Chap 1 - Short Answer, Chap 1 - Multiple Choice, Chap 2- Multiple Choice, Chap 2 - Short Answers, Chap 3 - Multiple Choice, Chap 3 - Short Answers, Chap 4 - Multiple Choice, Chap 4 - Short Anser, Chap 5 - Multiple Choice, Chap 5 - Short Answers, Chap...

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

A _________ is a single execution path with an execution stack, processor state, and scheduling information. A) domain B) strand C) thread D) message

Thread

A __________ is a dispatchable unit of work that executes sequentially and is interruptible so that the processor can turn to another thread. A) port B) process C) token D) thread

Thread

A ________ is a user-created unit of execution within a process. A) Kernel B) KLT C) lightweight process D) ULT

ULT

A user program executes in a __________ , in which certain areas of memory are protected from the user's use, and in which certain instructions may not be executed. A) kernel mode B) user mode C) task mode D) batch mode

User mode

The __________ contains the data to be written into memory and receives the data read from memory. A) I/O address register B) memory address register C) I/O buffer register D) memory buffer register

memory buffer register

The invention of the _________ was the hardware revolution that brought about desktop and handheld computing.

microprocessor

A __________ is a legitimate user who accesses data, programs, or resources for which such access is not authorized, or who is authorized for such access but misuses his or her privileges.

misfeasor

The central idea behind the simple batch-processing scheme is the use of a piece of software known as the _________ .

monitor

A __________ computer combines two or more processors on a single piece of silicon.

multicore

The concept of multiple programs taking turns in execution is known as __________.

multiprogramming

__________ is a technique in which a process, executing an application, is divided into threads that can run concurrently.

multithreading

Registers that are used by system programs to minimize main memory references by optimizing register use are called __________ .

user-visible registers

A total of _________ process states are recognized by the UNIX SVR4 operating system. A) 3 B) 9 C) 21 D) 15

9

In a multithreaded environment, a __________ is defined as the unit of resource allocation and a unit of protection. A) strand B) process C) string D) trace

Process

A process is in the _________ state when it is in main memory and awaiting an event. A) Blocked B) Blocked/Suspend C) Ready/Suspend D) Ready

Blocked

A process is in the _________ state when it is in secondary memory and awaiting an event.

Blocked/Suspend

__________ is concerned with the proper verification of the identity of users and the validity of messages or data. A) Availability B) Confidentiality C) Authenticity D) Data integrity

Authenticity

The principal objective of __________ is to maximize processor use.

Batch Multiprogramming

Small, fast memory located between the processor and main memory is called: A) Block memory B) Cache memory C) Direct memory D) WORM memory

Cache memory

One of the first time-sharing operating systems to be developed was the __________ . A) Compatible Time-Sharing System B) Real Time Transaction System C) Multiple-Access System D) Multiprogramming Operation System

Compatible Time-Sharing System

A(n) __________ is a set of resources for the movement, storage, and processing of data and for the control of these functions. A) architecture B) program C) computer D) application

Computer

Security and protection as it relates to operating systems is grouped into four categories: Availability, Data integrity, Authenticity, and __________ .

Confidentiality

__________ is more efficient than interrupt-driven or programmed I/O for a multiple-word I/O transfer. A) Spatial locality B) Direct memory access C) Stack access D) Temporal locality

Direct memory access

The key to the success of Linux has been its character as a free software package available under the auspice of the ___________ . A) World Wide Web Consortium B) Free Software Foundation C) Berkeley Software Distribution D) GNU Public License

Free Software Foundation

The __________ is the interface that is the boundary between hardware and software. A) ABI B) ISA C) IAS D) API

ISA

Hardware features desirable in a batch-processing operating system include memory protection, timer, privileged instructions, and __________ . A) clock cycles B) associated data C) interrupts D) kernels

Interrupts

A __________ is an entity corresponding to a user job or application that owns resources such as memory and open files. A) task B) process C) thread D) token

Process

A special type of programming language used to provide instructions to the monitor is __________ . A) FPL B) JCL C) DML D) SML

JCL

The principal disadvantage of the _________ approach is that the transfer of control from one thread to another within the same process requires a mode switch to the kernel. A) KLT B) LWP C) VAX D) ULT

KLT

_________ tables are used to keep track of both main (real) and secondary (virtual) memory.

Memory

__________ are characterized by the presence of many single-threaded processes. A) Multiprocess applications B) Java applications C) Multiinstance applications D) Multithreaded native applications

Multiprocess applications

__________ was designed to keep the processor and I/O devices, including storage devices, simultaneously busy to achieve maximum efficiency.

Multiprogramming

The __________ is a layer of software between the applications and the computer hardware that supports applications and utilities.

Operating System (OS)

The four main structural elements of a computer system are: A) Processor, Main Memory, I/O Modules and System Bus B) Processor, I/O Modules, System Bus and Secondary Memory C) Processor, Registers, Main Memory and System Bus D) Processor, Registers, I/O Modules and Main Memory

Processor, Main Memory, I/O Modules and System Bus

The __________ holds the address of the next instruction to be fetched. A) Accumulator (AC) B) Instruction Register (IR) C) Instruction Counter (IC) D) Program Counter (PC)

Program Counter (PC)

__________ is where the OS must prevent independent processes from interfering with each other's memory, both data and instructions. A) Support of modular programming B) Process isolation C) Automatic allocation and management D) Protection and access control

Protection and access control

The __________ is a point-to-point link electrical interconnect specification that enables high-speed communications among connected processor chips. A) QPI B) DDR3 C) LRUA D) ISR

QPI

A process in the _________ state is in main memory and available for execution.

Ready

When a process is in the _________ state it is in secondary memory but is available for execution as soon as it is loaded into main memory. A) Blocked B) Blocked/Suspend C) Ready D) Ready/Suspend

Ready/Suspend

_________ is a good example of an OS using a combined ULT/KLT approach. A) TRIX B) Windows C) LINUX D) Solaris

Solaris

The idea of having a many-to-many relationship between threads and processes has been explored in the experimental operating system _________ . A) VISTA B) TRIX C) SOLARIS D) LEOPARD

TRIX

In a uniprocessor system, multiprogramming increases processor efficiency by: A) Taking advantage of time wasted by long wait interrupt handling B) Disabling all interrupts except those of highest priority C) Eliminating all idle processor cycles D) Increasing processor speed

Taking advantage of time wasted by long wait interrupt handling

The two basic types of processor registers are: A) User-visible and user-invisible registers B) Control and user-invisible registers C) Control and Status registers D) User-visible and Control/Status registers

User-visible and Control/Status registers

___________ is a facility that allows programs to address memory from a logical point of view, without regard to the amount of main memory physically available.

Virtual memory

The operating system's __________ refers to its inherent flexibility in permitting functional modifications to the system without interfering with service. A) efficiency B) ability to evolve C) controlled access D) convenience

ability to evolve

A _________ is an individual who is not authorized to use the computer and who penetrates a system's access controls to exploit a legitimate user's account.

masquerader

An IDS comprises three logical components: sensors, __________, and user interface.

analyzers

The processing required for a single instruction is called a(n) __________ cycle.

instruction

The fetched instruction is loaded into the __________ .

instruction register

When an external device becomes ready to be serviced by the processor the device sends a(n) _________ signal to the processor. A) access B) halt C) handler D) interrupt

interrupt

The ___________ routine determines the nature of the interrupt and performs whatever actions are needed. A) interrupt handler B) instruction signal C) program handler D) interrupt signal

interrupt handler

Each location in Main Memory contains a _________ value that can be interpreted as either an instruction or data.

binary number

When an external device is ready to accept more data from the processor, the I/O module for that external device sends an __________ signal to the processor.

interrupt request

System access threats fall into two general categories: __________ and malicious software.

intruders

The OS has five principal storage management responsibilities: process isolation, automatic allocation and management, support of modular programming, protection and access control, and __________ .

long-term storage

When a new block of data is read into the cache the __________ determines which cache location the block will occupy.

mapping function

The unit of data exchanged between cache and main memory is __________ . A) block size B) map size C) cache size D) slot size

block size

The __________ is a device for staging the movement of data between main memory and processor registers to improve performance and is not usually visible to the programmer or processor.

cache

When one process spawns another, the spawned process is referred to as the __________ . A) trap process B) child process C) stack process D) parent process

child process

A _________ is an individual who seizes supervisory control of the system and uses this control to evade auditing and access controls or to suppress audit collection. A) misfeasor B) clandestine user C) masquerader D) legitimate user

clandestine user

The portion of the operating system that selects the next process to run is called the _________ . A) trace B) process control block C) dispatcher D) PSW

dispatcher

Any resource allocation and scheduling policy must consider three factors: Fairness, Differential responsiveness, and __________ .

efficiency

The __________ is the internal data by which the OS is able to supervise and control the process. A) executable program B) associated data C) nucleus D) execution context

execution context

Instruction processing consists of two steps: A) fetch and execute B) instruction and execute C) instruction and halt D) fetch and instruction

fetch and execute

The _________ tables provide information about the existence of files, their location on secondary memory, their current status, and other attributes.

file

Operating systems must evolve over time because: A) new hardware is designed and implemented in the computer system B) hardware must be replaced when it fails C) hardware is hierarchical D) users will only purchase software that has a current copyright date

new hardware is designed and implemented in the computer system

An __________ is a program that controls the execution of application programs and acts as an interface between applications and the computer hardware.

operating system

It is the principal responsibility of the __________ to control the execution of processes. A) OS B) process control block C) memory D) dispatcher

os

One mechanism Intel uses to make its caches more effective is __________ , in which the hardware examines memory access patterns and attempts to fill the caches speculatively with data that is likely to be requested soon. A) mapping B) handling C) interconnecting D) prefetching

prefetching

A __________ is a unit of activity characterized by the execution of a sequence of instructions, a current state, and an associated set of system resources. A) identifier B) process C) state D) kernel

process

The OS must maintain __________ tables to manage processes. A) process B) I/O C) memory D) file

process

A significant point about the __________ is that it contains sufficient information so that it is possible to interrupt a running process and later resume execution as if the interruption had not occurred.

process control block

The collection of program, data, stack, and attributes is referred to as the _________ . A) process structure B) process control block C) process location D) process image

process image

When the OS creates a process at the explicit request of another process, the action is referred to as __________ .

process spawning

The process control block information can be grouped into three general categories: process identification, __________ and process control information.

processor state information

Two essential elements of a process are __________ and a set of data associated with that code.

program code

A Control/Status register that contains the address of the next instruction to be fetched is called the _________.

program counter

The _________ is the less-privileged mode. A) user mode B) kernel mode C) system mode D) control mode

user mode

Three major lines of computer system development created problems in timing and synchronization that contributed to the development of the concept of the process: multiprogramming batch operation, time sharing, and __________ .

real-time transaction systems

The _________ chooses which block to replace when a new block is to be loaded into the cache and the cache already has all slots filled with other blocks. A) memory controller B) mapping function C) write policy D) replacement algorithm

replacement algorithm

The portion of the monitor that is always in main memory and available for execution is referred to as the _________ .

resident monitor

A common strategy to give each process in the queue some time in turn is referred to as a __________ technique. A) multithreading B) round-robin C) time slicing D) serial processing

round-robin

The process is said to be operating in a _________ fashion if each process in the queue is given a certain amount of time, in turn, to execute and then returned to the queue, unless blocked.

round-robin

External, nonvolatile memory is also referred to as __________ or auxiliary memory.

secondary memory

The earliest computers employed __________ processing, a name derived by the way the users have access to the systems.

serial

Two major problems with early serial processing systems were scheduling and __________ .

setup time

The traditional approach of a single thread of execution per process, in which the concept of a thread is not recognized, is referred to as a __________ . A) task B) resource C) single-threaded approach D) lightweight process

single-threaded approach

The processor itself provides only limited support for multiprogramming, and __________ is needed to manage the sharing of the processor and other resources by multiple applications at the same time. A) memory B) data C) software D) hardware

software

A special type of address register required by a system that implements user visible stack addressing is called a __________

stack pointer

"The process was placed in a suspended state by an agent; either itself, a parent process, or the OS, for the purpose of preventing its execution," is a characteristic of a _________ process. A) blocked B) suspended C) ready D) swapped

suspended

__________ involves moving part or all of a process from main memory to disk. A) Swapping B) Relocating C) Suspending D) Blocking

swapping

In a _________ multiprocessor all processors can perform the same functions so the failure of a single processor does not halt the machine.

symmetric

A __________ organization has a number of potential advantages over a uniprocessor organization including performance, availability, incremental growth, and scaling. A) temporal locality B) symmetric multiprocessor C) direct memory access D) processor status word

symmetric multiprocessor

To satisfy the requirements of handheld devices, the classic microprocessor is giving way to the _________ , where not just the CPUs and caches are on the same chip, but also many of the other components of the system, such as DSPs, GPUs, I/O devices and main memory.

system on a chip

In a time-sharing, multiprogramming system, multiple users simultaneously access the system through __________ .

terminals

A __________ is the maximum amount of time that a process can execute before being interrupted.

time slice

The technique where a system clock generates interrupts, and at each clock interrupt the OS regains control and assigns the processor to another user, is __________ . A) time slicing B) multithreading C) round robin D) clock cycle

time slicing

A __________ is set at the beginning of each job to prevent any single job from monopolizing the system.

timer

We can characterize the behavior of an individual process by listing the sequence of instructions, referred to as a __________, that executes for that process. A) state B) trace C) process block D) priority

trace

Multiprogramming operating systems are fairly sophisticated compared to single-program or _________ systems. A) uniprogramming B) time-sharing C) multitasking D) memory management

uniprogramming


Kaugnay na mga set ng pag-aaral

Estar with conditions and emotions

View Set

Cardiovascular Lab Exam 1 (Blood Cells, Blood Testing)

View Set

Терапевтична стоматологія

View Set

Cambridge B2 Word formation verb to noun

View Set

Chapter 11: Monopoly & Antitrust Policy

View Set

Stress Management Chapter 4 Quiz

View Set