Operating Systems Exam Preparation Guide - 800 Verified Questions

Page 1


Operating Systems

Exam Preparation Guide

Course Introduction

This course provides a comprehensive introduction to the fundamentals of operating systems, focusing on their design, structure, and functionality. Topics covered include process management, memory organization, file systems, storage, concurrency, security, and system calls. Students will explore how operating systems allocate resources, schedule tasks, handle hardware interactions, and ensure system reliability and protection. Through theoretical concepts and practical assignments, students gain hands-on experience with modern operating systems, fostering the skills necessary to understand and troubleshoot complex computer environments.

Recommended Textbook

Understanding Operating Systems 5th Edition by Ann McHoes

Available Study Resources on Quizplus

16 Chapters

800 Verified Questions

800 Flashcards

Source URL: https://quizplus.com/study-set/1171

Page 2

Chapter 1: Introducing Operating Systems

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/23179

Sample Questions

Q1) When the Processor Manager receives a command, it determines whether the program must be retrieved from storage or is already in memory, and then notifies the appropriate manager.

A)True

B)False

Answer: True

Q2) ____ systems are used in time-critical environments where reliability is key and data must be processed within a strict time limit.

A) Embedded

B) Hybrid

C) Interactive

D) Real-time

Answer: D

Q3) The Intel 4004 chip in 1971 had 2,300 transistors while the Pentium II chip twenty years later had 7.5 million, and the Pentium 4 Extreme Edition processor introduced in 2004 had 178 trillion transistors.

A)True

B)False

Answer: False

To view all questions and flashcards with answers, click on the resource link above.

Page 3

Chapter 2: Memory Management: Early Systems

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/23180

Sample Questions

Q1) The following algorithm can be described as ____. 1 Set counter to 1

2 Do while counter <= number of blocks in memory

If job_size > memory_size(counter)

Then counter = counter + 1

Else

Load job into memory_size(counter)

Adjust free/busy memory lists

Go to step 4

End do

3 Put job in waiting queue

4 Go fetch next job

A) first-fit memory allocation

B) best-fit memory allocation

C) least-fit memory allocation

D) fixed partition memory allocation

Answer: A

Q2) A large job can have problems with a first-fit memory allocation list.

A)True

B)False

Answer: True

To view all questions and flashcards with answers, click on the resource link above.

Page 4

Chapter 3: Memory Management: Virtual Memory

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/23181

Sample Questions

Q1) With demand paging, jobs are divided into equally sized ____ that initially reside in secondary storage.

A) pages

B) blocks

C) frames

D) sets

Answer: A

Q2) A page size that is too small will generate ____.

A) very long PMTs

B) excessive internal fragmentation

C) more difficult to calculate actual position

D) excessive external fragmentation

Answer: A

Q3) The primary advantage of storing programs in noncontiguous locations is that ____.

A) multiple programs can run at the same time

B) every program will be able to run

C) secondary storage is accessed more quickly

D) main memory is used more efficiently

Answer: D

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Processor Management

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/23182

Sample Questions

Q1) The Process Scheduler often uses a timing mechanism and periodically interrupts running processes when a predetermined slice of time has expired.

A)True

B)False

Q2) The ____ is also called the high-level scheduler.

A) Process Scheduler

B) Job Scheduler

C) Program Scheduler

D) Thread Scheduler

Q3) First-come, first-served (FCFS) is a preemptive scheduling algorithm that handles jobs according to their arrival time.

A)True

B)False

Q4) The Processor Manager is a composite of two submanagers: one in charge of job scheduling and the other in charge of program scheduling.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above.

6

Chapter 5: Process Management

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/23183

Sample Questions

Q1) A livelock is caused by two processes accessing different areas of the same disk.

A)True

B)False

Q2) Fill in the missing event that causes deadlock in a database. There are two processes (P1 and P2), each of which needs to update two records (R1 and R2) and the following sequence leads to a deadlock: 1. P1 accesses R1 and locks it.

2) P2 accesses R2 and locks it.

3) ____

4) P2 requests R1, which is locked by P1.

A) P2 releases R2.

B) P1 requests R1 again.

C) P1 requests R2, which is locked by P2.

D) P2 releases R1.

Q3) ____ allows a resource to be held by a process as long as it is needed.

A) No preemption

B) Circular wait

C) Resource holding

D) Mutual exclusion

To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Concurrent Processes

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/23184

Sample Questions

Q1) Threads share the same resources as the process that created them.

A)True

B)False

Q2) When a computer evaluates the expression A = 3 * B * C + 4 / (D + E) ** (F - G), in a sequential manner, ____ is evaluated as a first step.

A) F - G

B) 3 * B

C) C + 4

D) B * C

Q3) The success of process synchronization hinges on the capability of the operating system to make a resource available to other processes while it is being used by one of them.

A)True

B)False

Q4) The problem of masters and slaves arises when two types of processes need to access a shared resource such as a file or database.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Device Management

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/23185

Sample Questions

Q1) ____ bits make up the Channel Status Word (CSW) flag.

A) Two

B) Three

C) Four

D) Five

Q2) To write data to flash memory, an electric charge is sent through one transistor, called the ____, then through a metal oxide layer, and into a second transistor called the control gate where the charge is stored in a cell until it's erased.

A) parallel port

B) floating gate

C) pit

D) crystalline port

Q3) Each unit in the I/O subsystem can finish its operation independently from the others.

A)True

B)False

Q4) A fixed-head disk is lower in cost than a movable head disk.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: File Management

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/23186

Sample Questions

Q1) Without the File Manager, every program would need to include instructions to operate all of the different types of devices, and all of the different models within each type.

A)True

B)False

Q2) When someone creates a folder, the system creates a subdirectory in the current directory or folder.

A)True

B)False

Q3) For every file request, the ____ is the point of entry.

A) file location

B) volume location

C) subdirectory

D) MFD

Q4) Data in a fixed-length field might include a short name followed by many blank characters; it can be replaced with a variable-length field and a special code to indicate how many blanks were truncated.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Network Organization Concepts

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/23187

Sample Questions

Q1) Ethernet is the most widely known CSMA/CD protocol.

A)True

B)False

Q2) Usually, the term "____" indicates a specific location in a network containing one or more computer systems.

A) site

B) host

C) node

D) remote

Q3) High-speed LANs have a data rate that varies from 100 megabits per second to more than ____ per second.

A) 1000 megabits

B) 20 gigabits

C) 40 gigabits

D) 100 gigabits

Q4) The maximum circumference for a MAN is ____.

A) 10 miles

B) 50 kilometers

C) 100 kilometers

D) 200 miles

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Management of Network Functions

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/23188

Sample Questions

Q1) The main function of a DO/S File Manager is to ____.

A) gather remote files into a single location

B) pass requests to local File Managers

C) provide transparent mechanisms to work with files

D) provide security to distributed files

Q2) The focus of a NOS is ____.

A) providing security

B) managing users

C) sharing resources

D) running programs

Q3) In response to the Write command, the File Manager sends a command to the remote server to unlock the specified file.

A)True

B)False

Q4) Data redundancy can make files much faster and easier to read.

A)True

B)False

Q5) All devices are controlled by a global device manager under a DO/S.

A)True

B)False

Page 12

To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: Security and Ethics

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/23189

Sample Questions

Q1) Errors can occur when data values are incorrectly stored because the field isn't large enough to hold the numeric value stored there; this is an example of a(n) ____.

A) unintentional intrusion

B) malicious attack

C) denial-of-service attack

D) trap door attack

Q2) Public/private key encryption relies on the fact that there is no known formula for factoring large numbers greater than ____ digits.

A) 75

B) 80

C) 110

D) 150

Q3) A ____ server hides important network information from outsiders by making the network server invisible.

A) redirection

B) blocking

C) proxy

D) fire

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: System Management

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/23190

Sample Questions

Q1) The Network Manager allows a network administrator to monitor the use of individual computers and shared hardware, and ensure compliance with software license agreements.

A)True

B)False

Q2) Deployment software falls into two groups: ____.

A) structured and unstructured

B) secure and insecure

C) automatic and manual

D) agent-based and agentless

Q3) A disadvantage of software monitoring tools over hardware monitoring tools is ____.

A) They are more difficult to install.

B) They become part of the system can therefore distort the results of the analysis.

C) They are more expensive.

D) They are not secure.

Q4) Blocking increases the number of physical I/O requests.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 13: Unix Operating System

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/23191

Sample Questions

Q1) UNIX is designed to ensure device dependence to the applications running under it.

A)True

B)False

Q2) Swapping uses a round robin policy.

A)True

B)False

Q3) UNIX uses a ____ to keep track of which processes are using which program code, and the memory is not released until the program code is no longer needed.

A) pointer

B) text table

C) binary file

D) database

Q4) The following command ____ will store the names of all users logged on to the system in the file called temporary.

A) ls user temporary

B) who > temporary

C) users > temporary

D) view users temporary

To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 14: Ms-Dos Operating System

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/23192

Sample Questions

Q1) An interrupt vector specifies where the interrupt handler program for a specific interrupt type is located.

A)True

B)False

Q2) ____ is usually very small in size and contains a program, a section of BIOS, with the sole task of starting up the system.

A) REM

B) Bootstrapping

C) RAM

D) ROM

Q3) BIOS is stored in ____.

A) ROM only

B) RAM only

C) ROM and RAM

D) CMOS

Q4) Each subdirectory can contain its own subdirectories and/or files.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 16

Chapter 15: Windows Operating Systems

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/23193

Sample Questions

Q1) A thread is the entity within a process that the ____ schedules for execution.

A) thread manager

B) thread scheduler

C) process scheduler

D) kernel

Q2) Active Directory groups machines into administrative units called ____.

A) domains

B) sites

C) networks

D) nodes

Q3) The primary programming interface for Windows is ____.

A) Win32 API

B) MS-DOS

C) POSIX

D) CDFS

Q4) The Open Mode attribute for a file indicates whether other callers can open the file for read, write, or delete operations while this caller is using it.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 17

Chapter 16: Linux Operating System

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/23194

Sample Questions

Q1) The Fedora Project issues updates free to the public about every ____ months.

A) two

B) four

C) six

D) eight

Q2) Device drivers supervise the transmission of data between main memory and the local unit.

A)True

B)False

Q3) Linux is an open-source program.

A)True

B)False

Q4) Filenames can include a space, however this can cause complications if you're running programs from the command line because a program named interview notes would be viewed as a command to run two files: interview and notes.

A)True

B)False

Q5) Virtual memory is implemented in Linux through demand paging.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 18

Turn static files into dynamic content formats.

Create a flipbook