

Advanced Operating Systems
Practice Questions
Course Introduction
Advanced Operating Systems delves into the design, implementation, and analysis of modern operating systems with a focus on scalability, security, and reliability. This course covers topics such as distributed systems, concurrency and synchronization, security mechanisms, virtualization, file systems, and fault tolerance. Students will explore real-world case studies and emerging trends, mastering techniques for process management, inter-process communication, and resource allocation in complex computing environments. Practical programming assignments and research projects provide hands-on experience with the internal workings and architecture of cutting-edge operating systems.
Recommended Textbook
Understanding Operating Systems 5th Edition by Ann McHoes
Available Study Resources on Quizplus
16 Chapters
800 Verified Questions
800 Flashcards
Source URL: https://quizplus.com/study-set/1171

Page 2

Chapter 1: Introducing Operating Systems
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/23179
Sample Questions
Q1) The supercomputer was developed primarily for government applications needing massive and fast number-crunching ability to carry out military operations and weather forecasting.
A)True
B)False
Answer: True
Q2) ____ include(s) every peripheral unit in the system such as printers, disk drives, CD/DVD drives, flash memory, keyboards, and so on.
A) The CPU
B) I/O Devices
C) Processors
D) Secondary components
Answer: B
Q3) Since the mid-1970s rapid advances in computer technology have blurred the distinguishing characteristics of early machines.
A)True
B)False
Answer: True
To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Memory Management: Early Systems
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/23180
Sample Questions
Q1) All computers have only a finite amount of memory and if a program doesn't fit, then either the size of the main memory must be increased or the program must be modified.
A)True
B)False
Answer: True
Q2) The first attempt to allow for multiprogramming used fixed partitions.
A)True
B)False
Answer: True
Q3) The ____ keeps the free/busy lists organized by memory locations, low-order memory to high-order memory.
A) fixed partition allocation
B) first-fit memory allocation
C) dynamic fit memory allocation
D) best-fit memory allocation
Answer: B
To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Memory Management: Virtual Memory
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/23181
Sample Questions
Q1) Cache memory is a small high-speed memory unit that a processor can access less rapidly than main memory.
A)True
B)False
Answer: False
Q2) In demand paging when a job requires a certain page to be loaded and there is no empty page frame,____ .
A) A resident page must be swapped back into secondary storage.
B) The page cannot be loaded and the job will exit.
C) The job must wait until a page frame is freed by another job.
D) The page will share a page frame with another page from the same job.
Answer: A
Q3) With demand paging, jobs are divided into equally sized ____ that initially reside in secondary storage.
A) pages
B) blocks
C) frames
D) sets
Answer: A
To view all questions and flashcards with answers, click on the resource link above.
Page 5

Chapter 4: Processor Management
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/23182
Sample Questions
Q1) ____ allows for faster turnaround of CPU-bound jobs.
A) No movement between queues
B) Movement between queues
C) Variable time quantum per queue
D) Aging
Q2) The control program that handles the interruption sequence of events is called the interrupt scheduler.
A)True
B)False
Q3) When using priority scheduling, priorities are assigned to jobs by the owner of the job (the user).
A)True
B)False
Q4) An I/O request is called a(n) ____ wait in multiprogramming environments.
A) forced
B) natural
C) scheduled
D) indirect
To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Process Management
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/23183
Sample Questions
Q1) Fill in the missing event that causes deadlock in a database. There are two processes (P1 and P2), each of which needs to update two records (R1 and R2) and the following sequence leads to a deadlock: 1. P1 accesses R1 and locks it.
2) P2 accesses R2 and locks it.
3) ____
4) P2 requests R1, which is locked by P1.
A) P2 releases R2.
B) P1 requests R1 again.
C) P1 requests R2, which is locked by P2.
D) P2 releases R1.
Q2) ____ is the act of allowing only one process to have access to a dedicated resource.
A) No preemption
B) Circular wait
C) Resource holding
D) Mutual exclusion
Q3) In the dining philosophers problem there are five philosophers and four forks.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above.
Page 7

Chapter 6: Concurrent Processes
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/23184
Sample Questions
Q1) When a computer evaluates the expression A = 3 * B * C + 4 / (D + E) ** (F - G), in a sequential manner, ____ is evaluated as a first step.
A) F - G
B) 3 * B
C) C + 4
D) B * C
Q2) A ____ of processing must be handled as a unit.
A) line
B) segment
C) critical region
D) semaphore
Q3) When using a semaphore, a value of ____ indicates that a critical region is in use.
A) -100
B) 0
C) 100
D) 9999
Q4) A semaphore is a negative integer variable that is used as a binary signal.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 8
Chapter 7: Device Management
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/23185
Sample Questions
Q1) The advent of optical discs was made possible by developments in ____ technology.
A) magnetic
B) laser
C) storage
D) silicone
Q2) Buffers are used extensively to better synchronize the movement of data between the relatively slow I/O devices and the very fast CPU.
A)True
B)False
Q3) To write data to flash memory, an electric charge is sent through one transistor, called the ____, then through a metal oxide layer, and into a second transistor called the control gate where the charge is stored in a cell until it's erased.
A) parallel port
B) floating gate
C) pit
D) crystalline port
To view all questions and flashcards with answers, click on the resource link above.

Page 9

Chapter 8: File Management
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/23186
Sample Questions
Q1) An indexed sequential file does not have overflow areas.
A)True
B)False
Q2) The most commonly used access control scheme is the ____.
A) access control matrix
B) access control list
C) capability list
D) capability matrix
Q3) ____ might be an encoded version of ADAMSbbbbbbbbbb?
A) ADAMSx10
B) ASbb
C) AD2MSb10
D) ADAMSb10
Q4) The computer system defines a file by activating the appropriate secondary storage device and loading the file into memory while updating its records of who is using what file.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above.
Page 10

Chapter 9: Network Organization Concepts
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/23187
Sample Questions
Q1) ____ is a good example of a circuit-switched network.
A) A telephone system
B) The Internet
C) The United States Postal Service
D) A local area network
Q2) In a ring topology each packet is passed from node to node in both directions, and the destination station copies the data into a local buffer.
A)True
B)False
Q3) The tree topology is a collection of rings.
A)True
B)False
Q4) A WLAN typically poses security vulnerabilities because of its open architecture and the inherent difficulty of keeping out unauthorized intruders.
A)True
B)False
Q5) Bridging between two homogeneous networks occurs at the data link level.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Management of Network Functions
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/23188
Sample Questions
Q1) To control resource clusters as a group, most process-based systems are configured around complex ____, which manage multiple resources or divide the work among subordinate processes.
A) resource managers
B) semaphores
C) scheduling algorithms
D) server processes
Q2) The Process Manager has responsibility for the following tasks: creating objects, dispatching objects, scheduling objects, synchronizing operations on objects, communicating among objects, and deleting objects.
A)True
B)False
Q3) The network operating system handles the interfacing details and coordinates the remote processing.
A)True
B)False
Q4) Networks are becoming increasingly homogeneous.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Security and Ethics
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/23189
Sample Questions
Q1) Wire tapping is when unauthorized users gain the capability to search through storage, directories, or files for information they aren't privileged to read.
A)True
B)False
Q2) A gap in system security is always malicious.
A)True
B)False
Q3) Using ____, a firewall reviews the header information for incoming and outgoing Internet packets to verify that the source address, destination address, and protocol are all correct.
A) snooping
B) packet filtering
C) a proxy server
D) anti-virus software
Q4) As an alternative to passwords, some systems have integrated use of a ____.
A) smart card
B) fingerprint scanner
C) biometric scanner
D) retina scanner
To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: System Management
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/23190
Sample Questions
Q1) Any system improvement can be made only after extensive analysis of the needs of the system's resources, requirements, managers, and users.
A)True
B)False
Q2) Blocking increases the number of physical I/O requests.
A)True
B)False
Q3) An algorithm for a positive feedback loop should monitor the effect of new arrivals in two places: the Processor Manager's control of the CPU and the Device Manager's read and write operations.
A)True
B)False
Q4) A disadvantage of software monitoring tools over hardware monitoring tools is ____.
A) They are more difficult to install.
B) They become part of the system can therefore distort the results of the analysis.
C) They are more expensive.
D) They are not secure.
To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 13: Unix Operating System
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/23191
Sample Questions
Q1) There is no return from a successful ____ call.
A) nest
B) exec
C) duplicate
D) fork
Q2) If a program's execution is expected to take a long time, you can start its execution and then log off the system without having to wait for it to finish by using the command
A) fin
B) finproc
C) keep
D) nohup
Q3) For multiprogramming systems, most UNIX operating systems use either ____ management techniques.
A) indirect paging and hot swapping
B) simple memory and paging
C) virtual memory and swapping
D) swapping or demand paging memory
To view all questions and flashcards with answers, click on the resource link above.
Page 15

Chapter 14: Ms-Dos Operating System
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/23192
Sample Questions
Q1) There are ____ disk sectors grouped into a cluster.
A) two
B) two to eight
C) eight
D) eight to ten
Q2) When a disk is formatted (using the FORMAT command), its tracks are divided into sectors of 1024 bytes each.
A)True
B)False
Q3) If a program that is already running needs more memory, such as for additional I/O buffers, the Memory Manager checks to see whether enough memory remains.
A)True
B)False
Q4) MS-DOS was designed to accommodate a single novice user in a single-process environment.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 16

Chapter 15: Windows Operating Systems
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/23193
Sample Questions
Q1) A(n) ____ is a data structure that controls how the I/O operation is processed at each step.
A) ITB
B) IMS
C) IRP
D) IRQ
Q2) At the operating system level, file mapping is typically used for file caching, loading, and running executable programs.
A)True
B)False
Q3) The first Windows application was not a true operating system.
A)True
B)False
Q4) To start an application from the Windows desktop, users ____ on an application icon or select it from the Start menu.
A) press SHIFT and click
B) double-click
C) press CTRL and click
D) click once
To view all questions and flashcards with answers, click on the resource link above. Page 17

Chapter 16: Linux Operating System
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/23194
Sample Questions
Q1) Linux provides ____ queues and semaphores to allow two processes to synchronize with each other.
A) exec
B) fork
C) wait
D) pause
Q2) A file containing data or programs belonging to users is known as a(n) ____.
A) symbolic link
B) ordinary file
C) special file
D) named pipe
Q3) To keep track of free and busy pages, Linux uses a system of page tables.
A)True
B)False
Q4) Virtual memory in Linux is managed using a multiple-level table hierarchy, which accommodates both 64- and 32-bit architectures.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above.
Page 18