IT0035 - Applied OS Flashcards

References and Additional Flashcards: https://www.studystack.com/flashcard-4072709 https://www.studystack.com/flashcard-4072822 https://quizlet.com/ph/561390524/m2-basic-operational-concepts-flash-cards/ https://quizlet.com/ph/875354572/operating-system-summative-1-flash-cards/ (200 cards)

1
Q

Process Control Block is also known as task control block. (True or False)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a program or system software that acts as an interface between the user and the computer hardware and controls the execution of all kinds of programs.

A

Operating System (OS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which is not an example of system software?
Group of answer choices
NotePad
MS word
Windows 10
Linux

A

MS word

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which is not an example of storage device? Group of answer choices
Keyboard
RAM
ROM
Hard Disk

A

Keyboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CPU, memory and I/O devices, provides the basic computing resources.

A

Computer hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Are used to solve the computing problems of the users such as word processors, games and business programs.

A

Application programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Who utilize a computer or network service trying to solve different problems.

A

Users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

These controls and coordinates the use of the hardware among the various application programs for the various users.

A

Operating Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This refers to a non-interactive user interface, where the user specifies all the details of the batch job in advance. To speed up processing, jobs with similar needs are batched together and run as a group.
Graphical User Interface
Batch Operating System (BOS)
Command Line Interface
Menu-based Interface

A

Batch Operating System (BOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • This is logical extension in which CPU switches jobs so frequently that users can interact with each job while it is running, creating interactive computing.
  • This creates an interactive environment.
  • is also known as multitasking.
  • Examples: Unix, Linux, Multics and Windows.
A

Time-sharing Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Windows 10 is an example of hand-held operating system. (True or False)

A

False (Time-Sharing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This runs on a server and provides the server the capability to manage data, users, groups, security, applications, and other networking functions.

It’s primary purpose is to allow shared file and printer access among multiple computers in a network.

A

Network Operating System (NOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This uses MULTIPLE central processors to serve multiple real-time applications and multiple users.

Also known as LOOSELY coupled systems or distributed systems.

A

Distributed Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

UNIX is an example of Network OS. (True or False)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cloud computing is an example of distributed system. (True or False)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

It is an OS intended to serve real-time systems/applications that process data as it comes in, mostly without buffer delay.

These are used when there are time requirements or constraints like missile systems

A

Real-time Operating System (RTOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In computer system organization, one or more CPUs, device controllers connect through common ____ providing access to shared memory.

Group of answer choices
node
bus
data
link

A

bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

It is a signal created and sent to the CPU that is caused by some action taken by a hardware device.

A

Hardware interrupt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

It is a signal emitted by hardware or software when a process or an event needs immediate attention.

Group of answer choices
Disturb
Interrupt
Buffer
Link

A

Interrupt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

It is a signal created and sent to the CPU that is caused by some action taken by a software.

It arises due to illegal and erroneous use of an instruction or data

A

Software Interrupt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The operating system preserves the state of the CPU by storing registers and the program counter.

A

Interrupt Handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Dual-mode operation allows OS to protect itself and other system components. (True or False)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A type of interrupt handling in which the OS sends signal to each devices asking if they have a request.

A

Polling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A type of interrupt handling in which the requesting device sends interrupt to the operating system

A

Vectored interrupt system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Kernel acts like bridge between application and computer hardware. (True or False)
True
26
Also known as parallel-system or multicore.
Multiprocessor System
27
A recent trend in CPU design is to include multiple computing cores on a single chip. They can be more efficient than multiple chips with single core.
Multicore Systems
28
There is one main CPU capable of executing a general-purpose instruction set.
Single-Processor System
29
Multiprocessor Systems or Parallel systems are also known as __________-coupled systems. Group of answer choices Sweet Simply Loosely Tightly
Tightly
30
It is a way for programs to interact with the OS. A computer program makes this when it makes a request to the OS's kernel. It changes mode to kernel, return from call resets it to user.
System call
31
A type of multiprocessing in which a boss processor controls the system and the other processors either look to the boss for instructions or have predefined tasks This applies a boss-worker relationship among processors.
Asymmetric Multiprocessing
32
The most commonly used type where each processor performs all tasks within the operating system. Here, All processors are considered peers
Symmetric Multiprocessing
33
Like multiprocessor systems, but multiple systems working together. Usually sharing storage via a storage-area network (SAN).
CLUSTERED SYSTEMS
34
This type of clustering has multiple nodes running applications, monitoring each other.
Symmetric clustering
35
Office environment with PCs connected to a network. Now includes home networks which are firewalled and networked.
Traditional computer
36
Asymmetric clustering has one machine in hot-standby mode. (True or False)
True
37
Many systems now servers, responding to requests generated by clients.
Client-Server Computing
38
Refers to computing on handheld smartphones and tablet computers
Mobile computing
39
A collection of physically separate, possibly heterogeneous computer systems that are networked to provide users with access to the various resources that the system maintains.
Distributed system
40
File-server is an example of client-server computing. (True or False)
True
41
Types of Cloud Computing
Public cloud – cloud available via the Internet. Private cloud – cloud run by a company for that company’s own use. Hybrid cloud – cloud that includes both public and private.
42
A software-generated interrupt caused either by an error or a user request is called _______________________ Group of answer choices Trap Lost interrupt System call Interrupt
Trap
43
It is a technology that allows OS to run as applications within other operating system.
Virtualization
44
It is a type of computing that delivers computing, storage and even applications as a service across a network.
Cloud Computing
45
Cloud Computing Service Models
Software as a service(SaaS) - provides one or more applications available via the Internet. Platform as a service (PaaS) — software stack ready for application use via the Internet. Infrastructure as a service (IaaS) — servers or storage available over the Internet.
46
This refers to a text-based type of user interface. Group of answer choices Graphical User Interface Menu-based Interface Command Line Interface Batch-based Interface
Command Line Interface
47
Using the computer hardware in an efficient manner is one of the goals of OS. (True or False)
True
48
The operating system should be able to detect _____ within the computer system and take the appropriate action. Group of answer choices files programs Virus errors
errors
49
In program execution, the OS must have the capability to load a program into ________ and execute that program. Group of answer choices Hard Disk Directories Data Memory
Memory
50
These are used to solve user computing problems such as word processors and business programs. Group of answer choices Application Programs Anti-Virus programs Utility Programs Operating Systems
Application Programs
51
It is a program in execution.
Process
52
A computer system consists of a collection of processes: 1.) Operating system processes execute system code. 2.) User processes execute user code.
True
53
A program is a ________ entity, such as the contents of a file stored on disk while a process is an ________ entity.
PASSIVE (program) and ACTIVE (process)
54
A process is actually a cycle of CPU execution (CPU burst) and I/O wait (I/O burst) (True or False)
True
55
Process execution begins with a CPU burst that is followed by an I/O burst. (True or False)
True
56
The process contains the temporary data such as method/function parameters, return address and local variables.
Stack
57
This is dynamically allocated memory to a process during its run time.
Heap
58
This includes the current activity represented by the value of Program Counter and the contents of the processor's registers.
Text
59
This section contains the global and static variables.
Data
60
A process may create several new processes, via a create-process system call, during the course of execution. The creating process is called ________
Parent Process
61
In process state, WAITING STATE is when the process is waiting for the OS to assign a processor to it. (True or False)
False (Ready)
62
In process state, READY STATE is when the process is waiting for some event to occur (such as an I/O completion) (True or False)
False (Waiting)
63
In process state, READY STATE is when the process is waiting for the OS to assign a processor to it. (True or False)
True
64
In process state, RUNNING state is when the CPU is executing its instructions. (True or False)
True
65
In process state, WAITING STATE has finished execution. (True or False)
False (Terminated)
66
Process control block is also known as task control block. (True or False)
True
67
Each process is represented in the operating system by a ___________. It is a data block or record containing many pieces of the information associated with a specific process.
PROCESS CONTROL BLOCK (PCB)
68
It indicates the address of the next instruction to be executed for this process.
Program Counter
69
These include accumulators, index registers, stack pointers, and general-purpose registers, plus any condition-code information.
CPU Registers
70
This information includes a process priority, pointers to scheduling queues, and any other scheduling parameters.
CPU Scheduling Information
71
The goal of CPU scheduling is to optimize system performance is to MINIMIZE the throughput. (True or False)
False (Maximize)
72
CPU being switched from one process to another is known as
Context Switch Diagram.
73
A process terminates when it finishes its last statement and asks the operating system to delete it using the exit system call. (True or False)
True
74
A process terminates when it finishes its first statement and asks the operating system to delete it using the exit system call. (True or False)
False
75
As processes enter the system, they are put into a _______
job queue
76
Selects processes from the secondary storage and loads them into memory for execution.
Long-term scheduler (or Job scheduler)
77
Selects process from among the processes that are ready to execute, and allocates the CPU to one of them.
Short-term scheduler (or CPU scheduler)
78
Removes (swaps out) certain processes from memory to lessen the degree of multiprogramming (particularly when thrashing occurs).
Medium-term scheduler
79
The disk surface is logically divided into _____, which are subdivided into sectors. Group of answer choices bits patterns waves tracks
tracks
80
It is the time it takes to actually transfer data between disk and main memory. Group of answer choices Seek time Transfer time Rotation time Latency Time
Transfer time
81
These disks are coated with a hard surface, so the read-write head scans it directly on the disk surface without destroying the data. Group of answer choices Blu-ray discs floppy disks flappy disks compact discs
floppy disks
82
Each disk platter has a flat _______ shape, like a phonograoh record. Group of answer choices circular square oval triangular
circular
83
Modern disks are addressed as large one-dimensional arrays of logical blocks, where the ______ is the smallest unit of transfer. Group of answer choices local block logical block physical block sector block
logical block
84
The main requirement of secondary storage is to be able to store very large amount of data _______ Group of answer choices sometime temporarily permanently everyday
permanently
85
In a disk the information is recorded on the __ Group of answer choices inside edge outside surface
surface
86
Which of the given is considered aspects of disk management for which an operating system is responsible. Group of answer choices Booting from disk all of these Bad-block recovery disk formatting
all of these
87
A ________ movable-head system has only one read-write head per surface and the system moves the head to access a particular track Group of answer choices Fixed-Head System Movable-Head system Movable-Joint System Rotational-head system
Movable-Head system
88
An incident where the head contacts the disk surface, the head will scrape the recording medium off the disk. Group of answer choices Head bang Head accident Head crashes Head crushes
Head crashes
89
C-SCAN scheduling essentially treats the disk as though it were circular where the last track is adjacent to the first one. (True or False)
True
90
The OS can improve on the average disk service time by scheduling the requests for disk access.(True or False)
True
91
The Shortest Seek Time First disk scheduling selects the request with the maximum seek time from the current head position. Group of answer choices True False
False
92
The First Come First Served disk scheduling selects the request according to the order in the disk queue Group of answer choices True False
True
93
Since most jobs depend heavily on the disk for loading and input and output files, it is important that disk service be as fast as possible. Group of answer choices True False
True
94
Given the following track requests in the disk queue compute for the total head movement (THM) of the R/W Head 98, 53, 22, 16, 24. Consider that the read write head is positioned at location 32. Compute for the total head movement for a 100 (0 - 99) track disk for each disk scheduling algorithm. Using C-SCAN (going lower tracks direction), what is the shortest distance between 2 tracks? Group of answer choices 4 tracks 1 track 2 tracks 3 tracks
1 Track
95
Given the following track requests in the disk queue compute for the total head movement (THM) of the R/W Head 39, 14, 38, 17. Consider that the read write head is positioned at location 10. Compute for the total head movement for a 100 (0 - 99) track disk for each disk scheduling algorithm. Using LOOK (going higher tracks direction), what is the last served track request? Group of answer choices track 38 track 98 track 39 track 99
track 39
96
Given the following track requests in the disk queue compute for the total head movement (THM) of the R/W Head 98, 53, 22, 16, 24. Consider that the read write head is positioned at location 32. Compute for the total head movement for a 100 (0 - 99) track disk for each disk scheduling algorithm. Using LOOK (going higher tracks direction), what is the last served track request? Group of answer choices track 16 track 53 track 24 track 98
track 16
97
Which of the following example strategies belong to the key property “Adaptation and evolution to reduce effectiveness of future attacks”? Group of answer choices integrity checking intrusion recognition patterns authentication system diversification
Intrusion recognition patterns
98
Computer “Virus” is a vulnerability of Single Computer (without E-mail or internet) Group of answer choices True False
True
99
Which of the configurations is vulnerable to “Spoofing”? Group of answer choices Laptop without Internet Desktop Computer without internet LAN connected with or without Internet Desktop Computer without E-mail
LAN connected with or without Internet
100
“Web Server” is a vulnerability of which configuration? Group of answer choices LAN connected (with internet) Desktop Computer without E-mail Laptop without Internet Desktop Computer without internet
LAN connected (with internet)
101
Which of the following is an example strategy of the key property “Adaptation and evolution to reduce effectiveness of future attacks”? Group of answer choices intrusion recognition patterns attack recognition patterns intrusion recognition patterns contingency planning
Intrusion recognition patterns
102
Which among the given is not a vulnerability of a LAN connected with internet? Group of answer choices LAN connected (with internet) LAN connected (without internet) Single Computer (without E-mail or internet) none of the these
Single Computer (without E-mail or internet)
103
LAN connected (without internet) is vulnerable to “spoofing”. Group of answer choices True False
True
104
Written policies and procedures and _______ user training are essential elements of system management Group of answer choices random regular occasional accidental
regular
105
Which of the configurations is vulnerable to “Sniffers”? Group of answer choices LAN connected with or without Internet Desktop Computer without internet Desktop Computer without E-mail Laptop without Internet
LAN connected with or without Internet
106
“E-mail” is a vulnerability of LAN connected (with internet). Group of answer choices True False
True
107
Snoopers are programs that reside on computers attached to the network. Group of answer choices True False
False
108
Infects data files (such as word processing documents, spreadsheets, etc.) Group of answer choices Boot sector virus Macro Virus Micro Virus Multipartite virus
Macro Virus
109
These refer to entering systems by guessing authentic passwords. Group of answer choices Trap Doors Browsing Repeated trials Phishing
Repeated trials
110
It is when an unauthorized users gain access to search through secondary storage directories or files for information they should not have the privilege to read. Group of answer choices Trap doors Browsing Denial of Service (DoS) attack Wire Tapping
Browsing
111
Repeated trials is also known as Brute Force Attack Group of answer choices True False
True
112
This infects the boot record of a disk, saving a legitimate copy of the master boot record in a different location on the volume. Group of answer choices File infector virus Boot sector virus Master record virus Master boot record virus
Master boot record virus
113
Logic Bomb is a destructive program that can be triggered by a keystroke or connection with the Internet Group of answer choices True False
True
114
Spoofing can be applied to emails, phone calls, and websites Group of answer choices True False
True
115
A type of virus which is triggered by a certain event like keystroke Group of answer choices Logic Bomb Key bomb Trojan virus Time bomb
Logic Bomb
116
________ is one in which a malicious hacker takes over computers via the internet and causes them to flood a target site with demands for data and other small tasks causing a computer to perform repeated unproductive task. Group of answer choices Browsing Denial of Service (DoS) attack Wire Tapping Trap doors
Denial of Service (DoS) attack
117
another approach in space management where all the free disk blocks are linked together called?
Linked List
118
how many bits represent each block in a Bit vector?
a single bit
119
Before a computer can make use of a new disk....
The disk must undergo physical formatting (low-level formatting)
120
A disk management where in order to make a computer start running....
bootstrap
121
contingency planning is an example strategy of the key property....
Recovery of essential and full services after attack
122
technique whereby system intruders gain access to....
Social Engineering.
123
Intrusion detection is an example of...
Recognition of attacks and resulting damage
124
The Ease of detection of a....
High - Single computer (without e-mail or Internet) Medium - LAN connected (without Internet) Low - LAN connected (with Internet)
125
A hardware malfunction is an example of....
Unintentional intrusion
126
A virus must be.....
Self-executing Self-replicating
127
Three methods for system protection
Antivirus software Firewalls Encryption
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200