Deck 12: System Management

Full screen (f)
exit full mode
Question
Any system improvement can be made only after extensive analysis of the needs of the system's resources, requirements, managers, and users.
Use Space or
up arrow
down arrow
to flip the card.
Question
Blocking increases the number of physical I/O requests.
Question
Resource utilization is usually measured as a percentage of time that the resource is idle.
Question
Increasing the number of processors necessarily increases overhead required to manage multiple jobs among multiple processors.
Question
The performance of each system resource is independent of any other resource.
Question
The location of a volume's directory on the disk never makes a significant difference in the time it takes to access it.
Question
With every patch announcement, system attackers are also armed with this critical information, and they will move quickly to compromise your system.
Question
Rescheduling requests is a technique that can help optimize I/O times.
Question
It is possible to turn the reordering algorithm either on or off during normal system operation.
Question
Patch management is a simple task that does not require much time or effort.
Question
The advantage of routine patch cycles is that they allow for thorough review of the patch and testing cycles before deployment.
Question
If a file is stored noncontiguously and has several sections residing in widely separated cylinders of a disk pack, sequentially accessing all of its records could be a time-consuming task.
Question
Availability in its simplest form means that a unit will be operational and not out of service when a user needs it.
Question
It is easy to measure system efficiency.
Question
Most operating systems were designed to work with a certain piece of hardware, a category of processors, or specific groups of users.
Question
The Network Manager allows a network administrator to monitor the use of individual computers and shared hardware, and ensure compliance with software license agreements.
Question
If you buy a terminal with an MTBF of 4000 hours, and you plan to use it for four hours a day for 20 days a month, then you would expect it to fail once every five months.
Question
Deploying a patch to a large network is not much more complicated than deploying a patch on a single computer.
Question
Throughput and capacity can be monitored by either hardware or software.
Question
Capacity is a composite measure that indicates the productivity of the system as a whole.
Question
Deployment software falls into two groups: ____.

A) structured and unstructured
B) secure and insecure
C) automatic and manual
D) agent-based and agentless
Question
____ requires a great deal of synchronization between the Memory Manager, the Processor Manager, and the I/O devices.

A) Programming
B) Multi-threaded programming
C) Multi-device management
D) Multiprogramming
Question
When networked devices, such as printers, plotters, or disk drives are required, the ____ has the responsibility of allocating and deallocating the required resources correctly.

A) Network Controller
B) Network Device Controller
C) Network Resource Director
D) Network Manager
Question
If a file is stored ____ and has several sections residing in widely separated cylinders of a disk pack, sequentially accessing all of its records could be a time-consuming task.

A) randomly
B) noncontiguously
C) contiguously
D) on several volumes
Question
____ is/are usually measured under steady-state conditions and reflects quantities such as "the number of jobs processed per day" or "the number of online transactions handled per hour."

A) Capacity
B) Turnaround time
C) Throughput
D) Bottlenecks
Question
By offering reduced rates during off hours, some users might be persuaded to run long jobs in batch mode inexpensively overnight instead of interactively during peak hours.
Question
As the memory management algorithms grow more complex, ____.

A) CPU use decreases
B) CPU overhead increases
C) buffers are required
D) system performance improves
Question
The overall responsibility of keeping an organization's patches up-to-date is ____.

A) The Chief Information Officer.
B) The Chief Security Officer.
C) The network administrator.
D) It depends on the organization.
Question
Assume that a system consisting of CPU 1 and Disk Drive A has to access Track 1, Track 9, Track 1, and then Track 9, and that the arm is already located at Track 1. Without reordering, Drive A requires ____ to complete the access. CPU1 time for 1000 instructions: 30.0 ms
Drive A access speed: 35 ms

A) 30 ms
B) 35 ms
C) 70 ms
D) 105 ms
Question
Memory management is intrinsically linked with ____ management when memory is used to buffer data between a very fast processor and slower secondary storage devices.

A) device
B) disk
C) process
D) processor
Question
____ helps the CPU match the slower speed of I/O devices.

A) Prioritizing
B) Rescheduling
C) Buffering
D) Blocking
Question
The first step in testing a patch is ____.

A) testing your contingency plans to uninstall the patch
B) checking to see if the patched software performs its assigned tasks
C) testing to see if the system restarts after the patch is installed
D) testing to see whether the patch disrupts normal system operations
Question
Benchmarks are often used by vendors to demonstrate to prospective clients the specific advantages of a new CPU, operating system, compiler, or piece of hardware.
Question
The first thing that an administrator should do upon notification of a new patch is ____.

A) Identify the criticality of the patch.
B) Deploy the patch.
C) Test the patch.
D) Ignore the notification and let automatic updates handle the patch.
Question
____ is needed to achieve success in deploying a patch to a large network.

A) Automated patch installation software
B) An accurate inventory of all hardware and software on those computers that need the patch
C) External patch management hardware
D) Launching the deployment on all the computers at the same time
Question
Because ____ have authority to write over existing programming code, they can be especially damaging if they are not valid.

A) kernel patches
B) administrator patches
C) system updates
D) software patches
Question
If directories are stored on the ____ track, then, on average, the disk drive arm has to travel farther to access each file than it would if the directories were kept in the center tracks.

A) outermost
B) innermost
C) master
D) volume
Question
A positive feedback loop mechanism monitors the system and, when it becomes too congested, signals the Job Scheduler to slow down the arrival rate of the processes.
Question
In a multiuser environment, computer costs are usually distributed among users based on the budget for each department.
Question
An algorithm for a positive feedback loop should monitor the effect of new arrivals in two places: the Processor Manager's control of the CPU and the Device Manager's read and write operations.
Question
A danger of positive feedback loops is that ____.

A) if too many new jobs are allowed to enter the job stream, the result can be an increase in page faults
B) a single job will be allowed to run to completion and slow down the system
C) it increases the chance of deadlock
D) as more jobs enter, the amount of main memory allocated to each job decreases
Question
____ is a measure of how much each unit is contributing to the overall operation.

A) Network utilization
B) Resource allocation
C) Resource utilization
D) Availability
Question
The disadvantage of maintaining billing records online is ____.

A) overhead
B) security
C) user access
D) updating
Question
When providing accounting for computer use, secondary storage used during the billing period is usually given in terms of ____.

A) type of storage device
B) units of time
C) bytes of storage
D) the number of disk tracks allocated
Question
____ is similar to availability but it measures the probability that a unit will not fail during a given time period and it is a function of MTBF.

A) Response likelihood
B) Reliability
C) Scalability
D) Operability
Question
The formula used to calculate availability is ____.

A) MTBF * (MTBF - MTTR)
B) MTBF / (MTBF - MTTR)
C) MTBF * (MTBF + MTTR)
D) MTBF / (MTBF + MTTR)
Question
A negative feedback loop mechanism monitors the system and, when it becomes too congested, signals the Job Scheduler to ____.

A) send the jobs to another processor
B) suspend processing
C) slow down process arrival rate
D) speed up process arrival rate
Question
A disadvantage of software monitoring tools over hardware monitoring tools is ____.

A) They are more difficult to install.
B) They become part of the system can therefore distort the results of the analysis.
C) They are more expensive.
D) They are not secure.
Question
Bottlenecks tend to develop ____.

A) when the system is underutilized
B) when resources reach their capacity
C) when the system is mismanaged
D) in a deadlocked system
Question
With reference to batch jobs, response time is called ____ time.

A) turnaround
B) job
C) batch
D) completion
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: System Management
1
Any system improvement can be made only after extensive analysis of the needs of the system's resources, requirements, managers, and users.
True
2
Blocking increases the number of physical I/O requests.
False
3
Resource utilization is usually measured as a percentage of time that the resource is idle.
False
4
Increasing the number of processors necessarily increases overhead required to manage multiple jobs among multiple processors.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
The performance of each system resource is independent of any other resource.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
The location of a volume's directory on the disk never makes a significant difference in the time it takes to access it.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
With every patch announcement, system attackers are also armed with this critical information, and they will move quickly to compromise your system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Rescheduling requests is a technique that can help optimize I/O times.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
It is possible to turn the reordering algorithm either on or off during normal system operation.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Patch management is a simple task that does not require much time or effort.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
The advantage of routine patch cycles is that they allow for thorough review of the patch and testing cycles before deployment.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
If a file is stored noncontiguously and has several sections residing in widely separated cylinders of a disk pack, sequentially accessing all of its records could be a time-consuming task.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Availability in its simplest form means that a unit will be operational and not out of service when a user needs it.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
It is easy to measure system efficiency.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Most operating systems were designed to work with a certain piece of hardware, a category of processors, or specific groups of users.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
The Network Manager allows a network administrator to monitor the use of individual computers and shared hardware, and ensure compliance with software license agreements.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
If you buy a terminal with an MTBF of 4000 hours, and you plan to use it for four hours a day for 20 days a month, then you would expect it to fail once every five months.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Deploying a patch to a large network is not much more complicated than deploying a patch on a single computer.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Throughput and capacity can be monitored by either hardware or software.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Capacity is a composite measure that indicates the productivity of the system as a whole.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Deployment software falls into two groups: ____.

A) structured and unstructured
B) secure and insecure
C) automatic and manual
D) agent-based and agentless
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
____ requires a great deal of synchronization between the Memory Manager, the Processor Manager, and the I/O devices.

A) Programming
B) Multi-threaded programming
C) Multi-device management
D) Multiprogramming
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
When networked devices, such as printers, plotters, or disk drives are required, the ____ has the responsibility of allocating and deallocating the required resources correctly.

A) Network Controller
B) Network Device Controller
C) Network Resource Director
D) Network Manager
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
If a file is stored ____ and has several sections residing in widely separated cylinders of a disk pack, sequentially accessing all of its records could be a time-consuming task.

A) randomly
B) noncontiguously
C) contiguously
D) on several volumes
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
____ is/are usually measured under steady-state conditions and reflects quantities such as "the number of jobs processed per day" or "the number of online transactions handled per hour."

A) Capacity
B) Turnaround time
C) Throughput
D) Bottlenecks
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
By offering reduced rates during off hours, some users might be persuaded to run long jobs in batch mode inexpensively overnight instead of interactively during peak hours.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
As the memory management algorithms grow more complex, ____.

A) CPU use decreases
B) CPU overhead increases
C) buffers are required
D) system performance improves
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
The overall responsibility of keeping an organization's patches up-to-date is ____.

A) The Chief Information Officer.
B) The Chief Security Officer.
C) The network administrator.
D) It depends on the organization.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Assume that a system consisting of CPU 1 and Disk Drive A has to access Track 1, Track 9, Track 1, and then Track 9, and that the arm is already located at Track 1. Without reordering, Drive A requires ____ to complete the access. CPU1 time for 1000 instructions: 30.0 ms
Drive A access speed: 35 ms

A) 30 ms
B) 35 ms
C) 70 ms
D) 105 ms
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Memory management is intrinsically linked with ____ management when memory is used to buffer data between a very fast processor and slower secondary storage devices.

A) device
B) disk
C) process
D) processor
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
____ helps the CPU match the slower speed of I/O devices.

A) Prioritizing
B) Rescheduling
C) Buffering
D) Blocking
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
The first step in testing a patch is ____.

A) testing your contingency plans to uninstall the patch
B) checking to see if the patched software performs its assigned tasks
C) testing to see if the system restarts after the patch is installed
D) testing to see whether the patch disrupts normal system operations
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Benchmarks are often used by vendors to demonstrate to prospective clients the specific advantages of a new CPU, operating system, compiler, or piece of hardware.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
The first thing that an administrator should do upon notification of a new patch is ____.

A) Identify the criticality of the patch.
B) Deploy the patch.
C) Test the patch.
D) Ignore the notification and let automatic updates handle the patch.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
____ is needed to achieve success in deploying a patch to a large network.

A) Automated patch installation software
B) An accurate inventory of all hardware and software on those computers that need the patch
C) External patch management hardware
D) Launching the deployment on all the computers at the same time
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Because ____ have authority to write over existing programming code, they can be especially damaging if they are not valid.

A) kernel patches
B) administrator patches
C) system updates
D) software patches
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
If directories are stored on the ____ track, then, on average, the disk drive arm has to travel farther to access each file than it would if the directories were kept in the center tracks.

A) outermost
B) innermost
C) master
D) volume
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
A positive feedback loop mechanism monitors the system and, when it becomes too congested, signals the Job Scheduler to slow down the arrival rate of the processes.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
In a multiuser environment, computer costs are usually distributed among users based on the budget for each department.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
An algorithm for a positive feedback loop should monitor the effect of new arrivals in two places: the Processor Manager's control of the CPU and the Device Manager's read and write operations.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
A danger of positive feedback loops is that ____.

A) if too many new jobs are allowed to enter the job stream, the result can be an increase in page faults
B) a single job will be allowed to run to completion and slow down the system
C) it increases the chance of deadlock
D) as more jobs enter, the amount of main memory allocated to each job decreases
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
____ is a measure of how much each unit is contributing to the overall operation.

A) Network utilization
B) Resource allocation
C) Resource utilization
D) Availability
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
The disadvantage of maintaining billing records online is ____.

A) overhead
B) security
C) user access
D) updating
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
When providing accounting for computer use, secondary storage used during the billing period is usually given in terms of ____.

A) type of storage device
B) units of time
C) bytes of storage
D) the number of disk tracks allocated
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
____ is similar to availability but it measures the probability that a unit will not fail during a given time period and it is a function of MTBF.

A) Response likelihood
B) Reliability
C) Scalability
D) Operability
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
The formula used to calculate availability is ____.

A) MTBF * (MTBF - MTTR)
B) MTBF / (MTBF - MTTR)
C) MTBF * (MTBF + MTTR)
D) MTBF / (MTBF + MTTR)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
A negative feedback loop mechanism monitors the system and, when it becomes too congested, signals the Job Scheduler to ____.

A) send the jobs to another processor
B) suspend processing
C) slow down process arrival rate
D) speed up process arrival rate
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
A disadvantage of software monitoring tools over hardware monitoring tools is ____.

A) They are more difficult to install.
B) They become part of the system can therefore distort the results of the analysis.
C) They are more expensive.
D) They are not secure.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Bottlenecks tend to develop ____.

A) when the system is underutilized
B) when resources reach their capacity
C) when the system is mismanaged
D) in a deadlocked system
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
With reference to batch jobs, response time is called ____ time.

A) turnaround
B) job
C) batch
D) completion
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.