click below
click below
Normal Size Small Size show me how
COP4610 Review.DR
| Question | Answer |
|---|---|
| ____ operating systems are designed primarily to maximize resource utilization. | Mainframe |
| The most common secondary storage device is ____. | Magnetic disk |
| A ____ can be used to prevent a user program from never returning control to the operating system. | timer |
| Embedded computers typically run on a ____ operating system. | real-time |
| Bluetooth and 802.11 devices use wireless technology to communicate over several feet, in essence creating a ____. | small-area network |
| A clustered system ____. | gathers together multiple CPUs to accomplish computational work |
| What are some examples of multimedia? | audio and video files, DVD's, live video over the Internet |
| What does a CPU do when there are no programs to run? | The OS keeps waiting for an interrupt |
| What is a bootstrap program, and where is it stored? | A bootstrap program is the initial program that the computer runs when it is powered up or rebooted. It is stored in the ROM or EEPROM. |
| What role do device controllers and device drivers play in a computer system? | Device controllers are responsible for moving the data between the peripheral devices that it controls and its local buffer. Device drivers interpret the device controllers and offer an interface to the operating system. |
| Why are clustered systems considered to provide high-availability service? | Clustered systems have redundancies capable of taking over a specific process or task in case of a failure. |
| Why is main memory not suitable for permanent program storage or backup purposes? Furthermore, what is the main disadvantage to storing information on a magnetic disk drive as opposed to main memory? | Main memory is volatile memory and any power loss would delete the data stored within that memory. The main disadvantage to storing information on a magnetic disk drive is that they are significantly slower than main memory. |
| Describe why direct memory access (DMA) is considered an efficient mechanism for performing I/O. | It is considered efficient because it removes the CPU from being responsible for transferring data. DMA instructs the device controller to move data between the devices and main memory. |
| Describe why multi-core processing is more efficient than placing each processor on its own chip. | A large reason why it is more efficient is that communication between processors on the same chip is faster than processors on separate chips. |
| Distinguish between uniform memory access (UMA) and non-uniform memory access (NUMA) systems. | On UMA systems, accessing RAM takes the same amount of time from any CPU. On NUMA systems, accessing some parts of memory may take longer than accessing other parts of memory, thus creating a performance penalty for certain memory accesses. |
| The primary purpose of the mode bit is for: | Protection |
| The issue of resource utilization shows up in different forms in different types of operating systems. List what resources must be managed carefully in the following settings: | Mainframe or minicomputer systems: memory and CPU resources, storage, network bandwidth. Workstations connected to servers: memory and CPU resources. Handheld computers: power consumption, memory resources. |
| A _____ is an example of a systems program. | Command interpreter |
| If a program terminates abnormally, a dump of memory may be examined by a ____ to determine the cause of the problem. | Debugger |
| A message-passing model is ____. | easier to implement than a shared memory model for intercomputer communication |
| The major difficulty in designing a layered operating system approach is ____. | appropriately defining the various layers |
| A microkernel is a kernel ____. | that is stripped of all nonessential components |
| To the SYSGEN program of an operating system, the least useful piece of information is _____. | what applications to install |
| A boot block ____. | typically only knows the location and length of the rest of the bootstrap program |
| In a virtual machine, each program believes that it has ____. | its own memory |
| ____ is a popular commercial application that abstracts Intel 80XXx86 hardware into isolated virtual machines. | VMware |
| _____ is not an example of a benefit of virtual machines. | Uses less physical memory than an actual operating system |
| _____ provide(s) an interface to the services provided by an operating system. | System calls |
| _____ is not one of the major categories of system calls. | Security |
| _____ allow operating system services to be loaded dynamically. | Modules |
| Microkernels use _____ for communication. | message passing |
| he Windows CreateProcess()system call creates a new process. What is the equivalent system call in UNIX: | fork() |
| _____ is/are not a technique for passing parameters from an application to a system call. | Cache memory |
| What are the advantages of using a higher-level language to implement an operating system? | The advantages are that the code is more compact, easier to understand, easier to debug, and the code can be written faster. |
| What are the advantages and disadvantages of using a microkernel approach? | The microkernel provides more security and reliability due to the services running as a user rather than kernel. The downside is that it can suffer from performance decreases due to increased system function overhead. |