Operating Systems Test Questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

10^18

Exa

10^9

Giga

POSIX

IEEE developed a standard for UNIX that defines a minimal system-call interface that conformant UNIX systems must support called ____.

76msec

If a disk with a 2 MB per track, a rotation time of 9 msec, and an average seek time of 4 msec how long will it take to read a 15 MB file into memory?

dirty

If a page has been modified and has not be written back to the disk it is considered ____.

>

In MULTICS the components of the path are separated by ____.

unlink

In UNIX, the system call for deleting files is ____.

overlays

In the 1960s programs were split into little pieces, called ____.

Match the functions in the THE system with the layer's number

Input/output management: 3 User programs: 4 Operator-process communication: 2 Memory and drum management: 1 Processor allocation and multiprogramming: 0 The operator: 5

10^3

Kilo

10^6

Mega

acknowledgement

Messages can be lost by the networks, to guard against lost messages, the sender and receiver can agree that as soon as a message has been received, the receiver will send back a special ____ message.

journaling

Microsoft's NTFS file system and the Linux ext3 and ReiserFS file systems keep a log of what the file system is going to do before it does it, so that if the system crashes before it can do its planned work, upon rebooting the system can look in the log to see what was going on at the time of the crash and finish the job. The name of this protection is called ____.

10^15

Peta

character

Printers, network interfaces, mice (for pointing), rats (for psychology lab experiments), and most other devices that are not disk-like can be seen as ____ devices.

daemons

Processes that stay in the background to handle some activity such as email, Web pages, news, printing, and so on are called ____.

multiplexing

Resource management includes ____ (sharing) resources in two different ways: in time and in space.

Medium real time

Scheduling in Real-Time Systems can be divided into all of the following categories except ____.

Master Boot Record

Sector 0 of the disk is called the MBR and is used to boot the computer, MBR stands for ____ ____ ____ (Incorrect spelling is an incorrect answer).

I/O bound

Some processes spend most of their time waiting for I/O and less of their time computing is know as ____.

priority

Sometimes a pecking order exists when deciding the order to run the processes, therefore the need to take external factors into account leads to ____ scheduling.

Simultaneous Peripheral Operations On Line

Spooling is an acronym that refers to putting jobs in a buffer, a special area in memory or on a disk where a device can access them when it is ready. What does spooling stand for? ____ ____ ____ ____ ____ (Incorrect spelling is an incorrect answer)

10^12

Tera

Basic Input Output System

The BIOS contains low-level I/O software, including procedures to read the keyboard, write to the screen, and do disk I/O, among other things. BIOS is an acronym what does it stand for? ____ ____ ____ ____ (Incorrect spelling is an incorrect answer)

1

The RAID level ____ it duplicates all the disks, so there are as many primary disks as there are backup disks making sure that on a write, every strip is written twice.

sync

The UNIX system call which forces all the modified blocks out onto the disk immediately is known as ____.

second chance

The algorithm that is looking for an old page that has not been referenced in the most recent clock interval is known as ____.

NRU

The algorithm that removes a page at random from the lowest-numbered nonempty class is known as ____.

FIFO

The algorithm that removes a page that has been in memory the longest is known as ____.

LRU

The algorithm that requires a linked list of all pages in memory, with the most recently used page at the front and the least recently used page at the rear is known as ____.

Parkinson's law

The computer phrase "Programs expand to fill the memory available to hold them." is known as ____ Law.

address space

The concept of each process having its own address space, independent of those belonging to other processes is known as ____.

root

The first or top-most directory in a hierarchy is known as the ____ directory.

convert

The following are some of the most common system calls relating to files except ____.

extension

The part of a file name following the period is called the file ____.

manager

The part of the operating system that efficiently manages memory: keeps track of which parts of memory are in use, allocate memory to processes when they need it, and deallocate it when they are done is called the memory ____.

scheduler

The part of the operating system that makes a choice of which process to run next when only one CPU is available is called the ____.

swapping

The simplest strategy that consists of bringing in each process in its entirety, running it for a while, then putting it back on the disk is called ____.

device driver

The software that talks to a controller, giving it commands and accepting responses, is called a ____.

Virtual memory

The strategy that allows programs to run even when they are only partially in main memory is called ____.

ASCII, binary

The two types of regular files are generally ____ or ____.

quotas

To prevent people from hogging too much disk space, multiuser operating systems often provide a mechanism for enforcing disk____.

Cylinder

Together, all the tracks of a magnetic hard disk for a given arm position form a ____.

relocation, protection

Two problems have to be solved to allow multiple applications to be in memory at the same time without interfering with each other: ____ and ____.

type

Typical information in the superblock includes a magic number to identify the file-system ____.

5 Gbps

USB 3.0 could handle an aggregate load of ____.

\Faculty\Prof.Brown\Committees\COST-11

Using Fig. 1-14 provide the absolute path name from the root directory to get to the file in the COST-11 directory on a Windows system. (Incorrect spelling is an incorrect answer)

13

Using a contiguous allocation scheme on a disk with 4-KB blocks, a 50-KB file would be allocated ____ consecutive blocks.

pthread yield

What Pthread command releases the CPU to let another thread run?

User Kernel

What are two modes that most computers operate in?

Xerox PARC

What company was the first company to incorporate into the machines they built a Graphical User Interface, complete with windows, icons, menus, and mouse?

Fortran Monitor System

What does the "FMS" referred to in the book stands for?

handle

What is the name of a special token given to a parent process that it can use to control its child?

765

What is the protection's numeric value of a UNIX directory that allows the owner to read/write/execute, the group can read/write, and everyone else can read/execute?

ExitProcess

What is the system call that Windows uses to tell the operating system that it is finished doing its work?

kill

What is the system call that the process executes to terminate another process in the UNIX operating system?

None of the above

What would the drive letter be of a newly mounted CD-ROM on a UNIX system? C, D, E, or None of the above

cycle stealing

When a bus operates in word-at-a-time mode, when the DMA controller has control of the bus and the CPU also wants the bus, it has to wait, this is called ____ ____.

Soft miss

When a page that is referenced is not in the TLB, but is in memory it is known as a ____.

fairness

When designing a scheduling algorithm, it is important under all circumstances to take ____ into consideration.

compaction

When swapping creates multiple holes in memory, it is possible to combine them all into one big one by moving all the processes downward as far as possible, this technique is known as memory ____.

race

Where two or more processes are reading or writing some shared data and the final result depends on who runs precisely when, are called ____ conditions.

worst fit

Which fit always take the largest available hole, so that the new hole will be big enough to be useful

Doug Engelbart

Who invented the Graphical User Interface?

FAT-16

Windows 95 and Windows 98 both used the MS-DOS file system is called ____

70

Windows is well over ____ million lines of code.

10^24

Yotta

10^21

Zetta

files

____ are logical units of information created by processes.

Symbolic

____ links can be used to link to files on machines anywhere in the world, by simply providing the network address of the machine where the file resides in addition to its path on that machine.

10^-18

atto

10^-15

femto

10^-6

micro

10^-3

milli

10^-9

nano

10^-12

pico

10^-24

yocto

10^-21

zepto

physical

A ____ dump starts at block 0 of the disk, writes all the disk blocks onto the output disk in order, and stops when it has copied the last one.

mutex

A ____ is a shared variable that can be in one of two states: unlocked or locked.

Pipe

A ____ is a sort of pseudo file that can be used to connect two processes.

process

A ____ is just an instance of an executing program, including the current values of the program counter, registers, and variables.

nonpreemptive

A ____ scheduling algorithm picks a process to run and then just lets it run until it blocks (either on I/O or waiting for another process) or voluntarily releases the CPU.

Reincarnation

A ____ server is a server whose job is to check if the other servers and drivers are functioning correctly.

double interleaving

A disk that has sequential sectors numbered 0, 3, 6, 1, 4, 7, 2, 5 is using ____ ____.

device independence

A key concept that states we should be able to write programs that can access any I/O device without having to specify the device in advance is known as ____ ____.

threads

A kind of processes within processes, or miniprocesses are called ____?

spin

A lock that uses busy waiting is called a ____ lock.

sequential

A process could read all the bytes or records in a file in order, starting at the beginning, but could not skip around and read them out of order is known as ____ access.

thrashing

A program causing page faults every few instructions is said to be ____

Translation Lookaside Buffer

A small hardware device for mapping virtual addresses to physical addresses without going through the page table. is called a TLB or sometimes an associative memory. TLB stands for ____ ____ ____ (Incorrect spelling is an incorrect answer).

rendezvous

A system that is more rigid where the sender and receiver are forced to run in lockstep is often known as a ____.

atomic

A transaction that must complete either all of its operations or none of them is known as ____.

Aging, WSClock

According to the author, the two best algorithms are ____ and ____.

checkerboarding

After the system has been running for a while, memory will be divided up into a number of chunks, some containing segments and some containing holes, this phenomenon, called ____ or external fragmentation, wastes memory in the holes.

the information must be able to be kept private from other users

All of the requirements are essential for long-term information storage except?

base and limit

An easy way to give each process its own private address is to automatically add a number to the generated address before being sent to memory while also ensuring it doesn't exceed the available memory is known as ____.

barrier

An item used to block a process until all processes have come together is known as a(n) ____.

Google's Android OS

At the time of the writing of this book what was the dominant operating system used on smartphones?

round-robin

Batch system scheduling algorithms include all of the following except?


Ensembles d'études connexes

PSY 1513 Exam 2 Chapter 5-8 McMillian

View Set

Biochem Tinker Lab: Organic Compounds Indicator and Hydrocarbon

View Set

9th Grd Biology Unit 3 Test Study Guide

View Set

Chapter 3: Collecting Objective Data: The Physical Examination PrepU Quiz and answers

View Set