Chapter 2 Flashcards

1
Q

Type of system calls that Get time/date, set time/date

A

Information maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The OS provides application programmers with API to invoke services
(T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Type of system calls that Create file and delete file

A

File management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In …………, It is easier to extend the OS

A

Micro-kernel approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In ………………., Linking additional services dynamically is preferable to recompiling the kernel every time a change is made
(operating system structure)

A

Modules Approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The process of starting a computer by loading the kernel

A

System Boot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

…………. provides more security and reliability

A

Micro-kernel approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In layered approach, bottom layer (layer 0) is …………

A

hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Removes all nonessential components from the kernel and implements them as system programs
(operating system structure)

A

Micro-kernel Approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Allocate resources to the running processes

A

Resource allocation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Loosely-coupled as changes in one layer do not affect the others
(operating system structure)

A

Layered Approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In micro-kernel approach, No need to modify of the kernel
(T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In ………….., Each layer uses the functions of only the lower-level layers
(operating system structure)

A

Layered Approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

type of system calls that Create, load, execute, terminate, and abort

A

process control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

To provide very efficient performance

A

Monolithic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

……….. are available as functions written in C and C++

A

System calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Recording which process uses how much and what kinds of resources

A

Logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Difficult to implement and extend
(operating system structure)

A

Monolithic Approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In micro-kernel approach, Most services are running as kernel rather than user processes
(T/F)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

It is easier to port the OS from one hardware design to another. this is an advantage of …………

A

Micro-kernel approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In micro-kernel approach, New services are added as system programs
(T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In …………, Several OSs use of this approach, such as UNIX, Linux, and Windows
(operating system structure)

A

Monolithic Approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Very little overhead in the system-call interface
(operating system structure)

A

Monolithic Approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

the primary module has only core functions. This is a similarity between the …………. and …………

A

Modules approach, Micro-Kernel approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Type of system calls that Get and set device attributes, logically attach or detach devices
Device management
26
Type of system calls that Get system data, set system data
Information maintenance
27
In .................., If a service fails, the rest of the operating system remains untouched
Micro-Kernel Approach
28
A single, static binary file that runs in a single address space (operating system structure)
Monolithic Approach
29
Type of system calls that Open, close, read, write, reposition file
File management
30
............... ensures that all access to system resources is controlled
protection
31
In ............, No structure at all (operating system structure)
Monolithic Approach
32
Makes it easier to implement and extend the kernel (operating system structure)
Layered Approach
33
................ Provide an interface to the services provided by the OS
system calls
34
This type of design is common in modern implementations of UNIX, such as Linux, macOS, and Solaris, as well as Windows (operating system structure)
Modules Approach
35
In ............., it is difficult to define the functionality of each layer (operating system structure)
Layered Approach
36
User processes can execute I/O operations directly (T/F)
False
37
.......... is both monolithic and modular
Linux
38
........... allow user processes to read, write, create, and delete files
File-system manipulation
39
The ....... of the system from outsiders is also important
security
40
Type of system calls that Get file attributes and set file attributes
File management
41
Type of system calls that Wait for time, wait event, signal even, allocate and free memory
Process control
42
In layered approach, Traversing multiple layers to call services results in ............ performance (operating system structure)
Poor
43
Some low-level tasks may be written using ...........
assembly-language
44
It is easier to modify kernel if needed as it is a smaller kernel. this is an advantage of ............
Micro-kernel approach
45
To add new functionality dynamically to the kernel
Modular
46
In layered approach, highest layer (layer n) is ............
user interface
47
Implemented via shared memory or message passing
Communications
48
Type of system calls that Send message, receive message, transfer status information
Communications
49
.......... Load programs into memory and run them
program execution
50
each kernel section has a defined and protected interface. This is a similarity between ............... and .............
Modules approach, layered approach
51
User processes can use ............. to call the OS services
system calls
52
the OS must provide processes with some means to perform I/O (T/F)
True
53
Type of system calls that Request device, release device, read, write, reposition
Device management
54
Type of system calls that Create, delete communication connection
Communications
55
In ................, The kernel has a set of core components and can link in additional services via LKMs, either at boot time or during run time (operating system structure)
Modules Approach
56
more flexible, because any module can call any other module. This is a difference between ............... and .............
Modules approach, layered approach
57
Tightly-coupled as changes to one part can affect other parts (operating system structure)
Monolithic Approach
58
Type of system calls that Get process, file, or device attributes, set process, file, or device attributes
Information maintenance
59
A program must be able to end its execution, either normally or abnormally (T/F)
True
60
Type of system calls that Attach remote device, detach remote device
Communications
61
Communication within the kernel is fast (operating system structure)
Monolithic Approach
62
Divides the OS into a set of layers (operating system structure)
Layered Approach
63
very few OSs adopt a single, strictly defined structure (T/F)
True
64
Enable user processes to exchange information
Communications
65
Type of system calls that Get process attributes and set process attributes
Process control
66
When a process executes a system call, the system traps to the OS (T/F)
True
67
modules do not need to use message passing to communicate. This is a difference between ............... and .............
Modules approach, Micro-Kernel approach
68
............ Provide a graphical user interface (GUI) or a command-line interface (CLI)
User Interface
69
Ensure correct computing by detecting errors in hardware or user programs
Error detection