Operating Systes Flashcards

1
Q

Which generation of computers were large-scale integrated circuits used to develop personal computers for desktop and laptop operating systems?

A

4th Generation, early 1970s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A company requires a computing environment that supports high-volume data processing and the management of a large amount of storage.

Which computing environment should the company use?

A

A mainframe computing environment is often the best choice.

Mainframes are designed to handle large-scale processing and storage needs, offering high reliability, scalability, and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an operating system (OS)?

A

Software that runs on bare hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which type of CPU instruction sets are supported by the CPU user mode?

A

Only non-privileged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are two locations where firmware can be stored?

Choose 2 answers.

A

Flash memory
Read-only memory (ROM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a system service?

A

An application included with an operating system to provide functionality beyond the kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A company needs to determine when a computer experiences a microprocessor interrupt that is the result of a division by zero.

Which operating system (OS) service should be used?

A

Error detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which interface allows combining multiple programs using the output from one as the input to another?

A

Command Line Interface (CLI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which cyberattack prevents a legitimate user from accessing an application in a timely manner?

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which command is used to determine the number of lines in a file?

A

wc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which operating environment is used to run an embedded system?

A

Real-time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a thread?

A

Part of a process that can run concurrently with other parts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the two properties of threads?

A

User-level threads are faster to manage than kernel-level threads.

Using multiple threads within a process is faster than using multiple processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which component is responsible for running and suspending tasks in a multitasking operating system (OS)?

A

Process manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which resource is virtualized by multitasking?

A

Processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which technique is used to execute several jobs by time-sharing among them?

A

Multiprogramming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a computer program in execution called?

A

Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the relationship between threads, processes, and global data?

A

All threads within a process share the same copy of global data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does each thread of a multi-threaded process use to access shared code?

A

program counter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a critical section?

A

An area of code that cannot be entered by a process while another process is executing a corresponding area of code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How do threads differ from processes?

A

Threads execute portions of a program within a process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which scheduler is used to decide the ready processes that should run next on the CPU?

A

Short-term, also known as the CPU scheduler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A process is not attempting to enter the critical section (CS), but it is preventing other processes from entering the CS.

Which situation was caused by this process?

A

Lockout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which step is completed first during an input/output (I/O) call?

A

the process is placed on the wait queue

25
Q

Which free memory space management strategy allocates the smallest free partition that meets the requirement of the requesting process?

A

Best fit

26
Q

Which method does the operating system use to divide system memory into contiguous, equal-sized partitions?

A

Paging

27
Q

What is the physical memory size for an address size of 8 bits?

A

256

28
Q

What causes a page fault?

A

Present bit is set to 0

29
Q

What should be used to improve memory utilization when loading external references?

A

Dynamic linking

30
Q

Why are approximations used in place of the least-recently-used (LRU) algorithm?

A

Higher efficiency

31
Q

What describes the 50% rule in external memory fragmentation?

A

1/3 of memory may be lost

32
Q

What describes the difference between internal and external fragmentation?

Choose 2 answers.

A

Internal fragmentation occurs when memory blocks are stored in fixed-sized partitions.

External fragmentation occurs when memory blocks are stored in variable-sized partitions.

33
Q

What does the memory manager do that can lead to poor system performance?

Choose 2 answers.

A

Is forced to compact memory so it can fulfill allocations, causing processes to wait.

Is unable to allocate contiguous free blocks as needed, causing processes to wait.

34
Q

What are two effects of paging in the address space?

Choose 2 answers.

A

Divides the logical address of space into equal-sized partitions.

Permits the physical address of a process to be noncontiguous.

35
Q

What is a page in memory management?

A

Fixed-size contiguous block of a logical address space identified by a single number

36
Q

What is used to determine the number of processes that can run concurrently?

A

Load control

37
Q

What is an advantage of swapping?

A

Allows computers to execute more processes than what is available in the physical memory on the computer (by temporarily moving less used process or parts or processes to the disk)

38
Q

Which file attribute should be used to identify who can access a file?

A

Protection

39
Q

Which scheduling system should be used to stop a process that is currently running and select another process to run?

A

Preemptive

40
Q

Which data structure represents the allocation status of each disk block?

A

Bitmap

41
Q

41
What are the two measures of positioning time?

Choose 2 answers.

A

Moving the disk arm to the desired cylinder.

Rotating the desired sector to the disk head

42
Q

A company needs to ensure consistent performance by decreasing the density of bits from inner tracks to outer tracks.

Which hard disk method should be used?

A

Constant angular velocity

43
Q

Which disk type provides direct access to a secondary storage device as an array of blocks with no file system?

A

Raw

44
Q

Which latency waits for the requested data to pass under the drive head of a magnetic hard disk?

A

Rotational delay

45
Q

What is the determining factor for sustained throughput in magnetic storage?

A

Data transfer rate

46
Q

What can be used to access Dropbox?

A

API (Application Programming Interface)

47
Q

What is a direct memory access (DMA) controller?

A

Hardware device allowing access to the main memory without the CPU

48
Q

What is partitioning?

A

Creating groups of blocks on secondary storage

49
Q

Which technique involves requesting an unsuspecting user to disclose their credit card information on a fake website that looks legitimate?

A

Phishing

50
Q

Which technique is used to bypass user authentication?

A

Back door

51
Q

Which cyberattack technique is mitigated by using the CTRL+ALT+DEL key sequence in the Windows operating systems?

A

Login spoofing

52
Q

Which user authentication method has the form of a dialogue between user and system?

A

Challenge Response

53
Q

What provides asymmetric cryptography?

A

Rivest-Shamir-Adleman (RSA)

54
Q

What is a symmetric key algorithm?

A

Data encryption standard (DES)

55
Q

An access matrix list of three domains and six objects is depicted in the following table:

O1 O2 O3 O4 O5 O6

D1 r rwx
D2 rwx rwx r r
D3 rwxo rwx rwxo rwx rwxo

What is the length of the shortest capability list?

A

2

56
Q

Which two techniques guard against unauthorized activities when running code written by others?

Choose 2 answers.

A

Sandboxing
Interpretation

57
Q

What is a key that is used by a recipient to decrypt a message encrypted with asymmetric encryption?

A

Private

58
Q

What is the benefit of asymmetric cryptography?

A

No need to exchange keys (each party has their own beforehand)

59
Q

When should digests be used?

A

Establishing an undeniable link between the document and its sender