Posts

Showing posts from May, 2017

ch15 review silberschatz operating systems concepts essentials 2nd ed

Review Questions Section 15.1 15.1 True or False? The Linux kernel and a Linux distribution are the same thing. False 15.2 What are the two types of Linux kernels? Developmental Kernel odd numbers Production Kernel even numbers 15.3 True or False? Linux is public domain software. False Section 15.2 15.4 What are the three main bodies of code in a Linux system? Kernel, system libraries, and system utilities Section 15.3 15.5 What is the benefit of using a kernel module? kernel modules allow a linux system to be set up with a standard minimal kernel without any extra device drivers built in Section 15.4 15.6 True or False? Linux uses a process model similar to UNIX systems. True 15.7 In addition to the fork() system call, what other system call can be used to create a thread in Linux? clone() Section 15.5 15.8 What are the two different types of scheduling algorithms in Linux?  Time-sharing algorithm and real-time priority based algorithm 15.9 What are passwords that al...

ch14 review silberschatz operating systems concepts essentials 2nd ed

Review Questions Section 14.1 14.1 What is the most common technique for security attacks? masquerading 14.2 What are the four levels where security measures must be taken? physical, human, operating system, and network Section 14.2 14.3 Provide examplesof at least three program threats. trojan horse, trap door, logic bomb, stack and buffer overflow, and virus Section 14.3 14.4 Provide examples of at least two system and network threats. worms, port scanning and DDOS Section 14.4 14.5 True or False? Encryption requires possession of a key to read a message. True 14.6 What is the name of the encryption algorithm where the same key is used to encrypt and decrypt? Symmetric Encryption algorithm 14.7 What is the name of a commonly-used cryptographic protocol? SSL Section 14.5 14.8 What is the most common approach for authenticating a user? passwords 14.9 What are passwords that allow the space character are known as? passphrase Section 14.6 14.10 What is the first step of ...

ch13 review silberschatz operating systems concepts essentials 2nd ed

Review Questions Section 13.1 13.1 True or False? Policies determine how something will be done,mechanisms describe what will be done. False Section 13.2 13.2 What principle dictates that programs and users be given just enough privileges to perform their tasks? Principle of Least Privelidge Section 13.3 13.3 True or False? The need-to-know principle states that a process needs to know everything in order to performits task. False the process should be limited to only those resources necessary to perform its task 13.4 True or False? The user mode/kernel mode paradigm is an example of domain switching. True 13.5 True or False? In the UNIX operating system, a domain is associated with a process, not with a specific user. False in unix a domain is associated with a user 13.6 What is the name of the bit in a UNIX system that associates each file with an owner and domain? setuid bit Section 13.4 13.7 What does each row and column representin an access matrix? each row represents a dom...

ch12 review silberschatz operating system concepts essentials 2nd ed

Review Questions Section 12.1 12.1 What are the two conflicting trends of I/O devices? Increased standardization of software and hardware interfaces, and an increasingly broad variety of I/O devices Section 12.2 12.2 What is a controller? A collection of electronics that can operate a port, a bus, or a device 12.3 True or False? Most CPUs allow some interrupts to be ignored so that a critical instruction cannot be interrupted. True Section 12.3 12.4 True or False?A given device may require different drivers for different operating systems. true 12.5 What is an alternative to a nonblocking system call? Asynchronous system call Section 12.4 12.6 List at least three different services provided by the kernel I/O subsystem. Scheduling, Buffering, Caching, Spooling, Device Reservation, and Error Handling Section 12.5 12.7 True or False? The lifecycle of an I/O request does not require many CPU cycles. False Section 12.6 12.8 What operating systemis the STREAMS mechanism designe...

ch11 review silberschatz operating systems concepts essentials 2nd ed

Review Questions Section 11.1 11.1 True or False? Disk blocks are made up of one or more sectors. True 11.2 What is the name of the standard Linux file system? Extended file system (ext3/ext4) 11.3 What is the UNIX term for a file control block? inode Section 11.2 11.4 True or False? UNIX treats a directory exactly the same as a file. True 11.5 What does the acronym VFS refer to? Virtual File system Section 11.3 11.6 What are the two general approaches for implementing a directory? Linear list list of file names with pointers to the data blocks, hash table linear list stores directory entries but a hash data structure is used greatly reducing directory search time Section 11.4 11.7 Provide at least two different approaches for allocating disk blocks to files. contiguous allocation, linked allocation, indexed allocation 11.8 True or False? The UNIX inode is an example of linked allocation. False the unix inode is an example of indexed allocation Section 11.5 11.9 What would the...

ch10 review silberschatz operating systems concepts essentials 2nd ed

Review Questions Section 10.1 10.1 List at least three attributes of a file. Name, Identifier, Type, Location, Size, Protection(access control information), Time, Date, and user Identification 10.2 List at least three operations that made be performed on a file. Create, Write, Read, Reposition within a file(seek), Truncate(erase contents and retain attributes) Section 10.2 10.3 What are the two fundamental ways of accessing a file? sequential access, and direct access Section 10.3 10.4 What is a volume? an entity containing a file system 10.5 What is the most common way of structuring directories? tree-structured directories 10.6 True or False? UNIX systems allow acylic-graph directories. true Section 10.4 10.7 If a mount point is /home and the device jane/programs is mounted on the mount point, what is the complete path name to access the programs directory? /home Section 10.5 10.8 Name one type of remote file system. NFS, CIFS/SMB, WebDAV 10.9 Name one type of distributed inf...

ch9 review silberschatz operating systems concepts essentials 2nd ed

Review Questions Section 9.1 9.1 True or False? Magnetic disks provide the bulk of secondary storage for modern computer systems. True 9.2 True or False? Solid state disks have the same characteristics as traditional hard disks. True Section 9.2 9.3 What is the term for the smallest unit of transfer between a disk? Logical block Section 9.3 9.4 What are the two ways a computer can access disk storage? I/O ports (host-attached storage) and Distributed File Systems (network-attached storage) Section 9.4 9.5 List the three general disk scheduling algorithms.  First come first served, shortest seek time first, SCAN (starts at one and and moves to the other reversing back when it gets to each end), C-SCAN (circular scan instead of reversing it moves from one end to the other then immediately proceeds back to the end it started scanning from), LOOK (works liek can but does not travers the entire disk; look only goes as far as the farthest request) 9.6 What disk scheduling algorithm...

ch8 review Silberchatz operating system concepts essentials 2nd ed

Review Questions Section 8.1 8.1 True or False? A program does not need to be stored in memory in its entirety. True 8.2 True or False? A physical address space is at least as large as a virtual address space. False Section 8.2 8.3 When does a page fault occur? access to a page marked invalid causes a page fault. when this happens the operating system fails to bring the desired page into memory. 8.4 True or False? In a pure demand paged system a page is never brought into memory until it is needed. True Section 8.3 8.5 What system call initiates copy on write? fork() 8.6 True or False? The vfork() system call does not use copy on write.True Section 8.4 8.7 What is the simplest page replacement algorithm? First-in, First-Out 8.8 What is the name of the page replacement algorithm that operates by replacing the page that will not be used for the longest period of time? Optimal Page Replacement algorithm 8.9 What page replacement algorithm could be implemented using a stack or cou...

ch7 review silberschatz operating systems concepts essentials 2nd ed

Review Questions Section 7.1 7.1 What two registers can be used to provide a simple form of memory protection? Relocation register and Limit register 7.2 List the three different times at which address binding may occur. Compile time, Load time, Execution time 7.3 True or False? An address generated by the CPU is also referred to as a physical address. False. An address generated by the CPU is a logical or virtual address, an address in memory is a physical address 7.4 What is the hardware device that maps virtual to physical addresses? Memory Management Unit Section 7.2 7.5 What is the backing store? Fast disk space. A process can be swapped out of memory into a backing store temporarily and then returned to memory for continued execution 7.6 True or False? Mobile systems typicallyuse swapping. False typically mobile systems do not support swapping Section 7.3 7.7 What are the three strategies for selecting a free hole from the set of available holes? First-fit, Best-fit, Worst-...

ch6 review silberschatz operating system concepts essentials 2nd ed

Section 6.1 6.1 What are the two bursts that CPU schedulers are designed around? CPU-burst and IO-burst 6.2 True or False? Under preemptive scheduling, when a process switches from the running to the ready state, it may lose control of the CPU. True Section 6.2 6.3 List at least three different criteria for designing a CPU scheduling algorithm. CPU utilisation, throughput, turnaround time, waiting time, response time Section 6.3 6.4 What scheduling algorithm assigns the CPU to the process with the highest priority? priority scheduling 6.5 True or False? The multilevel feedback queue scheduling algorithm allows processesto migrate between different queues. True 6.6 What scheduling algorithm assigns the CPU to the process that first requested it? First-Come, First-Served 6.7 What scheduling algorithm assigns the CPU to a process for only its time slice (or time quantum?) Round-robin 6.8 What scheduling algorithm assigns the CPU to the process with the shortest burst? Shortest Job ...

ch4 review silberschatz operating systems concepts essentials 2nd ed

Review Questions Section 4.1 4.1 How many threads does a traditional, heavyweight process have? a single thread of control 4.2 Provide at least three benefits of multithreaded programming. responsiveness resource sharing economy and scalability Section 4.2 4.3 True or False? Concurrency is only possible with parallelism. false 4.4 True or False? Amdahl’s Law addresses the disproportionate effect of the serial portion of a program. True 4.5 List at least three challenges when designing programming for multicore systems. identifying tasks balance data splitting data dependency testing and debugging 4.6 What are the two general typesof parallelism? data parallelism and task parallelism Section 4.3 4.7 List the three common ways of mapping user threads to kernel threads. many-to-one one-to-one and many-to-many 4.8 True or False? Only Linux and Windows implement the one-to-one model. True Section 4.4 4.9 What are the two approaches for implementing a thread library? Provide the lib...

ch3 review silberschatz operating systems concepts essentials 2nd ed

Section 3.1 3.1 What are the four components of a process? the stack which contains temporary information such as function parameters return addresses and local variables, the data section which contains global variables, the code or text section, the heap the program counter and contents 3.2 Provide at least three possible states a process may be in. new running waiting ready terminated 3.3 What is a Process Control Block (PCB)? it is the representation within the operating system of a process containing the state of the process the program counter which contains the address of the next instruction to be executed for the process, the cpu registers, the cpu scheduling information, memory management information, accounting information, and IO status information 3.4 What is another term for process? job 3.5 True or False? Most operating systems allow a process to have multiple threads. True Section 3.2 3.6 What is the role of the process scheduler? The process scheduler selects an ...

ch2 review silberschatz operating systems concepts essentials 2nd ed

Review Questions Section 2.1 2.1 List at least three operating system services that are useful to users. User Interface; Program Execution; IO Operations; File-System Manipulation; Communications; Error Detection 2.2 List at least three operating system functions that maintain efficient operation of the system. Resource Allocation; Accounting; Protection and Security Section 2.2 2.3 What are the two different approaches for providing a user interface? Command Interpreter and Graphical User Interface. Section 2.3 2.4 What is a system call? System calls provide an interface to the services made available by an operating system. 2.5 What is an API? An application programming interface specifies a set of functions that are available to an application programmer, including the parameters that are passed to each function and the return values the programmer can expect. 2.6 What kernel data structure can be used for one technique of passing parameters to system calls? Registers Secti...

ch1 review Silberschatz operating systems essentials concepts 2nd ed

Review Questions Section 1.1 1.1 What are the four components of a computer system?a computer system can be divided roughly into four components:the hardware, the operating system, the application programs, and the users. 1.2 Provide at least three resources the operating system allocates.  The hardware -the cpu, the memory,and the input/output devices-provide the basic computing resources for the system. 1.3 What is the common name used to refer to the operating system program? resource allocator 1.4 What do mobile operating systems often include in addition to the core kernel? middleware Section 1.2 1.5 What is an interrupt? a signal sent to the cpu to initiate the execution of a process. 1.6 What special operation triggers a software interrupt? system call 1.7 What is one advantage of using a solid state disk over a magnetic disk? zero moving parts 1.8 What is the difference between volatile and nonvolatile storage? volatile memory loses its contents when there is a loss ...

harrison valetski invites you to Freelancer

Image
harrison valetski wants you to join Freelancer - the world's largest freelancing and crowdsourcing marketplace! I've been using Freelancer.com to make money by completing work - I think you should try it out. Accept Invitation © 2017 Freelancer Technology Pty Limited. All Rights Reserved. Level 20, 680 George Street, Sydney, NSW 2000, Australia Privacy Policy | Terms and Conditions       support@freelancer.com ...