1215

¡Supera tus tareas y exámenes ahora con Quizwiz!

Linux provides the foundation for the ____ operating system.

Android

In the OSI transport protocol model, Layer Seven, the ____ layer, provides the interface to users and is responsible for formatting user data before passing it to lower layers for transmission to a remote host.

Application

In Linux, the ____ log file stores messages of which systems have successfully started up and shut down, as well as any that have failed to do so.

Boot.log

When using a ring topology, a ____ can be used to connect to another network that uses the same protocol.

Bridge

In the ____ topology, all sites are connected to a single communication line running the length of the network.

Bus

Carrier sense multiple access (CSMA) is a ____-based access protocol.

Contention

By default, a Windows process contains one thread with four components: a unique identifier, the contents of a volatile set of registers indicating state, two stacks used in the thread's execution, and a private storage area used by subsystems and libraries. These components are called the thread's ____.

Context

The Windows Task Manager can be opened by pressing and holding the ____ keys together.

Ctrl, Alt, and Delete

Active Directory groups machines into administrative units called ____.

Domains

The ____ paging policy determines when the pager copies a page from disk to memory.

Fetch

Usually, the term "_____" indicates a specific computer system whose service and resources can be used from remote locations.

Host

The ____ creates a driver object when a driver is loaded into the system and then calls the driver's initialization routine.

I/O Manager

An ____ is a data structure that controls how the I/O operation is processed at each step.

IRP

The UNIX file management system organizes the disk into blocks of 512 bytes each and divides the disk into four basic regions, the first of which ____.

Is reserved for booting

In Windows terminology, the privileged processor mode is called ____ mode and the nonprivileged processor mode is called user mode.

Kernel

UNIX uses the ____ page replacement algorithm.

Least Recently Used

An API called ____ is used to pass I/O requests structured in the SMB format to a remote computer.

NetBIOS

The command ____ is used to lower the priority of a process.

Nice

A file containing data or programs belonging to users is known as a(n) ____.

Ordinary File

Linux provides semaphores to help solve the problems of mutual exclusion and of producers and consumers. The Linux semaphore structure contains ____ fields.

Three

The geometric arrangement of connections that link the nodes in a networked system is called "_____"

Topology

Which characteristic is true of packet switching?

Transmits in batches

In UNIX, swapping uses a round robin memory-management policy.

True

In recent Windows operating systems, almost all low-level I/O operations are asynchronous.

True

Multithreading improves database searches because data is retrieved faster when the system has several threads of execution searching an array simultaneously, especially if each thread has its own CPU.

True

The exec family of commands—execl, execv, execle, execlp and execvp—is used to start execution of a new program from another program.

True

To ensure the integrity of the Windows operating system code, the designers separated operating system functions into a privileged executive process and a set of nonprivileged processes called protected subsystems.

True

When using the routing information protocol (RIP) to transfer data from one network to another, the path ____ is chosen.

with the smallest number of hops

To change to a directory that is up one level from the current working directory in the UNIX hierarchical directory tree structure, you can type ____.

..

Under Linux filename conventions, the ____ represents the root directory.

/

The maximum number of bytes that can be allocated to a single file in UNIX is ____.

1,082,201,088

The maximum circumference for a MAN is ____.

100 Kilometers

When was the first version of UNIX written?

1969

____ is an example of a circuit-switched network.

A Telephone System

When deciding which network topology configuration to use, designers should keep in mind four criteria: ____.

Basic Cost, Communication Cost, Reliability, User's environment.

In Linux, up to a total of 256MB of usable memory can be configured into equal-sized page frames, which can be grouped to give more contiguous space to a job. These groups can also be split to accommodate smaller jobs. The process of grouping and splitting usable memory is known as the ____.

Buddy Algorithm

The Linux page replacement algorithm is an expanded version of the ____ replacement policy.

Clock Page

In the ____ path-selection approach, the destination and sequence number of a packet are added to the information uniquely identifying the message to which the packet belongs; each packet is then handled independently and a route is selected as each packet is accepted into the network.

Datagram

Subroutines that work with the operating system to supervise the transmission of data between main memory and a peripheral unit are called ____.

Device Drivers

In a Windows device driver, the ____ is used by the I/O Manager to communicate with the driver when it generates an IRP after an I/O request.

Dispatch Routine

When opening a file in Windows, the creation of ____ helps bridge the gap between the characteristics of physical devices and directory and file system structures by providing a memory-based representation of shareable physical resources.

File Objects

The ____ attribute indicates whether to delete a file after closing it.

File disposition

When a process begins execution, its segments have a ____ size.

Fixed

The TCP/IP reference model has ____ layers that roughly correlate to the OSI's seven layers

Four

Because Linux is written and distributed under the ____ General Public License, its source code is freely distributed and available to the general public.

GNU

A ____ is a device and software used to connect two or more local area networks or systems that use different protocols; it translates one network's protocol into another, resolving hardware and software incompatibilities.

Gateway

The command ____ is used to find a specified string of characters in a file.

Grep

The ___, which makes technical recommendations about data communication interfaces, took on the task of creating a universal network architecture, resulting in the OSI Reference Model.

International Organization for Standardization

____ management is designed to replace or change parts of the operating system that need to be enhanced or replaced.

Patch

A ____ is several programs simultaneously processing the same I/O stream.

Pipeline

The ____ command is used to delete a file or directory.

RM

A ____ may occur if an event happens during the process's transition between deciding to wait for the event and entering the WAIT state.

Race

A terminal has two input queues. As a user types each character to the terminal, it is collected in the ____ queue.

Raw

A local area network (LAN) is generally owned, used, and operated by a single organization and allows computers to communicate directly through a common communication line.

True

A replacement paging policy determines which virtual page must be removed from memory to make room for a new page.

True

A strength of UNIX is its true multitasking capabilities.

True

All Linux files are organized in directories that are connected to each other in a tree-like structure.

True

Before the 1995 release of the Windows 95 operating system, all Windows products were merely graphical user interfaces that required the MS-DOS operating system to perform tasks.

True

Bridging between two homogeneous networks occurs at Layer 2 of the OSI transport protocol model, the data link layer.

True

UNIX and Linux strongly resemble each other in many ways but are different operating systems.

True

In UNIX, a ____ table is allocated to each active process that includes information such as the user and group identification numbers to determine file access privileges.

User

When processing a typical remote I/O request, which of the following happens first?

User-Mode software issues a remote I/O request

When physical memory becomes full, the ____ Memory Manager pages some of the memory contents to disk, freeing physical memory for other processes.

Virtual

Linux provides ____ queues and semaphores to allow two processes to synchronize with each other.

Wait

The ____ command allows the programmer to synchronize process execution by suspending the parent until the child is finished.

Wait

There is no return from a successful ____ call.

exec

To accommodate the various needs of its user community, and to optimize resources, the Windows team identified the following design goals:____.

extensibility, portability, reliability, compatibility, and performance

Under the Domain Name Service (DNS) protocol, in the address [email protected], the host name is ____.

name1

The following command ____ will store the names of all users logged on to the system in the file called temporary.

who > temporary

UNIX uses a ____ to keep track of which processes are using shared program code.

Text Table

A driver object can only have one device connected to it.

False

A group known as Redhat Software has responsibility for the open-source development of the Linux kernel.

False

Addressing protocols are normally unrelated to the network topology and geographic location of each site.

False

In Linux, each process is referenced by a descriptor, which contains approximately fifteen fields describing the process attributes together with the information needed to manage the process.

False

In the virtual circuit approach to data transmission, the destination and packet sequence number are added to the information identifying the packet's message.

False

Linux was developed by Dennis Ritchie, who wanted to create an operating system to maximize the limited capabilities of the Intel 80386 microprocessor.

False

The UNIX process scheduling algorithm picks the process that will run in the shortest amount of time to be run first.

False

The tree topology is a collection of rings.

False

In Linux device management, the ____ device number is used as an index to the array to access the appropriate code for a specific device driver.

Major

____ files exploit virtual memory capabilities by allowing an application to open a file of arbitrary size and treat it as a single contiguous array of memory locations without buffering data or performing disk I/O.

Memory-Mapped

The ____ file system can recover from all types of errors including those that occur in critical disk sectors.

NTFS

If a program's execution is expected to take a long time, you can start its execution and then log off the system without having to wait for it to finish by using the command ____.

Nohup

In Linux, the three levels of file access are ____, ____, and ____.

Owner; group; others

A ____ includes information technology that operates within a radius of approximately 10 meters of an individual and is centered around that one person

PAN

Linux terminal management conforms to ____ standards, and it also supports pseudo-terminals.

POSIX

____ is a family of IEEE standards that define a portable operating system interface to enhance the portability of programs from one operating system to another

POSIX

In the distributed-queue, dual bus (DQDB) protocol, a node can use Bus 2 to send a ____ to its upstream neighbors.

Reservation

The portion of memory that is used for sections of the kernel that require maximum performance is the ____.

Resident Operating System Code

Linux updates are issued free to the public about every ____ months.

Six

____ are the device drivers that provide the interface to I/O hardware.

Special Files

In the ____ topology configuration, hosts are connected to each other through a central controller which assumes all responsibility for routing messages to the appropriate host.

Star

The ____ device used in Linux memory management can be a partition on the disk or it can be a normal file.

Swap

For multiprogramming systems, most UNIX operating systems use either ____ management techniques.

Swapping or demand paging memory

Administrators use ____ logs that provide a detailed description of activity on the system.

System

The primary programming interface for Windows is ____.

Win32 API

Which of the following Windows operating systems integrates cloud environments and distributed access?

Windows Server 2012

When the UNIX Processor Manager is deciding which process from the READY queue will be loaded into memory to be run first, it chooses the process ____.

With the longest time spent on the secondary stage.

The command, ____ , will copy the contents of chapt1 and chapt2 into a file named section_a.

cat chapt1 chapt2 > section_a

In Linux, ____ devices cannot host a file system.

char

The three standard classes of devices supported by Linux are ____.

character devices, block devices, and network devices


Conjuntos de estudio relacionados

PATHO CH 13 Structure and Function of the Neurologic System

View Set