Operating Systems 1
c.Change of Directory
'cd' is a command in Linux/UNIX for: a.Change of Drapes b.Cancel a Directory c.Change of Directory d.Compact Disk
b. False
'makedir' is a command in Linux/UNIX for marking a directory for deleting. a.True b.False
b. False
A GUI uses scripting, commands, and command codes to carry out commands, such as opening, deleting, and moving files. a.True b.False
b. False
A blocked state is a state of a process that cannot be changed by an interrupt request. a. True b. False
a. virtual memory
A computer can address more memory than the amount physically installed on the system. This extra memory is called ________. a.Virtual Memory b.Paging c.Copying d.Cold Storage
a. True
A computer does not multitask but shares CPU time and changes process states to seem like all the programs are running. a.True b.False
b. Kernel
A computer program requests a service from the ______ of the operating system. a.GUI b.Kernel c.Command shell d.Browser
b. false
A computer running out of RAM is not a concern if memory swapping is not active a. true b. false
a. True
A kernel is a computer program that is the heart and core of an operating system. a. True b. False
a. True
A memory leak occurs when a programmer produces vast amounts of memory but fails to release any of it. a. True b. False
d. background
A process is a running program that runs specifically in the _____. a.main graphical interface b.command line interface c.web browser d.background
c. lightweight
A thread is also called a ______ process. a.heavy b.subordinate c.lightweight d.pizza
b. false
A user can delete the swap file, as it is not needed by the operating system. a. true b. false
b. False
A user can display the value of a variable using the 'printfileo' command. a.True b.False
a. pmap
A utility for finding memory leaks is ___ a. pmap b. cd c. echo d. ls
a. control the execution of processes and change states
APIs in operating systems are utilized in order to directly ______. a.control the execution of processes and change states b.manage memory c.change the color of the monitor d.manage BIOS
a. True
APIs let application programmers use functions of the computer and operating system without having to directly keep track of all the details in the CPU's operation. a. True b. False
a. True
After typing a command, the result users get would be either text information or specific action performed by the computer. a. True b. False
a. true
All memory references within a process are logical addresses that are dynamically translated into physical addresses at run time. a.True b.False
a. True
All operating systems are NOT designed specifically for their device hardware; they utilize device drivers to interact with the hardware. a. True b. False
b. False
All operating systems use the same scheduling algorithm. a.True b.False
c. RAM
Allocating too little HDD space for virtual memory can result in a computer running out of _______. a.hard drive b.swap file c.RAM d.pages
a. True
An operating system can be run within another operating system on its own if it is virtualized using a virtual machine. a.True b.False
a. True
Application programming interfaces allow developers to write applications that can run on all systems running the same operating system(s). a.True b.False
a. True
As processes are loaded and removed from memory, the free memory space is broken into little pieces. a.True b.False
b. False
At any given time, many pages of any process are in the main memory and therefore more processes can be maintained in memory. a.True b.False
d. Bourne
BASH is the GNU ______-Again shell a.Basic b.Born c.Best d.Bourne
d. CLI
Before GUI interfaces, computers used primarily a. AI b. API c. smoke signals d. CLI
c. rbtree
CFS's design does not use the old data structures for the run queues, but it uses a time-ordered ______. a.data Tree b.least Squares c.rbtree d.dtree
a. True
CPU Scheduling algorithm is an algorithm that is used to assign system resources to processes in a computing system. a.True b.False
b. False
Developers on macOS and Linux machines always use Bash every day to work with files and applications. a. True b. False
a. True
Each thread belongs to exactly one process and no thread can exist outside a process a. True b. False
a. True
FCFS is the easiest and most simple CPU scheduling algorithm a. True b. False
b. False
First in First Out (FIFO) is an algorithm that takes the last process received and executes it. a.True b.False
b. Microwave ovens
Full operating systems can be found on all devices except ______. a.Vehicles b.Microwave ovens c.Phones d.Computers
a. True
GUI combines various graphical representations, including graphic icons a. True b. False
b. False
GUI is a command-line program that relies on text inputs to perform operating system functions. a. True b. False
a. True
If a process is in an interruptable_sleep state, it is sitting and waiting for input before it continues. a. True b. False
d. decreased
If the number of processes keeps on increasing in the memory then the number of frames allocated to each process will be _______. a.increased b.stagnant c.multiplied d.decreased
a. automatically
In Java, garbage collection is the process of managing memory, _____________. a.automatically b.manually c.covertly d.quickly
b. false
In Longest Running Time First, the process with the shortest run time has an advantage. a. true b. false
b. False
LILO is a method of scheduling in operating systems for processor scheduling. a. True b. False
a. True
Linux is a type of operating system. a. True b. False
a. dirty
Linux reuses the written pages and synchronizes the file contents on the device with the latest data when they are marked ___ a. dirty b. clean c. corrupt d. disorganized
b. RAM
Memory Leaks occur in the ________. a.hard drive b.RAM c.cache d.tape drive
a. True
Memory compaction addresses memory fragmentation issues. a.True b.False
b. False
Memory leaks do not affect embedded systems. a.True b.False
d. swap file
Memory stored on the hard drive when not being used currently is called: a.Junk Data b.Bad Memory c.Old Memory d.Swap file
b.Non-Uniform Memory Access
NUMA stands for ________. a.National Underwater Marine Agency b.Non-Uniform Memory Access c.New Universal Memory Accessory d.Non-Universal Memory Access
d. Info coming out of speakers
Operating systems cover all operations directly except ______. a.Processor management b.Memory management c.Application interface d.Information coming out of speakers
b. False
Operating systems do NOT govern the input/output device data. a. True b. False
b. soft drives
Operating systems utlize mostly___ a. hard drives b. soft drives c. RAM d. Flash Drive
c. compaction
Placing free memory together into a large block is called ________. a.Shrinkage b.Linking c.Compaction d.Garbage Collection
b. Windows
PowerShell can work on all major operating systems but is mainly designed for: a.Mac b.Windows c.Linux d.Unix
b. false
Powershell can be utilized on any major operating system. a. true b. false
b. memory leaks
Running a computer for long periods without rebooting can cause _____. a.errors b.memory leaks c.RAM fracturing d.buffer overrun
b. False
Scripting does not allow for an automatic command execution that would otherwise be executed interactively one by one. a.True b.False
b. False
Shell is a user interface responsible for processing all commands typed on GUI a. True b. False
c. thread local area
Small objects are stored in _______, which is a free chunk of the heap. a.Bootloader b.Object Location c.Thread Local Area d.Master Allocation Table
b. False
Swap memory is the dedicated amount of RAM that is used whenever a Hard Drive runs out of memory. a.True b.False
b. false
The Completely Unfair Scheduler is the chosen scheduler method for Linux. a. true b. false
b. False
The OOM killer selects a processor to sacrifice for the sake of the overall system's health. a. True b. False
c. MS-DOS
The following popular operating systems all use GUI except ___ a. Windows b. Mac Os c. MS-DOS d. Linux
b. mouse
The invention of a ___ marked the beginning of the point-and-click method as a new way to interact with the computer. a. terminal b. mouse c. keyboard d. virtual reality
a. True
The longest job first (LJF) algorithm is the non-preemptive version based on the burst time of the processes. a.True b.False
a. True
The name of Round-Robin Scheduling algorithm comes from the round-robin principle, where each person gets an equal share of something in turn. a.True b.False
b. False
The number of operating systems that can be virtualized on a system is unlimited. a.True b.False
a. True
The operating system creates an illusion of virtualizing the CPU. a.True b.False
b. quantum
The period of time for which a process or job is allowed to run in a pre-emptive method is called time ________. a.referendum b.quantum c.minute d.cycle
a. True
The physical memory in a computer system is a limited resource. a.True b.False
a. True
The swap memory is utilized in both Linux and Windows systems. a.True b.False
a. arrival
The time at which any process arrives in a ready queue is ___ time. a. arrival b. burst c. completion d. waiting
c. swap partitions and swap files
The two types of swap memory include: a. swap pages and swap docs b. swap pages and swap shards c. swap partitions and swap files d. swap partitions and swap codes
.b. False
There are 10 process states in a Linux operating system. a. True b. False
a. True
Threads provide a way to improve application performance through parallelism. a.True b.False
d. burst
Time required by the CPU for the execution of a process is called _______ time. a.Completion b.Waiting c.Response d.Burst
d. RAM
Virtual memory frees up ______ by swapping data that has not been used recently over to a storage device, such as a hard drive or solid-state drive (SSD). a.processes b.threads c.electricity d.RAM
b. False
Virtual memory is NOT a common technique used in a computer's operating system (OS). a.True b.False
b. False
Waiting Time is the time difference between completion time and arrival time. a.True b.False
b. False
Waiting Time is the time difference between completion time and arrival time. a. True b. False
a. SIMD
What can be either fine-grained or coarse-grained? a.SIMD b.SIMS c.GUI d.RAM
c. df
What command will show you information on your filesystem? a.cd b.echo c.df d.ls
a. paint
What is NOT a major component of a modern operating system? a. Paint b. GUI c. command shell d. kernel
a. True
When a process is busy swapping pages in and out the situation is called thrashing. a.True b.False
c. system call
When a process makes a request to the kernel, this is called. a. long distance call b. interrupt request c. system call d. memory call
b. False
When the CPU is free, and its resources are NOT available, then the CPU must select a process from the ready queue and allocate resources for its execution. a.True b.False
b. Last in First Out
Which is NOT a CPU scheduling algorithm? a.First Come First Serve b.Last in First Out c.Shortest Job First d.Priority Scheduling
d. Open
Which is a system call for Linux? a.Update b.Delete c.Run d.Open
d. data in a spreadsheet
Which of the following does an operating system NOT handle directly? a.Memory b.System time c.Processes running d.Data in a spreadsheet
b. GUI
Which of the following is a part of an operating system? a. Spreadsheets b. GUI c. Microsoft Office
b. swap files
While copying virtual memory into physical memory, the OS divides memory with a fixed number of addresses into either page files or _______. a.boot sectors b.swap files c.file systems d.RAM
d. virtual
With virtual memory, each and every memory access uses a _______ address. a.static b.bootloader c.primary d.virtual
c. check your email
You can do all the below except what to increase memory (RAM) if your Mac OS is slow? a. reboot b. force quit applications c. check your email d. check for memory leaks
b. round robin
___ is a premptive scheduling algorithm in which each process is given a time. a. shortest remaining time b. round robin c. priority scheduling d. runtime
b. priority
___ scheduling is a method of scheduling processes based on importance. a. Lease b. priority c. immediate d. Kernel
c. preemptive
_____ scheduling algorithm is used if there is a process switching from the running state to the ready state or from the ready state to the waiting state. a.CPU b.Efficient c.Preemptive d.Best Fit
d. buffer
_______ overruns—caused by writing past the end of a block of allocated memory—frequently corrupt memory. a.Leak b.Pattern c.SQL d.Buffer
c. virtual
_________ memory is a common technique used in an operating system. a.Random b.Augmented c.Virtual d.Hard