暗記メーカー
ログイン
Principles of Operating System
  • Cristy Vega

  • 問題数 46 • 10/11/2023

    記憶度

    完璧

    6

    覚えた

    18

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    It exploits the hardware resources of one or more processors to provide a set of services to system users. The ______ also manages secondary memory and I/O

    Operating System

  • 2

    Controls the operation of the computer and performs its data processing functions. When there is only one processor, it is often referred to as the central processing unit (CPU).(input/output) devices on behalf of its users.

    Processor

  • 3

    Stores data and programs. This memory is typically volatile; that is, when the computer is shut down, the contents of the memory are lost.

    Main memory

  • 4

    Move data between the computer and its external environment. The external environment consists of a variety of devices, including secondary memory devices (e. g., disks), communications equipment, and terminals.

    I/O modules

  • 5

    Provides for communication among processors, main memory, and I/O modules.

    System Bus

  • 6

    Enable the machine or assembly language programmer to minimize main memory references by optimizing register use.

    User-visible registers

  • 7

    Used by the processor to control the operation of the processor and by privileged OS routines to control the execution of programs.

    Control and Status registers

  • 8

    ______can be assigned to a variety of functions by the programmer. In some cases,they are general purpose in nature and can be used with any machine instruction that performs operations on data.

    Data registers

  • 9

    It contain main memory addresses of data and instructions, or they contain a portion of the address that is used in the calculation of the complete or effective address

    Address registers

  • 10

    it is a common mode of addressing that involves adding an index to a base value to get the effective address.

    Index register

  • 11

    With segmented addressing,memory is divided into segments, which are variable-length blocks of words.

    Segment Pointer

  • 12

    If there is user-visible stack2 addressing, then there is a dedicated register that points to the top of the stack.This allows the use of instructions that contain no address field, such as push and pop.

    Stack Pointer

  • 13

    Contains the address of the next instruction to be fetched

    Program Counter (PC)

  • 14

    Contains the instruction most recently fetched

    Instruction Register (IR)

  • 15

    (also referred to as flags) are bits typically set by the processor hardware as the result of operations.

    Condition codes

  • 16

    Data may be transferred from processor to memory or from memory to processor.

    Processor-memory

  • 17

    Data may be transferred to or from a peripheral device by transferring between the processor and an I/O module.

    Processor-I/O

  • 18

    The processor may perform some arithmetic or logic operation on data.

    Data processing

  • 19

    An instruction may specify that the sequence of execution be altered.

    Control

  • 20

    is a program that controls the execution of application programs and acts as an interface between applications and the computer hardware.

    OS

  • 21

    An OS makes a computer more convenient to use.

    Convenience

  • 22

    An OS allows the computer system resources to be used in an efficient manner.

    Efficiency

  • 23

    An OS should be constructed in such a way as to permit the effective development, testing, and introduction of new system functions without interfering with service.

    Ability to evolve

  • 24

    The OS provides a variety of facilities and services, such as editors and debuggers, to assist the programmer in creating programs.

    Program Development

  • 25

    A number of steps need to be performed to execute a program. Instructions and data must be loaded into main memory, I/O devices and files must be initialized, and other resources must be prepared.

    Program Execution

  • 26

    Each I/O device requires its own peculiar set of instructions or control signals for operation. The OS provides a uniform interface that hides these details so that programmers can access such devices using simple reads and writes.

    Access to I/O devices

  • 27

    For file access, the OS must reflect a detailed understanding of not only the nature of the I/O device (disk drive, tape drive) but also the structure of the data contained in the files on the storage medium.

    Controlled access to files

  • 28

    For shared or public systems, the OS controls access to the system as a whole and to specific system resources. The access function must provide protection of resources and data from unauthorized users and must resolve conflicts for resource contention.

    System Access

  • 29

    A variety of errors can occur while a computer system is running. These include internal and external hardware errors, such as a memory error, or a device failure or malfunction; and various software errors, such as division by zero, attempt to access forbidden memory location.

    Error detection and response

  • 30

    Most installations used a hardcopy sign-up sheet to reserve computer time.Typically, a user could sign up for a block of time in multiples of a half hour or so.

    Scheduling

  • 31

    A single program, called a job, could involve loading the compiler plus the high-level language program (source program) into memory, saving the compiled program (object program) and then loading and linking together the object program and common functions

    Setup time

  • 32

    The central idea behind the simple batch-processing scheme is the use of a piece of software known as the _____

    Monitor

  • 33

    The monitor controls the sequence of events.

    Monitor point of view

  • 34

    For this to be so, much of the monitor must always be in main memory and available for execution. that portion is referred to as the______

    Resident monitor

  • 35

    At a certain point, the processor is executing instructions from the portion of main memory containing the monitor. These instructions cause the next job to be read into another portion of main memory.

    Processor point of view

  • 36

    This is a special type of programming language used to provide instructions to the monitor

    job control language

  • 37

    While the user program is executing, it must not alter the memory area containing the monitor. If such an attempt is made, the processor hardware should detect an error and transfer control to the monitor. The monitor would then abort the job, print out an error message, and load in the next job.

    Memory Protection

  • 38

    A ____ is used to prevent a single job from monopolizing the system. The ____ is set at the beginning of each job. If the ___ expires, the user program is stopped, and control returns to the monitor.

    Timer

  • 39

    Certain machine level instructions are designated privileged and can be executed only by the monitor. If the processor encounters such an instruction while executing a user program, an error occurs causing control to be transferred to the monitor.

    Privileged Instructions

  • 40

    Early computer models did not have this capability. This feature gives the OS more flexibility in relinquishing control to and regaining control from user programs.

    Interrupts

  • 41

    A user program executes in a ______, in which certain areas of memory are protected from the user’s use and in which certain instructions may not be executed.

    User mode

  • 42

    The monitor executes in a system mode, or what has come to be called ______, in which privileged instructions may be executed and in which protected areas of memory may be accessed.

    kernel mode

  • 43

    ________ allows the processor to handle multiple batch jobs at a time, ________ can also be used to handle multiple interactive jobs.

    Multiprogramming

  • 44

    Just as multiprogramming allows the processor to handle multiple batch jobs at a time, multiprogramming can also be used to handle multiple interactive jobs. In this latter case, the technique is referred to as ______, because processor time is shared among multiple users.

    Time sharing

  • 45

    In a ________, multiple users simultaneously access the system through terminals, with the OS interleaving the execution of each user program in a short burst or quantum of computation.

    time-sharing system

  • 46

    It is primitive compared to present-day time sharing, but it worked. It was extremely simple, which minimized the size of the monitor.

    CTSS approach