Is allocate and free memory belong to the process

Assignment Help Computer Engineering
Reference no: EM131220585

True or False Questions- Please indicate whether each statement is true or false.

Q1. The command interpreter is operating system utilities that lets users issue and execute commands from the keyboard. Select one:

True

False

Q2. CPU Scheduling algorithms efficiently put processes to sleep and wake processes up. Select one:

True

False

Q3. When the process that is currently running issues a system call for I/O, it is added to the tail of the ready queue. Select one:

True

False

Q4. For efficiency, the long-term scheduler selects a random and even mix of CPU. Select one:

True

False

Q5. Concurrency is one of the primary reasons for providing an environment that allows process cooperation. Select one:

True

False

Q6. The producer-consumer problem refers to the sharing of a buffer of size n among two jobs. Select one:

True

False

Q7. System calls to allocate and free memory belong to the Process control operating system service category. Select one:

True

False

Q8. Zero capacity buffering corresponds to a case where the sender (producer) is never delayed. Select one:

True

False

Q9. An advantage of threads is that if one thread of a process is blocked, another thread continues running. Select one:

True

False

Q10. Unlike parallel systems, clustered systems do not share common storage because clusters are linked via LAN. Select one:

True

False

Q11. Clustered systems are linked via LAN; they cannot outperform the SMP due to their limited network link speed. Select one:

True

False

Q12. NUMA creates a situation where some parts of memory can take Paver to access man others. This disadvantage can be minimized by clever memory access decisions by the operating system. Select one:

True

False

Q13. Due to the limited memory in PDAs, application developers use virtual memory to create enough logical space for their programs. Select one:

True

False

Q14. Linux is called an open source operating system because the source code of the operating system is available to the public to modify and create custom operating systems. Select one:

True

False

Q15. Mach operating systems remove all nonessential components from the kernel and implement them as system and user programs. Select ore:

True

False

Q16. Virtual machines are a recent concept from the 2000s, thanks to advances in computer hardware technologies. Select one:
True

False

Q17. Turnaround time and waiting time are essentially the same performance index, expect the first is from process point of view and the second is from the user's point of view. Select one:

True

False

Q18. A single-user operating system has better response time, but a time-shared system has better CPU utilization. Select one:

True

False

Q19. Interactive systems have better response time, but batch systems have better throughput. Select one:

True

False

Q20. Load balancing is not necessary for SNIP systems where each processor has its own private queue of processes. Select one:

True

False

Q21. Multi-core processor systems are basically multiprocessor systems with all cores placed on the same physical chip. Select one:

True

False

Q22. One advantage of multi-core processor systems over SPOIPs is the number of cache hits. Select one:

True

False

Q23. The overhead cost of thread switching in fine-grained multi-core systems is high; therefore, most systems are coarse-grained. Select one:

True

False

Q24. Virtualization software's treats a single-CPU System like a multiprocessor system and schedules the use of the multiple virtual CPUs among the virtual machines. Select one:

True

False

Q25. Access time to NUMA is mostly faster and more predictable than access to traditional RAM organization. Select one:

True

False

Q26. On a system with paging, a process cannot access memory that it does riot own. Select one:

True

False

Q27. The object file type (files with the extension obj. or oj refers to files containing objects to be used by object oriented programming languages, such as C++. Select one:

True

False

Q28. A distributed file system is a remote file system, where each file can be split into components located on different networked machines. Select one:

True

False

Q29. The lightweight directory access protocol (LDAP) facilitates a single sign-off for users: that is users need only enter their authentication information once for access to all computers within an organization. Select one:   

True

False

Q30. Threads only run on virtual machines, but processes can run on both physical and virtual machines. Select one:

True

False

Q31. Multi-core computing systems provide programmers and system designers with an easy environment to program. Select one:

True

False

Q32. Multi-core computing systems have taken care of the NUMA issues. Select one:

True

False

Q33. Multi-core systems automatically split a task among several cores, facilitating parallel and faster computing. Select one:

True

False

Q34. Multithreading does not have any effect on CPU utilization, but multitasking does. Select one:

True

False

Q35. The higher the system throughput the better the response time. Select one:

True

False

Q36. Multi-core processors are faster than SMP, and consume less power. Select one:

True

False

Q37.  SMP suffers from the memory stall situation, but multi-core systems do not. Select one:

True

False

Q38. To the operating system SMP appears as a multiprocessor system, and multi-core systems appear as a single (yet faster) CPU. Select one:

True

False

Q39. SMP allows multithreading, but multi-core systems only run a single process that is logically split between different cores. Select one:

True

False

Q40. A process running on a virtual machine is allocated to multiple virtual CPUs, thus it runs fast. Select one:

True

False

Q41. A host operating system guarantees a process the same time slice promised by the corresponding guest operating system on virtual machines. Select one:

True

False

Q42. A virtualized system is more suitable for real-time systems, because it is more likely to meet deadlines. Select one:

True

False

Q43. The code generated by a compiler is called a relocatable code, if the process location will be known during loading time. Select one:

True

False

Q44. The memory management unit maps virtual addresses onto physical addresses during process execution. Select one:

True

False

Q45. The memory management unit moves processes around in memory during execution to remove memory fragments. Select one:

True

False

Q46. The memory management unit implements paging to add flexibility to memory management. Select one:

True

False

Q47. An object file type is a series of code sections that the loader brings into memory and executes. Select one:

True

False

Q48. The open() function creates a pointer that is to be used subsequently to access files in secondary storage. Select one:

True

False

Q49. All operating systems use an extension that defines the file type, although these extensions differ from system to system. Select one:

True

False

Q50. Sequential file access was used in older systems that were equipped with tapes. Select one:

True

False

Q51. A single-level directory does not allow many files to be stored in the directory. Select one:

True

False

Q52. Finding a unique name for each file becomes a problem when the number of files in a directory is large. Select one:

True

False

Q53. The main disadvantages of a tow-level directory structure, with users each assigned a sub-directories on the second level, is that the users might accidentally choose the same name for their files, thus violating the unique name structure. Select one:

True

False

Q54. An advantage of an acyclic-graph directory is to allow file-sharing without duplication. Select one:

True

False

Q55. The Distributed File System (DFS) uses the file Transfer Protocol (FTP) to transfer files between servers and clients. Select one:

True

False

Q56. The Distributed File System (DFS) allows remote files to be visible on local machines using the client-server model. Select one:

True

False

Q57. DNS is an example of a distributed information system. Select one:

True

False

Q58. The Linux standard Ne-system format is called FUSE. Select one:

True

False

Q59. The MS windows standard fife-system format is called NTFS. Select one:

True

False

Q60. A Virtual File System allows an operating system to concurrently support different file systems. Select one:

True

False

Q61. Log-structured file systems use a technique used by databases that is known to be efficient. Select one:

True

False

Reference no: EM131220585

Explain what factors work in favor of a web solution

Could such a web based EOC be a way for Cheyenne County to meet its coordination and communications needs? What factors work in favor of a web solution, and what factors are

Explain the difference between object-oriented programming

define the difference between object-oriented programming and procedural (or structural or processual) programming. What, if anything, does the OO model bring to the table a

Explain what psychological factor can often motivate hackers

Explain what psychological factors can often motivate hackers (eg, addiction, crime, greed, status, etc....), and give examples where these motivations were a factor in a cy

How many instruction bytes are fetched

How many instruction bytes are fetched? How many bytes of data are transferred from/to memory? Which architecture is most efficient as measured by total memory traffic (code

Create a gantt chart illustrating the project tasks

Define five major tasks, each with one to two subtasks. Also write a brief description for each task. Create a Gantt chart illustrating the project tasks (use Microsoft Projec

Define the implementation of a software application

This file contains a formatted MS Word file containing the example of project management analysis used for the implementation of the software application at The Coca-Cola Co

Define difference between any two of these n citie

design a file dist.dat for storing pairwise distances represented as an NxN table of numbers. The number at the intersection of the i-th column and j-th row is the distance

Describing the ttl

Support that a security-aware caching resolver accepts a DNS RRset at time t0 with signatures on it which will expire at time t1 (where t0

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd