Systems Software

A visually engaging illustration depicting computer systems, memory management concepts, and operating systems, emphasizing learning and technology.

Systems Software Quiz

Test your knowledge of systems software with our comprehensive quiz! This quiz covers a variety of topics including memory management, process synchronization, and cybersecurity concepts.

  • 50 Questions
  • Multiple choice and checkbox formats
  • Designed for students and professionals alike
50 Questions12 MinutesCreated by CodingTree42
The logical address is:
The address seen by the memory unit
Generated by the CPU
Generated by the user
Memory Management Unit (MMU) is a:
Software device that at the compilation time maps virtual to physical address
Hardware device that at the compilation time maps virtual to physical address
Hardware device that at run time maps virtual to physical address
Software device that at run time maps virtual to physical address
Virtual Memory is:
Kernel memory
User logical memory
Physical memory
Separation of user logical memory from physical memory
Copy-on-Write (COW) allows:
Both parent and child processes to initially share the same pages in memory
The child process to initially share the same pages in memory
The parent process to initially share the same pages in memory
To write a new file
Mutual exclusion means:
A resource can be released only voluntarily by the process holding it, after that process has completed its task
Only one process at a time can use a resource
A process holding at least one resource is waiting to acquire additional resources held by other processes
If a system is in safe state then:
Possibility of deadlock
Deadlocks will occur
No deadlocks will occur
In the readers-writers problem:
Readers can read/write the dataset and writers can read/write.
Readers can only read the dataset and writers can only write.
Readers can only read the dataset and writers can read/write.
Readers can read/write the dataset and writers can only write.
Multiple-choices allowed, -0.2 pts penalisation per incorrect answer] In Java synchronisation, describe what happens when a thread calls notify():
An arbitrary thread T is selected from the wait set
Start a new thread T
Finishes thread T
T is moved from the wait set to the entry set
Set the state of T from blocked to runnable
A Mutex is a:
Mutual exclusion lock
CPU scheduler algorithm
Type of kernel
A Semaphore, in the OS context, is:
An integer variable used to solve the critical section problem by using two atomic operations, wait and signal that are used for process synchronization
The name given to the critical section of code that can only be accessed by only one thread
Is a traffic light system
Preemptive scheduling is used when a process:
Starts the execution
Terminates, or a process switches from running to the waiting state
Switches from running state to ready state or from the waiting state to ready state
In Round Robin (RR) scheduling:
The CPU is allocated to the process with the highest priority
Each process gets the same amount of CPU time
The CPU is allocated to the process with the lowest priority
In the Many-to-One thread model:
Many user-level threads mapped to single kernel thread
Many user-level threads mapped to many kernel threads
One user-level thread is mapped to many kernel threads
Signals are used in UNIX/Linux systems to notify:
A process that a particular event has occurred
A thread that a particular event has occurred
The OS that a particular event has occurred
The user That a particular event has occurred
A process is:
A text editor
A program in execution
A spreadsheet
A browser
[Multiple-choices allowed, -0.091 pts penalisation per incorrect answer] Select all the valid states for a process:
In progress
New
Blocked
Ready
Running
Inactive
Terminated
Aborted
Waiting
Paused
Killed
[Multiple-choices allowed, -0.067 pts penalisation per incorrect answer] Select the services offered by Operating Systems:
Microsoft Office tools
User Interface
Netflix
Program execution
Logging
Anti-virus
ITunes
I/O Operations
File-system manipulation
Communication
Error detection
Resource allocation
Protection and security
VLC Player
YouTube
All Operating Systems offer:
A Graphical User Interface (GUI)
A user interface (UI)
A touch screen capability
What do all the devices (from a smart watch to a cluster HPC) share in common?
Kernel
Windows
Mac
Linux
Linux is:
An operating system
A kernel
An application
Masquerading (breach authentication) refers to:
Intruder sits in data flow, masquerading as sender to receiver and vice versa
Message modification
Intercept an already-established session to bypass authentication
Pretending to be an authorised user to escalate privileges
Common attack type with access beyond what a user or resource is supposed to have
Malware refers to:
Intruder sits in data flow, masquerading as sender to receiver and vice versa
Software designed to exploit, disable, or damage computer
A data lock via encryption, demanding payment to unlock I
Program frequently installed with legitimate software to display adds, capture user data
Rings of protection:
Join processes into domains
Separate processes into domains and order them
Separate functions into domains and order them
Join functions into domains
An access matrix:
Is a table that defines access permissions between specific subjects and objects
Is a table that defines access restrictions between specific subjects and objects
Is a table that defines access permissions between specific users and objects
Type 0 hypervisors are:
Hardware-based solutions that provide support for virtual machine creation and management via firmware
Applications that run on standard operating systems but provide VMM features to guest operating systems
Operating-system-like software built to provide virtualization
Paravirtualization is:
Where the Virtual Machine Manager does not virtualize real hardware but instead create an optimised virtual system
A technique in which the guest operating system is modified to work in cooperation with the Virtual Machine Manager to optimize performance
Enable applications written for one hardware environment to run on a very different hardware environment, such as a different type of CPU
In the context of cryptography, brute-force attack:
Is best-known multiple-letter encryption cipher
Improves on the simple monoalphabetic technique by using different monoalphabetic substitutions as one proceeds through the plaintext message
Involves trying every possible key until an intelligible translation of the ciphertext into plaintext is obtained
Involves replacing the letters of plaintext by other letters or by numbers or symbols
The Caesar Cipher:
Involves replacing each letter of the alphabet with a number standing N places further down the alphabet
Involves replacing each letter of the alphabet with the letter standing N places further up the alphabet
Involves replacing each letter of the alphabet with the letter standing N places further down the alphabet
UDP stands for:
User Datagram Protocol and is an Unreliable data transport protoco
User Data Protocol and is an Unreliable data transport protocol
User Datagram Protocol and is a Reliable data transport protocol
User Data Protocol and is a Reliable data transport protocol
TCP stands for:
Transmission Communication Protocol and is an Unreliable data transport protoco
Transmission Control Protocol and is a Reliable data transport protocol
Transmission Communication Protocol and is a Reliable data transport protocol
Transmission Control Protocol and is an Unreliable data transport protocol
TLS stands for:
Transport Layer Security
Transfer Layer Security
Transport Library Security
Transfer Library Secure
Secure Shell (SSH) is:
A protocol for network communications designed to be relatively complex and difficult to implement
A protocol for secure network communications designed to be very complex to implement
A protocol for secure network communications designed to be relatively simple and inexpensive to implement
A container is:
An operating system architecture where the entire operating system is working in kernel space
An abstraction at the app layer that packages code and dependencies together
An abstraction of physical hardware turning one server into many servers
The near-minimum amount of software that can provide the mechanisms needed to implement an operating system (OS)
[Multiple-choices allowed, -0.111 pts penalisation per incorrect answer] Microservices are:
Difficult to manage
Highly maintainable and testable
Loosely coupled
Ideal for small projects that do not require scalability
Independently deployable
Organized around business capabilities
Owned by a small team
Highly coupled
Monolithic
[Multiple-choices allowed, -0.2 pts penalisation per incorrect answer] Vulnerabilities, in containers, can possibly exist in:
Main Operating System
Container configurations
Container packages
Virtual Machines
Application libraries
[Multiple-choices allowed, -0.143 pts penalisation per incorrect answer] Select the steps that help to keep your containers ecosystems secure:
Use any container
Check the integrity of the images
Consume any content for tagged Docker builds
Sign to validate pipeline phases
Consume only trusted content for tagged Docker builds
Ensure that the container was generated by a trusted publisher
Ignore the integrity of images
[Multiple-choices allowed, -0.1 pts penalisation per incorrect answer] In the context of Cloud Computing, the properties and characteristics are:
Low scalability and elasticity
High scalability and elasticity
High availability and reliability
Low performance and optimization
Low manageability and interoperability
High manageability and interoperability
High accessibility and portability
High performance and optimization
Low availability and reliability
Low accessibility and portability
Fault-tolerance is:
The property that enables a system to continue operating properly in the event of the failure of some of its components
A subfield of control engineering which concerns itself with monitoring a system, identifying when a fault has occurred and pinpoint the type of fault and its location
The ability to provide and maintain an acceptable level of service in the face of faults and challenges to normal operation
The process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster
[Multiple-choices allowed, -0.25 pts penalisation per incorrect answer] In heterogeneous computing, domain decomposition involves:
Dividing tasks among processors
Deciding which data elements are going to be accessed (read and/or written) by which processor
Deciding how data elements should be divided among processors
Deciding which tasks each processor should be doing
[Multiple-choices allowed, -0.143 pts penalisation per incorrect answer] Why are race conditions so difficult to manage?
Programs with race conditions exhibit non-deterministic behaviour
The result is always incorrect
Errors more likely to occur when number of threads or execution time decreases
Sometimes the result is incorrect
Programs work correctly on trivial data sets and small number of threads
Errors more likely to occur when number of threads or execution time increases
Programs with race conditions exhibit deterministic behaviour
Edge Computing devices are:
Specialised software that processes data in edge devices, which is opposite to thin client, which hardly transfers data
Regular laptops used in the day-to-day activities
Devices like sensors and machines can be outfitted to work in edge computing
[Multiple-choices allowed, -0.1 pts penalisation per incorrect answer] Advantages of Enabling Edge Computing:
Speed is reduced
Speed is increased
Hacking issues are increased
Random issues are increased
Compliance issues are increased
Reliability is increased
Reliability is reduced
Random issues are reduced
Compliance issues are reduced
Hacking issues are reduced
[Select all that apply, -0.167 pts penalisation per incorrect answer] What output is produced by the following? System.out.println("X: " + 25); System.out.println("Y: " + (15 + 50)); System.out.println("Z: " + 300 + 50);
Y: 1550
X: 25
Z: 350
Y: 65
Z: 30050
X: 7
Which of the following println statements produces the following output: "Thank you all for coming to my home tonight," he said mysteriously.
System.out.println("\"Thank you all for " + "coming to my home tonight,\" he said " + "mysteriously.");
System.out.println("\"Thank you all for " + "coming to my home tonight,\"\n he said " + "mysteriously.");
System.out.println("Thank you all for coming to my home\n tonight, he said mysteriously.");
How many bits would you need to represent each of the 50 United States using a unique permutation of bits?
2 bits
1 bit
6 bits
8 bits
[Select all that apply, -0.091 pts penalisation per incorrect answer] Which of the following are valid Java identifiers?
Grade
QuizGrade
NetworkConnection
Frame2
3rdTestScore
MAXIMUM
MIN_CAPACITY
Rstudent#
Shelves1&2
MIN-CAPACITY
MAX+LOAD
What is the output of the following code: String var_a="c"; String var_b="c"; if (var_a.equals(var_b)){ System.out.println("A and B have the same value!"); } else{ System.out.println("A and B do not have the same value!"); }
Not possible to run the code
A and B have the same value!
A and B do not have the same value!
What is the output of the following code: for(int i=10;i>-1;--i) { System.out.print((i+1)+" "); }
1 2 3 4 5 6 7 8 9 10 11
1 2 3 4 5 6 7 8 9 10
10 9 8 7 6 5 4 3 2 1
Not possible to run the code
11 10 9 8 7 6 5 4 3 2 1
What is the output of the following code: for(int i=0;I<=0;I++) { Console.writeline((i+1)+" "); }
1 2 3 4 5 6 7 8 9 10
11 10 9 8 7 6 5 4 3 2 1
Not possible to run the code
10 9 8 7 6 5 4 3 2 1
1 2 3 4 5 6 7 8 9 10 11
What is the output generated by the following code: import java.io.FileWriter; // Import the FileWriter class import java.io.IOException; // Import the IOException class to handle errors public class WriteToFile { public static void main(String[] args) { try { FileWriter myWriter = new FileWriter("filename.txt"); myWriter.write("Files in Java might be tricky, but it is fun enough!"); myWriter.close(); System.out.println("Successfully wrote to the file."); } catch (IOException e) { System.out.println("An error occurred."); e.printStackTrace(); } } }
Writes "Successfully wrote to the file." in the terminal and "Files in Java might be tricky, but it is fun enough!" Into the file filename.txt
Writes "Files in Java might be tricky, but it is fun enough!" in the terminal and "Successfully wrote to the file." Into the file name.txt
Writes "Files in Java might be tricky, but it is fun enough!" In the terminal and "Successfully wrote to the file." Into the file file.txt
Does not write anything in the terminal and "Successfully wrote to the file." Into the file filename.txt
Writes "Files in Java might be tricky, but it is fun enough!" in the terminal and "Successfully wrote to the file." Into the file filename.txt
{"name":"Systems Software", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge of systems software with our comprehensive quiz! This quiz covers a variety of topics including memory management, process synchronization, and cybersecurity concepts. 50 Questions Multiple choice and checkbox formats Designed for students and professionals alike","img":"https:/images/course3.png"}
Powered by: Quiz Maker