Deck 15: Windows Operating Systems

ملء الشاشة (f)
exit full mode
سؤال
At the operating system level, file mapping is typically used for file caching, loading, and running executable programs.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A replacement policy determines which virtual page must be removed from memory to make room for a new page.
سؤال
Much of Windows is written in assembly language, a programming language that's standardized and readily available.
سؤال
One of the biggest concerns about Windows operating systems in general is the need for aggressive patch management to combat the many viruses and worms that target these systems.
سؤال
To give fast response times when dealing with CPU-bound applications, all that is required is fast hardware.
سؤال
The I/O Manager allows device drivers and file systems, which it perceives as device drivers, to be loaded dynamically based on the needs of the user.
سؤال
The Open Mode attribute for a file indicates whether other callers can open the file for read, write, or delete operations while this caller is using it.
سؤال
In 1999, Microsoft changed the operating system's name from Windows NT to Windows 2000.
سؤال
The SMB protocol is a high-level specification for formatting messages to be sent across the network and correlates to the application layer (layer 7), and the presentation layer (layer 6) of the OSI model.
سؤال
LDAP is the hierarchical replicated naming service on which the Internet is built.
سؤال
To ensure the integrity of the Windows operating system code the designers separated operating system functions into a privileged executive process and a set of nonprivileged processes called "protected subsystems."
سؤال
Windows XP was the last Windows operating system built on the Windows 95 code.
سؤال
In the Windows operating systems, almost all low-level I/O operations are asynchronous.
سؤال
The primary file handling concept in current versions of Windows is the virtual file.
سؤال
Windows provides execution environments for applications that are different from its primary programming interface.
سؤال
Windows is a non-preemptive-multitasking, multithreaded operating system.
سؤال
A driver object can only have one device connected to it.
سؤال
The lower half of the virtual address space is accessible only to kernel-mode processes.
سؤال
The first Windows application was not a true operating system.
سؤال
Multithreading is advantageous when doing database searches because data is retrieved faster when the system has several threads of execution that are searching an array simultaneously, especially if each thread has its own CPU.
سؤال
A thread is the entity within a process that the ____ schedules for execution.

A) thread manager
B) thread scheduler
C) process scheduler
D) kernel
سؤال
The code that must access processor-dependent data structures and registers is contained in small ____ that can be replaced by similar code for different processors.

A) segments
B) routines
C) modules
D) functions
سؤال
Kerberos provides authentication, data integrity, and data privacy.
سؤال
The ____ file system called can recover from all types of errors including those that occur in critical disk sectors.

A) FAT
B) NTFS
C) CDFS
D) NFST
سؤال
The portion of memory that is used for sections of the kernel that require maximum performance is ____.

A) The lower part of the resident operating system code
B) The middle part of the resident operating system code
C) The upper part of the resident operating system code
D) The highest portion of memory
سؤال
In processor management, the ____ is what actually executes the code.

A) thread
B) heap
C) global variable
D) environment string
سؤال
When physical memory becomes full, the ____ Memory Manager pages some of the memory contents to disk, freeing physical memory for other processes.

A) Application
B) Virtual
C) Backup
D) Physical
سؤال
In a Windows device driver, the ____ is used by the I/O Manager to communicate with the driver when it generates an IRP after an I/O request.

A) initialization routine
B) dispatch routine
C) start I/O routine
D) unload routine
سؤال
The first widely adopted Windows product, ____, featured a standardized look and feel, similar to the one made popular by Apple's Macintosh computer.

A) Windows 1.0
B) Windows 3.0
C) Windows 3.1
D) Windows for Workgroups
سؤال
The ____ policy determines when the pager copies a page from disk to memory.

A) placement
B) replacement
C) fetch
D) paging
سؤال
The primary programming interface for Windows is ____.

A) Win32 API
B) MS-DOS
C) POSIX
D) CDFS
سؤال
Windows does not provide much support for users who do not speak and read English.
سؤال
Whenever an error occurs, either the operating system or the processor issues an exception call, which automatically invokes the ____ that is appropriate to handle the condition, ensuring that no harm is done to either user programs or the system.

A) error processor
B) exception module
C) exception hierarchy
D) exception handling code
سؤال
Effective distributed security requires an authentication mechanism that allows a server to prove its identity to a client.
سؤال
To accommodate the various needs of its user community, and to optimize resources, the Windows team identified the following design goals:____.

A) extensibility, portability, reliability, compatibility, and performance
B) security, portability, reliability, and performance
C) security, expandability, compatibility, and cost-effectiveness
D) portability, interoperability, and performance
سؤال
A(n) ____ is a data structure that controls how the I/O operation is processed at each step.

A) ITB
B) IMS
C) IRP
D) IRQ
سؤال
For users who are faster with the keyboard than with a pointing device, Windows provides many keyboard shortcuts.
سؤال
In Windows terminology, the privileged processor mode is called ____ mode and the nonprivileged processor mode is called user mode.

A) server
B) kernel
C) internal
D) computer
سؤال
A standard utility program called Internet Explorer contains directory and file display tools and a file finding tool.
سؤال
The ____ version of Windows introduced X.500-style directory services, Kerberos security, and improved Distributed Component Object Model (DCOM).

A) Windows NT Server version 4.0
B) Windows 2000 Server
C) Windows Server 2003
D) Windows Server 2005
سؤال
____ files exploit virtual memory capabilities by allowing an application to open a file of arbitrary size and treat it as a single contiguous array of memory locations without buffering data or performing disk I/O.

A) Memory-mapped
B) Virtual memory
C) Virtual system
D) Cached
سؤال
The Windows Task Manager is opened by pressing and holding the ____ keys.

A) Ctrl, W, and T
B) Ctrl, Alt, and Esc
C) Ctrl, Alt, and Delete
D) Alt and Tab
سؤال
The ____ creates a driver object when a driver is loaded into the system and then calls the driver's initialization routine.

A) Driver Manager
B) Driver Routine
C) I/O Manager
D) I/O Routine
سؤال
An API called ____ interface is used to pass I/O requests structured in the SMB format to a remote computer.

A) MS-SMB
B) SMBAPI
C) NetAPI
D) NetBIOS
سؤال
When processing a typical I/O request, ____ happens first.

A) Transport drivers process the request and place it on the network.
B) An I/O request packet is sent to the redirector.
C) User-mode software issues a remote I/O request.
D) The I/O Manager creates an I/O request packet.
سؤال
Active Directory groups machines into administrative units called ____.

A) domains
B) sites
C) networks
D) nodes
سؤال
____ provide a high-level interface for passing data between two processes regardless of their locations.

A) Sink caches
B) Named pipes
C) Memory-mapped I/O
D) Mailslots
سؤال
The ____ attribute indicates whether to delete the file after closing it.

A) share mode
B) open mode
C) disposal mode
D) file disposition
سؤال
To start an application from the Windows desktop, users ____ on an application icon or select it from the Start menu.

A) press SHIFT and click
B) double-click
C) press CTRL and click
D) click once
سؤال
In Windows, programs perform I/O on virtual files, manipulating them by using file ____.

A) maps
B) handles
C) pointers
D) references
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 15: Windows Operating Systems
1
At the operating system level, file mapping is typically used for file caching, loading, and running executable programs.
True
2
A replacement policy determines which virtual page must be removed from memory to make room for a new page.
True
3
Much of Windows is written in assembly language, a programming language that's standardized and readily available.
False
4
One of the biggest concerns about Windows operating systems in general is the need for aggressive patch management to combat the many viruses and worms that target these systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
To give fast response times when dealing with CPU-bound applications, all that is required is fast hardware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
The I/O Manager allows device drivers and file systems, which it perceives as device drivers, to be loaded dynamically based on the needs of the user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
The Open Mode attribute for a file indicates whether other callers can open the file for read, write, or delete operations while this caller is using it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
In 1999, Microsoft changed the operating system's name from Windows NT to Windows 2000.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
The SMB protocol is a high-level specification for formatting messages to be sent across the network and correlates to the application layer (layer 7), and the presentation layer (layer 6) of the OSI model.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
LDAP is the hierarchical replicated naming service on which the Internet is built.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
To ensure the integrity of the Windows operating system code the designers separated operating system functions into a privileged executive process and a set of nonprivileged processes called "protected subsystems."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
Windows XP was the last Windows operating system built on the Windows 95 code.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
In the Windows operating systems, almost all low-level I/O operations are asynchronous.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
The primary file handling concept in current versions of Windows is the virtual file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Windows provides execution environments for applications that are different from its primary programming interface.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
Windows is a non-preemptive-multitasking, multithreaded operating system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
A driver object can only have one device connected to it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
The lower half of the virtual address space is accessible only to kernel-mode processes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
The first Windows application was not a true operating system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
Multithreading is advantageous when doing database searches because data is retrieved faster when the system has several threads of execution that are searching an array simultaneously, especially if each thread has its own CPU.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
A thread is the entity within a process that the ____ schedules for execution.

A) thread manager
B) thread scheduler
C) process scheduler
D) kernel
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
The code that must access processor-dependent data structures and registers is contained in small ____ that can be replaced by similar code for different processors.

A) segments
B) routines
C) modules
D) functions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Kerberos provides authentication, data integrity, and data privacy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
The ____ file system called can recover from all types of errors including those that occur in critical disk sectors.

A) FAT
B) NTFS
C) CDFS
D) NFST
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
The portion of memory that is used for sections of the kernel that require maximum performance is ____.

A) The lower part of the resident operating system code
B) The middle part of the resident operating system code
C) The upper part of the resident operating system code
D) The highest portion of memory
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
In processor management, the ____ is what actually executes the code.

A) thread
B) heap
C) global variable
D) environment string
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
When physical memory becomes full, the ____ Memory Manager pages some of the memory contents to disk, freeing physical memory for other processes.

A) Application
B) Virtual
C) Backup
D) Physical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
In a Windows device driver, the ____ is used by the I/O Manager to communicate with the driver when it generates an IRP after an I/O request.

A) initialization routine
B) dispatch routine
C) start I/O routine
D) unload routine
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
The first widely adopted Windows product, ____, featured a standardized look and feel, similar to the one made popular by Apple's Macintosh computer.

A) Windows 1.0
B) Windows 3.0
C) Windows 3.1
D) Windows for Workgroups
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
The ____ policy determines when the pager copies a page from disk to memory.

A) placement
B) replacement
C) fetch
D) paging
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
The primary programming interface for Windows is ____.

A) Win32 API
B) MS-DOS
C) POSIX
D) CDFS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
Windows does not provide much support for users who do not speak and read English.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
Whenever an error occurs, either the operating system or the processor issues an exception call, which automatically invokes the ____ that is appropriate to handle the condition, ensuring that no harm is done to either user programs or the system.

A) error processor
B) exception module
C) exception hierarchy
D) exception handling code
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
Effective distributed security requires an authentication mechanism that allows a server to prove its identity to a client.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
To accommodate the various needs of its user community, and to optimize resources, the Windows team identified the following design goals:____.

A) extensibility, portability, reliability, compatibility, and performance
B) security, portability, reliability, and performance
C) security, expandability, compatibility, and cost-effectiveness
D) portability, interoperability, and performance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
A(n) ____ is a data structure that controls how the I/O operation is processed at each step.

A) ITB
B) IMS
C) IRP
D) IRQ
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
For users who are faster with the keyboard than with a pointing device, Windows provides many keyboard shortcuts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
In Windows terminology, the privileged processor mode is called ____ mode and the nonprivileged processor mode is called user mode.

A) server
B) kernel
C) internal
D) computer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
A standard utility program called Internet Explorer contains directory and file display tools and a file finding tool.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
The ____ version of Windows introduced X.500-style directory services, Kerberos security, and improved Distributed Component Object Model (DCOM).

A) Windows NT Server version 4.0
B) Windows 2000 Server
C) Windows Server 2003
D) Windows Server 2005
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
____ files exploit virtual memory capabilities by allowing an application to open a file of arbitrary size and treat it as a single contiguous array of memory locations without buffering data or performing disk I/O.

A) Memory-mapped
B) Virtual memory
C) Virtual system
D) Cached
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
The Windows Task Manager is opened by pressing and holding the ____ keys.

A) Ctrl, W, and T
B) Ctrl, Alt, and Esc
C) Ctrl, Alt, and Delete
D) Alt and Tab
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
The ____ creates a driver object when a driver is loaded into the system and then calls the driver's initialization routine.

A) Driver Manager
B) Driver Routine
C) I/O Manager
D) I/O Routine
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
An API called ____ interface is used to pass I/O requests structured in the SMB format to a remote computer.

A) MS-SMB
B) SMBAPI
C) NetAPI
D) NetBIOS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
When processing a typical I/O request, ____ happens first.

A) Transport drivers process the request and place it on the network.
B) An I/O request packet is sent to the redirector.
C) User-mode software issues a remote I/O request.
D) The I/O Manager creates an I/O request packet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Active Directory groups machines into administrative units called ____.

A) domains
B) sites
C) networks
D) nodes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
____ provide a high-level interface for passing data between two processes regardless of their locations.

A) Sink caches
B) Named pipes
C) Memory-mapped I/O
D) Mailslots
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
The ____ attribute indicates whether to delete the file after closing it.

A) share mode
B) open mode
C) disposal mode
D) file disposition
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
To start an application from the Windows desktop, users ____ on an application icon or select it from the Start menu.

A) press SHIFT and click
B) double-click
C) press CTRL and click
D) click once
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
In Windows, programs perform I/O on virtual files, manipulating them by using file ____.

A) maps
B) handles
C) pointers
D) references
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.