1
1
Parallel processing is a situation in which two or more processors operate in one system
at the same time and may or may not work on related activities.
a. True b. False
a. True b. False
3. When multiprocessing takes place at the thread level, a high degree of synchronization
is required to disassemble each process.
a. True b. False
a. True b. False
5. In a master/slave system, the master processor is responsible for managing the entire
system—all files, devices, memory, and processors.
a. True b. False
a. True b. False
7. In a loosely coupled system, a job may move from one processor to another during
execution.
a. True b. False
8. The success of process synchronization hinges on the capability of the operating system
to make a resource available to other processes while it is being used by one of them.
a. True b. False
9. The common element in all synchronization schemes is to allow a process to finish work
on a critical region of the program before other processes have access to it.
a. True b. False
a. True b. False
11. The primary disadvantage of the WAIT and SIGNAL operation set is that it does not
address busy waiting.
a. True b. False
12. The two operations that can be performed on a semaphore variable are select and
increment (P and V).
a. True b. False
a. True b. False
14. The classic problem of producers and consumers is one in which one or more
processes produce some data that one or more processes consume later.
a. True b. False
15. Multiprocessing can refer to one job using several processors to execute sets of
instructions in parallel.
a. True b. False
16. When a programmer indicates in the code which instructions can be executed in
parallel in a program (for example, using COBEGIN and COEND), it is called implicit
parallelism.
a. True b. False
17. Each active thread in a process has its own processor registers, data area, and
resources.
a. True b. False
18. Early programming languages did not support the creation of threads or the existence
of concurrent processes. The Ada programming language was one of the first to do so.
a. True b. False
a. True b. False
20. Java technology is used for many Web and Internet applications, and it integrates well
with browsers that can run Java applets with audio, video, and animation directly in a Web
page.
a. True b. False
22. The ____ multiprocessing configuration features several complete computer systems,
each with its own memory, I/O devices, CPU, and operating system.
25. Lock and key synchronization must take place within a single ____.
26. A problem with test-and-set is that when many processes are waiting to enter a critical
region, ____ can occur because the processes gain access in an arbitrary fashion.
27. When using the WAIT and SIGNAL operations, ____ sets the process’s process control
block to the blocked state and links it to the queue of processes waiting to enter this
particular critical region.
28. The two operations defined by Dijkstra to be performed on a semaphore are ____.
a. P and V b. WAIT and SIGNAL c. test and set d. check and update
29. The operation P in a semaphore scheme requires a(n) ____ sequence to be performed
as an indivisible action in a single machine cycle.
a. test, fetch, increment, and store b. test, fetch, decrement, and store
31. ____ semaphores are used in the producer and consumer problem.
32. ____ proposed a solution to the readers and writers problem that did not result in
starvation for readers or writers.
33. ____ semaphores are used in the solution to the readers and writers problem that does
not involve starvation.
34. When a compiler automatically detects instructions that can be performed in parallel,
____ is in place
35. A computer system that can support jobs that use multiple processors to execute sets
of instructions in parallel is referred to as a ____ system.
36. In general, parallel systems can be put into two broad categories: ____ level parallelism
and instruction level parallelism.
a. 5 b. 10 c. 20 d. 25
38. Most current operating systems support the implementation of threads, or ____, which
have become part of numerous application packages.
39. The source code of a Java program is first compiled into an intermediate language
called Java ____, which are platform independent.
40. The Java ____ class is a collection of methods used to start, run, stop, and check the
status of a thread.
-----------------------------------------------------------------------------------------------------------------
1- The computer system ____ a file by activating the appropriate secondary storage device
and loading the file into memory while updating its records of who is using that file.
a. Creates b. Formats c. Allocates d. configures
2- ____ are special files with listings of filenames and their attributes.
a. databases b. Directories c. Programs d. Data files
3-Each volume in a system has a volume descriptor followed by a ____ that lists the names
and characteristics of every file contained in that volume.
A.file location
b.volume directory
c.subdirectory
d.master file directory
4-Many computer users and some operating systems call subdirectories ____.
A.folders
b.files
c.volumes
d.databases
5-Although a user directory is treated as a file, it is flagged to indicate to the File Manager
that this file is really a ____ whose records are filenames that point to files.
1-database
2-volume
3-subdirectory
4-master file directory
6-A file's ____ filename includes all path information for that file.
A.extended
b.absolute
c.relative
d.long-form
7- A(n) ____ filename is the name that differentiates a file from other files in the same
directory.
A.absolute
b.relative
c.short-form
d.directory
8- A UNIX or Linux system might identify a file as: /usr/imfst/flynn/inventory.doc. The first
entry is a forward slash ( / ) representing the master directory, called the ____ directory.
A.root
b.main
c.branch
d.working
9-As long as users refer to files in the ____ directory, they can access the files without
entering the absolute filename.
A.root
b.main
c.home
d.working
10- When data is stored in fixed length fields, data that extends beyond the fixed size ____.
A.generates an operating system error
b.is truncated
c.is broken up and stored in more than one field
d.combines multiple fields to accommodate the data
11- On magnetic disks, files can be organized in one of three ways: ____.
A.indexed direct, indexed indirect, or random
b.sequential, indirect, or direct
c.sequential, random, or indirect
d.sequential, direct, or indexed sequential
12- In a direct record organization scheme, the program used to store the data follows a
set of instructions, called a ____ algorithm, that transforms each key into a number, the
record's logical address.
A.hashing
b.grouping
c.translation
d.lookup
13-When using indexed sequential record organization, each entry in the index file
contains the ____ and the physical location of the data block where this record, and the
records with smaller keys, are stored.
A.last record name
b.highest record key
c.lowest record key
d.first record name
15- ____ storage allocation allows files to use any storage space available on the disk.
A.Contiguous
b.Noncontiguous
c.Fragmented
d.Extended
16-In noncontiguous storage, one way to link file extents is at the storage level where each
extent points to the ____.
A.current subdirectory
b.next file in the sequence
c.master directory entry
d.next extent in the sequence
17-In indexed storage, when a file is created, the pointers in the index block are all set to
____.
A-the end of the volume
b-the beginning of the volume
c-null
d-zero
18-The formula for computing the current byte address (CBA) for a direct access file with
fixed record length is ____.
A.CBA = (RN - 1) * RL
b.CBA = RN * RL
c.CBA = RN / RL
d.CBA = (RN + 1) * RL
19- A(n) ____ contains a list of files, each of which is associated with the names of users
who are allowed to access it and the type of access each user is permitted.
A.access control matrix
b.access control list
c.capability list
d.capability matrix
20- ____ text compression builds on the previous data element. The first data element in a
list is not compressed but each entry after that takes a given number of characters from
the previous entry that they have in common and then adds the characters that make it
unique.
C.Repeated-terms
b.Front-end
c.Repeated-characters
d.Lossy
-----------------------------------------------------------------------------------------------------------------
1- The capability of a system to fulfill its mission, in a timely manner, in the presence of
attacks, failures, or accidents is known as ____.
A.attack resistance
b.attack survivability
c.system recovery
d.system survivability
2- What strategy contributes most to system recovery?
A.authentication
b.integrity checking
c.data replication
d.encryption
4- An entire system that is backed up once a week and only backs up files daily that are
changed on that day is known as a(n) ____ backup.
A.incremental
b.layered
c.phased
d.recovery-based
5- Errors can occur when data values are incorrectly stored because the field isn't large
enough to hold the numeric value stored there. This issue is an example of a(n) ____.
A.unintentional attack
b.malicious attack
c.denial-of-service attack
d.trap door attack
6-Two methods of active wiretapping are "between lines transmission" and "____."
A.Trojan horse
b.piggyback entry
c.browsing
d.trap doors
7- It will take a computer ____ to crack a password with a length of three characters if the
computer tries one million values per second.
A..008788 seconds
b.4.5 seconds
c.2.5 hours
d.58 hours
8- Trash collection, also known as ____, is an evening pastime for those who enjoy perusing
anything and everything thrown out by system users.
A.dumpster diving
b.digital recycling
c.dumpster surfing
d.trash surfing
11- Intruders have been known to capture user passwords by using a ____ to replace the
standard login program on the computer with an identical fake login that captures
keystrokes.
A.worm
b.masquerade program
c.Trojan horse
d.virtual login console
12- Generally, ____ antivirus software compares file sizes (checking for added code when
none is expected), looks for replicating instructions, and searches for unusual file activity.
A.diagnostic
b.preventive
c.reactive
d.firewall
13- A ____ combines into one program the characteristics of other attacks.
A.Trojan Horse
b.worm
c.multi-thread virus
d.blended threat
14- Using ____, a firewall reviews the header information for incoming and outgoing
Internet packets to verify that the source address, destination address, and protocol are all
correct.
A.snooping
b.packet filtering
c.a proxy server
d.anti-virus software
15- A ____ server hides important network information from outsiders by making the
network server invisible.
A.redirection
b.blocking
c.proxy
d.fire
16- The object used by the Kerberos protocol to provide client verification is known as a
____.
A.password
b.passphrase
c.token
d.ticket
18- ____ peruse data packets as they pass by, examine each one for specific information,
and log copies of interesting packets for more detailed examination.
A.Spoofers
b.Proxy servers
c.Packet sniffers
d.Packet filters
19- ____ involve the use of graphics and a pattern of clicks using a touch screen, mouse, or
other pointing device.
A.Picture passwords
b.fingerprint scanner
c.biometric scanner
d.retina scanner