Deck 6: An Introduction to System Software and Virtual Machines

Full screen (f)
exit full mode
Question
Each symbolic assembly language instruction is translated into one or more machine language instructions.
Use Space or
up arrow
down arrow
to flip the card.
Question
In a time-sharing system, a program can keep the processor until it initiates an I/O operation and has run for the maximum length of time.
Question
A(n) ____________________ character is displayed on screen to indicate that an operating system is waiting for input.
Question
One of the problems with machine language is that it uses binary.
Question
Second-generation operating systems are called multiprogrammed operating systems. _________________________
Question
Assembly language does not allow the use of symbolic operation codes.
Question
A single high-level language instruction is typically translated into many high-level language instructions. _________________________
Question
All modern operating systems provide GUIs.
Question
Machine language is a high-level programming language.
Question
Clients cannot perform local computations without access to the network.
Question
An interface prevents accidental damage to hardware, programs, and data.
Question
The user interfaces on the operating systems of the 1950s, 1960s, and 1970s were text oriented. _________________________
Question
Typically, all requests to a(n) ____________________ operating system are prioritized.
Question
Assemblers, compilers, and interpreters are all examples of ____________________ services.
Question
____________________ labels increase the maintainability of a program.
Question
One of the services provided by pseudo-ops is program construction.
Question
The variable used to determine the address of a given instruction or piece of data is called the program counter. _________________________
Question
Machine language allows only numeric memory addresses.
Question
For a program to run on a naked machine, it must be represented in decimal. _________________________
Question
It is the responsibility of the ____________________ to safeguard the password file that stores all valid user name/password combinations.
Question
The ____ hides from the user the messy details of underlying hardware.

A) interface
B) operating system
C) system software
D) machine code
Question
After all the fields of an assembly language instruction have been translated into binary, the newly built machine language instruction and the address of where it is to be loaded are written out to a file called the ____ file.

A) table
B) source
C) data
D) object
Question
Translators for ____ are called compilers.

A) assembly language
B) machine language
C) low-level languages
D) high-level languages
Question
In ____ language, if we insert or delete an instruction, all memory addresses following that instruction will change.

A) assembly
B) machine
C) low-level programming
D) high-level programming
Question
A(n) ____ operation involves the comparison of values and the subsequent use of the outcome to decide what to do next.

A) iterative
B) conditional
C) sequential
D) transformer
Question
System software acts as a(n) ____ between the users and the hardware.

A) translator
B) intermediary
C) tester
D) security agent
Question
A(n) ____ invokes a service of the assembler.

A) compiler
B) pseudo-op
C) loader
D) operation
Question
The set of services and resources created by the system software and seen by the user is called a(n) ____ machine.

A) naked
B) virtual
C) assembler
D) Von Neumann
Question
____, such as text editors, are sometimes organized into collections called program libraries.

A) Programming tools
B) Office tools
C) Packages
D) Utilities
Question
A Von Neumann computer without any helpful user-oriented features is called a(n) ____ machine.

A) distributed
B) virtual
C) assembler
D) naked
Question
Icons displayed on the screen are selected with a mouse and a button using a technique called ____.

A) windows interface
B) point-and-click
C) panel interface
D) command line
Question
The ____ problem-solving cycle involves inputting code to an assembler, translating it to machine language, loading it into a Von Neumann computer, and executing to produce answers to the problem.

A) Von Neumann
B) modern
C) algorithmic
D) conditional
Question
A machine language program is called the ____ program.

A) source
B) object
C) data
D) virtual
Question
A ____-generation operating system will typically be a parallel processing operating system that can efficiently manage computer systems containing tens, hundreds, or even thousands of processors.

A) second
B) third
C) fourth
D) fifth
Question
The conversion of symbolic op codes such as LOAD, ADD, and SUBTRACT to binary makes use of a structure called the ____.

A) op code table
B) assembler
C) loader
D) library
Question
C++ and Java are examples of ____ languages.

A) low-level programming
B) high-level programming
C) machine
D) assembly
Question
If the op code table is sorted alphabetically, the ____ search algorithm is used to find an op code.

A) sequential
B) binary
C) op code
D) table
Question
____ operation codes are restricted to be used in the operating system or other system software.

A) Privileged
B) User
C) Specialized
D) System
Question
In assembly language, a(n) ____ is a name, followed by a colon, placed at the beginning of an instruction.

A) op code mnemonic
B) comment
C) address field
D) label
Question
A program written in assembly language is called the ____ program.

A) virtual
B) object
C) data
D) source
Question
What is the most important task of the operating system?
Question
What is the single most important piece of system software on the computer? Discuss its function, and discuss at length its software packages that handle the requests of other programs.
Question
What are three major advantages to writing programs in assembly language rather than machine language?
Question
Briefly explain the function of the operating system as a security guard.
Question
Explain what a real-time operating system does. Then give a detailed example.
Question
What are the four tasks to be performed by an assembler?
Question
How does a GUI communicate with a user?
Question
List four responsibilities of the system software.
Question
Describe four problems with machine language.
Question
To make a Von Neumann computer usable, what must you create between the user and the hardware? What must this created item do?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: An Introduction to System Software and Virtual Machines
1
Each symbolic assembly language instruction is translated into one or more machine language instructions.
False
2
In a time-sharing system, a program can keep the processor until it initiates an I/O operation and has run for the maximum length of time.
False
3
A(n) ____________________ character is displayed on screen to indicate that an operating system is waiting for input.
prompt
4
One of the problems with machine language is that it uses binary.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Second-generation operating systems are called multiprogrammed operating systems. _________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Assembly language does not allow the use of symbolic operation codes.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
A single high-level language instruction is typically translated into many high-level language instructions. _________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
All modern operating systems provide GUIs.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Machine language is a high-level programming language.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Clients cannot perform local computations without access to the network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
An interface prevents accidental damage to hardware, programs, and data.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
The user interfaces on the operating systems of the 1950s, 1960s, and 1970s were text oriented. _________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Typically, all requests to a(n) ____________________ operating system are prioritized.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Assemblers, compilers, and interpreters are all examples of ____________________ services.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
____________________ labels increase the maintainability of a program.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
One of the services provided by pseudo-ops is program construction.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
The variable used to determine the address of a given instruction or piece of data is called the program counter. _________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Machine language allows only numeric memory addresses.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
For a program to run on a naked machine, it must be represented in decimal. _________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
It is the responsibility of the ____________________ to safeguard the password file that stores all valid user name/password combinations.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
The ____ hides from the user the messy details of underlying hardware.

A) interface
B) operating system
C) system software
D) machine code
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
After all the fields of an assembly language instruction have been translated into binary, the newly built machine language instruction and the address of where it is to be loaded are written out to a file called the ____ file.

A) table
B) source
C) data
D) object
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Translators for ____ are called compilers.

A) assembly language
B) machine language
C) low-level languages
D) high-level languages
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
In ____ language, if we insert or delete an instruction, all memory addresses following that instruction will change.

A) assembly
B) machine
C) low-level programming
D) high-level programming
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
A(n) ____ operation involves the comparison of values and the subsequent use of the outcome to decide what to do next.

A) iterative
B) conditional
C) sequential
D) transformer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
System software acts as a(n) ____ between the users and the hardware.

A) translator
B) intermediary
C) tester
D) security agent
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
A(n) ____ invokes a service of the assembler.

A) compiler
B) pseudo-op
C) loader
D) operation
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
The set of services and resources created by the system software and seen by the user is called a(n) ____ machine.

A) naked
B) virtual
C) assembler
D) Von Neumann
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
____, such as text editors, are sometimes organized into collections called program libraries.

A) Programming tools
B) Office tools
C) Packages
D) Utilities
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
A Von Neumann computer without any helpful user-oriented features is called a(n) ____ machine.

A) distributed
B) virtual
C) assembler
D) naked
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Icons displayed on the screen are selected with a mouse and a button using a technique called ____.

A) windows interface
B) point-and-click
C) panel interface
D) command line
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
The ____ problem-solving cycle involves inputting code to an assembler, translating it to machine language, loading it into a Von Neumann computer, and executing to produce answers to the problem.

A) Von Neumann
B) modern
C) algorithmic
D) conditional
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
A machine language program is called the ____ program.

A) source
B) object
C) data
D) virtual
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
A ____-generation operating system will typically be a parallel processing operating system that can efficiently manage computer systems containing tens, hundreds, or even thousands of processors.

A) second
B) third
C) fourth
D) fifth
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
The conversion of symbolic op codes such as LOAD, ADD, and SUBTRACT to binary makes use of a structure called the ____.

A) op code table
B) assembler
C) loader
D) library
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
C++ and Java are examples of ____ languages.

A) low-level programming
B) high-level programming
C) machine
D) assembly
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
If the op code table is sorted alphabetically, the ____ search algorithm is used to find an op code.

A) sequential
B) binary
C) op code
D) table
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
____ operation codes are restricted to be used in the operating system or other system software.

A) Privileged
B) User
C) Specialized
D) System
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
In assembly language, a(n) ____ is a name, followed by a colon, placed at the beginning of an instruction.

A) op code mnemonic
B) comment
C) address field
D) label
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
A program written in assembly language is called the ____ program.

A) virtual
B) object
C) data
D) source
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What is the most important task of the operating system?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
What is the single most important piece of system software on the computer? Discuss its function, and discuss at length its software packages that handle the requests of other programs.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
What are three major advantages to writing programs in assembly language rather than machine language?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Briefly explain the function of the operating system as a security guard.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Explain what a real-time operating system does. Then give a detailed example.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
What are the four tasks to be performed by an assembler?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
How does a GUI communicate with a user?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
List four responsibilities of the system software.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Describe four problems with machine language.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
To make a Von Neumann computer usable, what must you create between the user and the hardware? What must this created item do?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.