四川大学操作系统选择题
- 格式:docx
- 大小:106.23 KB
- 文档页数:32
计算机专业基础综合操作系统(进程管理)历年真题试卷汇编2(总分:96.00,做题时间:90分钟)一、单项选择题(总题数:28,分数:56.00)1.单项选择题下列各题的备选答案中,只有一个是符合题意的。
__________________________________________________________________________________________2.下列几种关于进程的叙述,____最不符合操作系统对进程的理解。
【浙江大学2003年】A.进程是在多程序并行环境中的完整的程序√B.进程可以由程序、数据和进程控制块描述C.线程是一种特殊的进程D.进程是程序在一个数据集合上运行的过程,是系统进行资源分配和调度的一个独立单位综合考查进程的相关概念。
进程是程序在一个数据集合上运行的过程,是系统进行资源分配和调度的一个独立单位,不是完整程序,程序是在时间上按严格次序前后相继的操作序列,是一个静态的概念。
3.下面关于并发性的论述中,正确的是____。
【太原科技大学2006年】A.并发性是指若干个事件在同一时刻发生B.并发性是指若干个事件在不同时刻发生C.并发性是指若干个事件在同一时间间隔内发生√D.并发性是指若干个事件在不同时间间隔内发生考查并发性的定义,注意与并行性相区分。
并发性是指两个或多个事件在同一时间间隔内发生;并行性是指两个或多个事件在同一时刻发生。
4.并发进程指____。
【北京理工大学2002年】A.可平行执行的进程√B.可先后执行的进程C.可同时执行的进程D.不可中断的进程考查并发进程的定义。
并发进程是在同一时间段内运行。
从宏观上看,进程之间不是先后执行,而是平行执行;从微观上看,进程之间不是同时执行,而是按时间片轮转交替执行。
5.下面对进程的描述中,错误的是____。
A.进程是动态的集合B.进程有生命期C.进程是指令的集合√D.进程可以并发执行考查进程的概念。
6.一个进程释放了一台打印机后,有可能改变____的状态。
1 选择题1.FAT能描述文件的_____特征。
A.文件逻辑结构B.文件物理结构C.文件共享D.文件保护2.文件的符号名与物理地址的转换是通过_____来实现的。
A.索引B.索引节点C.文件目录D.二级索引3.在UNIX文件系统中,为了对磁盘空间的空闲块进行有效的管理,采用的方法是______。
A.空闲表B.成组链接法C.FATD.位示图法4.为了防止系统故障造成文件系统被破坏,通常采用_____方法来保护文件。
A.二次转储B.随机转储C.定时转储D.虚拟转储5.为了实现对文件的共享访问,在读写文件时需对文件加锁。
现在已有一个用户对某文件进行了读加锁,则另一个用户对该文件的_____加锁操作可以成功。
A.加读锁和写锁均不能成功 B.加读锁能成功C.加读锁和写锁均能成功D.加写锁能成功6.操作系统实现文件管理后,允许用户对流式文件进行存取的最小单位是_____。
A.数据项B.记录C.文件D.字符7.文件系统采用多级目录结构可以_____。
A.解决命名冲突B.节省存储空间C.缩短文件传送时间D.减少系统开销8.有关文件管理的下述叙述中_____是正确的。
A.一个文件不能同时多次建立B.在一级目录结构中,不同用户可以用相同的文件名C.文件系统主要是实现按名存取D.逻辑记录的大小与存储介质块的大小必须一一对应9.文件系统是指______。
A.文件的集合B.实现文件管理的一组软件C.文件的目录D.文件及其属性、管理文件的软件和文件系统接口10.文件系统的主要目的是_____。
A.实现对文件的按名存取B.实现虚拟存储C.提高外存的读/写速度D.用于存储系统文件11.下列_____属于文件的逻辑结构。
A.连续文件B.系统文件C.库文件D.流式文件12.操作系统实现文件管理后,用户对记录式文件进行存取的最小单位是_____。
A.扇区B.字节C.目录D.记录13.为了实现对文件系统中的文件进行安全管理,任何一个用户在进入系统时都必须进行注册,这一安全管理是_____安全管理措施。
计算机专业基础综合操作系统(进程管理)历年真题试卷汇编1计算机专业基础综合操作系统(进程管理)历年真题试卷汇编1 (总分:78.00,做题时间:90分钟)一、单项选择题(总题数:29,分数:58.00)1.单项选择题下列各题的备选答案中,只有一个是符合题意的。
(分数:2.00)_______________________________________________________________________ ___________________解析:2.在某系统中有4个并发进程,都需要同类资源5个,问该系统不会发生死锁的最少资源数是____个。
【南京航空航天大学2006年】(分数:2.00)?A.20?B.9?C.17?√?D.12解析:解析:考查死锁。
当4个并发进程分别占用4个同类资源时,且都在等待第5个资源时,系统发生死锁。
这时再增加1个资源,则有1个进程将得到第5个资源并执行:这个进程运行结束后释放资源,其余进程就可以陆续执行。
所以系统有17个资源时可以保证不会发生死锁。
3.在下列死锁的解决方法中,属于死锁预防策略的是____。
【太原科技大学2006年】(分数:2.00)?A.家算法?B.资源有序分配算法?√?C.死锁检测算法?D.资源分配图化简法解析:解析:考查死锁的预防策略。
其中家算法为死锁避免算法,死锁检测算法和资源分配图化简法为死锁检测,根据排除法可以得出资源有序分配算法为死锁预防策略。
4.在____的情况下,系统出现死锁。
【浙江大学2003年】(分数:2.00)?A.计算机系统发生重大故障?B.有多个封锁的进程同时存在?C.若干进程因竞争资源而无休止地相互等待对方释放已占有资源?√?D.资源数大大小于进程数或进程同时申请的资源数大大超过资源总数解析:解析:考查死锁的基本概念。
5.引入多道程序技术的前提条件之一是系统具有____。
【四川大学2001年】(分数:2.00)?A.多个CPU?B.多个终端?C.中断功能?√?D.分时功能解析:解析:考查引入多道程序设计技术的条件。
【关键字】知识第一章1.诺依曼体制的主要思想:①采用二进制代码表示信息②采用保存程序工作方式(核心概念)③计算机硬件系统由五大部件(保存器、运算器、控制器、输入\出设备)组成2.cache:高速缓存,为解决CPU 与主存之间的速度匹配而设置的保存器。
位于CPU 和主存之间,速度可以与CPU 一样快,存放的是最近就要使用的程序和数据,容量较小。
3.总线:一组连接多个部件的公共信号线,可以分时地接收与发送各部件的信息。
4.通道:也称为通道控制器,能够执行专用的通道命令,是管理I/O 操作的控制部件。
5.从组成角度划分的层次结构模型:并不具备这种语言功能。
7.软硬件逻辑等价:在计算机中,有许多功能可直接由硬件实现,也可在硬件支持下依靠软件实现,对用户而言,在功能上是等价的。
这种情况称为软硬件在功能上的逻辑等价。
例如,乘法运算可由硬件乘法器实现,也可以在加法器与移位器的支持下,通过执行乘法子程序实现。
8.固件:微程序类似于软件,但被固化在只读保存器中,属于硬件CPU 的范畴,称为固件。
9.字长:基本字长一般是指参加一次定点运算的操作数的位数。
基本字长影响计算机精度、硬件成本,甚至指令系统的功能。
10.数据通路宽度:指数据总线一次能并行传送的数据位数,它影响计算机的有效处理速度。
11.数据传输率:是指数据总线每秒钟传送的数据量,也称为数据总线的带宽。
数据传输率=总线数据通路宽度×总线时钟频率/8(B/s )第二章1.计算机中的信息分为两大类,一类是计算机处理的对象,称为数据;另一类是控制计算机工作的信息,称为控制信息。
相应地,在计算机工作时将存在数据流、控制流两类信息流。
2.在原码表示中,真值0可以有两种不同的表示形式,分别称为+0和-0.对于整数原码,表示的数的范围是3.在补码表示中,数0只有一种表示方法00 0对于定点整数补码,表示的数的范围是4.所谓浮点数的规格化,就是通过移动尾数,使尾数M 绝对值的最高位数字为1。
操作系统典型题目讲解09年考研操作系统试题21.假设某计算机的存储系统由Cache和主存组成,某程序执行过程中访存1000次,其中访问Cache缺失(未命中)50次,则Cache的命中率是(D) A.5% B.9.5% C.50% D.95%22.下列选项中,能引起外部中断的事件是(A)A.键盘输入B.除数为0 C.浮点运算下溢D.访存缺页23.单处理机系统中,可并行的是DI 进程与进程II 处理机与设备III 处理机与通道IV 设备与设备A.I、II和III B. I、II和IV C. I、III和IV D. II、III和IV 24.下列进程调度算法中,综合考虑进程等待时间和执行时间的是 D A.时间片轮转调度算法B.短进程优先调度算法C.先来先服务调度算法D.高响应比优先调度算法25.某计算机系统中有8台打印机,有K个进程竞争使用,每个进程最多需要3台打印机。
该系统可能会发生死锁的K的最小值是 C A.2 B.3 C.4 D.526.分区分配内存管理方式的主要保护措施是AA.界地址保护B.程序代码保护C.数据保护D.栈保护27.一个分段存储管理系统中,地址长度为32位,其中段号占8位,则最大段长是C A.2的8次方字节B.2的16次方字节 C.2的24次方字节 D.2的32次方字节28.下列文件物理结构中,适合随机访问且易于文件扩展的是B A.连续结构 B.索引结构C.链式结构且磁盘块定长D.链式结构且磁盘块变长29.假设磁头当前位于第105道,正在向磁道序号增加的方向移动。
现有一个磁道访问请求序列为35,45,12,68,110,180,170,195,采用SCAN调度(电梯调度)算法得到的磁道访问序列是A A.110,170,180,195,68,45,35,12 B.110,68,45,35,12,170,180,195 C.110,170,180,195,12,35,45,68 D.12,35,45,68,110,170,180,19530.文件系统中,文件访问控制信息存储的合理位置是AA.文件控制块B.文件分配表C.用户口令表D.系统注册表31.设文件F1的当前引用计数值为1,先建立F1的符号链接(软链接)文件F2,再建立F1的硬链接文件F3,然后删除F1。
四川大学期末考试试题(闭卷一、选择题(每题分,共4040分每题11分,共1.微型计算机中,运算器、控制器和内存储器的总称是【】。
(A主机(BMPU(CCPU(DALU2.微型计算机,ROM是【】。
(A顺序存储器(B只读存储器(C随机存储器(D高速缓冲存储器3.下列设备中,只能作输出设备的是【】。
(A磁盘存储器(B键盘(C鼠标器(D打印机4.微型计算机中存储数据的最小单位是【】。
(A字节(B字(C位(DKB5.微型计算机中,I/O设备的含义是【】。
(A输入设备(B输出设备(C输入输出设备(D控制设备6.数字字符“1”的ASCII码的十进制表示为49,那么数字字符“8”的ASCII码的十进制表示为【】。
(A56(B58(C60(D547.键盘当中用来输入上档字符的是【】。
ENTER (A回车键回车键ENTERBackSpace 退格键BackSpace(B退格键(C换档键Shift 换档键ShiftTab 制表键Tab(D制表键8.左手的中指应放在键盘上【】位置。
(AS(BF(CJ(DD9.512个汉字占用【】个字节。
(A512B(B512KB(C1024KB(D1KB10.MIPS来衡量的计算机性能指标是【】(A处理能力(B运算速度(C存储容量(D可靠性11.世界上第一台电子数字计算机取名为【】(AUNIVAC(BEDSAC(CENIAC(DEDVAC12.计算机的发展阶段通常是按计算机所采用的什么来划分的?【】(A内存容量(B电子器件(C程序设计语言(D操作系统13.现代计算机之所以能自动地连续进行数据处理,主要是因为【】(A采用了开关电路(B采用了半导体器件(C具有存储程序的功能(D采用了二进制14.在软件方面,第一代计算机主要使用【】(A机器语言(B高级程序设计语言(C数据库管理系统(DBASIC和FORTRAN15.个人计算机简称PC机。
这种计算机属于【】(A微型计算机(B小型计算机(C超级计算机(D巨型计算机16.微IBMPC/XT采用的微处理器是由【】公司生产的(AIBM(BInter(CHP(DDigital17.人们常说486微机、586微机,其中的数字指的是【】(A硬盘的型号(B软盘的型号(C显示器的型号(D微处理器的型号18.巨型计算机指的是【】(A重量大(B体积大(C功能强(D耗电量大19.二进制数01100100转换成十六进制数是【】(A64(B63(C100(D14420.下面不属于网络拓扑结构的是【】(A环形结构(B总线结构(C层次结构(D网状结构21.操作系统是一种【】。
计算机专业基础综合操作系统(输入/输出管理)历年真题试卷汇编1计算机专业基础综合操作系统(输入/输出管理)历年真题试卷汇编1(总分:64.00,做题时间:90分钟)一、单项选择题(总题数:25,分数:50.00)1.单项选择题下列各题的备选答案中,只有一个是符合题意的。
(分数:2.00)________________________________________________________________ __________________________ 解析:2.虚拟设备是指____。
【南京理工大学2002年】(分数:2.00)A.允许用户使用比系统中具有的物理设备更多的设备B.允许用户以标准化方式来使用物理设备C.把一个物理设备变换成多个对应的逻辑设备√D.允许用户程序不必全部装入主存便可使用系统中的设备解析:解析:考查虚拟设备的定义。
3.在操作系统中,用户在使用I/O设备时,通常采用____。
【兰州大学2005年】(分数:2.00)A.物理设备名B.逻辑设备名√C.虚拟设备名D.设备序号解析:解析:考查I/O设备管理的基本概念。
此题在2010年统考真题中有涉及。
没有虚拟设备名一说。
4.____是操作系统中采用的以空间换取时间的技术。
【北京理工大学2004年】(分数:2.00)A.SPOOLing技术√B.虚拟存储技术C.覆盖与交换技术D.通道技术解析:解析:综合考查操作系统中的几种技术。
SPOOLing技术通过建立缓冲区(输入井、输出井),使得物理上独占的设备实现逻辑共享,从而提高设备的利用率,使得系统效率提高。
5.关于SPOOLing技术,下列说法错误的是____。
(分数:2.00)A.SPOOLing技术是缓冲技术的应用B.SPOOLing技术是一种虚拟设备技术C.SPOOLing技术是一种设备驱动技术√D.SPOOLing技术提高了独占设备的利用率解析:解析:考查SPOOLing技术的基本概念。
四川⼤学计算机导论期末例题名词解释1. 机器指令计算机执⾏某种操作的命令,可由CPU 直接执⾏。
2. 程序计数器由若⼲位触发器和逻辑电路组成,⽤来存放将要执⾏的指令在存储器中的存放地址。
3. 进程⼀个程序(或程序段)在给定的⼯作空间和数据集合上的⼀次执⾏过程,它是操作系统进⾏资源分配和调度的⼀个独⽴单位。
4. 数据结构数据结构是指具有⼀定结构(关系)的数据元素的集合,主要研究数据的各种逻辑结构和物理结构,以及对数据的各种操作。
5. 总线若⼲信号线的集合,是计算机各部分之间实现信息传送的通路。
6. ⾼速缓冲存储器(Cache)位于CPU 和内存之间的存储器,其特点是速度快,⽬的是使存储器的速度和CPU 的速度相匹配。
7. 操作系统操作系统是由程序和数据结构组成的⼤型系统软件,它负责计算机的全部软硬件资源的分配、调度与管理,控制各类程序的正常执⾏,并为⽤户使⽤计算机提供良好的环境。
8. 计算机病毒破坏计算机功能或数据,影响计算机的使⽤,并能⾃我复制的⼀组计算机指令或程序。
9. 计算机⽹络计算机⽹络是利⽤通信线路连接起来的相互独⽴的计算机集合,其主要⽬的是实现数据通信和资源共享。
10. 指令系统⼀台计算机中所有机器指令的集合,它是表征⼀台计算机性能的重要因素。
问答题1. 请列举CPU 的主要技术指标(⾄少3 个指标),并进⾏简要说明。
(答案可在以下任选 3 个,且不限于此)基本字长:CPU⼀次处理的⼆进制数的位数。
(2分)主频:CPU内部⼯作的时钟频率,是CPU运⾏运算时的⼯作频率。
(2分)地址总线宽度(地址总线的位数):决定了CPU可以访问的存储器的容量,不同型号的CPU 总线宽度不同,因⽽可使⽤的内存的最⼤容量也不⼀样。
(2 分)数据总线宽度:数据总线宽度决定了CPU与内存、输⼊/输出设备之间⼀次数据传输的信息量。
⾼速缓存:是可以进⾏⾼速数据交换的存储器,它先于内存与CPU 交换数据。
2. 计算机的硬件主要有哪⼏个部分组成?各部分有什么功能?计算机硬件系统由运算器、控制器、存储器、输⼊设备、输出设备和总线组成。
2022年四川大学公共课《大学计算机基础》期末试卷B(有答案)一、单项选择题1、十六进制数3FC3转换为相应的二进制数是()A.11111111000011B.01111111000011C.01111111000001D.111111110000012、十进制数111等于二进制数()A.10110111B.10110011C.01101111D.011001113、与二进制数0111对应的十进制数是()A.5B.6C.7D.84、用8位二进制数,能表示的最大十进制数是()A.256B.255C.128D.1275、对于已感染了病毒的U盘,最彻底的去除病毒的方法是()A.用酒精将U盘消毒B.放在高压锅里煮C.将感染病毒的程序删除D.对U盘进展格式化6、下列叙述正确的是()A.存储器的容量以字节为单位B.一个存储单元只能存放一个二进制位C.字节用“bit”表示D.一个二进制位用“byte”表示7、CPU主要技术性能指标为()A效率B耗电量C可靠性和精度D字长和主频8、在Windows 7中,获取帮助信息可直接按()A.F1键B.F2键C.F3键D.F4键9、在Windows 7的应用程序窗口中,打开“控制菜单”的快捷键是()A.Alt+空格键B.Ctrl+空格键C.Alt+EscD.Ctrl+Esc10、在Windows 7的“剪贴板”操作中,“粘贴”命令的组合键是()A.Ctrl+CB.Ctrl+XC.Ctrl+AD.Ctrl+V11、下列不属于Microsoft Office 2000软件包的软件是()A. WordB. ExcelC. OutlookD. Adobe12、Windows 7操作系统的作用是()A. 对用户存储的文件进行管理,方便用户B. 对计算机系统的硬件资源和软件资源进行控制和有效的管理,合理地组织计算机的工作流程,以充分发挥计算机系统的工效和方便用户使用计算机C. 执行用户键入的各类命令D. 是为汉字操作系统提供运行的基础13、Windows 7中“回收站”是()A.内存中的一块区域B.硬盘中的一块区域C.软盘中的一块区域D.高速缓存中的一块区域14、在Word 2010中,有关视图的说法,正确的是()A.Word 2010的视图有4种B.阅读版式视图可以显示网页形式文档C.“Web版式视图”适合于发送电子邮件D.“草稿视图”仅显示标题、正文和页眉15、在Word中,可以插入页眉和页脚的视图是()A.普通视图B.Web版是视图C.大纲视图D.页面视图16、在Word中,打开“计算机.doc”文件后,单击“窗口”菜单中的“新建窗口”命令,则两个窗口的标题栏显示为()A.“计算机.doc”和“计算机.doc"B.“计算机.doc”和“计算机.doc:1”C.“计算机.doc”和“计算机.doc:2”D.“计算机.doc:1”和“计算机.doc:2”17、在Word中,以下不能实现创建新文档的方法是()A.选择“文件”菜单中“新建”命令B.单击“常用”工具栏中“新建空白文档”按钮C.按快捷键Ctrl+ND.选择“插入”菜单中“文件”命令18、在Word中,选择“表格”菜单中“拆分表格”命令后,可以对表格进行()A.左右拆分B.上下拆分C.任意拆分D.上下和左右拆分19、Windows中,对话框()A.有最大化按钮B.有最小化按钮C.不能改变形状大小D.不能移动20、在Excel 2010中,计算平均值的函数是()A.SUMB.MAXC.COUNTD.AVERAGE21、在Excel 2010工作表的单元格中,计算一组数据后出现“#井井井##”,这是由于()A.单元格显示宽度不够B.计算数据出错C.计算公式出错D.数据格式出错22、在Word 2010中,邮件合并的两个基本文档是()A.标签和信函B.信函和信封C.主文档和数据源D.空白文档和数据源23、下列有关Word 2010分隔符的叙述中,正确的是()A.对文档设置不同的页眉和页脚,应先插入分页符B.插入分页符的操作可在“页面布局”功能区完成C.在文档中插入的分节符无法被删除D.在文档中插入分节符后,文档同时也必然会被分页24、.在Excel 2010中,将下列概念由大到小(即包含关系)的次序排列,以下选项中排列次序正确的是()A.单元格、工作簿、工作表B.工作簿、单元格、工作表C.工作表、工作簿、单元格D.工作簿、工作表、单元格25、在Excel2010中,提供了多种图表类型,其中“饼图”用于显示()A各项数据系列的比较情况B数据系列的数据变化趋势C在两组数据间查找最优组合D构成数据系列的项目相对于项目总和的比例大小26、PowerPoint 2010不具有的功能是()A.图文编辑B.设计放映方式C.对数据进行分类汇总D.编辑幻灯片的放映次序27、在PowerPoint 2010中,对幻灯片进行幻灯片切换效果的设置应选择()A.“视图”菜单B.“插入”菜单C.“幻灯片放映”菜单D.“工具”菜单28、下列IP地址中错误的是()A.22.197.184.31B.127.128.0.1C.257.168.168.21D.202.255.255.22429、下列不属于计算机网络主要功能的是()A.数据通信B.资源共享C.分担负荷D.控制其他工作站30、在浏览器地址栏输人网址,其中"http”代表的是()A.协议B.主机C.地址D.端口二、填空题31、在Windows 7的“资源管理器”中,要选择连续4个文件,先用鼠标单击第1个文件,再按住_________键单击第4个文件。
第一章The general role of an operating system is to:选择一个答案a. Provide a set of services to system usersb. Manage files for application programsc. Act as an interface between various computersd. None of the aboveInformation that must be saved prior to the processor transferring control to the interrupt handler routine includes:选择一个答案a.Processor Status Word (PSW) & Contents ofprocessor registersb. None of the abovec. Processor Status Word (PSW)d. Processor Status Word (PSW) & Locationof next instructionIn a uniprocessor system, multiprogramming increases processor efficiency by:选择一个答案a. Increasing processor speedb. Eliminating all idle processor cyclesc. All of the aboved. Taking advantage of time wasted by longwait interrupt handlingAs one proceeds down the memory hierarchy (i.e., from inboard memory to offline storage), the following condition(s) apply:选择一个答案a. Decreasing capacityb. Increasing cost per bitc. Increasing access timed. All of the aboveSmall, fast memory located between the processor and main memory is called 选择一个答案a. Cache memoryb. CD-RW memoryc. WORM memoryd. None of the aboveWhen a new block of data is written into cache memory, the following determines which cache location the block will occupy:选择一个答案a. Cache sizeb. None of the abovec. Write policyd. Block sizeThe four main structural elements of a computer system are:选择一个答案a.Processor, Registers, Main Memory &System Busb. None of the aboveb. d.Processor, Registers, I/O Modules & Main Memoryc.Processor, Main Memory, I/O Modules &System BusThe two basic types of processor registers are:选择一个答案a. None of the aboveb. User-visible and user-invisible registersc. Control and Status registersd. User-visible and Control/Status registersAddress registers may contain选择一个答案a. Memory addresses of instructionsb. Partial memory addressesc. Memory addresses of datad. All of the aboveA Control/Status register that contains the address of the next instruction to be fetched is called the:选择一个答案a. Program Counter (PC)b. Program Status Word (PSW)c. Instruction Register (IR)d. All of the aboveThe two basic steps used by the processor in instruction processing are:选择一个答案a. Fetch and Instruction cyclesb. Instruction and Execute cyclesc. Fetch and Execute cyclesd. None of the aboveA fetched instruction is normally loaded into the:选择一个答案a. Instruction Register (IR)b. Accumulator (AC)c. None of the aboved. Program Counter (PC)A common class of interrupts is选择一个答案a. I/Ob. Timerc. All of the aboved. ProgramWhen an external device becomes ready to be serviced by the processor, the device sends this type of signal to the processor:选择一个答案a. Halt signalb. None of the abovec. Handler signald. Interrupt signalOne accepted method of dealing with multiple interrupts is to:选择一个答案a. Define priorities for the interruptsb. Service them in round-robin fashionc. None of the aboved. Disable all interrupts except those of highest priority第二章A primary objective of an operating system is:选择一个答案a. Ability to evolveb. Conveniencec. Efficiencyd. All of the aboveThe paging system in a memory management system provides for dynamic mapping between a virtual address used in a program and:选择一个答案a. A virtual address in main memoryb. A real address in main memoryc. None of the aboved. A real address in a programRelative to information protection and security in computer systems, access control typically refers to:选择一个答案a. The flow of data within the systemb. Proving that security mechanisms perform accordingto specificationc. None of the aboved. Regulating user and process access to various aspectsof the systemA common problem with full-featured operating systems, due to their size and difficulty of the tasks they address, is:选择一个答案a. Sub-par performanceb. All of the abovec. Latent bugs that show up in the fieldd. Chronically late in deliveryA technique in which a process, executing an application, is divided into threads that can run concurrently is called:选择一个答案a. Symmetric multiprocessing (SMP)b. Multiprocessingc. None of the aboved. MultithreadingWIN2K supports several types of user applications, including:选择一个答案a. None of the aboveb. System 10c. Linuxd. WIN32Key to the success of Linux has been it’s character as a free software package available under the auspices of the:选择一个答案a. World Wide Web Consortiumb. Berkeley Software Distributionc. Free Software Foundationd. None of the aboveOperating systems must evolve over time because选择一个答案a. All of the aboveb. Hardware must be replaced when it failsc. New hardware is designed and implementedin the computer systemd. Users will only purchase software that hasa current copyright dateThe operating system is unusual in it’s role as a control mechanism, in that:选择一个答案a. None of the aboveb. It never relinquishes control of the system processorc. It frequently relinquishes control of the system processorand must depend on the processor to regain control of thesystemd. It runs on a special processor, completely separated from therest of the systemThe operating system provides many types of services to end-users, programmers and system designers, including:选择一个答案a. Relational database capabilities with the internal file systemb. Built-in user applicationsc. Error detection and responsed. All of the aboveA major problem with early serial processing systems was:选择一个答案a. Inability to get hardcopy outputb. Lack of input devicesc. All of the aboved. Setup timeAn example of a hardware feature that is desirable in abatch-processing system is选择一个答案a. A completely accessible memory areab. Large clock cyclesc. None of the aboved. Privileged instructionsA computer hardware feature that is vital to the effectiveoperation of a multiprogramming operating system is:选择一个答案a. All of the aboveb. I/O interrupts and DMAc. Very large memoryd. Multiple processorsThe principle objective of a time sharing, multiprogramming system is to选择一个答案a. Provide exclusive access to hardwareb. Maximize response timec. None of the aboved. Maximize processor useWhich of the following major line of computer system development created problems in timing and synchronization that contributed to the development of the concept of the process?选择一个答案a. Real time transaction systemsb. All of the abovec. Multiprogramming batch operation systemsd. Time sharing systemsWhich of the following major line of computer system development created problems in timing and synchronization that contributed to the development of the concept of the process?选择一个答案a. Real time transaction systemsb. Multiprogramming batch operation systemsc. All of the aboved. Time sharing systems第三章The behavior of a processor can be characterized by examining:选择一个答案a. The interleaving of the process tracesb. A single process tracec. Multiple process tracesd. All of the aboveThe Process Image element that contains the modifiable part of the user space is called the:选择一个答案a. None of the aboveb. User Programc. Process Control Blockd. System StackThe processor execution mode that user programs typically execute in is referred to as:选择一个答案a. System modeb. Kernel modec. User moded. None of the aboveOne step in the procedure for creating a new process involves:选择一个答案a. Allocating space for the processb. Assigning a unique identifierc. All of the aboved. Initializing the process control blockA process switch may occur when the system encounters an interrupt condition, such as that generated by a:选择一个答案a. Memory faultb. Trapc. All of the aboved. Supervisor callIn the Process Based O/S:选择一个答案a.Major kernel functions are organized asseparate functionsb.None of the abovec.O/S code and data are contained inthe shared address spaced. The User Process Image includes a kernel stackIn a typical UNIX system, the element of the process image that contains the processor status information is the:选择一个答案a. Register contextb. System-level contextc. All of the aboved. User-level contextThe behavior of an individual process can be characterized by examining:选择一个答案a. All of the aboveb. Multiple process tracesc. The interleaving of the process tracesd. A single process traceThe basic Two-State Process Model defines two possible states for a process in relationship to the processor:选择一个答案a. Running and Executingb. Executing and Waitingc. Running and Not Runningd. None of the aboveThere are a number of conditions that can lead to process termination, including:选择一个答案a. All of the aboveb. Bounds violationc. Normal completiond. Parent terminationIn the Five-State Process Model, the following represents a valid state transition:选择一个答案a. New -> Runningb. Running -> Blockedc. All of the aboved. New -> BlockedIn a Process Model that implements two suspend states, a valid state transition is represented by:选择一个答案a. Running -> Ready/Suspendb. Ready -> Ready/Suspendc. All of the aboved. Ready/Suspend -> ReadyThe scheduling strategy where each process in the queue is given a certain amount of time, in turn, to execute and then returned to the queue, unless blocked is referred to as:选择一个答案a. Prioritizationb. Round-Robinc. LIFOd. All of the aboveA Memory Table is an O/S control structure that is used by the O/S to:选择一个答案a. Provide information about system filesb. Manage I/O devicesc. None of the aboved. Manage processesThe Process Image element that contains the collection of attributes needed by the O/S to control a particular process is called the:选择一个答案a. System Stackb. None of the abovec. Process Control Blockd. User Data第四章The concept of a process in an operating system embodies two primary characteristics, one of which is:选择一个答案a. Resource ownershipb. None of the abovec. Multithreadingd. Symmetric multiprocessingEarly operating systems that were designed with little concern about structure are typically referred to as:选择一个答案a. Monolithic operating systemsb. All of the abovec. Kernel operating systemsd. Layered operating systemsA benefit of the microkernel organization is:选择一个答案a. Flexibilityb. Portabilityc. Extensibilityd. All of the aboveIn low-level microkernel memory management, an example of an operation that can support external paging and virtual memory management is the:选择一个答案a. Map operationb. All of the abovec. Flush operationd. Grant operationIn a W2K system, the state that a thread enters when it has been unblocked and the resource for which it has been blocked is not yet available is called the:选择一个答案a. None of the aboveb. Standby statec. Waiting stated. Transition stateIn a Solaris system, a User-Level Thread (ULT) that enters the active state is assigned to a:选择一个答案a.Light-Weight Process (LWP)b.Heavy-Weight Process (HWP)c.Kernel threadd. None of the aboveAn example of a system that implements a single process with multiple threads is:选择一个答案a. All of the aboveb. Javac. Solarisd. WIN 2000Which of the following is true regarding the relationship between processes and threads:选择一个答案a. All of the aboveb. It takes far less time to create a new thread in an existingprocess than to create a new processc. It takes less time to switch between two different processesthan to switch between two threads within the same processd. It takes less time to terminate a process than a threadThe basic thread operation related to the change in thread state that occurs when a thread needs to wait for an event is referred to as the:选择一个答案a. Spawn operationb. Unblock operationc. Block operationd. None of the aboveOne of the disadvantages of User-Level Threads (ULTs) compared toKernel-Level Threads (KLTs) is:选择一个答案a. When a ULT executes a system call, all threads in the processare blockedb. Thread switching does not require kernel mode privilegesc. All of the aboved. Scheduling is application specificIn the Linux O/S, multiple threads may be created and executed within a single process. This is an example of the following Thread-to-Process relationship: 选择一个答案a. 1:1b. 1:Mc. M:Nd. None of the aboveThe computer system category where a single processor executes a single instruction stream to operate on data stored in a single memory is called:选择一个答案a. Single Instruction Multiple Data (SIMD) streamb. Multiple Instruction Single Data (MISD) streamc. Single Instruction Single Data (SISD) streamd. None of the aboveIn a SMP system, each processor maintains a local cache and must alert all other processors that a change to cache update has taken place. This is referred to as the:选择一个答案a. Synchronization mechanism problemb. Cache coherency problemc. Interconnection mechanism problemd. None of the aboveKey issues involved in the design of multiprocessor operating systems include:选择一个答案a. All of the aboveb. Synchronizationc. Reliability and fault toleranced. SchedulingIn a Linux system, when a new process is cloned, the two processes share the same:选择一个答案a. All of the aboveb. Process identifierc. task_struct data structured. Virtual memory第五章Concurrency plays a major part in which of the following specific contexts: 选择一个答案a. Multiple applicationsb. Structured applicationsc. O/S structured. All of the aboveIn order to implement mutual exclusion on a critical resource for competing processes, only one program at a time should be allowed选择一个答案a. To Exhibit cooperationb. In the critical section of the programc. To perform message passingd. None of the aboveThe following requirement must be met by any facility or capability that is to provide support for mutual exclusion:选择一个答案a. Only one process at a time can be allowed into a criticalcode sectionb. No assumptions can be made about relative process speedsc. A process remains in its critical code section for a finitetime onlyd. All of the aboveProcesses that are designed to be able to pass execution control back and forth between themselves are referred to as选择一个答案a. Coroutinesb. Busy waiting processesc. None of the aboved.ThreadsIn a uniprocessor system, mutual exclusion can be guaranteed by选择一个答案a. All of the aboveb. Interleaving processesc. Disabling interruptsd. Overlapping processesA semaphore that does not specify the order in which processes are removed from the queue is called a选择一个答案a. None of the aboveb. Weak semaphorec. Strong semaphored. Binary semaphoreThe finite circular buffer is used to implement which of the following basic queuing strategies选择一个答案a. FILOb. FIFOc. LIFOd. None of the aboveA chief characteristic of a monitor is:选择一个答案a. A maximum of two processes may be executing in a monitor at atimeb. All of the abovec. A process enters the monitor by invoking one of itsproceduresd. Local data variables of the monitor are accessible by anyprocedure requesting use of the monitorIn synchronization involving message passing, the sender of a message can be选择一个答案a. Either blocking or non-blockingb. All of the abovec. Only non-blockingd. Only blockingIn a system employing message passing, when a message is sent to a shared temporary data structure, this general approach is known as选择一个答案a. None of the aboveb. Direct addressingc. Indirect addressingd. BlockingIn a system employing message passing, the typical message is divided into two primary sections选择一个答案a. None of the aboveb. Destination ID and Source IDc. Header and mailboxd. Body and mailboxThe Reader/Writer problem requires that certain conditions be satisfied, such as:选择一个答案a. Multiple writers may write to the file simultaneouslyAny number ofreaders may simultaneously read from the fileb. Readers may read from the file while writers are writing to itc. Any number of readers may simultaneously read from the filed. None of the aboveA reason why the Producer/Consumer problem cannot be considered a special case of the Reader/Writer problem with a single writer (the producer) and a single reader (the consumer) is:选择一个答案a. None of the aboveb. The Producer/Consumer problem doesn’t deal with concurrency issuesc. The producer and consumer must be both reader and writerd. The consumer must perform writes while the reader performs readsExamples of solutions to the concurrency problem that do not involve busy waiting are the following:选择一个答案a. Message passing and cachingb. None of the abovec. Semaphores and monitorsd. Producers and consumersA basic echo procedure (that echoes a typed character to the screen) running on a multiprocessor system can produce erroneous output if选择一个答案a. Access to the echo procedure is unsynchronizedb. None of the abovec. Access to the echo procedure is synchronizedd. Two processes deadlock while in the echo code第六章The permanent blocking of a set of processes that either compete for system resources or communicate with each other is called:选择一个答案a. All of the aboveb. Deadlockc. Starvationd. PrioritizationIn deadlocked process recovery, selection criteria for choosing a particular process to abort or rollback includes designating the process with the:选择一个答案a. All of the aboveb. Lowest priorityc. Most estimated time remainingd. Least total resources allocated so farOne approach to an integrated strategy for dealing with deadlocks involves the implementation of:选择一个答案a. Resource classesc. Process rollbacksd. Virtual memoryThe Dining Philosopher’s Problem is a standard test case for evaluating approaches to implementing:选择一个答案a. All of the aboveb. Deadlockc. Synchronizationd. StarvationA software mechanism that informs a process of the occurrences of asynchronous events in UNIX are called:选择一个答案a. Signalsb. Messagesc. Pipesd. All of the aboveThread synchronization primitives supported by Solaris include:选择一个答案a. All of the aboveb. Semaphoresc. Condition variablesd. Mutual exclusion (mutex) locksThe family of synchronization objects implemented by W2K include:选择一个答案a. All of the aboveb. Mutex objectsc. Semaphore objectsd. Event objectsAll deadlocks involve conflicting needs for resources by:选择一个答案a. Three or more processesb. Two or more processesd. One or more processesA resource that can be created and destroyed is called a:选择一个答案a. Consumable resourceb. Producible resourcec. Reusable resourced. All of the aboveAn example of a consumable resource is the following:选择一个答案a. Printersb. Messagesc. All of the aboved. Main MemoryA condition of policy that must be present for a deadlock to be possible is: 选择一个答案a. No preemptionb. Mutual exclusionc. All of the aboved. Hold and waitA direct method of deadlock prevention is to prevent the occurrence of:选择一个答案a. Circular waitb. Hold and waitc. Mutual exclusiond. All of the aboveIn the Resource Allocation Denial approach to Deadlock Avoidance, a safe state is defined as one in which:选择一个答案a.At least one potential process sequence does not result in a deadlockb. All potential process sequences do not result in a deadlock:c. None of the aboved. Several potential process sequences do not result in a deadlock:A conservative strategy for dealing with deadlocks that involves limiting access to resources and imposing restrictions on processes is called:选择一个答案a. Deadlock Avoidanceb. Deadlock Detectionc. None of the aboved. Deadlock Prevention第七章The task of subdividing memory between the O/S and processes is performed automatically by the O/S and is called:选择一个答案a.Relocationb. b. Protectionc.Memory Managementd.All of the aboveA reference to a memory location independent of the current assignment of data to memory is called a:选择一个答案a. Relative addressb. None of the abovec. Absolute addressd. Logical addressAn actual location in main memory is called a:选择一个答案a. Absolute addressb. None of the abovec. Relative addressd. Logical addressThe page table for each process maintains:选择一个答案a. The physical memory location of the processb. None of the abovec. The page location for each frame of the processd. The frame location for each page of the processIn a system employing a paging scheme for memory management, wasted space is due to:选择一个答案a. Internal fragmentationb. Pages and frames of different specified sizesc. External fragmentationd. None of the aboveIn a system employing a segmentation scheme for memory management, wasted space is due to:选择一个答案a. Segments of different sizesb. Internal fragmentationc. External fragmentationd. None of the aboveIn a system employing a segmentation scheme for memory management, a process is divided into:选择一个答案a. None of the aboveb. A number of segments which must be of equal sizec. A number of segments which need not be of equal sized. One segment per threadThe concept of Memory Management satisfies certain system requirements, including:选择一个答案a. Physical organizationb. Relocationc. All of the aboved. ProtectionThe practice in which a program and data are organized in such a way that various modules can be assigned the same region of memory is called:选择一个答案a. Sharingb. None of the abovec. Overlayingd. RelocationThe concept of virtual memory is based on one or both of two basic techniques:选择一个答案a. Overlaying and relocationb. Segmentation and pagingc. None of the aboved. Segmentation and partitioningA problem with the largely obsolete Fixed Partitioning memory management technique is that of:选择一个答案a. Allowing only a fixed number of Processesb. Inefficient use of memoryc. All of the aboved. Internal fragmentationThe problem of internal fragmentation can be lessened in systems employing a fixed-partition memory management scheme by using:选择一个答案a. None of the aboveb. Unequal size partitionsc. Equal size partitionsd. Random size partitionsIn the Dynamic Partitioning technique of memory management, the phenomenon that results in unused blocks of memory outside of existing partitions is called:选择一个答案a. Compactionb. Internal fragmentationc. External fragmentationd. None of the aboveIn the Dynamic Partitioning technique of memory management, the placement algorithm that chooses the block that is closest in size to the request is called: 选择一个答案a. Best-fitb. All of the abovec. Next-fitd. First-fitIn the Dynamic Partitioning technique of memory management, the placement algorithm that scans memory from the location of the last placement and chooses the next available block that large enough to satisfy the request is called:选择一个答案a. All of the aboveb. First-fitc. Next-fitd. Best-fit第八章The type of memory that allows for very effective multiprogramming and relieves the user of memory size constraints is referred to as:选择一个答案a. All of the aboveb. Main memoryc. Real memoryd. Virtual memoryThe replacement policy that is impossible to implement because it would require the O/S to have perfect knowledge of future events is called the:选择一个答案a. Optimal policyb. Clock policyc. None of the aboved. Least recently used (LRU) policyThe replacement policy that chooses only among the resident pages of the process that generated the page fault in selecting a page to replace is referred to as a:选择一个答案a. Local replacement policyb. None of the abovec. Global replacement policyd. Variable replacement policyThe concept associated with determining the number of processes that will be resident in main memory is referred to as:选择一个答案a. A cleaning policyb. Load Controlc. None of the aboved. The page fault frequencyIn SVR4 and Solaris systems, the memory management scheme that manages user processes and disk I/O is called the:选择一个答案a. Kernel memory allocatorb. Paging systemc. None of the aboved. Virtual memory managerThe multi-level memory management scheme implemented in Linux was designed to minimize large page tables and directories in which of the following line of processors:选择一个答案a. 64-bit Alpha architectureb. None of the abovec. 16-bit X86 architectured. 32-bit Pentium/X86 architectureThe Windows 2000 virtual memory manager can use page sizes ranging from: 选择一个答案a. 4 KB to 64 KBb. 64 KB to 4 GBc. 4 GB to 4 TBd. None of the aboveThe situation where the processor spends most of its time swapping process pieces rather than executing instructions is called:选择一个答案a. The Principle of Localityb. Pagingc. None of the aboved. ThrashingThe situation that occurs when the desired page table entry is not found in the Translation Lookaside Buffer (TLB) is called a:选择一个答案a. Page faultb. TLB missc. None of the aboved. TLB hit<p>The real address of a word in memory is translated from the following portions of a virtual address: </p>选择一个答案a. Page number and offsetb. None of the abovec. Frame number and offsetd. Page number and frame numberSegmentation has a number of advantages to the programmer over anon-segmented address space, including:选择一个答案a. Protectionb. Simplifying the handling of growing data structuresc. All of the aboved. Sharing among processesIn a combined paging/segmentation system, a user’s address space is broken up into a number of:选择一个答案a. Variable-sized Segments, which are in turn broken down into fixed-size pagesb. Segments or pages, at the discretion of the programmerc. All of the aboved. Fixed-size pages, which are in turn broken down into variable-sized segments Sharing is achieved in a segmentation system by:选择一个答案a. Each process segment table having a reference to the dispatcher main memory areab. Having a common data area that all processes can sharec. Referencing a segment in the segment tables of more than one processd. All of the aboveA fundamental choice in the design of the memory-management portion of an O/S is:选择一个答案a. All of the aboveb. Whether to use paging, segmentation of a combination of the twoc. Whether or not to use virtual memory techniquesd. The algorithms employed for various aspects of memory managementThe fetch policy that exploits the characteristics of most secondary memory devices, such as disks, which have seek time and rotational latency is called:选择一个答案a. Prepagingb. None of the abovec. Swappingd. Demand paging第九章The type of scheduling that involves the decision to add a process to those that are at least partially in main memory and therefore available for execution is referred to as:选择一个答案a. Medium-term schedulingb. Long-term schedulingc. None of the aboved. I/O schedulingOne difficulty with the Shortest Process Next (SPN) scheduling technique is:选择一个答案a. The need to know or estimate required processing times for each processb. All of the abovec. The starvation of longer processesd. The lack of preemptionOne difficulty with the Shortest Remaining Time (SRT) scheduling technique is:。