access (LMA)

Explanation

Question 16 of 200

1

What do single-processors not run?

Select one or more of the following:

  • kernel processes

  • user processes

  • I/O processes

Explanation

Question 17 of 200

1

Select from the dropdown list to complete the text.

( Multiprocessor systems, Singleprocessor systems, Complexprocessor systems, Dynamicprocessor systems ) have two or more processors in close communication, sharing the computer bus and sometimes the clock, memory, and peripheral devices.

Explanation

Question 18 of 200

1

advantages of multiprocessor systems?

Select one or more of the following:

  • increased throughput

  • economy of scale

  • increased reliability

  • power reduction

  • size of unit

Explanation

Question 19 of 200

1

is the ability to continue providing service proportional to the level of surviving hardware.

Drag and drop to complete the text.

    Graceful degradation
    Steady wear
    Graceful wear
    Slow deterioration

Explanation

Question 20 of 200

1

Asymmetric multiprocessing is where each processor performs all tasks within the operating system.

Select one of the following:

  • True
  • False

Explanation

Question 21 of 200

1

Symmetric multiprocessing is where each processor is assigned a specific task

Select one of the following:

  • True
  • False

Explanation

Question 22 of 200

1

more multiprocessors increases computing power but if the CPU has an controller then adding CPUs also increase the amount of memory addressable in the system

Drag and drop to complete the text.

    integrated memory
    I/O
    cache memory
    processor

Explanation

Question 23 of 200

1

Select from the dropdown lists to complete the text.

multiprocessing can cause a system to change its memory access model from ( uniform memory access (UMA), non-uniform memory access (NUMA) ) to ( non-uniform memory access (NUMA), uniform memory access (UMA) )

Explanation

Question 24 of 200

1

is the situation in which access to RAM from any CPU takes time

Drag and drop to complete the text.

    UMA
    NUMA
    NUSM
    UHM
    the same
    more
    less

Explanation

Question 25 of 200

1

is some parts of memory may take to access than other parts

Drag and drop to complete the text.

    NUMA
    UMA
    SLT
    UHG
    longer
    less time
    the same time

Explanation

Question 26 of 200

1

multicore systems are multiprocessor systems, not all multiprocessor systems are multicore

Select one of the following:

  • True
  • False

Explanation

Question 27 of 200

1

are where each processor board boots independently and runs its own operating system

Drag and drop to complete the text.

    blade servers
    dynamic servers
    multiprocessors
    multi servers

Explanation

Question 28 of 200

1

What is NVRAM?

Select one of the following:

  • DRAM with battery backup

  • RAM with volatile memory

  • ROM with non-volatile memory

  • DRAM with volatile and non-volatile memory

Explanation

Question 29 of 200

1

Another type of multiprocessor system is a clustered system?

Select one of the following:

  • True
  • False

Explanation

Question 30 of 200

1

clustered computers are defined as:

Select one or more of the following:

  • sharing storage

  • are closely linked via a local-area network or a faster interconnect

  • share resources

  • share processing power

Explanation

Question 31 of 200

1

clustering is usually used to provide

Drag and drop to complete the text.

    high-availability service
    faster processing
    higher security
    multithreading

Explanation

Question 32 of 200

1

why is clustering used?

Select one of the following:

  • service will continue even if one or more systems in the cluster fail

  • higher processing used by having more than one processor work on a job

  • a boss processor will switch in and out jobs so there is no idle processors no matter what

Explanation

Question 33 of 200

1

What are the components of clustered systems?

Select one or more of the following:

  • gathers together multiple CPUs

  • are composed of two or more individual systems - or nodes - joined together

  • multiple operating systems run on the same board

  • each processor runs its own operating system

Explanation

Question 34 of 200

1

clustered systems are composed of two or more individual systems - or nodes - joined together. This is called loosely coupled

Select one of the following:

  • True
  • False

Explanation

Question 35 of 200

1

clustering can be structured asymmetrically or symmetrically

Select one of the following:

  • True
  • False

Explanation

Question 36 of 200

1

Fill the blank space to complete the text.

in asymmetric clustering one machine is in while the other is running the applications

Explanation

Question 37 of 200

1

what is the hot-standby host function?

Select one of the following:

  • the host machine does nothing but monitor the active server

  • the host machine allocates jobs to other servers

Explanation

Question 38 of 200

1

what does an asymmetric hot-standby host machine do if the server fails?

Select one of the following:

  • the hot-standby host becomes the active server

  • the hot-standby host reallocates the jobs to other servers

  • the hot-standby host cancels all jobs for that server and notifies all other servers of its failure

Explanation

Question 39 of 200

1

symmetric clustering is when two or more hosts are running applications and are monitoring each other

Select one of the following:

  • True
  • False

Explanation

Question 40 of 200

1

symmetric clustering is more efficient?

Select one of the following:

  • True
  • False

Explanation

Question 41 of 200

1

why is symmetric clustering more efficient?

Select one of the following:

  • is uses all of the available hardware

  • it talks between each processor more efficiently

Explanation

Question 42 of 200

1

what are the component(s) of cluster parallelization?

Select one or more of the following:

  • parallelization divides a program into separate components that run in parallel on individual computers in the cluster

  • these applications are designed so that once each computing node in the cluster has solved its portion of the problem, the results from all the nodes are combined into a final solution

  • parallelization concurrently divides jobs between nodes

Explanation

Question 43 of 200

1

to provide shared access, the system must also supply access control and locking to ensure that no conflicting operations occur. this is known as

Drag and drop to complete the text.

    distributed lock manager (DLM)
    eye lock manager (ELM)
    protected access manager (PAM)
    distributed access manager (DAM)

Explanation

Question 44 of 200

1

improvements to clustering are made possible by

Drag and drop to complete the text.

    storage-area networks (SANs)
    dynamic-area networks (DANs)
    symmetric-area networks (SANs)

Explanation

Question 45 of 200

1

the advantage(s) of storage-area networks (SANs)

Select one or more of the following:

  • allows many systems to attach to a pool of storage

  • if the applications and their data are stored on the SAN, then the cluster software can assign the application to run on any host that is attached to the SAN

  • allows concurrent processing through allocation of storage

  • symmetric processing is possible through sharing of processing of programs

Explanation

Question 46 of 200

1

beowulf clusters are designed to solve high-performance computing tasks

Select one of the following:

  • True
  • False

Explanation

Question 47 of 200

1

beowulf computing nodes typically run Linux operating systems

Select one of the following:

  • True
  • False

Explanation

Question 48 of 200

1

why is beowulf clusters a low cost strategy for building a high-performance computing cluster?

Select one of the following:

  • uses open-source software

  • uses less power

  • less processors are needed

Explanation

Question 49 of 200

1

Fill the blank space to complete the text.

beowulf clusters nodes use a set of software libraries to communicate with one another

Explanation

Question 50 of 200

1

Fill the blank space to complete the text.

increases CPU utilization by organizing jobs (code and data) so that the CPU always has one to execute

Explanation

Question 51 of 200

1

the main idea(s) behind multiprogramming?

Select one or more of the following:

  • the jobs are prioritized so that the most important jobs are done first

  • the program uses all available processors to run the program concurrently

  • as long as at least one job needs to execute the CPU is never idle

Explanation

Question 52 of 200

1

what does time sharing require?

Select one of the following:

  • an interactive computer system

  • a dynamic computer system

  • a static computer system

  • a clustered computer system

  • a GUI computer system

Explanation

Question 53 of 200

1

a time-shared operating system allows many users to share the computer simultaneously

Select one of the following:

  • True
  • False

Explanation

Question 54 of 200

1

how do we achieve the goal of reasonable time from time-sharing?

Select one of the following:

  • we use swapping or virtual memory

  • multithreading

  • concurrent processing

  • we use a method called logical memory

Explanation

Question 55 of 200

1

what is virtual memory?

Select one of the following:

  • it abstracts main memory into a large, uniform array of storage separating logical memory as viewed by the user from physical memory

  • memory is run in the cloud

  • memory is constantly switched out between the main memory and cache to give the allusion of memory space larger than it actually is

Explanation

Question 56 of 200

1

Fill the blank space to complete the text.

modern systems are driven

Explanation

Question 57 of 200

1

Fill the blank space to complete the text.

bit is added to the hardware of the computer to indicate the current mode
- kernel (0)
- user (1)

Explanation

Question 58 of 200

1

what is the function of dual mode?

Select one of the following:

  • it provides the operating system the means of protecting it from errant users and errant users from one another

  • the operating systems is protected from hackers that are trying to gain remote access

  • it protects your files from errant users

Explanation

Question 59 of 200

1

has more privileges than the user processes but fewer than the kernel

Drag and drop to complete the text.

    virtual machine manager (VMM)
    dynamic machine manager (DMM)
    file machine manager (FMM)
    force quite manager (FQM)
    processor machine manager (PMM)

Explanation

Question 60 of 200

1

Fill the blank spaces to complete the text.

a timers period may be or

Explanation

Question 61 of 200

1

variable timer is generally implemented by a fixed-rate clock and counter

Select one of the following:

  • True
  • False

Explanation

Question 62 of 200

1

why do we use timers?

Select one of the following:

  • we can use timers to prevent a user program from running too long

  • to calculate the time efficiency of a program

  • to display the time of a files last update

Explanation

Question 63 of 200

1

Fill the blank spaces to complete the text.

a program is a entity, like the contents of a file stored on disk, whereas a process is an entity

Explanation

Question 64 of 200

1

Fill the blank space to complete the text.

a single-threaded process has one specifying the next instruction to execute

Explanation

Question 65 of 200

1

the operating system is responsible for the following activities in connection with process management:

Select one or more of the following:

  • scheduling processes and threads on the CPUs

  • creating and deleting both user and system processes

  • suspending and resuming processes

  • providing mechanisms for process synchronization

  • providing mechanisms for process communication

Explanation

Question 66 of 200

1

for a program to be executed it must be mapped to absolute addresses and loaded into memory

Select one of the following:

  • True
  • False

Explanation

Question 67 of 200

1

Fill the blank space to complete the text.

when selecting the memory-management scheme you must take into account many factors but especially the design of the system

Explanation

Question 68 of 200

1

the operating system is responsible for the following activities in connection with memory management:

Select one or more of the following:

  • keeping track of which parts of memory are currently being used and who is using them

  • deciding which processes (or parts of processes) and data to move into and out of memory

  • allocating and deallocating memory space as needed

  • allocating and deallocating processes to complete jobs

Explanation

Question 69 of 200

1

the operating system is responsible for the following activities in connection with the file management:

Select one or more of the following:

  • creating and deleting files

  • creating and deleting directories to organize files

  • supporting primitives for manipulating files and directories

  • mapping files onto secondary storage

  • backing up files on stable (nonvolatile) storage media

  • communicating between the clouds file system and the local file system on your computer

Explanation

Question 70 of 200

1

the operating system is responsible for the following activities in connection with the disk management:

Select one or more of the following:

  • free-space management

  • storage allocation

  • disk scheduling

Explanation

Question 71 of 200

1

the entire speed of operation of a computer may hinge on the speeds of the disk subsystem and the algorithms that manipulate that subsystem

Select one of the following:

  • True
  • False

Explanation

Question 72 of 200

1

when we need a particular piece of information, we first check wether it is in the cache

which of the following is true if any of the above statement?

Select one or more of the following:

  • if it is, we use the information directly from the cache

  • if it is not, we use the information from the source, putting a copy in the cache under the assumption that we will need it again soon

  • if it is not, we use the information directly from the cache

  • if it is, we use the information from the source, putting a copy in the cache under the assumption that we will need it again soon

Explanation

Question 73 of 200

1

Fill the blank space to complete the text.

with multiprocessors each has its own local cache so when the value of something changes you must make sure that value is changed computer wide. this is called

Explanation

Question 74 of 200

1

I/O subsystems consists of several component(s):

Select one or more of the following:

  • a memory-manamgment component that includes buffering, caching, and spooling

  • a general device-driver interface

  • drivers for specific hardware devices

Explanation

Question 75 of 200

1

Fill the blank space to complete the text.

most operating systems maintain a lot of user names and associated

Explanation

Question 76 of 200

1

in a , each item points to its successor

Drag and drop to complete the text.

    singly linked list
    doubly linked list
    circularly linked list

Explanation

Question 77 of 200

1

in a , a given item can refer either to its predecessor or to its successor

Drag and drop to complete the text.

    doubly linked list
    singly linked list
    circularly linked list

Explanation

Question 78 of 200

1

in a , the last element in the list refers to the first element, rather than to null

Drag and drop to complete the text.

    circularly linked list
    singly linked list
    doubly linked list

Explanation

Question 79 of 200

1

Fill the blank space to complete the text.

tree is when a parent may have an unlimited number of children

Explanation

Question 80 of 200

1

Fill the blank space to complete the text.

tree is when a parent may have at most two children, which we term left child and the right child

Explanation

Question 81 of 200

1

Fill the blank space to complete the text.

tree, additionally requires an ordering between the parents two children in which left_child <= right_child

Explanation

Question 82 of 200

1

Fill the blank space to complete the text.

tree is when a tree containing n items as at most log(n) levels

Explanation

Question 83 of 200

1

Fill the blank space to complete the text.

takes data as input, performs a numeric operation on this data, and returns a numeric value

Explanation

Question 84 of 200

1

what is it called when two hash function have the same output

Select one of the following:

  • hash collision

  • hash interrupt

  • hash contact

  • hash dilapidation

Explanation

Question 85 of 200

1

in the event of a hash collision what method do we employ

Select one of the following:

  • we use a linked list at the table location that contains all of the items with the same hash value

  • we use a array at the table location that contains all of the items with the same hash value

  • we use a stack at the table location that contains all of the items with the same hash value

Explanation

Question 86 of 200

1

Fill the blank space to complete the text.

associates pairs using a hash function

Explanation

Question 87 of 200

1

Fill the blank space to complete the text.

is a string of n binary digits that can be used to represent the status of n items

Explanation

Question 88 of 200

1

when are bitmaps commonly used?

Select one of the following:

  • when there is a need to represent the availability of a large number of resources

  • when there is a need to represent the large number of processes

  • when there is a need to represent the large number of jobs

Explanation

Question 89 of 200

1

Fill the blank space to complete the text.

is a collection of physically separate, possibly heterogeneous computer systems that are networked to provide users with access to the various resources that the system maintains

Explanation

Question 90 of 200

1

Fill the blank space to complete the text.

is a communication path between two or more systems

Explanation

Question 91 of 200

1

what do distributed systems depend on for their functionality?

Select one of the following:

  • networking

  • GUI

  • multicore systems

  • multiprogramming

Explanation

Question 92 of 200

1

Fill the blank space to complete the text.

is the most common network protocol, and it provides the fundamental architecture of the Internet

Explanation

Question 93 of 200

1

connects computers within a room, a building or a campus

Drag and drop to complete the text.

    local-area network (LAN)
    wide-area network (WAN)
    personal-area network (PAN)

Explanation

Question 94 of 200

1

usually links buildings, cities or countries

Drag and drop to complete the text.

    wide-area network (WAN)
    local-area network (LAN)
    personal-area network (PAN)

Explanation

Question 95 of 200

1

connects a phone to a headset or a smartphone and a desktop computer

Drag and drop to complete the text.

    personal-area network (PAN)
    wide-area network (WAN)
    local-area network (LAN)

Explanation

Question 96 of 200

1

Fill the blank space to complete the text.

is an operating system that provides features such as file sharing across the network, along with communication scheme that allows different processes on different computers to exchange messages

Explanation

Question 97 of 200

1

Fill the blank spaces to complete the text.

many of todays systems act as to satisfy requests generated by

Explanation

Question 98 of 200

1

the function of a computer-server system:

Select one of the following:

  • provides an interface to which client can send a request to perform an action. in response the server executes the action and sends the results to the client

  • provides a file-system interface where clients can create, update, read, and delete files

Explanation

Question 99 of 200

1

Fill the blank space to complete the text.

provides a file-system interface where clients can create, update, read, and delete files

Explanation

Question 100 of 200

1

an example of a computer-server system:

Select one of the following:

  • server running a database

  • server running a web browser

Explanation

Question 101 of 200

1

an example of a file-server system:

Select one of the following:

  • server running a database

  • server running a web browser

Explanation

Question 102 of 200

1

Fill the blank space to complete the text.

computing clients and servers are not distinguished from one another

Explanation

Question 103 of 200

1

Fill the blank spaces to complete the text.

in a system, the server is a bottleneck; but in a system, services can be provided by several nodes distributed throughout the network

Explanation

Question 104 of 200

1

deeming what services are available is accomplished in one of two general ways:

- when a node joins a network, it registers its services with a centralized lookup service on the network, Any node desiring a specific service first contacts this centralized lookup service to determine which node provides the service. the remainder of the communication takes place between the client and the service provider

- An alternative scheme uses no centralized lookup service. Instead, a peer acting as a client must discover what node provides a desired service by broadcasting a request for the service to all other nodes in the network. the node (or nodes) providing that service responds to the peer making the request. To support this approach, a discovery protocol must be provided that allows peers to discover services provided by other peers in the network

Select one of the following:

  • True
  • False

Explanation

Question 105 of 200

1

Fill the blank space to complete the text.

is used when the source CPU type is different from the target CPU type

Explanation

Question 106 of 200

1

process of emulation: every machine-level instruction that runs natively on the source system must be translated to the equivalent function on the target system

Select one of the following:

  • True
  • False

Explanation

Question 107 of 200

1

Fill the blank space to complete the text.

is a form of emulation in that the high-level language code is translated to native CPU instructions, emulating not another CPU but a theoretical virtual machine on which that language could run natively

Explanation

Question 108 of 200

1

Fill the blank space to complete the text.

is an operating system that is natively compiled for a particular CPU architecture runs within another operating system also native to that CPU

Explanation

Question 109 of 200

1

cloud computing is a type of computing that delivers computing, storage, and even applications as a service across a network

Select one of the following:

  • True
  • False

Explanation

Question 110 of 200

1

which is not a type of cloud computing

Select one or more of the following:

  • public cloud

  • private cloud

  • hybrid cloud

  • dynamic cloud

Explanation

Question 111 of 200

1

Fill the blank space to complete the text.

a is a cloud available vie the internet to anyone willing to pay for the services

Explanation

Question 112 of 200

1

Fill the blank space to complete the text.

a is a cloud run by a company for that company's own use

Explanation

Question 113 of 200

1

Fill the blank space to complete the text.

a is a cloud that includes both public and private cloud components

Explanation

Question 114 of 200

1

is one or more applications (such as word processors or spreadsheets) available via internet

Drag and drop to complete the text.

    Software as a service (SaaS)
    Platform as a service (PaaS)
    Infrastructure as a service (IaaS)
    Program as a service (PaaS)

Explanation

Question 115 of 200

1

______________ is a software stack ready for application use via internet

Select one of the following:

  • Platform as a service (PaaS)

  • Software as a service (SaaS)

  • Infrastructure as a service (IaaS)

Explanation

Question 116 of 200

1

Infrastructure as a service (IaaS) is one or more applications available via internet

Select one of the following:

  • True
  • False

Explanation

Question 117 of 200

1

Fill the blank space to complete the text.

embedded systems almost always run operating systems

Explanation

Question 118 of 200

1

when do we use real-time systems?

Select one of the following:

  • when rigid time requirements have been placed on the operation or processor or the flow of data

  • when we need to run a process concurrently in the system

  • when we are running a blade-server system we want to use a real-time system

Explanation

Question 119 of 200

1

The types of user interfaces are:
- command-line interface (CLI)
- batch interface
- graphical user interface (GUI)

Select one of the following:

  • True
  • False

Explanation

Question 120 of 200

1

for efficiency and protection, users usually can control I/O

Select one of the following:

  • True
  • False

Explanation

Question 121 of 200

1

Fill the blank space to complete the text.

is when two or more processes read and write to a shared section of memory

Explanation

Question 122 of 200

1

Fill the blank space to complete the text.

is packets of information in predefined formats are moved between processes by the operating system

Explanation

Question 123 of 200

1

when several separate processes execute concurrently, it should be possible for one process to interfere with the others or with the operating system itself

Select one of the following:

  • True
  • False

Explanation

Question 124 of 200

1

Fill the blank space to complete the text.

the specifies a set of functions that are available to an application programmer, including the parameters that are passed to each function and return values the program can expect

Explanation

Question 125 of 200

1

system-call interface serves as the link to system calls made available by the operating system

Select one of the following:

  • True
  • False

Explanation

Question 126 of 200

1

what are the method(s) used to pass parameters to the operating system?

Select one or more of the following:

  • pass the parameters in registers

  • parameters are generally stored in a block, or table, in memory, and the address of the block is passed as a parameter in a register

  • parameters also can be placed, or pushed, onto the stack by the program and popped off the stack by the operating system

Explanation

Question 127 of 200

1

Fill the blank space to complete the text.

is a system program designed to aid the programmer in finding and correcting errors

Explanation

Question 128 of 200

1

what are the major categories of system calls?

Select one or more of the following:

  • process control

  • file management

  • device management

  • information maintenance

  • communications

  • cloud communication

  • network calls

Explanation

Question 129 of 200

1

what is part of the message-passing model?

Select one or more of the following:

  • communicating processes exchange messages with one another to transfer information

  • each computer in a network has a host name by which it is commonly known

  • each process has a process name

  • most processes that will be receiving connections are special-purpose daemons

  • the form of the data is determined by the processes and is not under the operating system control

  • the processes are also responsible for ensuring that they are not writing to the same location simultaneously

Explanation

Question 130 of 200

1

what is part of the shared-memory model?

Select one or more of the following:

  • shared memory requires that two or more processes agree to remove the restriction that one process cannot access another processes memory

  • the form of the data is determined by the processes and is not under the operating systems control

  • the processes are also responsible for ensuring that they are not writing to the same location simultaneously

  • each computer in a network has a host name by which it is commonly known

  • most processes that will be receiving connections are special-purpose daemons

Explanation

Question 131 of 200

1

what are the system utilities categories?

Select one or more of the following:

  • file management

  • status information

  • file modification

  • programming-language support

  • programming loading and execution

  • communications

  • background services

  • application programs

Explanation

Question 132 of 200

1

Fill the blank spaces to complete the text.

operating system requirements are divided into two basic groups: and

Explanation

Question 133 of 200

1

Fill the blank spaces to complete the text.

are how to do something and are what will be done

Explanation

Question 134 of 200

1

the advantage to writing in high level languages is that it is faster and lowers storage requirements

Select one of the following:

  • True
  • False

Explanation

Question 135 of 200

1

the main advantage to the layered approach when making an O.S. is

Select one of the following:

  • simplicity of construction and debugging

  • debugging and less time

  • less time and less cost

Explanation

Question 136 of 200

1

The main function of the microkernel is to provide communication between the client program and various services in the user space. Communication is provided through message passing

Select one of the following:

  • True
  • False

Explanation

Question 137 of 200

1

what is one benefit of the microkernel?

Select one of the following:

  • it makes extending the operating system easier. it also provides more security and reliability.

  • the performance of microkernels overhead is extremely small

Explanation

Question 138 of 200

1

what is the loadable kernel modules?

Select one of the following:

  • the kernel has a set of core components, and links to additional services via modules, either at boot time or during run time

  • remove all nonessential components from the kernel and implement them as system and user level programs

Explanation

Question 139 of 200

1

the best methodology to OS design is using loadable kernel modules

Select one of the following:

  • True
  • False

Explanation

Question 140 of 200

1

how is Mac OSX a hybrid system?

Select one of the following:

  • the top layer the user interface. below theses layers is the kernel environment which is MACH and BSD UNIX kernel

  • the top layer the user interface. below theses layers is the kernel environment which is cocoa api

Explanation

Question 141 of 200

1

Fill the blank space to complete the text.

a failure in the kernel is called a crash and information about it is saved in a

Explanation

Question 142 of 200

1

Fill the blank space to complete the text.

the operating can take a , a capture of the memory of the process, to be stored for later analysis

Explanation

Question 143 of 200

1

Fill the blank space to complete the text.

the operating system produces of system behaviour to try to find bottle necks

Explanation

Question 144 of 200

1

Fill the blank space to complete the text.

periodically samples the instruction pointer to determine which code is being executed. It can show stat trends but not individual activity.

Explanation

Question 145 of 200

1

an OS must be generated for each specific computer site, a process known as

Drag and drop to complete the text.

    system generation (SYSGEN)
    operating system generation (OSYSGEN)
    kernel generation (KG)
    kernel and user generation (KUG)

Explanation

Question 146 of 200

1

The SYSGEN is on the disk or ISO of the OS and it queries the user on hardware information such as:

Select one or more of the following:

  • What CPU is used? What options are installed?

  • How will the boot disk be formatted? How many partitions are there?

  • How much memory is available?

  • What devices are available?

  • What operating system options are desired?

Explanation

Question 147 of 200

1

Fill the blank space to complete the text.

after the OS is generated, it must be loaded into the kernel using a . This program is placed in ROM.

Explanation

Question 148 of 200

1

a bootstrap can also run diagnostics on a system to ensure it is properly working before booting

Select one of the following:

  • True
  • False

Explanation

Question 149 of 200

1

Fill the blank spaces to complete the text.

a system executes jobs, whereas a system has user programs, or tasks

Explanation

Question 150 of 200

1

Select from the dropdown lists to complete the text.

a ( process, text section, program counter ) is more than the program code, which is sometimes known as the ( text section, process, program counter ). It also includes the current activity, represented by the ( program counter, process, text section )

Explanation

Question 151 of 200

1

what does the process stack generally contain?

Select one of the following:

  • contains temporary data. as well as a data section

  • contains temporary data. as well as a process section

  • contains program counter as well as a data section

Explanation

Question 152 of 200

1

what can a process also include? and what is its function?

Select one of the following:

  • heap - memory that is dynamically allocated during process run time

  • hash - memory that is dynamically allocated during process run time

  • hash - memory that is asymmetrically allocated during process run time

  • heap - memory that is asymmetrically allocated during process run time

Explanation

Question 153 of 200

1

the program itself is not a process. A program is a ___________

Select one of the following:

  • passive entity

  • static entity

  • dynamic entity

  • active entity

Explanation

Question 154 of 200

1

a process is a(n) __________________

Select one of the following:

  • active entity

  • passive entity

  • dynamic entity

  • static entity

Explanation

Question 155 of 200

1

a program becomes a process when it is loaded into memory

Select one of the following:

  • True
  • False

Explanation

Question 156 of 200

1

select the common ways of executing a program:

Select one or more of the following:

  • double click an icon representing the executable file

  • entering the name of the executable file on the command line

  • using the program counter

  • using a system call to start a program

  • using the command startx

Explanation

Question 157 of 200

1

although two processes can be related to the same program, they are not considered two separate execution sequences

Select one of the following:

  • True
  • False

Explanation

Question 158 of 200

1

a process itself can be an execution environment for other code

Select one of the following:

  • True
  • False

Explanation

Question 159 of 200

1

Fill the blank spaces to complete the text.

as a program executes, it changes . The of a process is defined in part by the current activity of the process

Explanation

Question 160 of 200

1

what are not common states or a process?

Select one or more of the following:

  • new

  • running

  • waiting

  • ready

  • terminated

  • halted

  • overhaul

Explanation

Question 161 of 200

1

Fill the blank spaces to complete the text.

it is important to know that only process can be running at a time, while can be ready or waiting

Explanation

Question 162 of 200

1

each process is represented in the operating system by a also called the control block.

Drag and drop to complete the text.

    process control block (PCB)
    heap control block (HCB)
    process counter control block (PCCB)
    accounting control block (ACB)

Explanation

Question 163 of 200

1

which is not part of the process control block?

Select one of the following:

  • process state

  • program counter

  • cpu registers

  • cpu-scheduling information

  • memory-manamgent information

  • accounting information

  • I/O status information

  • program heap

Explanation

Question 164 of 200

1

- the state may be new, running, halted, ect.

Drag and drop to complete the text.

    Process State
    Program counter
    CPU registers
    CPU-scheduling information
    Memory-management information
    Accounting information
    I/O status information

Explanation

Question 165 of 200

1

- the counter indicates the address of the next instruction to be executed for this process

Drag and drop to complete the text.

    Program counter
    Process sate
    CPU registers
    CPU-scheduling information
    Memory-management information
    Accounting information
    I/O status information

Explanation

Question 166 of 200

1

- the registers vary in number and type, depending on the computer architecture. They include accumulators, index registers, stack pointers, and general purpose registers, as well as condition code information. All this information must be saved when an interrupt occurs.

Drag and drop to complete the text.

    CPU registers
    Process registers
    Heap registers

Explanation

Question 167 of 200

1

______________ - this information includes a process priority, pointers to scheduling queues, and any other scheduling parameters

Select one of the following:

  • CPU-scheduling

  • Process-scheduling

Explanation

Question 168 of 200

1

Fill the blank space to complete the text.

-management information - This information may include such items as the value of the base and limit registers and the page tables, or the segment tables, depending on the memory system used by the operating system.

Explanation

Question 169 of 200

1

Fill the blank space to complete the text.

information - This information includes the amount of CPU and real time used, time limits, account numbers, job process numbers, and so on

Explanation

Question 170 of 200

1

Fill the blank space to complete the text.

I/O information - This information includes the list of I/O devices allocated to the process, a list of open files, and so on

Explanation

Question 171 of 200

1

Fill the blank spaces to complete the text.

a process is a program that performs a single of execution. Many systems now have upgraded this to allow a program to run multiple of execution.

Explanation

Question 172 of 200

1

On a system that supports threads, the is extended to include the information for each thread.

Drag and drop to complete the text.

    PCB
    ACB
    GPD
    PCCB

Explanation

Question 173 of 200

1

we want to have processes running at all times to maximize CPU utilization

Select one of the following:

  • True
  • False

Explanation

Question 174 of 200

1

what is the objective of time sharing?

Select one of the following:

  • is to switch the CPU among processes so frequently that users can interact with each program while it is running

  • is to switch the CPU among processes so that each process gets equal time to compute its job

Explanation

Question 175 of 200

1

Fill the blank space to complete the text.

to meet the objective of time sharing, the selects an available process for the program execution on the CPU

Explanation

Question 176 of 200

1

on single cores, only one process can run at a time

Select one of the following:

  • True
  • False

Explanation

Question 177 of 200

1

as a process enters a system, it is put into a , which consists of all processes in the system

Drag and drop to complete the text.

    job queue
    process stack
    job linked list
    process linked list

Explanation

Question 178 of 200

1

Fill the blank space to complete the text.

the processes that are residing in main memory and are ready and waiting to execute are kept on a list called the .

Explanation

Question 179 of 200

1

Fill the blank space to complete the text.

a new process is put on the ready queue until it is selected for execution or

Explanation

Question 180 of 200

1

Once a process gets the CPU, one of several events may occur:

Select one or more of the following:

  • The process could issue an I/O request and be put on an I/O queue

  • The process could create a new child process and wait for the child's termination

  • The process could be forcibly removed from the CPU, as a result of an interrupt and put back in the ready queue

Explanation

Question 181 of 200

1

Fill the blank space to complete the text.

the operating system must select processes from the queues using an appropriate

Explanation

Question 182 of 200

1

The or selects processes from the batch pool and loads them into memory for execution

Drag and drop to complete the text.

    long-term scheduler
    short-term scheduler
    job scheduler
    CPU scheduler

Explanation

Question 183 of 200

1

The or selects from among the processes that are ready for execution and allocates the CPU to one of them

Drag and drop to complete the text.

    shot-term scheduler
    long-term scheduler
    CPU scheduler
    job scheduler

Explanation

Question 184 of 200

1

The short term scheduler must select a new process for the CPU frequently

Select one of the following:

  • True
  • False

Explanation

Question 185 of 200

1

The long term scheduler controls the degree of multiprogramming (the number of processes in memory)

Select one of the following:

  • True
  • False

Explanation

Question 186 of 200

1

when is the degree of multiprogramming stable?

Select one of the following:

  • the average number of process creation is equal to the average departure rate of the processes leaving the system

  • the average number of process creation is more than the average departure rate of the processes leaving the system

  • the average number of process creation is less than the average departure rate of the processes leaving the system

  • the average number of process creation is two times more than the average departure rate of the processes leaving the system

Explanation

Question 187 of 200

1

An I/O bound process generates I/O requests infrequently, spending more time doing computations and a CPU bound process is one that spends most of its time doing I/O rather than computations.

Select one of the following:

  • True
  • False

Explanation

Question 188 of 200

1

Fill the blank spaces to complete the text.

some systems such as time sharing systems may introduce -term schedulers. The idea is that sometimes it is advantageous to remove a process from memory to reduce the degree of multiprogramming. Later the process can be reintroduced to memory and start off where they left off, in a process called .

Explanation

Question 189 of 200

1

Fill the blank space to complete the text.

when an interrupt occurs, the system needs to save the current of the process running on the CPU so that it can restore that context when processing is done

Explanation

Question 190 of 200

1

Select from the dropdown lists to complete the text.

Gernerally, we perform a ( state save, state restore, state copy ) of the current state of the CPU, be it in kernel mode or user mode, then use a ( state restore, state save, state copy, state resume ) to resume operation

Explanation

Question 191 of 200

1

Select from the dropdown list to complete the text.

the process of completing a state save and state restore is known as a ( context switch, context swap, context flip )

Explanation

Question 192 of 200

1

Fill the blank space to complete the text.

the process is a child of init and is responsible for creating additional processes that perform tasks on behalf of the kernel

Explanation

Question 193 of 200

1

Fill the blank space to complete the text.

the process is a child of init and is responsible for the managing clients that connect to a system using ssh

Explanation

Question 194 of 200

1

Fill the blank space to complete the text.

the process is also a child of init and it is used to manage clients that directly log onto the system

Explanation

Question 195 of 200

1

When a process creates a new process. Which are possible for execution:

Select one or more of the following:

  • the parent continues to execute concurrently with the children

  • the parent waits until some or all of its children have terminated

Explanation

Question 196 of 200

1

with a new process what could happen with address space?

Select one or more of the following:

  • the children process is duplicate of the parent process (it has the same program and data as the parent)

  • the child process has a new program loaded into it

Explanation

Question 197 of 200

1

A parent may terminate the execution of one of its children for a variety of different reasons, such as:

Select one or more of the following:

  • The child has exceeded its usage of some of the resources that it has been allocated

  • The task assigned to the child is no longer required

  • The parent is existing, and the operating system does not allow a child to continue if its parent terminates

Explanation

Question 198 of 200

1

is when a parent is terminated, and all of its children are terminated as well

Drag and drop to complete the text.

    Cascading termination
    Family termination
    Mass termination

Explanation

Question 199 of 200

1

Fill the blank space to complete the text.

A process that is terminated, but whose parents do not call wait is called a process. All processes transition to this state briefly but are often resolved once wait() is called by the parent

Explanation

Question 200 of 200

1

Fill the blank spaces to complete the text.

If a parent terminates before a child, it can not call wait(), so the child process becomes and . Linux and Unix solve this problem by assigning to be the new parent of a child process whose parent prematurely terminates.

Explanation