Final Exam

Ace your homework & exams now with Quizwiz!

The _________ is the internal data by which the OS is able to supervise and control the process.

execution context

A ________ resource is one that can be created and destroyed.

consumable

________ is the traditional method of implementing access control. A) MAC B) RAC C) DAC D) RBAC

C

The operating system must make ________ types of scheduling decisions with respect to the execution of processes.

3

The processor itself is not a resource so the OS is not involved in determining how much of the processor time is devoted to the execution of a user program.

FALSE

The size of virtual storage is limited by the actual number of main storage locations.

FALSE

T/F: Records may only be of fixed length.

False

Windows supports two sorts of RAID configurations: Software RAID and ________ .

Hardware RAID

The decision as to which process' pending I/O request shall be handled by an available I/O device:

I/O scheduling

T/F: An OS associates a set of privileges with each process

True

__________ is a shared-nothing cluster, in which each disk volume and other resources are owned by a single system at a time.

Windows Failover clustering

The ___________ is a device for staging the movement of data between main memory and processor registers to improve performance and is not usually visible to the programmer or processor.

cache

When one process spawns another, the spawned process is referred to as the ______________.

child process

When more than two buffers are used, the collection of buffers is itself referred to as a __________, with each individual buffer being one unit.

circular buffer

A closed chain of processes exists, such that each process holds at least one resource needed by the next process in the chain is the condition of __________.

circular wait

The ____________ condition can be prevented by defining a linear ordering of resource types.

circular wait

A ________ is an individual who seizes supervisory control of the system and uses this control to evade auditing and access controls or to suppress audit collection.

clandestine user

The essential aspects of a __________ are that the relationships that exist among elements of data are explicit and designed for use by a number of different applications

database

A situation in which two or more processes are unable to proceed because each is waiting for one of the others to do something is a ____________.

deadlock

Three general approaches exist for dealing with deadlock: prevent, avoid, and ______.

detect

The __________ condition can be prevented by requiring that a process request all of its required resources at one time and blocking the process until all requests can be granted simultaneously.

hold and wait

Three conditions of policy must be present for a deadlock to be possible: mutual exclusion, no preemption, and ________.

hold and wait

A VMM is commonly known today as a ________

hypervisor

A way to overcome the problem of blocking threads is to use a technology referred to as __________, which converts a blocking system call into a nonblocking system call.

jacketing

The goal of a __________ is to provide a runtime space for a set of Java code to run on any operating system staged on any hardware platform, without needing to make code changes to accommodate the different operating systems or hardware.

java virtual machine

A _______ is an actual location in main memory

physical address

Which scheduling policy allows the OS to interrupt the currently running process and move it to the Ready state?

preemptive

One mechanism Intel uses to make its caches more effective is ________, in which the hardware examines memory access patterns and attempts to fill the caches speculatively with data that is likely to be requested soon.

prefetching

A ____________ occurs when multiple processes or threads read and write data items so that the final result depends on the order of execution of instructions in the multiple processes.

race condition

A situation in which multiple threads or processes read and write a shared data item and the final result depends on the relative timing of their execution is a ___________ .

race condition

A _______ is a particular example of logical address in which the address is expressed as a location relative to some known point, usually a value in a processor register.

relative address

The essence of the _________ technique is to allow programs on different machines to interact using simple procedure call/return semantics, just as if the two programs were on the same machine.

remote procedure call (RPC)

The _________ chooses which block to replace when a new block is to be loaded into the cache and the cache already has all slots filled with other blocks.

replacement algorithm

With ________ a process has complete control of the system and can add or change programs and files, monitor other processes, send and receive network traffic, and alter privileges.

root access

A common strategy to give each process in the queue some time in turn is referred to as a ___________ technique.

round robin

Countermeasures to defend systems against attacks can be classified into two categories: compile-time defenses and ________.

run-time defenses

In a system employing a segmentation scheme for memory management wasted space is due to _______________.

external fragmentation

The restoration of applications and data resources to the original system once it has been fixed is referred to as __________ .

failback

The strategy that schedules processes based on their group affiliation is generally referred to as ___________.

fair share scheduling

The main benefit of the ________ model is that it takes advantage of desktop power, offloading application processing from servers and making them more efficient and less likely to be bottlenecks.

fat client

Once the processes have progressed into the _________, those processes will deadlock.

fatal region

A scheduling mechanism that requires no prior knowledge of process length, yet can nevertheless favor shorter jobs, is known as the _________ scheduling mechanism.

feedback

Instruction processing consists of two steps:

fetch and execute

The _________ determines when a page should be brought into main memory.

fetch policy

The _________ tables provide information about the existence of files, their location on secondary memory, their current status, and other attributes.

file

The physical organization of the file on secondary storage depends on the blocking strategy and the __________ strategy.

file allocation

An objective of the __________ is to meet the data management needs and requirements of the user, which include storage of data and the ability to perform related operations.

file management system

The _________ layer deals with the logical structure of files and with the operations that can be specified by users, such as open, close, read, and write.

file system

The design goals for a ________ are: acts as a choke point, enforces the local security policy, is secure against attacks.

firewall

The simplest scheduling policy is __________.

first come first served

The simplest form of scheduling is ___________ scheduling, which processes items from the queue in sequential order.

first in first out

The default scheduler in TinyOS is a simple __________ queue.

first in first out (FIFO)

Main memory divided into a number of static partitions at system generation time is ____________.

fixed partitioning

A ________ is a fixed length block of main memory.

frame

The page table for each process maintains _________.

frame location for each page of the process

Available chunks of memory are known as __________.

frames

An example of __________ is an I/O processor.

functionally specialized processors

The __________ approach is a set of related threads scheduled to run on a set of processors at

gang scheduling

A good way of characterizing multiprocessors and placing them in context with other architectures is to consider the synchronization __________ , or frequency of synchronization between processes in a system.

granularity

A __________ is one that must meet its deadline, otherwise it will cause unacceptable damage or a fatal error to the system.

hard real-time task

An operating system in a virtual machine accesses the resource that is presented to it by the Virtual Machine Monitor or _________ .

hypervisor

When multiple VMs are contending for a processor, the ________ acts as the traffic controller, scheduling processor time for each VM's request as well as directing the requests and data to and from the virtual machines.

hypervisor

The __________ class is intended for applications that will only consume processor time when no other threads are ready to execute.

idle user

In the case of _______, messages are not sent directly from sender to receiver but rather are sent to a shared data structure consisting of queues that can temporarily hold messages.

indirect addressing

An _________ is a control structure that contains the key information needed by the operating system for a particular file.

inode (index node)

The processing required for a single instruction is called a(n) _________ cycle.

instruction

A thread is considered to be _________ if the ratio of its voluntary sleep time versus its runtime is below a certain threshold.

interactive

The _______ is the collection of program, data, stack, and attributes defined in the process control block.

process image

The collection of program, data, stack, and attributes is referred to as the _________.

process image

When the OS creates a process at the explicit request of another process, the action is referred to as _________.

process spawning

The aim of ________ is to assign processes to be executed by the processor or processors over time, in a way that meets system objectives, such as response time, throughput, and processor efficiency.

processor scheduling

The process control block information can be grouped into three general categories: Process identification, ________, and process control information.

processor state information

Two essential elements of a process are ________ and a set of data associated with that code.

program code

For __________ scheduling, the highest-priority task is the one with the shortest period, the second highest-priority task is the one with the second shortest period, and so on.

rate monotonic

Linux provides three types of semaphore facilities in the kernel: binary semaphores, counting semaphores, and ________.

reader-writer semaphores

The __________ allows multiple threads to have simultaneous read-only access to an object protected by the lock.

readers/writer lock

The ___________ scheduler executes most frequently and makes the fine-grained decision of which process to execute next.

short term

The decision as to which available process will be executed by the processor: _______________

short term scheduling

A _________ is a software mechanism that informs a process of the occurrence of asynchronous events.

signal

Main memory divided into a number of equal size frames is the _____________ technique.

simple paging

With ________ a process is loaded by loading all of its segments into dynamic partitions that need not be contiguous.

simple segmentation

The traditional approach of a single thread of execution per process, in which the concept of a thread is not recognized, is referred to as a ______________.

single-threaded approach

A _________ has an associated deadline that is desirable but not mandatory

soft real-time task

The processor itself provides only limited support for multiprogramming, and _______ is needed to manage the sharing of the processor and other resources by multiple applications at the same time.

software

The term _________ refers to a technique in which a process can do nothing until it gets permission to enter its critical section but continues to execute an instruction or set of instructions that tests the appropriate variable to gain entrance.

spin waiting

A __________ is a mutual exclusion mechanism in which a process executes in an infinite loop waiting for the value of a lock variable to indicate availability

spinlock

The most common technique used for protecting a critical section in Linux is the ____________.

spinlock

A special type of address register required by a system that implements user visible stack addressing is called a ______.

stack pointer.

A situation in which a runnable process is overlooked indefinitely by the scheduler, although it is able to proceed, is ____________.

starvation

In the case of competing processes three control problems must be faced: mutual exclusion, deadlock, and _________.

starvation

The ________ of the system reflects the current allocation of resources to processes.

state

A __________ transfers data in and out as a stream of bytes, with no block structure.

stream-oriented device

A set of logically consecutive strips that maps exactly one strip to each array member is referred to as a __________ .

stripe

A semaphore whose definition includes the policy that the process that has been blocked the longest is released from the queue first is called a __________ semaphore.

strong

Registers that are used by system programs to minimize main memory references by optimizing register use are called ________.

user-visible registers

A __________ policy allows the number of page frames allocated to a process to be varied over the lifetime of the process.

variable allocation

With coarse and __________ grained parallelism, there is synchronization among processes, but at a very gross level.

very course

The address assigned to a location in virtual memory to allow that location to be accessed as though it were part of main memory is the ___________.

virtual address

__________ is the virtual storage assigned to a process.

virtual address space

The _________ , or hypervisor, abstracts the physical hardware from the virtual machines it supports.

virtual machine monitor

_________ is the storage allocation scheme in which secondary memory can be addressed as though it were part of main memory.

virtual memory

The _________ accepts requests for access and configuration from a client and enforces the lock on the underlying resource.

Arbiter

__________ is concerned with the proper verification of the identity of users and the validity of messages or data.

Authenticity

A _________ is a legitimate user who accesses data, programs, or resources for which such access is not authorized, or who is authorized for such access but misuses his or her privileges. A) superuser B) misfeasor C) masquerader D) clandestine user

B

A _________ is the basic element of data. A) database B) field C) file D) record

B

A __________ is an individual who seizes supervisory control of the system and uses this control to evade auditing and access controls or to suppress audit collection. A) misfeasor B) clandestine user C) superuser D) masquerader

B

A standard Java compiler turns source code into bytecode, which is then compiled into a _______ file that the Dalvik VM can read and use. A) .jar B) .dex C) .apk D) .class

B

An objective of the __________ is to provide a standardized set of I/O interface routines to user processes. A) working directory B) file management system C) indexed file allocation D) file directory

B

As a result of _________ , common functions can be used by different departments internally and by external business partners as well. A) middleware B) service-oriented architecture C) RPC D) XLM

B

First-come-first-serve (FCFS) is a simple scheduling policy that tends to favor I/O bound processes over processor bound processes.

FALSE

First-come-first-serve (FCFS) performs much better for short processes than long ones.

FALSE

For efficiency, applications should be written directly for a given hardware platform.

FALSE

User control is generally much broader in an ordinary operating system than in a real-time operating system.

False

With independent parallelism there is an explicit synchronization among processes.

False

The ________ is a layer of software between the applications and the computer hardware that supports applications and utilities.

OS

The Clouds operating system implements the concept of a thread as primarily an entity that can move among address spaces which represents the ___________ Thread-to-Process relationship.

One-to-Many

________ is a software-assisted virtualization technique that uses specialized APIs to link virtual machines with the hypervisor to optimize their performance.

Paravirtualization

_____ occurs when circumstances within the system force a higher-priority task to wait for a lower-priority task.

Priority inversion

________ is where the OS must prevent independent processes from interfering with each other's memory, both data and instructions.

Process isolation

________ is the time required to execute the task to completion.

Processing time

The four main structural elements of a computer system are:

Processor, Main Memory, I/O Modules and System Bus

The ___________ holds the address of the next instruction to be fetched.

Program Counter

A Control/Status register that contains the address of the next instruction to be fetched is called the ____________.

Program Counter (PC)

The _________ is a point-to-point link electrical interconnect specification that enables high-speed communications among connected processor chips.

QPI

_________ controls access based on the roles that users have within the system and on rules stating what accesses are allowed to users in given roles.

RBAC (role based access control)

A process in the _______ state is in main memory and available for execution.

Ready

The key states for a thread are: Running, ________, and Blocked.

Ready

______ is the time at which a task becomes ready for execution.

Ready time

When a process is in the ________ state it is in secondary memory but is available for execution as soon as it is loaded into main memory.

Ready/Suspended

______ computing is defined as that type of computing in which the correctness of the system depends not only on the logical result of the computation but also on the time at which the results are produced.

Real-time

________ defenses aim to detect and abort attacks in executing programs.

Runtime

A risk with __________ is the possibility of starvation for longer processes, as long as there is a steady supply of shorter processes.

SPN

In the case of the _________ policy, the scheduler always chooses the process that has the shortest expected remaining processing time.

SRT (Shortest Remaining Time)

The earliest computers employed _________ processing, a name derived by the way the users have access to the systems.

Serial

The ________ component mediates data exchange between the client and the underlying resource.

Shared resource

The need to know or estimate required processing times for each process, the starvation of longer processes, and the lack of preemption are all difficulties with the __________ scheduling technique.

Shortest Process Next (SPN)

_________ is a scheduling policy in which the process with the shortest expected processing time is select next, and if a shorter process becomes ready in the system, the currently running process is preempted.

Shortest Remaining Time (SRT)

The __________ policy is to select the disk I/O request that requires the least movement of the disk arm from its current position.

Shortest service time first

_________ is a good example of an OS using a combined user-level and kernel-level thread approach.

Solaris

There are four basic thread operations associated with a change in thread state: Block, Unblock, Finish, and ________.

Spawn

________ is a compressed, read-only file system that was designed for use on low memory or limited storage size environments such as embedded Linux systems.

Squashfs

A system bus does not transfer data between the computer and its external environment.

TRUE

A useful tool in characterizing the allocation of resources to processes is the resource allocation graph.

TRUE

All deadlocks involve conflicting needs for resources by two or more processes.

TRUE

All processor designs include a register or set of registers, often known as the program status word, which contains status information.

TRUE

T/F: The sequential file organization is the only one that is easily stored on tape as well as disk.

True

T/F: The superuser is exempt from the usual file access control constraints and has system wide access

True

T/F: The superuser is exempt from the usual file access control constraints and has systemwide access.

True

T/F: There are currently more virtual servers deployed in the world than physical servers.

True

T/F: To deal with timing constraints the kernel maintains a real-time clock.

True

T/F: Two of the most widely used approaches to improve disk I/O performance are disk scheduling and disk cache.

True

T/F: Typically, the only way that a user or application may access files is through the file management system.

True

T/F: VMM allows multiple VMs to safely coexist on a single physical server host and share that host's resources.

True

T/F: Virtual Machine technologies are also used in desktop environments to run multiple operating systems.

True

T/F: Virtual machines are hosted via the infrastructure services in the VMkernel

True

T/F: Virtual machines are made up of files.

True

T/F: Virtualization technology enables a single PC or server to simultaneously run multiple operating systems or multiple sessions of a single OS.

True

T/F: Virtually all application processing may be done at the client, with the exception of data validation routines and other database logic functions that are best performed at the server.

True

T/F: Worms and bot programs are self-contained programs that can be scheduled and run by the operating system.

True

T/F: You should stage and validate all patches on test systems before deploying them in production.

True

The operating system, and in particular the scheduler, is perhaps the most important component of a real-time system.

True

VMware Workstation and Oracle VM Virtual Box are examples of ________ hypervisors.

Type-2

The two basic types of processor registers are:

User-visible and Control/Status

Linux makes use of a __________ , which presents a single, uniform file system interface to user processes.

Virtual file system

A ________ is a software construct that mimics the characteristics of a physical server.

Virtual machine

The __________ is responsible for all file I/O initiation and termination.

basic I/O supervisor

The _________ is a simple, read-only file system that is designed to minimize size by maximizing the efficient use of underlying storage.

cramfs

__________ is a section of code within a process that requires access to shared resources and that must not be executed while another process is in a corresponding section of code.

critical section

T/F: Windows has no way to support the encryption of entire volumes.

False

A signal is similar to a hardware interrupt but does not employ priorities.

TRUE

The OS may create a process on behalf of an application.

TRUE

T/F: The procedure call is used for access to remote services.

True

Ring _______ is the most trusted layer and is where the operating system kernel works and can interact directly with hardware.

0 (zero)

A windows process must contain at least ________ thread(s) to execute.

1

A total of _________ process states are recognized by the UNIX SVR4 operating system.

9

A ________ hypervisor has much better performance characteristics than the Type-2 hypervisor. A) Type-1 B) Type-3 C) Type-4 D) Type-5

A

A __________ is a collection of similar records. A) file B) database C) record D) field

A

A __________ is a dedicated computer that interfaces with computers outside a network and has special security precautions built into it in order to protect sensitive files on computers within the network. A) firewall B) ACL C) matrix D) guard

A

A networked information requester, usually a PC or workstation, that can query database and/or other information from a server is a(n) _________ A) client B) cluster C) API D) SQL

A

Effective _________ helps ensure that in the event of a system breach or failure, system administrators can more quickly and accurately identify what happened and thus most effectively focus their remediation and recovery efforts. A) logging B) archiving C) security D) patching

A

Hypervisors run in ________ controlling hardware access for the virtual machines they host. A) Ring 0 B) Ring 1 C) Ring 2 D) Ring 3

A

Once a client has access to a resource, it uses ___________ to exchange data and control information with the resource. A) resource-specific interfaces B) eCos C) open sources D) resource requests

A

Operate with limited resources, adapt to hardware evolution, support a wide range of applications, support a diverse set of platforms, and be robust are goals for __________ . A) TinyOs B) eCos C) DSRs D) ISRs

A

Recognition by fingerprint, retina, and face are examples of ___________ . A) static biometrics B) dynamic biometrics C) recognition biometrics D) cyclical biometrics

A

The ________ determines which users and groups can access this object for which operations. A) DACL B) SACL C) RPC D) ACE

A

The ________ is a process running on a DVM that is launched at boot time. A) Zygote B) Java VM C) Xen D) Dalvik

A

The _________ approach is becoming a common way for businesses and individuals to deal with legacy applications and to optimize their hardware usage. A) virtual machine B) consolidation C) ratio D) round robin

A

The _________ file exploits the capability found on disks to access directly any block of a known address. A) direct B) sequential C) indexed sequential D) indexed

A

The requested operations and data are converted into appropriate sequences of I/O instructions, channel commands, and controller orders at the __________ layer. A) device I/O B) scheduling and control C) logical I/O D) physical organization

A

The term _________ refers to the logical structuring of the records as determined by the way in which they are accessed. A) file organization B) access method C) working directory D) database

A

There are _______ types of hypervisors, distinguished by whether there is another operating system between the hypervisor and the host. A) two B) three C) four D) five

A

Two examples of operating systems that have been designed from the ground up for embedded applications are TinyOS and _________ . A) eCos B) Linux C) BSD D) HAL

A

With the _________ clustering method, data are continuously copied from primary to secondary server. A) separate server B) passive standby C) active secondary D) servers share disks

A

________ uses various replication technologies to copy selected virtual machines to a secondary site in the case of a data center disaster. A) Site Recovery Manager B) DPM C) Fault Tolerance D) Storage VMotion

A

_________ are used mostly in applications where timeliness of information is critical and where data are rarely processed exhaustively. A) Indexed files B) Indexed sequential files C) Sequential files D) Hashed files

A

_________ processing refers to the traditional mainframe environment in which all, or virtually all, of the processing is done on a central host. A) Host-based B) Cooperative C) Server-based D) Client-based

A

__________ is a technique that smoothes out peaks in I/O demand. A) Buffering B) Blocking C) Smoothing D) Tracking

A

In the _________ approach, the programmer writes the application from the outset to run on a cluster and uses message passing to move data, as required, between cluster nodes. A) passive standby B) parallelized application C) parallelizing compiler D) parametric computing

B

On a moveable-head system, the time it takes to position the head at the track is known as ________ . A) access time B) seek time C) transfer time D) rotational delay

B

The ________ processing architecture is the most common client/server approach in current use. A) server-based B) client-based C) host-based D) cooperative

B

The _________ contains the core parts of the operating system, including system binaries, system libraries, and configuration files. A) data directory B) system directory C) cache directory D) mnt/sdcard directory

B

The _________ enables many clients to share access to the same database and enables the use of a high-performance computer system to manage the database. A) relational database B) server C) client D) middleware

B

The _________ is concerned with scheduling disk and tape accesses to optimize performance. A) device driver B) basic I/O supervisor C) access method D) logical I/O

B

The __________ interface allows the client to hold on to a resource until the client is notified that someone else needs the resource. A) Resource configure B) Resource requested C) Resource D) Resource-specific

B

The __________ technique allows multiple simultaneous I/O requests against a single device or file. A) asynchronous procedure call B) signaling an event object C) polling D) signaling the file object

B

The advantage of __________ is that it provides extremely high data availability. A) RAID 3 B) RAID 6 C) RAID 5 D) RAID 4

B

The disk scheduling algorithm that implements two sub-queues in a measure to avoid the problem of "arm stickiness" is the __________ . A) C-SCAN policy B) FSCAN policy C) DMA D) N-step-SCAN policy

B

The most common form of file structure is __________ . A) the indexed file B) the sequential file C) the pile D) the indexed sequential file

B

The solution that enables virtualization is a __________ . A) round robin B) virtual machine monitor C) hyperfile D) DalviB600

B

________ controls access based on comparing security labels with security clearances. A) RBAC B) MAC C) DAC D) RAC

B

________ define the type and contents of a security descriptor. A) SACLs B) Flags C) Owners D) DACLs

B

________ permits the relocation of the data files that compose a virtual machine while that virtual machine is in use. A) DRS B) Storage VMotion C) Fault Tolerance D) Storage and Network I/O Control

B

_________ defenses aim to harden programs to resist attacks. A) Coding B) Compile-time C) Runtime D) Programming

B

_________ implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance. A) Guard page B) Access control C) Firewall D) All of the above

B

_________ is one of the most widely used embedded operating systems. A) API B) eCos C) TinyOS D) MQS

B

__________ has become a popular approach to implementing wireless sensor network software. A) eCos B) TinyOS C) Arbiter D) Embedded system

B

The ________ is a balanced tree structure with all branches of equal length, and has become the standard method of organizing indexes for databases.

B-tree

The principal objective of __________ is to maximize processor use.

Batch Multiprogramming

The goal of __________ was to investigate the potential of clustered PCs for performing important computation tasks beyond the capabilities of contemporary workstations at minimum cost.

Beowulf

A process is in the ______ state when it is in main memory and awaiting an event.

Blocked

A process is in the ________ state when it is in secondary memory and awaiting an event.

Blocked/Suspended

T/F: Typically, more complex embedded systems do not include an OS.

False

A _________ is a collection of related data. A) record B) file C) database D) field

C

A _________ is a collection of related fields that can be treated as a unit by some application program. A) file B) field C) record D) database

C

A _________ is a group of interconnected, whole computers working together as a unified computing resource that can create the illusion of being one machine. A) SMP B) node C) cluster D) single-system

C

A _________ is an individual who is not authorized to use the computer and who penetrates a system's access controls to exploit a legitimate user's account. A) clandestine user B) superuser C) masquerader D) misfeasor

C

A __________ is responsible for starting I/O operations on a device and processing the completion of an I/O request. A) basic I/O supervisor B) basic file system C) device driver D) logical I/O

C

Configurability, direct use of interrupts, I/O device flexibility, and real-time operation are some of the unique characteristics and design requirements for __________ . A) Tiny OS B) eCos C) embedded operating systems D) OS service routines

C

Recognition by voice pattern, handwriting characteristics, and typing rhythm are examples of ________ . A) cyclical biometrics B) recognition biometrics C) dynamic biometrics D) static biometrics

C

The ________ facilitates the translation and I/O from the virtual machine to the physical server devices. A) hardware B) memory C) hypervisor D) network interface card

C

The __________ level is the primary interface with the environment outside of the computer system. A) logical I/O B) basic I/O supervisor C) physical I/O D) access method

C

The __________ unit is capable of mimicking the processor and of taking over control of the system bus just like a processor. A) interrupt-driven I/O B) I/O channel C) direct memory access D) programmed I/O

C

The concept of _________, as used in Linux, refers to a partitioning of the privileges available to a root user. A) root isolation B) hosting platform C) capabilities D) process isolation

C

The most basic class of client/server configuration is __________ , in which the client is principally responsible for providing a graphical user interface, while virtually all of the processing is done on the server. A) host-based processing B) cooperative processing C) server-based processing D) client-based processing

C

The number of guests that can exist on a single host is measured as a ________ . A) VMM ratio B) hypervisor ratio C) consolidation ratio D) broker ratio

C

The simplest type of support that the operating system can provide is _________ . A) overflow buffering B) dual buffering C) single buffering D) circular buffering

C

________ is the identifier by which this user is known to the system for purposes of security. A) ACE B) Access token C) SID D) Password scheme

C

_________ can power-off and on physical hosts as they are needed. A) Storage and Network I/O Control B) DRS C) DPM D) Resource Scheduler

C

__________ are the clients of the driver. A) DSRs B) ISRs C) Threads D) I/O systems

C

__________ external devices are suitable for communicating with electronic equipment. A) Communication B) Application C) Machine readable D) Human readable

C

__________ refers to the use of electronics and software within a product. A) TinyOS B) General purpose computer C) Embedded system D) Desktop system

C

__________ represents an open file associated with a process. A) Dentry object B) Inode object C) File object D) Superblock object

C

Small, fast memory located between the processor and main memory is called:

Cache memory

________ is where modified process pages can be written out at the time of replacement, or a precleaning policy can be used, which clusters the output activity by writing out a number of pages at once.

Cleaning policy

One of the first time-sharing operating systems to be developed was the ______________.

Compatible Time-Sharing System

Security and protections as it relates to operating systems is grouped into four categories: Availability, Data integrity, Authenticity, and __________.

Confidentiality

A _________ is a contiguous set of allocated blocks. A) key B) pathname C) pile D) portion

D

A __________ is a specific kind of service provider that acts as a registry and allows for the lookup of service provider interfaces and service locations. A) Service requestor B) Service provider C) Service designer D) Service broker

D

A key design requirement for _________ is portability to different architectures and platforms with minimal effort. A) HAL B) TinyOS C) GNU D) none of the above

D

A set of function and call programs that allow clients and servers to intercommunicate is a(n) ________ interface. A) SQL B) relational database C) middleware D) application programming

D

__________ external devices are suitable for communicating with modems. A) Human readable B) Application C) Machine readable D) Communication

D

Each _________ in a component is similar to a thread in an ordinary OS, with certain limitations. A) kernel B) command C) event D) task

D

On a typical system the highest level or privilege is referred to as _________ . A) administrator B) supervisor C) root access D) all of the above

D

Pvmsync, EnFuzion, and BPRoc are examples of __________ system software. A) Graphical User Interface B) CORBA C) SQL D) Beowulf

D

RAID 5 is organized in a similar fashion to _________ , but is different in the fact that RAID 5 distributes the parity strips across all disks. A) RAID 3 B) RAID 2 C) RAID 1 D) RAID 4

D

The _________ technique is used on a Windows server to optimize the use of threads. A) polling B) asynchronous procedure call C) signaling an event object D) I/O completion ports

D

The __________ category of external devices are suitable for communicating with the computer user. A) application B) machine readable C) communication D) human readable

D

The __________ module contains the code necessary for processor startup, interrupt delivery, context switching, and other functionality specific to the instruction set architecture of that processor family. A) Variant B) Platform C) Memory Management D) Architecture

D

The __________ module includes code for startup, chip selection configuration, interrupt controllers, and timer devices. A) Architecture B) Variant C) MMU D) Platform

D

The advantage of _________ is that it provides extremely high data availability. A) RAID 2 B) RAID 4 C) RAID 0 D) RAID 6

D

The common disks are partitioned into volumes, and each volume is owned by a single computer, is the _________ approach. A) shared disk B) servers share disks C) single virtual networking D) shared nothing

D

The function of switching an application and data resources over from a failed system to an alternative system in the cluster is referred to as __________ . A) failsafe B) failnode C) failback D) failover

D

User applications run in ______ which is the least trusted area. A) Ring 0 B) Ring 1 C) Ring 2 D) Ring 3

D

_______ is a commercially available hypervisor from VMware that provides users a bare metal hypervisor to host virtual machines on their servers. A) Zygote B) Dalvi06B C) JVM D) ESXi

D

_________ in TinyOS may be tied either directly or indirectly to hardware events. A) Commands B) Tasks C) Timers D) Events

D

_________ is an advantage of using Linux as the basis for an embedded OS. A) Vendor independence B) Varied hardware support C) Low cost D) All of the above

D

__________ are an efficient way of making consistent snapshots of volumes so that they can be backed up. A) Photo copies B) Process copies C) Transfer copies D) Shadow copies

D

__________ is a set of drivers, APIs, or other software that improves connectivity between a client application and a server. A) Distributed message passing B) SQL C) Graphical user interface D) Middleware

D

_________ controls access based on the identity of the requestor and on access rules stating what requestors are or are not allowed to do.

DAC (discretionary access control)

The Android platform's virtual machine is referred to as ________ .

Dalvik

__________ are often used where very rapid access is required, where fixed-length records are used, and where records are always accessed one at a time.

Direct files (or hashed files)

__________ is more efficient than interrupt-driven or programmed I/O for a multiple-word I/O transfer.

Direct memory access

The _________ provides a more streamlined approach for an embedded OS than one based on a commercial general-purpose OS, such as an embedded version of Linux.

Embedded Configurable Operating System (eCos)

__________ are a combination of computer hardware and software designed to perform a dedicated function

Embedded systems

A physical address is the location of a word relative to the beginning of the program and the processor translates that into a logical address.

FALSE

A process that is not in main memory is immediately available for execution, regardless of whether or not it is awaiting an event.

FALSE

A process that is waiting for access to a critical section does not consume processor time.

FALSE

All segments of all programs must be of the same length.

FALSE

An indirect method of deadlock prevention is to prevent the occurrence of a circular wait.

FALSE

An unsafe state is one in which there is at least one sequence of resource allocations to processes that does not result in a deadlock.

FALSE

As a default, the kernel dispatcher uses the policy of hard affinity in assigning threads to processors.

FALSE

Concurrent processes do not come into conflict with each other when they are competing for the use of the same resource.

FALSE

Deadlock avoidance is more restrictive than deadlock prevention.

FALSE

If there is an application or function that should be implemented as a set of related units of execution, it is far more efficient to do so as a collection of separate processes rather than a collection of threads.

FALSE

In a mulitprogramming environment the programmer knows at the time of coding how much space will be available and where that space will be.

FALSE

In a multiprogramming system the available main memory is not generally shared among a number of processes.

FALSE

In a two-level memory hierarchy the Hit Ratio is defined as the fraction of all memory accesses found in the slower memory.

FALSE

In the Highest Response Ratio Next (HRRN) scheduling policy, longer jobs are favored because they yield a larger ratio from the smaller denominator in the equation.

FALSE

Interrupts, signals, messages, and information in I/O buffers are all examples of reusable resources.

FALSE

It is not the responsibility of the operating system to control the execution of processes.

FALSE

It is possible for one process to lock the mutex and for another process to unlock it.

FALSE

It is possible in a single-processor system to not only interleave the execution of multiple processes but also overlap them

FALSE

It takes less time to terminate a process than a thread.

FALSE

On a uniprocessor, multiprogramming does not enable the interleaving of multiple threads within multiple processes.

FALSE

Over the years memory access speed has consistently increased more rapidly than processor speed.

FALSE

Race condition is a situation in which two or more processes continuously change their states in response to changes in the other process(es) without doing any useful work.

FALSE

Secondary memory provides fast access at relatively high cost.

FALSE

Segmentation does not eliminate internal fragmentation.

FALSE

Segmentation is not visible to the programmer.

FALSE

Swapping is not an I/O operation so it will not enhance performance.

FALSE

Termination of a process does not terminate all threads within that process.

FALSE

The ABI gives a program access to the hardware resources and services available in the system through the user ISA.

FALSE

The PFF policy evaluates the working set of a process at sampling instances based on elapsed virtual time.

FALSE

The Program Status Word contains status information in the form of condition codes, which are bits typically set by the programmer as a result of program operation.

FALSE

The fetched instruction is loaded into the Program Counter.

FALSE

The main objective of long-term scheduling is to allocate processor time in such a way as to optimize one or more aspects of system behavior

FALSE

The medium-term scheduler is invoked whenever an event occurs that may lead to the blocking of the current process or that may provide an opportunity to preempt a currently running process in favor of another.

FALSE

The memory protection requirement must be satisfied by the OS rather than the processor.

FALSE

The page currently stored in a frame may still be replaced even when the page is locked.

FALSE

The phrase "control is passed to a job" means that the processor is now fetching and executing instructions from the monitor program.

FALSE

The principle objective of Batch Multiprogramming is to minimize response time.

FALSE

The principle of locality states that program and data references within a process do not tend to cluster.

FALSE

The process control block is the least important data structure in an OS.

FALSE

The sharing of main memory among processes is useful to permit efficient and close interaction among processes because such sharing does not leads to many problems.

FALSE

The smaller the page size, the greater the amount of internal fragmentation.

FALSE

The unit of dispatching is usually referred to as a process or task.

FALSE

The user has direct access to the processor with batch-processing type OS.

FALSE

Uniprogramming typically provides better utilization of system resources than multiprogramming.

FALSE

With interrupts, the processor can not be engaged in executing other instructions while an I/O operation is in progress.

FALSE

The ______ policy treats the page frames allocated to a process as a circular buffer and pages are removed in a round robin style.

FIFO

__________ considers the execution history of a related group of processes along with the individual execution history of each process in making scheduling decisions.

FSS

_____ is a characteristic that refers to the ability of a system to fail in such a way as to preserve as much capability and data as possible.

Fail-soft operation

Because of the potential disadvantages, load sharing is not one of the commonly used schemes in current multiprocessors.

False

In most traditional multiprocessor systems processes are dedicated to processors

False

Real-time tasks are not handled any differently than non-real-time tasks in the priority queues.

False

T/F: "Has a slow and lightweight process or thread switch" is a typical characteristic of a specialized embedded OS.

False

T/F: A cluster is easier than an SMP to manage and configure.

False

T/F: A key aspect of server virtualization is that VMs cannot be viewed as network resources

False

T/F: A key differentiator between desktop/server and embedded Linux distributions is that desktop and server software is typically compiled on one platform but is intended to be executed on another.

False

T/F: A partial index contains one entry for every record in the main file.

False

T/F: A virtual server sees all of the resources of the physical host.

False

T/F: Access rights are managed at the physical organization layer.

False

T/F: Adding additional vCPUs in a VM is a difficult and time-consuming process.

False

T/F: All users with access to a system will have the same access to all data and resources on that system.

False

T/F: Blocking primitives provide for efficient, flexible use of the message-passing facility by processes.

False

T/F: Cooperative processing enables the user to employ applications tailored to local needs.

False

T/F: Device drivers are not part of the operating system.

False

T/F: Embedded software does not execute in response to external events.

False

T/F: File systems do not maintain the attributes associated with the files.

False

T/F: General-purpose computer systems far outnumber embedded systems.

False

T/F: General-purpose operating systems typically permit any user process to use interrupts directly.

False

T/F: Host-based processing is true client/server computing.

False

T/F: In the C-SCAN disk scheduling algorithm, the disk arm is required to move in one direction only until it reaches the last track or there are no more requests to service in that direction, then it reverses direction and the scan proceeds in the opposite direction in the same fashion.

False

T/F: Intrusion detection systems are only designed to detect malicious software behavior.

False

T/F: Manual analysis of logs is preferred, as it is more likely to identify abnormal activity.

False

T/F: RAID 0 provides real-time backups of all data so that in the event of a disk failure, all of the critical data is still immediately available.

False

T/F: The actual queuing and scheduling of I/O operations occurs at the logical I/O module

False

T/F: The client is responsible for maintaining the database, for which purpose a complex database management system software module is required.

False

T/F: The fat client approach mimics the traditional host-centered approach and is often the migration path for evolving corporate-wide application from the mainframe to a distributed environment

False

T/F: The hyperfile sits between the hardware and the VMs and acts as a resource broker.

False

T/F: The least-complicated form of file organization is the indexed file.

False

T/F: The misfeasor is generally an outsider.

False

T/F: The needs and policy relating to backup and archive should be determined during the final stages of implementation

False

T/F: The use to which a device is put does not have an influence on the software and polices in the operating system and supporting utilities

False

T/F: Type-2 hypervisors are considered to be more secure than the Type-1 hypervisors.

False

_________ creates a lockstep copy of a virtual machine on different host so that if the original host suffers a failure, the virtual machine's connections get shifted to the copy without interrupting users or the application they are using.

Fault tolerance

The key to the success of Linux has been its character as a free software package available under the auspice of the ____________.

Free Software Foundation

_______ is useful for medium-grained to fine-grained parallel applications whose performance severely degrades when any part of the application is not running while other parts are ready to run.

Gang scheduling

The _________ interface is the interface that is the boundary between hardware and software.

ISA

It is the principal responsibility of the _________ to control the execution of processes.

OS

The fetched instruction is loaded into the _________.

Instruction Register (IR)

A special type of programming language used to provide instructions to the monitor is __________.

JCL

The _________ are the fundamental entities that can be scheduled and dispatched to run on one of the system processors.

Kernel threads

_________ is the concept associated with determining the number of processes that will be resident in main memory.

Load control

__________ provides a general purpose record I/O capability and maintains basic data about files.

Logical I/O

________ tables are used to keep track of both main (real) and secondary (virtual) memory.

Memory

___________ was designed to keep the processor and I/O devices, including storage devices, simultaneously busy to achieve maximum efficiency.

Multiprogramming

________ refers to the ability of an OS to support multiple, concurrent paths of execution within a single process.

Multithreading

__________ is a technique in which a process, executing an application, is divided into threads that can run concurrently.

Multithreading

______ perform static analysis of feasible schedules of dispatching with the result of the analysis being a schedule that determines, at run time, when a task must begin execution.

Static table-driven approaches

_________ is a language developed by IBM and standardized by ANSI for addressing, creating, updating, or querying relational databases.

Structured Query Language (SQL)

_________ involves moving part or all of a process from main memory to disk.

Swapping

To satisfy the requirements of handheld devices, the classic microprocessor is giving way to the ________, where not just the CPUs and caches are on the same chip, but also many of the other components of the system, such as DSPs, GPUs, I/O devices and main memory.

System on a Chip (SoC)

The idea of having a many-to-many relationship between threads and processes has been explored in the experimental operating system ___________.

TRIX

A best-fit algorithm is usually the worst performer.

TRUE

A computer platform consists of a collection of hardware resources, such as the processor, main memory, I/O modules, timers, and disk drives.

TRUE

A design change in the structure or semantics of the process control block could affect a number of modules in the OS.

TRUE

A disadvantage of simulation is that results for a given run only apply to that particular collection of processes under that particular set of assumptions.

TRUE

A hardware mechanism is needed for translating relative addresses to physical main memory addresses at the time of execution of the instruction that contains the reference.

TRUE

A monolithic kernel is implemented as a single process with all elements sharing the same address space.

TRUE

A mutex is used to ensure that only one thread at a time can access the resource protected by the mutex.

TRUE

A precleaning policy writes modified pages before their page frames are needed so that pages can be written out in batches.

TRUE

A process consists of three components: an executable program, the associated data needed by the program, and the execution context of the program.

TRUE

A process switch may occur any time that the OS has gained control from the currently running process.

TRUE

An OS should be constructed in such a way as to permit the effective development, testing, and introduction of new system functions without interfering with service.

TRUE

An SMP can be defined as a stand-alone computer system with two or more similar processors of comparable capacity.

TRUE

An atomic operation executes without interruption and without interference.

TRUE

An example of a multicore system is the Intel Core i7.

TRUE

An example of an application that could make use of threads is a file server.

TRUE

Any alteration of a resource by one thread affects the environment of the other threads in the same process.

TRUE

Any protection mechanism must have the flexibility to allow several processes to access the same portion of main memory.

TRUE

As an extension of the principles of modular design and structured programming, some applications can be effectively programmed as a set of concurrent processes.

TRUE

Atomicity guarantees isolation from concurrent processes.

TRUE

Both batch processing and time sharing use multiprogramming.

TRUE

Cache memory is invisible to the OS.

TRUE

Deadlock avoidance requires knowledge of future process resource requests.

TRUE

Deadlock is permanent because none of the events is ever triggered.

TRUE

Digital Signal Processors deal with streaming signals such as audio and video.

TRUE

For deadlock to occur, there must not only be a fatal region, but also a sequence of resource requests that has led into the fatal region.

TRUE

If a process is swapped out, all of its threads are necessarily swapped out because they all share the address space of the process.

TRUE

If a system does not employ virtual memory each process to be executed must be fully loaded into main memory.

TRUE

If access to a resource requires mutual exclusion then mutual exclusion must be supported by the OS.

TRUE

In a multiprogramming system multiple processes exist concurrently in main memory.

TRUE

In a multithreaded environment there are separate stacks for each thread, as well as a separate control block for each thread.

TRUE

In a pure ULT facility, all of the work of thread management is done by the application, and the kernel is not aware of the existence of threads.

TRUE

In a time sharing system, a user's program is preempted at regular intervals, but due to the relatively slow human reaction time this occurrence is usually transparent to the user.

TRUE

In a uniprogramming system main memory is divided into two parts.

TRUE

In fair share scheduling each user is assigned a weighting of some sort that defines that user's share of system resources as a fraction of the total usage of those resources.

TRUE

In most interactive operating systems adequate response time is the critical requirement.

TRUE

Interrupts are provided primarily as a way to improve processor utilization.

TRUE

It is possible for a communications interrupt to occur while a printer interrupt is being processed.

TRUE

Most of the memory management issues confronting the operating system designer are in the are of paging when segmentation is combined with paging.

TRUE

On of the driving forces in operating system evolution is advancement in the underlying hardware technology.

TRUE

On of the most common problems faced in concurrent processing is the producer/consumer problem.

TRUE

On problem with a pure priority scheduling scheme is that lower-priority processes may suffer starvation.

TRUE

One way to counter the potential performance problems of a variable-allocation global scope policy is to use page buffering.

TRUE

Overlay programming wastes programmer time.

TRUE

Processes need to be synchronized to enforce mutual exclusion.

TRUE

Programs in other processes should not be able to reference memory locations in a process for reading or writing purposes without permission.

TRUE

Round robin is particularly effective in a general purpose time sharing system or transaction processing system.

TRUE

Scheduling affects the performance of the system because it determines which processes will wait and which will progress.

TRUE

Segments may be of unequal, indeed dynamic, size.

TRUE

The OS frequently relinquishes control and must depend on the processor to allow it to regain control.

TRUE

The OS masks the details of the hardware from the programmer and provides the programmer with a convenient interface for using the system.

TRUE

The OS may preempt the second process and require it to release its resources if a process requests a resource that is currently held by another process.

TRUE

The OS may suspend a process if it detects or suspects a problem.

TRUE

The OS performs a protection function to prevent unwanted interference between processes with respect to resources.

TRUE

The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify physical storage sites.

TRUE

The case of cooperation by sharing covers processes that interact with other processes without being explicitly aware of them.

TRUE

The central themes of operating system design are all concerned with the management of processes and threads.

TRUE

The design issue of page size is related to the size of physical main memory and program size.

TRUE

The dining philosopher's problem can be representative of problems dealing with the coordination of shared resources which may occur when an application includes concurrent threads of execution.

TRUE

The first step in designing an OS to control processes is to describe the behavior that we would like the processes to exhibit.

TRUE

The functioning of a process, and the output it produces, must be independent of the speed at which its execution is carried out relative to the speed of other concurrent processes.

TRUE

The interrupt can occur at any time and therefore at any point in the execution of a user program.

TRUE

The key to multiprogramming is scheduling.

TRUE

The objective of a fair-share scheduler is to monitor usage to give fewer resources to users who have had more than their fair share, and more to those who have had less than their fair share.

TRUE

The operating system acts as an interface between the computer hardware and the human user.

TRUE

The placement policy determines where in real memory a process piece is to reside.

TRUE

The potential performance benefits of a multicore organization depend on the ability to effectively exploit the parallel resources available to the application.

TRUE

The principal function of the OS is to create, manage, and terminate processes.

TRUE

The principal operation of memory management is to bring processes into main memory for execution by the processor.

TRUE

The process control block is the key tool that enables the OS to support multiple processes and to provide for multiprocessing.

TRUE

The processor controls the operation of the computer and performs its data processing functions

TRUE

The traditional UNIX scheduler employs multilevel feedback user round robin within each of the priority queues.

TRUE

The use of unequal size partitions provides a degree of flexibility to fixed partitioning.

TRUE

Two or more processes can cooperate by means of simple signals, such that a process can be forced to stop at a specified place until it has received a specific signal.

TRUE

UNIX is intended to be machine independent; therefore its memory management scheme will vary from one system to the next.

TRUE

Virtual memory allows for very effective multiprogramming and relieves the user of the unnecessarily tight constraints of main memory.

TRUE

Virtualization technology enables a single PC or server to simultaneously run multiple operating systems or multiple sessions of a single OS.

TRUE

When processes cooperate by communication, the various processes participate in a common effort that links all of the processes.

TRUE

Windows is an example of a kernel-level thread approach.

TRUE

Windows process design is driven by the need to provide support for a variety of OS environments.

TRUE

In a uniprocessor system, multiprogramming increases processor efficiency by:

Taking advantage of time wasted by long wait interrupt handling

The six states of a Windows thread are: Ready, Standby, Running, Waiting, Transition, and ___________.

Terminated

One of the more promising methods of resolving multitask scheduling conflicts for periodic tasks is rate monotonic scheduling.

True

T/F: The process of reclaiming older pages that are not being used is done through ballooning

True

A ________ is the maximum amount of time that a process can execute before being interrupted.

Time slice

____ is the lowest-priority process, intended for user applications other than real-time applications.

Time-shared

A disadvantage of static assignment is that one processor can be idle, with an empty queue, while another processor has a backlog.

True

A loosely coupled or distributed multiprocessor consists of a collection of relatively autonomous systems, with each processor having its own main memory and I/O channels.

True

A typical use of independent parallelism is in a time-sharing system

True

An application can be implemented as a set of threads, which cooperate and execute concurrently in the same address space.

True

In the real-time-priority class, all threads have a fixed priority that never changes and all of the active threads at a given priority level are in a round-robin queue.

True

Linux provided a real-time scheduling capability coupled with a scheduler for non-real-time processes that made use of the traditional UNIX scheduling algorithm

True

One useful measure of the ability of an operating system to function deterministically is the maximum delay from the arrival of a high-priority device interrupt to when servicing begins.

True

Static table-driven scheduling is applicable to tasks that are periodic.

True

T/F: A field is characterized by its length and data type.

True

T/F: A file allocation table (FAT) is used to keep track of the portions assigned to a file.

True

T/F: A file directory contains information about the files, including attributes, location, and ownership.

True

T/F: A key aspect of I/O is the use of buffers that are controlled by I/O utilities rather than by application processes.

True

T/F: A mutex is used to enforce mutually exclusive access to a resource, allowing only one thread at a time to gain access.

True

T/F: A preallocation policy requires that the maximum size of a file be declared at the time of the file creation request.

True

T/F: A reliable message-passing facility is one that guarantees delivery if possible.

True

T/F: A simple embedded system, with simple functionality, may be controlled by a special-purpose program or set of programs with no other software.

True

T/F: All types of UNIX files are administered by the OS by means of inodes.

True

T/F: An antilock braking system in a car is an example of an embedded system.

True

T/F: Android is an embedded OS based on a Linux kernel

True

T/F: Cache memory reduces average memory access time by exploiting the principle of locality

True

T/F: DAC is based on the roles that users assume in a system rather than the user's identity.

True

T/F: Direct memory access is the dominant form of transfer that must be supported by the operating system.

True

T/F: Double buffering is when a process transfers data to (or from) one buffer while the operating system empties (or fills) the other.

True

T/F: Each server in the client/server environment provides a set of shared services to the clients.

True

T/F: Embedded systems can be part of a larger system or product.

True

T/F: Examples of human readable external I/O devices are printers, terminals, and keyboards

True

T/F: Firewalls are traditionally configured to limit access by port or protocol, from some or all external systems.

True

T/F: Host-based firewalls, IDS, and IPS software also may improve security by limiting remote network access to services on the system.

True

T/F: Indexed allocation supports both sequential and direct access to the file and thus is the most popular form of file allocation.

True

T/F: Once the virtual machine is created it can be powered on like a physical server and utilized in the manner of a physical server.

True

T/F: Protection rings describe level of access or privilege inside of a computer system.

True

T/F: RAID is a set of physical disk drives viewed by the operating system as a single logical drive.

True

T/F: The Beowulf approach is widely implemented and is perhaps the most important cluster technology available.

True

T/F: The SCAN policy favors jobs whose requests are for tracks nearest to both innermost and outermost tracks, and favors the latest arriving jobs.

True

T/F: The Security ID identifies a user uniquely across all of the machines on the network.

True

T/F: The TinyOS scheduler operates across all components

True

T/F: The client-based station generally presents the type of graphical interface that is most comfortable to users, including the use of windows and a mouse.

True

T/F: The cluster is the fundamental unit of allocation in NTFS.

True

T/F: The communications software is what enables client and server to interoperate.

True

T/F: The disadvantage of using a general-purpose OS is that it is not optimized for real-time and embedded applications.

True

T/F: The disadvantage to a directly connected I/O device is that the virtual machine is tied to the physical server it is running on.

True

T/F: The dual caching approach is used to reduce communications traffic (client cache) and disk I/O (server cache).

True

T/F: The eCos system provides a more streamlined approach for an embedded OS than one based on a commercial general-purpose OS.

True

T/F: The hierarchical philosophy is that the functions of the operating system should be separated according to their complexity, their characteristic time scale, and their level of abstraction.

True

T/F: The key feature of a client/server architecture is the allocation of application-level tasks between clients and servers.

True

T/F: The objective of the intruder is to gain access to a system or to increase the range of privileges accessible on a system.

True

T/F: The owner of the object can generally perform any action on the security descriptor

True

______________ is a facility that allows programs to address memory from a logical point of view, without regard to the amount of main memory physically available.

Virtual memory

The _______ state is when the thread has terminated.

ZOMBIE

The operating system's ________ refers to its inherent flexibility in permitting functional modifications to the system without interfering with service.

ability to evolve

The __________ level provides a standard interface between applications and the file systems and devices that hold the data.

access method

The sum of the seek time and the rotational delay equals the __________ , which is the time it takes to get into position to read or write.

access time

_________ is the range of memory addresses available to a process.

address space

An IDS comprises three logical components: sensors, ________, and user interface.

analyzers

An IDS comprises three logical components: sensors, user interface, and ________ .

analyzers

An _________ has a deadline by which it must finish or start, or it may have a constraint on both start and finish time.

aperiodic task

_______ is the process of retaining copies of data over extended periods of time in order to meet legal and operational requirements to access past data.

archive

The technique where the processor is equipped with hardware that allows it to interrogate simultaneously a number of TLB entries to determine if there is a match on page number is referred to as ______________.

associative mapping

__________ is a function or action implemented as a sequence of one or more instructions that appears to be indivisible; no other process can see an intermediate state or interrupt the operations.

atomic operation

__________ is when the sequence of instruction is guaranteed to execute as a group, or not execute at all, having no visible effect on system state.

atomic operation

_________ allows the three necessary conditions but makes judicious choices to assure that the deadlock point is never reached.

avoidance

_______ is the process of making copies of data at regular intervals, allowing the recovery of lost or corrupted data over relatively short time periods.

backup

The traditional UNIX scheduler, such as those used in SVR3 and 4.3 BSD UNIX systems, divides processes into fixed ________ of priority levels.

bands

The strategy of resource allocation denial is referred to as the ___________.

banker's algorithm

In the Dynamic Partitioning technique of memory management, the placement algorithm that chooses the block that is closest in size to the request is called ____________.

best fit

Each location in Main Memory contains a _________ value that can be interpreted as either and instruction or data.

binary number

A ______________ is a semaphore that takes only the values of 0 and 1.

binary semaphore

Two types of atomic operations are defined in Linux: integer operations and _______________.

bitmap operations

The unit of data exchanged between cache and main memory is __________.

block size

A UNIX file system resides on a single logical disk or disk partition and is laid out with the following elements: superblock, inode table, data blocks, and __________ .

boot block

A compromise to overcome the disadvantages of fixed partitioning and dynamic partitioning is the ___________.

buddy system

A ________ can occur as a result of a programming error when a process attempts to store data beyond the limits of a fixed size buffer and consequently overwrites adjacent memory locations.

buffer overflow

__________ is a condition at an interface under which more input can be placed into a buffer or data-holding area than the capacity allocated, overwriting other information.

buffer overflow

The problem of keeping local cache copies up to date to changes in remote data is known as the _________ problem.

cache consistency

The term _________ is usually used to apply to a memory that is smaller and faster than main memory, and that is interposed between main memory and the processor.

cache memory

The _________ machines are generally single-user PCs or workstations that provide a highly user-friendly interface to the end user.

client

In TinyOS, __________ are nonblocking requests.

commands

External devices that engage in I/O with computer systems are grouped into three categories: human readable, machine readable, and __________ .

communication

One technique for overcoming external fragmentation is ___________.

compaction

In the case of _________, processes are sharing resources without being aware of the other processes.

competition

An embedded software system built using TinyOS consists of a set of small modules, called _________ , each of which performs a simple task or set of tasks and which interface with each other and with hardware in limited and well-defined ways.

components

A(n) __________ is a set of resources for the movement, storage, and processing of data and for the control of these functions.

computer

____________ arises in three different contexts: multiple applications, structured application, and operating system structure.

concurrency

A _______ is a data type that is used to block a process or thread until a particular condition is true.

condition variable

A monitor supports synchronization by the use of _________ that are contained within the monitor and accessible only within the monitor.

condition variables

Three methods of file allocation commonly used are: chained, indexed and _________ .

contiguous

In a _________ configuration, the application processing is performed in an optimized fashion, taking advantage of the strengths of both client and server machines and of the distribution of data.

cooperative processing

_________ can be defined as the permanent blocking of a set of processes that either compete for system resources or communicate with each other.

deadlock

Requested resources are granted to processes whenever possible with ____________.

deadlock detection

A set of processes is _________ when each process in the set is blocked awaiting an event that can only be triggered by another blocked process in the set.

deadlocked

The __________ specifies the instants in time at which the selection function is exercised.

decision mode

Only three operations may be performed on a semaphore: initialize, increment, and __________.

decrement

Interrupts and counters are examples of ________ abstractions.

dedicated

The _________ approach is the opposite of the load-sharing approach and provides implicit scheduling defined by the assignment of threads to processors.

dedicated processor assignment

Typically, the swapping-in function for processes is based on the need to manage ___________.

degree of multiprogramming

With _________, a page is brought into main memory only when a reference is made to a location on that page.

demand paging

An operating system is __________ to the extent that it performs operations at fixed, predetermined times or within predetermined time intervals.

deterministic

A __________ module controls the exchange of data between main memory and an I/O module.

direct memory access

At the _________ layer, symbolic file names are converted to identifiers that either reference the file directly or indirectly through a file descriptor or index table.

directory management

The portion of the OS that selects the next process to run is called the ___________,

dispatcher

A __________ is a static entity, consisting of an address space and ports through which messages may be sent and received.

domain

No feasibility analysis is performed with __________ approach, and the system tries to meet all deadlines and aborts any started process whose deadline is missed.

dynamic best effort

Linux uses _________ , in which threads are moved for a queue for one processor to a queue for another processor.

dynamic load balancing

With the __________ approach the number of threads in a process can be altered during the course of execution.

dynamic scheduling

Any resource allocation and scheduling policy must consider three factors: Fairness, Differential responsiveness, and ________.

efficiency

Two objectives are paramount in designing the I/O facility: generality and __________ .

efficiency

Real-time operation, reactive operation, configurability, I/O device flexibility, and streamlined protection mechanisms are characteristics and design requirements for __________ systems.

embedded operating

___________ are memory words used as a synchronization mechanism.

event flags

The ___________ is useful in sending a signal to a thread indicating that a particular event has occurred.

event object

A common technique for predicting a future value on the basis of a time series of past values is __________.

exponential averaging

As time goes on, memory becomes more and more fragmented and memory utilization declines, creating a phenomenon referred to as __________.

external fragmentation

A problem with the largely obsolete Fixed Partitioning memory management technique is that of: inefficient use of memory, fixed number of processes, and ______________.

internal fragmentation

In a system employing a paging scheme for memory management wasted space is due to ___________.

internal fragmentation

When there is wasted space internal to a partition due to the fact that the block of data loaded is smaller than the partition is referred to as ___________.

internal fragmentation

When an external device becomes ready to be serviced by the processor the device sends a(n) __________ signal to the processor.

interrupt

The ___________ routine determines the nature of the interrupt and performs whatever actions are needed.

interrupt handler

When an external device is ready to acept more data from the processor, the I/O module for that external device sends an ____________ signal to the processor.

interrupt request

The blocked state in which the process is waiting for an event, such as the end of an I/O operation, the availability of a resource, or a signal from another process is the __________ state.

interruptible

Hardware features desirable in a batch-processing operating system include memory protection, timer, privileged instructions, and ____________.

interrupts

Most operating systems contain two fundamental forms of concurrent activity: processes and ____________.

interrupts

System access threats fall into two general categories: _________ and malicious software.

intruders

The _______ structure indexes page table entries by frame number rather than by virtual page number.

inverted page table

Processes at _________ priority levels are guaranteed to be selected to run before any time-sharing process but must defer to real-time processes.

kernel

In SVR4 and Solaris systems, the memory management scheme that manages memory allocation for the kernel is called the ____________.

kernel memory allocator

The principal disadvantage of the _______ approach is that the transfer of control from one thread to another within the same process requires a mode switch to the kernel.

kernel-level thread

There are two broad categories of thread implementation: user-level threads and ____________.

kernel-level threads

The ___________ policy replaces the page in memory that has not been referenced for the longest time.

least recently used

A ________ chooses only among the resident pages of the process that generated the page fault in selecting a page to replace.

local replacement policy

The __________ module deals with the device as a logical resource and is not concerned with the details of actually controlling the device

logical I/O

A _________ is a reference to a memory location independent of the current assignment of data to memory.

logical address

The __________ scheduler determines which programs are admitted to the system for processing.

long term

This is a decision whether to add a new process to the set of processes that are currently active:

long term scheduling

The OS has five principal storage management responsibilities: process isolation, automatic allocation and management, support of modular programming, protection and access control, and ________

long-term storage.

Disk drives, USB keys, sensors, and controllers are examples of __________ external I/O devices.

machine readable

______ in a computer system is organized as a linear, or one-dimensional address space, consisting of a sequence of bytes or words.

main memory

System access threats fall into two general categories: intruders and ________

malicious software

A ___________ relationship allows multiple server processes to provide concurrent service to multiple clients.

many-to-many

When a new block of data is read into the cache the ____________ determines which cache location the block will occupy.

mapping function

The three classes of intruders are: clandestine user, misfeasor, and ________ .

masquerader

a _______ is an individual who is not authorized to use the computer and who penetrates a system's access controls to exploit a legitimate user's account.

masquerader

Typically, there will need to be a rather high degree of coordination and interaction among the threads of an application, leading to a __________ level of synchronization

medium grain

__________ scheduling is part of the swapping function.

medium term

This is a decision whether to add a process to those that are at least partially in main memory and therefore available for execution.

medium term scheduling

The ___________ contains the data to be written into memory and receives the data read from memory.

memory buffer register

The task of subdividing memory to accommodate multiple processes is carried out dynamically by the OS and is known as ___________.

memory management

The capability to allocate more memory than physically exists on a host is called __________ .

memory overcommit

A means for two processes to exchange information is with the use of ____________.

messages

The basic form of communication between processes or threads in a micro kernel operating system is ___________.

messages

The invention of the ________ was the hardware revolution that brought about desktop and handheld computing.

microprocessor

The basic purpose of _________ is to enable an application or user at a client to access a variety of services on servers without being concerned about differences among servers.

middleware

A _________ is a legitimate user who accesses data, programs, or resources for which such access is not authorized, or who is authorized for such access but misuses their privileges.

misfeasor

A ___________ is a programming language construct that encapsulates variables, access procedures, and initialization code within an abstract data type.

monitor

The __________ is a programming language construct that provides equivalent functionality to that of semaphores and is easier to control.

monitor

The central idea behind the simple batch-processing scheme is the use of a piece of software known as the _________.

monitor

A __________ computer combines two or more processors on a single piece of silicon.

multicore

The _________ approach means that the operating system allocates the processor to a process and when the process blocks or is preempted, feeds it back into one of several priority queues.

multilevel feedback

_________ are characterized by the presence of many single-threaded processes.

multiprocess applications

The concept of multiple programs taking turns in execution is known as ___________.

multiprogramming

The management of multiple processes within a uniprocessor system is ___________.

multiprogramming

_________ was invented to allow processing time to be dynamically shared among a number of active applications.

multiprogramming

The requirement that when one process is in a critical section that access shared resources, no other process may be in a critical section that accesses any of those shared resources is ____________.

mutual exclusion

With _______ only one process may use a resource at a time and no process may access a resource unit that has been allocated to another process.

mutual exclusion

In addition to clients and servers, the third essential ingredient of the client/server environment is the _________ .

network

Intrusion detection systems can be classified as host-based or ___________ .

network based

Operating systems must evolve over time because:

new hardware is designed and implemented in the computer system

In the Dynamic Partitioning technique of memory management, the placement algorithm that scans memory from the location of the last placement and chooses the next available block that is large enough to satisfy the request is called __________.

next fit

Probably the most useful combination, ________ allows a process to send one or more messages to a variety of destinations as quickly as possible.

nonblocking send, blocking receive

A key security issue in the design of any _________ is to prevent, or at least detect, attempts by a user or a piece of malicious software from gaining unauthorized privileges on the system.

operating system

An _________ is a program that controls the execution of application programs and acts as an interface between applications and the computer hardware.

operating system

System security begins with the installation of the _________ .

operating system

The _________ is the central router of information and controls access to all of the physical resources of the hardware.

operating system

The _______ policy results in the fewest number of page faults.

optimal

In a practice known as _________, the program and data are organized in such a way that various modules can be assigned the same region of memory with a main program responsible for switching the modules in and out as needed.

overlaying

A fixed length block of data that resides in secondary memory is a _________.

page

A __________ is issued if a desired page is not in main memory.

page fault

The ________ algorithm requires a use bit to be associated with each page in memory.

page fault frequency

Linux makes use of a three-level page table structure consisting of the following types of tables: page directory, page table, and ___________.

page middle directory

Similar to data de-duplication, __________ is a feature built into hypervisors that help optimize memory usage.

page sharing

The ________ shows the frame location for each page of the process.

page table

The chunks of a process are known as ___________.

pages

_________ is transparent to the programmer and eliminates external fragmentation providing efficient use of main memory.

paging

The __________ provides a virtual memory capability that allocates page frames in main memory to processes and also allocates page frames to disk block buffers.

paging system

In a __________ architecture, the kernel can execute on any processor, and each processor does self-scheduling from the pool of available processes.

peer

Response time and throughput are examples of __________ criteria for short term scheduling.

performance based

The concept of Memory Management satisfies certain system requirements including: relocation, protection, and ___________.

physical organization

Because there is no structure to the _________ form of file organization, record access is by exhaustive search.

pile

Inspired by the concept of co-routines, a ________ is a circular buffer allowing two processes to communicate on the producer-consumer model.

pipe

One of the most significant contributions of UNIX to the development of operating systems is the ___________.

pipe

With ________ pages other than the one demanded by a page fault are brought in.

prepaging

The strategy of deadlock __________ is to design a system in such a way that the possibility of deadlock is excluded.

prevention

________ strategies are very conservative and solve the problem of deadlock by limiting access to resources and by imposing restrictions on processes.

prevention

In the __________ approach, a priority is associated with each resource.

priority ceiling

The basic idea of _________ is that a lower-priority task inherits the priority of any higher-priority task pending on a resource they share.

priority inheritance

A _______ is a unit of activity characterized by the execution of a sequence of instructions, a current state, and an associated set of system resources.

process

A _________ is an entity corresponding to a user job or application that owns resources such as memory and open files.

process

A program invocation, including the address space and resources required to run the program is a ______ object.

process

In a multithreaded environment, a _________ is defined as the unit of resource allocation and a unit of protection.

process

The OS must maintain _________ tables to manage processes.

process

A significant point about the ________ is that it contains sufficient information so that it is possible to interrupt a running process and later resume execution as if the interruption had not occurred.

process control block

The _______ states the process that owns the page.

process identifier

The classic concurrency problem that involves multiple readers that can read from a shared data area when no single writer is exclusively writing to it is the ___________ Problem.

readers/writers

The address of a storage location in main memory is the _________.

real address

Because a process executes only in main memory, that memory is referred to as ______________.

real memory

An existing commercial OS can be used for an embedded system by adding ________ capability, streamlining operation, and adding necessary functionality.

real time

Processes at _________ priority levels are guaranteed to be selected to run before any kernel or time-sharing process.

real time

Three major lines of computer system development created problems in timing and synchronization that contributed to the development of the concept of the process: multiprogramming batch operations, time sharing, and ________.

real-time transaction systems

A __________ is a database in which information access is limited to the selection of rows that satisfy all search criteria.

relational database

The portion of the monitor that is always in main memory and available for execution is referred to as the _____________.

resident monitor

The portion of a process that is actually in main memory at any time is defined to be the ____________ of the process.

resident set

The ________ is a directed graph that depicts a state of the system of resources and processes, with each process and each resource represented by a node.

resource allocation graph

The shared resource configuration provides the following interfaces to a client: Resource, Resource requested, ________ , and resource-specific interfaces.

resource configure

_________ is the elapsed time between the submission of a request until the response begins to appear as output.

response time

A ______ resource is one that can be safely used by only one process at a time and is not depleted by that use.

reusable

Examples of _______ include processors, I/O channels, main and secondary memory, devices, and data structures such as files, databases, and semaphores.

reusable resources

The process is said to be operating in a _________ fashion if each process in the queue is given a certain amount of time, in turn, to execute and then returned to the queue, unless blocked.

round robin

External, nonvolatile memory is also referred to as _________ or auxiliary memory.

secondary memory

The size of virtual storage is limited by the addressing scheme of the computer system and by the amount of ___________ available

secondary memory

The _________ Windows Process Object Attribute describes who created an object, who can gain access to or use the object, and who is denied access to the object.

security descriptor

A ___________ is a variable length block of data that resides in secondary memory.

segment

___________ allows the programmer to view memory as consisting of multiple address spaces.

segmentation

The basic tools of memory management are paging and ___________.

segmentation.

In a system employing a segmentation scheme for memory management a process is divided into ___________.

segments which may not be of equal size

The __________ determines which process, among ready processes, is selected next for execution.

selection function

A ___________ is an integer value used for signaling among processes.

semaphore

In the __________ form of file structure all records are of the same length, consisting of the same number of fixed-length fields in a particular order.

sequential file

A __________ is a computer, usually a high-powered workstation, a minicomputer, or a mainframe, that houses information for manipulation by networked clients.

server

"Servers are cabled to the same disks, but each server owns its disks. If one server fails, its disks are taken over by the other server," is a description of the _________ clustering method.

servers connected to disks

Two major problems with early serial processing systems were scheduling and ____________.

setup time

Three abstractions for resources are used in TinyOS: dedicated, virtualized, and ________ .

shared

The fastest form of interprocess communication provided in UNIX is _____________.

shared memory

"The process was placed in a suspended state by an agent; either itself, a parent process, or the OS, for the purpose of preventing its execution," is a characteristic of a ______ process.

suspended

The traditional UNIX scheduler divides processes into fixed bands of priority levels, with the highest priority band being the _________.

swapper band

In a _______ multiprocessor all processors can perform the same functions so the failure of a single processor does not halt the machine.

symmetric

A __________ organization has a number of potential advantages over a uniprocessor organization including performance, availability, incremental growth, and scaling.

symmetric multiprocessor

It is necessary to ___________ the activities of various threads so they do not interfere with each other or corrupt data structures.

synchronize

A process or task in Linux is represented by a ___________ data structure.

task_struct

In a time-sharing, multiprogramming system, multiple users simultaneously access the system through _________.

terminals

When the system spends most of its time swapping pieces rather than executing instructions it leads to a condition known as ____________.

thrashing

A _______ is a dispatchable unit of work that executes sequentially and is interruptible so that the processor can turn to another thread.

thread

A _______ is a single execution path with an execution stack, processor state, and scheduling information.

thread

an executable entity within a process is a _________ object.

thread

Windows makes use of two types of process-related objects: processes and __________.

threads

In a _________ architecture, the application software is distributed among three types of machines: a user machine, a middle-tier server, and a backend server.

three-tier

The multiprocessor system which consists of a set or processors that share a common main memory and are under the integrated control of an operating system is a _________ .

tightly coupled multiprocessor

Giving each process a slice of time before being preempted is a technique known as __________.

time slicing

The technique where a system clock generates interrupts, and at each clock interrupt the OS regains control and assigns the processor to another user, is called ________.

time slicing

A_______ is set at the beginning of each job to prevent any single job from monopolizing the system.

timer

Electronic keycards, smart cards, and physical keys are authenticators that are referred to as a __________ .

token

We can characterize the behavior of an individual process by listing the sequence of instructions, referred to as a _______, that executes for that process.

trace

A thread enters the ________ state, after waiting, if it is ready to run but the resources are not available.

transition

To overcome the problem of doubling the memory access time, most virtual memory schemes make use of a special high-speed cache for page table entries called a ____________.

translation lookaside buffer

In terms of the queuing model, _________ is the total time that the item spends in the system (waiting time plus service time).

turnaround time

Multiprogramming operating systems are fairly sophisticated compared to single-program or __________ operating systems.

uniprogramming

A user program executes in a __________, in which certain areas of memory are protected for the user's use and in which certain instructions may not be executed.

user mode

The _________ is the less-privileged mode.

user mode

Response time in an interactive system is an example of:

user oriented criteria for short term policies

A ________ is a user-created unit of execution within a process.

user-level thread

A machine with _________ software can host numerous applications, including those that run on different operating systems, on a single platform.

virtualization

A clock or timer is an example of the _________ abstraction.

virtualized

A _________ is a collection of addressable sectors in secondary memory that an OS or application can use for data storage.

volume

A semaphore that does not specify the order in which processes are removed from the queue is a _________ semaphore.

weak


Related study sets

Addiction and Substance-Related Disorders

View Set

I can write a linear equation in slope-intercept form.

View Set

Operational Procedures - Level 3

View Set

NC Drivers Practice Test in Spanish

View Set

The Kite Runner, Chapters 10-12 (pp. 110-165)

View Set