Deck 6: An Introduction to System Software and Virtual Machines
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 6: An Introduction to System Software and Virtual Machines
1
For a program to run on a naked machine, it must be represented in binary . _________________________
True
2
Assembly language does not allow the use of symbolic operation codes.
False
3
The variable used to determine the address of a given instruction or piece of data is called the location counter. _________________________
True
4
All modern operating systems provide GUIs.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Each symbolic assembly language instruction is translated into one machine language instruction.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
It is the responsibility of the ____________________ to safeguard the password file that stores all valid user name/password combinations.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
The user interfaces on the operating systems of the 1950s, 1960s, and 1970s were command languages, requiring text entry . _________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
In a time-sharing system, a program can keep the processor until it initiates an I/O operation and has run for the maximum length of time.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
One of the benefits of machine language is that it uses natural language and mathematical notations.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Second -generation operating systems are called multiprogrammed operating systems. _________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
A(n)____________________ character is displayed on screen to indicate that command language operating system is waiting for input.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Typically, all requests to a(n)____________________ operating system are prioritized.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Clients cannot perform local computations without access to the network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Machine language is a high-level programming language.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
____________________ addresses increase the maintainability of a program.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
One of the services provided by pseudo-ops is program construction.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
A single high-level language instruction is typically translated into many high-level language instructions. _________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
A naked machine is a computer that requires direct input of binary commands to the hardware to run.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Assemblers, __________, and interpreters are all examples of language services.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Machine language allows only binary memory addresses.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
The ____ problem-solving cycle involves inputting code to an assembler, translating it to machine language, loading it into a Von Neumann computer, and executing to produce answers to the problem.
A)Von Neumann
B)modern
C)algorithmic
D)conditional
A)Von Neumann
B)modern
C)algorithmic
D)conditional
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
The ____ hides from the user the messy details of the underlying hardware.
A)interface
B)operating system
C)system software
D)machine code
A)interface
B)operating system
C)system software
D)machine code
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
The conversion of symbolic op codes such as LOAD, ADD, and SUBTRACT to binary makes use of a structure called the ____.
A)op code table
B)assembler
C)loader
D)library
A)op code table
B)assembler
C)loader
D)library
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Translators for ____ are called compilers.
A)assembly language
B)machine language
C)low-level languages
D)high-level languages
A)assembly language
B)machine language
C)low-level languages
D)high-level languages
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
A Von Neumann computer without any helpful user-oriented features is called a(n)____ machine.
A)distributed
B)virtual
C)assembler
D)naked
A)distributed
B)virtual
C)assembler
D)naked
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
A program written in assembly language is called the ____ program.
A)virtual
B)object
C)data
D)source
A)virtual
B)object
C)data
D)source
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Icons displayed on the screen are selected with a mouse and a button using a technique called ____.
A)windows interface
B)point-and-click
C)panel interface
D)command line
A)windows interface
B)point-and-click
C)panel interface
D)command line
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
After all the fields of an assembly language instruction have been translated into binary, the newly built machine language instruction and the address of where it is to be loaded are written out to a file called the ____ file.
A)table
B)source
C)data
D)object
A)table
B)source
C)data
D)object
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
In ____, a single instruction provides multiple instructions in _______.
A)assembly language, high-level programing
B)machine language, low-level programing
C)low-level programming, assembly language
D)high-level programming, machine language
A)assembly language, high-level programing
B)machine language, low-level programing
C)low-level programming, assembly language
D)high-level programming, machine language
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
The set of services and resources created by the system software and seen by the user is called a(n)____ machine.
A)naked
B)virtual
C)assembler
D)Von Neumann
A)naked
B)virtual
C)assembler
D)Von Neumann
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
____, such as text editors, are sometimes organized into collections called program libraries.
A)Programming tools
B)Office tools
C)Packages
D)Utilities
A)Programming tools
B)Office tools
C)Packages
D)Utilities
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
If the op code table is sorted alphabetically, the ____ search algorithm is used to find an op code.
A)sequential
B)binary
C)op code
D)table
A)sequential
B)binary
C)op code
D)table
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
C++ and Java are examples of ____ languages.
A)low-level programming
B)high-level programming
C)machine
D)assembly
A)low-level programming
B)high-level programming
C)machine
D)assembly
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
System software acts as a(n)____ between the users and the hardware.
A)translator
B)intermediary
C)tester
D)security agent
A)translator
B)intermediary
C)tester
D)security agent
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
A machine language program is called the ____ program.
A)source
B)object
C)data
D)virtual
A)source
B)object
C)data
D)virtual
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
____ operation codes are restricted to be used in the operating system or other system software.
A)Privileged
B)User
C)Specialized
D)System
A)Privileged
B)User
C)Specialized
D)System
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
In assembly language, a(n)____ is a name, followed by a colon, placed at the beginning of an instruction.
A)op code mnemonic
B)comment
C)address field
D)label
A)op code mnemonic
B)comment
C)address field
D)label
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
A ____-generation operating system will typically be a parallel processing operating system that can efficiently manage computer systems containing tens, hundreds, or even thousands of processors.
A)second
B)third
C)fourth
D)fifth
A)second
B)third
C)fourth
D)fifth
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
A(n)____ invokes a service of the assembler.
A)compiler
B)pseudo-op
C)loader
D)operation
A)compiler
B)pseudo-op
C)loader
D)operation
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
A(n)____ operation involves the comparison of values and the subsequent use of the outcome to decide what to do next.
A)iterative
B)conditional
C)sequential
D)transformer
A)iterative
B)conditional
C)sequential
D)transformer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Briefly explain the function of the operating system as a security guard.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Explain what a real-time operating system does. Then give a detailed example.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Describe four problems with machine language.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
What is the most important task of the operating system?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
What are the four tasks to be performed by an assembler?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
What is the single most important piece of system software on the computer? Discuss its function, and discuss at length its software packages that handle the requests of other programs.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
How does a GUI communicate with a user?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
To make a Von Neumann computer usable, what must you create between the user and the hardware? What must this created item do?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
List four responsibilities of the system software.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
What are three major advantages to writing programs in assembly language rather than machine language?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck