CTI-130 OS Midterm
Many computer users and some operating systems call subdirectories ____. a. databases b. files c. folders d. volumes
c
Of the three components of access time in a movable-head DASD, ____ is the slowest. a. transfer time b. delay time c. seek time d. search time
c
Onboard systems are computers that are physically placed inside the products that they operate to add features and capabilities. True False
false
Direct access storage devices (DASDs) are devices that can directly read or write to an arbitrary place on a disk. True False
true
Web browsers use multithreading routinely. For example, one thread can retrieve images while another sends and retrieves e-mail. True False
true
The ____ uniquely identifies each resource, starts its operation,monitors its progress, and, finally, deallocates it, making the operating system available to the next waiting process. a. Memory Manager b. Keyboard Manager c. Device Manager d. File Manager
c
When data is stored in fixed length fields, data that extends beyond the fixed size ____. a. generates an operating system error b. is broken up and stored in more than one field c. is truncated d. combines multiple fields to accommodate the data
c
____ control the transfer of information between the disk drives and the rest of the computer system. a. Disk drive controllers b. System controllers c. Disk drive interfaces d. System interfaces
c
A dual-layer, single-sided DVD can hold the equivalent of ____ CDs. a. 3 b. 8 c. 13 d. 19
13
____ peripheral devices are assigned to only one job at a time. a. Static b. Dedicated c. Shared d. Virtual
b
____ time is the time required to move the arm of a movable-head magnetic drive into position over the proper track. a. Access b. Seek c. Transfer d. Search
b
____ uses the same underlying philosophy as shortest job next, where the shortest jobs are processed first and longer jobs are made to wait. a. FCFS b. SSTF c. LOOK d. SCAN
b
The Processor Manager is a composite of at least two submanagers: one in charge of job scheduling and the other in charge of program scheduling. True False
false
A processor is also known as a CPU. True False
true
Nested RAID levels, also called hybrid levels, are complex RAID configurations created by combining multiple standard levels. True False
true
Networking was not always an integral part of operating systems. True False
true
Operating systems with networking capability have a fifth essential manager called the Network Manager that provides a convenient way for authorized users to share resources. True False
true
RAID Level 0 is not considered a true form of RAID because it cannot recover from hardware failure. True False
true
Shortest job next (SJN) is a nonpreemptive scheduling algorithm (also known as shortest job first, or SJF) that handles jobs based on the length of their CPU cycle time. True False
true
The central processing unit (CPU) is the brains of the computer with the circuitry to control the interpretation and execution of instructions. True False
true
The operating system manages each and every piece of hardware and software. True False
true
The universal serial bus (USB) controller acts as an interface between the operating system, device drivers, applications, and the devices that are attached via the USB host. True False
true
There are many more sectors on an optical disc than on a magnetic disk of the same area. True False
true
There are two primary types of user interfaces: the graphical user interface and the command line interface. True False
true
A UNIX or Linux system might identify a file as:
usr/imfst/flynn/inventory.doc. The first entry is a forward slash ( / ) representing the master directory, called the ____ directory. a. working b. root c. main d. branch /b
____ is a way to optimize search times on hard disk drives by ordering the requests once the read
write heads have been positioned. a. Rotational ordering b. C-SCAN c. SSTF d. LOOK and SCAN /a
The Memory Manager is in charge of main memory, widely known as ROM. True False
false
As long as users refer to files in the ____ directory, they can access the files without entering the absolute filename. a. root b. home c. working d. main
c
Each thread in a process is represented by a data structure called a ____ that contains basic information such as the thread's unique identification, state, and priority. a. Thread Pointer b. Thread Queue c. Thread Control Block d. Thread State Block
c
In noncontiguous storage, one way to link file extents is at the storage level where each extent points to the ____. a. next file in the sequence b. master directory entry c. next extent in the sequence d. current subdirectory
c
It is possible to minimize response time by running only interactive jobs and letting batch jobs wait until the interactive load ceases. True False
true
Many systems force users to have their files organized for fixed-length records if the records are to be accessed directly. True False
true
Some systems use a strategy known as ____ to increase the priority of jobs that have been in the system for an unusually long time in order to expedite their exit. a. bumping b. accelerated priority c. aging d. lagging
c
There are two types of real-time systems depending on the consequences of missing the deadline. A ____ real-time system risks total system failure if the predicted time deadline is missed. a. soft b. restricted c. constrained d. hard
d
When a job is accepted by the system, it's put on ____ and placed in a queue. a. WAITING b. RUNNING c. READY d. HOLD
d
The I
O ____ allocates the devices, control units, and channels. a. scheduler b. traffic controller c. director d. device handler /a
CPU-bound jobs (such as printing a series of documents) have many brief CPU cycles and long I
O cycles. True False /false
A seek strategy for an I
O device handler is the predetermined policy that the device handler uses to allocate access to the device among the many processes that may be waiting for it. It determines the order in which the processes get the device; the goal is to keep transfer time to a minimum. True False /false
The Job Scheduler seeks to ____ when scheduling jobs. a. run all CPU intensive jobs first b. run all I
O intensive jobs first c. balance CPU and I/O intensive jobs d. run the quickest jobs first /c
____ is where the data and instructions of a computer must reside to be processed. a. I
O memory b. CPU c. Read-only memory d. Main memory /d
An I
O request is called a(n) ____ wait in multiprogramming environments. a. natural b. forced c. indirect d. scheduled /a
No movement between queues is a very simple policy that rewards those who have ____ jobs. a. low-priority b. I
O-bound c. high-priority d. CPU-bound /c
In the N-Step SCAN device-scheduling algorithm, any requests that arrive while the arm is in motion are grouped for the arm's next sweep. True False
true
The formula for computing the current byte address (CBA) for a direct access file with fixed record length is ____. a. CBA = (RN - 1) * RL b. CBA = RN * RL c. CBA = RN
RL d. CBA = (RN + 1) * RL /a
A ____, used in RAID Level 2, is a coding scheme that adds extra, redundant bits to the data and is therefore able to correct single-bit errors and detect double-bit errors. a. Redundancy code b. Synch code c. Hamming code d. Parity code
c
A file's ____ filename includes all path information for that file. a. long-form b. relative c. absolute d. extended
c
Although a user directory is treated as a file, it is flagged to indicate to the File Manager that this file is really a ____ whose records are filenames that point to files. a. subdirectory b. database c. master file directory d. volume
a
In active multiprogramming, each program is allowed to use only a preset amount of CPU time before it is interrupted so another job can begin its execution. The interrupted job resumes execution at some later time. This idea is called ____. a. time slicing b. CPU sharing c. shared processing d. distributed processing
a
The most common mechanism for implementing multiprogramming was the introduction of the ____ concept, whereby the CPU was notified of events needing operating systems services. a. interrupt b. messaging c. paging d. sharing
a
The primary disadvantage of contiguous storage is that ____. a. a file can't be expanded unless there is empty space available immediately following it b. a file can be spread in small pieces throughout the storage area c. the file system is difficult to create, implement, and manage d. the file system cannot support direct access
a
To put data on an optical disc requires a high-intensity laser beam, which burns indentations, called pits, and flat areas, called ____. a. lands b. valleys c. lakes d. hills
a
To write data to flash memory, a relatively high voltage is sent through one transistor, called the ____, then through a metal oxide layer and into a second transistor called the control gate, where the charge is stored in a cell until it's erased. a. floating gate b. crystalline port c. pit d. parallel port
a
When using indexed sequential record organization, each entry in the index file contains the ____ and the physical location of the data block where this record, and the records with smaller keys, are stored. a. highest record key b. lowest record key c. last record name d. first record name
a
With the development of ____ technology, a single chip was equipped with two or more processor cores. a. multicore b. multiprogramming c. multimedia d. networking
a
____ is the practice of using Internet-connected resources to perform processing, storage, or other operations. a. Process management b. Cloud computing c. Network management d. Command line interfacing
b
A hybrid system is a combination of ____ systems. a. interactive and real-time b. batch and interactive c. real-time and general-purpose d. batch and real-time
b
A system with ____ divides programs into parts and keep them in secondary storage, bringing each part into memory only as it is needed. a. segmented processing b. virtual memory c. passive multiprogramming d. shared memory
b
A(n) ____ contains a list of files, each of which is associated with the names of users who are allowed to access it and the type of access each user is permitted. a. access control matrix b. access control list c. capability matrix d. capability list
b
Assume that jobs A-D arrive in the READY queue in quick succession and have the CPU cycle requirements listed below. Using the SRT algorithm, the average turnaround time is ____. Arrival time: 0 1 2 3 Job: A B C D CPU cycle: 6 3 1 4 a. 2.5 b. 6.25 c. 7.75 d. 9.0
b
The USB controller assigns bandwidth to each device depending on its priority. The ____ priority is assigned to real-time exchanges where no interruption in the data flow is allowed, such as video or sound data. a. medium b. highest c. standard d. lowest
b
The ____ is a hardware flag that must be tested by the CPU to determine when a device has completed an operation. a. Device Polling Word b. Channel Status Word c. Device Status Word d. Channel Interrupt Word
b
The ____ is often very different from one operating system to the next, sometimes even between different versions of the same operating system. a. Process Manager b. User Interface c. File Manager d. Memory Manager
b
The advent of optical discs was made possible by developments in ____ technology. a. silicone b. laser c. storage d. magnetic
b
The word ____ is used to indicate that a program is permanently held in ROM (read only memory), as opposed to being held in secondary storage. a. software b. firmware c. hardware d. shareware
b
____ is a dynamic-priority preemptive scheduling algorithm built to address the critical processing requirements of real-time systems and their pressing deadlines. a. Round Robin b. Earliest Deadline First c. Shortest Job Next d. Variable Time Quantum Per Queue
b
A(n) ____ filename is the name that differentiates a file from other files in the same directory. a. directory b. short-form c. relative d. absolute
c
When the operating system detects a nonrecoverable error, the following step is performed first by the interrupt handler: ____. a. the interrupt is processed b. the processor resumes operation c. the type of interrupt is described and stored d. the state of the interrupted process is saved
c
Each peripheral device has its own software, called a(n) ____, which contains the detailed instructions required to start that device, allocate it to a job, use the device correctly, and deallocate it when it's appropriate. a. device handler b. device controller c. device software d. device driver
d
The name for the core portion of an operating system is the ____. a. center b. nucleus c. manager d. kernel
d
The number of characters that can be recorded per inch on a magnetic tape is determined by the ____ of the tape. a. parity b. width c. length d. density
d
A compressed image file can be reconstructed if a lossy compression algorithm is used because the compression process is reversible. True False
false
A relative filename is a name that is selected by the File Manager when the file is created. True False
false
A volume must contain a single file. True False
false
An indexed sequential file does not have overflow areas. True False
false
An optical disc drive spins at a constant speed—this is called constant linear velocity. True False
false
Device management principles are changing rapidly to accommodate cloud computing. True False
false
Dual core or quad core multi-core chips are larger than a single-processor chip but produce less current leakage and heat. True False
false
Files cannot be converted from sequential to direct or vice versa. True False
false
First-come, first-served (FCFS) is a preemptive scheduling algorithm that handles jobs according to their arrival time. True False
false
General-purpose operating systems such as Linux or Windows are used in embedded systems. True False
false
RAID begins with the assumption that a small set of large-capacity disk drives is preferable to a larger set of small-capacity disk drives. True False
false
RAID is a set of logical disk drives, viewed as a single physical unit by the operating system. True False
false
The File Manager responds to the CREATE command by creating a new file. True False
false
The Memory Manager, the Interface Manager, the User Manager, and the File Manager are the four essential managers of every major operating system. True False
false
The control program that handles the interruption sequence of events is called the event scheduler. True False
false
When a user gives a command to modify the contents of a file, it's actually a command to access folders within the file. True False
false
When using DMA, the CPU controls the transfer of data to and from memory over the system bus. True False
false
A DVD with a fast data transfer rate will drop fewer frames when playing back a recorded video segment than will a unit with a slower transfer rate. True False
true
A file extension is usually two to four characters in length and is separated from the relative name by a period. True False
true
A single processor can be shared by several jobs, or several processes, but only if the operating system has a scheduling policy, as well as a scheduling algorithm, to determine when to stop working on one job and proceed to another. True False
true
A subdirectory is created when a user opens an account to access the computer system. True False
true
Although noncontiguous allocation schemes eliminate external storage fragmentation and the need for compaction, they don't support direct access because there's no easy way to determine the exact location of a specific record. True False
true
An important function of the Processor Manager is to keep track of the status of each job, process, and thread. True False
true
As a process moves through the system, its status changes. Possible process statuses include FINISHED, HOLD, READY, RUNNING, and WAITING. True False
true
Blu-ray discs are available in several formats: read-only (BD-ROM), recordable (BD-R), and rewritable (BD-RE). True False
true
Directories are special files that contain listings of filenames and their attributes. True False
true
If the File Manager is required to provide detailed instructions for each system device (how to start it, get it to move to the correct place where the desired record is located, and when to stop), then the program is considered device dependent. True False
true
In Round Robin scheduling, if processing isn't finished when time expires, the job is preempted and put at the end of the READY queue and its information is saved in its Process Control Block. True False
true
In the 1980s, as a result of multiprocessing techniques, it became possible to execute two programs at the same time in parallel. True False
true
In the 2010s, chips with millions of transistors that were very close together helped increase system performance dramatically. True False
true