0% found this document useful (0 votes)
26 views

1

The document discusses parallel processing and multiprocessing configurations. It provides true/false questions about parallel processing concepts like parallelism levels, master/slave systems, loosely coupled systems, and synchronization techniques like semaphores.

Uploaded by

Ola Badawy
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views

1

The document discusses parallel processing and multiprocessing configurations. It provides true/false questions about parallel processing concepts like parallelism levels, master/slave systems, loosely coupled systems, and synchronization techniques like semaphores.

Uploaded by

Ola Badawy
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

1.

Parallel processing is a situation in which two or more processors operate in one system
at the same time and may or may not work on related activities.

a. True b. False

2. The only tangible benefit of parallel processing systems is faster processing.

a. True b. False

3. When multiprocessing takes place at the thread level, a high degree of synchronization
is required to disassemble each process.

a. True b. False

4. The master/slave configuration is a symmetric multiprocessing system.

a. True b. False

5. In a master/slave system, the master processor is responsible for managing the entire
system—all files, devices, memory, and processors.

a. True b. False

6. The loosely coupled multiprocessing configuration features several complete computer


systems, each with its own memory, I/O devices, CPU, and operating system.

a. True b. False

7. In a loosely coupled system, a job may move from one processor to another during
execution.

a. True b. False

8. The success of process synchronization hinges on the capability of the operating system
to make a resource available to other processes while it is being used by one of them.
a. True b. False

9. The common element in all synchronization schemes is to allow a process to finish work
on a critical region of the program before other processes have access to it.

a. True b. False

10. Test-and-set is a single indivisible machine instruction. In a single machine cycle, it


tests to see if a key is available and, if it is, sets it to unavailable.

a. True b. False

11. The primary disadvantage of the WAIT and SIGNAL operation set is that it does not
address busy waiting.

a. True b. False

12. The two operations that can be performed on a semaphore variable are select and
increment (P and V).

a. True b. False

13. In parallel computations, mutual exclusion is achieved automatically because each


operation is handled in order, one at a time.

a. True b. False

14. The classic problem of producers and consumers is one in which one or more
processes produce some data that one or more processes consume later.

a. True b. False

15. Multiprocessing can refer to one job using several processors to execute sets of
instructions in parallel.
a. True b. False

16. When a programmer indicates in the code which instructions can be executed in
parallel in a program (for example, using COBEGIN and COEND), it is called implicit
parallelism.

a. True b. False

17. Each active thread in a process has its own processor registers, data area, and
resources.

a. True b. False

18. Early programming languages did not support the creation of threads or the existence
of concurrent processes. The Ada programming language was one of the first to do so.

a. True b. False

19. Java uses both a compiler and an interpreter.

a. True b. False

20. Java technology is used for many Web and Internet applications, and it integrates well
with browsers that can run Java applets with audio, video, and animation directly in a Web
page.

a. True b. False

21. The ____ multiprocessing configuration is an asymmetric system.

a. loosely coupled b. master processors c. start/end d. master/slave

22. The ____ multiprocessing configuration features several complete computer systems,
each with its own memory, I/O devices, CPU, and operating system.

a. loosely coupled b. master/slave c. symmetric d. synchronized


23. The ____ multiprocessing configuration is the most difficult to implement because the
processes must be well synchronized to avoid races and deadlocks.

a. master/slave b. loosely coupled c. symmetric d. shared load

24. A ____ of processing must be handled as a single unit.

a. line b. segment c. critical region d. semaphore

25. Lock and key synchronization must take place within a single ____.

a. instruction b. computer c. processor d. machine cycle

26. A problem with test-and-set is that when many processes are waiting to enter a critical
region, ____ can occur because the processes gain access in an arbitrary fashion.

a. starvation b. synchronization c. deadlock d. an error

27. When using the WAIT and SIGNAL operations, ____ sets the process’s process control
block to the blocked state and links it to the queue of processes waiting to enter this
particular critical region.

a. TS b. SIGNAL c. WAIT d. BLOCK

28. The two operations defined by Dijkstra to be performed on a semaphore are ____.

a. P and V b. WAIT and SIGNAL c. test and set d. check and update

29. The operation P in a semaphore scheme requires a(n) ____ sequence to be performed
as an indivisible action in a single machine cycle.

a. test, fetch, increment, and store b. test, fetch, decrement, and store

c. increment and store d. decrement and store


30. What is the name traditionally given to a semaphore that enforces the concept of
mutual exclusion?

a. synch b. flag c. mutex d. signal

31. ____ semaphores are used in the producer and consumer problem.

a. One b. Two c. Three d. Four

32. ____ proposed a solution to the readers and writers problem that did not result in
starvation for readers or writers.

a. Hoare b. Courtois c. Heymans d. Parnas

33. ____ semaphores are used in the solution to the readers and writers problem that does
not involve starvation.

a. Zero b. One c. Two d. Three

34. When a compiler automatically detects instructions that can be performed in parallel,
____ is in place

. a. automatic parallelism b. array parallelism

c. explicit parallelism d. implicit parallelism

35. A computer system that can support jobs that use multiple processors to execute sets
of instructions in parallel is referred to as a ____ system.

a. concurrent processing b. process synchronization

c. parallel extraction d. processing optimization

36. In general, parallel systems can be put into two broad categories: ____ level parallelism
and instruction level parallelism.

a. resource b. register c. data d. task


37. In its simplest form, Amdahl’s Law maintains that if a given program would take one
hour to run to completion with one processor, but 80 percent of the program had to run
sequentially (and therefore could not be sped up by applying additional processors to it),
then a resulting parallel program would run only a maximum of ____ percent faster.

a. 5 b. 10 c. 20 d. 25

38. Most current operating systems support the implementation of threads, or ____, which
have become part of numerous application packages.

a. parallel processes b. lightweight processes

c. heavyweight processes d. semaphores

39. The source code of a Java program is first compiled into an intermediate language
called Java ____, which are platform independent.

a. beans b. nibs c. bits d. bytecodes

40. The Java ____ class is a collection of methods used to start, run, stop, and check the
status of a thread.

a. thread b. multiprocessing c. distributed d. concurrency

-----------------------------------------------------------------------------------------------------------------

1- The computer system ____ a file by activating the appropriate secondary storage device
and loading the file into memory while updating its records of who is using that file.
a. Creates b. Formats c. Allocates d. configures

2- ____ are special files with listings of filenames and their attributes.
a. databases b. Directories c. Programs d. Data files

3-Each volume in a system has a volume descriptor followed by a ____ that lists the names
and characteristics of every file contained in that volume.
A.file location
b.volume directory
c.subdirectory
d.master file directory

4-Many computer users and some operating systems call subdirectories ____.
A.folders
b.files
c.volumes
d.databases

5-Although a user directory is treated as a file, it is flagged to indicate to the File Manager
that this file is really a ____ whose records are filenames that point to files.
1-database
2-volume
3-subdirectory
4-master file directory

6-A file's ____ filename includes all path information for that file.
A.extended
b.absolute
c.relative
d.long-form

7- A(n) ____ filename is the name that differentiates a file from other files in the same
directory.
A.absolute
b.relative
c.short-form
d.directory

8- A UNIX or Linux system might identify a file as: /usr/imfst/flynn/inventory.doc. The first
entry is a forward slash ( / ) representing the master directory, called the ____ directory.
A.root
b.main
c.branch
d.working

9-As long as users refer to files in the ____ directory, they can access the files without
entering the absolute filename.
A.root
b.main
c.home
d.working

10- When data is stored in fixed length fields, data that extends beyond the fixed size ____.
A.generates an operating system error
b.is truncated
c.is broken up and stored in more than one field
d.combines multiple fields to accommodate the data

11- On magnetic disks, files can be organized in one of three ways: ____.
A.indexed direct, indexed indirect, or random
b.sequential, indirect, or direct
c.sequential, random, or indirect
d.sequential, direct, or indexed sequential

12- In a direct record organization scheme, the program used to store the data follows a
set of instructions, called a ____ algorithm, that transforms each key into a number, the
record's logical address.
A.hashing
b.grouping
c.translation
d.lookup
13-When using indexed sequential record organization, each entry in the index file
contains the ____ and the physical location of the data block where this record, and the
records with smaller keys, are stored.
A.last record name
b.highest record key
c.lowest record key
d.first record name

14- The primary disadvantage of contiguous storage is that ____.


A.the file system is difficult to create, implement, and manage
b.a file can be spread in small pieces throughout the storage area
c.a file can't be expanded unless there is empty space available immediately following it
d.the file system cannot support direct access

15- ____ storage allocation allows files to use any storage space available on the disk.
A.Contiguous
b.Noncontiguous
c.Fragmented
d.Extended

16-In noncontiguous storage, one way to link file extents is at the storage level where each
extent points to the ____.
A.current subdirectory
b.next file in the sequence
c.master directory entry
d.next extent in the sequence

17-In indexed storage, when a file is created, the pointers in the index block are all set to
____.
A-the end of the volume
b-the beginning of the volume
c-null
d-zero

18-The formula for computing the current byte address (CBA) for a direct access file with
fixed record length is ____.
A.CBA = (RN - 1) * RL
b.CBA = RN * RL
c.CBA = RN / RL
d.CBA = (RN + 1) * RL

19- A(n) ____ contains a list of files, each of which is associated with the names of users
who are allowed to access it and the type of access each user is permitted.
A.access control matrix
b.access control list
c.capability list
d.capability matrix

20- ____ text compression builds on the previous data element. The first data element in a
list is not compressed but each entry after that takes a given number of characters from
the previous entry that they have in common and then adds the characters that make it
unique.
C.Repeated-terms
b.Front-end
c.Repeated-characters
d.Lossy

-----------------------------------------------------------------------------------------------------------------

1- The capability of a system to fulfill its mission, in a timely manner, in the presence of
attacks, failures, or accidents is known as ____.
A.attack resistance
b.attack survivability
c.system recovery
d.system survivability
2- What strategy contributes most to system recovery?
A.authentication
b.integrity checking
c.data replication
d.encryption

3-What configuration has the highest level of risk?


A.LAN with Internet
b.LAN without Internet
c.Single computer without e-mail or Internet
d.LAN with firewall

4- An entire system that is backed up once a week and only backs up files daily that are
changed on that day is known as a(n) ____ backup.
A.incremental
b.layered
c.phased
d.recovery-based

5- Errors can occur when data values are incorrectly stored because the field isn't large
enough to hold the numeric value stored there. This issue is an example of a(n) ____.
A.unintentional attack
b.malicious attack
c.denial-of-service attack
d.trap door attack

6-Two methods of active wiretapping are "between lines transmission" and "____."
A.Trojan horse
b.piggyback entry
c.browsing
d.trap doors
7- It will take a computer ____ to crack a password with a length of three characters if the
computer tries one million values per second.
A..008788 seconds
b.4.5 seconds
c.2.5 hours
d.58 hours

8- Trash collection, also known as ____, is an evening pastime for those who enjoy perusing
anything and everything thrown out by system users.
A.dumpster diving
b.digital recycling
c.dumpster surfing
d.trash surfing

9-____ viruses infect data files.


A.File infector
b.Boot sector
c.Master boot record
d.Macro

10- The immediate result of a worm is ____.


A.not noticeable until later
b.the slower processing time of legitimate work
c.complete data loss with little chance of recovery
d.a computer crash with or without a blue screen

11- Intruders have been known to capture user passwords by using a ____ to replace the
standard login program on the computer with an identical fake login that captures
keystrokes.
A.worm
b.masquerade program
c.Trojan horse
d.virtual login console

12- Generally, ____ antivirus software compares file sizes (checking for added code when
none is expected), looks for replicating instructions, and searches for unusual file activity.
A.diagnostic
b.preventive
c.reactive
d.firewall

13- A ____ combines into one program the characteristics of other attacks.
A.Trojan Horse
b.worm
c.multi-thread virus
d.blended threat

14- Using ____, a firewall reviews the header information for incoming and outgoing
Internet packets to verify that the source address, destination address, and protocol are all
correct.
A.snooping
b.packet filtering
c.a proxy server
d.anti-virus software

15- A ____ server hides important network information from outsiders by making the
network server invisible.
A.redirection
b.blocking
c.proxy
d.fire
16- The object used by the Kerberos protocol to provide client verification is known as a
____.
A.password
b.passphrase
c.token
d.ticket

17- One major disadvantage of encryption is that ____.


A.it increases the system's overhead
b.it is inconvenient for users
c.it is prohibitive in cost
d.it is often ineffective

18- ____ peruse data packets as they pass by, examine each one for specific information,
and log copies of interesting packets for more detailed examination.
A.Spoofers
b.Proxy servers
c.Packet sniffers
d.Packet filters

19- ____ involve the use of graphics and a pattern of clicks using a touch screen, mouse, or
other pointing device.
A.Picture passwords
b.fingerprint scanner
c.biometric scanner
d.retina scanner

20- ____ is a form of social engineering whereby an intruder pretends to be a legitimate


entity and contacts unwary users asking them to reconfirm their personal and/or financial
information.
A.Spoofing
b.Phishing
c.Impersonating
d.Acting

You might also like