Operating Systems and System Programming Test Bank - 646 Verified Questions

Page 1


Operating Systems and System Programming Test Bank

Course Introduction

This course provides an in-depth exploration of operating systems and system programming concepts, focusing on the design, implementation, and management of modern computer systems. Students will learn about process management, memory management, file systems, input/output systems, and security mechanisms. The course also covers system-level programming in languages such as C, including inter-process communication, synchronization, and system calls. Through hands-on projects and laboratory exercises, students gain practical experience in developing and debugging low-level software, understanding how software interacts with hardware, and managing resources efficiently in multi-user and networked environments.

Recommended Textbook

Understanding Operating Systems 7th Edition by Ann McHoes

Available Study Resources on Quizplus

16 Chapters

646 Verified Questions

646 Flashcards

Source URL: https://quizplus.com/study-set/1969 Page 2

Chapter 1: Introducing Operating Systems

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/39155

Sample Questions

Q1) The first bug was a moth trapped in a Harvard computer.

A)True

B)False

Answer: True

Q2) ____ systems are used in time-critical environments where reliability is key and data must be processed within a strict time limit.

A) Embedded

B) Hybrid

C) Interactive

D) Real-time

Answer: D

Q3) Onboard systems are computers that are physically placed inside the products that they operate to add features and capabilities.

A)True

B)False

Answer: False

To view all questions and flashcards with answers, click on the resource link above.

Page 3

Chapter 2: Memory Management: Simple Systems

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/39156

Sample Questions

Q1) Memory compaction is also referred to as ____.

A) defragmentation

B) collection

C) reallocation

D) dynamic allocation

Answer: A

Q2) When reading an instruction,the operating system can tell the ____ of each group of digits by its location in the line and the operation code.

A) function

B) value

C) order

D) assignment

Answer: A

Q3) A single-user system supports multiprogramming.

A)True

B)False

Answer: False

To view all questions and flashcards with answers, click on the resource link above.

Page 4

Chapter 3: Memory Management: Virtual Memory Systems

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/39157

Sample Questions

Q1) With demand paging,if there are no empty page frames available,to move in a new page,one of the current resident pages must be placed into main memory.

A)True

B)False

Answer: False

Q2) The ____ page replacement policy is based on the theory that the best page to remove is the one that has been in memory the longest.

A) TRU

B) LRU

C) LIFO

D) FIFO

Answer: D

Q3) Associative memory is a name given to several hardware registers that are allocated to each active job whose task is to associate segment and page numbers belonging to the job being processed with their main memory addresses.

A)True

B)False

Answer: True

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Processor Management

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/39158

Sample Questions

Q1) A job's state moves from HOLD to WAITING when it's ready to run but is waiting for the CPU.

A)True

B)False

Q2) The control program that handles the interruption sequence of events is called the event scheduler.

A)True

B)False

Q3) The Process Scheduler assigns the CPU to execute the processes for those jobs placed on the ____ queue by the Job Scheduler.

A) WAITING

B) NEXT

C) PROCESS

D) READY

Q4) Web browsers use multithreading routinely.For example,one thread can retrieve images while another sends and retrieves e-mail.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Process Management

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/39159

Sample Questions

Q1) Deadlock does not usually affect the entire system.

A)True

B)False

Q2) Fill in the missing event that causes deadlock in a database.There are two processes (P1 and P2),each of which needs to update two records (R1 and R2)and the following sequence leads to a deadlock:

1)P1 accesses R1 and locks it.

2)P2 accesses R2 and locks it.

3)____

4)P2 requests R1,which is locked by P1.

A) P2 releases R2.

B) P1 requests R1 again.

C) P1 requests R2, which is locked by P2.

D) P2 releases R1.

Q3) A deadlock is preceded by the simultaneous occurrence of six conditions that the operating system (or other systems)could have recognized.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Concurrent Processes

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/39160

Sample Questions

Q1) The Java ____ class is a collection of methods used to start,run,stop,and check the status of a thread.

A) Thread

B) Multiprocessing

C) Distributed

D) Concurrency

Q2) Parallel processing is a situation in which two or more processors operate in one system at the same time and may or may not work on related activities.

A)True

B)False

Q3) The ____ multiprocessing configuration features several complete computer systems,each with its own memory,I/O devices,CPU,and operating system.

A) loosely coupled

B) master/slave

C) symmetric

D) synchronized

Q4) Java uses both a compiler and an interpreter.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Device Management

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/39161

Sample Questions

Q1) ____ control the transfer of information between the disk drives and the rest of the computer system.

A) System controllers

B) Disk drive controllers

C) System interfaces

D) Disk drive interfaces

Q2) The advent of optical discs was made possible by developments in ____ technology.

A) magnetic

B) laser

C) storage

D) silicone

Q3) ____ uses the same underlying philosophy as shortest job next,where the shortest jobs are processed first and longer jobs are made to wait.

A) LOOK

B) FCFS

C) SSTF

D) SCAN

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: File Management

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/39162

Sample Questions

Q1) In a file directory tree structure,the "leaves" of the tree are subdirectories created by the user.

A)True

B)False

Q2) A(n)____ contains a list of files,each of which is associated with the names of users who are allowed to access it and the type of access each user is permitted.

A) access control matrix

B) access control list

C) capability list

D) capability matrix

Q3) Each volume in a system has a volume descriptor followed by a ____ that lists the names and characteristics of every file contained in that volume.

A) file location

B) volume directory

C) subdirectory

D) master file directory

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Network Organization Concepts

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/39163

Sample Questions

Q1) Which characteristic is true of packet switching?

A) Preferred in low volume networks

B) Easily overloaded

C) Preferred for voice communications

D) Transmits in batches

Q2) In the OSI transport protocol model,Layer Seven,the ____ layer,provides the interface to users and is responsible for formatting user data before passing it to lower layers for transmission to a remote host.

A) physical

B) network

C) presentation

D) application

Q3) Usually,the term "____" indicates a specific computer system whose services and resources can be used from remote locations.

A) site

B) host

C) node

D) remote

To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Management of Network Functions

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/39164

Sample Questions

Q1) In a DO/S,the ____ is responsible for process synchronization mechanisms and communication support.

A) kernel

B) central controller

C) network manager

D) the responsibility is shared among sites

Q2) If a process requests access to a region in memory,the process manager determines whether the requesting process has been previously granted rights.

A)True

B)False

Q3) In response to the Write command,the File Manager sends a command to the remote server to unlock the specified file.

A)True

B)False

Q4) The focus of a network operating system is ____.

A) providing security

B) managing users

C) sharing resources

D) running programs

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Security and Ethics

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/39165

Sample Questions

Q1) ____ is a form of social engineering whereby an intruder pretends to be a legitimate entity and contacts unwary users asking them to reconfirm their personal and/or financial information.

A) Spoofing

B) Phishing

C) Impersonating

D) Acting

Q2) Errors can occur when data values are incorrectly stored because the field isn't large enough to hold the numeric value stored there.This issue is an example of a(n)____.

A) unintentional attack

B) malicious attack

C) denial-of-service attack

D) trap door attack

Q3) Intrusion detection is an example of a strategy for improving system survivability based on knowledge gained from intrusions.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: System Management

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/39166

Sample Questions

Q1) System efficiency is affected primarily by two major components: user programs and operating system programs.

A)True

B)False

Q2) The first thing to do upon notification of a new software patch is to____.

A) identify the criticality of the patch

B) deploy the patch

C) test the patch

D) run automatic updating

Q3) ____ helps the CPU match the slower speed of I/O devices.

A) Prioritizing

B) Rescheduling

C) Buffering

D) Blocking

Q4) Benchmark results are valuable because they are not dependent upon system workload,system design and implementation,or the specific requirements of the applications loaded on the system.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 13: Unix Operating Systems

Available Study Resources on Quizplus for this Chatper

46 Verified Questions

46 Flashcards

Source URL: https://quizplus.com/quiz/39167

Sample Questions

Q1) A pipe is the operating system's way to connect the output from one program to the input of another without the need for temporary or intermediate files.

A)True

B)False

Q2) The UNIX process scheduling algorithm picks the process that will run in the shortest amount of time to be run first.

A)True

B)False

Q3) The Processor Manager of a UNIX system kernel handles the allocation of the CPU,process scheduling,and the satisfaction of process requests.

A)True

B)False

Q4) The ____ command is used to delete a file or directory.

A) rm

B) mv

C) del D) erase

To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 14: Windows Operating Systems

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/39168

Sample Questions

Q1) Active Directory groups machines into administrative units called ____.

A) domains

B) sites

C) networks

D) nodes

Q2) The ____ file system can recover from all types of errors including those that occur in critical disk sectors.

A) FAT

B) NTFS

C) CDFS

D) NFST

Q3) Much of Windows is written in assembly language,a programming language that's standardized and readily available.

A)True

B)False

Q4) One of the biggest concerns about Windows operating systems is the need for aggressive patch management to combat the many viruses and worms that target these systems.

A)True

B)False

Page 16

To view all questions and flashcards with answers, click on the resource link above.

Chapter 15: Linux Operating Systems

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/39169

Sample Questions

Q1) Linux provides semaphores to help solve the problems of mutual exclusion and of producers and consumers.The Linux semaphore structure contains ____ fields.

A) two

B) three

C) four

D) five

Q2) Device drivers supervise the transmission of data between main memory and the local unit.

A)True

B)False

Q3) Linux has system calls that change the size of the process data segment,either by expanding it to accommodate extra data values or reducing it when certain values positioned at the end of the data segment are no longer needed.

A)True

B)False

Q4) In the Linux scheduler,processes with the SCHED_OTHER type have the highest priority.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 17

Chapter 16: Android Operating Systems

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/39170

Sample Questions

Q1) Memory management in the Android operating system is handled by the ____.

A) Application Framework

B) Android Libraries

C) Linux Kernel

D) Activity Manager

Q2) To obtain new releases of the Android source code,you must register as a developer and pay an annual fee.

A)True

B)False

Q3) The ____ gesture on a touch screen rearranges data from one place to another within the view,or moves data into a folder or another container.

A) long press

B) swipe

C) double touch

D) drag

Q4) Facial recognition is currently recognized as one of the strongest access control tools offered by Android.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 18

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.