OS Final Study
In the action overflow section of an Android action bar, users can find tasks that are not often needed.
False
Onboard systems are computers that are physically placed inside the products that they operate to add features and capabilities.
False
Partial network encryption, also called communications encryption, is the most extreme form of encryption.
False
RAID is a set of logical disk drives, viewed as a single physical unit by the operating system.
False
System efficiency is affected primarily by two major components: user programs and operating system programs.
False
The primary disadvantage of the WAIT and SIGNAL operation set is that it does not address busy waiting.
False
With distributed operating systems, users need to be aware of which processor is actually running their applications.
False
____ is a way to optimize search times on hard disk drives by ordering the requests once the read/write heads have been positioned.
Rotational ordering
In its simplest form, Amdahl's Law maintains that if a given program would take one hour to run to completion with one processor, but 80 percent of the program had to run sequentially (and therefore could not be sped up by applying additional processors to it), then a resulting parallel program would run only a maximum of ____ percent faster. a) 5 b) 10 c) 20 d) 25
c) 20
An ____ is a data structure that controls how the I/O operation is processed at each step. a) ITB b) IMS c) IRP d) IRQ
c) IRP
The transition from ____ can be initiated by the Process Scheduler or the Job Scheduler. a) WAITING to READY b) RUNNING to WAITING c) RUNNING to FINISHED d) HOLD to READY
c) RUNNING to FINISHED
In Linux, ____ devices cannot host a file system. a) write b) read c) block d) char
d) char
For a fixed partition system, memory deallocation is relatively complex.
False
When a process requests pages, Linux loads them into memory. When the kernel needs the memory space, the pages are released using a most recently used (MRU) algorithm.
False
The portion of memory that is used for sections of the kernel that require maximum performance is the ____. a) resident operating system code b) system nonpaged pool c) system paged pool d) paged user code and data pool
a) resident operating system code
The I/O ____ allocates the devices, control units, and channels. a) scheduler b) traffic controller c) device handler d) director
a) scheduler
In demand paging, pages are ____ between main memory and secondary storage. Correct Response a) swapped b) traded c) allocated d) faulted
a) swapped
The advent of mobile systems run by Android and other operating systems opens a wide range of new system management and security concerns for systems administrators, including the ____ paradigm in which an organization's members connect their personal devices directly to a secured network. a) "personal work devices" b) "bring your own devices" c) "enhanced personal devices" d) "work anywhere"
b) "bring your own devices"
The ____ demonstrates that when using a FIFO policy, in rare cases, adding more memory to a system can cause an increase in page interrupts. a) Paging Anomaly b) Belady Anomaly c) Interrupt Anomaly d) Laszlo Anomaly
b) Belady Anomaly
____ are special files with listings of filenames and their attributes. a) Databases b) Directories c) Programs d) Data files
b) Directories
eployment software falls into two groups: ____ software. a) structured and unstructured b) secure and insecure c) automatic and manual d) agent-based and agentless
d) agent-based and agentless
The goal of the ____ memory allocation algorithm is to find the smallest memory block into which a job will fit. a) smallest-fit b) first-fit c) dynamic-fit d) best-fit
d) best-fit
The object used by the Kerberos protocol to provide client verification is known as a ____. a) password b) passphrase c) token d) ticket
d) ticket
To ensure the integrity of the Windows operating system code, the designers separated operating system functions into a privileged executive process and a set of nonprivileged processes called protected subsystems.
True
To support text compression, data in a fixed-length field that includes a short name followed by many blank characters can be replaced with a variable-length field and a special code to indicate how many blanks were truncated.
True
Virtual memory can be implemented with both paging and segmentation.
True
Virtual memory in Linux is managed using a multiple-level table hierarchy.
True
In a direct record organization scheme, the program used to store the data follows a set of instructions, called a ____ algorithm, that transforms each key into a number, the record's logical address. a) hashing b) grouping c) translation d) lookup
a) hashing
No movement between queues is a very simple policy that rewards those who have ____ jobs. a) high-priority b) low-priority c) CPU-bound d) I/O-bound
a) high-priority
UNIX uses the ____ page replacement algorithm. a) least recently used b) round robin c) priority d) v
a) least recently used
When a user is immersed in a static endeavor, such as reading or watching a movie, Android allows the on-screen buttons to temporarily disappear; this is called ____ mode. a) lights-out b) tv c) dark d) screen
a) lights-out
The ____ multiprocessing configuration features several complete computer systems, each with its own memory, I/O devices, CPU, and operating system. a) loosely coupled b) master/slave c) symmetric d) synchronized
a) loosely coupled
In a paged memory allocation scheme, the ____ contains two values for each active job: the size of the job and the memory location where its Page Map Table is stored. a) Memory Management Table Correct Response b) Job Table c) Page Access Table d) Memory Map Table
b) Job Table
A(n) ____ contains a list of files, each of which is associated with the names of users who are allowed to access it and the type of access each user is permitted. a) access control matrix b) access control list c) capability list d) capability matrix
b) access control list
One of the user interface element standards encouraged by Android is to place a(n) ____ along the top of each app screen that generally stays in place while that app is active. a) info bar b) action bar c) menu bar d) back button
b) action bar
An algorithm designed to detect starvation by tracking how long each job has been waiting for resources is using the concept of ____. a) deadlock b) aging c) preemption d) round robin
b) aging
The purpose of cache memory is to keep handy the most recently accessed data and instructions so that the CPU can access them repeatedly without wasting time. This purpose is similar to that of the ____ of a Web browser. a) cache file b) bookmark file c) page file d) block file
b) bookmark file
____ are the device drivers that provide the interface to I/O hardware. a) Dev files b) Dev drivers c) Special files d) Store files
c) Special files
In Linux, up to a total of 256MB of usable memory can be configured into equal-sized page frames, which can be grouped to give more contiguous space to a job. These groups can also be split to accommodate smaller jobs. The process of grouping and splitting usable memory is known as the ____. a) process algorithm b) grouping algorithm c) buddy algorithm d) group/split algorithm
c) buddy algorithm
Linux provides ____ queues and semaphores to allow two processes to synchronize with each other. a) exec b) exec c) wait d) pause
c) wait
RAID level ____ requires two different parity calculations. a) 2 b) 3 c) 5 d) 6
d) 6
____ is a dynamic-priority preemptive scheduling algorithm built to address the critical processing requirements of real-time systems and their pressing deadlines. a) Variable Time Quantum Per Queue b) Round Robin c) Shortest Job Next d) Earliest Deadline First
d) Earliest Deadline First
The transition from ____ is initiated by the Job Scheduler according to some predefined policy. At this point, the availability of enough main memory and any requested devices is checked. a) READY to RUNNING b) RUNNING to WAITING c) RUNNING back to READY d) HOLD to READY
d) HOLD to READY
The Process Scheduler assigns the CPU to execute the processes for those jobs placed on the ____ queue by the Job Scheduler. a) WAITING b) NEXT c) PROCESS d) READY
d) READY
Which of the following Windows operating systems integrates cloud environments and distributed access? a) Windows XP b) Windows 7 c) Windows 8 d) Windows Server 2012
d) Windows Server 2012
The part of an Android action bar that shows the most important actions that users will want to access when using an app is the set of ____. a) view controls b) action overflow buttons c) app icons d) action buttons
d) action buttons
A ____ combines into one program the characteristics of other attacks. a) Trojan Horse b) worm c) multi-thread virus d) blended threat
d) blended threat
The three standard classes of devices supported by Linux are ____. a) character devices, system devices, and network interfaces b) system devices, block devices, and network interfaces c) character devices, block devices, and network interfaces d) character devices, block devices, and network devices
d) character devices, block devices, and network devices
A disadvantage of segmented memory allocation is ____. a) the physical size requirements of main memory b) the number of page faults c) internal fragmentation d) external fragmentation
d) external fragmentation
There are two types of real-time systems depending on the consequences of missing the deadline. A ____ real-time system risks total system failure if the predicted time deadline is missed. a) constrained b) restricted c) soft d) hard
d) hard
When a compiler automatically detects instructions that can be performed in parallel, ____ is in place. a) automatic parallelism b) array parallelism c) explicit parallelism d) implicit parallelism
d) implicit parallelism
For multiprogramming systems, most UNIX operating systems use either ____ management techniques. a) indirect paging and hot swapping b) simple memory and paging c) virtual memory and swapping d) swapping or demand paging memory
d) swapping or demand paging memory
Administrators use ____ logs that provide a detailed description of activity on the system. a) file b) directory c) detailed d) system
d) system
The capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents is known as ____. a) attack resistance b) attack survivability c) system recovery d) system survivability
d) system survivability
Deadlock can occur on a printer when ____. a) the network connection for the printer overflows with too many requests to use the printer b) too many users attempt to access the printer at the same time c) the buffer fills up with too many print jobs and the printer cannot decide which one to print d) the printer needs all of a job's output before it will begin printing, but the spooling system fills the available disk space with only partially completed output
d) the printer needs all of a job's output before it will begin printing, but the spooling system fills the available disk space with only partially completed output
A terminal has two input queues. As a user types each character to the terminal, it is collected in the ____ queue. a) raw b) canonical c) character d) buffer
a) raw
The ____ method keeps the free/busy lists organized by memory locations, from low-order memory to high-order memory. a) fixed partition allocation b) first-fit memory allocation c) dynamic fit memory allocation d) best-fit memory allocation
b) first-fit memory allocation
When using indexed sequential record organization, each entry in the index file contains the ____ and the physical location of the data block where this record, and the records with smaller keys, are stored. a) last record name b) highest record key c) lowest record key d) first record name
b) highest record key
In Windows terminology, the privileged processor mode is called ____ mode and the nonprivileged processor mode is called user mode. a) server b) kernel c) internal d) computer
b) kernel
An entire system that is backed up once a week and only backs up files daily that are changed on that day is known as a(n) ____ backup. a) incremental b) layered c) phased d) recovery-based
b) layered
Most current operating systems support the implementation of threads, or ____, which have become part of numerous application packages. a) parallel processes b) lightweight processes c) v d) semaphores
b) lightweight processes
A file containing data or programs belonging to users is known as a(n) ____. a) symbolic link b) ordinary file c) special file d) named pipe
b) ordinary file
A(n) ____ filename is the name that differentiates a file from other files in the same directory. a) absolute b) relative c) short-form d) directory
b) relative
Linux provides semaphores to help solve the problems of mutual exclusion and of producers and consumers. The Linux semaphore structure contains ____ fields. a) two b) three c) four d) five
b) three
The ____ command allows the programmer to synchronize process execution by suspending the parent until the child is finished. a) exec b) fork c) wait d) pause
c) wait
____ is a measure of how much each resource is contributing to the overall operation of the system. a) Network utilization b) Resource allocation c) Resource utilization d) Availability
c) Resource utilization
The Banker's Algorithm is an example of a(n) ____ policy. a) mutual exclusion b) detection c) avoidance d) recovery
c) avoidance
The ____ page replacement policy is based on the theory that the best page to remove is the one that has been in memory the longest. a) TRU b) LRU c) LIFO d) FIFO
d) FIFO
A master boot record virus infects both the boot record and program files, making them especially difficult to repair.
False
A positive feedback loop mechanism monitors the system and, when it becomes too congested, signals the Job Scheduler to slow down the arrival rate of processes.
False
Capacity is a composite measure that indicates the productivity of the system as a whole.
False
Device drivers supervise the transmission of data between main memory and the local unit.
False
Each active thread in a process has its own processor registers, data area, and resources.
False
In a loosely coupled system, a job may move from one processor to another during execution.
False
The Memory Manager is in charge of main memory, widely known as ROM.
False
The content of a random access memory (RAM) chip is nonvolatile, meaning that it is not erased when the power is turned off.
False
The shortest remaining time (SRT) algorithm is often used in interactive systems.
False
When a programmer indicates in the code which instructions can be executed in parallel in a program (for example, using COBEGIN and COEND), it is called implicit parallelism.
False
With demand paging, if there are no empty page frames available, to move in a new page, one of the current resident pages must be placed into main memory.
False
Most computer programs alternate between CPU cycles and I/O cycles.
True
Deadlock does not usually affect the entire system.
False
A relative filename is a name that is selected by the File Manager when the file is created.
False
The fixed partition scheme works well if all of the jobs run on the system are of the same size or if the sizes are known ahead of time and don't vary between reconfigurations.
True
The second column in a UNIX directory listing indicates the number of links, also known as the number of aliases, that refer to the same physical file.
True
In a dynamic partition system, a null entry in the busy list occurs when a memory block between two other busy memory blocks is returned to the free list.
True
Linux has system calls that change the size of the process data segment, either by expanding it to accommodate extra data values or reducing it when certain values positioned at the end of the data segment are no longer needed.
True
Nested RAID levels, also called hybrid levels, are complex RAID configurations created by combining multiple standard levels.
True
One popular authentication tool is Kerberos, a network authentication protocol developed as part of the Athena Project at MIT.
True
Resource availability in its simplest form means that a unit will be operational and not out of service when a user needs it.
True
The Job Table (JT) contains two values for each active job: the size of the job and the memory location where its Page Map Table is stored.
True
The Processor Manager of a UNIX system kernel handles the allocation of the CPU, process scheduling, and the satisfaction of process requests.
True
____ files exploit virtual memory capabilities by allowing an application to open a file of arbitrary size and treat it as a single contiguous array of memory locations without buffering data or performing disk I/O. a) Memory-mapped b) Virtual memory c) Virtual system d) Cached
a) Memory-mapped
Linux terminal management conforms to ____ standards, and it also supports pseudo-terminals. a) POSIX b) SCSI c) USB d) DLL
a) POSIX
____ is a queue reordering technique that can help optimize I/O times. a) Rescheduling b) Blocking c) Buffering d) Prioritizing
a) Rescheduling
A variation of the LRU page replacement algorithm known as the ____ replacement policy is implemented with a circular queue. a) clock page b) round robin c) performance page d) bit shifting
a) clock page
The Linux page replacement algorithm is an expanded version of the ____ replacement policy. a) clock page b) clock c) page clock d) page
a) clock page
A computer system that can support jobs that use multiple processors to execute sets of instructions in parallel is referred to as a ____ system. a) concurrent processing b) process synchronization c) parallel extraction d) processing optimization
a) concurrent processing
Generally, ____ antivirus software compares file sizes (checking for added code when none is expected), looks for replicating instructions, and searches for unusual file activity. a) diagnostic b) preventive c) reactive d) firewall
a) diagnostic
To accommodate the various needs of its user community, and to optimize resources, the Windows team identified the following design goals:____. a) extensibility, portability, reliability, compatibility, and performance b) security, portability, reliability, and performance c) security, expandability, compatibility, and cost-effectiveness d) portability, interoperability, and performance
a) extensibility, portability, reliability, compatibility, and performance