OS Final Study

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

In the action overflow section of an Android action bar, users can find tasks that are not often needed.

False

Onboard systems are computers that are physically placed inside the products that they operate to add features and capabilities.

False

Partial network encryption, also called communications encryption, is the most extreme form of encryption.

False

RAID is a set of logical disk drives, viewed as a single physical unit by the operating system.

False

System efficiency is affected primarily by two major components: user programs and operating system programs.

False

The primary disadvantage of the WAIT and SIGNAL operation set is that it does not address busy waiting.

False

With distributed operating systems, users need to be aware of which processor is actually running their applications.

False

____ is a way to optimize search times on hard disk drives by ordering the requests once the read/write heads have been positioned.

Rotational ordering

In its simplest form, Amdahl's Law maintains that if a given program would take one hour to run to completion with one processor, but 80 percent of the program had to run sequentially (and therefore could not be sped up by applying additional processors to it), then a resulting parallel program would run only a maximum of ____ percent faster. a) 5 b) 10 c) 20 d) 25

c) 20

An ____ is a data structure that controls how the I/O operation is processed at each step. a) ITB b) IMS c) IRP d) IRQ

c) IRP

The transition from ____ can be initiated by the Process Scheduler or the Job Scheduler. a) WAITING to READY b) RUNNING to WAITING c) RUNNING to FINISHED d) HOLD to READY

c) RUNNING to FINISHED

In Linux, ____ devices cannot host a file system. a) write b) read c) block d) char

d) char

For a fixed partition system, memory deallocation is relatively complex.

False

When a process requests pages, Linux loads them into memory. When the kernel needs the memory space, the pages are released using a most recently used (MRU) algorithm.

False

The portion of memory that is used for sections of the kernel that require maximum performance is the ____. a) resident operating system code b) system nonpaged pool c) system paged pool d) paged user code and data pool

a) resident operating system code

The I/O ____ allocates the devices, control units, and channels. a) scheduler b) traffic controller c) device handler d) director

a) scheduler

In demand paging, pages are ____ between main memory and secondary storage. Correct Response a) swapped b) traded c) allocated d) faulted

a) swapped

The advent of mobile systems run by Android and other operating systems opens a wide range of new system management and security concerns for systems administrators, including the ____ paradigm in which an organization's members connect their personal devices directly to a secured network. a) "personal work devices" b) "bring your own devices" c) "enhanced personal devices" d) "work anywhere"

b) "bring your own devices"

The ____ demonstrates that when using a FIFO policy, in rare cases, adding more memory to a system can cause an increase in page interrupts. a) Paging Anomaly b) Belady Anomaly c) Interrupt Anomaly d) Laszlo Anomaly

b) Belady Anomaly

____ are special files with listings of filenames and their attributes. a) Databases b) Directories c) Programs d) Data files

b) Directories

eployment software falls into two groups: ____ software. a) structured and unstructured b) secure and insecure c) automatic and manual d) agent-based and agentless

d) agent-based and agentless

The goal of the ____ memory allocation algorithm is to find the smallest memory block into which a job will fit. a) smallest-fit b) first-fit c) dynamic-fit d) best-fit

d) best-fit

The object used by the Kerberos protocol to provide client verification is known as a ____. a) password b) passphrase c) token d) ticket

d) ticket

To ensure the integrity of the Windows operating system code, the designers separated operating system functions into a privileged executive process and a set of nonprivileged processes called protected subsystems.

True

To support text compression, data in a fixed-length field that includes a short name followed by many blank characters can be replaced with a variable-length field and a special code to indicate how many blanks were truncated.

True

Virtual memory can be implemented with both paging and segmentation.

True

Virtual memory in Linux is managed using a multiple-level table hierarchy.

True

In a direct record organization scheme, the program used to store the data follows a set of instructions, called a ____ algorithm, that transforms each key into a number, the record's logical address. a) hashing b) grouping c) translation d) lookup

a) hashing

No movement between queues is a very simple policy that rewards those who have ____ jobs. a) high-priority b) low-priority c) CPU-bound d) I/O-bound

a) high-priority

UNIX uses the ____ page replacement algorithm. a) least recently used b) round robin c) priority d) v

a) least recently used

When a user is immersed in a static endeavor, such as reading or watching a movie, Android allows the on-screen buttons to temporarily disappear; this is called ____ mode. a) lights-out b) tv c) dark d) screen

a) lights-out

The ____ multiprocessing configuration features several complete computer systems, each with its own memory, I/O devices, CPU, and operating system. a) loosely coupled b) master/slave c) symmetric d) synchronized

a) loosely coupled

In a paged memory allocation scheme, the ____ contains two values for each active job: the size of the job and the memory location where its Page Map Table is stored. a) Memory Management Table Correct Response b) Job Table c) Page Access Table d) Memory Map Table

b) Job Table

A(n) ____ contains a list of files, each of which is associated with the names of users who are allowed to access it and the type of access each user is permitted. a) access control matrix b) access control list c) capability list d) capability matrix

b) access control list

One of the user interface element standards encouraged by Android is to place a(n) ____ along the top of each app screen that generally stays in place while that app is active. a) info bar b) action bar c) menu bar d) back button

b) action bar

An algorithm designed to detect starvation by tracking how long each job has been waiting for resources is using the concept of ____. a) deadlock b) aging c) preemption d) round robin

b) aging

The purpose of cache memory is to keep handy the most recently accessed data and instructions so that the CPU can access them repeatedly without wasting time. This purpose is similar to that of the ____ of a Web browser. a) cache file b) bookmark file c) page file d) block file

b) bookmark file

____ are the device drivers that provide the interface to I/O hardware. a) Dev files b) Dev drivers c) Special files d) Store files

c) Special files

In Linux, up to a total of 256MB of usable memory can be configured into equal-sized page frames, which can be grouped to give more contiguous space to a job. These groups can also be split to accommodate smaller jobs. The process of grouping and splitting usable memory is known as the ____. a) process algorithm b) grouping algorithm c) buddy algorithm d) group/split algorithm

c) buddy algorithm

Linux provides ____ queues and semaphores to allow two processes to synchronize with each other. a) exec b) exec c) wait d) pause

c) wait

RAID level ____ requires two different parity calculations. a) 2 b) 3 c) 5 d) 6

d) 6

____ is a dynamic-priority preemptive scheduling algorithm built to address the critical processing requirements of real-time systems and their pressing deadlines. a) Variable Time Quantum Per Queue b) Round Robin c) Shortest Job Next d) Earliest Deadline First

d) Earliest Deadline First

The transition from ____ is initiated by the Job Scheduler according to some predefined policy. At this point, the availability of enough main memory and any requested devices is checked. a) READY to RUNNING b) RUNNING to WAITING c) RUNNING back to READY d) HOLD to READY

d) HOLD to READY

The Process Scheduler assigns the CPU to execute the processes for those jobs placed on the ____ queue by the Job Scheduler. a) WAITING b) NEXT c) PROCESS d) READY

d) READY

Which of the following Windows operating systems integrates cloud environments and distributed access? a) Windows XP b) Windows 7 c) Windows 8 d) Windows Server 2012

d) Windows Server 2012

The part of an Android action bar that shows the most important actions that users will want to access when using an app is the set of ____. a) view controls b) action overflow buttons c) app icons d) action buttons

d) action buttons

A ____ combines into one program the characteristics of other attacks. a) Trojan Horse b) worm c) multi-thread virus d) blended threat

d) blended threat

The three standard classes of devices supported by Linux are ____. a) character devices, system devices, and network interfaces b) system devices, block devices, and network interfaces c) character devices, block devices, and network interfaces d) character devices, block devices, and network devices

d) character devices, block devices, and network devices

A disadvantage of segmented memory allocation is ____. a) the physical size requirements of main memory b) the number of page faults c) internal fragmentation d) external fragmentation

d) external fragmentation

There are two types of real-time systems depending on the consequences of missing the deadline. A ____ real-time system risks total system failure if the predicted time deadline is missed. a) constrained b) restricted c) soft d) hard

d) hard

When a compiler automatically detects instructions that can be performed in parallel, ____ is in place. a) automatic parallelism b) array parallelism c) explicit parallelism d) implicit parallelism

d) implicit parallelism

For multiprogramming systems, most UNIX operating systems use either ____ management techniques. a) indirect paging and hot swapping b) simple memory and paging c) virtual memory and swapping d) swapping or demand paging memory

d) swapping or demand paging memory

Administrators use ____ logs that provide a detailed description of activity on the system. a) file b) directory c) detailed d) system

d) system

The capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents is known as ____. a) attack resistance b) attack survivability c) system recovery d) system survivability

d) system survivability

Deadlock can occur on a printer when ____. a) the network connection for the printer overflows with too many requests to use the printer b) too many users attempt to access the printer at the same time c) the buffer fills up with too many print jobs and the printer cannot decide which one to print d) the printer needs all of a job's output before it will begin printing, but the spooling system fills the available disk space with only partially completed output

d) the printer needs all of a job's output before it will begin printing, but the spooling system fills the available disk space with only partially completed output

A terminal has two input queues. As a user types each character to the terminal, it is collected in the ____ queue. a) raw b) canonical c) character d) buffer

a) raw

The ____ method keeps the free/busy lists organized by memory locations, from low-order memory to high-order memory. a) fixed partition allocation b) first-fit memory allocation c) dynamic fit memory allocation d) best-fit memory allocation

b) first-fit memory allocation

When using indexed sequential record organization, each entry in the index file contains the ____ and the physical location of the data block where this record, and the records with smaller keys, are stored. a) last record name b) highest record key c) lowest record key d) first record name

b) highest record key

In Windows terminology, the privileged processor mode is called ____ mode and the nonprivileged processor mode is called user mode. a) server b) kernel c) internal d) computer

b) kernel

An entire system that is backed up once a week and only backs up files daily that are changed on that day is known as a(n) ____ backup. a) incremental b) layered c) phased d) recovery-based

b) layered

Most current operating systems support the implementation of threads, or ____, which have become part of numerous application packages. a) parallel processes b) lightweight processes c) v d) semaphores

b) lightweight processes

A file containing data or programs belonging to users is known as a(n) ____. a) symbolic link b) ordinary file c) special file d) named pipe

b) ordinary file

A(n) ____ filename is the name that differentiates a file from other files in the same directory. a) absolute b) relative c) short-form d) directory

b) relative

Linux provides semaphores to help solve the problems of mutual exclusion and of producers and consumers. The Linux semaphore structure contains ____ fields. a) two b) three c) four d) five

b) three

The ____ command allows the programmer to synchronize process execution by suspending the parent until the child is finished. a) exec b) fork c) wait d) pause

c) wait

____ is a measure of how much each resource is contributing to the overall operation of the system. a) Network utilization b) Resource allocation c) Resource utilization d) Availability

c) Resource utilization

The Banker's Algorithm is an example of a(n) ____ policy. a) mutual exclusion b) detection c) avoidance d) recovery

c) avoidance

The ____ page replacement policy is based on the theory that the best page to remove is the one that has been in memory the longest. a) TRU b) LRU c) LIFO d) FIFO

d) FIFO

A master boot record virus infects both the boot record and program files, making them especially difficult to repair.

False

A positive feedback loop mechanism monitors the system and, when it becomes too congested, signals the Job Scheduler to slow down the arrival rate of processes.

False

Capacity is a composite measure that indicates the productivity of the system as a whole.

False

Device drivers supervise the transmission of data between main memory and the local unit.

False

Each active thread in a process has its own processor registers, data area, and resources.

False

In a loosely coupled system, a job may move from one processor to another during execution.

False

The Memory Manager is in charge of main memory, widely known as ROM.

False

The content of a random access memory (RAM) chip is nonvolatile, meaning that it is not erased when the power is turned off.

False

The shortest remaining time (SRT) algorithm is often used in interactive systems.

False

When a programmer indicates in the code which instructions can be executed in parallel in a program (for example, using COBEGIN and COEND), it is called implicit parallelism.

False

With demand paging, if there are no empty page frames available, to move in a new page, one of the current resident pages must be placed into main memory.

False

Most computer programs alternate between CPU cycles and I/O cycles.

True

Deadlock does not usually affect the entire system.

False

A relative filename is a name that is selected by the File Manager when the file is created.

False

The fixed partition scheme works well if all of the jobs run on the system are of the same size or if the sizes are known ahead of time and don't vary between reconfigurations.

True

The second column in a UNIX directory listing indicates the number of links, also known as the number of aliases, that refer to the same physical file.

True

In a dynamic partition system, a null entry in the busy list occurs when a memory block between two other busy memory blocks is returned to the free list.

True

Linux has system calls that change the size of the process data segment, either by expanding it to accommodate extra data values or reducing it when certain values positioned at the end of the data segment are no longer needed.

True

Nested RAID levels, also called hybrid levels, are complex RAID configurations created by combining multiple standard levels.

True

One popular authentication tool is Kerberos, a network authentication protocol developed as part of the Athena Project at MIT.

True

Resource availability in its simplest form means that a unit will be operational and not out of service when a user needs it.

True

The Job Table (JT) contains two values for each active job: the size of the job and the memory location where its Page Map Table is stored.

True

The Processor Manager of a UNIX system kernel handles the allocation of the CPU, process scheduling, and the satisfaction of process requests.

True

____ files exploit virtual memory capabilities by allowing an application to open a file of arbitrary size and treat it as a single contiguous array of memory locations without buffering data or performing disk I/O. a) Memory-mapped b) Virtual memory c) Virtual system d) Cached

a) Memory-mapped

Linux terminal management conforms to ____ standards, and it also supports pseudo-terminals. a) POSIX b) SCSI c) USB d) DLL

a) POSIX

____ is a queue reordering technique that can help optimize I/O times. a) Rescheduling b) Blocking c) Buffering d) Prioritizing

a) Rescheduling

A variation of the LRU page replacement algorithm known as the ____ replacement policy is implemented with a circular queue. a) clock page b) round robin c) performance page d) bit shifting

a) clock page

The Linux page replacement algorithm is an expanded version of the ____ replacement policy. a) clock page b) clock c) page clock d) page

a) clock page

A computer system that can support jobs that use multiple processors to execute sets of instructions in parallel is referred to as a ____ system. a) concurrent processing b) process synchronization c) parallel extraction d) processing optimization

a) concurrent processing

Generally, ____ antivirus software compares file sizes (checking for added code when none is expected), looks for replicating instructions, and searches for unusual file activity. a) diagnostic b) preventive c) reactive d) firewall

a) diagnostic

To accommodate the various needs of its user community, and to optimize resources, the Windows team identified the following design goals:____. a) extensibility, portability, reliability, compatibility, and performance b) security, portability, reliability, and performance c) security, expandability, compatibility, and cost-effectiveness d) portability, interoperability, and performance

a) extensibility, portability, reliability, compatibility, and performance


Ensembles d'études connexes

IS312 - Ch3 - Data and Knowledge Mgt

View Set

Chapter 9 Online Retail Services T/F

View Set

Intro to Modern Western Philosophy

View Set

Unit 8 can/ can´t I Love English 1

View Set

Histology Chapter 6 Connective Tissue

View Set

EXIT HESI -PN Exam A PRACTICE QUESTION

View Set

PSY 108 6c) The Nonvisual Senses

View Set