Midterm Revision
Midterm Revision
Midterm Revision
In OS, _________ means one process may needs to exchange information with
another process.
a. Communications
b. Transfer
c. Data transmission
d. Radio wave
Writing a program to read data from one file and copy them to another file requires
many_________.
a. Programs system calls
b. user system calls
c. I/O system calls
d. Files system calls
The programs and data are not resided in main memory permanently because:
a. Main memory is usually too small to store all needed programs and. Data permanently.
b. Main memory is a volatile device that loses its contents when power is turned off.
c. (a) and (b).
d. None of the above is correct.
Which of the following method is used to improve the main memory utilization?
a. Swapping.
b. Operating system.
c. Interrupt
d. None of the above
Virtual memory is
a) an extremely large main memory
b) an extremely large secondary memory
c) an illusion of an extremely large memory
d) a type of memory used in super computers
Process is
a) program in High level language kept on disk
b) contents of main memory
c) a program in execution
d) a job in secondary memory
Which of the following storage systems is faster than the main memory:
Hard-Disk
Optical-Disk
Cache
Magnetic-Tape
Small, fast memory located between the processor and main memory is called:
a. WORM memory
b. Cache memory.
c. None of the above
d. CD-RW memory
From …………… want convenience, ease of use and good performance. Don’t care
about resource utilization!
User view
System view
All of the above
…………………generated by an error
Hardware
Software
Trap or exception
All of the above
Main memory is a ………….storage device that loses its contents when power is
turned off or otherwise lost.
Volatile
non volatile
permanent
…………….is responsible for moving the data between the peripheral devices that it
controls and its local buffer.
Operating System
The device controller
System program
CPU
………….a technique that allows the execution of a process that is not completely in
memory.
Virtual memory
Main Memory
Hard desk
…………. We want to keep track of which users use how much and what kinds
of computer resources
Accounting
Protection and security
Security
____________: is the allocation of resources to the users.
a. Task Manager
b. Data allocation
c. Memory and CPU
d. Resource allocation
………………: Controls and coordinates use of hardware among various applications and
users.
Hardware
Operating system
Application programs
Users
The …………….is the component that executes instructions and registers for
storing data locally.
Core
ALU
Register
…………………..is the part of a computer processor (CPU) that carries out arithmetic and
logic operations.
Core
ALU
Register
………………: By increasing the number of processors, we expect to get more work done
in less time.
Increased throughput
Economy of scale
Increased reliability
………………..: Multiprocessor systems can cost less than equivalent multiple single-
processor systems, because they can share peripherals, mass storage, and power supplies.
Increased throughput
Economy of scale
Increased reliability
Asymmetric
Symmetric
Clustered Systems
A cluster
•If processes don’t fit in memory, …………..moves them in and out to run.
CPU scheduling.
Swapping
Virtual memory
رمضان كريم with my Best wishes 01062665758 11
Timer
…………………Usually disks used to store data that does not fit in main memory
or data that must be kept for a “long” period of time.
Process Management
Memory Management Activities
File-system Management
Mass-Storage Management
…………After I/O starts, control returns to user program only upon I/O completion.
Synchronous:
Asynchronous
All of the above
Non of the above
………………:After I/O starts, control returns to user program without waiting for
I/O completion:
Synchronous:
Asynchronous
All of the above
Non of the above
………….– available via Internet to anyone willing to pay for the services.
Public cloud
Private cloud
Hybrid cloud
رمضان كريم with my Best wishes 01062665758 14
All of the above
……………..– one or more applications available via the Internet (e.g. word
processor or spreadsheets).
Software as a Service (SaaS)
Platform as a Service (PaaS)
Infrastructure as a Service (IaaS)
All of the above
………………………– a software stack ready for application use via the Internet
(e.g. a database server).
Software as a Service (SaaS)
Platform as a Service (PaaS)
Infrastructure as a Service (IaaS)
All of the above
……………….- The system must be able to load a program into memory and to run that
program, end execution, either normally or abnormally
Program execution
I/O operations
File-system manipulation
Resource allocation
………………….. - A running program may require I/O, which may involve a file or an
I/O device.
Program execution
I/O operations
File-system manipulation
Resource allocation
………………. •Get and set permissions, Allow and deny user access
File management:
Device management:
Information maintenance:
Protection
Source code compiled into object files designed to be loaded into any physical
memory location – a format known as…………….
relocatable object file
Linker
Loader
This system is divided into separate, smaller components that have specific and limited
functionality.
Monolithic Structure
Layered Approach
Microkernels
Modules
This method structures the OS by removing all nonessential components from the
kernel and implementing them as user-level programs that reside in separate
address spaces.
Monolithic Structure
Layered Approach
Microkernels
Modules