Exam 20: Exploring the Linux Operating Systems Features and Functionality

arrow

6,309 students have unlocked this exam

  • Select Tags
search iconSearch Question
  • Select Tags

Linux uses files to represent ________.

(Multiple Choice)
4.8/5
(37)

________ implements shared memory for the ________ specification.

(Multiple Choice)
4.8/5
(39)

When a critical section must be protected for a long time, ________ are a better choice for implementing mutual exclusion.

(Multiple Choice)
4.9/5
(32)

The kernel allocates page frames to processes using the _________.

(Multiple Choice)
4.8/5
(33)

When the development of a new stable kernel is near completion, a ________ occur(s)-only code that fixes bugs is allowed.

(Multiple Choice)
4.8/5
(34)

________ are reentrant interrupt handlers.

(Multiple Choice)
4.8/5
(42)

________ are synchronization mechanisms employed throughout the kernel to protect access to critical sections.

(Multiple Choice)
4.9/5
(40)

Linux is a best described as a(n) ________ kernel.

(Multiple Choice)
4.9/5
(31)

Sockets ________.

(Multiple Choice)
4.8/5
(31)

The ________ is designed to reduce the time spent performing disk I/O operations.

(Multiple Choice)
4.9/5
(36)

Torvalds decided that Linux should conform to the ________ specification to enhance its interoperability with other UNIX-like systems.

(Multiple Choice)
4.9/5
(41)

In version 2.6, developers ________, improving real-time performance.

(Multiple Choice)
4.8/5
(28)

An advantage of the Linux operating system over proprietary systems is that ________.

(Multiple Choice)
4.9/5
(35)

________ allow multiple kernel controls paths to hold a read lock, but permit only one kernel control path to hold a write lock with no concurrent readers.

(Multiple Choice)
5.0/5
(42)

________ has/have written most of the drivers that operate devices commonly found in Linux systems.

(Multiple Choice)
5.0/5
(35)

Using the Cryptographic API, enables users to encrypt ________.

(Multiple Choice)
4.8/5
(43)

The deadline scheduler ________.

(Multiple Choice)
4.8/5
(32)

________ enables administrators to customize the system's access control policy using loadable kernel modules.

(Multiple Choice)
4.8/5
(36)

By default, ________ percent of the blocks are reserved exclusively for users with root privileges when the disk is formatted.

(Multiple Choice)
4.8/5
(32)

Because processes often need to protect a number of related resources, the kernel stores semaphores in ________.

(Multiple Choice)
4.8/5
(41)
Showing 61 - 80 of 84
close modal

Filters

  • Essay(0)
  • Multiple Choice(84)
  • Short Answer(0)
  • True False(0)
  • Matching(0)