Deck 6: An Introduction to System Software and Virtual Machines

Full screen (f)
exit full mode
Question
All modern operating systems provide GUIs.
Use Space or
up arrow
down arrow
to flip the card.
Question
One of the services provided by pseudo-ops is program construction.
Question
Second-generation operating systems are called multiprogrammed operating systems.
Question
For a program to run on a naked machine, it must be represented in binary.
Question
The program that activates other system programs, applications packages, or user programs to carry out user requests is the assembler.
Question
Machine language is also known as the low-level programming language.
Question
Interaction with a text-oriented operating system requires the use of a command language.
Question
An interface prevents accidental damage to hardware, programs, and data.
Question
Machine language allows only numeric memory addresses.
Question
It is the operating system's responsibility to safeguard the password file that stores all valid user name/password combinations.
Question
On Windows machines the object program is referred to as a .EXE file.
Question
Symbolic labels increase the maintainability of a program.
Question
One of the problems with machine language is that it uses binary.
Question
The job of a loader is to translate a symbolic assembly language program into machine language.
Question
The variable used to determine the address of the given instruction or piece of data is called the program counter.
Question
Assemblers, compilers, and interpreters are all examples of language services.
Question
Assembly language does not allow the use of symbolic operation codes.
Question
Each symbolic assembly language instruction is translated into one or more machine language instructions.
Question
A real-time operating system is a variation of the network operating system.
Question
A single high-level language instruction is typically translated into many machine language instructions.
Question
In assembly language, a(n) ____ is a name, followed by a colon, placed at the beginning of an instruction that becomes a permanent identification for that instruction.

A) op code mnemonic
B) comment
C) address field
D) label
Question
In a multiprogramming environment, the only event other than termination that causes a program to be suspended is the execution of a slow I/O operation.
Question
C++ and Java are examples of ____ languages.

A) low-level programming
B) high-level programming
C) machine
D) assembly
Question
A(n) ____ operation involves the comparison of values and the subsequent use of the outcome to decide what to do next.

A) iterative
B) conditional
C) sequential
D) transformer
Question
A computer placed inside another piece of equipment is known as an embedded system.
Question
A prompt character is displayed on screen to indicate that an operating system is waiting for input.
Question
In a ____ computing environment, users do not need to know the location of a given resource within the network.

A) network
B) distributed
C) real-time
D) batch
Question
In ____ language, if we insert or delete an instruction, all memory addresses following that instruction will change.

A) assembly
B) machine
C) low-level programming
D) high-level programming
Question
The ____ hides from the user the messy details of underlying hardware.

A) interface
B) operating system
C) system software
D) machine code
Question
After all the fields of an assembly language instruction have been translated into binary, the newly built machine language instruction and the address of where it is to be loaded are written out to a file called the ____ file.

A) table
B) source
C) data
D) object
Question
What is the most important piece of system software on the computer?

A) assembler
B) loader
C) operating system
D) scheduler
Question
High-speed coaxial cable is called Ethernet cable.
Question
A Von Neumann computer without any helpful user-oriented features is called a(n) ____ machine.

A) distributed
B) virtual
C) assembler
D) naked
Question
A machine language program is called a(n) ____ program.

A) source
B) object
C) data
D) virtual
Question
Assemblers usually make ____ pass(es) over the source code.

A) one
B) two
C) three
D) four
Question
The set of services and resources created by the system software and seen by the user is called a(n) ____ machine.

A) naked
B) virtual
C) assembler
D) Von Neumann
Question
System software acts as a(n) ____ between the users and the hardware.

A) translator
B) intermediary
C) tester
D) security agent
Question
A program written in assembly language is called a(n) ____ program.

A) virtual
B) object
C) data
D) source
Question
Assembly languages allow the programmer to refer to op codes using a symbolic name, called the ____, rather than by a number.

A) op code mnemonic
B) virtual code
C) symbolic address
D) label
Question
In a time-sharing system, a program can keep the processor until it initiates an I/O operation and has run for a the maximum length of time.
Question
Translators for ____ are called compilers.

A) assembly language
B) machine language
C) low-level languages
D) high-level languages
Question
A(n) ____ invokes a service of the assembler.

A) compiler
B) pseudo-op
C) loader
D) operation
Question
____ is the method of issuing commands with items displayed on a screen that are selected with a mouse.

A) Windows interface
B) Point-and-click
C) Panel interface
D) Command line
Question
The ____ includes the conversion of the LOAD, ADD, and SUBTRACT operations, among others.

A) op code table
B) assembler
C) loader
D) library
Question
Because the op code table is sorted alphabetically, the ____ search algorithm is used to find an op code.

A) sequential
B) binary
C) op code
D) table
Question
The ____ problem-solving cycle involves inputting code to an assembler, translating it to machine language, loading it into a Von Neumann computer, and executing to produce answers to the problem.

A) Von Neumann
B) modern
C) algorithmic
D) conditional
Question
____ operation codes are restricted to be used in the operating system or other system software.

A) Privileged
B) User
C) Specialized
D) System
Question
The ____-generation operating system will be a parallel processing operating system that can manage thousands of processors.

A) second
B) third
C) fourth
D) fifth
Question
____, such as text editors, are sometimes organized into collections called program libraries.

A) Programming tools
B) Office tools
C) Packages
D) Utilities
Question
____ user interfaces include photography, touch, sound, fax, video, and TV.

A) Multimedia
B) Sensory
C) Graphical
D) Audio
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: An Introduction to System Software and Virtual Machines
1
All modern operating systems provide GUIs.
True
2
One of the services provided by pseudo-ops is program construction.
True
3
Second-generation operating systems are called multiprogrammed operating systems.
False
4
For a program to run on a naked machine, it must be represented in binary.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
The program that activates other system programs, applications packages, or user programs to carry out user requests is the assembler.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Machine language is also known as the low-level programming language.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Interaction with a text-oriented operating system requires the use of a command language.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
An interface prevents accidental damage to hardware, programs, and data.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Machine language allows only numeric memory addresses.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
It is the operating system's responsibility to safeguard the password file that stores all valid user name/password combinations.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
On Windows machines the object program is referred to as a .EXE file.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Symbolic labels increase the maintainability of a program.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
One of the problems with machine language is that it uses binary.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
The job of a loader is to translate a symbolic assembly language program into machine language.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
The variable used to determine the address of the given instruction or piece of data is called the program counter.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Assemblers, compilers, and interpreters are all examples of language services.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Assembly language does not allow the use of symbolic operation codes.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Each symbolic assembly language instruction is translated into one or more machine language instructions.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
A real-time operating system is a variation of the network operating system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
A single high-level language instruction is typically translated into many machine language instructions.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
In assembly language, a(n) ____ is a name, followed by a colon, placed at the beginning of an instruction that becomes a permanent identification for that instruction.

A) op code mnemonic
B) comment
C) address field
D) label
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
In a multiprogramming environment, the only event other than termination that causes a program to be suspended is the execution of a slow I/O operation.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
C++ and Java are examples of ____ languages.

A) low-level programming
B) high-level programming
C) machine
D) assembly
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
A(n) ____ operation involves the comparison of values and the subsequent use of the outcome to decide what to do next.

A) iterative
B) conditional
C) sequential
D) transformer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
A computer placed inside another piece of equipment is known as an embedded system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
A prompt character is displayed on screen to indicate that an operating system is waiting for input.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
In a ____ computing environment, users do not need to know the location of a given resource within the network.

A) network
B) distributed
C) real-time
D) batch
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
In ____ language, if we insert or delete an instruction, all memory addresses following that instruction will change.

A) assembly
B) machine
C) low-level programming
D) high-level programming
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
The ____ hides from the user the messy details of underlying hardware.

A) interface
B) operating system
C) system software
D) machine code
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
After all the fields of an assembly language instruction have been translated into binary, the newly built machine language instruction and the address of where it is to be loaded are written out to a file called the ____ file.

A) table
B) source
C) data
D) object
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
What is the most important piece of system software on the computer?

A) assembler
B) loader
C) operating system
D) scheduler
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
High-speed coaxial cable is called Ethernet cable.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
A Von Neumann computer without any helpful user-oriented features is called a(n) ____ machine.

A) distributed
B) virtual
C) assembler
D) naked
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
A machine language program is called a(n) ____ program.

A) source
B) object
C) data
D) virtual
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Assemblers usually make ____ pass(es) over the source code.

A) one
B) two
C) three
D) four
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
The set of services and resources created by the system software and seen by the user is called a(n) ____ machine.

A) naked
B) virtual
C) assembler
D) Von Neumann
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
System software acts as a(n) ____ between the users and the hardware.

A) translator
B) intermediary
C) tester
D) security agent
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
A program written in assembly language is called a(n) ____ program.

A) virtual
B) object
C) data
D) source
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Assembly languages allow the programmer to refer to op codes using a symbolic name, called the ____, rather than by a number.

A) op code mnemonic
B) virtual code
C) symbolic address
D) label
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
In a time-sharing system, a program can keep the processor until it initiates an I/O operation and has run for a the maximum length of time.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Translators for ____ are called compilers.

A) assembly language
B) machine language
C) low-level languages
D) high-level languages
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
A(n) ____ invokes a service of the assembler.

A) compiler
B) pseudo-op
C) loader
D) operation
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
____ is the method of issuing commands with items displayed on a screen that are selected with a mouse.

A) Windows interface
B) Point-and-click
C) Panel interface
D) Command line
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
The ____ includes the conversion of the LOAD, ADD, and SUBTRACT operations, among others.

A) op code table
B) assembler
C) loader
D) library
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Because the op code table is sorted alphabetically, the ____ search algorithm is used to find an op code.

A) sequential
B) binary
C) op code
D) table
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
The ____ problem-solving cycle involves inputting code to an assembler, translating it to machine language, loading it into a Von Neumann computer, and executing to produce answers to the problem.

A) Von Neumann
B) modern
C) algorithmic
D) conditional
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
____ operation codes are restricted to be used in the operating system or other system software.

A) Privileged
B) User
C) Specialized
D) System
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
The ____-generation operating system will be a parallel processing operating system that can manage thousands of processors.

A) second
B) third
C) fourth
D) fifth
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
____, such as text editors, are sometimes organized into collections called program libraries.

A) Programming tools
B) Office tools
C) Packages
D) Utilities
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
____ user interfaces include photography, touch, sound, fax, video, and TV.

A) Multimedia
B) Sensory
C) Graphical
D) Audio
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.