Question 1
Question
A _____ is an example of a systems program.
Answer
-
text formatter
-
Web browser
-
database system
-
command interpreter
Question 2
Question
____ is a popular commercial application that abstracts Intel 80XXx86 hardware into isolated virtual machines.
Question 3
Question
Java technology is
Question 4
Question
_____ is not an example of a benefit of virtual machines.
Answer
-
Protects the host system from guest operating systems
-
The ability to run several different operating systems that all share the same hardware
-
Uses less physical memory than an actual operating system
-
The ability to concurrently run several different operating systems
Question 5
Question
_____ provide(s) an interface to the services provided by an operating system.
Answer
-
Shared memory
-
System calls
-
Communication
-
Simulators
Question 6
Question
_____ is not one of the major categories of system calls.
Answer
-
Process control
-
Security
-
Communications
-
Protection
Question 7
Question
______ tricks an application by having it think it is the only process on the system.
Answer
-
Simulation
-
The Java virtual machine
-
The .NET framework
-
Paravirtualization
Question 8
Question
_____ allow operating system services to be loaded dynamically.
Question 9
Question
Microkernels use _____ for communication.
Answer
-
virtualization
-
system calls
-
message passing
-
shared memory
Question 10
Question
The Windows CreateProcess() system call creates a new process. What is the equivalent system call in UNIX:
Answer
-
process()
-
fork()
-
getpid()
-
NTCreateProcess()
Question 11
Question
The close() system call in UNIX is used to close a file. What is the equivalent system call in Windows:
Answer
-
CloseFile()
-
Exit()
-
close()
-
CloseHandle()
Question 12
Question
If a program terminates abnormally, a dump of memory may be examined by a ____ to determine the cause of the problem.
Answer
-
debugger
-
module
-
control card
-
shell
Question 13
Question
Which of the following statements is incorrect?
Answer
-
An operating system provides an environment for the execution of programs.
-
Operating systems must provide both protection and security.
-
Operating systems provide both command line as well as graphical user interfaces.
-
An operating system manages system resources.
Question 14
Question
_____ is/are not a technique for passing parameters from an application to a system call
Answer
-
Stack
-
Registers
-
Special block in memory
-
Cache memory
Question 15
Question
A message-passing model is ____.
Answer
-
only useful for small simple operating systems
-
easier to implement than a shared memory model for intercomputer communication
-
a network protocol, and does not apply to operating systems
-
faster than the shared memory model
Question 16
Question
KDE and GNOME desktops are available under open-source licenses.
Question 17
Question
Many operating system merge I/O devices and files into a combined file because of the similarity of system calls for each.
Question 18
Question
The virtual-machine concept does not offer complete protection of the various system resources.
Question 19
Question
A program written for the .NET Framework need not worry about the specifics of the hardware or the operating system on which it will run.
Question 20
Question
An initial bootstrap program is in the form of random-access memory (RAM)
Question 21
Question
System calls can be run in either user mode or kernel mode.
Question 22
Answer
-
is not likely to change over time
-
determines what will be done
-
is not likely to change across places
-
determines how to do something
Question 23
Question
Application programmers typically use an API rather than directory invoking system calls.
Question 24
Question
In general, Windows system calls have longer, more descriptive names and UNIX system calls use shorter, less descriptive names.
Question 25
Question
Some level of hardware support is required to provide virtualization.
Question 26
Question
The JVM may only be implemented in software.
Question 27
Question
The JVM provides the ability to run architecture-neutral programs.
Question 28
Question
The major difficulty in designing a layered operating system approach is ____.
Answer
-
making sure that each layer hides certain data structures, hardware, and operations from higher-level layers
-
making sure each layer is easily converted to modules
-
debugging a particular layer
-
appropriately defining the various layers
Question 29
Question
A microkernel is a kernel ____.
Answer
-
that is stripped of all nonessential components
-
that is compiled to produce the smallest size possible when stored to disk
-
containing many components that are optimized to reduce resident memory size
-
that is compressed before loading in order to reduce its resident memory size
Question 30
Question
To the SYSGEN program of an operating system, the least useful piece of information is _____.
Answer
-
amount of memory available
-
what applications to install
-
operating-system options such as buffer sizes or CPU scheduling algorithms
-
the CPU being used
Question 31
Question
A boot block ____.
Answer
-
typically only knows the location and length of the rest of the bootstrap program
-
typically is sophisticated enough to load the operating system and begin its execution
-
is composed of multiple disk blocks
-
is composed of multiple disk cylinders
Question 32
Question
In a virtual machine, each program believes that it has ____.