Operating Systems, 6th ed.
a. b. c. d.
Test Bank
Chapter 1
Operating Systems, 6th ed.
Test Bank
Chapter 1
WORM memory Cache memory CD-RW memory None of the above
15. When a new block of data is written into cache memory, the following determines which cache location the block will occupy: a. b. c. d.
Block size Cache size Write policy None of the above Fill-In-The-Blank Questions:
16. Direct Memory Access (DMA) operations require the following information from the processor: a. b. c. d.
Address of I/O device Starting memory location to read from or write to Number of words to be read or written All of the above
1. An operating system exploits the hardware resources of one or more processors to provide a set of services to ________________.
2. Each location in Main Memory contains a _______________ that can be interpreted as either an instruction or data.
3. Registers that are used by system programs to minimize main memory references by optimizing register use are called _________________.
4. A special type of address register, required by a system that implements uservisible stack addressing, is called a __________________.
5. The ____________________ contains the most recently fetched instruction.
6. The processing required for a single instruction is called a(n) _______________ cycle.
7. A fetched instruction is normally loaded into the __________________.
8. An arithmetic overflow condition resulting from some instructional execution will generate a(n) _________________ interrupt.
Page 5 of 21
Page 6 of 21
Operating Systems, 6th ed.
Test Bank
Chapter 1
24. The principle objective of a time sharing, multiprogramming system is to: a. b. c. d.
Maximize response time Maximize processor use Provide exclusive access to hardware None of the above
25. Which of the following major line of computer system development created problems in timing and synchronization that contributed to the development of the concept of the process? a. b. c. d.
Multiprogramming batch operation systems Time sharing systems Real time transaction systems All of the above
26. The paging system in a memory management system provides for dynamic mapping between a virtual address used in a program and: a. b. c. d.
A virtual address in main memory A real address in main memory A real address in a program None of the above
Operating Systems, 6th ed.
Test Bank
29. A technique in which a process, executing an application, is divided into threads that can run concurrently is called: a. b. c. d.
Multithreading Multiprocessing Symmetric multiprocessing (SMP) None of the above
30. WIN2K supports several types of user applications, including: a. b. c. d.
WIN32 Linux System 10 None of the above
31. Key to the success of Linux has been it’s character as a free software package available under the auspices of the: a. b. c. d.
World Wide Web Consortium Free Software Foundation Berkeley Software Distribution None of the above
27. Relative to information protection and security in computer systems, access control typically refers to: a. b. c. d.
Proving that security mechanisms perform according to specification The flow of data within the system Regulating user and process access to various aspects of the system None of the above
28. A common problem with full-featured operating systems, due to their size and difficulty of the tasks they address, is: a. b. c. d.
Chronically late in delivery Latent bugs that show up in the field Sub-par performance All of the above
Page 11 of 21
Chapter 1
Page 12 of 21
Operating Systems, 6th ed.
Test Bank
Chapter 1
Operating Systems, 6th ed.
Test Bank
Chapter 1
d. All of the above 39. A Memory Table is an O/S control structure that is used by the O/S to: 34. The basic Two-State Process Model defines two possible states for a process in relationship to the processor: a. b. c. d.
Running and Executing Running and Not Running Executing and Waiting None of the above
35. There are a number of conditions that can lead to process termination, including: a. b. c. d.
Normal completion Bounds violation Parent termination All of the above
a. b. c. d.
Manage I/O devices Manage processes Provide information about system files None of the above
40. The Process Image element that contains the collection of attributes needed by the O/S to control a particular process is called the: a. b. c. d.
User Data System Stack Process Control Block None of the above
41. The Process Image element that contains the modifiable part of the user space is called the: 36. In the Five-State Process Model, the following represents a valid state transition: a. b. c. d.
a. b. c. d.
Running -> Blocked New -> Running New -> Blocked All of the above
37. In a Process Model that i mplements two suspend states, a valid state transition is represented by: a. b. c. d.
Ready/Suspend -> Ready Running -> Ready/Suspend Ready -> Ready/Suspend All of the above
User Program System Stack Process Control Block None of the above
42. The processor execution mode that user programs typically execute in is referred to as: a. b. c. d.
User mode System mode Kernel mode None of the above
43. One step in the procedure for creating a new process involves: 38. The scheduling strategy where each process in the queue is given a certain amount of time, in turn, to execute and then returned to the queue, unless blocked is referred to as: a. b. c. d.
Prioritization Round-Robin LIFO All of the above
a. b. c. d.
Initializing the process control block Allocating space for the process Assigning a unique identifier All of the above
44. A process switch may occur when the system encounters an interrupt condition, such as that generated by a:
Page 17 of 21
Page 18 of 21
Operating Systems, 6th ed.
a. b. c. d.
Test Bank
Chapter 1
Operating Systems, 6th ed.
Test Bank
Chapter 1
Memory fault Supervisor call Trap All of the above
45. In the Process Based O/S: a. b. c. d.
Major kernel functions are organized as separate functions The User Process Image includes a kernel stack O/S code and data are contained in the shared address space None of the above
46. In a typical UNIX system, the element of the process image that contains the processor status information is the: a. b. c. d.
System-level context Register context User-level context All of the above
Fill-In-The-Blank Questions: 32. The listing of a sequence of instructions that execute for a particular process i s called a ___________________.
33. The behavior of a processor can be characterized by examining the interleaving of the process ____________ for the processes currently running on the system.
34. The portion of the operating system that selects the next process to run is called the _______________.
35. When the O/S creates a process at the explicit request of an existing process, the action is referred to as _______________________.
36. A process that cannot execute until some event occurs is said to be in the _______________ state.
37. In a system that implements two suspend states, a process that has been swapped out of main memory and into secondary memory and that is also awaiting an event is in the ________/________ state.
38. The scheduling strategy where each process in the queue is given a certain amount of time, in turn, to execute and then returned to the queue, unless blocked is referred to as _______________.
Page 19 of 21
Page 20 of 21
Operating Systems, 6th ed.
Test Bank
Chapter 1
39. The O/S control structure that the O/S uses to manage system processes is called the ________________.
40. The User Data, User Program, System Stack and Process Control Block elements collectively make up what is referred to as the __________________.
41. The Process Identification, Processor State Information and the Process Control Information are the general categories that collectively make up what is referred to as the _________________.
42. The processor typically maintains the current operating mode (i.e., user or kernel) in the _________________.
43. The first step in creating a new process is to assign a unique ________________ to the new process.
44. The execution of a user process may be interrupted by a __________________, which might be generated by the process requesting an I/O operation.
45. In the __________________ model for illustrating the relationship between the O/S and User Processes, the O/S has its own region of memory to use and its own system stack for controlling procedure calls and returns.
46. In the __________________ model for illustrating the relationship between the O/S and User Processes, the O/S has its own region of memory to use and its own system stack for controlling procedure calls and returns.
47. Process creation in a typical UNIX system is made by means of a kernel system call named _______________.
Page 21 of 21