Sample Test 1 Flashcards
The _____ is the interface that is the boundary between hardware and software.
ISA
A _____ is a set of resources for the movement, storage, and processing of data and for the control of these functions.
computer
The operating system’s __________ refers to its inherent flexibility in permitting functional modifications to the system without interfering with service.
ability to evolve
Operating systems must evolve over time because:
new hardware is designed and implemented in the computer system
A special type of programming language used to provide instructions to the monitor is __________ .
JCL
Hardware features desirable in a batch-processing operating system include memory protection, timer, privileged instructions, and __________ .
interrupts
A user program executes in a __________ , in which certain areas of memory are protected from the user’s use, and in which certain instructions may not be executed.
user mode
Multiprogramming operating systems are fairly sophisticated compared to single-program or _________ systems.
uniprogramming
One of the first time-sharing operating systems to be developed was the __________ .
Compatible Time-Sharing System
The technique where a system clock generates interrupts, and at each clock interrupt the OS regains control and assigns the processor to another user, is __________ .
time slicing
The __________ is the internal data by which the OS is able to supervise and control the process.
execution context
__________ is where the OS must prevent independent processes from interfering with each other’s memory, both data and instructions.
Process isolation
__________ is concerned with the proper verification of the identity of users and the validity of messages or data.
Authenticity
A common strategy to give each process in the queue some time in turn is referred to as a __________ technique.
round-robin
The key to the success of Linux has been its character as a free software package available under the auspice of the ___________ .
Free Software Foundation
An __________ is a program that controls the execution of application programs and acts as an interface between applications and the computer hardware.
operating system (OS)
The portion of the monitor that is always in main memory and available for execution is referred to as the _________ .
resident monitor
__________ is a technique in which a process, executing an application, is divided into threads that can run concurrently.
Multithreading
Two major problems with early serial processing systems were scheduling and __________ .
setup time
The central idea behind the simple batch-processing scheme is the use of a piece of software known as the _________ .
monitor
Any resource allocation and scheduling policy must consider three factors: Fairness, Differential responsiveness, and __________ .
Efficiency
A __________ is set at the beginning of each job to prevent any single job from monopolizing the system.
timer
The OS has five principal storage management responsibilities: process isolation, automatic allocation and management, support of modular programming, protection and access control, and __________ .
long-term storage
The earliest computers employed __________ processing, a name derived by the way the users have access to the systems.
serial
__________ was designed to keep the processor and I/O devices, including storage devices, simultaneously busy to achieve maximum efficiency.
Multiprogramming
In a time-sharing, multiprogramming system, multiple users simultaneously access the system through __________ .
terminals
The principal objective of __________ is to maximize processor use.
Batch Multiprogramming
Three major lines of computer system development created problems in timing and synchronization that contributed to the development of the concept of the process: multiprogramming batch operation, time sharing, and __________ .
real-time transaction systems
___________ is a facility that allows programs to address memory from a logical point of view, without regard to the amount of main memory physically available.
Virtual memory
Security and protection as it relates to operating systems is grouped into four categories: Availability, Data integrity, Authenticity, and __________ .
Confidentiality