Deck 15: Linux Operating Systems

Full screen (f)
exit full mode
Question
Linux is an open-source program.
Use Space or
up arrow
down arrow
to flip the card.
Question
The name Linux is a contraction of Linus and UNIX.
Question
A path name can be either one name or a list of names separated by dashes.
Question
A page's middle directory contains a pointer to the actual page frame.
Question
In Linux,each process is referenced by a descriptor,which contains approximately fifteen fields describing the process attributes together with the information needed to manage the process.
Question
When Linux allocates memory space,by default it allocates one GB of high-order memory to the kernel and three GB of memory to executing processes.
Question
Virtual memory in Linux is managed using a multiple-level table hierarchy.
Question
When a process requests pages,Linux loads them into memory.When the kernel needs the memory space,the pages are released using a most recently used (MRU)algorithm.
Question
Device drivers supervise the transmission of data between main memory and the local unit.
Question
Virtual memory is implemented in Linux through demand paging.
Question
Linux was developed by Dennis Ritchie,who wanted to create an operating system to maximize the limited capabilities of the Intel 80386 microprocessor.
Question
A group known as Redhat Software has responsibility for the open-source development of the Linux kernel.
Question
To keep track of free and busy pages,Linux uses a system of page tables.
Question
In the Linux scheduler,processes with the SCHED_OTHER type have the highest priority.
Question
All Linux files are organized in directories that are connected to each other in a tree-like structure.
Question
Linux brought much of the speed,efficiency,and flexibility of UNIX to small desktop computers.
Question
Linux offers memory protection based on the type of information stored in each region belonging to the address space of a user request.
Question
Filenames are not case sensitive in Linux.
Question
Linux has system calls that change the size of the process data segment,either by expanding it to accommodate extra data values or reducing it when certain values positioned at the end of the data segment are no longer needed.
Question
The secure log file contains lists of all attempts to log in to the system,including the date,time,and duration of each access attempt.
Question
Linux terminal management conforms to ____ standards,and it also supports pseudo-terminals.

A) POSIX
B) SCSI
C) USB
D) DLL
Question
In Linux,up to a total of 256MB of usable memory can be configured into equal-sized page frames,which can be grouped to give more contiguous space to a job.These groups can also be split to accommodate smaller jobs.The process of grouping and splitting usable memory is known as the ____.

A) process algorithm
B) grouping algorithm
C) buddy algorithm
D) group/split algorithm
Question
When a process begins execution,its segments have a ____ size.

A) large
B) variable
C) small
D) fixed
Question
Linux provides semaphores to help solve the problems of mutual exclusion and of producers and consumers.The Linux semaphore structure contains ____ fields.

A) two
B) three
C) four
D) five
Question
Linux provides the foundation for the ____ operating system.

A) Snow Leopard
B) Android
C) Vista
D) Solaris
Question
Under Linux filename conventions,the ____ represents the root directory.

A) \
B) ..
C) ^
D) /
Question
The ____ device used in Linux memory management can be a partition on the disk or it can be a normal file.

A) pointer
B) swap
C) page
D) database
Question
The Linux page replacement algorithm is an expanded version of the ____ replacement policy.

A) clock page
B) clock
C) page clock
D) page
Question
____ management is designed to replace or change parts of the operating system that need to be enhanced or replaced.

A) OS
B) Patch
C) VFS
D) Kernel
Question
In Linux,____ devices cannot host a file system.

A) write
B) read
C) block
D) char
Question
Administrators use ____ logs that provide a detailed description of activity on the system.

A) file
B) directory
C) detailed
D) system
Question
In Linux,the three levels of file access are ____,____,and ____.

A) owner; domain; group
B) owner; group; administrator
C) administrator; owner others
D) owner; group; others
Question
Because Linux is written and distributed under the ____ General Public License,its source code is freely distributed and available to the general public.

A) GPL
B) Open Publication
C) GNU
D) MPP
Question
In Linux device management,the ____ device number is used as an index to the array to access the appropriate code for a specific device driver.

A) major
B) minor
C) unique
D) support
Question
Linux updates are issued free to the public about every ____ months.

A) two
B) four
C) six
D) eight
Question
In Linux,the ____ log file stores messages of which systems have successfully started up and shut down,as well as any that have failed to do so.

A) boot.log
B) dmesg
C) auth.log
D) secure
Question
The three standard classes of devices supported by Linux are ____.

A) character devices, system devices, and network interfaces
B) system devices, block devices, and network interfaces
C) character devices, block devices, and network interfaces
D) character devices, block devices, and network devices
Question
Which of the following is a popular distribution of Linux?

A) Lion
B) Ubuntu
C) Xcode
D) Ugull
Question
Linux provides ____ queues and semaphores to allow two processes to synchronize with each other.

A) exec
B) fork
C) wait
D) pause
Question
A file containing data or programs belonging to users is known as a(n)____.

A) symbolic link
B) ordinary file
C) special file
D) named pipe
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/40
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 15: Linux Operating Systems
1
Linux is an open-source program.
True
2
The name Linux is a contraction of Linus and UNIX.
True
3
A path name can be either one name or a list of names separated by dashes.
False
4
A page's middle directory contains a pointer to the actual page frame.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
5
In Linux,each process is referenced by a descriptor,which contains approximately fifteen fields describing the process attributes together with the information needed to manage the process.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
6
When Linux allocates memory space,by default it allocates one GB of high-order memory to the kernel and three GB of memory to executing processes.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
7
Virtual memory in Linux is managed using a multiple-level table hierarchy.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
8
When a process requests pages,Linux loads them into memory.When the kernel needs the memory space,the pages are released using a most recently used (MRU)algorithm.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
9
Device drivers supervise the transmission of data between main memory and the local unit.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
10
Virtual memory is implemented in Linux through demand paging.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
11
Linux was developed by Dennis Ritchie,who wanted to create an operating system to maximize the limited capabilities of the Intel 80386 microprocessor.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
12
A group known as Redhat Software has responsibility for the open-source development of the Linux kernel.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
13
To keep track of free and busy pages,Linux uses a system of page tables.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
14
In the Linux scheduler,processes with the SCHED_OTHER type have the highest priority.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
15
All Linux files are organized in directories that are connected to each other in a tree-like structure.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
16
Linux brought much of the speed,efficiency,and flexibility of UNIX to small desktop computers.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
17
Linux offers memory protection based on the type of information stored in each region belonging to the address space of a user request.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
18
Filenames are not case sensitive in Linux.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
19
Linux has system calls that change the size of the process data segment,either by expanding it to accommodate extra data values or reducing it when certain values positioned at the end of the data segment are no longer needed.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
20
The secure log file contains lists of all attempts to log in to the system,including the date,time,and duration of each access attempt.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
21
Linux terminal management conforms to ____ standards,and it also supports pseudo-terminals.

A) POSIX
B) SCSI
C) USB
D) DLL
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
22
In Linux,up to a total of 256MB of usable memory can be configured into equal-sized page frames,which can be grouped to give more contiguous space to a job.These groups can also be split to accommodate smaller jobs.The process of grouping and splitting usable memory is known as the ____.

A) process algorithm
B) grouping algorithm
C) buddy algorithm
D) group/split algorithm
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
23
When a process begins execution,its segments have a ____ size.

A) large
B) variable
C) small
D) fixed
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
24
Linux provides semaphores to help solve the problems of mutual exclusion and of producers and consumers.The Linux semaphore structure contains ____ fields.

A) two
B) three
C) four
D) five
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
25
Linux provides the foundation for the ____ operating system.

A) Snow Leopard
B) Android
C) Vista
D) Solaris
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
26
Under Linux filename conventions,the ____ represents the root directory.

A) \
B) ..
C) ^
D) /
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
27
The ____ device used in Linux memory management can be a partition on the disk or it can be a normal file.

A) pointer
B) swap
C) page
D) database
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
28
The Linux page replacement algorithm is an expanded version of the ____ replacement policy.

A) clock page
B) clock
C) page clock
D) page
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
29
____ management is designed to replace or change parts of the operating system that need to be enhanced or replaced.

A) OS
B) Patch
C) VFS
D) Kernel
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
30
In Linux,____ devices cannot host a file system.

A) write
B) read
C) block
D) char
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
31
Administrators use ____ logs that provide a detailed description of activity on the system.

A) file
B) directory
C) detailed
D) system
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
32
In Linux,the three levels of file access are ____,____,and ____.

A) owner; domain; group
B) owner; group; administrator
C) administrator; owner others
D) owner; group; others
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
33
Because Linux is written and distributed under the ____ General Public License,its source code is freely distributed and available to the general public.

A) GPL
B) Open Publication
C) GNU
D) MPP
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
34
In Linux device management,the ____ device number is used as an index to the array to access the appropriate code for a specific device driver.

A) major
B) minor
C) unique
D) support
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
35
Linux updates are issued free to the public about every ____ months.

A) two
B) four
C) six
D) eight
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
36
In Linux,the ____ log file stores messages of which systems have successfully started up and shut down,as well as any that have failed to do so.

A) boot.log
B) dmesg
C) auth.log
D) secure
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
37
The three standard classes of devices supported by Linux are ____.

A) character devices, system devices, and network interfaces
B) system devices, block devices, and network interfaces
C) character devices, block devices, and network interfaces
D) character devices, block devices, and network devices
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following is a popular distribution of Linux?

A) Lion
B) Ubuntu
C) Xcode
D) Ugull
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
39
Linux provides ____ queues and semaphores to allow two processes to synchronize with each other.

A) exec
B) fork
C) wait
D) pause
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
40
A file containing data or programs belonging to users is known as a(n)____.

A) symbolic link
B) ordinary file
C) special file
D) named pipe
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 40 flashcards in this deck.