Deck 14: Windows Operating Systems
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/40
Play
Full screen (f)
Deck 14: Windows Operating Systems
1
One of the biggest concerns about Windows operating systems is the need for aggressive patch management to combat the many viruses and worms that target these systems.
True
2
Effective distributed security requires an authentication mechanism that allows a server to prove its identity to a client.
False
3
Windows XP was the last Windows operating system built on the Windows 95 kernel.
False
4
One disadvantage of Windows is that it does not provide much support for users working in non-English languages.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
5
A driver object can only have one device connected to it.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
6
Before the 1995 release of the Windows 95 operating system,all Windows products were merely graphical user interfaces that required the MS-DOS operating system to perform tasks.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
7
Much of Windows is written in assembly language,a programming language that's standardized and readily available.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
8
Multithreading improves database searches because data is retrieved faster when the system has several threads of execution searching an array simultaneously,especially if each thread has its own CPU.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
9
The lower half of the virtual address space is accessible only to kernel-mode processes.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
10
The Open Mode attribute for a file indicates whether other callers can open the file for read,write,or delete operations while this caller is using it.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
11
In recent Windows operating systems,almost all low-level I/O operations are asynchronous.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
12
At the operating system level,file mapping is typically used for file caching,loading,and running executable programs.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
13
Windows is a non-preemptive multitasking,multithreaded operating system.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
14
To ensure the integrity of the Windows operating system code,the designers separated operating system functions into a privileged executive process and a set of nonprivileged processes called protected subsystems.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
15
The primary file handling concept in recent versions of Windows is the virtual file.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
16
Recent Windows operating systems provide distributed security with Kerberos,which provides authentication,data integrity,and data privacy.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
17
A replacement paging policy determines which virtual page must be removed from memory to make room for a new page.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
18
The SMB protocol is a high-level specification for formatting messages to be sent across the network and correlates to the application layer (layer 7),and the presentation layer (layer 6)of the OSI model.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
19
LDAP is the hierarchical replicated naming service on which the Internet is built.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
20
The I/O Manager allows device drivers and file systems,which it perceives as device drivers,to be loaded dynamically based on the needs of the user.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
21
By default,a Windows process contains one thread with four components: a unique identifier,the contents of a volatile set of registers indicating state,two stacks used in the thread's execution,and a private storage area used by subsystems and libraries.These components are called the thread's ____.
A) context
B) heap
C) global state
D) environment
A) context
B) heap
C) global state
D) environment
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
22
In a Windows device driver,the ____ is used by the I/O Manager to communicate with the driver when it generates an IRP after an I/O request.
A) initialization routine
B) dispatch routine
C) start I/O routine
D) unload routine
A) initialization routine
B) dispatch routine
C) start I/O routine
D) unload routine
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
23
The portion of memory that is used for sections of the kernel that require maximum performance is the ____.
A) resident operating system code
B) system nonpaged pool
C) system paged pool
D) paged user code and data pool
A) resident operating system code
B) system nonpaged pool
C) system paged pool
D) paged user code and data pool
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
24
When opening a file in Windows,the creation of ____ helps bridge the gap between the characteristics of physical devices and directory and file system structures by providing a memory-based representation of shareable physical resources.
A) resource objects
B) file objects
C) file pointers
D) reference pointers
A) resource objects
B) file objects
C) file pointers
D) reference pointers
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
25
When physical memory becomes full,the ____ Memory Manager pages some of the memory contents to disk,freeing physical memory for other processes.
A) Application
B) Virtual
C) Backup
D) Physical
A) Application
B) Virtual
C) Backup
D) Physical
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
26
To accommodate the various needs of its user community,and to optimize resources,the Windows team identified the following design goals:____.
A) extensibility, portability, reliability, compatibility, and performance
B) security, portability, reliability, and performance
C) security, expandability, compatibility, and cost-effectiveness
D) portability, interoperability, and performance
A) extensibility, portability, reliability, compatibility, and performance
B) security, portability, reliability, and performance
C) security, expandability, compatibility, and cost-effectiveness
D) portability, interoperability, and performance
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
27
The Windows Task Manager can be opened by pressing and holding the ____ keys together.
A) Ctrl, W, and T
B) Ctrl, Alt, and Esc
C) Ctrl, Alt, and Delete
D) Alt and Tab
A) Ctrl, W, and T
B) Ctrl, Alt, and Esc
C) Ctrl, Alt, and Delete
D) Alt and Tab
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
28
Active Directory groups machines into administrative units called ____.
A) domains
B) sites
C) networks
D) nodes
A) domains
B) sites
C) networks
D) nodes
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
29
When processing a typical remote I/O request,which of the following happens first?
A) Transport drivers process the request and place it on the network.
B) An I/O request packet is sent to the redirector.
C) User-mode software issues a remote I/O request.
D) The I/O Manager creates an I/O request packet.
A) Transport drivers process the request and place it on the network.
B) An I/O request packet is sent to the redirector.
C) User-mode software issues a remote I/O request.
D) The I/O Manager creates an I/O request packet.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
30
The ____ paging policy determines when the pager copies a page from disk to memory.
A) placement
B) replacement
C) fetch
D) paging
A) placement
B) replacement
C) fetch
D) paging
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
31
An API called ____ is used to pass I/O requests structured in the SMB format to a remote computer.
A) MS-SMB
B) SMBAPI
C) NetAPI
D) NetBIOS
A) MS-SMB
B) SMBAPI
C) NetAPI
D) NetBIOS
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
32
The ____ attribute indicates whether to delete a file after closing it.
A) delete
B) file close
C) disposal mode
D) file disposition
A) delete
B) file close
C) disposal mode
D) file disposition
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
33
An ____ is a data structure that controls how the I/O operation is processed at each step.
A) ITB
B) IMS
C) IRP
D) IRQ
A) ITB
B) IMS
C) IRP
D) IRQ
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following Windows operating systems integrates cloud environments and distributed access?
A) Windows XP
B) Windows 7
C) Windows 8
D) Windows Server 2012
A) Windows XP
B) Windows 7
C) Windows 8
D) Windows Server 2012
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
35
____ provide a high-level interface for passing data between two processes regardless of their locations.
A) Sink caches
B) Named pipes
C) Memory-mapped I/O
D) Mailslots
A) Sink caches
B) Named pipes
C) Memory-mapped I/O
D) Mailslots
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
36
____ files exploit virtual memory capabilities by allowing an application to open a file of arbitrary size and treat it as a single contiguous array of memory locations without buffering data or performing disk I/O.
A) Memory-mapped
B) Virtual memory
C) Virtual system
D) Cached
A) Memory-mapped
B) Virtual memory
C) Virtual system
D) Cached
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
37
The ____ creates a driver object when a driver is loaded into the system and then calls the driver's initialization routine.
A) Driver Manager
B) Driver Routine
C) I/O Manager
D) I/O Routine
A) Driver Manager
B) Driver Routine
C) I/O Manager
D) I/O Routine
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
38
The primary programming interface for Windows is ____.
A) Win32 API
B) MS-DOS
C) POSIX
D) CDFS
A) Win32 API
B) MS-DOS
C) POSIX
D) CDFS
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
39
In Windows terminology,the privileged processor mode is called ____ mode and the nonprivileged processor mode is called user mode.
A) server
B) kernel
C) internal
D) computer
A) server
B) kernel
C) internal
D) computer
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
40
The ____ file system can recover from all types of errors including those that occur in critical disk sectors.
A) FAT
B) NTFS
C) CDFS
D) NFST
A) FAT
B) NTFS
C) CDFS
D) NFST
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck