100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
OSG202 Questions + Answers Graded A+ $8.39   Add to cart

Exam (elaborations)

OSG202 Questions + Answers Graded A+

 0 view  0 purchase
  • Course
  • OSG202
  • Institution
  • OSG202

: An Operating System is? - ️️A program that acts as an intermediary between a user of a computer and the computer hardware _______ is the rapid switching of the CPU between multiple processes in memory - ️️toicankey Multi-programming ____ gives users the appearance that their programs ...

[Show more]

Preview 4 out of 56  pages

  • October 11, 2024
  • 56
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • OSG202
  • OSG202
avatar-seller
PatrickKaylian
OSG202
: An Operating System is? - ✔️✔️A program that acts as an intermediary between a
user of a computer and the computer hardware


_______ is the rapid switching of the CPU between multiple processes in memory -
✔️✔️toicankey Multi-programming

____ gives users the appearance that their programs are being completely loaded in
main - ✔️✔️Virtual memory

____ include(s) every peripheral unit in the system such as printers, disk drives,
CD/DVD drives, flash memory, keyboards, and so on. - ✔️✔️I/O Devices

____ introduced the need for control cards, which defined the exact nature of each
program - ✔️✔️Job scheduling

____ is a sort of pseudofile that can be used to connect to processes - ✔️✔️toicankey
A pipe

____ is a way to optimize search times by ordering the requests once the read/write
heads have - ✔️✔️Rotational ordering

____ is necessary in any computer system because some resources such as memory,
CPU, and - ✔️✔️Mutual exclusion

____ is when, in modern printing systems, a disk accepts output from several users and
acts as a - ✔️✔️Spooling

____ means that several logical records are grouped within one physical record. -
✔️✔️Blocking

____ occurs when two processes do not release control of resources they are using. -
✔️✔️Resource holding

____ developed the Banker's Algorithm. - ✔️✔️Dijkstra

____ proposed a solution to the readers and writers problem that did not result in
starvation - ✔️✔️Hoare

____ uses the same underlying philosophy as shortest job next, where the shortest jobs
are processed first and longer jobs are made to wait. - ✔️✔️SSTF

,_____ are used to model devices that consist of a collection of randomly addressable
blocks such as disks - ✔️✔️toicankey A block special file

_____ is the command that writes the bottom 10 lines of a file to the screen. - ✔️✔️tail

______ is resources that can be taken away from the process owning it with no ill
effects - ✔️✔️toicankey preemptable


_________is the act of allowing only one process to have access to a dedicated
resource - ✔️✔️Mutual-exclusion condition

: _____ is the command that writes the first 10 lines of a file to the screen. - ✔️✔️head

: The _____ command will list all working processes? - ✔️✔️ps

: What is the correct approach with the Hold and Wait condition to prevent Deadlock? -
✔️✔️Request all resources initially

: Which command is used to change a file's name? - ✔️✔️mv

: Which command will display current day? - ✔️✔️date

· The CPU sets the DMA controller registers so DMA knows what to transfer where, and
how many transfer ; · The CPU command the disk controller read data from disk to
internal buffer, then verify the checksum· The disk controller sends an
acknowledgement signal to DMA controller when the write is complete ; ·
Simultaneously, the DMA controller decides which device to service next (using RR or
priority scheme)· In each transfer, the DMA controller increments the memory
addresses to use and decrements the byte count ; · If the byte count is still greater than
0, step 2 through 4 are repeated until the count reaches 0· If the byte equals 0, the DMA
controller interrupts the CPU to let it know the transfer is now complete ; · The disk
controller transfer a word/ byte from internal buffers to main memory at the address that
is described in the DMA's memory address register· The DMA controller initiates the
transfer by issu - ✔️✔️toicankeyMemory-Mapped I/O

1. A requests R ; 2. C requests T3. A requests S ; 4. C requests R5. A releases R ; 6. A
releases S7. B requests S ; 8. C requests S9. B requests R - ✔️✔️toicankey The
system is deadlock ; toicankey The system can be resolved by process B attacks the
No-Preemption condition

1. A requests R ; 2. C requests T3. A requests S ; 4. C requests R5. A releases R ; 6. A
releases S7. B requests S - ✔️✔️toicankey The system is in safe state ; toicankey All
process no deadlock

,1. It is a list of memory locations (set of addresses) from 0 to some maximum, which the
process can read and write ; 2. It make the different programs think they have the
hardware on their ownWhat's is it? - ✔️✔️toicankey Address space

1. It uses a table of counters per files. ; 2. Traverse the directory tree, incrementing the
counter when each every i-node in every directory 3. When the checker is all done, it
has a list, indexed by i-node number, telling how many directories contain each file ; 4. It
then compares these numbers with the link counts stored in the i-node themselves
Which checking is applied with the above description? - ✔️✔️toicankey Checking for
directory and its file in consistency

1. Map a disk block to a page (s) in memory and page used the file on disk as the
backing store ; 2. Allowing a part of the virtual address space to be logically associated
with the fileWhat's is the strategy? - ✔️✔️toicankey Memory-mapped file

1. Put the argument of called function on the stack ; 2. The interrupt occurs to switch
from user mode to kernel mode3. The system functions are located and executed ; 4.
After finished, the interrupt occurs again to switch to user mode5. The control is
returned to the called function ; Which is above five statements described ?Which OS
structure is described ? - ✔️✔️toicankeyMS-DOS

1. Put the arguments in registers or on the stack ; 2. When the system call handler has
completed its work, the interrupt is issued to witch form kernel to user mode3. The
procedure returns to the user program in the usual way procedure calls return ; 4. Issue
trap instructions to switch form user mode to kernel mode at the fixed address where
the procedure located5. The kernel mode dispatches to the correct system call handler ;
Arrange the above sentences in order that describe the "system call" progress.1. Put
the argument of called function on the stack ; 2. The interrupt occurs to switch from user
mode to kernel mode3. The system functions are located and executed ; 4. After
finished, the interrupt occurs again to switch to user mode5. The control is returned to
the called function - ✔️✔️toicankeyThe interface between user programs and the OS is
used to call the special procedure in kernel

1. The mechanism allows a child process to inherit a communication channel from its
parent; data written to one end of it can be read at the other hardware on their own ; 2.
A mechanism for passing data among processesWhat's is the mechanism? -
✔️✔️toicankey pipe ; toicankey Pseudo file

1. The operating system does each of the following except - ✔️✔️Ensures that
programs terminate their execution

1/ The maximum segment for Process Pentium if the Limit field of Segment Descriptor -
✔️✔️1MB

, 1/ Which of the following is a high-level synchronization primitive? - ✔️✔️Monitors

1E = (8, 11, 12, 14) ; Choose the correct statement using the banker's algorithm1. First
phase, the process tries to lock all records it needs, one at a time ; 2. If it succeeds, it
begins the second phase, performing its updates and releasing the locks2. If it
succeeds, it begins the second phase, performing its updates and releasing the locks ;
Which system is applied above strategy ?Whose ideas is referenced ? -
✔️✔️toicankeyMathematicians

1E = (8, 12, 15, 16) ; Which process can runnable in order using deadlock detection
algorithms ?Choose the correct statement using the banker's algorithm -
✔️✔️toicankeyP4, P5, P1, P2, P3

1E = (8, 16, 15, 16) ; Which process can runnable in order using deadlock detection
algorithms?Choose the correct statement using the banker's algorithm - ✔️✔️toicankey
Only P4 runnable ; toicankey P1, P2, P3, P5 deadlock ; toicankey The resource
assigned is unsafe

2. The process is the computational environment that includes each of the following
except - ✔️✔️Operating system

2/ Which of the following is used in mutual exclusion ( exclusive control)? -
✔️✔️Contention

3 Put job in waiting queue - ✔️✔️first-fit memory allocation

3. Threads can be implemented in each of the following ways except -
✔️✔️Parent/child processes

3/ Which of the following is OS component? - ✔️✔️Process Management

4. Files are distinguished from other resources except that - ✔️✔️The interface is
exceptionally complex as compared with most other resources.

4/ A page fault means that we referenced a page? - ✔️✔️that was not in main memory

4/ MS- DOS is an example of ... - ✔️✔️Monolithic system

4/ Which of the following preemptive scheduling algorithm? - ✔️✔️Round Robin

5. A UNIX process contains each of the following except - ✔️✔️Thread segment

5/ What is interrupt vector? - ✔️✔️Part of memory which contains the addresses of
interrupt handlers

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller PatrickKaylian. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $8.39. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

80189 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$8.39
  • (0)
  Add to cart