INT-1700 Exam #2

Ace your homework & exams now with Quizwiz!

A DVD with a fast data transfer rate will drop fewer frames when playing back a recorded video segment than will a unit with a slower transfer rate. a. True b. False

true

A livelock can be caused by two processes accessing different areas of the same disk. a. True b. False

true

A subdirectory is created when a user opens an account to access the computer system. a. True b. False

true

All recovery algorithms have one feature in common: they all require at least one victim, which, when removed from the deadlock, will free the system. a. True b. False

true

Although noncontiguous allocation schemes eliminate external storage fragmentation and the need for compaction, they don't support direct access because there's no easy way to determine the exact location of a specific record. a. True b. False

true

Although the Banker's Algorithm has been used to avoid deadlocks in systems with a few resources, it isn't practical for most systems. a. True b. False

true

Blu-ray discs are available in several formats: read-only (BD-ROM), recordable (BD-R), and rewritable (BD-RE). a. True b. False

true

Direct access storage devices (DASDs) are devices that can directly read or write to an arbitrary place on a disk. a. True b. False

true

Directories are special files that contain listings of filenames and their attributes. a. True b. False

true

First-come, first-served (FCFS) is the simplest device-scheduling algorithm; it is easy to program and essentially fair to users. a. True b. False

true

If the File Manager is required to provide detailed instructions for each system device (how to start it, get it to move to the correct place where the desired record is located, and when to stop), then the program is considered device dependent. a. True b. False

true

In a master/slave system, the master processor is responsible for managing the entire system—all files, devices, memory, and processors. a. True b. False

true

Java technology is used for many Web and Internet applications, and it integrates well with browsers that can run Java applets with audio, video, and animation directly in a Web page. a. True b. False

true

Java uses both a compiler and an interpreter. a. True b. False

true

Multiprocessing can refer to one job using several processors to execute sets of instructions in parallel. a. True b. False

true

Nested RAID levels, also called hybrid levels, are complex RAID configurations created by combining multiple standard levels. a. True b. False

true

Once starvation has been detected, an algorithm can be implemented in which the system blocks new jobs until the starving jobs have been satisfied. a. True b. False

true

Parallel processing is a situation in which two or more processors operate in one system at the same time and may or may not work on related activities. a. True b. False

true

RAID Level 0 is not considered a true form of RAID because it cannot recover from hardware failure. a. True b. False

true

Resource holding, where a job holds on to one resource while waiting for another one that's not yet available, can be sidestepped by forcing each job to request, at creation time, every resource it will need to run to completion. a. True b. False

true

Test-and-set is a single indivisible machine instruction. In a single machine cycle, it tests to see if a key is available and, if it is, sets it to unavailable. a. True b. False

true

The common element in all synchronization schemes is to allow a process to finish work on a critical region of the program before other processes have access to it. a. True b. False

true

The loosely coupled multiprocessing configuration features several complete computer systems, each with its own memory, I/O devices, CPU, and operating system. a. True b. False

true

The universal serial bus (USB) controller acts as an interface between the operating system, device drivers, applications, and the devices that are attached via the USB host. a. True b. False

true

To recover from deadlock, a factor that is commonly considered when selecting a victim is the CPU time used by a job - jobs close to completion are usually left alone. a. True b. False

true

To support text compression, data in a fixed-length field that includes a short name followed by many blank characters can be replaced with a variable-length field and a special code to indicate how many blanks were truncated. a. True b. False

true

When multiprocessing takes place at the thread level, a high degree of synchronization is required to disassemble each process. a. True b. False

true

When using a directed graph to model a system, if there's a cycle in the graph, then there is a deadlock involving the processes and the resources shown in the cycle. a. True b. False

true

When using the Banker's Algorithm, an operating system must be sure never to satisfy a request that moves it from a safe state to an unsafe one. a. True b. False

true

In general, parallel systems can be put into two broad categories: ____ level parallelism and instruction level parallelism. a. resource b. register c. data d. task

C. data

A race introduces the element of chance, which is a highly desirable attribute, in database management. a. True b. False

False

A seek strategy for an I/O device handler is the predetermined policy that the device handler uses to allocate access to the device among the many processes that may be waiting for it. It determines the order in which the processes get the device; the goal is to keep transfer time to a minimum. a. True b. False

False

An indexed sequential file does not have overflow areas. a. True b. False

False

An optical disc drive spins at a constant speed—this is called constant linear velocity. a. True b. False

False

Deadlock does not usually affect the entire system. a. True b. False

False

Each active thread in a process has its own processor registers, data area, and resources. a. True b. False

False

In a file directory tree structure, the "leaves" of the tree are subdirectories created by the user. a. True b. False

False

In a loosely coupled system, a job may move from one processor to another during execution. a. True b. False

False

In parallel computations, mutual exclusion is achieved automatically because each operation is handled in order, one at a time. a. True b. False

False

In the dining philosophers problem, there are five philosophers and four forks. a. True b. False

False

RAID begins with the assumption that a small set of large-capacity disk drives is preferable to a larger set of small-capacity disk drives. a. True b. False

False

The File Manager responds to the CREATE command by creating a new file. a. True b. False

False

The job of the I/O control unit is to keep up with the I/O requests from the CPU and pass them down the line to the appropriate control unit. a. True b. False

False

The master/slave configuration is a symmetric multiprocessing system. a. True b. False

False

The success of process synchronization hinges on the capability of the operating system to make a resource available to other processes while it is being used by one of them. a. True b. False

False

The two operations that can be performed on a semaphore variable are select and increment (P and V). a. True b. False

False

When a programmer indicates in the code which instructions can be executed in parallel in a program (for example, using COBEGIN and COEND), it is called implicit parallelism. a. True b. False

False

When a user gives a command to modify the contents of a file, it's actually a command to access folders within the file. a. True b. False

False

When using DMA, the CPU controls the transfer of data to and from memory over the system bus. a. True b. False

False

A file extension is usually two to four characters in length and is separated from the relative name by a period. a. True b. False

True

Buffers are used to synchronize the movement of data between the relatively slow I/O devices and the very fast CPU. a. True b. False

True

Deadlock is a system-wide tangle of resource requests that begins when two or more jobs are put on hold, each waiting for a vital resource to become available. a. True b. False

True

Early programming languages did not support the creation of threads or the existence of concurrent processes. The Ada programming language was one of the first to do so. a. True b. False

True

Fixing a deadlock situation requires outside intervention. a. True b. False

True

If locks are not used to preserve data integrity, the updated records in a database may include only some of the data—and their contents depend on the order in which each process finishes its execution. a. True b. False

True

In the N-Step SCAN device-scheduling algorithm, any requests that arrive while the arm is in motion are grouped for the arm's next sweep. a. True b. False

True

Many systems force users to have their files organized for fixed-length records if the records are to be accessed directly. a. True b. False

True

Sequential record organization is by far the easiest to implement because records are stored and retrieved serially, one after the other. a. True b. False

True

The classic problem of producers and consumers is one in which one or more processes produce some data that one or more processes consume later. a. True b. False

True

When using a contiguous file storage scheme, the File Manager keeps track of empty storage areas by treating them as files. a. True b. False

True

____ is necessary in any computer system because some resources such as memory, CPU, and dedicated devices must be exclusively allocated to one user at a time. a. Mutual exclusion b. Resource holding c. No preemption d. Circular wait

a. Mutual exclusion

____ is a way to optimize search times on hard disk drives by ordering the requests once the read/write heads have been positioned. a. Rotational ordering b. SSTF c. C-SCAN d. LOOK and SCAN

a. Rotational ordering

Many computer users and some operating systems call subdirectories ____. a. folders b. files c. volumes d. databases

a. folders

In a direct record organization scheme, the program used to store the data follows a set of instructions, called a ____ algorithm, that transforms each key into a number, the record's logical address. a. hashing b. grouping c. translation d. lookup

a. hashing

To put data on an optical disc requires a high-intensity laser beam, which burns indentations, called pits, and flat areas, called ____. a. lands b. valleys c. hills d. lakes

a. lands

The ____ multiprocessing configuration features several complete computer systems, each with its own memory, I/O devices, CPU, and operating system. a. loosely coupled b. master/slave c. symmetric d. synchronized

a. loosely coupled

The first and simplest recovery method, and the most drastic, is to ____. a. select a nondeadlocked job, preempt the resources it's holding, and allocate them to a deadlocked process so it can resume execution, thus breaking the deadlock b. identify which jobs are involved in the deadlock and terminate them one at a time, checking to see if the deadlock is eliminated after each removal c. terminate only the jobs involved in the deadlock and ask their users to resubmit them d. terminate every job that's active in the system and restart them from the beginning

d. terminate every job that's active in the system and restart them from the beginning

As long as users refer to files in the ____ directory, they can access the files without entering the absolute filename. a. root b.main c. home d. working

d. working

A compressed image file can be reconstructed if a lossy compression algorithm is used because the compression process is reversible. a. True b. False

false

A deadlock is preceded by the simultaneous occurrence of six conditions that the operating system (or other systems) could have recognized. a. True b. False

false

A field is a group of related records that can be identified by the user with a name, type, and size. a. True b. False

false

According to the Banker's Algorithm, an unsafe state always leads to deadlock. a. True b. False

false

Database locking should be done only at the level of the entire database. a. True b. False

false

Device management principles are changing rapidly to accommodate cloud computing. a. True b. False

false

Files cannot be converted from sequential to direct or vice versa. a. True b. False

false

In a file management system, information is passed from the Device Manager at the top of the hierarchy to the File Manager at the bottom. a. True b. False

false

In general, operating systems must either choose avoidance or recovery as a strategy for dealing with deadlocks. a. True b. False

false

Seek time is the fastest characteristic of a fixed-head disk drive. a. True b. False

false

Starvation is the result of a policy that liberally allocates resources. a. True b. False

false

The Shortest Seek Time First device-scheduling algorithm moves the arm methodically from the inner to the outer track, servicing every request in its path. a. True b. False

false

The only tangible benefit of parallel processing systems is faster processing. a. True b. False

false

The primary disadvantage of the WAIT and SIGNAL operation set is that it does not address busy waiting. a. True b. False

false

Two of the most important measures of optical disc drive performance are sustained data-transfer rate and maximum access time. a. True b. False

false

Within a file, variable-length records are easier to access directly than fixed-length records. a. True b. False

false

Consider the case of a home construction company with two application programs, purchasing (P1) and sales (P2), which are active at the same time. They each need to access two files, inventory (F1) and suppliers (F2), to update daily transactions. The following series of events will cause a deadlock. Fill in the missing event in the sequence. 1. Purchasing (P1) accesses the supplier file (F2). 2. Sales (P2) accesses the inventory file (F1). 3. Purchasing (P1) doesn't release the supplier file (F2) and requests the inventory file (F1), but P1 is blocked because F1 is being held by P2. 4. Meanwhile, ____ a. sales (P2) doesn't release the inventory file (F1) but requests the supplier file (F2) b. sales (P2) does release the inventory file (F1) and then requests the supplier file (F2) c. purchasing (P1) does release the supplier file (F2) which is then requested by sales (P2) d. purchasing (P1) exits

a. sales (P2) doesn't release the inventory file (F1) but requests the supplier file (F2)

The ____ is a hardware flag that must be tested by the CPU to determine when a device has completed an operation. a. Channel Interrupt Word b. Channel Status Word c. Device Status Word d. Device Polling Word

b. Channel status word

____ storage allocation allows files to use any storage space available on the disk. a. Contiguous b. Noncontiguous c. Fragmented d. Extended

b. Noncontiguous

An algorithm designed to detect starvation by tracking how long each job has been waiting for resources is using the concept of ____. a. deadlock b. aging c. preemption d. round robin

b. aging

In its simplest form, Amdahl's Law maintains that if a given program would take one hour to run to completion with one processor, but 80 percent of the program had to run sequentially (and therefore could not be sped up by applying additional processors to it), then a resulting parallel program would run only a maximum of ____ percent faster. a. 5 b. 10 c. 20 d. 25

c. 20

____ developed the Banker's Algorithm. a. Havender b. Holt c. Dijkstra d. Lane & Mooney

c. Dijkstra

The primary disadvantage of contiguous storage is that ____. a. the file system is difficult to create, implement, and manage b. a file can be spread in small pieces throughout the storage area c. a file can't be expanded unless there is empty space available immediately following it d. the file system cannot support direct access

c. a file can't be expanded unless there is empty space available immediately following it

The Banker's Algorithm is an example of a(n) ____ policy. a. mutual exclusion b. detection c. avoidance d. recovery

c. avoidance

A ____ of processing must be handled as a single unit. a. line b. segment c. critical region d. semaphore

c. critical region

Which of the following is the first step in reducing a directed graph to eliminate deadlock? a. Remove the process that is holding on to the most resources. b. Find a process that's waiting only for resource classes that aren't fully allocated c.find a process that is currently using a resource and not waiting for one. d. Find the oldest process and remove it from the graph.

c. find a process that is currently using a resource and not waiting for one.

In printing systems using ____, a disk accepts output from several users and acts as a temporary storage area for all output until the printer is ready to accept it. a. phishing b. lagging c. spooling d. spoofing

c. spooling

Transfer rate of a magnetic tape is measured in inches per second (ips) using the following formula: transfer rate = density * ____. a. block size b. average access time c. transport speed d. sector size

c. transport speed

The source code of a Java program is first compiled into an intermediate language called Java ____, which are platform-independent. a. beans b. nibs c. bits d. bytecodes

d. bytecodes

Each volume in a system has a volume descriptor followed by a ____ that lists the names and characteristics of every file contained in that volume. a. file location b. volume directory c. subdirectory d. master file directory

d. master file directory

In noncontiguous storage, one way to link file extents is at the storage level where each extent points to the ____. a. current subdirectory b. next file in the sequence c. master directory entry d. next extent in the sequence

d. next extent in the sequence

On magnetic disks, files can be organized in one of three ways: ____. a. indexed direct, indexed indirect, or random b. sequential, indirect, or direct c. sequential, random, or indirect d. sequential, direct, or indexed sequential

d. sequential, direct, or indexed sequential


Related study sets

Ch 12 - Data extraction, transformation, and loading

View Set

Bus 301 Mid Term Practice Exam, Chapter 7, Chapter 5, Chapter 6, Chapter 4

View Set

Lesson 2 - The Roaring Twenties Unit 5 - The Roaring Twenties and the Great Depression

View Set

Chapter 18: Laboratory Specimen Collection

View Set

Data Structure and Algorithm - Updated

View Set

Human relationships IB Psychology extension

View Set

Chapter 18 - Employment Discrimination

View Set

Medical Terminology - Chapter 4 - Musculoskeletal System

View Set