Exam 7: Memory Management
Exam 1: Computer Systems Overview45 Questions
Exam 2: Operating System Overview45 Questions
Exam 3: Process Description and Control45 Questions
Exam 4: Threads45 Questions
Exam 5: Concurrency: Mutual Exclusion and Synchronization45 Questions
Exam 6: Concurrency: Deadlock and Starvation45 Questions
Exam 7: Memory Management45 Questions
Exam 8: Virtual Memory45 Questions
Exam 9: Uniprocessor Scheduling45 Questions
Exam 10: Multiprocessor and Real-Time Scheduling45 Questions
Exam 11: Io Management and Disk Scheduling45 Questions
Exam 12: File Management45 Questions
Exam 13: Embedded Operating Systems45 Questions
Exam 14: Computer Security Threats45 Questions
Exam 15: Computer Security Techniques45 Questions
Exam 16: Distributed Processing, Clientserver, and Clusters45 Questions
Exam 17: Network Protocols45 Questions
Exam 18: Distributed Process Management45 Questions
Select questions type
A __________ is a variable length block of data that resides in secondary memory.
Free
(Short Answer)
4.8/5
(32)
Correct Answer:
segment
The __________ shows the frame location for each page of the process.
Free
(Short Answer)
4.9/5
(48)
Correct Answer:
page table
All segments of all programs must be of the same length.
Free
(True/False)
4.9/5
(32)
Correct Answer:
False
One technique for overcoming external fragmentation is __________ .
(Multiple Choice)
4.9/5
(27)
In the Dynamic Partitioning technique of memory management, the placement algorithm that scans memory from the location of the last placement and chooses the next available block that is large enough to satisfy the request is called __________ .
(Multiple Choice)
4.8/5
(35)
As time goes on, memory becomes more and more fragmented and memory utilization declines, creating a phenomenon referred to as _________ .
(Short Answer)
5.0/5
(49)
Main memory divided into a number of equal size frames is the __________ technique.
(Multiple Choice)
4.9/5
(35)
A fixed length block of data that resides in secondary memory is a __________ .
(Short Answer)
4.8/5
(42)
A compromise to overcome the disadvantages of fixed partitioning and dynamic partitioning is the __________ .
(Short Answer)
4.9/5
(39)
The memory protection requirement must be satisfied by the operating system rather than the processor.
(True/False)
4.9/5
(41)
_________ in a computer system is organized as a linear, or one-dimensional, address space, consisting of a sequence of bytes or words.
(Short Answer)
4.8/5
(32)
Countermeasures to defend systems against attacks can be classified into two categories: compile-time defenses and _________ .
(Short Answer)
4.8/5
(41)
A physical address is the location of a word relative to the beginning of the program and the processor translates that into a logical address.
(True/False)
4.8/5
(31)
In a system employing a segmentation scheme for memory management wasted space is due to _________ .
(Multiple Choice)
4.8/5
(29)
In the Dynamic Partitioning technique of memory management, the placement algorithm that chooses the block that is closest in size to the request is called __________ .
(Multiple Choice)
4.8/5
(43)
A __________ can occur as a result of a programming error when a process attempts to store data beyond the limits of a fixed-sized buffer and consequently overwrites adjacent memory locations.
(Short Answer)
4.7/5
(42)
Any protection mechanism must have the flexibility to allow several processes to access the same portion of main memory.
(True/False)
4.7/5
(38)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)