Advanced Operating Systems Exam Questions - 800 Verified Questions

Page 1


Advanced Operating Systems

Exam Questions

Course Introduction

Advanced Operating Systems delves into the design, implementation, and analysis of modern operating systems with a focus on innovative concepts beyond foundational OS principles. Topics include distributed and networked operating systems, kernel architecture, virtualization, file and storage systems, concurrency, security, fault tolerance, and resource management in multi-core and large-scale systems. Students will explore case studies and current research challenges, gaining hands-on experience with advanced OS algorithms and frameworks, and developing skills required for designing scalable, robust, and efficient system software for emerging hardware and application domains.

Recommended Textbook

Understanding Operating Systems 5th Edition by Ann McHoes

Available Study Resources on Quizplus

16 Chapters

800 Verified Questions

800 Flashcards

Source URL: https://quizplus.com/study-set/1171

Page 2

Chapter 1: Introducing Operating Systems

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/23179

Sample Questions

Q1) ____ is the partitioning of a single server, each of which can support a different operating system.

A) Multiprocessing

B) Multithreading

C) Virtualization

D) Shared processing

Answer: C

Q2) The most common mechanism for implementing multiprogramming was the introduction of the ____ concept, which is when the CPU is notified of events needing operating systems services.

A) paging

B) sharing

C) messaging

D) interrupt

Answer: D

Q3) Few major advances were made in data management during the 1960s.

A)True

B)False

Answer: True

To view all questions and flashcards with answers, click on the resource link above.

Page 3

Chapter 2: Memory Management: Early Systems

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/23180

Sample Questions

Q1) By compacting and relocating, the Memory Manager optimizes the use of memory and thus improves throughput, but an unfortunate side effect is more ____.

A) null entries

B) segmentation

C) errors

D) overhead

Answer: D

Q2) In the relocatable dynamic partitions scheme, the Memory Manager relocates programs to gather together all of the empty blocks and compact them to make one block of memory large enough to accommodate some or all of the jobs waiting to get in.

A)True

B)False

Answer: True

Q3) ____ is the actual memory address for a job that starts at 18K.

A) 1,800

B) 18,000

C) 18,432

D) 180,000

Answer: C

To view all questions and flashcards with answers, click on the resource link above.

Page 4

Chapter 3: Memory Management: Virtual Memory

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/23181

Sample Questions

Q1) A variation of the LRU page replacement algorithm is known as the clock page replacement policy because it is implemented with a circular queue and uses a pointer to step through the reference bits of the active pages, simulating a clockwise motion.

A)True

B)False

Answer: True

Q2) During the second generation, programmers started dividing their programs into sections that resembled working sets, really segments, originally called roll in/roll out and now called ____.

A) undermaps

B) overmaps

C) underlays

D) overlays

Answer: D

Q3) To find the address of a given program line, the line number is multiplied by the page size.

A)True

B)False

Answer: False

To view all questions and flashcards with answers, click on the resource link above.

Page 5

Chapter 4: Processor Management

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/23182

Sample Questions

Q1) ____ holds pertinent information, including the address where the job is stored and, in the case of virtual memory, the mapping between virtual and physical memory locations.

A) Main memory

B) Register content

C) Process priority

D) The process state

Q2) Some systems increase the priority of jobs that have been in the system for an unusually long time to expedite their exit, which is known as ____.

A) lagging

B) aging

C) bumping

D) accelerated priority

Q3) A process is an inactive unit, such as a file stored on a disk.

A)True

B)False

Q4) The processor is also known as the CPU.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Process Management

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/23183

Sample Questions

Q1) Deadlock occurs on a modern printer when ____.

A) The network connection for the printer overflows with too many requests to use the printer.

B) Too many users attempt to access the printer at the same time.

C) The buffer fills up with too many print jobs and the printer cannot decide which one to print.

D) The printer needs all of a job's output before it will begin printing, but the spooling system fills the available disk space with only partially completed output.

Q2) An algorithm designed to detect starvation by tracking how long each job has been waiting for resources is the same concept as ____.

A) deadlock

B) aging

C) preemption

D) round robin

Q3) Deadlocks are most serious in real-time systems.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Concurrent Processes

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/23184

Sample Questions

Q1) The source code of a Java program is first compiled into an intermediate language called Java ____, which are platform-independent.

A) beans

B) nibs

C) bits

D) bytecodes

Q2) The only reason for multiprocessing is to increase computer power.

A)True

B)False

Q3) Multiprocessors were developed for high-end models of midrange and mainframe computers, where the operating system treated each additional CPU as an additional resource, so that each could be scheduled for work.

A)True

B)False

Q4) The loosely coupled configuration features several complete computer systems, each with its own memory, I/O devices, CPU, and operating system.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Device Management

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/23185

Sample Questions

Q1) The RAID level ____ uses word parity for error correction.

A) 1

B) 3

C) 5

D) 6

Q2) ____ control the transfer of information between the disk drives and the rest of the computer system.

A) System controllers

B) Disk drive controllers

C) System interfaces

D) Disk drive interfaces

Q3) The SCAN algorithm moves the arm methodically from the inner to the outer track, servicing every request in its path.

A)True

B)False

Q4) Two of the most important measures of optical disc drive performance are sustained data-transfer rate and longest access time.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: File Management

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/23186

Sample Questions

Q1) Directories are special files with listings of filenames and their attributes.

A)True

B)False

Q2) A UNIX or Linux system might identify a file as: /usr/imfst/flynn/inventory.doc. What represents the root directory is ____.

A) /

B) usr

C) imfst

D) flynn

Q3) The computer system defines a file by activating the appropriate secondary storage device and loading the file into memory while updating its records of who is using what file.

A)True

B)False

Q4) The most commonly used access control scheme is the ____.

A) access control matrix

B) access control list

C) capability list

D) capability matrix

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Network Organization Concepts

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/23187

Sample Questions

Q1) The ____ is the most vulnerable to security breaches.

A) LAN

B) MAN

C) WAN

D) WLAN

Q2) In the OSI model, Layer ____ provides the interface to users and is responsible for formatting user data before passing it to the lower layers for transmission to a remote host.

A) Three

B) Four

C) Six

D) Seven

Q3) A router is an internetworking device, primarily software driven, which directs traffic between two different types of LANs or two network segments with different protocol addresses.

A)True

B)False

Q4) A MAN is a high-speed network often configured using a physical ring topology.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Management of Network Functions

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/23188

Sample Questions

Q1) The major difference between a NOS and DO/S is ____.

A) how each views and manages the local and global resources

B) the cost for each installation

C) the scalability when adding new nodes

D) the capabilities provided by the local operating system

Q2) In a distributed system, there is a high level of cooperation and sharing of actions and data maintained by the sites when determining which process should be loaded and where it should be run; this is accomplished by ____.

A) exchanging messages between site operating systems

B) managing all communications within a central controller

C) a dispatcher on each machine communicates with the dispatchers on the other sites

D) having requests that are sent to queues

Q3) For each node, the Memory Manager uses a kernel with a ____ algorithm to track the amount of memory that is available.

A) sharing

B) stacking

C) turning

D) paging

To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: Security and Ethics

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/23189

Sample Questions

Q1) The most extreme form of encryption is partial encryption.

A)True

B)False

Q2) ____ peruse data packets as they pass by, examine each one for specific information, and log copies of interesting packets for more detailed examination.

A) Spoofers

B) Proxy servers

C) Packet sniffers

D) Packet filters

Q3) Wire tapping is when unauthorized users gain the capability to search through storage, directories, or files for information they aren't privileged to read.

A)True

B)False

Q4) If a password consists of ten characters, it would take a human about 4.5 years to guess the password if the human makes one try each second.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: System Management

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/23190

Sample Questions

Q1) When providing accounting for computer use, secondary storage used during the billing period is usually given in terms of ____.

A) type of storage device

B) units of time

C) bytes of storage

D) the number of disk tracks allocated

Q2) The first step in testing a patch is ____.

A) testing your contingency plans to uninstall the patch

B) checking to see if the patched software performs its assigned tasks

C) testing to see if the system restarts after the patch is installed

D) testing to see whether the patch disrupts normal system operations

Q3) If directories are stored on the ____ track, then, on average, the disk drive arm has to travel farther to access each file than it would if the directories were kept in the center tracks.

A) outermost

B) innermost

C) master

D) volume

To view all questions and flashcards with answers, click on the resource link above.

14

Chapter 13: Unix Operating System

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/23191

Sample Questions

Q1) UNIX stores files as sequences of bytes and does not impose any structure on them.

A)True

B)False

Q2) A ____ is several programs simultaneously processing the same I/O stream.

A) pipeline

B) pipe

C) filter

D) redirect

Q3) The immediate goals for UNIX were twofold, to develop an operating system that would support software development, and to keep its algorithms as simple as possible.

A)True

B)False

Q4) The command ____ is used to find a specified string of characters in a file.

A) cp

B) mv

C) grep

D) ls

To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 14: Ms-Dos Operating System

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/23192

Sample Questions

Q1) In the MS-DOS file management scheme, the symbol ____ follows the drive name.

A) ;

B) :

C) >

D) #

Q2) The directories that were supported by version 1.0 of MS-DOS number ____.

A) 0

B) 1

C) 10

D) 100

Q3) The layer at the bottom of MS-DOS is BIOS (Basic Input/Output System).

A)True

B)False

Q4) An interrupt vector specifies where the interrupt handler program for a specific interrupt type is located.

A)True

B)False

Q5) MS-DOS was written for a single family of microprocessors.

A)True

B)False

Page 16

To view all questions and flashcards with answers, click on the resource link above.

Chapter 15: Windows Operating Systems

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/23193

Sample Questions

Q1) In a Windows device driver, the ____ is used by the I/O Manager to communicate with the driver when it generates an IRP after an I/O request.

A) initialization routine

B) dispatch routine

C) start I/O routine

D) unload routine

Q2) To give fast response times when dealing with CPU-bound applications, all that is required is fast hardware.

A)True

B)False

Q3) A thread is the entity within a process that the ____ schedules for execution.

A) thread manager

B) thread scheduler

C) process scheduler

D) kernel

Q4) Windows is a non-preemptive-multitasking, multithreaded operating system.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above.

Chapter 16: Linux Operating System

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/23194

Sample Questions

Q1) The ____ represents the root directory.

A) \

B) ..

C) ^

D) /

Q2) The name Linux is a contraction of Linus and UNIX.

A)True

B)False

Q3) The first primary corporate supporter of Linux was Red Hat Linux, the world's leading Linux distributor until 2005.

A)True

B)False

Q4) In Linux, each process is referenced by a descriptor, which contains approximately fifteen fields describing the process attributes together with the information needed to manage the process.

A)True

B)False

Q5) Linux is an open-source program.

A)True

B)False

Page 18

To view all questions and flashcards with answers, click on the resource link above.

Turn static files into dynamic content formats.

Create a flipbook