ch15 review silberschatz operating systems concepts essentials 2nd ed
Review Questions
Section 15.1
15.1 True or False? The Linux kernel and a Linux distribution are the same thing. False
15.2 What are the two types of Linux kernels? Developmental Kernel odd numbers Production Kernel even numbers
15.3 True or False? Linux is public domain software. False
Section 15.2
15.4 What are the three main bodies of code in a Linux system? Kernel, system libraries, and system utilities
Section 15.3
15.5 What is the benefit of using a kernel module? kernel modules allow a linux system to be set up with a standard minimal kernel without any extra device drivers built in
Section 15.4
15.6 True or False? Linux uses a process model similar to UNIX systems. True
15.7 In addition to the fork() system call, what other system call can be used to create a thread in Linux? clone()
Section 15.5
15.8 What are the two different types of scheduling algorithms in Linux? Time-sharing algorithm and real-time priority based algorithm
15.9 What are passwords that allow the space character are known as? passphrase
Section 15.6
15.10 What is the term for the four different regions how Linux separates physical memory? ZONE_DMA, ZONE_DMA32, ZONE_NORMAL, ZONE_HIGHMEM
15.11 True or False? Zones are hardware neutral. False, zones are architecture specific
Chapter 15 The Linux System
15.12 In addition to a.out, what other file format does Linux use for representing binary files? ELF format
Section 15.7
15.13 What is the layer of software that Linux uses to hide implementation details of a specific file system? virtual file system
15.14 What is the name of the Linux process file system? /proc
Section 15.8
15.15 What are the three classes of devicesin a Linux system? block devices, character devices, network devices
Section 15.9
15.16 What is the standard mechanism for informing a process an event has occurred? signal
Section 15.10
15.17 What are the three layers of software that implement networking in the Linux kernel? the socket interface, protocol drivers and network-device drivers
Section 15.11
15.18 What are the two groups for classifying Linux security? authentication and access control
Section 15.1
15.1 True or False? The Linux kernel and a Linux distribution are the same thing. False
15.2 What are the two types of Linux kernels? Developmental Kernel odd numbers Production Kernel even numbers
15.3 True or False? Linux is public domain software. False
Section 15.2
15.4 What are the three main bodies of code in a Linux system? Kernel, system libraries, and system utilities
Section 15.3
15.5 What is the benefit of using a kernel module? kernel modules allow a linux system to be set up with a standard minimal kernel without any extra device drivers built in
Section 15.4
15.6 True or False? Linux uses a process model similar to UNIX systems. True
15.7 In addition to the fork() system call, what other system call can be used to create a thread in Linux? clone()
Section 15.5
15.8 What are the two different types of scheduling algorithms in Linux? Time-sharing algorithm and real-time priority based algorithm
15.9 What are passwords that allow the space character are known as? passphrase
Section 15.6
15.10 What is the term for the four different regions how Linux separates physical memory? ZONE_DMA, ZONE_DMA32, ZONE_NORMAL, ZONE_HIGHMEM
15.11 True or False? Zones are hardware neutral. False, zones are architecture specific
Chapter 15 The Linux System
15.12 In addition to a.out, what other file format does Linux use for representing binary files? ELF format
Section 15.7
15.13 What is the layer of software that Linux uses to hide implementation details of a specific file system? virtual file system
15.14 What is the name of the Linux process file system? /proc
Section 15.8
15.15 What are the three classes of devicesin a Linux system? block devices, character devices, network devices
Section 15.9
15.16 What is the standard mechanism for informing a process an event has occurred? signal
Section 15.10
15.17 What are the three layers of software that implement networking in the Linux kernel? the socket interface, protocol drivers and network-device drivers
Section 15.11
15.18 What are the two groups for classifying Linux security? authentication and access control