Amanda Hatch
Quiz by , created more than 1 year ago

This is to help practice for the CS 372 midterm at WOU

530
0
0
No tags specified
Amanda Hatch
Created by Amanda Hatch over 10 years ago
Close

CS 372 Quiz 1 Review

Question 1 of 32

1

A _____ is an example of a systems program.

Select one of the following:

  • text formatter

  • Web browser

  • database system

  • command interpreter

Explanation

Question 2 of 32

1

____ is a popular commercial application that abstracts Intel 80XXx86 hardware into isolated virtual machines.

Select one of the following:

  • .NET

  • VMware

  • JVM

  • JIT

Explanation

Question 3 of 32

1

Java technology is

Select one of the following:

  • A programming language specification

  • A specification of a virtual machine

  • A virtual machine

  • Both (A) and (C)

Explanation

Question 4 of 32

1

_____ is not an example of a benefit of virtual machines.

Select one of the following:

  • Protects the host system from guest operating systems

  • The ability to run several different operating systems that all share the same hardware

  • Uses less physical memory than an actual operating system

  • The ability to concurrently run several different operating systems

Explanation

Question 5 of 32

1

_____ provide(s) an interface to the services provided by an operating system.

Select one of the following:

  • Shared memory

  • System calls

  • Communication

  • Simulators

Explanation

Question 6 of 32

1

_____ is not one of the major categories of system calls.

Select one of the following:

  • Process control

  • Security

  • Communications

  • Protection

Explanation

Question 7 of 32

1

______ tricks an application by having it think it is the only process on the system.

Select one of the following:

  • Simulation

  • The Java virtual machine

  • The .NET framework

  • Paravirtualization

Explanation

Question 8 of 32

1

_____ allow operating system services to be loaded dynamically.

Select one of the following:

  • Graphical user interfaces

  • Virtual machines

  • File systems

  • Modules

Explanation

Question 9 of 32

1

Microkernels use _____ for communication.

Select one of the following:

  • virtualization

  • system calls

  • message passing

  • shared memory

Explanation

Question 10 of 32

1

The Windows CreateProcess() system call creates a new process. What is the equivalent system call in UNIX:

Select one of the following:

  • process()

  • fork()

  • getpid()

  • NTCreateProcess()

Explanation

Question 11 of 32

1

The close() system call in UNIX is used to close a file. What is the equivalent system call in Windows:

Select one of the following:

  • CloseFile()

  • Exit()

  • close()

  • CloseHandle()

Explanation

Question 12 of 32

1

If a program terminates abnormally, a dump of memory may be examined by a ____ to determine the cause of the problem.

Select one of the following:

  • debugger

  • module

  • control card

  • shell

Explanation

Question 13 of 32

1

Which of the following statements is incorrect?

Select one of the following:

  • An operating system provides an environment for the execution of programs.

  • Operating systems must provide both protection and security.

  • Operating systems provide both command line as well as graphical user interfaces.

  • An operating system manages system resources.

Explanation

Question 14 of 32

1

_____ is/are not a technique for passing parameters from an application to a system call

Select one of the following:

  • Stack

  • Registers

  • Special block in memory

  • Cache memory

Explanation

Question 15 of 32

1

A message-passing model is ____.

Select one of the following:

  • only useful for small simple operating systems

  • easier to implement than a shared memory model for intercomputer communication

  • a network protocol, and does not apply to operating systems

  • faster than the shared memory model

Explanation

Question 16 of 32

1

KDE and GNOME desktops are available under open-source licenses.

Select one of the following:

  • True
  • False

Explanation

Question 17 of 32

1

Many operating system merge I/O devices and files into a combined file because of the similarity of system calls for each.

Select one of the following:

  • True
  • False

Explanation

Question 18 of 32

1

The virtual-machine concept does not offer complete protection of the various system resources.

Select one of the following:

  • True
  • False

Explanation

Question 19 of 32

1

A program written for the .NET Framework need not worry about the specifics of the hardware or the operating system on which it will run.

Select one of the following:

  • True
  • False

Explanation

Question 20 of 32

1

An initial bootstrap program is in the form of random-access memory (RAM)

Select one of the following:

  • True
  • False

Explanation

Question 21 of 32

1

System calls can be run in either user mode or kernel mode.

Select one of the following:

  • True
  • False

Explanation

Question 22 of 32

1

Policy ____

Select one of the following:

  • is not likely to change over time

  • determines what will be done

  • is not likely to change across places

  • determines how to do something

Explanation

Question 23 of 32

1

Application programmers typically use an API rather than directory invoking system calls.

Select one of the following:

  • True
  • False

Explanation

Question 24 of 32

1

In general, Windows system calls have longer, more descriptive names and UNIX system calls use shorter, less descriptive names.

Select one of the following:

  • True
  • False

Explanation

Question 25 of 32

1

Some level of hardware support is required to provide virtualization.

Select one of the following:

  • True
  • False

Explanation

Question 26 of 32

1

The JVM may only be implemented in software.

Select one of the following:

  • True
  • False

Explanation

Question 27 of 32

1

The JVM provides the ability to run architecture-neutral programs.

Select one of the following:

  • True
  • False

Explanation

Question 28 of 32

1

The major difficulty in designing a layered operating system approach is ____.

Select one of the following:

  • making sure that each layer hides certain data structures, hardware, and operations from higher-level layers

  • making sure each layer is easily converted to modules

  • debugging a particular layer

  • appropriately defining the various layers

Explanation

Question 29 of 32

1

A microkernel is a kernel ____.

Select one of the following:

  • that is stripped of all nonessential components

  • that is compiled to produce the smallest size possible when stored to disk

  • containing many components that are optimized to reduce resident memory size

  • that is compressed before loading in order to reduce its resident memory size

Explanation

Question 30 of 32

1

To the SYSGEN program of an operating system, the least useful piece of information is _____.

Select one of the following:

  • amount of memory available

  • what applications to install

  • operating-system options such as buffer sizes or CPU scheduling algorithms

  • the CPU being used

Explanation

Question 31 of 32

1

A boot block ____.

Select one of the following:

  • typically only knows the location and length of the rest of the bootstrap program

  • typically is sophisticated enough to load the operating system and begin its execution

  • is composed of multiple disk blocks

  • is composed of multiple disk cylinders

Explanation

Question 32 of 32

1

In a virtual machine, each program believes that it has ____.

Select one of the following:

  • another "virtual" computer to assist in its operations

  • more memory than is physically available on the machine

  • its own memory

  • multiple processors

Explanation