記憶度
6問
18問
0問
0問
0問
アカウント登録して、解答結果を保存しよう
問題一覧
1
It exploits the hardware resources of one or more processors to provide a set of services to system users. The ______ also manages secondary memory and I/O
Operating System
2
Controls the operation of the computer and performs its data processing functions. When there is only one processor, it is often referred to as the central processing unit (CPU).(input/output) devices on behalf of its users.
Processor
3
Stores data and programs. This memory is typically volatile; that is, when the computer is shut down, the contents of the memory are lost.
Main memory
4
Move data between the computer and its external environment. The external environment consists of a variety of devices, including secondary memory devices (e. g., disks), communications equipment, and terminals.
I/O modules
5
Provides for communication among processors, main memory, and I/O modules.
System Bus
6
Enable the machine or assembly language programmer to minimize main memory references by optimizing register use.
User-visible registers
7
Used by the processor to control the operation of the processor and by privileged OS routines to control the execution of programs.
Control and Status registers
8
______can be assigned to a variety of functions by the programmer. In some cases,they are general purpose in nature and can be used with any machine instruction that performs operations on data.
Data registers
9
It contain main memory addresses of data and instructions, or they contain a portion of the address that is used in the calculation of the complete or effective address
Address registers
10
it is a common mode of addressing that involves adding an index to a base value to get the effective address.
Index register
11
With segmented addressing,memory is divided into segments, which are variable-length blocks of words.
Segment Pointer
12
If there is user-visible stack2 addressing, then there is a dedicated register that points to the top of the stack.This allows the use of instructions that contain no address field, such as push and pop.
Stack Pointer
13
Contains the address of the next instruction to be fetched
Program Counter (PC)
14
Contains the instruction most recently fetched
Instruction Register (IR)
15
(also referred to as flags) are bits typically set by the processor hardware as the result of operations.
Condition codes
16
Data may be transferred from processor to memory or from memory to processor.
Processor-memory
17
Data may be transferred to or from a peripheral device by transferring between the processor and an I/O module.
Processor-I/O
18
The processor may perform some arithmetic or logic operation on data.
Data processing
19
An instruction may specify that the sequence of execution be altered.
Control
20
is a program that controls the execution of application programs and acts as an interface between applications and the computer hardware.
OS
21
An OS makes a computer more convenient to use.
Convenience
22
An OS allows the computer system resources to be used in an efficient manner.
Efficiency
23
An OS should be constructed in such a way as to permit the effective development, testing, and introduction of new system functions without interfering with service.
Ability to evolve
24
The OS provides a variety of facilities and services, such as editors and debuggers, to assist the programmer in creating programs.
Program Development
25
A number of steps need to be performed to execute a program. Instructions and data must be loaded into main memory, I/O devices and files must be initialized, and other resources must be prepared.
Program Execution
26
Each I/O device requires its own peculiar set of instructions or control signals for operation. The OS provides a uniform interface that hides these details so that programmers can access such devices using simple reads and writes.
Access to I/O devices
27
For file access, the OS must reflect a detailed understanding of not only the nature of the I/O device (disk drive, tape drive) but also the structure of the data contained in the files on the storage medium.
Controlled access to files
28
For shared or public systems, the OS controls access to the system as a whole and to specific system resources. The access function must provide protection of resources and data from unauthorized users and must resolve conflicts for resource contention.
System Access
29
A variety of errors can occur while a computer system is running. These include internal and external hardware errors, such as a memory error, or a device failure or malfunction; and various software errors, such as division by zero, attempt to access forbidden memory location.
Error detection and response
30
Most installations used a hardcopy sign-up sheet to reserve computer time.Typically, a user could sign up for a block of time in multiples of a half hour or so.
Scheduling
31
A single program, called a job, could involve loading the compiler plus the high-level language program (source program) into memory, saving the compiled program (object program) and then loading and linking together the object program and common functions
Setup time
32
The central idea behind the simple batch-processing scheme is the use of a piece of software known as the _____
Monitor
33
The monitor controls the sequence of events.
Monitor point of view
34
For this to be so, much of the monitor must always be in main memory and available for execution. that portion is referred to as the______
Resident monitor
35
At a certain point, the processor is executing instructions from the portion of main memory containing the monitor. These instructions cause the next job to be read into another portion of main memory.
Processor point of view
36
This is a special type of programming language used to provide instructions to the monitor
job control language
37
While the user program is executing, it must not alter the memory area containing the monitor. If such an attempt is made, the processor hardware should detect an error and transfer control to the monitor. The monitor would then abort the job, print out an error message, and load in the next job.
Memory Protection
38
A ____ is used to prevent a single job from monopolizing the system. The ____ is set at the beginning of each job. If the ___ expires, the user program is stopped, and control returns to the monitor.
Timer
39
Certain machine level instructions are designated privileged and can be executed only by the monitor. If the processor encounters such an instruction while executing a user program, an error occurs causing control to be transferred to the monitor.
Privileged Instructions
40
Early computer models did not have this capability. This feature gives the OS more flexibility in relinquishing control to and regaining control from user programs.
Interrupts
41
A user program executes in a ______, in which certain areas of memory are protected from the user’s use and in which certain instructions may not be executed.
User mode
42
The monitor executes in a system mode, or what has come to be called ______, in which privileged instructions may be executed and in which protected areas of memory may be accessed.
kernel mode
43
________ allows the processor to handle multiple batch jobs at a time, ________ can also be used to handle multiple interactive jobs.
Multiprogramming
44
Just as multiprogramming allows the processor to handle multiple batch jobs at a time, multiprogramming can also be used to handle multiple interactive jobs. In this latter case, the technique is referred to as ______, because processor time is shared among multiple users.
Time sharing
45
In a ________, multiple users simultaneously access the system through terminals, with the OS interleaving the execution of each user program in a short burst or quantum of computation.
time-sharing system
46
It is primitive compared to present-day time sharing, but it worked. It was extremely simple, which minimized the size of the monitor.
CTSS approach