Chapter 1 Answers - Tutorial Work - What Are The Four Components Of A Computer System? PDF

Title Chapter 1 Answers - Tutorial Work - What Are The Four Components Of A Computer System?
Author Tyler Vaught
Course Operating Systems
Institution Western Governors University
Pages 4
File Size 98 KB
File Type PDF
Total Downloads 37
Total Views 166

Summary

Chapter 1 Exercise with Answers
...


Description

Section 1.1 1.1 What are the four components of a computer system?

Hardware, Operating System, Application Programs, Users 1.2 Provide at least three resources the operating system allocates.    

CPU Time Memory Space File-Storage Space I/O Devices

1.3 What is the common name used to refer to the operating system program? Kernel 1.4 What do mobile operating systems often include in addition to the core kernel? Middleware – a set of frameworks that provide additional services to application developers Section 1.2 1.5 What is an interrupt? The occurrence of an event signaled from either software or hardware. 1.6 What special operation triggers a software interrupt? System call aka Monitor Call 1.7 What is one advantage of using a solid state disk over a magnetic disk? Generally faster than HDD and are nonvolatile 1.8 What is the difference between volatile and nonvolatile storage? Volatile – loses contents when power is removed. Nonvolatile – retains contents when power is lost Section 1.3 1.9 What is another term for multiprocessor system? Parallel or Multicore 1.10 Provide at least two advantages of multiprocessor systems.   

Increased Throughput Economy of Scale Increased Reliability

1.11 True or False? The most common multiple-processor system uses asymmetric multiprocessing. False

1.12 What is the name of a multiprocessor system that uses multiple computing cores? Multicore 1.13 How does a clustered system differ from a multicore system? Multicore – Multiple cores on a single chip Clustered – Gathers together multiple CPU (multiple chips) Section 1.4 1.14 How does multiprogramming increase CPU utilization? By organizing jobs (code and data) so that the CPU always has one to execute 1.15 What is the term for a program that has been loaded and is executing? Process 1.16 What part of the operating system makes the decision with regards to which job will run? CPU Scheduling Section 1.5 1.17 What are the two separate modes of operation? User Mode and Kernel 1.18 What is the mode of the system at boot time? Kernel 1.19 What is the mode of the system when the operating system gains control? User Mode 1.20 What is the mode of the system when a user program is running? User Mode Section 1.6 1.21 Name at least two activities the operating system is responsible for in connection with process management.  

Scheduling processes and threads on the CPU(s) Creating and deleting both user and system processes

Section 1.7 1.22 Name at least two activities the operating system is responsible for in connection with memory management.  

Keeping track which parts of memory are currently being used and who is using them Deciding which processes and data to move into and out of memory

Section 1.8 1.23 True or False? Managing files is one of the most visible aspects of an operating system. True 1.24 Name at least two activities the operating system is responsible for in connection with file management.  

Creating and deleting files Creating and deleting directories to organize files

1.25 Name at least two activities the operating system is responsible for in connection with disk management.   

File-space management Storage Allocation Disk Scheduling

1.26 Of the following five forms of storage, rank them from fastest to slowest in terms of access time: (1) main memory, (2) magnetic disk, (3) registers, (4) solid state disk, (5) cache. 1. 2. 3. 4. 5.

Registers Cache Main Memory Solid State Disk Magnetic Disk

Section 1.9 1.27 What is the difference between protection and security? Protection – controls access of process or users to resources defined by the computing system Security – Defends a system from external and internal attacks Section 1.10 1.28 List at least four common kernel data structures. 1. 2. 3. 4.

Links, Stacks & Queues Trees Hash functions and Maps Bitmaps

1.29 True or False? A bitmap of length N can be used to represent the status of 2N items. False Only N items NOT 2N Section 1.11 1.30 List at least five different types of computing environments. 1. 2. 3. 4.

Traditional Computing Mobile Computing Distributed Systems Client-Server

Section 1.12 1.31 Provide an example of an open source operating system. Linux...


Similar Free PDFs