Deck 2: Operating System Overview

Full screen (f)
exit full mode
Question
Both batch processing and time sharing use multiprogramming.
Use Space or
up arrow
down arrow
to flip the card.
Question
The processor itself is not a resource so the OS is not involved in determining how much of the processor time is devoted to the execution of a user program.
Question
Operating systems must evolve over time because:

A) new hardware is designed and implemented in the computer system
B) hardware must be replaced when it fails
C) hardware is hierarchical
D) users will only purchase software that has a current copyright date
Question
The user has direct access to the processor with a batch-processing type of OS.
Question
A monolithic kernel is implemented as a single process with all elements sharing the same address space.
Question
An OS should be constructed in such a way as to permit the effective development, testing, and introduction of new system functions without interfering with service.
Question
The OS frequently relinquishes control and must depend on the processor to allow it to regain control.
Question
A process consists of three components: an executable program, the associated data needed by the program, and the execution context of the program.
Question
The OS masks the details of the hardware from the programmer and provides the programmer with a convenient interface for using the system.
Question
The phrase "control is passed to a job" means that the processor is now fetching and executing instructions from the monitor program.
Question
A special type of programming language used to provide instructions to the monitor is __________ .

A) FPL
B) JCL
C) DML
D) SML
Question
Uniprogramming typically provides better utilization of system resources than multiprogramming.
Question
The principle objective of Batch Multiprogramming is to minimize response time.
Question
The ABI gives a program access to the hardware resources and services available in a system through the user ISA.
Question
The __________ is the interface that is the boundary between hardware and software.

A) ABI
B) ISA
C) IAS
D) API
Question
Virtualization technology enables a single PC or server to simultaneously run multiple operating systems or multiple sessions of a single OS.
Question
In a time sharing system, a user's program is preempted at regular intervals, but due to relatively slow human reaction time this occurrence is usually transparent to the user.
Question
A(n) __________ is a set of resources for the movement, storage, and processing of data and for the control of these functions.

A) architecture
B) program
C) computer
D) application
Question
The operating system's __________ refers to its inherent flexibility in permitting functional modifications to the system without interfering with service.

A) efficiency
B) ability to evolve
C) controlled access
D) convenience
Question
One of the driving forces in operating system evolution is advancement in the underlying hardware technology.
Question
__________ is a technique in which a process, executing an application, is divided into threads that can run concurrently.
Question
One of the first time-sharing operating systems to be developed was the __________ .

A) Compatible Time-Sharing System
B) Real Time Transaction System
C) Multiple-Access System
D) Multiprogramming Operation System
Question
The earliest computers employed __________ processing, a name derived by the way the users have access to the systems.
Question
The central idea behind the simple batch-processing scheme is the use of a piece of software known as the _________ .
Question
The portion of the monitor that is always in main memory and available for execution is referred to as the _________ .
Question
The technique where a system clock generates interrupts, and at each clock interrupt the OS regains control and assigns the processor to another user, is __________ .

A) time slicing
B) multithreading
C) round robin
D) clock cycle
Question
An __________ is a program that controls the execution of application programs and acts as an interface between applications and the computer hardware.
Question
Any resource allocation and scheduling policy must consider three factors: Fairness, Differential responsiveness, and __________ .
Question
The __________ is the internal data by which the OS is able to supervise and control the process.

A) executable program
B) associated data
C) nucleus
D) execution context
Question
A __________ is set at the beginning of each job to prevent any single job from monopolizing the system.
Question
Two major problems with early serial processing systems were scheduling and __________ .
Question
The key to the success of Linux has been its character as a free software package available under the auspice of the ___________ .

A) World Wide Web Consortium
B) Free Software Foundation
C) Berkeley Software Distribution
D) GNU Public License
Question
Multiprogramming operating systems are fairly sophisticated compared to single-program or _________ systems.

A) uniprogramming
B) time-sharing
C) multitasking
D) memory management
Question
The OS has five principal storage management responsibilities: process isolation, automatic allocation and management, support of modular programming, protection and access control, and __________ .
Question
A user program executes in a __________ , in which certain areas of memory are protected from the user's use, and in which certain instructions may not be executed.

A) kernel mode
B) user mode
C) task mode
D) batch mode
Question
__________ is concerned with the proper verification of the identity of users and the validity of messages or data.

A) Availability
B) Confidentiality
C) Authenticity
D) Data integrity
Question
__________ was designed to keep the processor and I/O devices, including storage devices, simultaneously busy to achieve maximum efficiency.
Question
Hardware features desirable in a batch-processing operating system include memory protection, timer, privileged instructions, and __________ .

A) clock cycles
B) associated data
C) interrupts
D) kernels
Question
A common strategy to give each process in the queue some time in turn is referred to as a __________ technique.

A) multithreading
B) round-robin
C) time slicing
D) serial processing
Question
__________ is where the OS must prevent independent processes from interfering with each other's memory, both data and instructions.

A) Support of modular programming
B) Process isolation
C) Automatic allocation and management
D) Protection and access control
Question
Three major lines of computer system development created problems in timing and synchronization that contributed to the development of the concept of the process: multiprogramming batch operation, time sharing, and __________ .
Question
The principal objective of __________ is to maximize processor use.
Question
___________ is a facility that allows programs to address memory from a logical point of view, without regard to the amount of main memory physically available.
Question
Security and protection as it relates to operating systems is grouped into four categories: Availability, Data integrity, Authenticity, and __________ .
Question
In a time-sharing, multiprogramming system, multiple users simultaneously access the system through __________ .
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: Operating System Overview
1
Both batch processing and time sharing use multiprogramming.
True
2
The processor itself is not a resource so the OS is not involved in determining how much of the processor time is devoted to the execution of a user program.
False
3
Operating systems must evolve over time because:

A) new hardware is designed and implemented in the computer system
B) hardware must be replaced when it fails
C) hardware is hierarchical
D) users will only purchase software that has a current copyright date
A
4
The user has direct access to the processor with a batch-processing type of OS.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
A monolithic kernel is implemented as a single process with all elements sharing the same address space.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
An OS should be constructed in such a way as to permit the effective development, testing, and introduction of new system functions without interfering with service.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
The OS frequently relinquishes control and must depend on the processor to allow it to regain control.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
A process consists of three components: an executable program, the associated data needed by the program, and the execution context of the program.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
The OS masks the details of the hardware from the programmer and provides the programmer with a convenient interface for using the system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
The phrase "control is passed to a job" means that the processor is now fetching and executing instructions from the monitor program.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
A special type of programming language used to provide instructions to the monitor is __________ .

A) FPL
B) JCL
C) DML
D) SML
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
Uniprogramming typically provides better utilization of system resources than multiprogramming.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
The principle objective of Batch Multiprogramming is to minimize response time.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
The ABI gives a program access to the hardware resources and services available in a system through the user ISA.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
The __________ is the interface that is the boundary between hardware and software.

A) ABI
B) ISA
C) IAS
D) API
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
Virtualization technology enables a single PC or server to simultaneously run multiple operating systems or multiple sessions of a single OS.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
In a time sharing system, a user's program is preempted at regular intervals, but due to relatively slow human reaction time this occurrence is usually transparent to the user.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
A(n) __________ is a set of resources for the movement, storage, and processing of data and for the control of these functions.

A) architecture
B) program
C) computer
D) application
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
The operating system's __________ refers to its inherent flexibility in permitting functional modifications to the system without interfering with service.

A) efficiency
B) ability to evolve
C) controlled access
D) convenience
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
One of the driving forces in operating system evolution is advancement in the underlying hardware technology.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
__________ is a technique in which a process, executing an application, is divided into threads that can run concurrently.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
One of the first time-sharing operating systems to be developed was the __________ .

A) Compatible Time-Sharing System
B) Real Time Transaction System
C) Multiple-Access System
D) Multiprogramming Operation System
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
The earliest computers employed __________ processing, a name derived by the way the users have access to the systems.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
The central idea behind the simple batch-processing scheme is the use of a piece of software known as the _________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
The portion of the monitor that is always in main memory and available for execution is referred to as the _________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
The technique where a system clock generates interrupts, and at each clock interrupt the OS regains control and assigns the processor to another user, is __________ .

A) time slicing
B) multithreading
C) round robin
D) clock cycle
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
An __________ is a program that controls the execution of application programs and acts as an interface between applications and the computer hardware.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
Any resource allocation and scheduling policy must consider three factors: Fairness, Differential responsiveness, and __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
The __________ is the internal data by which the OS is able to supervise and control the process.

A) executable program
B) associated data
C) nucleus
D) execution context
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
A __________ is set at the beginning of each job to prevent any single job from monopolizing the system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
Two major problems with early serial processing systems were scheduling and __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
The key to the success of Linux has been its character as a free software package available under the auspice of the ___________ .

A) World Wide Web Consortium
B) Free Software Foundation
C) Berkeley Software Distribution
D) GNU Public License
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
Multiprogramming operating systems are fairly sophisticated compared to single-program or _________ systems.

A) uniprogramming
B) time-sharing
C) multitasking
D) memory management
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
The OS has five principal storage management responsibilities: process isolation, automatic allocation and management, support of modular programming, protection and access control, and __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
A user program executes in a __________ , in which certain areas of memory are protected from the user's use, and in which certain instructions may not be executed.

A) kernel mode
B) user mode
C) task mode
D) batch mode
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
__________ is concerned with the proper verification of the identity of users and the validity of messages or data.

A) Availability
B) Confidentiality
C) Authenticity
D) Data integrity
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
__________ was designed to keep the processor and I/O devices, including storage devices, simultaneously busy to achieve maximum efficiency.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
Hardware features desirable in a batch-processing operating system include memory protection, timer, privileged instructions, and __________ .

A) clock cycles
B) associated data
C) interrupts
D) kernels
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
A common strategy to give each process in the queue some time in turn is referred to as a __________ technique.

A) multithreading
B) round-robin
C) time slicing
D) serial processing
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
__________ is where the OS must prevent independent processes from interfering with each other's memory, both data and instructions.

A) Support of modular programming
B) Process isolation
C) Automatic allocation and management
D) Protection and access control
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
Three major lines of computer system development created problems in timing and synchronization that contributed to the development of the concept of the process: multiprogramming batch operation, time sharing, and __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
The principal objective of __________ is to maximize processor use.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
___________ is a facility that allows programs to address memory from a logical point of view, without regard to the amount of main memory physically available.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
Security and protection as it relates to operating systems is grouped into four categories: Availability, Data integrity, Authenticity, and __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
In a time-sharing, multiprogramming system, multiple users simultaneously access the system through __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.