Exam 3 Operating System

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Carrier sense multiple access (CSMA) is a ____-based protocol. a. detection b. round robin c. contention d. reservation

...

High-speed LANs have a data rate that varies from 100 megabits per second to more than ____ per second. a. 1000 megabits b. 20 gigabits c. 40 gigabits d. 100 gigabits

...

In the ____ approach, the destination and sequence number of the packet are added to the information uniquely identifying the message to which the packet belongs; each packet is then handled independently and a route is selected as each packet is accepted into the network. a. telegram b. virtual circuit c. physical circuit d. datagram

...

In the ____ topology, hosts are connected to one another in a linear fashion. a. star b. ring c. bus d. gateway

...

The RAID level ____ uses word parity for error correction. a. 1 b. 3 c. 5 d. 6

...

To put data on an optical disc requires a high-intensity laser beam, which burns indentations, called pits, and flat areas, called ____. a. lands b. lakes c. hills d. valleys

...

When using a bus topology, ____ site(s) can successfully send a message at a time. a. 1 b. 10 c. 100 d. an unlimited number of

...

____ is a popular option for still images and ____ for video images a. JPEG, VPEG b. JPEG, MPEG c. ISO, CGI d. ANSI, MPEG

...

A RAID Level ____ system consists of a Level 1 system mirrored to a second Level 1 system, both controlled by a single Level 0 system. a. 01 b. 03 c. 10 d. 30

10

Without DMA, the ____ is responsible for the physical movement of data between main memory and the device. a. bus b. disk c. CPU d. memory controller

CPU

____ devices are assigned to only one job at a time. a. Shared b. Static c. Virtual d. Dedicated

Dedicated

____ are special files with listings of filenames and their attributes. a. Directories b. Databases c. Data files d. Programs

Directories

A MAN is a high-speed network often configured using a physical ring topology

F

A file descriptor usually contains only a file name and the directory name in which the file is located

F

A record is a group of related bytes that can be identified by the user with a name, type, and size.

F

A token-passing network always uses a star topology.

F

Addressing protocols are normally unrelated to the network topology and geographic location of each site.

F

Each volume can only contain a single file.

F

Examples of batch commands are CREATE, DELETE, RENAME, and COPY.

F

In a bus topology, devices are physically connected by means of cables that run between them, and the cables pass through a centralized controller mechanism called the bus.

F

In a file management system, information is passed from the Device Manager at the top of the hierarchy to the File Manager at the bottom.

F

Most RAID configurations require fewer disk drives, which decreases hardware costs

F

Packet switching is very similar to circuit switching.

F

RAID is a set of logical disk drives that is viewed as a single physical unit by the operating system

F

RAID-0 is ideal for data-critical real-time systems

F

The Internet layer is equivalent to the data link layer of the OSI model.

F

The SCAN algorithm moves the arm methodically from the inner to the outer track, servicing every request in its path.

F

The advantage of RAID Level 3 is that if any one drive fails, data can be restored using the bits in the parity disk.

F

The computer system defines a file by activating the appropriate secondary storage device and loading the file into memory while updating its records of who is using what file

F

The tree topology is a collection of rings.

F

Two of the most important measures of optical disc drive performance are sustained data-transfer rate and longest access time.

F

Typically, a host at one site, called the client, has resources that a host at another site, called the server, wants to use

F

When a user gives a command to modify the contents of a file, it's actually a command to access folders within the file.

F

When using DMA, the CPU is involved in transferring data to and from memory for the entire transfer.

F

When using RIP the entire table is updated only when changes have occurred; this decreases internetwork traffic and positively affects the delivery of messages

F

The job of the I/O control unit is to keep up with the I/O requests from the CPU and pass them down the line to the appropriate control unit

False

A ____ is typically a cluster of personal computers or workstations located in the same general area. a. LAN b. WAN c. MAN d. PAN

LAN

____ contain instructions and data files contain data; but as far as storage is concerned, the File Manager treats them exactly the same way. a. Records b. Directories c. Program files d. Folders

Program files

___ is a way to optimize search times by ordering the requests once the read/write heads have been positioned. a. LOOK and SCAN b. SSTF c. Rotational ordering d. C-SCAN

Rotational ordering

The I/O ____ allocates the devices, control units, and channels. a. director b. scheduler c. traffic controller d. device handler

SCHEDULER

____ uses the same underlying philosophy as shortest job next, where the shortest jobs are processed first and longer jobs are made to wait. a. LOOK b. SSTF c. SCAN d. FCFS

SSTF

In the OSI model, Layer ____ provides the interface to users and is responsible for formatting user data before passing it to the lower layers for transmission to a remote host. a. Three b. Four c. Six d. Seven

Seven

Which characteristic is true of packet switching? a. Easily overloaded b. Reduced line efficiency c. Shared by many transmissions d. Preferred in low volume networks

Shared by many transmissions?

A WLAN typically poses security vulnerabilities because of its open architecture and the inherent difficulty of keeping out unauthorized intruders.

T

A common goal of all networked systems is to provide a convenient way to share resources while controlling users' access to them.

T

A router is an internetworking device, primarily software driven, which directs traffic between two different types of LANs or two network segments with different protocol addresses.

T

A subdirectory is created when a user opens an account to access the computer system

T

Circuit switching is a communication model in which a dedicated communication path is established between two hosts.

T

Data in a fixed-length field might include a short name followed by many blank characters; it can be replaced with a variable-length field and a special code to indicate how many blanks were truncated.

T

Directories are special files with listings of filenames and their attributes

T

Each unit in the I/O subsystem can finish its operation independently from the others.

T

Ethernet is the most widely known CSMA/CD protocol.

T

First-come, first-served (FCFS) is the simplest device-scheduling algorithm.

T

Many systems force users to have their files organized for fixed-length records if the records are to be accessed directly.

T

The File Manager is in charge of the system's physical components, its information resources, and the policies used to store and distribute the files

T

The File Manager keeps track of the empty storage areas by treating them as files.

T

The IEEE standard 802.11b is not compatible with 802.11g.

T

The physical topology of a network may not reflect its logical topology.

T

The relative filename is the name that is selected by the File Manager when the file is created.

T

The universal serial bus (USB) controller acts as an interface between the operating system, device drivers, and applications and the devices that are attached via the USB host.

T

When someone creates a folder, the system creates a subdirectory in the current directory or folder.

T

When using the distributed-queue, dual bus (DQDB) protocol, transmission on each bus consists of a steady stream of fixed-size slots.

T

Without the File Manager, every program would need to include instructions to operate all of the different types of devices, and all of the different models within each type.

T

The primary disadvantage of contiguous storage is that ____. a. it is hard to implement and manage b. it is an inefficient use of space c. it is difficult to find information in files d. a file can't be expanded unless there is empty space available immediately following it

a file can't be expanded unless there is empty space available immediately following it

The most commonly used access control scheme is the ____. a. access control matrix b. capability list c. access control list d. capability matrix

access control list

When deciding which configuration to use, designers should keep in mind four criteria: ____. a. basic cost, scalability, reliability, and user's environment b. basic cost, communications cost, reliability, and user's environment c. equipment cost, time to implement, reliability, and scalability d. equipment cost, time to implement, throughput, and security

basic cost, communications cost, reliability, and user's environment

When using a ring topology, a ____ can be used to connect to another network. a. bridge b. star c. central controller d. router

bridge

A ____ is a group of related records that contains information to be used by specific application programs to generate reports. a. field b. record group c. directory d. file

file

Many computer users and some operating systems call subdirectories ____. a. databases b. volumes c. folders d. files

folders

There are ____ layers in the TCP/IP model. a. two b. four c. seven d. ten

four

In the TCP/IP model, the ____ layer is equivalent to the transport and session layers of the OSI model. a. network access b. Internet c. host-host d. process/application

host-host

In the address [email protected], the host name in this address is ____. a. lis b. pitt c. someone d. icarus

icarus

The purpose of an extension is to ____. a. identify the type of file b. identify the directory in which the file is stored c. identify the file owner d. identify the file size

identify the type of file?

The advent of optical discs was made possible by developments in ____ technology.

laser

The File Manager uses the address of the ____ to access the next sequential record. a. index record b. first byte in the file c. first byte read d. last byte read

last byte read

Data compression algorithms consist of two types: ____. a. condensed and expanded b. lossless and lossy c. text and audio d. noisy and clean

lossless and lossy

The data-transfer rate for an optical disc is measured in ____ per second and refers to the speed at which massive amounts of data can be read from the disc. a. kilobytes b. megabytes c. gigabytes d. terabytes

megabytes

In indexed storage, when a file is created, the pointers in the index block are all set to ____. a. null b. zero c. the beginning of the volume d. the end of the volume

null

Movable-head magnetic disks, such as the computer hard drive, have ____ read/write head(s). a. zero b. one c. two d. four

one

In the OSI transport protocol model, Layer Six is ____. a. presentation b. network c. physical d. application

presentation?

A ____ is the specific set of rules used to control the flow of messages through the network. a. topology b. configuration c. protocol d. system

protocol

A ____ is an internetworking device, primarily software driven, which directs traffic between two different types of LANs or two network segments with different protocol addresses. a. router b. gateway c. bridge d. bus

router

Of the three components of access time in a movable-head DASDs, ____ is the longest. a. delay time b. search time c. seek time d. transfer time

seek time

On magnetic disks, files can be organized in one of three ways; ____. a. indexed direct, indexed indirect, or random b. sequential, random, or indirect c. sequential, direct, or indexed sequential d. sequential, indirect, or direct

sequential, direct, or indexed sequential

Usually, the term "____" indicates a specific location in a network containing one or more computer systems. a. remote b. host c. node d. site

site

A ____ is created when a user opens an account to access the computer system. a. MFD b. subdirectory c. volume d. directory

subdirectory

The geometric arrangement of connections (cables, wireless, or both) that link the nodes is called a ____. a. topology b. map c. layout d. physical network

topology

In a fixed-head magnetic disk, each circle is called a ____. a. platter b. block c. track d. sector

track

When using RIP, the path ____ is chosen. a. that is most secure b. with the shortest response time c. with the fastest server d. with the smallest number of hops

with the smallest number of hops

As long as users refer to files in the ____ directory, they can access their files without entering the complete name from the highest level to the lowest. a. working b. default c. home d. root

working


Set pelajaran terkait

What is Human communication? Vocabulary

View Set

Global Geography Book Questions exam 1, geog 100

View Set

Cyber Awareness 2022 Knowledge Check

View Set

TEAS Practice English Questions

View Set

Unit 3- Unit Rates & Percents Assessment

View Set