operating system bits

Upload: indraneel-ind

Post on 05-Apr-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/31/2019 Operating System Bits

    1/18

    OPERATING SYSTEM

    1. _______________________acts as mediator between user and hardware recourses

    2. _____________________________are the user applications that perform some useful task

    to the user

    3. Operating system upon booting takes the control of _______________________of the

    computer

    4. Mainly operating systems does the 2 roles they are___________________and

    _______________

    5. Operating systems is made up of __________________major components and they

    are__________________

    6. _______________________is the central part or core of the operating system

    7. _______________________is the portion of operating system that is loaded into ram during

    boot sequence and runs till system is shut down

    8. Shell forms command interpreter part of the operating system. It takes

    __________________from the user and translates it for the ______________

    9. ________________________are the software embedded into operating system to enhance

    the functionality

    10. Necessary features that designer of the operating system should have in mind are

    called.

    11. ______________________________and _____________________are main system goals

    12. Order which jobs in the queues are executed is determined by .

    13. Multiprogramming organizes jobs in such a way that CPU always has..

    14. ______________________is the feature of operating system that allows efficient usage of

    system resources

  • 7/31/2019 Operating System Bits

    2/18

  • 7/31/2019 Operating System Bits

    3/18

    33. ____________________________process has one program counter specifying location of

    next executable instruction

    34. Multi threaded processes have one_____________________per thread

    35. A _______________________is an instance of process under execution

    36. _________________________stores the address of next instruction to be fetched.

    37. The processes that are very critical for smooth running of the operating systems are called

    _______________________processes

    38. Processes that are initiated by user are called________________processes

    39. ____________________________provides mechanism for deadlock handling

    40. _________________________Process is suspended by operating system to make a way

    for_______________

    41. The processes or threads running together do not interfere with each other while sharing

    resources this phenomenon is called__________________

    42. _____________________________refers to the process of communication between

    various running processes

    43. A set of processes is said be________________________when each process is waiting for

    resource held by other.

    44. Temporarily taking memory space from the process or resource is

    called_____________________

    45. Operating system locally organize data on a storage medium in the for of

    ________________

    46. _________________________is defined as the way operating system organize data on a

    storage medium

    47. Files in the storage medium are organized into..

    48. We backup files onto.type of storage medium.

  • 7/31/2019 Operating System Bits

    4/18

    49. _____________________refers to the mechanism used by operating system which specify

    who can access which files

    50. ____________________process involves creating duplicate copy of critical data on to

    magnetic disk

    51. Discs are used to store the data for____________________period of time

    52. WORM means _______________________and RW indicates __________________type of

    memory.

    53. __________________________are the examples of storage medium whose performance

    do not effect overall performance

    54. Operating system hides __________________________of the hardware from user.

    55. Buffering is the process of _______________________________

    56. Caching is the process of

    57. The overlapping of one job with input of other jobs is process of

    _________________________

    58. SPOOL is an acronym for__________________________________

    59. Spooling refers to transferring data by placing it temporarily until a program is ready to

    _____________

    60. Printing uses ____________________mechanism

    61. The main difference between spooling and caching is______________________

    62. Small pieces of code that facilitate communication between operating system and

    hardware device is_____________________

    63. ___________________are used to make devices operating system compatible

    64. Operating system has several inherent _________________and ______________features.

    65. Controlling access to system and its resources done by_________________ mechanism of

    operating system.

  • 7/31/2019 Operating System Bits

    5/18

    66. Internal and external attacks can be defended by ______________________mechanism of

    operating system.

    67. _________________are few examples that can breach systems security.

    68. Enhancing users rights is done with_______________

    69. A file can be given to which user or a group is determined by______________________

    70. _________________________is a set of malicious code or program that can harm

    computer

    71. The mechanism that protects internal or confidential networks from insecure public access

    is called__________________________

    72. The ____________________server provides an interface to client to request services

    73. File server provides interface for clients to______________________________

    74. Home networks today are mostly________________________________

    75. The 2 main computing models that evolve over a period of time

    are______________________

    76. Client server models are extensively used in __________________environments

    77. Client server computing model is used where________________administration is required

    78. __________________model of computing environment is described as another model of

    distributed system

    79. In peer to peer environment a node can act as ______________________________

    80. In order to join peer to peer network a node must register itself with

    ____________________on network

    81. Another way a node can join peer to peer model is to broadcast request for service and

    respond to requests via ______________________

    82. Some of the main examples of peer to peer computing environments

    are________________

  • 7/31/2019 Operating System Bits

    6/18

    83. Peer to peer model is cumbersome in large network environments as it does not

    have____________________________

    84. ___________________________are new category devices to manage web traffic among

    several servers

    85. Load balancers ____________________the web traffic among identical servers

    86. If load balancers are not used then there is a chance for single sever to get overwhelmed

    with________________________

    87. ________________________________is a mechanism used by application program to

    request services from operating system

    88. System calls can be categorized into ____________________number of categories and

    they are______________

    89. Some of the popular system calls of UNIX or posix based systems

    are______________________

    90. Operating system provide _____________________on which applications can run.

    91. Main difficulty for operating system program is to make it follow____________________

    92. Failing to follow time constraints can lead to ______________________________________

    93. The interconnection of LAN, MAN and WAN is __________________________________

    94. Excessive integration of application programming tools into operating system can lead

    to____________

    95. In UNIX in order to start new process we should use the system call

    __________________and to run the new process it should succeed_____________system call.

    96. The call that is capable of closing current executing process is__________________

    97. _____________________call overlays new process

    98. In _________________kind of operating system user dont have direct access to computer

  • 7/31/2019 Operating System Bits

    7/18

    99. A piece of code that first loads into memory and which access system resources in batch

    operating system is ______________________

    100. In ______________operating system loads several programs simultaneously into memory

    101. _______________________kind of operating is efficient than_______________________

    102. __________________________operating systems see frequent CPU switching

    103. In _______ operating systems CPU time is judiciously divided between existing processes.

    104. In time sharing system operating system allocates the CPU time to uses job in

    short______________________

    105. Example of operating systems that support multiple users__________________________

    106. _________________________________is an example operating system which support

    both single and multiple users.

    107. A computing program that translates assembly language to object code

    is___________________

    108. _________________ converts source to machine understandable language.

    109. _____________________converts user commands to kernel understandable instructions

    110. A node that requests for services over network is called ____________________and that

    responds to the requests is_______________________

    111. Process of saving the PCB of one process and loading other is called__________________

    112. _________________________gives control of CPU to the process selected by short term

    scheduler

    113. The way operating system organize data on a storage media is called

    _________________famous of them were

    114. A ____________________contains memory that is dynamically allocated during runtime

    process.

    115. Excessive aging activity that degrades system performance is called___________________

  • 7/31/2019 Operating System Bits

    8/18

    116. An illusory memory that operating system creates to make program believe there exists

    bigger memory than ram is___________________

    117. _________________________can be described as core of operating system

    118. _________________________component that takes job from job queue to ready queue

    119. ____________is the property of operating system to run several processes concurrently

    120. ____________________________is the ability of operating system to rapidly switch tasks

    121. Collection of instructions on a disk is called_______________________________

    122. __________________________is the portion of memory that stores temporary data.

    123. Short term scheduler picks processes from_______________________queue

    124. An instance of running process is ____________________________

    125. Thread can be described as_______________________

    126. Time taken to execute a process is called______________________time

    127. Time taken for a process request and to get response is called______________________

    128. The sum of total times that a process sends waiting is called_____________________

    129. The critical management functions that operating system performs to manage memory

    resources is_________________________

    130. ____________________________sits between main memory and CPU registers.

    131. Program in most of the cases resides on_________________________memory

    132. CPU can access________________________only indirectly

    133. Any access that CPU makes to its internal registers is of __________________cycle

    134. Main memory takes many clock pulses because its ____________________to CPU

    135. the most frequently used instructions are stored in a memory called__________________

    136. _______________memory is fast and easily accessible enhancing performance of system

    137. Each running process resides in its own ______________following protection mechanism

    138. Both program and data are stored in__________________________

  • 7/31/2019 Operating System Bits

    9/18

    139. Memory consists of ____________________________each with its own address.

    140. ____________and ___________form first and last steps of CPU fetch and execute cycle.

    141. ________, _______ and ___________form 2nd

    3rd

    and 4th

    steps of CPU fetch and execute

    cycle.

    142. Each process runs in its ____________________of memory

    143. The concept of logical address that is_______________________to physical address is

    central to memory management.

    144. ____________register mars the beginning of the process and _____________register

    mars the limit of the process.

    145. CPU works in ______________________address space

    146. Memory refers to the_______________address space

    147. _____________________maps logical address to physical address.

    148. ________________register provides base address for a process bloc of physical memory

    148. The address generated by CPU during during process execution is____________________

    149. The actual address of physical or main memory is________________________

    150. __________is added to relocation register to get ________by memory management unit.

    151. The term ______________refers to replacing a process with needed in the memory

    152. The swapping of a process is done when process in memory is _________ or ___________

    or ___________.

    153. When ________play important role in swapping we use key words swap in and swap out

    in replacing

    154. When _________________lay important role in swapping we use keywords role in and

    role out in replacing

    155. _______________________is one solution for external fragmentation problem.

  • 7/31/2019 Operating System Bits

    10/18

    156. We have mainly __________ memory allocation schemes they are_______________

    157. Simplest memory allocation method is_______________________

    158. In __________memory allocation, the entire available bloc is considered one unit and is

    called____________.

    159. The process of allocating memory wherever it is available is called __________ allocation.

    160. We divide physical memory into fixed sized blocks called__________________

    161. We divide logical memory into blocs of equal size called_______________________

    162. To run a process of size n pages we need______________________free frames

    163. Every logical address generated by CPU consists of _____________and_____________

    164. Problem of external fragmentation occurs in _____________kind of memory allocation.

    165. _____________is one of the solution for external fragmentation but practically expensive.

    166. Offset number of logical address is also called_________________________number

    167. Paging does not overcome the problem of______________________

    168. If last frame of the process is partially filled it can lead to________________________

    169. in paging mechanism_______________________acts as memory management unit to ma

    from logical to physical address

    170. Page table size is_____________________________to frame size

    171. If frame size is kept small it can reduce_____________________________

    172. Frame contain protection bits which can be _______________or__________________

    173. If frame in logical address is legal to access it have ______bit set, if illegal ______bit is set.

    174. If an attempt is made to write to read only memory______________________signal is

    given to operating system citing ________________has occurred.

    175. .valid and invalid bits of the page are called_________________________

    176. In a page table valid bit is indicated with ______and invalid bit is indicated with ________

    177. __________________________kind of code can be stored without interference.

  • 7/31/2019 Operating System Bits

    11/18

    178. We can refer frame in main memory by different_____________________

    179. Paging offers distinction of___________________of common code.

    180. Sharing of code is mainly useful in _____________________environment.

    181. It is ___________________of operating system that page in access is not being removed.

    182. The table that keeps track of allocated and unallocated frames is called __________ table

    183. ___________________is the process of partitioning based on users view

    184. The central part of paging is differentiating ____________from________________

    185. ________________________segment size is core concept of segmentation;

    186. The users view of memory and_____________________are same

    187. Logical address can be described as collection of modules of varying length called______

    188. The attributes of the segment are________________and_________________

    189. Segmentation address consists of 2 parts namely ______________and________________

    190. Segment addresses are stored in ___________________

    191. The offset of logical address must be less than ________________in order to add it to the

    base address to generate_________________

    192. Each segment is _______________________from other segments

    193. The main setback of segmentation is________________________

    194. The code portion of a segment can be shared with other only if code is __________type

    or________________

    195. Sharing of segments is________________and easy.

    196. We can implement protection mechanism by _______________________in segmentation

    197. If segments contain____________________________ it can be easily shared.

    198. The three main reasons for a process to be replaced or do swapping from memory

    is_________________________

  • 7/31/2019 Operating System Bits

    12/18

    199. If logical address is greater than limit _______occurs and _________is sent to operating

    system

    200. _____________________________scheduler is responsible for swapping

    201. Page size is _____________________proportional to frame size which inurn is

    ___________________proportional to page table

    202. ________________________is memory management technique used by windows

    203. ______________is a illusory memory that operating system creates for running program

    204. Usage of ___________________disk page is central to the concept of virtual memory.

    205. Virtual memory can be implemented trough ____________and__________________

    206. The _____________________________never swaps page into memory till needed.

    207. The process of bringing process to memory on need is called_____________________

    208. If a page referenced is not found in memory _________________is said to have occurred.

    209 _______________________is the component swaps the page on need

    210. Lazy swapper is also called as_____________________

    211. A valid bit indicates that the page is in______________________and therefore legal to

    access and if invalid bit is set the page is______________________

    212. If page is not in processes legal address space then it is an indication that page is in______

    213. If a reference is made to the page that is no longer in memory then________________is

    said to have occurred.

    214. Operating system looks for_________________frame in memory in order to load page

    from_________

    215. The page table is ______________________to reflect any changes made to page

    216. ________________________algorithms decide which age to replace to make a way for

    needed page

    217. _______________________is done when there is no free frame in memory

  • 7/31/2019 Operating System Bits

    13/18

    218. ________________________when set indicates that page has been modified and changes

    should be written to disk

    219. Modify or dirty bits prevents__________________________

    220. If there is no free frame in memory then_____________________is used to select the

    victim page

    221. When a process has feasibility to select a replacement frame from set of all frames

    then_____________________said to exist.

    222. When process selects only set of frames for page replacement then its

    called_____________________

    223. If there are not enough pages for the process exists in the memory

    then__________________rate is very high

    224. High page fault diminishes____________________and lessens_____________________

    225. A process of busy aging in and out is__________________________

    226. High page fault rate leads to____________________

    227. High page fault leads to high _____________activity leading to phenomena___________

    228. If page faults go beyond______________________point results in trashing.

    229. _____memory can be described as abstract view of memory and _______is real memory

    230. When CPU utilizations 10% and disk utilization is 90% then________________is high

    and_______________is going on

    231. If CPU utilization is 84% and disk utilization is 6% then describe the situation

    232. If CPU utilization is 10% and disk utilization is 6% then___________is taking place and we

    can_____________________

    233. Page faults can be divided into__________________and_____________________

    234. The page fault where the faulted age can be found elsewhere in physical memory then its

    called_____________

  • 7/31/2019 Operating System Bits

    14/18

    235. The page fault where accessing of page need disk access is called___________________

    236. ___________fault creates significant overhead and delay than_____________________

    237. Fill the appropriate path in windows to view page faults Run__________

    Then in performance monitor click + button. And select ____________from dropdown to view

    page fault related information.

    238. In windows performance of virtual memory can be affected by changing ________ settings

    239. Fill the appropriate path for accessing virtual memory settings

    Right click my

    computerproperties___________performance___________advancedvirtual

    memory

    240. Each process has unique id called_________________

    241. ________________help us in tracing the process

    242. In process hierarchy of UNIX each process is related in ____________kind of relationship

    243. A process of creating child by running process is called__________________

    244. Various parameters that processes have include_________________________

    245. Process states in UNIX are_____________________

    246. Each process is represented in the operating system by__________________________

    247. ______________________contains information associated with process

    248. The state that the process is currently in is called_____________________

    249. The_____________________ points to the address of next information to be executed.

    250. The data stored in CPU in various____________________

    251. The _____________of registers play an important role in process interruption and running

    252. The ____________usually include information such as when the processes was last run,

    CPU time it taken etc

    253. The _____information include which I/O devices were allotted, if process has open files etc

  • 7/31/2019 Operating System Bits

    15/18

    254. There are mainly ____________number of scheduling queues and they are___________

    255. The handling of various scheduling queues is done by_____________________

    256. When a new process is created it is admitted to________________queue

    257. The ________________________is the component that takes each job from job queue

    and admits it to the ready queue

    258. The queue that contains several processes waiting for CPU time is________________

    259. The _______is the component that picks job from ready queue and allocate CPU time to it.

    260. There are mainly 2 conditions for a running process to get back to ready state they are

    _________

    261. In ready queue processes are stored in the form of____________________

    262. The ready queue contains pointers to________________________pcbs

    263. In ready queue each PCB points to_________________in the list.

    264. ________________ selects processes from queues.

    265. There are mainly _________________number of schedulers and they are_____________

    266. Job scheduler is also called_____________________________

    267. Short term schedulers are also called_________________________

    268. ___________________scheduler decides degree of multi programming

    269. _________________ scheduler selects the processes from queue on algorithms such as

    round robin and fcfs

    270. CPU picks processes from CPU scheduler based on_____________________algorithms

    271. In ___________________environment CPU does context switching so rapidly so that user

    gets feel of interactive computing.

    272. Context switching is the processes of__________________________

    273. The number of state that the a processor usually be in are________and they are________

  • 7/31/2019 Operating System Bits

    16/18

    274. When a processes is forcibly made to relinquish the CPU is___________scheduling and

    when it voluntarily gives u its called_______________scheduling

    275. Non preemptive scheduling is also called______________

    276. When a process switches from________________to_____________state or terminated it

    is said to follow non preemptive scheduling.

    277. The time that dispatcher to stop one and start another process is

    called____________________

    278. Jumping to proper location in the user program to restart the program is done

    by______________

    279. _____________________if large can cause overhead with dispatcher

    280. The CPU time taken by a process is called______________________

    281. When processes with short CPU times wait behind that of long CPU bursts then the effect

    is called________________________

    282. ______________________scheduling associates picking of a process on the basis of CPU

    bursts.

    283. In _____________________scheduling algorithm when a new process arrives with cpu

    burst less than remaining time of current executing process, preemption occur

    284. _____________________algorithm gives minimum average waiting time for a given set of

    processes.

    285. When two jobs arrive with same CPU bursts in SRTF then tie is broken

    by______________algorithm

    287. Shortest job first non preemptive scheduling algorithm is better than________________

    288. in each processes waiting in a ready queue has____________________in priority

    scheduling algorithm

    289. In priority scheduling algorithm job is assigned to CPU based on_________________

  • 7/31/2019 Operating System Bits

    17/18

    290. The priority is ________value and lowers the priority number____________is the priority.

    291. In windows operating system ________________processes have highest priority and that

    have low priority is ________________processes

    292. The indefinite wait by a low priority processes by CPU time is called___________________

    293. ________________is the phenomena which increases priority of the processes with time.

    294. The process of starvation can be prevented with the help of________________________

    295. The scheduling that gives process certain elapsed time, after which it is added to the ready

    queue is called________________________scheduling

    296. If there are n processes and quantum or elapsed time is q then processes

    gets_______________of CPU time and no processes gets more than ___________units of time

    297. When time quantum in round robin scheduling is very high then it

    becomes______________algorithm

    298. The time slice given to each processes in round robin scheduling is called.

    299. When CPU burst of processes is less than time quantum in round robin scheduling no

    __________________________is required.

    300. In ____________________scheduling algorithm the ready queue is grouped into

    foreground and background processes

    301. In multilevel queue scheduling algorithm foreground processes are also called

    as________________and background processes are also called as_______________

    302. The groups of ready queue can have their own ____________________in multilevel

    queue scheduling.

    303. Each queue can be assigned a quantum of CPU time it is generally______________% for

    foreground and___________% for background in multilevel queue scheduling algorithm.

    304. Usually ________________________processes have high priority

    than______________processes in multilevel queue scheduling algorithms.

  • 7/31/2019 Operating System Bits

    18/18

    305. Multilevel queue scheduling algorithms lack flexibility to_________________________

    306. In ____________________________scheduling algorithms processes can be moved from

    one group to other within ready queue.

    307. ________________________is one form of aging where the priority of low priority

    processes is automatically raised.

    308. A ________________ processes can perform more than one process at a time.

    309. ______________________of multiple threads of single process remain same.

    310. In multi threaded processes each thread has separate____________________

    311. Resource sharing allows threads to share_____________________

    312. The overhead of context switching between ____________________ is far less than

    context switching between__________________

    313. _______________________environment can give great boost to overall performance of

    the system.

    314. With threads the economy and performance of the process can be optimized as threads

    can easily_________________

    315. Support for threads in the operating system can be done in ________ levels and they

    are____________

    316. ______________are responsible for programmer API for creating and managing threads.

    317. We can implement thread library at two levels they are______________________

    318. Total running threads can be seen in windows by path

    Task managerperformance_________________

    319. Windows operating system uses ______________________ type of threads

    320. Context switching overhead will be high in _______________ level threads.

    ALL THE BEST