Chap 2- Multiple Choice
__________ is concerned with the proper verification of the identity of users and the validity of messages or data. A) Availability B) Confidentiality C) Authenticity D) Data integrity
Authenticity
One of the first time-sharing operating systems to be developed was the __________ . A) Compatible Time-Sharing System B) Real Time Transaction System C) Multiple-Access System D) Multiprogramming Operation System
Compatible Time-Sharing System
A(n) __________ is a set of resources for the movement, storage, and processing of data and for the control of these functions. A) architecture B) program C) computer D) application
Computer
The key to the success of Linux has been its character as a free software package available under the auspice of the ___________ . A) World Wide Web Consortium B) Free Software Foundation C) Berkeley Software Distribution D) GNU Public License
Free Software Foundation
The __________ is the interface that is the boundary between hardware and software. A) ABI B) ISA C) IAS D) API
ISA
Hardware features desirable in a batch-processing operating system include memory protection, timer, privileged instructions, and __________ . A) clock cycles B) associated data C) interrupts D) kernels
Interrupts
A special type of programming language used to provide instructions to the monitor is __________ . A) FPL B) JCL C) DML D) SML
JCL
__________ is where the OS must prevent independent processes from interfering with each other's memory, both data and instructions. A) Support of modular programming B) Process isolation C) Automatic allocation and management D) Protection and access control
Protection and access control
A user program executes in a __________ , in which certain areas of memory are protected from the user's use, and in which certain instructions may not be executed. A) kernel mode B) user mode C) task mode D) batch mode
User mode
The operating system's __________ refers to its inherent flexibility in permitting functional modifications to the system without interfering with service. A) efficiency B) ability to evolve C) controlled access D) convenience
ability to evolve
The __________ is the internal data by which the OS is able to supervise and control the process. A) executable program B) associated data C) nucleus D) execution context
execution context
Operating systems must evolve over time because: A) new hardware is designed and implemented in the computer system B) hardware must be replaced when it fails C) hardware is hierarchical D) users will only purchase software that has a current copyright date
new hardware is designed and implemented in the computer system
A common strategy to give each process in the queue some time in turn is referred to as a __________ technique. A) multithreading B) round-robin C) time slicing D) serial processing
round-robin
The technique where a system clock generates interrupts, and at each clock interrupt the OS regains control and assigns the processor to another user, is __________ . A) time slicing B) multithreading C) round robin D) clock cycle
time slicing
Multiprogramming operating systems are fairly sophisticated compared to single-program or _________ systems. A) uniprogramming B) time-sharing C) multitasking D) memory management
uniprogramming