Operating Systems

Is this your test? Login to manage it. If not, you can generate a test just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Ch 14. In a Unix system, ____ defines what the user’s privileges are on the network and is closely associated to the files of the owner.
2.
1 point
Ch 1. What networking system has each network member both a client and a server?
3.
1 point
Ch 11. What must happen to a file system before it can be accessed?
4.
1 point
Ch 14. If a process in Domain D(i) tries to do "anOperation" on object O(j), then what must be in the access matrix?
5.
1 point
Ch 12. What allocation strategy is best for databases (which read and write to and from files very often)?
6.
1 point
Ch 8. The memory address seen by the memory unit (loaded into the memory-address register) is call the ________
7.
1 point
Ch 8. The processes on disk that are waiting to be brought into memory for execution form the _________
8.
1 point
Ch 11. The close() operation:
9.
1 point
Ch 3. What kinds of program listed below is an example of time-shared systems?
10.
1 point
Ch 11. LDAP stands for:
11.
1 point
Ch 14. The ability to execute an operation on an object is called what?
12.
1 point
Ch 2. Which of the following is NOT a Type of System Call:
13.
1 point
Ch 6. Which one of these is NOT part of the scheduling criteria characteristics?
14.
1 point
Ch 11. Which one is a type of a file operations?
15.
1 point
Ch 1. What is the main requirement for secondary storage?
16.
1 point
Ch 12. Can free space have data in it? Why?
17.
1 point
Ch 14. What is a collection of access rights, each of which is an ordered pair ?
18.
1 point
Ch 5. A memory transaction is:
19.
1 point
Ch 11. Which one is a type is a word processor file extension?
20.
1 point
Ch 11. A write pointer is:
21.
1 point
Ch 12. When would linear lists be better than hash tables when implementing a directory?
22.
1 point
Ch 2. When designing and Implementing an Operating Systems, which is NOT a User Goal:
23.
1 point
Ch 8. Page offset combined with the base address to define the physical memory address sent to the _______.
24.
1 point
Ch 8. Another name for associative memory is?
25.
1 point
Ch 5. What can protect against race conditions?
26.
1 point
Ch 1. Which of the following refers to a system that has two or more processors working together?
27.
1 point
Ch 5. What three requirements must be satisfied by a solution to the critical section problem?
28.
1 point
Ch 1. When a computer starts what initial prgram needs to run?
29.
1 point
Ch 3. Which UNIX commands are examples of a system call which can create a new process?
30.
1 point
Ch 15. Which of the following is considered a Program Threat to computers?
31.
1 point
Ch 6. Which of the following is not a circumstance in which preemptive CPU-scheduling may take place?
32.
1 point
Ch 8. Base register contains value of ________ physical address?
33.
1 point
Ch 14. What is one of the significant advantages of a complier based enforcement?
34.
1 point
Ch 15. Which of the following is NOT component(s) of an encryption algorithm?
35.
1 point
Ch 2. CLI, and API stand for:
36.
1 point
Ch 5. What are some ways that Operating Systems like Windows, Linux and Solaris provide support for process synchronization?
37.
1 point
Ch 10. How does SSTF algorithm work?
38.
1 point
Ch 3. What is the order of the 5 states of a process executing?
39.
1 point
Ch 14. What do the rows of the access matrix represent, and what do the columns represent?
40.
1 point
Ch 8. What best describes the Worst-Fit memory allocation strategy?
41.
1 point
Ch 1. Which of the following is not part of computer hardware?
42.
1 point
Ch 1. What is the perpose of a cache?
43.
1 point
Ch 11. Consistency semantics specify:
44.
1 point
Ch 14. In an access matrix, each row represents:
45.
1 point
Ch 15. Which of the following can protect computers from virus?
46.
1 point
Ch 14. How to implement an access matrix?
47.
1 point
Ch 6. What is the order of priority for a multilevel queue scheduling algorithm?
48.
1 point
Ch 11. Which of the following is NOT a file attribute:
49.
1 point
ch 14. In an access matrix, each column represents:
50.
1 point
Ch 11. Which one is a type of a file attributes?