Chapter 2 – Operating System Overview
TRUE/FALSE QUESTIONS:
1) An OS should be constructed in such a way as to permit the effective development, testing, and introduction of new system functions without interfering with service. (True)
2) The OS masks the details of the hardware from the programmer and provides the programmer with a convenient interface for using the system. (True)
3) The ABI gives a program access to the hardware resources and services available in a system through the user ISA. (False)
4)The OS frequently relinquishes control and must depend on the processor to allow it to regain control. (True)
5)One of the driving forces in operating system evolution is advancement in the underlying hardware technology. (True)
…show more content…
SHORT ANSWER QUESTIONS:
1)An _____ operating system (OS _____ is a program that controls the execution of application programs and acts as an interface between applications and the computer hardware.
2) The portion of the monitor that is always in main memory and available for execution is referred to as the ____ resident monitor _____ .
3) ____ Multithreading ______ is a technique in which a process, executing an application, is divided into threads that can run concurrently.
4) Two major problems with early serial processing systems were scheduling and __ setup time _____ .
5) The central idea behind the simple batch-processing scheme is the use of a piece of software known as the ___ monitor ______ .
6) Any resource allocation and scheduling policy must consider three factors: Fairness, Differential responsiveness, and ____ Efficiency ______ .
7) A ___ timer _______ is set at the beginning of each job to prevent any single job from monopolizing the system.
8) The OS has five principal storage management responsibilities: process isolation, automatic allocation and management, support of modular programming, protection and access control, and _____ long-term storage _____ .
9) The earliest computers employed ____ serial ______ processing, a name derived by the way the users have access to the systems.
10) ____ Multiprogramming ______ was designed to keep the
2. Which of the following is an example of the hardware component of an information system?
The Operating System manages the flow of data and tells the processor what component needs to be doing. It does this my relaying one piece of information at a time but done so fast it seems it is doing it all at the same time. It does this by giving the information to the processer in computer language, so it can understand.
Assorted programs that direct the performance and computing functions for a specific or specialized use of Information Systems:
A computers operating system (OS) is the core of the computer and is more than just software. The OS controls the computer’s memory and processes as well as its hardware and software. It is the brain of the computer. Software applications on the other hand perform a certain task. Ex. Google Chrome provides internet and Adobe allows PDF files to be read (among other things). The OS is what makes all of these applications work successfully and accomplish whatever the application is designed to accomplish.
A computer is secure if you can depend on it and its software to behave as you expect I this assignment I will writer about how Linux provides security to you information. The major technical areas of computer security are usually represented by CIA confidentiality, integrity, and authentication or availability. It means that information cannot access by unauthorized people.
a. Mainframes or minicomputer system: In a mainframe or minicomputer system the resources to be taken care of are :
3. The Graphical Processing Unit is a hardware component capable of quickly drawing items to the screen.
i) CPU :CPU is an imparted aset as most servers, for example, file servers do some
1.13)Ans.Mainframe or Minicomputer: The resources which has to be managed carefully are memory and CPU resources and the network bandwidth,
Throughout the 1980’s, it became the pre-eminent operating systems of personal computers, until another operating system, DR-DOS, was released by a company called Digital Research. Critics claim that this operating system never had a chance at gaining a fair share of the market because Microsoft deliberately slowed DR-DOS’s sales by announcing a better version of MS-DOS was on its way (Newman).
b) The address and control buses are activated with a memory address position and read command.
12. Which of the following answers are true about an internal hard disk drive (HDD) as it is
4. (A) The ___________ approach to systems development has often been referred to as the "waterfall" model. a. SDLC b. prototyping c. RAD d. XP
When a CPU is composed of two or more processors, each one is referred to as a(n) ________.
Q1. In the description of the Hack machine language in chapter 4, it is stated that in well-written programs a C-instruction that may cause a jump should not contain a reference to M, and vice versa. Discuss why this should be avoided.