

Operating Systems
Exam Preparation Guide
Course Introduction
This course provides a comprehensive introduction to the fundamentals of operating systems, focusing on their design, structure, and functionality. Topics covered include process management, memory organization, file systems, storage, concurrency, security, and system calls. Students will explore how operating systems allocate resources, schedule tasks, handle hardware interactions, and ensure system reliability and protection. Through theoretical concepts and practical assignments, students gain hands-on experience with modern operating systems, fostering the skills necessary to understand and troubleshoot complex computer environments.
Recommended Textbook
Understanding Operating Systems 5th Edition by Ann McHoes
Available Study Resources on Quizplus
16 Chapters
800 Verified Questions
800 Flashcards
Source URL: https://quizplus.com/study-set/1171

Page 2

Chapter 1: Introducing Operating Systems
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/23179
Sample Questions
Q1) When the Processor Manager receives a command, it determines whether the program must be retrieved from storage or is already in memory, and then notifies the appropriate manager.
A)True
B)False
Answer: True
Q2) ____ systems are used in time-critical environments where reliability is key and data must be processed within a strict time limit.
A) Embedded
B) Hybrid
C) Interactive
D) Real-time
Answer: D
Q3) The Intel 4004 chip in 1971 had 2,300 transistors while the Pentium II chip twenty years later had 7.5 million, and the Pentium 4 Extreme Edition processor introduced in 2004 had 178 trillion transistors.
A)True
B)False
Answer: False
To view all questions and flashcards with answers, click on the resource link above.
Page 3

Chapter 2: Memory Management: Early Systems
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/23180
Sample Questions
Q1) The following algorithm can be described as ____. 1 Set counter to 1
2 Do while counter <= number of blocks in memory
If job_size > memory_size(counter)
Then counter = counter + 1
Else
Load job into memory_size(counter)
Adjust free/busy memory lists
Go to step 4
End do
3 Put job in waiting queue
4 Go fetch next job
A) first-fit memory allocation
B) best-fit memory allocation
C) least-fit memory allocation
D) fixed partition memory allocation
Answer: A
Q2) A large job can have problems with a first-fit memory allocation list.
A)True
B)False
Answer: True
To view all questions and flashcards with answers, click on the resource link above.
Page 4

Chapter 3: Memory Management: Virtual Memory
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/23181
Sample Questions
Q1) With demand paging, jobs are divided into equally sized ____ that initially reside in secondary storage.
A) pages
B) blocks
C) frames
D) sets
Answer: A
Q2) A page size that is too small will generate ____.
A) very long PMTs
B) excessive internal fragmentation
C) more difficult to calculate actual position
D) excessive external fragmentation
Answer: A
Q3) The primary advantage of storing programs in noncontiguous locations is that ____.
A) multiple programs can run at the same time
B) every program will be able to run
C) secondary storage is accessed more quickly
D) main memory is used more efficiently
Answer: D
To view all questions and flashcards with answers, click on the resource link above. Page 5
Chapter 4: Processor Management
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/23182
Sample Questions
Q1) The Process Scheduler often uses a timing mechanism and periodically interrupts running processes when a predetermined slice of time has expired.
A)True
B)False
Q2) The ____ is also called the high-level scheduler.
A) Process Scheduler
B) Job Scheduler
C) Program Scheduler
D) Thread Scheduler
Q3) First-come, first-served (FCFS) is a preemptive scheduling algorithm that handles jobs according to their arrival time.
A)True
B)False
Q4) The Processor Manager is a composite of two submanagers: one in charge of job scheduling and the other in charge of program scheduling.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above.

6

Chapter 5: Process Management
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/23183
Sample Questions
Q1) A livelock is caused by two processes accessing different areas of the same disk.
A)True
B)False
Q2) Fill in the missing event that causes deadlock in a database. There are two processes (P1 and P2), each of which needs to update two records (R1 and R2) and the following sequence leads to a deadlock: 1. P1 accesses R1 and locks it.
2) P2 accesses R2 and locks it.
3) ____
4) P2 requests R1, which is locked by P1.
A) P2 releases R2.
B) P1 requests R1 again.
C) P1 requests R2, which is locked by P2.
D) P2 releases R1.
Q3) ____ allows a resource to be held by a process as long as it is needed.
A) No preemption
B) Circular wait
C) Resource holding
D) Mutual exclusion
To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Concurrent Processes
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/23184
Sample Questions
Q1) Threads share the same resources as the process that created them.
A)True
B)False
Q2) When a computer evaluates the expression A = 3 * B * C + 4 / (D + E) ** (F - G), in a sequential manner, ____ is evaluated as a first step.
A) F - G
B) 3 * B
C) C + 4
D) B * C
Q3) The success of process synchronization hinges on the capability of the operating system to make a resource available to other processes while it is being used by one of them.
A)True
B)False
Q4) The problem of masters and slaves arises when two types of processes need to access a shared resource such as a file or database.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Device Management
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/23185
Sample Questions
Q1) ____ bits make up the Channel Status Word (CSW) flag.
A) Two
B) Three
C) Four
D) Five
Q2) To write data to flash memory, an electric charge is sent through one transistor, called the ____, then through a metal oxide layer, and into a second transistor called the control gate where the charge is stored in a cell until it's erased.
A) parallel port
B) floating gate
C) pit
D) crystalline port
Q3) Each unit in the I/O subsystem can finish its operation independently from the others.
A)True
B)False
Q4) A fixed-head disk is lower in cost than a movable head disk.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: File Management
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/23186
Sample Questions
Q1) Without the File Manager, every program would need to include instructions to operate all of the different types of devices, and all of the different models within each type.
A)True
B)False
Q2) When someone creates a folder, the system creates a subdirectory in the current directory or folder.
A)True
B)False
Q3) For every file request, the ____ is the point of entry.
A) file location
B) volume location
C) subdirectory
D) MFD
Q4) Data in a fixed-length field might include a short name followed by many blank characters; it can be replaced with a variable-length field and a special code to indicate how many blanks were truncated.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Network Organization Concepts
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/23187
Sample Questions
Q1) Ethernet is the most widely known CSMA/CD protocol.
A)True
B)False
Q2) Usually, the term "____" indicates a specific location in a network containing one or more computer systems.
A) site
B) host
C) node
D) remote
Q3) High-speed LANs have a data rate that varies from 100 megabits per second to more than ____ per second.
A) 1000 megabits
B) 20 gigabits
C) 40 gigabits
D) 100 gigabits
Q4) The maximum circumference for a MAN is ____.
A) 10 miles
B) 50 kilometers
C) 100 kilometers
D) 200 miles
To view all questions and flashcards with answers, click on the resource link above. Page 11
Chapter 10: Management of Network Functions
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/23188
Sample Questions
Q1) The main function of a DO/S File Manager is to ____.
A) gather remote files into a single location
B) pass requests to local File Managers
C) provide transparent mechanisms to work with files
D) provide security to distributed files
Q2) The focus of a NOS is ____.
A) providing security
B) managing users
C) sharing resources
D) running programs
Q3) In response to the Write command, the File Manager sends a command to the remote server to unlock the specified file.
A)True
B)False
Q4) Data redundancy can make files much faster and easier to read.
A)True
B)False
Q5) All devices are controlled by a global device manager under a DO/S.
A)True
B)False

Page 12
To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: Security and Ethics
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/23189
Sample Questions
Q1) Errors can occur when data values are incorrectly stored because the field isn't large enough to hold the numeric value stored there; this is an example of a(n) ____.
A) unintentional intrusion
B) malicious attack
C) denial-of-service attack
D) trap door attack
Q2) Public/private key encryption relies on the fact that there is no known formula for factoring large numbers greater than ____ digits.
A) 75
B) 80
C) 110
D) 150
Q3) A ____ server hides important network information from outsiders by making the network server invisible.
A) redirection
B) blocking
C) proxy
D) fire
To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: System Management
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/23190
Sample Questions
Q1) The Network Manager allows a network administrator to monitor the use of individual computers and shared hardware, and ensure compliance with software license agreements.
A)True
B)False
Q2) Deployment software falls into two groups: ____.
A) structured and unstructured
B) secure and insecure
C) automatic and manual
D) agent-based and agentless
Q3) A disadvantage of software monitoring tools over hardware monitoring tools is ____.
A) They are more difficult to install.
B) They become part of the system can therefore distort the results of the analysis.
C) They are more expensive.
D) They are not secure.
Q4) Blocking increases the number of physical I/O requests.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 13: Unix Operating System
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/23191
Sample Questions
Q1) UNIX is designed to ensure device dependence to the applications running under it.
A)True
B)False
Q2) Swapping uses a round robin policy.
A)True
B)False
Q3) UNIX uses a ____ to keep track of which processes are using which program code, and the memory is not released until the program code is no longer needed.
A) pointer
B) text table
C) binary file
D) database
Q4) The following command ____ will store the names of all users logged on to the system in the file called temporary.
A) ls user temporary
B) who > temporary
C) users > temporary
D) view users temporary
To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 14: Ms-Dos Operating System
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/23192
Sample Questions
Q1) An interrupt vector specifies where the interrupt handler program for a specific interrupt type is located.
A)True
B)False
Q2) ____ is usually very small in size and contains a program, a section of BIOS, with the sole task of starting up the system.
A) REM
B) Bootstrapping
C) RAM
D) ROM
Q3) BIOS is stored in ____.
A) ROM only
B) RAM only
C) ROM and RAM
D) CMOS
Q4) Each subdirectory can contain its own subdirectories and/or files.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 16

Chapter 15: Windows Operating Systems
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/23193
Sample Questions
Q1) A thread is the entity within a process that the ____ schedules for execution.
A) thread manager
B) thread scheduler
C) process scheduler
D) kernel
Q2) Active Directory groups machines into administrative units called ____.
A) domains
B) sites
C) networks
D) nodes
Q3) The primary programming interface for Windows is ____.
A) Win32 API
B) MS-DOS
C) POSIX
D) CDFS
Q4) The Open Mode attribute for a file indicates whether other callers can open the file for read, write, or delete operations while this caller is using it.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 17

Chapter 16: Linux Operating System
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/23194
Sample Questions
Q1) The Fedora Project issues updates free to the public about every ____ months.
A) two
B) four
C) six
D) eight
Q2) Device drivers supervise the transmission of data between main memory and the local unit.
A)True
B)False
Q3) Linux is an open-source program.
A)True
B)False
Q4) Filenames can include a space, however this can cause complications if you're running programs from the command line because a program named interview notes would be viewed as a command to run two files: interview and notes.
A)True
B)False
Q5) Virtual memory is implemented in Linux through demand paging.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 18