![四川大學(xué)操作系統(tǒng)選擇題_第1頁](http://file4.renrendoc.com/view/24c276a98305089ec5995067d64ba315/24c276a98305089ec5995067d64ba3151.gif)
![四川大學(xué)操作系統(tǒng)選擇題_第2頁](http://file4.renrendoc.com/view/24c276a98305089ec5995067d64ba315/24c276a98305089ec5995067d64ba3152.gif)
![四川大學(xué)操作系統(tǒng)選擇題_第3頁](http://file4.renrendoc.com/view/24c276a98305089ec5995067d64ba315/24c276a98305089ec5995067d64ba3153.gif)
![四川大學(xué)操作系統(tǒng)選擇題_第4頁](http://file4.renrendoc.com/view/24c276a98305089ec5995067d64ba315/24c276a98305089ec5995067d64ba3154.gif)
![四川大學(xué)操作系統(tǒng)選擇題_第5頁](http://file4.renrendoc.com/view/24c276a98305089ec5995067d64ba315/24c276a98305089ec5995067d64ba3155.gif)
版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報或認(rèn)領(lǐng)
文檔簡介
1、第一章The general role of an operating system is to:選擇一個答案Provide a set of services to system usersManage files for application programsAct as an interface between various computers與None of the above 土Information that must be saved prior to the processor transferring control to the interrupt handler ro
2、utine includes: 選擇一個答案Processor Status Word (PSW) & Contents ofprocessor registersNone of the above Processor Status Word (PSW) Processor Status Word (PSW) & Locationof next instruction In a uniprocessor system, multiprogramming increases processor efficiency by:選擇一個答案Increasing processor speedElimi
3、nating all idle processor cyclesAll of the above 比Taking advantage of time wasted by longwait interrupt handling/As one proceeds down the memory hierarchy (i.e., from inboard memory to offline storage), the following condition(s) apply: 選擇一個答案Decreasing capacityIncreasing cost per bitIncreasing acce
4、ss timeAll of the aboveSmall, fast memory located between the processor and main memory is called 選擇一個答案Cache memory /CD-RW memory *WORM memory /None of the above彳When a new block of data is written into cache memory, the following determines which cache location the block will occupy: 選擇一個答案Cache s
5、ize 才None of the above QWrite policyBlock size The four main structural elements of a computer system are: 選擇一個答案Processor, Registers, Main Memory &System Bus /None of the aboved. Processor, Registers, I/O Modules & Main Memory 萬Processor, Main Memory, I/O Modules &System Bus /The two basic types of
6、 processor registers are: 選擇一個答案None of the above TOC o 1-5 h z User-visible and user-invisibleregisters工Control and Status registersUser-visible and Control/StatusregistersAddress registers may contain選擇一個答案Memory addresses of instructions元Partial memory addressesMemory addresses of dataAll of the
7、above /A Control/Status register that contains the address of the next instruction to be fetched is called the: 選擇一個答案Program Counter (PC) / TOC o 1-5 h z Program Status Word (PSW)Instruction Register (IR)All of the above .學(xué)The two basic steps used by the processor in instruction processing are: 選擇一
8、個答案Fetch and Instruction cycles丁Instruction and Execute cyclesFetch and Execute cycles /None of the above 學(xué)A fetched instruction is normally loaded into the:選擇一個答案Instruction Register (IR)/Accumulator (AC)None of the aboveProgram Counter (PC) 用A common class of interrupts is選擇一個答案I/OTimerAll of the
9、above /Program 上When an external device becomes ready to be serviced by the processor, the device sends this type of signal to the processor:選擇一個答案Halt signalNone of the aboveHandler signalInterrupt signal /One accepted method of dealing with multiple interrupts is to: 選擇一個答案Define priorities for th
10、e interrupts/Service them in round-robin fashionNone of the aboveDisable all interrupts except those of highest priority乂第二章A primary objective of an operating system is: 選擇一個答案Ability to evolveConvenienceEfficiencyAll of the above /The paging system in a memory management system provides for dynami
11、c mapping between a virtual address used in a program and: 選擇一個答案A virtual address in main memoryA real address in main memory None of the aboveA real address in a programRelative to information protection and security in computer systems, access control typically refers to:選擇一個答案The flow of data wi
12、thin the systemProving that security mechanisms perform accordingto specificationNone of the aboveRegulating user and process access to various aspectsof the system A common problem with full-featured operating systems, due to their size and difficulty of the tasks they address, is:選擇一個答案Sub-par per
13、formanceAll of the above vLatent bugs that show up in the fieldChronically late in deliveryA technique in which a process, executing an application, is divided into threads that can run concurrently is called: 選擇一個答案Symmetric multiprocessing (SMP)MultiprocessingNone of the aboveMultithreading /WIN2K
14、 supports several types of user applications, including: 選擇一個答案None of the aboveSystem 10LinuxWIN32 /Key to the success of Linux has been it s character as a free software packageavailable under the auspices of the: 選擇一個答案World Wide Web ConsortiumBerkeley Software DistributionFree Software Foundatio
15、n ,None of the aboveOperating systems must evolve over time because選擇一個答案All of the aboveHardware must be replaced when it failsNew hardware is designed and implementedin the computer system /Users will only purchase software that hasa current copyright dateThe operating system is unusual in it選擇一個答
16、案s role as a control mechanism, in that:None of the aboveIt never relinquishes control of the system processorIt frequently relinquishes control of the system processor and must depend on the processor to regain control of the system /It runs on a special processor, completely separated from the res
17、t of the systemThe operating system provides many types of services to end-users, programmers and system designers, including:選擇一個答案Relational database capabilities with the internal file systemBuilt-in user applicationsError detection and response /All of the aboveA major problem with early serial
18、processing systems was: 選擇一個答案Inability to get hardcopy outputLack of input devicesAll of the aboveSetup time /An example of a hardware feature that is desirable in a batch-processing system is選擇一個答案A completely accessible memory areaLarge clock cyclesNone of the abovePrivileged instructions/A compu
19、ter hardware feature that is vital to the effective operation of a multiprogramming operating system is: 選擇一個答案All of the aboveI/O interrupts and DMA /Very large memoryMultiple processorsThe principle objective of a time sharing, multiprogramming system is to 選擇一個答案Provide exclusive access to hardwa
20、reMaximize response timeNone of the above Maximize processor useWhich of the following major line of computer system development created problems in timing and synchronization that contributed to the development of the concept of the process?選擇一個答案Real time transaction systemsAll of the above /Multi
21、programming batch operation systemsTime sharing systemsWhich of the following major line of computer system development created problems in timing and synchronization that contributed to the development of the concept of the process?選擇一個答案Real time transaction systemsMultiprogramming batch operation
22、 systemsAll of the above /Time sharing systems第三章The behavior of a processor can be characterized by examining: 選擇一個答案The interleaving of the process traces/A single process traceMultiple process tracesAll of the aboveThe Process Image element that contains the modifiable part of the user space is c
23、alled the:選擇一個答案a.None of the aboveUser ProgramProcess Control BlockSystem StackThe processor execution mode that user programs typically execute in is referred to as:選擇一個答案System modeKernel modeUser mode (None of the aboveOne step in the procedure for creating a new process involves: 選擇一個答案Allocati
24、ng space for the processAssigning a unique identifierAll of the above /Initializing the process control blockA process switch may occur when the system encounters an interrupt condition, such as that generated by a:選擇一個答案Memory faultTrapAll of the above Supervisor callIn the Process Based O/S:選擇一個答案
25、Major kernel functions are organized asseparate functions /None of the aboveO/S code and data are contained inthe shared address spaceThe User Process Image includes a kernel stackIn a typical UNIX system, the element of the process image that contains the processor status information is the: 選擇一個答案
26、Register context /System-level contextAll of the aboveUser-level contextThe behavior of an individual process can be characterized by examining: 選擇一個答案All of the aboveMultiple process tracesThe interleaving of the process tracesA single process trace /The basic Two-State Process Model defines two po
27、ssible states for a process in relationship to the processor: 選擇一個答案Running and ExecutingExecuting and WaitingRunning and Not Running /None of the aboveThere are a number of conditions that can lead to process termination, including:選擇一個答案All of the above Bounds violationNormal completionParent term
28、inationIn the Five-State Process Model, the following represents a valid state transition:選擇一個答案New - RunningRunning - Blocked .All of the aboveNew - BlockedIn a Process Model that implements two suspend states, a valid state transition is represented by: 選擇一個答案Running - Ready/SuspendReady - Ready/S
29、uspendAll of the above vReady/Suspend - ReadyThe scheduling strategy where each process in the queue is given a certain amount of time, in turn, to execute and then returned to the queue, unless blocked is referred to as:選擇一個答案PrioritizationRound-Robin /LIFOAll of the aboveA Memory Table is an O/S c
30、ontrol structure that is used by the O/S to: 選擇一個答案Provide information about system filesManage I/O devicesNone of the above/Manage processesThe Process Image element that contains the collection of attributes needed by the O/S to control a particular process is called the: 選擇一個答案System StackNone of
31、 the aboveProcess Control Block ,User Data第四章The concept of a process in an operating system embodies two primary characteristics, one of which is:選擇一個答案Resource ownership /None of the aboveMultithreadingSymmetric multiprocessingEarly operating systems that were designed with little concern about st
32、ructure are typically referred to as:選擇一個答案Monolithic operating systems /All of the aboveKernel operating systemsLayered operating systemsA benefit of the microkernel organization is:選擇一個答案FlexibilityPortabilityExtensibilityAll of the above /In low-level microkernel memory management, an example of
33、an operation that can support external paging and virtual memory management is the: 選擇一個答案Map operationAll of the above /Flush operationGrant operationIn a W2K system, the state that a thread enters when it has been unblocked and the resource for which it has been blocked is not yet available is cal
34、led the:選擇一個答案None of the aboveStandby stateWaiting stateTransition state /In a Solaris system, a User-Level Thread (ULT) that enters the active state is assigned to a:選擇一個答案Light-Weight Process (LWP) /Heavy-Weight Process (HWP)Kernel threadNone of the aboveAn example of a system that implements a s
35、ingle process with multiple threads is:選擇一個答案All of the aboveJava /SolarisWIN 2000Which of the following is true regarding the relationship between processes and threads:選擇一個答案All of the aboveIt takes far less time to create a new thread in an existing process than to create a new process/It takes l
36、ess time to switch between two different processes than to switch between two threads within the same processIt takes less time to terminate a process than a threadThe basic thread operation related to the change in thread state that occurs when a thread needs to wait for an event is referred to as
37、the: 選擇一個答案Spawn operationUnblock operationBlock operation /None of the aboveOne of the disadvantages of User-Level Threads (ULTs) compared to Kernel-Level Threads (KLTs) is: 選擇一個答案When a ULT executes a system call, all threads in the process are blocked /Thread switching does not require kernel mod
38、e privilegesAll of the aboveScheduling is application specificIn the Linux O/S, multiple threads may be created and executed within a single process. This is an example of the following Thread-to-Process relationship: 選擇一個答案1:11:MM:NNone of the above /The computer system category where a single proc
39、essor executes a single instruction stream to operate on data stored in a single memory is called: 選擇一個答案Single Instruction Multiple Data (SIMD) streamMultiple Instruction Single Data (MISD) streamSingle Instruction Single Data (SISD) stream1tNone of the aboveIn a SMP system, each processor maintain
40、s a local cache and must alert all other processors that a change to cache update has taken place. This is referred to as the: 選擇一個答案Synchronization mechanism problemCache coherency problem /Interconnection mechanism problemNone of the aboveKey issues involved in the design of multiprocessor operati
41、ng systems include:選擇一個答案All of the above /SynchronizationReliability and fault toleranceSchedulingIn a Linux system, when a new process is cloned, the two processes share the same:選擇一個答案All of the aboveProcess identifiertask_struct data structureVirtual memory /第五章Concurrency plays a major part in
42、which of the following specific contexts: 選擇一個答案Multiple applicationsStructured applicationsO/S structureAll of the above /In order to implement mutual exclusion on a critical resource for competing processes, only one program at a time should be allowed 選擇一個答案To Exhibit cooperationIn the critical s
43、ection of the program/To perform message passingNone of the aboveThe following requirement must be met by any facility or capability that is to provide support for mutual exclusion: 選擇一個答案Only one process at a time can be allowed into a criticalcode sectionNo assumptions can be made about relative p
44、rocess speedsA process remains in its critical code section for a finite time onlyAll of the above /Processes that are designed to be able to pass execution control back and forth between themselves are referred to as 選擇一個答案Coroutines /Busy waiting processesNone of the above d. ThreadsIn a uniproces
45、sor system, mutual exclusion can be guaranteed by 選擇一個答案All of the aboveInterleaving processesDisabling interrupts /Overlapping processesA semaphore that does not specify the order in which processes are removed from the queue is called a 選擇一個答案None of the aboveWeak semaphoreStrong semaphoreBinary s
46、emaphoreThe finite circular buffer is used to implement which of the following basic queuing strategies 選擇一個答案FILOFIFO /LIFONone of the aboveA chief characteristic of a monitor is: 選擇一個答案A maximum of two processes may be executing in a monitor at a timeAll of the aboveA process enters the monitor by
47、 invoking one of its procedures /Local data variables of the monitor are accessible by any procedure requesting use of the monitorIn synchronization involving message passing, the sender of a message can be選擇一個答案Either blocking or non-blockingAll of the aboveOnly non-blockingOnly blockingIn a system
48、 employing message passing, when a message is sent to a shared temporary data structure, this general approach is known as 選擇一個答案None of the aboveDirect addressingIndirect addressing /BlockingIn a system employing message passing, the typical message is divided into two primary sections 選擇一個答案None o
49、f the above /Destination ID and Source IDHeader and mailboxBody and mailboxThe Reader/Writer problem requires that certain conditions be satisfied, such as:選擇一個答案Multiple writers may write to the file simultaneouslyAny number of readers may simultaneously read from the fileReaders may read from the
50、file while writers are writing to itAny number of readers may simultaneously read from the fileNone of the aboveA reason why the Producer/Consumer problem cannot be considered a special case of the Reader/Writer problem with a single writer (the producer) and a single reader (the consumer) is: 選擇一個答
51、案None of the aboveThe Producer/Consumer problem doesn t deal with concurrency issuesThe producer and consumer must be both reader and writer/The consumer must perform writes while the reader performs readsExamples of solutions to the concurrency problem that do not involve busy waiting are the follo
52、wing:選擇一個答案Message passing and cachingNone of the above Semaphores and monitorsProducers and consumersA basic echo procedure (that echoes a typed character to the screen) running on a multiprocessor system can produce erroneous output if 選擇一個答案Access to the echo procedure is unsynchronized/None of t
53、he aboveAccess to the echo procedure is synchronizedTwo processes deadlock while in the echo code第六章The permanent blocking of a set of processes that either compete for system resources or communicate with each other is called: 選擇一個答案All of the aboveDeadlock StarvationPrioritizationIn deadlocked pro
54、cess recovery, selection criteria for choosing a particular process to abort or rollback includes designating the process with the: 選擇一個答案All of the above Lowest priorityMost estimated time remainingLeast total resources allocated so farOne approach to an integrated strategy for dealing with deadloc
55、ks involves the implementation of:選擇一個答案Resource classesNone of the aboveProcess rollbacksVirtual memoryThe Dining Philosopher s Problem is a standard tesase for evaluating approaches to implementing:選擇一個答案All of the aboveDeadlockSynchronization /StarvationA software mechanism that informs a process
56、 of the occurrences of asynchronous events in UNIX are called:選擇一個答案Signals /MessagesPipesAll of the aboveThread synchronization primitives supported by Solaris include: 選擇一個答案All of the above /SemaphoresCondition variablesMutual exclusion (mutex) locksThe family of synchronization objects implement
57、ed by W2K include: 選擇一個答案All of the above /Mutex objectsSemaphore objectsEvent objectsAll deadlocks involve conflicting needs for resources by:選擇一個答案Three or more processesTwo or more processesNone of the aboveOne or more processesA resource that can be created and destroyed is called a:選擇一個答案Consum
58、able resource /Producible resourceReusable resourceAll of the aboveAn example of a consumable resource is the following:選擇一個答案PrintersMessagesAll of the aboveMain MemoryA condition of policy that must be present for a deadlock to be possible is: 選擇一個答案No preemptionMutual exclusionAll of the above/Ho
59、ld and waitA direct method of deadlock prevention is to prevent the occurrence of: 選擇一個答案Circular wait .Hold and waitMutual exclusionAll of the aboveIn the Resource Allocation Denial approach to Deadlock Avoidance, a safe state is defined as one in which:選擇一個答案At least one potential process sequence
60、 does not result in a deadlockAll potential process sequences do not result in a deadlock:None of the aboveSeveral potential process sequences do not result in a deadlock:A conservative strategy for dealing with deadlocks that involves limiting access to resources and imposing restrictions on proces
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- DB37-T 4491-2021 三倍體單體牡蠣淺海筏式養(yǎng)殖技術(shù)規(guī)范
- 2025年度煤炭公司股權(quán)轉(zhuǎn)讓暨環(huán)保升級合作協(xié)議
- 保姆協(xié)議書集錦-@-1
- 專屬約定寫合同范本
- 工藝美術(shù)顏料行業(yè)發(fā)展趨勢預(yù)測考核試卷
- 家用紡織品市場價值鏈分析考核試卷
- 農(nóng)業(yè)機械化在糧食安全中的貢獻(xiàn)考核試卷
- 公家建房合同范本
- 冷鏈倉庫托管合同范例
- 醫(yī)療設(shè)備租賃行業(yè)競爭分析考核試卷
- 9這點挫折算什么(課件)-五年級上冊生命與健康
- 價格監(jiān)督檢查知識培訓(xùn)課件
- 駐場保潔方案
- 中國心理衛(wèi)生協(xié)會家庭教育指導(dǎo)師參考試題庫及答案
- 智能廣告投放技術(shù)方案
- 知識產(chǎn)權(quán)保護(hù)執(zhí)法
- 高質(zhì)量社區(qū)建設(shè)的路徑與探索
- 數(shù)字化時代的酒店員工培訓(xùn):技能升級
- 足球守門員撲救技巧:撲救結(jié)合守護(hù)球門安全
- 《學(xué)術(shù)規(guī)范和論文寫作》課件全套 第1-10章 知:認(rèn)識研究與論文寫作 - 引文規(guī)范
- 起重機更換卷筒施工方案
評論
0/150
提交評論