WGU - C191

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/60

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:49 AM on 1/15/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

61 Terms

1
New cards

What is the role of the OS?

To manage a computer's hardware

2
New cards

Which OS service provides functions that are helpful to the user?

Program execution

3
New cards

Which OS service provides functions that are helpful to the user?

Program execution

4
New cards

Which system call is used for device manipulation?

ReadConsole()

5
New cards

Which system calls can be grouped under the category of process controls?

Allocate, free memory

6
New cards

Which service function is responsible for identifying and correcting exceptions such as the lack of paper in a

printer?

Error detection

7
New cards

Which type of OS service uses the CLI?

User interface

8
New cards

What represents layer zero (0) in the layered approach?

Hardware

9
New cards

What is a disadvantage of booting an OS stored in ROM?

Changing a bootstrap requires new hardware chips.

10
New cards

What is a valid process state?

Waiting

11
New cards

What are two valid components of a process control block (PCB)?

The process counter & The process state

12
New cards

What is the difference between kernel and user threads?

Kernel threads are directly managed by the operating system, whereas user

threads are managed without kernel support.

13
New cards

Which advantage does short-term scheduling have compared with long-term scheduling?

It takes less time to select a process to execute next.

14
New cards

What is considered stable when the average rate of process creation is equal to the average departure rate

of processes leaving the system?

The degree of multiprogramming

15
New cards

Which action allows an application that is in the background to be passed to the foreground and vice versa?

Memory reload

16
New cards

What is the process of context switching?

Performing a state save and a state restore

17
New cards

Which features are included in the DTrace tool?

Compiler, providers of probes, and consumers

18
New cards

What is the difference between cooperative and preemptive scheduling?

Cooperative scheduling occurs when a process terminates, whereas preemptive

scheduling occurs when a process initiates.

19
New cards

Which scheduling criteria measures the number of processes completed per time unit?

Throughput

20
New cards

Which criterion attempts to keep the processor as busy as possible?

CPU utilization

21
New cards

When does starvation occur in the priority scheduling algorithm?

When a process is waiting indefinitely

22
New cards

Which scheduling algorithm was designed especially for time sharing systems?

Round-robin

23
New cards

What is a difference between soft and hard processor affinity?

Hard affinity specifies a subset of processors on which a process may run, whereas

soft affinity leaves the processor selection to the OS.

24
New cards

What is an address that is generated by the CPU?

A logical address

25
New cards

Which general-purpose storage is accessed directly by the CPU?

The main memory

26
New cards

What is a limitation of swapping on mobile systems?

Applications that fail to free up sufficient memory are terminated.

27
New cards

What is the name of the memory allocation scheme where the operating system keeps a table of available

holes?

Variable partition

28
New cards

What is described as memory allocated from a fixed-size segment consisting of physically contiguous pages?

Buddy system

29
New cards

Which memory management solution relocates all available memory into one variable-sized block?

Compaction

30
New cards

What does the 50-percent rule of memory fragmentation state when allocating additional memory using the

first-fit method?

One-third of all memory may be unused.

31
New cards

Which component is associated with the paging scheme?

Frames

32
New cards

Which solution resolves slow access time to user memory location when implementing paging?

Using the translation look-aside buffer (TLB)

33
New cards

Which component ensures the integrity of memory in a paged environment?

Protection bits

34
New cards

What is a non-self-modifying code that never changes during execution?

Reentrant

35
New cards

What is the purpose of an inverted page table?

It reduces memory usage to store addresses.

36
New cards

What is a benefit of using virtual memory?

System libraries can be shared.

37
New cards

Which algorithm has the lowest possible page-fault rate and does not suffer from Belady's anomaly?

Optimal

38
New cards

Which collection of pages references the most recent set of delta parameters (ฮ”)?

The working set

39
New cards

In Windows, what represents the shared-memory object that will enable communication between

processes?

A memory-mapped file

40
New cards

Which strategy for assigning kernel memory uses cache to refer to a set of one or more physically contiguous

pages that serve for each unique kernel?

Slab allocation

41
New cards

What is a scheme used to help free up space (i.e. garbage collection)?

Least frequently used (LFU)

42
New cards

What will collect free space (i.e., garbage collection) together to provide more usable space?

Compaction

43
New cards

What is the smallest unit of data transfer in a physical hard disk drive?

Block

44
New cards

How is the array of logical blocks mapped onto the hard disk?

Onto the sectors of the disk sequentially

45
New cards

What is the average latency of a typical hard disk?

3 milliseconds

46
New cards

What is the rate at which data flows from the hard disk to the computer?

Transfer

47
New cards

What is a benefit of creating a separate raw partition for use as swap space?

It is optimized for speed of access.

48
New cards

What is a stored data condition that can prevent other processes from gaining access to it?

File locking

49
New cards

Which access type is used when speed is important in linked allocation files?

Sequential access

50
New cards

How do code editors and code compilers usually access files?

Sequential access

51
New cards

What are two key types of access permissions?

Append & List

52
New cards

Which mounting model allows a computer to mount file systems from remote machines?

Client-server

53
New cards

What is the I/O bus standard that connects the processor-memory subsystem to the fast devices?

PCI

54
New cards

What is memory-mapped I/O?

Memory addresses reserved for device registers

55
New cards

Which protection goal is achieved by detecting latent errors at the interfaces between components

subsystems?

Improving reliability

56
New cards

How can protection improve the reliability of a system?

By detecting errors at the interfaces between component subsystems

57
New cards

What is an example of a policy?

User access

58
New cards

How do policies and mechanisms differ?

Policies may change from place to place whereas mechanisms remain the same.

59
New cards

What can be assigned roles when using role-based access control?

The program & The process

60
New cards

Several major retail chains are hacked and customer information is stolen, including credit card numbers.

Which type of attack has occurred?

Breach of confidentiality

61
New cards

Which security level is identified by gathering information through malicious phone calls?

Human

Explore top flashcards