You are on page 1of 7

1.

The File Manager is in charge of the system�s physical components, its information
resources, and the policies used to store and distribute the files.
A) True

2.
A record is a group of related bytes that can be identified by the user with a
name, type, and size.

B) False

3.
Examples of batch commands are CREATE, DELETE, RENAME, and COPY.
A) True

4.
Without the File Manager, every program would need to include instructions to
operate all of the different types of devices, and all of the different models
within each type.
A) True

5.
A file descriptor usually contains only a file name and the directory name in
which the file is located.

B) False

6.
Sequential record organization is by far the easiest to implement because records
are stored and retrieved serially, one after the other.
A) True

7.
The objective of a hybrid configuration is to select among the strong points of
each topology and combine them to meet that system�s communications requirements
most effectively.
A) True

8.
Circuit switching is a communication model in which a dedicated communication path
is established between two hosts.
A) True

9.
Under a DO/S, resources are allocated based on negotiation and compromise among
equally important peer sites in the distributed system.
A) True

10.
In a distributed system, there is a high level of cooperation and sharing of
actions and data maintained by the sites when determining which process should be
loaded and where it should be run.

B) False

11.
The operating system manages each and every piece of hardware and software.
A) True

12.
The Memory Manager, the Interface Manager, the User Manager, and the File Manager
are the basis of all operating systems.

B) False

13.
The File Manager is responsible for data files but not program files.

B) False

14.
Card systems date from the earliest computers, which relied on punched cards or
tape for input when a job was entered by assembling the cards into a deck and
running the entire deck of cards through a card reader as a group.

B) False

15.
All computers have only a finite amount of memory and if a program doesn�t fit,
then either the size of the main memory must be increased or the program must be
modified.
A) True

16.
A process is an inactive unit, such as a file stored on a disk.

B) False

17.
The Process Scheduler often uses a timing mechanism and periodically interrupts
running processes when a predetermined slice of time has expired.
A) True

18.
First-come, first-served (FCFS) is a preemptive scheduling algorithm that handles
jobs according to their arrival time.

B) False
19.
DASDs are good for files with low activity (the percent of records accessed) or
for users who access records in a random fashion.
A) True

20.
RAID-0 is ideal for data-critical real-time systems.

B) False

21.
The File Manager is in charge of the system�s ____ components.

C) physical

22.
____ are special files with listings of filenames and their attributes.

C) Directories

23.
A ____ is created when a user opens an account to access the computer system.

C) subdirectory

24.
As long as users refer to files in the ____ directory, they can access their files
without entering the complete name from the highest level to the lowest.

B) working

25.
On magnetic disks, files can be organized in one of three ways; ____.
A) sequential, direct, or indexed sequential

26.
When using random access files, the program used to store the data follows a set
of instructions, called a ____ algorithm, that transforms each key into a number,
the record�s logical address.

C) hashing

27.
In noncontiguous storage, linking can take place at the ____ level where each part
of the file points to the next one in the sequence.
A) storage
28.
The most commonly used access control scheme is the ____.
A) access control list

29.
____ compression is a technique used to save space in files.

C) Data

30.
Usually, the term �____� indicates a specific location in a network containing one
or more computer systems.

B) site

31.
The geometric arrangement of connections (cables, wireless, or both) that link the
nodes is called a ____.

C) topology

32.
In the ____ topology configuration hosts are connected to each other through a
central controller which assumes all responsibility for routing messages to the
appropriate host.
A) star

33.
In the ____ topology, hosts are connected to one another in a linear fashion.

B) bus

34.
When using a bus topology, ____ sites can successfully send a message at a time.
A) 1

35.
A ____ is an internetworking device, primarily software driven, which directs
traffic between two different types of LANs or two network segments with different
protocol addresses.

B) router

36.
When using RIP, the path ____ is chosen.

B) with the smallest number of hops


37.
____ is a good example of a circuit-switched network.
A) A telephone system

38.
____ is true of a NOS.

B) Resources are owned by local nodes.

39.
In process-based DO/S, special servers called ____ are responsible for accepting
requests for service on the individual devices they control, processing each
request fairly, providing service to the requestor, and returning to serve others.

B) guardians

40.
If the local device manager cannot satisfy a user�s request, the request is sent
to ____.

D) a waiting queue

41.
____, part of the operating system, is unique to each operating system.
A) User Command Interface

42.
The primary distinguishing characteristic of modern computers is ____.

B) processor capacity

43.
A thread (or ____) can be defined as a unit smaller than a process, which can be
scheduled and executed.

D) lightweight process

44.
____ consists of fragments of free memory between blocks of allocated memory.

D) External fragmentation

45.
____ can be thought of as being an intermediary between main memory and the
special-purpose registers, which are the domain of the CPU.
B) Cache memory
46.
A ____ is a portion of a process that can run independently.
A) thread

47.
Some systems increase the priority of jobs that have been in the system for an
unusually long time to expedite their exit, which is known as ____.

D) aging

48.
No movement between queues is a very simple policy that rewards those who have
____ jobs.

C) high-priority

49.
Deadlock occurs on a modern printer when ____.
A) The printer needs all of a job�s output before it will begin printing, but the
spooling system fills the available disk space with only partially completed
output.

50.
In a directed graph used to model deadlock, ____ represents deadlock.

D) a cycle

51.
The scheme of ____ removes the possibility of a circular wait and therefore
guarantees the removal of deadlocks.
A) hierarchical ordering

52.
The ____ configuration is an asymmetric multiprocessing system.
A) master/slave

53.
Automatic detection by the compiler of instructions that can be performed in
parallel is called ____.
A) implicit parallelism

54.
In a fixed-head magnetic disk, each circle is called a ____.

C) track

55.
The RAID level ____ uses word parity for error correction.
A) 3
56.
(5 points) Three types of file organization were presented in Chapter 8 -
sequential, direct, and indexed sequential. For each of the applications listed
below, select the file organization best suited to it and explain why you selected
it:

You might also like