advancedOS_bank_midterm
|
|
Title of test:
![]() advancedOS_bank_midterm Description: A+ ان شاء الله |



| New Comment |
|---|
NO RECORDS |
|
The only tangible benefit of parallel processing systems is faster processing. True. False. Parallel processing is a situation in which two or more processors operate in one system at the same time and may or may not work on related activities. True. False. When multiprocessing takes place at the thread level, a high degree of synchronization is required to disassemble each process. True. False. The master/slave configuration is a symmetric multiprocessing system. True. False. In a master/slave system, the master processor is responsible for managing the entire system—all files, devices, memory, and processors. True. False. The loosely coupled multiprocessing configuration features several complete computer systems, each with its own memory, I/O devices, CPU, and operating system. True. False. In a loosely coupled system, a job may move from one processor to another during execution. True. False. The success of process synchronization hinges on the capability of the operating system to make a resource available to other processes while it is being used by one of them. True. False. The common element in all synchronization schemes is to allow a process to finish work on a critical region of the program before other processes have access to it. True. False. Test-and-set is a single indivisible machine instruction. In a single machine cycle, it tests to see if a key is available and, if it is, sets it to unavailable. True. False. The primary disadvantage of the WAIT and SIGNAL operation set is that it does not address busy waiting. True. False. The two operations that can be performed on a semaphore variable are select and increment (P and V). True. False. In parallel computations, mutual exclusion is achieved automatically because each operation is handled in order, one at a time. True. False. The classic problem of producers and consumers is one in which one or more processes produce some data that one or more processes consume later. True. False. Multiprocessing can refer to one job using several processors to execute sets of instructions in parallel. True. False. When a programmer indicates in the code which instructions can be executed in parallel in a program (for example, using COBEGIN and COEND), it is called implicit parallelism. True. False. Each active thread in a process has its own processor registers, data area, and resources. True. False. Early programming languages did not support the creation of threads or the existence of concurrent processes. The Ada programming language was one of the first to do so. True. False. Java uses both a compiler and an interpreter. True. False. Java technology is used for many Web and Internet applications, and it integrates well with browsers that can run Java applets with audio, video, and animation directly in a Web page. True. False. The ____ multiprocessing configuration is an asymmetric system. loosely coupled. master processors. start/end. master/slave. The ____ multiprocessing configuration features several complete computer systems, each with its own memory, I/O devices, CPU, and operating system. loosely coupled. master/slave. symmetric. synchronized. The ____ multiprocessing configuration is the most difficult to implement because the processes must be well synchronized to avoid races and deadlocks. master/slave. loosely coupled. symmetric. shared load. A ____ of processing must be handled as a single unit. line. segment. critical region. semaphore. Lock and key synchronization must take place within a single ____. instruction. computer. processor. machine cycle. A problem with test-and-set is that when many processes are waiting to enter a critical region, ____ can occur because the processes gain access in an arbitrary fashion. starvation. synchronization. deadlock. an error. When using the WAIT and SIGNAL operations, ____ sets the process’s process control block to the blocked state and links it to the queue of processes waiting to enter this particular critical region. TS. SIGNAL. WAIT. BLOCK. The two operations defined by Dijkstra to be performed on a semaphore are ____. P and V. WAIT and SIGNAL. test and set. check and update. The operation P in a semaphore scheme requires a(n) ____ sequence to be performed as an indivisible action in a single machine cycle. test, fetch, increment, and store. test, fetch, decrement, and store. increment and store. decrement and store. What is the name traditionally given to a semaphore that enforces the concept of mutual exclusion?. synch. flag. mutex. signal. ____ semaphores are used in the producer and consumer problem. One. Two. Three. Four. ____ proposed a solution to the readers and writers problem that did not result in starvation for readers or writers. Hoare. Courtois. Heymans. Parnas. ____ semaphores are used in the solution to the readers and writers problem that does not involve starvation. Zero. One. Two. Three. When a compiler automatically detects instructions that can be performed in parallel, ____ is in place. automatic parallelism. array parallelism. explicit parallelism. implicit parallelism. A computer system that can support jobs that use multiple processors to execute sets of instructions in parallel is referred to as a ____ system. concurrent processing. process synchronization. parallel extraction. processing optimization. In general, parallel systems can be put into two broad categories: ____ level parallelism and instruction level parallelism. resource. register. data. task. In its simplest form, Amdahl’s Law maintains that if a given program would take one hour to run to completion with one processor, but 80 percent of the program had to run sequentially (and therefore could not be sped up by applying additional processors to it), then a resulting parallel program would run only a maximum of ____ percent faster. 5. 10. 20. 25. Most current operating systems support the implementation of threads, or ____, which have become part of numerous application packages. parallel processes. lightweight processes. heavyweight processes. semaphores. The source code of a Java program is first compiled into an intermediate language called Java ____, which are platform-independent. beans. nibs. bits. bytecodes. The Java ____ class is a collection of methods used to start, run, stop, and check the status of a thread. thread. multiprocessing. distributed. concurrency. A field is a group of related records that can be identified by the user with a name, type, and size. True. False. Directories are special files that contain listings of filenames and their attributes. True. False. The File Manager responds to the CREATE command by creating a new file. True. False. If the File Manager is required to provide detailed instructions for each system device (how to start it, get it to move to the correct place where the desired record is located, and when to stop), then the program is considered device dependent. True. False. A volume must contain a single file. True. False. A subdirectory is created when a user opens an account to access the computer system. True. False. In a file directory tree structure, the “leaves” of the tree are subdirectories created by the user. True. False. A relative filename is a name that is selected by the File Manager when the file is created. True. False. A file extension is usually two to four characters in length and is separated from the relative name by a period. True. False. When a user gives a command to modify the contents of a file, it’s actually a command to access folders within the file. True. False. Within a file, variable-length records are easier to access directly than fixed-length records. True. False. Sequential record organization is by far the easiest to implement because records are stored and retrieved serially, one after the other. True. False. An indexed sequential file does not have overflow areas. True. False. When using a contiguous file storage scheme, the File Manager keeps track of empty storage areas by treating them as files. True. False. Although noncontiguous allocation schemes eliminate external storage fragmentation and the need for compaction, they don’t support direct access because there’s no easy way to determine the exact location of a specific record. True. False. Files cannot be converted from sequential to direct or vice versa. True. False. Many systems force users to have their files organized for fixed-length records if the records are to be accessed directly. True. False. In a file management system, information is passed from the Device Manager at the top of the hierarchy to the File Manager at the bottom. True. False. To support text compression, data in a fixed-length field that includes a short name followed by many blank characters can be replaced with a variable-length field and a special code to indicate how many blanks were truncated. True. False. A compressed image file can be reconstructed if a lossy compression algorithm is used because the compression process is reversible. True. False. The computer system ____ a file by activating the appropriate secondary storage device and loading the file into memory while updating its records of who is using that file. creates. formats. allocates. configures. ____ are special files with listings of filenames and their attributes. Databases. Directories. Programs. Data files. Each volume in a system has a volume descriptor followed by a ____ that lists the names and characteristics of every file contained in that volume. file location. volume directory. subdirectory. master file directory. Many computer users and some operating systems call subdirectories ____. folders. files. volumes. databases. Although a user directory is treated as a file, it is flagged to indicate to the File Manager that this file is really a ____ whose records are filenames that point to files. database. volume. subdirectory. master file directory. A file’s ____ filename includes all path information for that file. extended. absolute. relative. long-form. A(n) ____ filename is the name that differentiates a file from other files in the same directory. absolute. relative. short-form. directory. A UNIX or Linux system might identify a file as: /usr/imfst/flynn/inventory.doc. The first entry is a forward slash ( / ) representing the master directory, called the ____ directory. root. main. branch. working. As long as users refer to files in the ____ directory, they can access the files without entering the absolute filename. root. main. home. working. When data is stored in fixed length fields, data that extends beyond the fixed size ____. generates an operating system error. is truncated. is broken up and stored in more than one field. combines multiple fields to accommodate the data. On magnetic disks, files can be organized in one of three ways: ____. indexed direct, indexed indirect, or random. sequential, indirect, or direct. sequential, random, or indirect. sequential, direct, or indexed sequential. In a direct record organization scheme, the program used to store the data follows a set of instructions, called a ____ algorithm, that transforms each key into a number, the record’s logical address. hashing. grouping. translation. lookup. When using indexed sequential record organization, each entry in the index file contains the ____ and the physical location of the data block where this record, and the records with smaller keys, are stored. last record name. highest record key. lowest record key. first record name. The primary disadvantage of contiguous storage is that ____. the file system is difficult to create, implement, and manage. a file can be spread in small pieces throughout the storage area. a file can’t be expanded unless there is empty space available immediately following it. the file system cannot support direct access. ____ storage allocation allows files to use any storage space available on the disk. Contiguous. Noncontiguous. Fragmented. Extended. In noncontiguous storage, one way to link file extents is at the storage level where each extent points to the ____. current subdirectory. next file in the sequence. master directory entry. next extent in the sequence. In indexed storage, when a file is created, the pointers in the index block are all set to ____. the end of the volume. the beginning of the volume. null. zero. The formula for computing the current byte address (CBA) for a direct access file with fixed record length is ____. CBA = (RN – 1) * RL. CBA = RN * RL. CBA = RN / RL. CBA = (RN + 1) * RL. A(n) ____ contains a list of files, each of which is associated with the names of users who are allowed to access it and the type of access each user is permitted. access control matrix. access control list. capability list. capability matrix. ____ text compression builds on the previous data element. The first data element in a list is not compressed but each entry after that takes a given number of characters from the previous entry that they have in common and then adds the characters that make it unique. Repeated-terms. Front-end. Repeated-characters. Lossy. |





