11. In a combined paging/segmentation system, a user’s address space is broken up into a number of: a. Segments or pages, at the discretion of the programmer
b. Fixed-size pages, which are in turn broken down into variable-sized segments
c. Variable-sized Segments, which are in turn broken down into fixed-size pages d. All of the above
12. An example of a block-oriented I/O device is:
a. CD-ROM b. Printer c. Modem
d. All of the above
13. Sequential files are optimal in scenarios involving:
a. Applications that require frequent queries b. Applications that require the processing of all records in the file
c. Applications that require infrequent updates d. All of the above
14. In a tree-structured directory, the series of
directory names that culminates in a file name is referred to as the: a. Pathname
b. Working directory c. Symbolic name d. None of the above
15. In order to implement mutual exclusion on a critical resource for competing processes, only one program at a time should be allowed:
a. In the critical section of the program
b. To perform message passing c. To Exhibit cooperation d. None of the above
16. A resource that can be created and destroyed is called a:
a. Reusable resource b. Producible resource c. Consumable resource d. All of the above
17. A condition of policy that must be present for a deadlock to be possible is: a. Mutual exclusion b. Hold and wait c. No preemption d. All of the above
18. In deadlocked process recovery, selection criteria for choosing a particular process to abort or rollback includes designating the process with the: a. Most estimated time remaining b. Lowest priority
c. Least total resources allocated so far d. All of the above
Fill-In-The-Blank Questions:
1. The portion of the operating system that selects the next process to run is called the _______________.
2. When the O/S creates a process at the explicit request of an existing process, the action is referred to as _______________________.
3. A process that cannot execute until some event occurs is said to be in the _______________ state. 4. In a system that implements two suspend states, a process that has been swapped out of main memory and into secondary memory and that is also awaiting an event is in the ________/________ state.
5. The task of assigning processes to the processor or processors over time, in a way that meets system objectives is called _______________. 6. _______________-term scheduling is part of the system swapping function.
7. _______________ is a scheduling policy in which the process with the shortest expected
processing time is selected next, but there is no preemption.
8. The task of subdividing memory between the O/S and processes is performed automatically by the O/S and is called ___________________.
9. The phenomenon, in which there is wasted space internal to a partition due to the fact that the block of
data loaded is smaller than the partition, is referred to as ___________________.
10. In the Dynamic Partitioning technique of memory management, the process of shifting processes so they occupy a single contiguous block in memory is called ___________________.
11. In a system that employs a paging memory
management scheme, the ___________________ shows the frame location for each page of the process. 12. The situation where the processor spends most of its time swapping process pieces rather than executing instructions is called _______________.
13. Most virtual memory schemes make use of a special high-speed cache for page table entries, called a _______________.
14. The term _______________ refers to the speed with which data moves to and from the individual I/O device.
15. A hard drive is an example of a
_______________-oriented I/O device.
16. The disk scheduling algorithm that implements exactly 2 subqueues in a measure to avoid the problem of “arm stickiness” is the _________________ policy.
17. The file directory information element that holds information such as the permitted actions on the file (e.g., reading, writing, executing, etc.) is the ______________ information element.
18. Typically, an interactive user or a process has associated with it a current directory, often referred to as the ______________.
19. The data structure or table that is used to keep track of the portions assigned to a file is referred to as a ______________.
20. UNIX employs ______________, which is a control structure that contains the key
information needed by the operating system for a particular file.
21. The situation where Process 1 (P1) holds Resource 1 (R1), while P2 holds R2, and P1 needs R2 to complete and P2 needs R1 to complete is referred to as _______________.
22. When only one process is allowed in its critical code section at a time, then _______________ is enforced.
23. A monitor supports _____________ by the use of condition variables that are contained within the monitor and accessible only within the monitor.
24. All deadlocks involve conflicting needs for resources by _________ or more processes.