Chapter 2 – Operating System Overview TRUE/FALSE QUESTIONS: 1) An OS should be constructed in such a way as to permit the effective development, testing, and introduction of new system functions without interfering with service. (True) 2) The OS masks the details of the hardware from the programmer and provides the programmer with a convenient interface for using the system. (True) 3) The ABI gives a program access to the hardware resources and services available in a system through the user ISA. False) 4)The OS frequently relinquishes control and must depend on the processor to allow it to regain control. (True) 5)One of the driving forces in operating system evolution is advancement in the underlying hardware technology. (True) 6)The processor itself is not a resource so the OS is not involved in determining how much of the processor time is devoted to the execution of a user program. (False) 7)A process consists of three components: an executable program, the associated data needed by the program, and the execution context of the program. True) 8)Uniprogramming typically provides better utilization of system resources than multiprogramming. (False) 9)A monolithic kernel is implemented as a single process with all elements sharing the same address space. (True) 10)The user has direct access to the processor with a batch-processing type of OS. (False) 11)Both batch processing and time sharing use multiprogramming. (True) 12)The phrase “control is passed to a job” means that the processor is now fetching and executing instructions from the monitor program. False) 13)In a time sharing system, a user’s program is preempted at regular intervals, but due to relatively slow human reaction time this occurrence is usually transparent to the user. (True) 14) The principle objective of Batch Multiprogramming is to minimize response time. (False) 15) Virtualization technology enables a single PC or server to simultaneously run multiple operating systems or multiple sessions of a single OS. (True) MULTIPLE CHOICE QUESTIONS: 1) The _____ ISA _____ is the interface that is the boundary between hardware and software. ) A(n) ____ computer______ is a set of resources for the movement, storage, and processing of data and for the control of these functions. 3) The operating system’s ____ ability to evolve ______ refers to its inherent flexibility in permitting functional modifications to the system without interfering with service. 4) Operating systems must evolve over time because: new hardware is designed and implemented in the computer system 5) A special type of programming language used to provide instructions to the monitor is ___ JCL ______ Answer: ) Hardware features desirable in a batch-processing operating system include memory protection, timer, privileged instructions, and ____ interrupts ______ . 7) A user program executes in a ____ user mode ______ , in which certain areas of memory are protected from the user’s use, and in which certain instructions may not be executed. 8) Multiprogramming operating systems are fairly sophisticated compared to single-program or ____ uniprogramming _____ systems. ) One of the first time-sharing operating systems to be developed was the ___ Compatible Time-Sharing System ____ 10) The technique where a system clock generates interrupts, and at each clock interrupt the OS regains control and assigns the processor to another user, is _____ time slicing _____ . 11)The ____ execution context ______ is the internal data by which the OS is able to supervise and control the process. 12) _____ Process isolation ____ is where the OS must prevent independent processes from interfering with each other’s memory, both data and instructions. 3) ____ Authenticity _____ is concerned with the proper verification of the identity of users and the validity of messages or data. 14) A common strategy to give each process in the queue some time in turn is referred to as a ___ round-robin _______ technique. 15) The key to the success of Linux has been its character as a free software package available under the auspice of the ____Free Software Foundatio_______ . SHORT ANSWER QUESTIONS: 1)An _____ operating system (OS _____ is a program that controls the execution of application programs and acts as an interface between applications and the computer hardware. ) The portion of the monitor that is always in main memory and available for execution is referred to as the ____ resident monitor _____ . 3) ____ Multithreading ______ is a technique in which a process, executing an application, is divided into threads that can run concurrently. 4) Two major problems with early serial processing systems were scheduling and __ setup time _____ . 5) The central idea behind the simple batch-processing scheme is the use of a piece of software known as the ___ monitor ______ . ) Any resource allocation and scheduling policy must consider three factors: Fairness, Differential responsiveness, and ____ Efficiency ______ . 7) A ___ timer _______ is set at the beginning of each job to prevent any single job from monopolizing the system. 8) The OS has five principal storage management responsibilities: process isolation, automatic allocation and management, support of modular programming, protection and access control, and _____ long-term storage _____ . ) The earliest computers employed ____ serial ______ processing, a name derived by the way the users have access to the systems. 10) ____ Multiprogramming ______ was designed to keep the processor and I/O devices, including storage devices, simultaneously busy to achieve maximum efficiency. 11) In a time-sharing, multiprogramming system, multiple users simultaneously access the system through ____ terminals ______ . 12) The principal objective of ___ Batch Multiprogramming _______ is to maximize processor use. 3) Three major lines of computer system development created problems in timing and synchronization that contributed to the development of the concept of the process: multiprogramming batch operation, time sharing, and _____ real-time transaction systems _____ . 14) ____ Virtual memory ______ is a facility that allows programs to address memory from a logical point of view, without regard to the amount of main memory physically available. 15) Security and protection as it relates to operating systems is grouped into four categories: Availability, Data integrity, Authenticity, and _____Confidentiality_____ .