100% Passed Tests
____is a sort of pseudofile that can be used to connect to processes
a. A block
b. A pipe
c. A specific file
d. A block file ANS b
_____ are used to model devices that consist of a collection of randomly addressable blocks such as
disks
a. A character special file
b A separate special file
c. A block special file
d. A pipe special file ANS c
_____ are used to model printers, modems, and other devices that accept or output a character stream
a. A character special file
b. A separate special file
c. A block special file
d. A pipe special file ANS a
OS manage the system security such as authentication, protecting the system from unwanted
intruders
a. Security
b. Authentication
c. Protection
d. Block access ANS c
The UNIX command interpreter, or GUI
,a. shell
b. prompt
c. command
d. compiler ANS a
Which of these statements about virtual memory are true?
a. Gives the ability to run programs larger than the machine's physical memory by moving pieces
back and forth between RAM and disk
b. Largely magnetic-tape based
c. Virtual Memory is a external memory
d. Enabled the ability to have a program dynamically link on a library at run time instead of having it
compiled in ANS a d
Which of these statements about virtual memory are not true?
a. Gives the ability to run programs larger than the machine's physical memory by moving pieces
back and forth between RAM and disk
b. Enabled the ability to have a program dynamically link on a library at run time instead of having it
compiled in
c. None of others ANS c
System calls
a. Permit application programs to access protected resources
b. The interface between user programs and the OS
c. The GUI between user program and the OS ANS a b
Put the steps in making a system call in order
1. System calls may vary from one OS to another
2. System calls are like procedures: take parameters, calling routine waits for response (a call to an
OS service)
3. Once a system call occurs control passes to a specific routing in system mode. If the parameters
are correct and legal the request will be executed (a trap into the OS code)
,a. 1, 2, 3
b. 2, 3, 1
c. 3, 1, 2
d. 3, 2, 1 ANS b
Which of these statements about Monolithic Systems are true?
a. A set of service procedures that carry out the system calls
b. A set of utility procedures that Help the service procedures
c. A main program that invokes the requested service procedure
d. All of others ANS a
Which is the difference between personal computers and mainframe computers?
a. Personal computers are always interactive
b. Mainframe computers are mostly batch systems with many users
c. Protection is much more important on mainframe computers
d. All of the others ANS d
What is not a main function of an operating system?
a. Provide the users with an extended (virtual) machine
b. Manage the I/O devices
c. Provide user interfaces
d. Support virtual memory ANS c
MS-DOS is a example of ....
a. Monolithic system
b. Layered System
c. Virtual Machine
d. Client-server model ANS a
, What is the main characteristic of embedded operating system?
a. Multiple CPU
b. Time-sharing
c. Many I/O devices
d. Restriction of memory size, speed of CPU, screen size, powers ANS d
Which of the following statements is incorrect about user mode and kernel mode?
a. In kernel mode, the OS can execute every instruction in the instruction set
b. In user mode, user program can execute only a subset of instructions
c. Having two modes of operation helps prevent user programs from accessing critical instructions
d. None of the others ANS d
A time-sharing system is
a. Another name for a batch system
b. A multi-user, multi-process, interactive system
c. All of the others
d. None of the others ANS b
Which of these statements about Microkernel are true?
a. The modules run user mode `\rightarrow` protection against bugs
b. All the layers went in the kernel
c. Resist crashing the entire system
d. All of the others ANS a
An the OS concept, the software can be divided into 2 important modes
a. User mode
b. Supervisor mode
c. File mode
d. Management mode ANS a b