Ch5-8 cps590

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/99

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

100 Terms

1
New cards

When a new block of data is read into the cache the __________ determines which cache location the block will occupy.

mapping function

2
New cards

Most operating systems contain two fundamental forms of concurrent activity: processes and _________ .

interrupts

3
New cards

A process or task in Linux is represented by a __________ data structure.

task_struct

4
New cards

The Clouds operating system implements the concept of a thread as primarily an entity that can move among address spaces which represents the __________ Thread-to-Process relationship.

clouds operating system

5
New cards

It is necessary to __________ the activities of various threads so they do not interfere with each other or corrupt data structures.

synchronize

6
New cards

The basic form of communication between processes or threads in a microkernel operating system is _________ .

message

7
New cards

The management of multiple processes within a uniprocessor system is __________ .

A) multiprogramming

B) structured applications

C) distributed processing

D) multiprocessing

multiprogramming

8
New cards

A situation in which a runnable process is overlooked indefinitely by the scheduler, although it is able to proceed, is __________ .

A) mutual exclusion

B) deadlock

C) starvation

D) livelock

starvation

9
New cards

The requirement that when one process is in a critical section that accesses shared resources, no other process may be in a critical section that accesses any of those shared resources is _________ .

A) critical section

B) livelock

C) mutual exclusion

D) atomic operation

mutual exclusion

10
New cards

A means for two processes to exchange information is with the use of ___________ .

A) spinlocks

B) event flags

C) condition variables

D) messages

messages

11
New cards

A semaphore that does not specify the order in which processes are removed from the queue is a _________ semaphore.

A) weak

B) general

C) strong

D) binary

weak

12
New cards

A _________ occurs when multiple processes or threads read and write data items so that the final result depends on the order of execution of instructions in the multiple processes.

A) atomic operation

B) race condition

C) livelock

D) deadlock

race condition

13
New cards

A _________ is an integer value used for signaling among processes.

A) semaphore

B) message

C) mutex

D) atomic operation

semaphore

14
New cards

_________ is when the sequence of instruction is guaranteed to execute as a group, or not execute at all, having no visible effect on system state.

A) Critical section

B) Mutual exclusion

C) Atomic operation

D) Starvation

Atomic operation

15
New cards

__________ are memory words used as a synchronization mechanism.

A) Semaphores

B) Event flags

C) Counting semaphores

D) Mailboxes

Event flags

16
New cards

The term _________ refers to a technique in which a process can do nothing until it gets permission to enter its critical section but continues to execute an instruction or set of instructions that tests the appropriate variable to gain entrance.

A) spin waiting

B) general semaphore

C) critical resource

D) message passing

spin waiting

17
New cards

A _________ is a data type that is used to block a process or thread until a particular condition is true.

A) deadlock

B) general semaphore

C) condition variable

D) mutex

condition variable

18
New cards

A semaphore whose definition includes the policy that the process that has been blocked the longest is released from the queue first is called a __________ semaphore.

A) general

B) strong

C) weak

D) counting

strong

19
New cards

The _________ is a programming language construct that provides equivalent functionality to that of semaphores and is easier to control.

A) atomic operation

B) coroutine

C) critical section

D) monitor

monitor

20
New cards

Probably the most useful combination, __________ allows a process to send one or more messages to a variety of destinations as quickly as possible.

A) blocking send, blocking receive

B) nonblocking send, blocking receive

C) nonblocking send, nonblocking receive

D) blocking send, nonblocking receive

nonblocking send, blocking receive

21
New cards

A __________ relationship allows multiple server processes to provide concurrent service to multiple clients.

A) many-to-many

B) one-to-many

C) many-to-one

D) one-to-one

many-to-many

22
New cards

_________ arises in three different contexts: multiple applications, structured applications, and operating system structure.

concurrency

23
New cards

_________ was invented to allow processing time to be dynamically shared among a number of active applications.

multiprogramming

24
New cards

A situation in which two or more processes are unable to proceed because each is waiting for one of the others to do something is a __________ .

deadlock

25
New cards

In the case of competing processes three control problems must be faced: mutual exclusion, deadlock, and __________ .

starvation

26
New cards

A ___________ is a semaphore that takes on only the values of 0 and 1.

binary

27
New cards

A situation in which multiple threads or processes read and write a shared data item and the final result depends on the relative timing of their execution is a __________ .

race condition

28
New cards

__________ is a function or action implemented as a sequence of one or more instructions that appears to be indivisible; no other process can see an intermediate state or interrupt the operations.

atomic operation

29
New cards

A __________ is a programming language construct that encapsulates variables, access procedures, and initialization code within an abstract data type.

monitor

30
New cards

_________ is a section of code within a process that requires access to shared resources and that must not be executed while another process is in a corresponding section of code.

critical section

31
New cards

In the case of __________ , processes are sharing resources without being aware of the other processes.

competition

32
New cards

A _________ is a mutual exclusion mechanism in which a process executes in an infinite loop waiting for the value of a lock variable to indicate availability.

spinlocks

33
New cards

Only three operations may be performed on a semaphore: initialize, increment, and __________ .

Decrement

34
New cards

A monitor supports synchronization by the use of __________ that are contained within the monitor and accessible only within the monitor.

condition variables

35
New cards

In the case of _________ , messages are not sent directly from sender to receiver but rather are sent to a shared data structure consisting of queues that can temporarily hold messages.

indirect addressing

36
New cards

The classic concurrency problem that involves multiple readers that can read from a shared data area when no single writer is exclusively writing to it is the _________ Problem.

readers/writers

37
New cards

_________ can be defined as the permanent blocking of a set of processes that either compete for system resources or communicate with each other.

Deadlock

38
New cards

A _________ resource is one that can be safely used by only one process at a time and is not depleted by that use.

Reusable

39
New cards

A _________ resource is one that can be created and destroyed.

Consumable

40
New cards

The _________ is a directed graph that depicts a state of the system of resources and processes, with each process and each resource represented by a node.

Resource Allocation Graph

41
New cards

Three conditions of policy must be present for a deadlock to be possible: mutual exclusion, no preemption, and _________ .

Hold and Wait

42
New cards

Three general approaches exist for dealing with deadlock: prevent, avoid, and __________ .

Detect

43
New cards

__________ allows the three necessary conditions but makes judicious choices to assure that the deadlock point is never reached.

Avoidance

44
New cards

The strategy of resource allocation denial is referred to as the ___________ .

Banker's Algorithm

45
New cards

The _________ of the system reflects the current allocation of resources to processes.

State

46
New cards

_________ strategies are very conservative and solve the problem of deadlock by limiting access to resources and by imposing restrictions on processes.

Prevention

47
New cards

Inspired by the concept of co-routines, a _________ is a circular buffer allowing two processes to communicate on the producer-consumer model.

Pipe

48
New cards

Two types of atomic operations are defined in Linux: integer operations and __________ .

Bitmap Operations

49
New cards

Linux provides three types of semaphore facilities in the kernel: binary semaphores, counting semaphores, and __________ .

Reader-Writer Semaphores

50
New cards

An executable entity within a process is a __________ object.

Thread

51
New cards

A program invocation, including the address space and resources required to run the program is a __________ object.

Process

52
New cards

In a uniprogramming system main memory is divided into two parts.

True

53
New cards

The use of unequal size partitions provides a degree of flexibility to fixed partitioning.

True

54
New cards

In a multiprogramming system the available main memory is not generally shared among a number of processes.

False

55
New cards

Programs in other processes should not be able to reference memory locations in a process for reading or writing purposes without permission.

True

56
New cards

The memory protection requirement must be satisfied by the operating system rather than the processor.

False

57
New cards

Any protection mechanism must have the flexibility to allow several processes to access the same portion of main memory.

True

58
New cards

Secondary memory provides fast access at relatively high cost.

False

59
New cards

A hardware mechanism is needed for translating relative addresses to physical main memory addresses at the time of execution of the instruction that contains the reference.

True

60
New cards

In a multiprogramming environment the programmer knows at the time of coding how much space will be available and where that space will be.

False

61
New cards

Overlay programming wastes programmer time.

True

62
New cards

The principal operation of memory management is to bring processes into main memory for execution by the processor.

True

63
New cards

A physical address is the location of a word relative to the beginning of the program and the processor translates that into a logical address.

True

64
New cards

The best-fit algorithm is usually the worst performer.

True

65
New cards

All segments of all programs must be of the same length.

False

66
New cards

Segmentation does not eliminate internal fragmentation.

False

67
New cards

The task of subdividing memory to accommodate multiple processes is carried out dynamically by the operating system and is known as ___________ .

memory management

68
New cards

A __________ is a variable length block of data that resides in secondary memory.

Segment

69
New cards

In a practice known as _________ , the program and data are organized in such a way that various modules can be assigned the same region of memory with a main program responsible for switching the modules in and out as needed.

overlaying

70
New cards

A __________ is an actual location in main memory.

physical address

71
New cards

A fixed length block of data that resides in secondary memory is a __________ .

Page

72
New cards

When there is wasted space internal to a partition due to the fact that the block of data loaded is smaller than the partition is referred to as __________.

internal fragmentation

73
New cards

_________ in a computer system is organized as a linear, or one-dimensional, address space, consisting of a sequence of bytes or words.

main memory

74
New cards

A _________ is a fixed length block of main memory.

Frame

75
New cards

As time goes on, memory becomes more and more fragmented and memory utilization declines, creating a phenomenon referred to as _________ .

External Fragmentation

76
New cards

A compromise to overcome the disadvantages of fixed partitioning and dynamic partitioning is the __________ .

Buddy System

77
New cards

A __________ is a reference to a memory location independent of the current assignment of data to memory.

Logical Address

78
New cards

The __________ shows the frame location for each page of the process.

Page Table

79
New cards

A __________ can occur as a result of a programming error when a process attempts to store data beyond the limits of a fixed-sized buffer and consequently overwrites adjacent memory locations.

Buffer Overflow

80
New cards

Countermeasures to defend systems against attacks can be classified into two categories: compile-time defenses and _________ .

Run-Time Defenses

81
New cards

The basic tools of memory management are paging and __________ .

segmentation

82
New cards

The size of virtual storage is limited by the actual number of main storage locations.

False

83
New cards

The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify physical storage sites.

True

84
New cards

Most of the memory management issues confronting the operating system designer are in the area of paging when segmentation is combined with paging.

True

85
New cards

Segmentation is not visible to the programmer.

False

86
New cards

The placement policy determines where in real memory a process piece is to reside.

True

87
New cards

Virtual memory allows for very effective multiprogramming and relieves the user of the unnecessarily tight constraints of main memory.

True

88
New cards

The principle of locality states that program and data references within a process do not tend to cluster.

False

89
New cards

The smaller the page size, the greater the amount of internal fragmentation.

False

90
New cards

The design issue of page size is related to the size of physical main memory and program size.

True

91
New cards

Segments may be of unequal, indeed dynamic, size.

True

92
New cards

The page currently stored in a frame may still be replaced even when the page is locked.

False

93
New cards

One way to counter the potential performance problems of a variable-allocation global scope policy is to use page buffering.

True

94
New cards

The PFF policy evaluates the working set of a process at sampling instances based on elapsed virtual time.

False

95
New cards

A precleaning policy writes modified pages before their page frames are needed so that pages can be written out in batches.

True

96
New cards

UNIX is intended to be machine independent; therefore its memory management scheme will vary from one system to the next.

True

97
New cards

The address assigned to a location in virtual memory to allow that location to be accessed as though it were part of main memory is the __________ .

virtual address

98
New cards

_________ is a storage allocation scheme in which secondary memory can be addressed as though it were part of main memory.

virtual memory

99
New cards

The size of virtual storage is limited by the addressing scheme of the computer system and by the amount of __________ available.

secondary memory

100
New cards

The __________ policy treats the page frames allocated to a process as a circular buffer and pages are removed in round robin style.

FIFO