CS 3377 Test 2 Flashcard Study Set

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/137

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 2:18 AM on 4/5/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

138 Terms

1
New cards

[APUE01] The only two characters that cannot appear in a filename are the slash character (/) and the ___ character.

escape

back-slash

slash

null

special

null

2
New cards

[APUE01] Consider the following user-information entry when the system looks up and checks at the time of log-in with the following user entry there. Which one of the choices is correct?sar:x:205:105:Stephen.Rago:/home/sar:/bin/ksh

User ID is 105

User ID is 205

User ID is x

User ID is not shown here

User ID is encrypted and shown as x

User ID is 205

3
New cards

[APUE01] Which of the following statements is not correct?

-Many conditions generate signals.

-The interrupt key is generated with the DELETE key or Control-C

-The quit key, is often generate with Control-backslash, used to interrupt the currently running process.

-One way to generate a signal is by calling the getpid function.

-One can call the kill function from a process to send a signal to another process.

-One way to generate a signal is by calling the getpid function.

4
New cards

[APUE01] When one logs in, the default directory is set to be one's ___ directory which is obtained from our entry in the password file.

absolute

home

relative

root

working

home

5
New cards

[APUE01] _____ is an enhanced version of the C shell. It borrows several features, such as command completion, from the TENEX operating system (developed in 1972 at Bolt Beranek and Newman). The TENEX C shell adds many features to the C shell and is often used as a replacement for the C shell.

The Bourne shell

The C shell

The Korn shell

The Bourne-again shell

The TENEX C shell

The TENEX C shell

6
New cards

[APUE01] Consider the following user-information entry when the system looks up and checks at the time of log-in with the following user entry there. Which one of the choices is correct?sar:x:205:105:Stephen.Rago:/home/sar:/bin/ksh

Login user name is sar.

Login user name is x.

Login user name is Steven.Rago.

Login user name is /home/sar

Login user name is ksh

Login user name is sar

7
New cards

[APUE01] Which of the following statements is not correct?

-The fork returns the non-negative process ID of the new child process to the parent process

-The fork returns 0 to the child process.

-Because fork creates a new process, we say that it is called once—by the parent—but returns twice—in the parent and in the child.

-In the child process, one may call execlp to execute Unix or Linux command.

-The fork call replaces the child process with the new program file.

-The combination of fo

The fork call replaces the child process with the new program file.

8
New cards

[APUE01] Which of the following statements is not correct?

-In addition to the group ID specified in the password file for a login name, most versions of the UNIX System restricts a user to belong to one group only.

-The practice of supplementary groups started with 4.2BSD to let a user to belong to many other groups.

-The number of supplementary groups of a user ID is usually up to 16 additional groups.

-The supplementary group IDs are obtained at login time by reading the file /etc/group.

-

In addition to the group ID specified in the password file for a login name, most versions of the UNIX System restricts a user to belong to one group only.

9
New cards

[APUE01] In Unix, it is easy to measure the clock time, user time, and system time of any process: simply execute the ___ command, with the argument for what we want to measure.

date

time

cputime

ps

pstime

time

10
New cards

[APUE01] Which of the following statements is not correct?

-One entry in the password file specifies our numeric group ID.

-The group ID of each User ID is assigned by the system administrator when our login name is assigned.

-Typically, each password file contains only one unique group ID that specify the same group ID.

-Groups are normally used to collect users together into projects or departments.

-One function and use of Group ID allows the sharing of resources, such as files, among mem

Typically, each password file contains only one unique group ID that specify the same group ID.

11
New cards

[APUE01] Which of the following statements is not correct?

-Historically, UNIX systems have maintained two different time values: Calendar time and Process time.

-Calendar time counts the number of seconds since the Epoch: 00:00:00 January 1, 1970, Coordinated Universal Time (UTC).

-Process time is called CPU time and measures the central processor resources used by a process.

-Process time is measured in clock ticks, which have historically been 50, 60, or 100 ticks per micro-second.

-The primi

Process time is measured in clock ticks, which have historically been 50, 60, or 100 ticks per micro-second.

12
New cards

[APUE01] The system then looks up our login name in its password file, usually the file ____.

/etc/passwd

/system/password

/admin/pass

/usr/bin/pwfile

/sbin/passwd

/etc/passwd

13
New cards

[APUE01] There is also a group file that maps group names into numeric group IDs. The group file is usually ____.

/etc/group

/etc/passwd

/etc/userid

/etc/host

/etc/usergroup

/etc/group

14
New cards

[APUE01] In the root directory, dot-dot is the same as ____.

null

/bin/null

file-system

dot

the previous directory

dot

15
New cards

[APUE01] A pathname that begins with a slash is called ____.

an absolute pathname

a relative pathname

a URL name

a file name

a resource link

an absolute pathname

16
New cards

[APUE01] This filename is automatically created whenever a new directory is created.

root

home directory

. (called dot)

hidden file

.profile

. (called dot)

17
New cards

[APUE01] _____ is the GNU shell provided with all Linux systems. It was designed to be POSIX conformant, while still remaining compatible with the Bourne shell. It supports features from both the C shell and the Korn shell.

The Bourne shell

The C shell

The Korn shell

The Bourne-again shell

The TENEX C shell

The Bourne-again shell

18
New cards

[APUE01] Which of the following statements is not correct? When a signal occurs, one of the actions is ___.

To ignore the signal.

To let the default action occur.

To provide a function to be called when a signal occurs.

To mask the signal.

To provide a callback function for the signal.

To provide a callback function for the signal.

19
New cards

[APUE01] The ___ character terminates a pathname.

escape

back-slash

slash

null

special

null

20
New cards

[APUE01] In Unix, The interface to the kernel is a layer of software called the ____ calls.

Library

System

Utility

Driver

Service

system

21
New cards

[APUE01] The ___ character separates the filenames that form a pathname.

escape

back-slash

slash

null

special

slash

22
New cards

[APUE01] This shell _____, developed by Bill Joy at Berkeley, is provided with all the BSD releases. Additionally, this shell was provided by AT&T with System V/386 Release 3.2 and was also included in System V Release 4 (SVR4).This shell was built on the 6th Edition shell, not the Bourne shell. Its control flow looks more like the C language, and it supports additional features: job control, a history mechanism, and command-line editing.

The Bourne shell

The C shell

The Korn shell

The Bourne-a

The C shell

23
New cards

A directory could be any physical device which represents the hierarchical file system.

24
New cards

[APUE01] Which of the following statements is not correct?

The user ID from our entry in the password file is a numeric value that identifies us to the system.

The user ID is assigned by the system administrator when our login name is assigned, and we cannot change it.

The user ID is normally assigned to be unique for every user.

The kernel uses the user ID to check whether we have the appropriate permissions to perform certain operations.

We call the user whose user ID is 0 either root or the

The entry in the password file normally has a login name of superuser, with the special privileges.

25
New cards

[APUE01] This shell _____ is considered a successor to the Bourne shell and was first provided with SVR4. This is developed by David ___ at Bell Labs, runs on most UNIX systems, but before SVR4 was usually an extra-cost add-on, so it is not as widespread as the other two shells. It is upward compatible with the Bourne shell and includes those features that made the C shell popular: job control, command-line editing, and so on.

The Bourne shell

The C shell

The Korn shell

The Bourne-again shell

T

The Korn shell

26
New cards

[APUE01] ___ refers to the current directory.

root

home directory

. (called dot)

.. (called dot-dot)

.profile

. (called dot)

27
New cards

[APUE01] For portability, POSIX.1 recommends restricting filenames to consist of the following characters: letters (a-z, A-Z), numbers (0-9), period (.), dash (-), and _____ character.

escape

back-slash

slash

null

underscore

underscore

28
New cards

[APUE01] Every process has a ____ directory. This is the directory from which all relative pathnames are interpreted. A process can change its ___ directory with the chdir function.

absolute

home

relative

root

working

working

29
New cards

[APUE01] _____ developed by Steve ____ at Bell Labs, has been in use since Version 7 and is provided with almost every UNIX system in existence. The control-flow constructs of this shell are reminiscent of Algol 68.

The Bourne shell

The C shell

The Korn shell

The Bourne-again shell

The TENEX C shell

The Bourne shell

30
New cards

[APUE01] Which of the following statements is not correct? The UNIX System maintains various time values for a process. One of them is ___.

Clock time

Wall Clock time

User CPU time

System CPU time

Signal Interrupt time

Signal Interrupt time

31
New cards

[APUE01] Which of the following statements is NOT correct?

The UNIX System provides a single system call that returns the number of seconds since the Epoch: midnight, January 1, 1970, Coordinated Universal Time.

Any interpretation of the value of the time function, such as converting it to a human-readable time and date using the local time zone, is left to the user process.

The standard C library provides routines to handle most cases. These library routines handle such details as the various a

The process control system calls (fork, exec, and waitpid) are usually not invoked by the user's application code directly.

32
New cards

[APUE01] In Unix file system, everything starts in the directory called ____, whose name is the single character /.

system

root

superdirectory

partition

home directory

root

33
New cards

[APUE01] ____ is normally small non-negative integer that the kernel uses to identify the file accessed by a process. Whenever it opens an existing file or creates a new file, the kernel returns ____ that we use when we want to read or write the file.

file flag

file descriptor

file table accessor

i-node pointer

v-node pointer

file descriptor

34
New cards

[APUE01] ___ is a command-line interpreter that reads user input and executes commands.

A console

A script

A shell

A terminal

An IDE

a shell

35
New cards

[APUE01] Which of the following statements is not correct?

Usually, a process has only one thread of control—one set of machine instructions executing at a time.

Multiple threads of control can exploit the parallelism possible on multiprocessor systems.

All threads within a process share the same address space, file descriptors, stacks, and process-related attributes.

Each thread executes on its own stack, although any thread can access the stacks of other threads in the same process.

Because

Because each thread within a process can access the same memory, the threads do not need to synchronize access to shared data among themselves to avoid inconsistencies.

36
New cards

[APUE01] The UNIX file system is _____ arrangement of directories and files.

a hierarchical

a network

a relational

a physical

a conceptual

a hierarchical

37
New cards

[APUE01] ___ is an executable file residing on disk in a directory. ____ is read into memory and is executed by the kernel as a result of one of the seven exec functions.

A process

A program

A thread

A socket

A shell

a program

38
New cards

[APUE01] Which of the following statements is not correct?

All operating systems provide service points through which programs request services from the kernel.

All implementations of the UNIX System provide a well-defined, limited number of entry points directly into the kernel called system calls.

Version 7 of the Research UNIX System provided about 50 system calls, 4.4BSD provided about 110, and SVR4 had around 120.

More recent systems have seen incredible growth in the number of supported s

With many recent operating systems, the kernel entry points are defined in the Java language.

39
New cards

[APUE01] An executing instance of a program is called _____, a term used on almost every page of this text. Some operating systems use the term task to refer to a program that is being executed.

A process

A program

A thread

A socket

A shell

A process

40
New cards

[APUE01] Which one of the following is not a primary function for process control?

exec

fork

waitpid

pthread

pthread

41
New cards

[APUE01] Consider the following user-information entry when the system looks up and checks at the time of log-in with the following user entry there. Which one of the choices is correct?sar:x:205:105:Stephen.Rago:/home/sar:/bin/ksh

User home directory is /bin/ksh

User home directory is /home/sar

User home directory is Stephen.Rago

User home directory is Stephen.Rago:/home/sar

User home directory is not shown here

User home directory is /home/sar

42
New cards

[APUE01] Which of the following statements is not correct?

Signals are a technique used to notify a process that some condition has occurred.

If a process divides by zero, the signal whose name is SIGFPE (floating-point exception) is sent to the process.

The process has three choices for dealing with the signal.

The signals are not recommended with the recent Unix and Linux systems with cloud computing, and are replaced by more sophisticated exception handlers.

The signals are not recommended with the recent Unix and Linux systems with cloud computing, and are replaced by more sophisticated exception handlers.

43
New cards

[APUE03] Which one of the following statements is NOT correct? Consider the following figure.

One reason each process gets its own file table entry is so that each process can share its own current file IO status with the other.

44
New cards

[APUE03] Which one of the following statements is NOT correct?

In general, the term atomic operation refers to an operation consisting of multiple steps where each step can be interruptible for an atomic signal.

If the operation is performed atomically, either all the steps are performed (on success) or none are performed (on failure).

If the operation is performed atomically, it must not be possible for only a subset of the steps to be performed.

The Single UNIX Specification includes two funct

In general, the term atomic operation refers to an operation consisting of multiple steps where each step can be interruptible for an atomic signal.

45
New cards

[APUE03] Which one of the following statements is correct? The following figure shows ____.

how a process can have a file opened with two file descriptors

how two processes can share a file

how a process maintains two entries in the file table

how two file descriptors of a process can be integrated in v-node table virtually

how two v-nodes can be shared by one process

how two processes can share a file

46
New cards

[APUE03] With "lseek" call options, which one of the following statements is NOT correct?

If whence is SEEK_SET, the file's offset is set to offset bytes from the beginning of the file.

If whence is SEEK_CUR, the file's offset is set to its current value plus the offset.

If whence is SEEK_END, the file's offset is set to the size of the file plus the offset.

If whence is SEEK_NEXT, the file's offset is set to the size of the file plus the offset of the file's block size.

Because a success

If whence is SEEK_NEXT, the file's offset is set to the size of the file plus the offset of the file's block size.

47
New cards

[APUE03] For file IO with buffering, consider the following statistics for a benchmark. The file was read using the program here with standard output redirected to /dev/null. The file system used for this test was the Linux ext4 file system with 4,096-byte blocks. Which one of the following statements is NOT correct?

This accounts for the minimum in the system time occurring at the few timing measurements starting around a BUFFSIZE of 4,096.

Increasing the buffer size beyond this limit of a B

Bigger the buffer size means better in performance evidenced in this statistics.

48
New cards

The "current file offset" is initialized to 0 and the next write pointer is set to the end of the file if the O_APPEND option is specified.

49
New cards

[APUE03] With File "open" call, this option ____ creates the file if it doesn't exist.

O_CREAT

O_CREATE

O_CRONLY

O_CRT

O_CREATEONLY

O_CREAT

50
New cards

[APUE03] Which one of the following statements is NOT correct? Consider Unix file IO (e.g., read and write).

After each write is complete, the current file offset in the file table entry is incremented by the number of bytes written.

If this causes the current file offset to exceed the current file size, the current file size in the i-node table entry is set to the current file offset (for example, the file is extended).

If a file is opened with the O_APPEND flag, a corresponding flag

The lseek function modifies only the current file offset in the file table entry. It forces I/O take place.

51
New cards

[APUE03] Most file I/O on a UNIX system can be performed using only five functions. Which one of the following is NOT correct?

open

read

write

seek

close

seek

52
New cards

[APUE03] Which one of the following choices is NOT correct about v-node.

The v-node was invented to provide support for multiple file system types on a single computer system.

The (v-node) work was done independently by Peter Weinberger (Bell Laboratories) and Bill Joy (Sun Microsystems).

Sun called this work (v-node) the Virtual File System and called the file system-independent portion of the i-node the v-node [Kleiman 1986].

The v-node propagated through various vendor implementations as su

In SVR4, the v-node replaced the file system-independent i-node of SVR3. Solaris is derived from SVR4 and, therefore, uses i-nodes only.

53
New cards

[APUE03] Which one of the following statements is NOT correct?

By convention, UNIX System shells associate file descriptor 0 with the standard input of a process.

By convention, UNIX System shells associate file descriptor 1 with the standard output of a process.

By convention, UNIX System shells associate file descriptor 2 with the standard error of a process.

This convention of the designation of the file descriptors 0,1,2 (of a running process) is a standard and feature of the UNIX kernel.

This convention of the designation of the file descriptors 0,1,2 (of a running process) is a standard and feature of the UNIX kernel.

54
New cards

[APUE03] With "lseek" call, which one of the following statements is NOT correct?

lseek only records the current file offset within the kernel

lseek does not cause any I/O to take place.

The current file offset after the lseek call can be then used by the next read or write operation.

The file's offset can be greater than the file's current size, in which case the next write to the file will extend the file.

Using the file's offset greater than the file's current size, one can create a hole

Using the file's offset greater than the file's current size, one can create a hole in a file and is not allowed as a legal file operation.

55
New cards

[APUE03] Which one of the following statements is NOT correct?

By convention, UNIX System shells associate three file descriptors and their values are standardized by POSIX.1.

In POSIX-compliant applications, file descriptor 0 is replaced with the symbolic constants STDERR_FILENO

For the file-descriptor constants, these constants (e.g., STDIN_FILENO) are defined in the header.

File descriptors range from 0 through OPEN_MAX - 1.

Early historical implementations of the UNIX System had

In POSIX-compliant applications, file descriptor 0 is replaced with the symbolic constants STDERR_FILENO

56
New cards

[APUE03] Which one of the following statements is NOT correct?

The UNIX System supports the sharing of open files among different processes.

The kernel uses three data structures to represent an open file, and the relationships among them determine the effect one process has on another with regard to file sharing.

Every process has an entry in the process table maintained by the kernel.

Within each process table entry is a table of open file descriptors

Associated with each file descriptor

Associated with each file descriptor are the file descriptor flags and a pointer to a file table entry, and inode.

57
New cards

[APUE03] Which one of the following statements is NOT correct? Consider the following dup and dup2 calls.

#include

int dup(int fd);

int dup2(int fd, int fd2);

The new file descriptor returned by dup is guaranteed to be the lowest-numbered available file descriptor.

With dup2, one specifies the value of the new descriptor with the fd2 argument.

With dup2, if fd2 is already open, it is first closed.

With dup2, if fd2 is already open, it will generate FD_CLOEXEC to close the file and

With dup2, if fd2 is already open, it will generate FD_CLOEXEC to close the file and then open it.

58
New cards

[APUE04] Which one of the following statements is not correct? Consider the file and/or directory access, and chmod command.

The chmod command is typically used to modify the six permission bits.

The chmod command allows one to specify u for user (owner), g for group, and o for other.

The three categories (read, write, and execute) are used in various ways by different functions with the chmod command.

Whenever we want to open any type of file by name, we must have execute permission in each di

The chmod command is typically used to modify the six permission bits.

59
New cards

[APUE04] Which one of the following statements is NOT correct?

Consider the following commands.$ ln -s /no/such/file myfile$ ls myfilemyfile$ cat myfilecat: myfile: No such file or directory$ ls -l myfilelrwxrwxrwx 1 sar 13 Jan 22 00:26 myfile -> /no/such/file

The "ln" command creates a symbolic link. Here a symbolic link is created to point a file named "myfile."

The file "myfile" does exist, yet cat says there is no such file, because "myfile" is a symbolic link.

Here the file pointed to by th

The "ln" command creates a symbolic link. Here a symbolic link is created to point a file named "myfile."

60
New cards

[APUE04] Every process has six or more IDs associated with it. This ____ determines one's file access permissions.

The real user ID and the real group ID

The effective user ID and the effective group ID

The saved set-user-ID and the saved set-group-ID

The virtual user ID and the virtual group ID

The system user ID and the system group ID

The effective user ID and the effective group ID

61
New cards

[APUE04] Which one of the following statements is NOT correct?

There are two types of links: hard link and symbolic link.

Any user can create a hard or symbolic link to a directory.

A symbolic link is an indirect pointer to a file.

A hard link points directly to the i-node of the file.

Hard links normally require that the link and the file reside in the same file system.

Any user can create a hard or symbolic link to a directory.

62
New cards

[APUE04] On contemporary systems, the use of ___ has been extended. The Single UNIX Specification allows this bit to be set for a directory. If this is set for a directory, a file in the directory can be removed or renamed only if the user has write permission for the directory and meets one of the following criteria: (a) Owns the file, (b) Owns the directory, and (c) Is the superuser.

the directory access bit

the user write bit

the user execute bit

the sticky bit

the special bit

the sticky bit

63
New cards

[APUE04] Which one of the following statements is NOT correct?

Consider the file and/or directory access. The file access tests that the kernel performs each time a process opens, creates, or deletes a file depend on the owners of the file (st_uid and st_gid), the effective IDs of the process (effective user ID and effective group ID), and the supplementary group IDs of the process, if supported. The two owner IDs are properties of the file, whereas the two effective IDs and the supplementar

If the process is executing the file, the user-execute bit must be on if the process group ID of the process equals the group ID of the file (i.e., the process group owns the file).

64
New cards

[APUE04] Every process has six or more IDs associated with it. ____ contain copies of the effective user ID and the effective group ID, respectively, when a program is executed.

The real user ID and the real group ID

The effective user ID and the effective group ID

The saved set-user-ID and the saved set-group-ID

The virtual user ID and the virtual group ID

The system user ID and the system group ID

The saved set-user-ID and the saved set-group-ID

65
New cards

[APUE04] Which one of the following statements is NOT correct?Consider the file and/or directory access, and chmod command.

To open the file /usr/include/stdio.h, we need execute permission in the directory /, execute permission in the directory /usr, and execute permission in the directory /usr/include.

If the current directory is /usr/include, then we need execute permission in the current directory to open the file stdio.h.

Read permission lets us read the directory, obtaining and searching

Read permission lets us read the directory, obtaining and searching through a list of all the filenames in the directory.

66
New cards

[APUE04] ___ is a type of file that points to another file.

Regular file

Directory file

Block Special file

Character Special file

FIFO

Socket

Symbolic link

Symbolic link

67
New cards

[APUE04] Which one of the following statements is NOT correct?

Symbolic links are typically used to ''move'' a file or an entire directory hierarchy to another location on a system.

If the function follows a symbolic link, a pathname argument to the function refers to the file pointed to by the symbolic link.

In all modern systems, chown does not follow symbolic links.

There are no file system limitations on a symbolic link and what it points to.

Anyone can create a symbolic link to a directo

In all modern systems, chown does not follow symbolic links.

68
New cards

[APUE04] ____ is a type of file providing unbuffered I/O access in variable-sized units to devices. All devices on a system are either block special files or character special files.

Regular file

Directory file

Block Special file

Character Special file

FIFO

Socket

Symbolic link

Character Special file

69
New cards

[APUE04] ____ is a type of file used for communication between processes. It's sometimes called a named pipe.

Regular file

Directory file

Block Special file

Character Special file

FIFO

Socket

Symbolic link

FIFO

70
New cards

[APUE04] ___ is a type of file used for network communication between processes. ___ can also be used for non-network communication between processes on a single host.

Regular file

Directory file

Block Special file

Character Special file

FIFO

Socket

Symbolic link

Socket

71
New cards

[APUE04] Which one of the following statements is NOT correct? Consider umask bits.

The umask value 0000 is to allow anyone to do read, write, or execute the files

The umask value 0002 is to prevent others from writing the files

The umask value 0022 is to prevent group members and others from writing the files

The umask value 0027 is to prevent group members from writing your files and others from reading, writing, or executing the files.

The umask value 0700 is to allow the user (owner) to

The umask value 0700 is to allow the user (owner) to read, write, or execute the files

72
New cards

[APUE04] Which one of the following statements is NOT correct?

Using mkdir command, testdir has been just created. Consider the figure below as a result.

The i-node whose number is 2549 has a type field of ''directory'' and a link count equal to 3.

Any leaf directory (a directory that does not contain any other directories) always has a link count of 2.

The value (the link count) of 2 for the i-node of 2549 comes from the directory entry that names the directory (testdir) and from the entry for

The i-node whose number is 2549 has a type field of ''directory'' and a link count equal to 3.

73
New cards

[APUE04] Every process has six or more IDs associated with it. ____ identify who we really are. These two fields are taken from our entry in the password file when we log in. Normally, these values don't change during a login session, although there are ways for a superuser process to change them.

The real user ID and the real group ID

The effective user ID and the effective group ID

The saved set-user-ID and the saved set-group-ID

The virtual user ID and the virtual group ID

The system user I

The real user ID and the real group ID

74
New cards

[APUE04] Every process has six or more IDs associated with it. The saved set-user-ID and saved set-group-ID contain copies of ___, respectively, when a program is executed.

The real user ID and the real group ID

The effective user ID and the effective group ID

The saved set-user-ID and the saved set-group-ID

The virtual user ID and the virtual group ID

The system user ID and the system group ID

The effective user ID and the effective group ID

75
New cards

[APUE04] Every process has six or more IDs associated with it. Normally, the effective user ID and the effective group ID equals ____ respectively.

The real user ID and the real group ID

The effective user ID and the effective group ID

The saved set-user-ID and the saved set-group-ID

The virtual user ID and the virtual group ID

The system user ID and the system group ID

The real user ID and the real group ID

76
New cards

[APUE04] ____ is a file that contains the names of other files and pointers to information on these files.Any process that has read permission for ____ can read the contents of the directory, but only the kernel can write directly to ____.Processes must use the functions described in this chapter to make changes to a directory.

Regular file

Directory file

Block Special file

Character Special file

FIFO

Socket

Symbolic link

Directory file

77
New cards

[APUE04] Which one of the following statements is not correct?Consider umask.

Most users of UNIX systems never deal with their umask value.

umask value is usually set once, on login, by the shell's start-up file, and never changed.

Writing programs that create new files, if we want to ensure that specific access permission bits are enabled, we must modify the umask value while the process is running.

To ensure that anyone can read a file, we should set the umask to 0777.

The umask value that

To ensure that anyone can read a file, we should set the umask to 0777.

78
New cards

[APUE04] Which one of the following statements is NOT correct? Consider the file and/or directory access.

The read permission for a file determines whether we can open an existing file for reading: the O_RDONLY and O_RDWR flags for the open function.

The write permission for a file determines whether we can open an existing file for writing: the O_WRONLY and O_RDWR flags for the open function.

We must have write permission for a file to specify the O_TRUNC flag in the open function.

We c

To delete an existing file, we need only the write permission for the file itself.

79
New cards

[APUE04] Which one of the following statements is NOT correct? Consider umask command.

Users can set the umask value to control the default permissions on the files they create.

The umask value is expressed in octal, with one bit representing one permission to be masked off.

With umask value, the permissions can be denied by setting the corresponding bits.

The Single UNIX Specification requires that the umask command support a symbolic mode of operation.

Like the octal format with umask comman

Like the octal format with umask command, the symbolic format specifies which permissions are to be denied (i.e., clear in the file creation mask) instead of which ones are to be denied (i.e., set in the file creation mask).

80
New cards

[APUE04] The directories /tmp and /var/tmp are typical candidates for ___. These are directories in which any user can typically create files. The permissions for these two directories are often read, write, and execute for everyone (user, group, and other). But users should not be able to delete or rename files owned by others.

the directory access bit

the user write bit

the user execute bit

the sticky bit

the special bit

the sticky bit

81
New cards

[APUE04] The ____ function sets the file mode creation mask for the process and returns the previous value.

access

chmod

mask

mode

umask

umask

82
New cards

[APUE04] Which one of the following statements is not correct? The stat function returns ___ of the following file information.

file type & mode (permissions)

i-node number (serial number)

v-node number

number of links

user ID of owner

size in bytes, for regular files

time of last access

time of last modification

v-node number

83
New cards

[APUE04] ____ is a type of file providing buffered I/O access in fixed-size units to devices such as disk drives.

Regular file

Directory file

Block Special file

Character Special file

FIFO

Socket

Symbolic link

Block Special file

84
New cards

[APUE04] Which one of the following statements is not correct?

Given a pathname, the stat function returns a structure of information about the named file.

Given a pathname, the fstat function obtains the information about the file that is already open on the descriptor.

Given a pathname, the lstat function is similar to stat, but when the named file is a symbolic link, lstat returns the information about the symbolic link, not the file referenced by the symbolic link.

Given a pathname, the

Given a pathname, the function nstat obtains the information about the named file.

85
New cards

[Process2] Including the initial parent process, the total number of the processes (in total) will be ____ after executing the code segment below. fork(); fork(); fork();

1

4

6

8

16

8

86
New cards

[Process2] After fork, the return value for the child is ___

-1

0

+1

a new process ID for the child process

the process id of the parent process

0

87
New cards

[Process2] Including the initial parent process, the total number of the processes (in total) will be ____ after executing the code segment below.

if (pid=fork() && pid2 = fork()) {fork();}

if (pid=fork() && pid2 = fork()) {fork();}

if (pid=fork() && pid2 = fork()) {fork();}

16

27

32

48

64

64

88
New cards

[Process2] By convention, UNIX System shells associate the file descriptor __ with the standard input of a process.

0

1

2

3

-1

0

89
New cards

[Process2] If a process needs a child process to do some of its work, it will call ___ to make a copy of the current process.

dup

clone

thread

fork

dup

fork

90
New cards

[Process2] By convention, all shells in Unix open ___ file descriptors whenever a new program is run.

0

1

2

3

4

as many as needed

3

91
New cards

[Process2] After fork, the differences between the parent and child are ____.

The return values from fork

The process IDs

The different parent process IDs

All of the above

None of the above

All of the above

92
New cards

[Process2] When a process calls this API call (or one of these API calls), that process is completely replaced by the new program, and the new program starts executing at its main function.

It merely replaces the current process its text, data, heap, and stack segments with a brand-new program from disk.

fork

exec

pipe

dup

system

exec

93
New cards

[Process2] ___ is a type of file that points to another file.

symbolic link

directory file

FIFO

pipe

dupe

symbolic link

94
New cards

[Process2] A process may do ___ with the signal

ignore the signal

let the default action occur

provide a function to handle the signal

all of the above

none of the above

all of the above

95
New cards

[Process2] Consider a code segment for a pipe (e.g., to run "ls | wc") as we discussed in the classes, shown below.

What would it be the code segment for the "parent" process here after the fork but before exec (of "ls" or "wc")?

close(pfd[0]); dup2(pfd[1], 1); close(pfd[1]);

close(pfd[0]); dup2(pfd[1], 0); close(pfd[1]);

close(pfd[1]); dup2(pfd[0], 1); close(pfd[0]);

close(pfd[1]); dup2(pfd[0], 0); close(pfd[0]);

close(pfd[0]); dup2(pfd[1], 1); close(pfd[1]);

96
New cards

[Process2] The ____ contains all the information about the file: the file type, the file's access permission bits, the size of the file, pointers to the file's data blocks, and so on.

cylinder

disk

file block

i-node

dup

i-node

97
New cards

[Process2] Including the initial parent process, the total number of the processes (in total) will be ____ after executing the code segment below. if (pid=fork()) {fork();}

if (pid=fork()) {fork();}

if (pid=fork()) {fork();}

8

9

16

27

32

27

98
New cards

[Process2] Signals provide a way of handling ___ events

deadlocked

racing

asynchronous

synchronous

idle-process

asynchronous

99
New cards

[Process2] The new file descriptor returned by dup is guaranteed to be the ___ numbered available file descriptor

lowest

highest

fixed

stack

arbitrary

lowest

100
New cards

[Sobell-process] Which one of the following choices is NOT one of the four columns of ps command normally displayed?

CMD

PID

TIME

TTY

USER

USER

Explore top flashcards

flashcards
Unit 5 AP Human Geo
71
Updated 1161d ago
0.0(0)
flashcards
BI EC Ch 1 Parts 3 & 4
24
Updated 210d ago
0.0(0)
flashcards
Chapter 14 1-12 History Study
81
Updated 1203d ago
0.0(0)
flashcards
Biomolecules
32
Updated 151d ago
0.0(0)
flashcards
catalan A1
132
Updated 845d ago
0.0(0)
flashcards
CH 40,41,42 vocab quiz
50
Updated 738d ago
0.0(0)
flashcards
1984 Vocab #1
20
Updated 1079d ago
0.0(0)
flashcards
Unit 5 AP Human Geo
71
Updated 1161d ago
0.0(0)
flashcards
BI EC Ch 1 Parts 3 & 4
24
Updated 210d ago
0.0(0)
flashcards
Chapter 14 1-12 History Study
81
Updated 1203d ago
0.0(0)
flashcards
Biomolecules
32
Updated 151d ago
0.0(0)
flashcards
catalan A1
132
Updated 845d ago
0.0(0)
flashcards
CH 40,41,42 vocab quiz
50
Updated 738d ago
0.0(0)
flashcards
1984 Vocab #1
20
Updated 1079d ago
0.0(0)