Operating Systems Final (Multiple Choice Questions)

¡Supera tus tareas y exámenes ahora con Quizwiz!

___ is a symmetric block encryption algorithm

AES

___ is/are not a technique for passing parameters from an application to a system call.

Cache memory

Which of the following would be an acceptable signal handling scheme for a multi-threaded program?

Deliver the signal to the thread to which the signal applies. Deliver the signal to every thread in the process. Deliver the signal to only certain threads in the process. (Its all the above)

Policy ___.

Determines what will be done

Which of the following would lead you to believe that a given system is an SMP type system?

Each processor can perform all tasks within the operating system.

Which of the following scheduling algorithms is always non-preemptive?

FCFS

What is the purpose of the mutex semaphore in the implementation of the bounded-buffer problem using semaphores?

It ensures mutual exclusion to the shared buffer pool.

A calling java thread becomes the owner of a lock when ___.

It enters a synchronized method.

On time slicing systems, a runnable Java thread will continue executing until which of the following events occurs?

Its time quantum expires, its exits its run() method, or it blocks for I/O (Any events A through C.)

Suppose a process using semaphores does a release() operation before executing its critical section and an acquire() operation afterward, instead of the other way around. What may happen due to this error?

Multiple processes could be in their critical sections simultaneously

___ is a symmetric stream block encryption algorithm

RC4

___ scheduling is approximated by predicting the next CPU burst with an exponential average of the measured lengths of previous CPU bursts.

SJF

___ is a technique for managing bad blocks that maps a bad sector to a spare sector.

Sector sparing

___ provide(s) an interface to the services by an operating system.

System calls

___ occurs when a process spends more time paging than executing.

Thrashing

A code segment that misuses its environment is called a ___.

Trojan horse

To the SYSGEN program of an operating system, the least useful piece of information is ___.

What applications to install

Which of the following is true of the Java programming language in relation to protection?

When a class is loaded, the JVM assigns the class to a protection domain that gives the permissions of that class.

___ is the dynamic storage-allocation algorithm which results in the largest leftover hole in memory.

Worst fit

In a system resource-allocation graph, ___.

a directed edge from a process to a resource is called a request edge

A(n) ___ matches the process with each entry in the TLB.

address-space identifier

A denial of service attack is ___.

aimed at disrupting legitimate use of a system

An instruction that executes atomically ___.

all of the above (must consist of only one machine instruction, executes as a single, uninterruptible unit, cannot be used to solve the critical section problem)

A solution to the critical section problem does not have to satisfy which of the following requirements?

atomicity

Transfers between memory and disk are performed a ___.

block at a time

A ___ saves the state of the currently running process and restores the state of the next process to run.

context switch

Which of the following allocation methods ensures that only one access is needed to get a disk block using direct access?

contiguous allocation

Worms ___.

continue to grow as the internet expands.

In an access matrix, the ___ right allows a process to change the entries in a row.

control

The ___ occurs in first come first served scheduling when a process with a long CPU burst occupies the CPU.

convoy effect

A(n) ___ refers to where a process is accessing/uipdating shared data.

critical section

In Linux and other UNIX-based operating systems, which of the following is not considered a classification of users in connection with each file?

current user

A ___ is a public key digitally signed by a trusted party.

digital certificate

A(n) ___ is a custom build of the Linux operating system.

distribution

A deadlocked state occurs whenever ___.

every process in a set is waiting for an event that can only be caused by another process in the set

A(n) ___ is used in many file systems at the end of a file name to indicate the type of the file.

extension

Belady's anomaly is the observation that ___.

for some PRAs, the page-fault may increase as number of allocated frames increases.

The Windows CreateProcess() system call creates a new process. What is the equivalent system call in UNIX?

fork()

The ___ implementation of an access table consists of sets of ordered triples.

global table

One necessary condition for deadlock is ___, which states that a process must be holding one resource and waiting to acquire additional resources.

hold and wait

The most common technique for writing multithreaded Java programs is _____.

implementing the Runnable interface and defining its run() method

A process control block ___.

includes information on the process's state

A(n) ___ page table has on page entry for each physical frame of memory.

inverted

Thread specific data is data that ___.

is copied and not shared with the parent process

Optimal page replacement ___.

is used mostly for comparison with other page-replacement schemes

A spinlock ___.

is useful when locks are expected to be held for a short amount of time

Which of the following is the simplest method for implementing a directory?

linear list

The file-allocation table (FAT) used in MS-DOS is a modified version of ___.

linked allocation

An address generated by a CPU is referred to as a ___.

logical address

The ___ multithreading model multiplexes a number of user level threads to a lesser or equal number of kernel threads.

many to many

LWP is ___.

placed between user and kernel threads

To handle deadlocks, operating systems most often ___.

pretend that deadlocks never occur

Embedded computers typically run a ___ operating system.

real-time

A race condition ___.

results when several threads try to access and modify the same data concurrently

What are the two largest components of positioning time for a disk?

seek time + rotational latency

A(n) ____ is a buffer that holds output for a device that cannot accept interleaved data streams.

spool

In a paired-password system, ___.

the computer supplies one part of a password and the user enters the other part

In an environment where several processes may open the same file at the same time, ___

the operating system typically uses two internal tables called the system-wide and per disk tables to keep track of open files

A ___ uses an existing thread --- rather than creating a new one --- to complete a task.

thread pool

The default scheduling class for a process in Solaris is ___.

time sharing

In the UNIX operating system, a domain is associated with the ___.

user-id

A disk with free blocks 0, 1, 5, 9, 15 would be represented with what bit map?

1100010001000001

Consider a logical address with a page size of 32 KB. How many bits must be used to represent the page offset in the logical address?

15

Suppose a program is operating with execution-time binding and the physical address generated is 600. The relocation register is set to 250. What is the corresponding logical address?

350


Conjuntos de estudio relacionados

Managerial Accounting Chapter 2 Assignment

View Set

Discovering the Internet Chapter 1 (Into the Internet) Key Terms

View Set

AP Classroom: Unit 3 Progress Check - AP Chemistry

View Set

Test: A Revolution and Two World Wars

View Set

MATH-164 - Chapter 1 - 4 Review - Exam 1

View Set