C191 questions

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A memory area that stores data being transferred between two devise or between a device and an application

Buffer

CLI

Command Line Interface

CreatePipe()

Communication- system call

mmap()

Communication- system call

In an access matrix, the ____ right allows a process to change the entries in a row.

Control

A thread library available for Solaris systems

Green thread

Spool

Is a buffer that holds output for a device that cannot accept interleaved data streams.

spool

Is a buffer that holds output for a device that cannot accept interleaved data streams.

Host-attached storage

Is accessed via local I/O ports

message-passing model

Is easier to implement than a shared memory model for intercomputer communication

low-level formatting

Is the process of dividing a disk into sectors that the disk controller can read and write, before a disk can store data

sequential access

Is the simplest file access method

process

Is the unit of work in a system.

For a deadlock to arise, which of the following conditions must hold simultaneously?

Mutual exclusion, Hold and wait, No preemption

Compiled, machine language, not linked

Object

An address seen by the memory unit, loaded into the memory-address register of the memory

Physical address

exit()

Process control- system call

The bounded buffer problem is also known as:

Producer - Consumer problem

What is major feature of segmentation?

Program is divided into pieces having different access rights

A sequence of characters organized into lines, possibly pages

Text file

Markup

Textual data

Which of the following statements is false?

The difference in storage capacity between a mobile device and laptop is shrinking.

How many philosophers may eat simultaneously in the Dining Philosophers problem with 5 philosophers?

2

Real time systems must have:

preemptive kernels

Masquerading

pretending to be another person online

In capability lists, each object has a ____ to denote its type.

tag

RPC provides a(an) --?-- on the client side, a separate one for each remote procedure.

stub

The Linux CFS scheduler identifies _____________ as the interval of time during which every runnable task should run at least once.

targeted latency

The register context and stacks of a thread are deallocated when the thread:

terminates

Optimal Page Replacement Algorithm

the algorithm that has the lowest page-fault rate of all algorithms and will never suffer from Belady's anomaly.

In a paired-password system, ____.

the computer supplies one part of a password and the user enters the other part

Role Base Access Control

The program and the processs can be assigned roles when using role-based access control

Protection domain

The specific resources that a process may access

Protection and security

The process of controlling the use of information on a computer system

Privileged instructions

They may case harm to a system, They can only be executed in kernel mode, They can be attempted from user mode, They are used to manage interrupts.

TLS

Thread-local storage is when a thread needs its own copy of certain data

The number of processes that are completed per time unit

Throughput

The procedure by which an application can schedule user threads onto an available virtual processor

Upcall

Round-Robin

Was designed for time sharing systems.

Mainframe

are designed primarily to maximize resource utilization.

Scheduling is done so as to:

decrease the turnaround time

Virtual memory is normally implemented by:

demand paging

On media that uses constant linear velocity the:

density of bits per track is uniform

On media that uses constant linear velocity, the ____.

density of bits per track is uniform

A process that has terminated, but whose parent has not yet called wait(), is known as a ________ process.

Zombie

A semaphore:

can be accessed from multiple processes

Timer

can be used to prevent a user program from never returning control to the operating system.

contiguous allocation

ensures that only one access is needed to get a disk block using direct access

Protection bits

ensures the integrity of memory in a paged environment

The header and trailer of a sector contain information used by the disk controller such as --?-- and --?--

error correcting codes (ECC) & sector number

The usual effect of abnormal termination of a program is:

core dump file generation

Dtrace

facility that dynamically adds probes to a running system both in user processes and in the kernel Compiler, Provider of probes, and consumers.

ReadFile()

file manipulation- system call

get_file_attributes()

file manipulation- system call

open()

file manipulation- system call

reposition()

file manipulation- system call

Mapping of file is managed by:

file metadata

The series of accesses between the open and close operations is a:

file session

In UNIX, domain switch is accomplished via:

file system

One difficulty of contiguous allocation is:

finding space for a new file

In Peterson's solution, the ____ variable indicates if a process is ready to enter its critical section.

flag[i]

The two phase locking protocol consists of:

growing & shrinking phase

inverted page table

has one page entry for each real page (or frame) of memory. Reduces memory usage to store addresses.

If the extents are too large, then the problem that comes in is:

internal fragmentation

Task parallelism

involves distributing tasks across multiple computing cores.

Optimal page replacement ____.

is used mostly for comparison with other page replacement schemes

Peterson's solution

is/are not a technique for managing critical sections in operating systems.

Cache memory

is/are not a technique for passing parameters from an application to a system call.

If the semaphore value is negative:

its magnitude is the number of processes waiting on that semaphore

Sometimes the overhead of keeping track of a hole might be:

larger than the hole itself

The file-allocation table (FAT) used in MS-DOS is an example of:

linked allocation

The most common secondary storage device is ____.

magnetic disk

Kernel

maintains pending and blocked bit vectors in context of each process.

The --?-- can be turned off by the CPU before the execution of critical instruction sequences that must not be interrupted.

maskable interrupt

The most common method used by attackers to breach security is ____.

masquerading

address space identifier

matches the process with each entry in the TLB.

Priority inversion

occurs when a higher-priority process needs to access a data structure that is currently being accessed by a lower-priority process.

stack

of a process contains temporary data such as function parameters, return addresses, and local variables.

Windows uses the ____.

one-to-one model

A write of a block has to access:

parity disk the disk on which the block is stored a parity block

In systems that support virtual memory, ____.

physical memory is separated from logical memory

Grand Central Dispatch handles blocks by

placing them on a dispatch queue

The index contains:

pointers to the various blocks

Memory that is dynamically allocated during a process run time

Heap

The common system bus connecting the process-memory subsystem to fast devices

PCI Bus

The scheme by which a many-to-one or many-to-many system schedules user-threads

PCS

How is disadvantage of all-or-nothing approach overcome?

Tagged architecture

System calls OS

provide(s) an interface to the services provided by an operating system.

Standard C library

provides a portion of the system call interface for UNIX and Linux.

thread library

provides an API for creating and managing threads.

A circular buffer:

writes to the end of its space and then continues at the beginning

The growing phase is a phase in which:

A transaction may obtain locks, but does not release any

Hard disk

- array of logical blocks mapped onto the hard disk is - done onto the sectors of the disk sequentially. average latency is 3 milliseconds. - Smallest unit of transfer is Block.

Worms

- use the spawn mechanism to ravage system performance -can shut down an entire network -continue to grow as the Internet expands

SSDs

-They have the same characteristics as magnetic hard disks, but can be more reliable. -They are generally more expensive per megabyte than traditional hard disks. -They have no seek time or latency.

An interrupt priority scheme can be used to ____.

-allow the most urgent work to be finished first -make it possible for high-priority interrupts to preempt the execution of a low priority interrupt -defer the handling of a low-priority interrupt without masking off all interrupts

DMA controller

000-00F

What is the numeric priority of a Windows thread in the HIGH_PRIORITY_CLASS with ABOVE_NORMAL relative priority?

14

One-third of all memory may be unused.

50-percent rule of memory fragmentation state when allocating additional memory using the first-fit method

LWP

A LWP (lightweight process) is the intermediate data structure between the user and kernel

rendezvous

A blocking send() and blocking receive() is known as rendezvous

Clustered systems

A clustered system gathers together multiple CPUs to accomplish computational work.

microkernel

A microkernel is a kernel that is stripped of all nonessential components

Child processes inherit UNIX ordinary pipes from their parent process because:

A pipe is treated as a file descriptor and child processes inherit open file descriptors from their parents.

cooperative scheduling

A process keeps the CPU until it releases the CPU, either by terminating, or by switching to the waiting state

The scheme in which the sender process and the receiver process must name the other to communicate

ALPC

advantage of compiler-based enforcement of access control

Access privileges are closely related to the linguistic concept of a data type.

Key types of access permissions

Append List

The attempt to break security

Attack

Memory register that holds the smallest, legal physical-memory address

Base register

working-set model

Based on the assumption of locality, using a moving working-set window. Prevents trashing, while allowing the highest degree of multiprogramming. References the most recent set of delta parameters

Commands to the command interpreter

Batch

Transfers between memory and disk are performed a ____.

Block at a time.

A region of fast memory that holds copies of data

Cache

Deferred

Cancellation points are associated with deferred cancellation.

The technique of terminating all child processes when a parent process terminates

Cascading

A property of peer-to-peer systems

Clients and servers are not distinguished from one another.

Allowing all running tasks to make progress

Concurrency

Assume an adaptive mutex is used for accessing shared data on a Solaris system with multiprocessing capabilities. Which of the following statements is not true?

Condition variables and semaphores are never used in place of an adaptive mutex.

Synonymous with non-preemptive scheduling

Cooperative

Which of the following statements is true?

Counting semaphores can be used to control access to a resource with a finite number of instances.

Someone attempting to breach security

Cracker

The Process Control Block is:

Data Structure

Which of the following would be an acceptable signal handling scheme for a multithreaded program?

Deliver the signal to only certain threads in the process. Deliver the signal to every thread in the process. Deliver the signal to the thread to which the signal applies.

Mechanisms

Determine how something will be done. Remain the same.

Polices

Determine what will be done. may change from place to place

An access method allowing programs to read and write records rapidly in no particular order

Direct access

SMP-type system

Each processor performs all tasks within the operating system.

Which of the following is true of multilevel queue scheduling?

Each queue has its own scheduling algorithm.

Embedded computers

Embedded computers typically run on a real-time OS

real-time

Embedded computers typically run on a real-time operating system.

What is true regarding the relative merits between access rights enforcement based solely on a kernel, as opposed to enforcement provided largely by a compiler?

Enforcement by the kernel is less flexible than enforcement by the programming language for user-defined policy.

Read-to-run machine-language program

Executable

A series of code sections that the loader can bring into memory and execute

Executable file

Global

Global replacement allows a process to select a replacement frame from the set of all frames, even if the frame is currently allocated to some other process.

Confinement problem

Guaranteeing that no information initially held in an object can migrate outside of its execution environment

Raw

I/O accesses a block device as a simple array of blocks.

A mechanism allowing the exchange of data and information between cooperating processes

IPC

A unique tag which identifies a file within the file system, in non-human-readable format

Identifier

debugger

If a program terminates abnormally, a dump of memory may be examined by a debugger to determine the cause of the problem.

flag[i]

In Peterson's solution, the flag[I] variable indicates if a process is ready to enter its critical section.

Memory Mapped Files

In Windows, it represents the shared-memory object that will enable communication between processes

dump()

Information maintenance- system call

The processes on the disk that are waiting to be brought into memory for execution

Input queue

The hardware mechanism that enables a device to notify the CPU

Interrupt

What is a long-term scheduler?

It selects which process has to be brought into the ready queue

What is a medium-term scheduler?

It selects which process to remove from memory by swapping

access matrix is a compromise between two other implementations

Lock-key

Spinlocks are:

Locks that avoid time wastage in context switches Locks that work better on multiprocessor systems CPU cycles wasting locks over critical sections of programs

Microkernels communication

Microkernels use message passing for communication

Middleware

Middleware is a set of software frameworks that provide additional services to application developers

monitor

Monitor (synchronization) In concurrent programming (also known as parallel programming), a monitor is a synchronization construct that allows threads to have both mutual exclusion and the ability to wait (block) for a certain condition to become false. Is characterized by a set of programmer defined operators

What is a principle that can improve the efficiency of I/O

Move processing primitives into hardware.

A file attribute defining the symbolic file name, in human readable format

Name

state of a process

New, Running, Waiting.

A process may transition to the Ready state by which of the following actions?

Newly-admitted process Awaiting its turn on the CPU Completion of an I/O event

When a process switches from a running state to the waiting state or when a process terminates

Nonpreemptive

Communications

One process exchanging information with another process

An OS table containing information about all open files

Open-file table

Which of the following statements is incorrect?

Operating systems provide both command line as well as graphical user interfaces.

Which of the following statements is true??

Operations on atomic integers do not require locking.

Performing more than one task simultaneously

Parallelism

chmod()

Protection- system call

chown()

Protection- system call

System calls

Provides an interface to the services provided by an OS

POSIX threads

Pthreads

The data-in register of I/O port is:

Read by host to get input

Pipes

Reading and writing to ordinary pipes on both UNIX and Windows systems can be performed like ordinary file I/O.

Suppose that a process is in "Blocked" state waiting for some I/O service. When the service is completed, it goes to the:

Ready state

techniques for passing parameters from an application to a system call.

Registers Stack Special block in memory

How does the Hardware trigger an interrupt?

Sending signals to CPU through system bus

A swap space can reside in:

Separate disk partition

An access method where the information in the file is process in order, one record after another

Sequential access

What is the problem of mutually suspicious subsystem?

Service program can malfunction and retain some rights of data provided by user

Used in UNIX to notify a process that particular event has occurred

Signal

Source code in various languages

Source code

A sequence of functions, further organized as declarations followed by executable statements

Source file

When priority scheduling results in a process that is ready to run but waiting for the CPU

Starvation

The scheme of moving a process in and out of memory

Swapping

Swapping

Swapping works in conjunction with virtual memory techniques. Some systems allow for multiple swap spaces (disks). Solaris only swaps pages of anonymous memory.

Close a file

The close() call in Unix is used to close a file. The equivalent system call in windows in CloseHandle()

Immutable file

The file name may not be reused.

layered operating system

The major difficulty in designing a layered operating system approach is appropriately defining the various layers

User interface

The method via which a user interacts with an operating system

error detection

The process by which an operating system detects and responds to errors

File-system manipulation

The process by which programs read, write, create and delete files and directories

I/O operations

The process by which the operating system manages input and output to and from a running program

Program Execution

The process of a system loading a program into memory to run

Resource allocation

The process of an OS managing the allocation of resources to multiple jobs

What is a benefit when using the slab allocator?

There is no memory fragmentation.

Hashed page table

They are a common approach for handling address spaces larger than 32 bits.

What is breach of confidentiality?

This type of violation involves unauthorized reading of data

Accounting

Tracking usage statistics for users

The surface of a magnetic disk platter is divided into:

Tracks

A code segment that tries to misuse its environment

Trojan horse

In the UNIX operating system, a domain is associated with the ____.

User

A fragment of code embedded in a legitimate program

Virus

WAFL file system

WAFL is used exclusively on networked file servers. Part of caching uses non-volatile RAM (NVRAM). Clones are similar to snapshots.

Java Protection

When a class is loaded, the JVM assigns the class to a protection domain that gives the permissions of that class.

The control register of an I/O port can be:

Written by the host to start a command or to change the mode of a device.

In a multi level directory structure:

a mechanism for directory protection will have to applied

A page fault occurs when:

a page cannot be accessed due to its absence from memory

To ensure that the hold and wait condition never occurs in the system, it must be ensured that:

a process can request resources only when it has none whenever a resource is requested by a process, it is not holding any other resources each process must request and be allocated all its resources before it begins its execution

A locality is:

a set of pages that are actively used together

Pthreads refers to ____.

a specification for thread behavior

What is compaction?

a technique for overcoming external fragmentation

What is the correct order of operations for protecting a critical section using mutex locks?

acquire() followed by release()

The wait-for graph is a deadlock detection algorithm that is applicable when:

all resources have a single instance

Buddy system

allocated from a fixed-size segment consisting of physically contiguous pages

Modules

allow operating system services to be loaded dynamically

Memory mapping

allows a portion of a virtual address space to be logically associated with a file.

Processor affinity

allows a thread to run on only one processor.

Inter process communication: (IPC)

allows processes to communicate and synchronize their actions without using the same address space

Direct access method

allows programs to read and write records in no particular order.

named pipe

allows several unrelated processes to use the pipe for communication.

Copy-on-write

allows the parent and child processes to initially share the same pages, but when either process modifies a page, a copy of the shared page is created.

The portion of the process scheduler in an operating system that dispatches processes is concerned with:

assigning ready processes to CPU

Frames

associated with the paging scheme

Signals can be emulated in windows through

asynchronous procedure calls

Signals can be emulated in windows through ____.

asynchronous procedure calls

The OpenMP #pragma omp critical directive ___________.

behaves much like a mutex lock

Transfers between memory and disk are performed a ____.

block at a time

A process can be:

both single threaded and multithreaded

By operating system, the resource management can be done via:

both time and space division multiplexing

In polling:

busy - wait cycles wait for I/O from device

stack algorithms

can never exhibit Belady's Anomaly

DMA controllers

can steal memory access cycles from the main CPU

In the reacquisition scheme for implementing the revocation of capabilities, ____.

capabilities are periodically deleted from each domain

In the reacquisition scheme for implementing the revocation of capabilities:

capabilities are periodically deleted from each domain

unified buffer cache

contains the same pages for memory-mapped IO as well as ordinary IO.

Compaction

collect free space (i.e., garbage collection) together to provide more usable space

Contiguous allocation of a file is defined by:

disk address of the first block & length

The module that gives control of the CPU to the process selected by the short-term scheduler

dispatcher

FCFS algorithm

does not take into account the current position of the disk head

An instruction that executes atomically

executes as a single, uninterruptible unit

The file name is generally split into two parts:

extension & name

The first fit and best fit algorithms suffer from:

external fragmentation

global table

implementation of an access table consists of sets of ordered triples.

The most common technique for writing multithreaded Java programs is _____.

implementing the Runnable interface and defining its run() method

One way to ensure that the circular wait condition never holds is to:

impose a total ordering of all resource types and to determine whether one precedes another in the ordering

SetTimer()

information maintenance- system call

sleep()

information maintenance- system call

distribution

is a custom build of the Linux operating system.

terminal concentrator

is a front-end processor that multiplexes the traffic from hundreds of remote terminals into one port on a large computer.

Domain capability list

is a list of objects together with the operation allowed on these objects.

storage area network

is a private network connecting servers and storage units.

A digital certificate

is a public key digitally signed by a trusted party.

source file

is a sequence of functions.

RC4

is a symmetric stream cipher.

Green threads

is a thread library for Solaris that maps many user-level threads to one kernel thread.

command interpreter

is an example of a systems program.

Ensuring there is a sufficient number of cores

is not considered a challenge when designing applications for multicore systems.

For sharable resources, mutual exclusion:

is not required

LRU

is the algorithm implemented on most systems.

banker's algorithm

is the deadlock avoidance algorithm

Execution time binding

is the method of binding instructions and data to memory performed by most general-purpose operating systems.

TLB reach

is the number of entries in the TLB multiplied by the page size.

one-to-one

model maps each user-level thread to one kernel thread.

Which table contains the information about each mounted volume?

mount table system-wide open-file table per-process open-file table

FCFS

must be non-preemptive

Reentrant

non-self-modifying code that never changes during execution

Thread pools limit the number of threads that exist at any one point, hence:

not letting the system resources like CPU time and memory exhaust

fork()

process control- system call

INIT

process is assigned as the parent to orphan processes.

Which hardware triggers some operation after certain programmed count?

programmable interval timer

segmentation

programs are divided into variable length pieces.

allow_user()

protection- system call

The two general approaches to load balancing are __________ and ____________.

push migration, pull migration

The two general approaches to load balancing are:

push migration, pull migration

degree of multiprogramming

refers to the number of processes in memory.

critical section

refers to where a process is accessing/updating shared data.

Given a start of file address, the location of any given record can be computed from its:

relative record number

The first readers-writers problem:

requires that no reader will be kept waiting unless a writer has already obtained permission to use the shared database

A tree structure

restricts the sharing of files and directories.

In MULTICS, the protection domains are organized in a

ring structure

context switch

saves the state of the currently running process and restores the state of the next process to run.

With segmentation, a logical address consists of:

segment number and offset

variable-partition

sizes for efficiency (sized to a given process' needs) The OS keeps a table of available holes.

A sense key reports on the failure of a SCSI device by:

stating the general nature of the failure

A fork system call will fail if:

the limit on the maximum number of processes in the system would be executed

A mount point is:

the location within the file structure where the file system is to be attached

The degree of multiprogramming is:

the number of processes in memory

The implementation of the LFU and the MFU algorithm is very uncommon because:

they are expensive

Instead of starting a new thread for every task to execute concurrently, the task can be passed to a:

thread pool

Each set of operations for performing a specific task is a:

transaction

A character-stream device:

transfers data a byte at a time

TLB

translation look-aside buffer. A type of cache used to hold virtual-to-physical address translation information Also, a solution that resolves slow access time to user memory location when implementing paging

Swap space management

tries to provide the best throughput for the virtual memory system

A boot block

typically only knows the location and length of the rest of the bootstrap program

Associated with every interrupt is an identification number called a(n):

vector

polymorphic

virus changes each time it is installed to avoid detection by antivirus software.

In a(n) ____ temporary queue, the sender must always block until the recipient receives the message.

zero capacity


संबंधित स्टडी सेट्स

Chapter 4: Small Business Ideas: Creativity, Opportunity, and Feasibility

View Set

ACCT 3210 Chapter 8 Preview: Inventories - Measurement

View Set

Section 18- Unit 2: License Renewal, Reactivation, Suspension, and Revocation in Pennsylvania

View Set

Chapter 4 - Network Protocols and Routing

View Set

Elsevier practice questions: Sleeping, Fluid & Electrolyte, Elimination

View Set

DRIVER KNOWLEDGE TEST QUESTIONS CLASS C (CAR) LICENCE

View Set