OS Admin and Security - Chapter 1

Operating System is ______
Organized according to the number general-purpose processors used.
A program that acts as an intermediary(in-between) between a user of a computer and the computer hardware.
Switches between jobs so frequently that users can interact with each job while it is running, creating interactive computing.
A path of execution within a process
Which one is an operating system goal?
Execute user programs and make solving user problems easier
Neglect user programs and make solving them harder
Make the computer system inconvinient to use
Use the computer hardware in an inefficient manner
Which one is an operating system goal?
Neglect user programs and make solving them harder
Make the computer system convenient to use
Use the computer hardware in an inefficient manner
Make the computer system inconvinient to use
Which one is an operating system goal?
Use the computer hardware in an inefficient manner
Neglect user programs and make solving them harder
Use the computer hardware in an efficient manner
Make the computer system inconvinient to use
Convenience, ease of use with maximized performance and less care about resource utilization.
Users view
Computer System View
OS is a resource allocator
Users view
Computer System View
OS is a control program
Users view
Computer System View
Manages all resources
Resource allocator
Control program
Decides between conflicting requests for efficient and fair resource use
Resource allocator
Control program
Controls execution of programs to prevent errors and improper use of the computer
Resource allocator
Control program
A computer system is organized according to the number general-purpose processors used.
True
False
A computer system is organized according to the first letter of general-purpose processor used.
True
False
Most systems use a single general-purpose processor (PDAs through mainframes)
True
False
Most systems use a double general-purpose processor (PDAs through mainframes)
True
False
Multiprocessors systems are dominating now.
True
False
Multiprocessors systems are obsolete now.
True
False
Multiprocessors are also known as ______
Divergent systems
Parallel systems
Tightly coupled systems contain multiple CPUs; those has more than one processor.
Multiprocessors
Multicores
Which one is an advantage of Multiprocessors system?
Increased throughput – more work done
Decreased throughput - less work done
Economy of scale – processors keep peripherals (more cost)
Crude degradation or fault intolerance
Which one is an advantage of Multiprocessors system?
Decreased throughput - less work done
Economy of scale – processors share peripherals (less cost)
Economy of scale – processors keep peripherals (more cost)
Crude degradation or fault intolerance
Which one is an advantage of Multiprocessors system?
Decreased throughput - less work done
Economy of scale – processors keep peripherals (more cost)
Graceful degradation or fault tolerance
Crude degradation or fault intolerance
What are the two types of multiprocessors system?
Asymmetric and symmetric
Biased and unbiased
All scheduling decisions, I/O processing, and other system activities handled by a single processor.
Asymmetric Multiprocessing
Symmetric Multiprocessing
Processors work in parallel and share resources.
Asymmetric Multiprocessing
Symmetric Multiprocessing
Multiprogramming is one of OS jobs.
True
False
Multicoring is one of OS jobs.
True
False
Single user cannot keep CPU and I/O devices busy at all times
True
False
Single user can keep CPU and I/O devices busy at all times
True
False
______ is a basic form of parallel processing in which several programs are run at the same time on a uniprocessor.
Multiprocessing
Multiprogramming
Multiprogramming is a basic form of ______ in which several programs are run at the same time on a uniprocessor.
Parallel processing
Thread processing
Since there is only one processor, there can be no true simultaneous execution of different programs.
True
False
True simultaneous execution of different programs can occur, even with one processor.
True
False
The operating system executes part of one program, then part of another, and so on. Which appears to the user that all programs are executing at the same time.
True
False
The operating system executes the entirety of all programs. Which make true simultaneous executions occur.
True
False
OS keeps other jobs in memory and on disk in ______
Job scheduling
Job poll
OS has to select a job to run one at a time in the CPU first. This is called ______
Job scheduling
Job poll
When OS has to wait, OS switches to another job.
True
False
When OS has to wait, it keeps waiting until the job is done.
True
False
Timesharing is also known as ______
Multitasking
Multiprocessing
Multitasking is also known as ______
Multiprogramming
Timesharing
A CPU switches between jobs so frequently that users can interact with each job while it is running, creating ______ computing.
Interactive
Detached
Response time should be ______ 1 second
More than
Less than
Executed program is called ______
Process
Cessation
Each user has at least one program executing in memory
True
False
Each user has at least two program executing in memory
True
False
When several jobs ready to run at the same time, OS has to choose which to run first. This is called ______
CPU scheduling
Job scheduling
______ requires OS to ensure reasonable response time
Parallel system (Multiprocessing)
Timesharing (Multitasking)
OS moves jobs or processes from memory to disk while waiting for other processes to execute. This is called ______
Swapping
Processing
To ensure reasonable response time , OS use a part of the disk and make it work as a memory called ______ which allows execution of processes not completely in memory.
Physical memory
Virtual memory
If there are no processes to execute, no I/O devices to service, and no users to whom to respond, an operating system will sit quietly, waiting for something to happen.
True
False
If you interrupt the operating system in its idle mode; it takes this interrupt as an order or process to execute.
True
False
If you interrupt the operating system in its idle mode; it might cause malfunction within the system.
True
False
The OS must maintain control over the CPU. To accomplish this goal, we can use a ______ which can be set to interrupt the CPU work after a specific time.
Stopwatch
Timer
The OS must maintain control over the CPU. To accomplish this goal, we can use a timer- which can be set to interrupt the CPU work after a specific time. It prevent infinite loop / process hogging resources
True
False
The OS must maintain control over the CPU. To accomplish this goal, we can use a timer- which can be set to interrupt the CPU work after a specific time. It allows infinite loop / process hogging resources
True
False
The computer system has ______ operation that allows OS to protect itself and other system components.
Single-mode
Dual-mode
What are the Dual-mode that allows OS to protect itself?
User mode and Kernel mode
Free mode and Exterior mode
When the computer system is executing on behalf of a user application.
User mode
Kernel mode
When a user application requests a service from the operating system.
User mode
Kernel mode
______ is how a program requests a service from an operating system's kernel.
System call
Fraction call
System calls include hardware-related services such as accessing a hard disk drive - creation and execution of new processes - communication with integral kernel services such as process scheduling
True
False
System calls include software-related services only.
True
False
______ include hardware-related services such as accessing a hard disk drive - creation and execution of new processes - communication with integral kernel services such as process scheduling
System calls
Author call
______ provide an essential interface between a process and the operating system.
System calls
Multiprocessing
A ______ is a program in execution.
Process
Thread
Execution
Resource
______ is a unit of work within the system
Process
Thread
Execution
Resource
Program is a ______
Passive entity
Active entity
Process is an ______
Passive entity
Active entity
______ is an executing instance of an application.
Process
Thread
Execution
Resource
A ______ is a path of execution within a process
Process
Thread
Execution
Resource
A thread is a path of ______ within a process
Process
Thread
Execution
Resource
A thread is a path of execution within a ______
Process
Thread
Execution
Resource
A process can contain multiple threads.
True
False
A process can only contain a single thread.
True
False
Process needs resources to accomplish its task.
True
False
Process does not need resources to accomplish its task
True
False
Process termination requires reclaim of any reusable resources
True
False
Process termination creates resources by converting electricity to binary data
True
False
Single-threaded process has one ______ specifying location of next instruction to execute
Program counter
Process timer
Process executes instructions sequentially, one at a time, until completion.
True
False
Process executes instructions ______
Randomly
Sequentially
______ process has one program counter per thread
Multi-threaded
Process
Program counter
Thread
Multi-threaded ______ has one program counter per thread
Multi-threaded
Process
Program counter
Thread
Multi-threaded process has one ______ per thread
Multi-threaded
Process
Program counter
Thread
Multi-threaded process has one program counter per ______
Multi-threaded
Process
Program counter
Thread
Creating and deleting both user and system processes
Process Management
Memory Management
Suspending and resuming processes
Process Management
Memory Management
Providing mechanisms for process synchronization
Process Management
Memory Management
Providing mechanisms for process communication
Process Management
Memory Management
Providing mechanisms for deadlock handling
Process Management
Memory Management
______ is the process of controlling and coordinating computer memory, assigning portions called blocks to various running programs to optimize overall system performance.
Process Management
Memory Management
Keeping track of which parts of memory are currently being used and by whom
Process Management
Memory Management
Deciding which processes (or parts thereof) and data to move into and out of memory
Process Management
Memory Management
Allocating and deallocating memory space as needed
Process Management
Memory Management
Holds data in memory (sometimes called random access memory or RAM) and other "built-in" devices such as the processor's L1 cache.
Primary storage
Secondary storage
Holds data on hard disks, tapes, and other devices requiring input/output operations.
Primary storage
Secondary storage
While managing the storage, OS activities includes:
Free-space management - Storage allocation - Disk scheduling
Full-space management - Storage movement - Process schedulling
Files usually organized into directories - Access control on most systems to determine who can access what
Folder-Control adminstration
File-System management
______ on most systems to determine who can access what
Access control
Authorization allowance
Creating and deleting files and directories - Mapping files onto secondary storage - Backup files onto stable (non-volatile) storage media
Folder-Control adminstration
File-System management
______ is much faster to access than ______.
Primary storage - Secondary storage
Secondary storage - Primary storage
______ can hold much more data than ______.
Primary storage - Secondary storage
Secondary storage - Primary storage
Movement between levels of storage hierarchy can be ______
Explicit or implicit
Clear or suggested
One purpose of OS is to hide particularities of hardware devices (such as printer, mouse, keyboard) from the user
True
False
One purpose of OS is to display particularities of hardware devices (such as printer, mouse, keyboard) from the user
True
False
I/O subsystem responsible for: Memory management of I/O - General device-driver interface - Drivers for specific hardware devices
True
False
I/O subsystem responsible for: Process management of I/O - Generalisation interaction - Drivers for CPU
True
False
Storing data temporarily while it is being transferred.
Buffering
Caching
Spooling
None of the above
Storing parts of data in faster storage for performance.
Buffering
Caching
Spooling
None of the above
The overlapping of output of one job with input of other jobs.
Buffering
Caching
Spooling
None of the above
______: any mechanism for controlling access of processes or users to resources defined by the OS
Protection
Security
______: defense of the system against internal and external attacks including denial-of-service, worms, viruses, identity theft, theft of service
Protection
Security
Systems generally first distinguish among users, to determine who can do what
True
False
Systems cannot distinguish among users
True
False
______ include name and associated number, one per user
User ID
Group ID
______ then associated with all files, processes of that user to determine access control.
User ID
Group ID
______ allows set of users to be defined and controls managed, then also associated with each process, file.
User ID
Group ID
______ allows user to change to effective ID with more rights
Privilege escalation
Access level
A ______ represents a collection of data values as a sequence
Library
List
The most common method for implementing list structure is a ______, in which items are linked to one another.
Linked list
Linked collection
What are the linked list types?
Single, Double, Circle linked list
Singly, Doubly, Circular linked list
Each item points to its successor
Singly linked list
Doubly linked list
Circular linked list
None of the above
A given item can refer either to its predecessor or to its successor
Singly linked list
Doubly linked list
Circular linked list
None of the above
The last element in the list refers to the first element, rather than to null
Singly linked list
Doubly linked list
Circular linked list
None of the above
Singly
Singly linked list
Doubly linked list
Circular linked list
None of the above
Doubly
Singly linked list
Doubly linked list
Circular linked list
None of the above
Singly linked list
Doubly linked list
Circular linked list
None of the above
Stand-alone general purpose machines
Computing Environments - Traditional
Computing Environments - Mobile
______ provide web access to internal systems
Ports
Portals
______ are like Web terminals
Network computers (thin clients)
Patchwork computer (tiny clients)
Laptops (mobile computers) interconnect via ______
Wired networks
Wireless networks
Handheld smartphones, tablets, etc.
Computing Environments - Traditional
Computing Environments - Mobile
Leaders of "Computing Environments - Mobile" are ______
Apple iOS and Google Android
Samsung and Microsoft
Extra feature – more OS features (GPS, gyroscope)
Computing Environments - Traditional
Computing Environments - Mobile
Use IEEE 802.11 wireless, or cellular data networks for connectivity
Computing Environments - Traditional
Computing Environments - Mobile
Allows new types of apps like ______ (in which a view of reality is modified by a computer such as sports scores on TV during a match).
Augmented reality
3D vision
Collection of separate, possibly heterogeneous, systems networked together
Client/Server
Distributed
The servers provide the services to clients.
Client/Server
Distributed
Illusion of a single system
Client/Server
Distributed
Network Operating System provides features between systems across network
Client/Server
Distributed
______ provides features between systems across network
Network Operating System
Compute-server system
File-server system
None of the above
Many systems now ______, responding to requests generated by ______
Clients - Server
Servers - Clients
______ provides an interface to client to request services (i.e., database)
Network Operating System
Compute-server system
File-server system
None of the above
______ provides interface for clients to store and retrieve files
Network Operating System
Compute-server system
File-server system
None of the above
Another model of distributed system
Peer-to-Peer
Client/Server
P2P does not distinguish clients and servers
True
False
P2P distinguish clients and servers
True
False
In P2P, all nodes are considered peers
True
False
In Client/Server, all nodes are considered peers
True
False
In P2P, anyone can act as client, server or both
True
False
In Client/Server, anyone can act as client, server or both
True
False
In P2P, Node must join P2P network
True
False
In Client/Server, Node must join P2P network
True
False
Registers its service with central lookup service on network
P2P
Client/Server
Broadcast request for service and respond to requests for service via discovery protocol
P2P
Client/Server
Broadcast request for service and respond to requests for service via ______
Broadcast port
Discovery protocol
Napster and Gnutella are an example of ______
P2P
Client/Server
Voice over IP (VoIP) such as Skype is an example of ______
P2P
Client/Server
______ computing environment allows operating systems to run applications within other OSes
Virtualization
Emulation
VMM (Virtual Machine Manager)
None of the above
______ used when source CPU type different from target type (i.e. PowerPC to Intel x86
Virtualization
Emulation
VMM (Virtual Machine Manager)
None of the above
______ provides virtualization services
Virtualization
Emulation
VMM (Virtual Machine Manager)
None of the above
Peer-to-Peer
Pentagram
Display
Virtualization
Delivers computing, storage, even apps as a service across a network
Cloud Computing
Intra Computing
Logical extension of virtualization as based on virtualization
Cloud Computing
Intra Computing
______ has thousands of servers, millions of VMs, PBs of storage available across the Internet, pay based on usage
Google Drive
Amazon EC2
Available via Internet to anyone willing to pay
Public cloud
Private cloud
Hybrid cloud
None of the above
run by a company for the company’s own use
Public cloud
Private cloud
Hybrid cloud
None of the above
Includes both public and private cloud components
Public cloud
Private cloud
Hybrid cloud
None of the above
One or more applications available via the Internet (i.e. Word processor)
Software as a Service (SaaS)
Platform as a Service (PaaS)
Infrastructure as a Service (IaaS)
None of the above
Software stack ready for application use via the Internet (i.e a database server)
Software as a Service (SaaS)
Platform as a Service (PaaS)
Infrastructure as a Service (IaaS)
None of the above
Servers or storage available over Internet (i.e. Storage available for backup use)
Software as a Service (SaaS)
Platform as a Service (PaaS)
Infrastructure as a Service (IaaS)
None of the above
______ environments composed of traditional OSes, plus VMMs, plus cloud management tools
Cloud computing
Virtualization
Internet connectivity requires security like firewalls
True
False
Internet connectivity does not require security like firewalls
True
False
In Cloud Computing environment, load balancers spread traffic across multiple applications
True
False
In Virtualization, load balancers spread traffic across multiple applications
True
False
Cloud Computing
Virtualization
______ is used when rigid time requirements have been placed on the operation of a processor or the flow of data
Peer-to-Peer
Real-time system
______ is often used as a control device in a dedicated application such as break system in automobiles
Traditional PC
Real-time system
Embedded systems almost always run real-time operating systems
True
False
Embedded systems never run real-time operating systems
True
False
Windows CE is an example of ______
Real-time system
Premium system
Real-time embedded systems most prevalent form of computers
True
False
Real-time embedded systems most uncommon form of computers
True
False
Vary considerable, special purpose, limited purpose OS, real-time OS, Use expanding
Calculation system
Real-time system
Many other special computing environments as well, Some have OSes, some perform tasks without an OS
True
False
______ OS has well-defined fixed time constraints
Real-Time
Fixed-Time
In Real-Time OS, processing must be done within constraint
True
False
In Real-Time OS, processing must be done without constraint
True
False
In Real-Time OS, correct operation only if constraints met
True
False
In Real-Time OS, correct operation only if constraints are broken
True
False
______ operating systems made available in source-code format rather than just binary closed-source
Open-Source
Closed-Source
Open-Source Operating Systems are counter to the ______
Paste protection
Copy protection
Open-Source Operating Systems are counter to the ______
Digital Rights Management (DRM) movement
Virtual Rights Society (VRS) movement
Open-Source Operating Systems were started by ______, which has “copyleft” GNU Public License (GPL)
Pirated Program Place (PPP)
Free Software Foundation (FSF)
Started by Free Software Foundation (FSF), which has “copyleft”
GNU Public License (GPL)
UNG Public Liscense (LPG)
Which one is an example of Open-Source Operating Systems?
GNU/Linux
Windows
Which one is an example of Open-Source Operating Systems?
IOs
BSD UNIX
Which one is an example of Open-Source Operating Systems?
Mac OS X
Android
Open-Source Operating Systems Can use VMM like VMware Player (Free on Windows), Virtualbox (open source and free on many platforms - http://www.virtualbox.com)
True
False
VMM like VMware Player and Virtualbox can be used to run guest operating systems for exploration
True
False
Which one has the largest size?
Registers
Cache
Main memory
Solid state disk
Magnetic disk
Which one has the smallest size?
Registers
Cache
Main memory
Solid state disk
Magnetic disk
Which one has the lowest access time?
Registers
Cache
Main memory
Solid state disk
Magnetic disk
Which one has the highest access time?
Registers
Cache
Main memory
Solid state disk
Magnetic disk
Which one has most bandwidth?
Registers
Cache
Main memory
Solid state disk
Magnetic disk
Which one has least bandwidth?
Registers
Cache
Main memory
Solid state disk
Magnetic disk
Which one is managed by operating system?
Register and cache
Main memory, solid state disk and magnetic disk
Which one is backed by disk?
Register and cache
Main memory, solid state disk and magnetic disk
{"name":"OS Admin and Security - Chapter 1", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Operating System is ______, Which one is an operating system goal?, Which one is an operating system goal?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker