An important difference between the i/o requirements

Assignment Help Basic Computer Science
Reference no: EM13711984

1. An important difference between the I/O requirements of keyboards and disk drives is that
a. keyboard input is fast while disk drives are slow.
b. keyboards require constant monitoring, while disk drives do not.
c. disk drives have I/O controllers and keyboards do not have I/O controllers.
d. disk data is always transferred in blocks, never as individual bytes as with the keyboard.
2. The method of transferring data one word at a time from the CPU to a device is called
a. polling.
b. programmed I/O.
c. vectored interrupt.
d. direct memory access.
3. Since many interrupts exist to support I/O devices, most of the interrupt handling programs are also known as
a. device drivers.
b. device handlers.
c. peripheral handlers.
d. peripheral controllers.
4. Which of the following is not a function of how interrupts are used?
a. A completion signal
b. An abnormal event indicator
c. A means of allocating CPU time
d. A way of buffering large amounts of data
5. Events related to problems or special conditions within the computer system itself, like divide by zero, or attempting to execute a nonexistent op code, are called
a. irregular events.
b. unusual events.
c. abnormal events.
d. anomalous events.
6. Instructions that are intended for use by an operating system program, but not by an application program, are called
a. control instructions
b. limited instructions
c. prevalent instructions
d. privileged instructions
7. When the device generating the interrupt request identifies its address as part of the interrupt, it is called
a. polling interrupt.
b. discrete interrupt.
c. vectored interrupt.
d. monitoring interrupt.
8. Which of the following is not one of the three primary conditions for direct memory access to take place?
a. The I/O device must have an internal buffer.
b. There must be a method to connect together the I/O interface and memory.
c. There must be a means to avoid conflict between the CPU and the I/O controller.
d. The I/O controller associated with the particular device must be capable of reading and writing to memory.
9. Which of the following is not a common function of an I/O disk controller?
a. The I/O disk controller manages main memory during the transfer.
b. The I/O disk controller recognizes messages addressed to it and accepts commands from the CPU.
c. The I/O disk controller has interrupt capability, which it uses to notify the CPU when the transfer is complete.
d. The I/O disk controller provides a buffer where the data from memory can be held until it can be transferred to the disk.
10. Storage not immediately available to the CPU is referred to as
a. cloud storage.
b. off-line storage.
c. network storage.
d. secondary storage.
11. In a disk drive where the drive motor turns at constant angular velocity, which is true of the linear velocity?
a. inner tracks move the fastest
b. outer racks move the fastest
c. middle tracks move the fastest
d. all tracks move at the same speed
12. In a mirrored array with 4 disks, each of the disks stores exactly the same data. The access time for a multiblock read is reduced by a factor of about ______.
a. two
b. four
c. eight
d. sixteen
13. The technique used for storage and retrieval in an LTO formatted data cartridge is called
a. a) data torrent.
b. b) LTO tasking.
c. c) data continuity.
d. d) data streaming.
14. Displays that use 256 (Red) × 256 (Green) × 256 (Blue) different colors on the screen is sometimes described as a
a. true color system.
b. virtual color system.
c. ultra high density system.
d. high density color system.
15. An International standard maintained by a non-profit consortium to render 2-D and 3-D objects is known as
a. OpenGL.
b. DirectX.
c. ActiveX.
d. OpenSource.
16. Which display technology consists of a thin display panel that contains red, green, and blue LEDs for each pixel with transistors for each LED that generate electrical current to light the LED?
a. CRT
b. LCD
c. FED
d. OLED
17. When a key is pressed on the keyboard, a binary code called a(n) ______ is sent to the controller.
a. octal code
b. scan code
c. check code
d. ASCII code
18. Protocols that describe a computer's communication with the physical layer network are called
a. LAN access control protocols
b. shared access control protocols
c. medium access control protocols
d. medium admission control protocols
19. Which of the following use computer-based operating systems?
a. Mobile phones
b. Business systems
c. E-readers and notebooks
d. All of the above
20. Most modern operating systems provide some capability for combining computer commands into pseudo-programs, commonly called
a. API scripts.
b. shell scripts.
c. power scripts.
d. internal scripts.
21. Which operating system function is responsible for providing a consistent view of files across different I/O devices?
a. Memory management
b. The file management system
c. The input/output control system
d. Network management, communication support, and communication interfaces
22. Which operating system function optimizes the completion of I/O tasks by using algorithms that may reorder the requests for efficient disk access?
a. Scheduling and dispatching
b. Secondary storage management
c. Support for system administration
d. System protection management and security
23. Which operating system function limits the execution of a process to a sandbox?
a. Scheduling and dispatching
b. Secondary storage management
c. Support for system administration
d. System protection management and security
24. Which operating system function manages system configuration and setting group configuration policies?
a. Scheduling and dispatching
b. Secondary storage management
c. Support for system administration
d. System protection management and security
25. The CPU may be switched rapidly between different programs, executing several instructions from each, using a periodic clock-generated interrupt. What is that technique called?
a. threading
b. time-slicing
c. execution switching
d. nonpreemptive switching
26. The operating system configuration of UNIX is an example of a
a. layered configuration.
b. monolithic configuration.
c. hierarchical configuration.
d. microkernel configuration.

Section 15.4 Organization
27. The predominant operating system type in current use are _____________ multitasking systems.
a. mobile
b. real-time
c. embedded
d. single user

Section 15.5 Types of Computer Systems
28. Command languages are also referred to as
a. APIs.
b. procedures.
c. scripting languages.
d. all of the above.

Section 16.1 Purpose of the User Interface
29. Some systems hide the user interface and use a _____________ model to serve as the interface for applications.
a. CLI
b. GUI
c. Web browser
d. Powershell Window

Section 16.1 Purpose of the User Interface
30. Which user service is responsible for handling the physical manipulation of the files and to translate between logical and physical file representations?
a. File Management System
b. Disk and other I/O Device
c. Security and Data Integrity Protection
d. System Status Information and User Administration

Section 16.2 User Functions and Program Services
31. Which user service is responsible for determining the amount of available disk space?
a. File Management System
b. Disk and other I/O Device Services
c. Security and Data Integrity Protection
d. System Status Information and User Administration

Section 16.2 User Functions and Program Services
32. Which user service allows the user to change the user's password?
a. Program Execution
b. File Management System
c. Security and Data Integrity Protection
d. System Status Information and User Administration

Section 16.2 User Functions and Program Services
33. Keyword operands are sometimes known as
a. switches.
b. mutations.
c. amendments.
d. command list parameters.
34. Which type of program is well suited for routine transaction processing applications, such as credit card billing and payroll?
a. Batch programs
b. Network programs
c. Complier programs
d. Interactive programs
35. Early implementation of gesture- and voice-based technology was designed primarily for
a. thin clients.
b. set-top boxes.
c. computer games.
d. high-end workstations.
36. Which of the following is NOT an important feature of a command language?
a. Branch and loop
b. Print messages on the screen
c. Notifying the system administrator
d. Assign and change the value of a variable
37. Assigning system resources such as memory through _____________ assures that a program cannot overwrite memory in use by a different program.
a. the API
b. powershell
c. a script program
d. a command shell
38. Which of the following is a portable script language?
a. C#
b. Python
c. Java
d. XML
39. What type of data file consists of information about other files?
a. Video
b. Database
c. Directory
d. Source code
40. The _______________ is the smallest unit that the file management system can store or retrieve in a single read or write operation.
a. sector
b. chunk
c. cluster
d. byte
41. If the allocation unit size is too small,
a. file access is slower.
b. there is less overhead to track each allocation unit.
c. there is more unused space at the end of most allocation units.
d. All of the above
42. Most user commands to the operating system are actually requests to the ________ manager.
a. I/O
b. file
c. memory
d. processor
43. A ____________ occurs when two different records calculate to the same hash number (logical record number).
a. crash
b. impact
c. conflict
d. collision
44. The Universal Data Format (UDF) supports High Definition and Blu-Ray DVD formats. UDF directory format is ______________.
a. flat
b. ad hoc
c. matrix
d. hierarchical
45. The file system must maintain a directory structure for each device. In most cases, the directory for each device is stored on the device itself. In many computer systems, each file system is called a
a. disk.
b. volume.
c. directory.
d. partition.
46. To increase security, the critical parts of the operating system will execute in a protected mode while other programs will execute in _______________ mode.
a. user
b. global
c. shared
d. isolated
47. _____________ systems will limit the time that the program remains in the running state to a fixed length of time corresponding to one or more quanta.
a. Multiuser
b. Preemptive
c. Cooperating
d. Nonpreemptive
48. When memory is partitioned into fixed spaces, ____________ fragmentation is likely to occur.
a. a) outer
b. b) central
c. c) internal
d. d) external
49. During execution, programs exhibit a tendency to stay within small areas of memory during any given period of time. This property is called the
a. locality of reference.
b. small area of execution.
c. residual execution property.
d. neighboring instruction concept.
50. Application program interface services allow a program to access network services. Some network operating systems also provide access to services on remote machines that might not be available locally. These services are called
a. server-client calls (SCCs).
b. object procedure calls (OPCs).
c. remote procedure calls (RPCs).
d. network method calls (NMCs).

Reference no: EM13711984

Questions Cloud

The fundamentals of data warehousing architecture : Using academic databases such as the ACM database, IEEE database, INFORMS database, Elsevier database, or Google Scholar, locate relevant, current, and academic sources covering data warehouses and data mining. Topics can include the fundamenta..
Access to the operating system''s application programming : When an individual, an application, or anotherprogram, through access to the operating system's application programminginterface (API), attempts to and/or gains access to an information assetwithout explicit permission or authorization to do so
What is being proposed if net neutrality is implemented : One of the current 'hot topics' is Net Neutrality. Explain what net neutrality refers to, what is being proposed if net neutrality is implemented, and give your opinion as to what should or should not be done and why.
Implement a program to count the frequencyofwords : Implement a program to count the frequencyofwords in a text file. Thetext file is partitioned intoNsegments. Each segment is processed by a separate thread that outputs the intermediate frequencycount for its segment. The main process waits un..
An important difference between the i/o requirements : 1. An important difference between the I/O requirements of keyboards and disk drives is that a. keyboard input is fast while disk drives are slow. b. keyboards require constant monitoring, while disk drives do not. c. disk drives have I/O controllers..
Decides to establish an office in los angeles : Network engineer for a small company with one local office in New York City. The company has been experiencing tremendous growth in the northeastern United States. As a result of this unprecedented growth, the company's management decides to es..
How many moles of air molecule : A 240L kiln is used for vitrifying ceramics. It is currently operating at 1025°C , and the pressure is 1.100atm . How many moles of air molecules are within the confines of the kiln?
Who released the balloon : The temperature outside is 21°C, and the air pressure is 0.700atm. Your neighbor, who released the balloon, tells you that he filled it with 3.30molesof gas. What is the volume of gas inside this balloon?1. Express your answer Numerically in li..
Car batteries are filled with sulphuric acid : Car batteries are filled with sulphuric acid . what is the mass in grams of the acid in 500.0 ml of the battery acid solution if the density of the solution is 1.285 g/cm^3 and if the solution is 38.08%

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What cryptographic techniques would be used

Alice's Remanufactured Auto Parts is located in St. Louis, Missouri. Due to the popularity of the lowered price and high quality of remanufactured parts, Alice wants to expand operations to the World Wide Web.

  Analyze a paper on artificial intelligence

Analyze a paper on Artificial Intelligence and I would like some additional help. I have researched the internet, catalogs and online books.

  How many fragments are generated in link that has mtu

How many fragments are generated? What are values in the various fields in IP datagrams generated realted to fragmentaion?

  Create an application that generates a quiz

Create an application that generates a quiz. Prompt for the user's first and last name, college major, and confidence in test taking (high, medium, or low). The quiz should contain at least five true/false questions about horticulture.

  Explaining software maintenance service to customers

Service Consultants, a software service company, provides software maintenance service to customers of a software vendor. Which side do you think should have won? why?

  Write a gui-based program that analyzes a round of golf

Write a GUI-based program that analyzes a round of golf. You will retrieve the data for 18 holes from a text file. On each line in the file will be the par for that hole (3, 4, or 5) and your core for that hole should be displayed in a label. Prov..

  Green thumbs gardening and landscaping

Research report about a business called Green Thumbs Gardening and Landscaping - desktop software system

  How many bits are in logical address

Consider a simple paging system with the following parameters: 2^32 bytes of physical memory, page size of 2^10 bytes, and 2^16 pages of logical address space. How many bits are in a logical address?

  Evaluate the cost of materials

Evaluate the cost of materials

  Write procedure endian return 1compiled and 0 bigendian

Write a procedure is little endian that will return 1 when compiled and run on a little-endian machine, and will return 0 when compiled and run on a bigendian machine.

  Database redesign is working properly in redesign testing

To make sure that database redesign is working properly during redesign testing process, a means should be created to do which of the following?

  Provide analysis on the difference between batch

Provide analysis on the difference between batch, visual basic, and powershell scripts then analyze when you would use each scripts and for what purpose. I.E. Batch for reception, powershell and VBScript for Administioration.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd