CITC1332-01 Final
If a collision occurs when using CSMA/CD, a jamming signal is sent immediately to both sending nodes, which then wait ____ before trying again.
A random period
The primary advantage of storing programs in noncontiguous locations is that ____.
Main memory is used more efficiently
____ published a visual tool to show how deadlock conditions can be modeled using directed graphs.
Holt
The ____ multiprocessing configuration is the most difficult to implement because the processes must be well synchronized to avoid races and deadlocks.
Symmetric
In the ____ path-selection approach, the destination and sequence number of a packet are added to the information uniquely identifying the message to which the packet belongs; each packet is then handled independently and a route is selected as each packet is accepted into the network.
datagram
The release of memory space by the Memory Manager is called ____.
deallocation
The release of memory space by the Memory Manager is called ____
deallocation or defragmentation
The overall responsibility of keeping an organization's software up to date ____.
depends upon the organization
The ___, which makes technical recommendations about data communication interfaces, took on the task of creating a universal network architecture, resulting in the OSI Reference Model.
International Organization for Standardization
Name the selection function for the SJF algorithm or describe what it attempts to do.
It always trys to compute the smallest job first
Name the selection function for the FIFO algorithm or describe what it attempts to do.
The first memory block the job will fit in, that's where it goes.
The Printer Event 1 P1 requests and is allocated the printer R1. 2 P1 releases the printer R1. 3 P2 requests and is allocated the disk drive R2. 4 P2 releases the disk R2. 5 P3 requests and is allocated the plotter R3. 6 P3 releases the plotter R3. Assume that the events in the accompanying narrative take place. Which of the following statements is true?
There is no deadlock
In demand paging, when an excessive number of pages are moved back and forth between main memory and secondary storage, it is called ____.
Thrashing
Name the two types of control blocks..
Thread control blocks, Process control blocks
____ semaphores are used in the solution to the readers and writers problem that does not involve starvation.
Two
The TCP/IP reference model has ____ layers that roughly correlate to the OSI's seven layers.
four
The command ____ is used to find a specified string of characters in a file.
grep
What strategy contributes most to system recovery?
integrity checking
The phenomenon of less-than-complete use of memory space in a fixed partition is called ____
internal fragmentation
The biggest limitation of a network operating system (NOS) is ____ in terms of memory, process, device, and file management.
lack of global control
In a paged memory allocation scheme, the ____ contains two values for each active job: the size of the job and the memory location where its Page Map Table is stored.
Job Table
The name for the core portion of an operating system is the ____. (NEW TEST)
Kernel
What configuration has the highest level of risk?
LAN with internet
The ____ multiprocessing configuration features several complete computer systems, each with its own memory, I/O devices, CPU, and operating system
loosely coupled
Lock and key synchronization must take place within a single ____.
machine cycle
____ storage allocation allows files to use any storage space available on the disk.
noncontiguous
On an optical disc, all sectors are ____.
of the same size throughout the disc
One approach to performing compaction is to do it when a certain ____ of memory becomes busy.
percentage
Failure to lock database records before updating them may result in a ____ between processes.
race
In ____ systems, deadlocks can cause critical situations.
real-time
A(n) ____ filename is the name that differentiates a file from other files in the same directory.
relative
A UNIX or Linux system might identify a file as: /usr/imfst/flynn/inventory.doc. The first entry is a forward slash ( / ) representing the master directory, called the ____ directory.
root
Deployment software falls into two groups: ____ software.
agent-based and agentless
The computer system ____ a file by activating the appropriate secondary storage device and loading the file into memory while updating its records of who is using that file.
allocates
The goal of the ____ memory allocation algorithm is to find the smallest memory block into which a job will run.
Best-Fit
____ means that several logical records are grouped within one physical record.
Blocking
A hybrid system is a combination of ____ systems
batch and interactive
The goal of the ____ memory allocation algorithm is to find the smallest memory block into which a job will fit.
best-fit
In the ____ topology, all sites are connected to a single communication line running the length of the network
bus
Carrier sense multiple access (CSMA) is a ____-based access protocol.
contention
Starting in the 1950s, to reduce the discrepancy in speed between the I/O and the CPU, an interface called the ____ was placed between them to act as a buffer.
control unit
With ____ operating systems, users can think they are working with a system using one processor, when in fact they are connected to a cluster of many processors working closely together.
Distrubuted Operating Systems
The ____ file function causes the DO/S File Manager to use a master directory with information about all files stored anywhere on the system and set up a channel to the file.
Find and Open
The ____ method keeps the free/busy lists organized by memory locations, from low-order memory to high-order memory.
First-fit
The formula used to calculate a unit's availability is ____.
MTBF/(MTBF+MTTR)
____ is where the data and instructions of a computer must reside to be processed.
Main Memory
Name the two types of real-time systems. They are dependent on the consequences of missing the deadline
Hard real-time, soft real-time
Consider the case of a home construction company with two application programs, purchasing (P1) and sales (P2), which are active at the same time. They each need to access two files, inventory (F1) and suppliers (F2), to update daily transactions. The following series of events will cause a deadlock. Fill in the missing event in the sequence. 1. Purchasing (P1) accesses the supplier file (F2). 2. Sales (P2) accesses the inventory file (F1). 3. Purchasing (P1) doesn't release the supplier file (F2) and requests the inventory file (F1), but P1 is blocked because F1 is being held by P2. 4. Meanwhile, ____
sales (P2) doesn't release the inventory file (F1) but requests the supplier file (F2)
Cache memory is divided into blocks of equal size called ____.
slots
In demand paging, pages are ____ between main memory and secondary storage.
swapped
The capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents is known as ____.
system survivability
UNIX uses a ____ to keep track of which processes are using shared program code.
text table
To access a location in memory when using segmented memory management, the address is composed of two entries: ____.
the segment number and the displacement
The efficiency of a batch system is measured in ____, which is the number of jobs completed in a given amount of time.
throughput
In active multiprogramming, each program is allowed to use only a preset amount of CPU time before it is interrupted so another job can begin its execution. The interrupted job resumes execution at some later time. This idea is called
time slicing
A system with ____ divides programs into parts and keep them in secondary storage, bringing each part into memory only as it is needed.
virtual memory
____ allows separate partitions of a single server to support different operating systems.
virtualization
The ____ command allows the programmer to synchronize process execution by suspending the parent until the child is finished.
wait
When the UNIX Processor Manager is deciding which process from the READY queue will be loaded into memory to be run first, it chooses the process ____.
with the longest time spent on the secondary storage
The Process Scheduler assigns the CPU to execute the processes for those jobs placed on the ____ queue by the Job Scheduler.
READY
A ____ chip holds software that is used to start the computer
ROM or BIOS
The ____ uniquely identifies each resource, starts its operation,monitors its progress, and, finally, deallocates it, making the operating system available to the next waiting process.
Device manager
____ developed the Banker's Algorithm.
Dijkstra
The maximum circumference for a MAN is ____.
100 kilometers
In a relocatable dynamic partition scheme, the ____ ensures that, during execution, a program won't try to access memory locations that don't belong to it.
Bounds register
Each peripheral device has its own software, called a(n) ____, which contains the detailed instructions required to start that device, allocate it to a job, use the device correctly, and deallocate it when it's appropriate.
Device Driver
The ____ page replacement policy is based on the theory that the best page to remove is the one that has been in memory the longest.
FIFO
Name 5 of the 7 scheduling algorithms
FIFO, best-fit, round-robin, priority based, worst-fit
____ text compression builds on the previous data element. The first data element in a list is not compressed but each entry after that takes a given number of characters from the previous entry that they have in common and then adds the characters that make it unique.
Front-end
Each volume in a system has a volume descriptor followed by a ____ that lists the names and characteristics of every file contained in that volume.
Master file Directory
Consider the case of a home construction company with two application programs, purchasing (P1) and sales (P2), which are active at the same time. They each need to access two files, inventory (F1) and suppliers (F2), to update daily transactions. The following series of events will cause a deadlock. Fill in the missing event in the sequence. 1. Purchasing (P1) accesses the supplier file (F2). 2. Sales (P2) accesses the inventory file (F1). 3. ______________________________________ 4. Meanwhile, sales (P2) doesn't release the inventory file (F1) but requests the supplier file (F2)
Meanwhile, purchasing (P1) doesn't release the supplier file (F2) but requests the inventory file (F1)
Memory compaction is also referred to as ____.
Memory Deallocation
In the fixed-partition memory management scheme, the table that the Memory Manager uses to keep track of jobs is composed of the following four items
Memory partition index, job size, job status, pages
____ requires that the processor be allocated to each job or to each process for a period of time and deallocated at an appropriate moment.
Multiprogramming
When networked devices, such as printers, plotters, or disk drives are required, the ____ has the responsibility of allocating and deallocating the required resources correctly.
Network manager
By compacting and relocating, the Memory Manager optimizes the use of memory and thus improves throughput. However, it also requires more ____ than the other memory allocation schemes discussed in Chapter.2.
Overhead
The two operations defined by Dijkstra to be performed on a semaphore are ____.
P and V
Fill in the missing step in the following deadlock situation. Two users from the local board of education are each running a program (P1 and P2), and both programs will eventually need two DVD drives to copy files from one disc to another. Only two DVD-R drives are available and they're allocated on an "as requested" basis. Soon the following sequence transpires: ______________________________ 2. P2 requests drive 2 and gets it. 3. P1 requests drive 2 but is blocked. 4. P2 requests drive 1 but is blocked.
P1 requests drive 1 and gets it.
Main memory is also known as
RAM
In a network operating system (NOS), ____.
Resources are owned by local nodes
____ effectively removes restrictions on maximum program size.
Virtual Memory
A process-based DO/S must synchronize actions across the network. When a process reaches a point at which it needs service from an external source, such as an I/O request, it sends a message searching for the service. While it waits for a response, the processor server puts the process in a ____ state. Question 39 options:
WAIT
There is no return from a successful ____ call.
exec
____ consists of fragments of free memory between blocks of allocated memory.
external fragmentation
