Sample Test 1 Flashcards

1
Q

The _____ is the interface that is the boundary between hardware and software.

A

ISA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A _____ is a set of resources for the movement, storage, and processing of data and for the control of these functions.

A

computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The operating system’s __________ refers to its inherent flexibility in permitting functional modifications to the system without interfering with service.

A

ability to evolve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Operating systems must evolve over time because:

A

new hardware is designed and implemented in the computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A special type of programming language used to provide instructions to the monitor is __________ .

A

JCL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hardware features desirable in a batch-processing operating system include memory protection, timer, privileged instructions, and __________ .

A

interrupts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A user program executes in a __________ , in which certain areas of memory are protected from the user’s use, and in which certain instructions may not be executed.

A

user mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Multiprogramming operating systems are fairly sophisticated compared to single-program or _________ systems.

A

uniprogramming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

One of the first time-sharing operating systems to be developed was the __________ .

A

Compatible Time-Sharing System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The technique where a system clock generates interrupts, and at each clock interrupt the OS regains control and assigns the processor to another user, is __________ .

A

time slicing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The __________ is the internal data by which the OS is able to supervise and control the process.

A

execution context

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

__________ is where the OS must prevent independent processes from interfering with each other’s memory, both data and instructions.

A

Process isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

__________ is concerned with the proper verification of the identity of users and the validity of messages or data.

A

Authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A common strategy to give each process in the queue some time in turn is referred to as a __________ technique.

A

round-robin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The key to the success of Linux has been its character as a free software package available under the auspice of the ___________ .

A

Free Software Foundation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An __________ is a program that controls the execution of application programs and acts as an interface between applications and the computer hardware.

A

operating system (OS)

17
Q

The portion of the monitor that is always in main memory and available for execution is referred to as the _________ .

A

resident monitor

18
Q

__________ is a technique in which a process, executing an application, is divided into threads that can run concurrently.

A

Multithreading

19
Q

Two major problems with early serial processing systems were scheduling and __________ .

A

setup time

20
Q

The central idea behind the simple batch-processing scheme is the use of a piece of software known as the _________ .

21
Q

Any resource allocation and scheduling policy must consider three factors: Fairness, Differential responsiveness, and __________ .

A

Efficiency

22
Q

A __________ is set at the beginning of each job to prevent any single job from monopolizing the system.

23
Q

The OS has five principal storage management responsibilities: process isolation, automatic allocation and management, support of modular programming, protection and access control, and __________ .

A

long-term storage

24
Q

The earliest computers employed __________ processing, a name derived by the way the users have access to the systems.

25
__________ was designed to keep the processor and I/O devices, including storage devices, simultaneously busy to achieve maximum efficiency.
Multiprogramming
26
In a time-sharing, multiprogramming system, multiple users simultaneously access the system through __________ .
terminals
27
The principal objective of __________ is to maximize processor use.
Batch Multiprogramming
28
Three major lines of computer system development created problems in timing and synchronization that contributed to the development of the concept of the process: multiprogramming batch operation, time sharing, and __________ .
real-time transaction systems
29
___________ is a facility that allows programs to address memory from a logical point of view, without regard to the amount of main memory physically available.
Virtual memory
30
Security and protection as it relates to operating systems is grouped into four categories: Availability, Data integrity, Authenticity, and __________ .
Confidentiality