Tutorial 2
Tutorial 2
Tutorial 2
TRUE/FALSE QUESTIONS:
T F 2) The OS masks the details of the hardware from the programmer and provides
the programmer with a convenient interface for using the system.
T F 3) The ABI gives a program access to the hardware resources and services available
in a system through the user ISA.
T F 4) The OS frequently relinquishes control and must depend on the processor to allow
it to regain control.
T F 6) The processor itself is not a resource so the OS is not involved in determining how
much of the processor time is devoted to the execution of a user program.
T F 10) The user has direct access to the processor with a batch-processing type of OS.
T F 12) The phrase "control is passed to a job" means that the processor is now fetching
and executing instructions from the monitor program.
1) The __________ is the interface that is the boundary between hardware and software.
A) ABI B) ISA
C) IAS D) API
2) A(n) __________ is a set of resources for the movement, storage, and processing of data and for
the control of these functions.
A) architecture B) program
C) computer D) application
3) The operating system's __________ refers to its inherent flexibility in permitting functional
modifications to the system without interfering with service.
C) hardware is hierarchical
D) users will only purchase software that has a current copyright date
5) A special type of programming language used to provide instructions to the monitor
is __________ .
A) FPL B) JCL
C) DML D) SML
C) interrupts D) kernels
7) A user program executes in a __________ , in which certain areas of memory are protected
from the user's use, and in which certain instructions may not be executed.
A) uniprogramming B) time-sharing
9) One of the first time-sharing operating systems to be developed was the __________ .
10) The technique where a system clock generates interrupts, and at each clock interrupt the OS
regains control and assigns the processor to another user, is __________ .
12) __________ is where the OS must prevent independent processes from interfering with each
other's memory, both data and instructions.
13) __________ is concerned with the proper verification of the identity of users and the validity
of messages or data.
A) Availability B) Confidentiality
14) A common strategy to give each process in the queue some time in turn is referred to as
a __________ technique.
A) multithreading B) round-robin
15) The key to the success of Linux has been its character as a free software package available
under the auspice of the ___________ .
2) The portion of the monitor that is always in main memory and available for execution
is referred to as the _________ .
4) Two major problems with early serial processing systems were scheduling and __________ .
5) The central idea behind the simple batch-processing scheme is the use of a piece of software
known as the _________ .
6) Any resource allocation and scheduling policy must consider three factors: Fairness,
Differential responsiveness, and __________ .
7) A __________ is set at the beginning of each job to prevent any single job from
monopolizing the system.
8) The OS has five principal storage management responsibilities: process isolation, automatic
allocation and management, support of modular programming, protection and access control,
and __________ .
9) The earliest computers employed __________ processing, a name derived by the way the users
have access to the systems.
10) __________ was designed to keep the processor and I/O devices, including storage devices,
simultaneously busy to achieve maximum efficiency.
13) Three major lines of computer system development created problems in timing and
synchronization that contributed to the development of the concept of the process:
multiprogramming batch operation, time sharing, and __________ .
14) ___________ is a facility that allows programs to address memory from a logical point of
view, without regard to the amount of main memory physically available.
15) Security and protection as it relates to operating systems is grouped into four categories:
Availability, Data integrity, Authenticity, and __________ .