Chapter 2 Flashcards
Type of system calls that Get time/date, set time/date
Information maintenance
The OS provides application programmers with API to invoke services
(T/F)
True
Type of system calls that Create file and delete file
File management
In …………, It is easier to extend the OS
Micro-kernel approach
In ………………., Linking additional services dynamically is preferable to recompiling the kernel every time a change is made
(operating system structure)
Modules Approach
The process of starting a computer by loading the kernel
System Boot
…………. provides more security and reliability
Micro-kernel approach
In layered approach, bottom layer (layer 0) is …………
hardware
Removes all nonessential components from the kernel and implements them as system programs
(operating system structure)
Micro-kernel Approach
Allocate resources to the running processes
Resource allocation
Loosely-coupled as changes in one layer do not affect the others
(operating system structure)
Layered Approach
In micro-kernel approach, No need to modify of the kernel
(T/F)
True
In ………….., Each layer uses the functions of only the lower-level layers
(operating system structure)
Layered Approach
type of system calls that Create, load, execute, terminate, and abort
process control
To provide very efficient performance
Monolithic
……….. are available as functions written in C and C++
System calls
Recording which process uses how much and what kinds of resources
Logging
Difficult to implement and extend
(operating system structure)
Monolithic Approach
In micro-kernel approach, Most services are running as kernel rather than user processes
(T/F)
False
It is easier to port the OS from one hardware design to another. this is an advantage of …………
Micro-kernel approach
In micro-kernel approach, New services are added as system programs
(T/F)
True
In …………, Several OSs use of this approach, such as UNIX, Linux, and Windows
(operating system structure)
Monolithic Approach
Very little overhead in the system-call interface
(operating system structure)
Monolithic Approach
the primary module has only core functions. This is a similarity between the …………. and …………
Modules approach, Micro-Kernel approach
Type of system calls that Get and set device attributes, logically attach or detach devices
Device management
Type of system calls that Get system data, set system data
Information maintenance
In ………………, If a service fails, the rest of the operating system remains untouched
Micro-Kernel Approach
A single, static binary file that runs in a single address space
(operating system structure)
Monolithic Approach
Type of system calls that Open, close, read, write, reposition file
File management
…………… ensures that all access to system resources is controlled
protection
In …………, No structure at all
(operating system structure)
Monolithic Approach
Makes it easier to implement and extend the kernel
(operating system structure)
Layered Approach
……………. Provide an interface to the services provided by the OS
system calls
This type of design is common in modern implementations of UNIX,
such as Linux, macOS, and Solaris, as well as Windows
(operating system structure)
Modules Approach
In …………., it is difficult to define the functionality of each layer
(operating system structure)
Layered Approach
User processes can execute I/O operations directly
(T/F)
False
………. is both monolithic and modular
Linux
……….. allow user processes to read, write, create, and delete files
File-system manipulation
The ……. of the system from outsiders is also important
security
Type of system calls that Get file attributes and set file attributes
File management
Type of system calls that Wait for time, wait event, signal even, allocate and free memory
Process control
In layered approach, Traversing multiple layers to call services results in ………… performance
(operating system structure)
Poor
Some low-level tasks may be written using ………..
assembly-language
It is easier to modify kernel if needed as it is a smaller kernel. this is an advantage of …………
Micro-kernel approach
To add new functionality dynamically to the kernel
Modular
In layered approach, highest layer (layer n) is …………
user interface
Implemented via shared memory or message passing
Communications
Type of system calls that Send message, receive message, transfer status information
Communications
………. Load programs into memory and run them
program execution
each kernel section has a defined and protected interface. This is a similarity between …………… and ………….
Modules approach, layered approach
User processes can use …………. to call the OS services
system calls
the OS must provide processes with some means to perform I/O
(T/F)
True
Type of system calls that Request device, release device, read, write, reposition
Device management
Type of system calls that Create, delete communication connection
Communications
In ……………., The kernel has a set of core components and can link in additional
services via LKMs, either at boot time or during run time
(operating system structure)
Modules Approach
more flexible, because any module can call any other module. This is a difference between …………… and ………….
Modules approach, layered approach
Tightly-coupled as changes to one part can affect other parts
(operating system structure)
Monolithic Approach
Type of system calls that Get process, file, or device attributes, set process, file, or device attributes
Information maintenance
A program must be able to end its execution, either normally or abnormally
(T/F)
True
Type of system calls that Attach remote device, detach remote device
Communications
Communication within the kernel is fast
(operating system structure)
Monolithic Approach
Divides the OS into a set of layers
(operating system structure)
Layered Approach
very few OSs adopt a single, strictly defined structure
(T/F)
True
Enable user processes to exchange information
Communications
Type of system calls that Get process attributes and set process attributes
Process control
When a process executes a system call, the system traps to the OS
(T/F)
True
modules do not need to use message passing to communicate. This is a difference between …………… and ………….
Modules approach, Micro-Kernel approach
………… Provide a graphical user interface (GUI) or a command-line interface (CLI)
User Interface
Ensure correct computing by detecting errors in hardware or user programs
Error detection