Chap 2- Multiple Choice

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

__________ is concerned with the proper verification of the identity of users and the validity of messages or data. A) Availability B) Confidentiality C) Authenticity D) Data integrity

Authenticity

One of the first time-sharing operating systems to be developed was the __________ . A) Compatible Time-Sharing System B) Real Time Transaction System C) Multiple-Access System D) Multiprogramming Operation System

Compatible Time-Sharing System

A(n) __________ is a set of resources for the movement, storage, and processing of data and for the control of these functions. A) architecture B) program C) computer D) application

Computer

The key to the success of Linux has been its character as a free software package available under the auspice of the ___________ . A) World Wide Web Consortium B) Free Software Foundation C) Berkeley Software Distribution D) GNU Public License

Free Software Foundation

The __________ is the interface that is the boundary between hardware and software. A) ABI B) ISA C) IAS D) API

ISA

Hardware features desirable in a batch-processing operating system include memory protection, timer, privileged instructions, and __________ . A) clock cycles B) associated data C) interrupts D) kernels

Interrupts

A special type of programming language used to provide instructions to the monitor is __________ . A) FPL B) JCL C) DML D) SML

JCL

__________ is where the OS must prevent independent processes from interfering with each other's memory, both data and instructions. A) Support of modular programming B) Process isolation C) Automatic allocation and management D) Protection and access control

Protection and access control

A user program executes in a __________ , in which certain areas of memory are protected from the user's use, and in which certain instructions may not be executed. A) kernel mode B) user mode C) task mode D) batch mode

User mode

The operating system's __________ refers to its inherent flexibility in permitting functional modifications to the system without interfering with service. A) efficiency B) ability to evolve C) controlled access D) convenience

ability to evolve

The __________ is the internal data by which the OS is able to supervise and control the process. A) executable program B) associated data C) nucleus D) execution context

execution context

Operating systems must evolve over time because: A) new hardware is designed and implemented in the computer system B) hardware must be replaced when it fails C) hardware is hierarchical D) users will only purchase software that has a current copyright date

new hardware is designed and implemented in the computer system

A common strategy to give each process in the queue some time in turn is referred to as a __________ technique. A) multithreading B) round-robin C) time slicing D) serial processing

round-robin

The technique where a system clock generates interrupts, and at each clock interrupt the OS regains control and assigns the processor to another user, is __________ . A) time slicing B) multithreading C) round robin D) clock cycle

time slicing

Multiprogramming operating systems are fairly sophisticated compared to single-program or _________ systems. A) uniprogramming B) time-sharing C) multitasking D) memory management

uniprogramming


संबंधित स्टडी सेट्स

ATI FLUID & ELECTROLYTE IMBALANCES

View Set

Computer Networks and the Internet

View Set

CH 18- Open Economy Macroeconomics: Basic Concepts

View Set

Certified Ethical Hacker 312-50v11 EXAM STUDY

View Set

HIS 101 - US History 1 All Quizez

View Set

Control of Microbial Growth Ch. 7

View Set