Exam 3: Process Description and Control
Exam 1: Computer Systems Overview45 Questions
Exam 2: Operating System Overview45 Questions
Exam 3: Process Description and Control45 Questions
Exam 4: Threads45 Questions
Exam 5: Concurrency: Mutual Exclusion and Synchronization45 Questions
Exam 6: Concurrency: Deadlock and Starvation45 Questions
Exam 7: Memory Management45 Questions
Exam 8: Virtual Memory45 Questions
Exam 9: Uniprocessor Scheduling45 Questions
Exam 10: Multiprocessor and Real-Time Scheduling45 Questions
Exam 11: Io Management and Disk Scheduling45 Questions
Exam 12: File Management45 Questions
Exam 13: Embedded Operating Systems45 Questions
Exam 14: Computer Security Threats45 Questions
Exam 15: Computer Security Techniques45 Questions
Exam 16: Distributed Processing, Clientserver, and Clusters45 Questions
Exam 17: Network Protocols45 Questions
Exam 18: Distributed Process Management45 Questions
Select questions type
System access threats fall into two general categories: __________ and malicious software.
Free
(Short Answer)
4.7/5
(37)
Correct Answer:
intruders
An IDS comprises three logical components: sensors, __________, and user interface.
Free
(Short Answer)
4.8/5
(41)
Correct Answer:
analyzers
A process in the _________ state is in main memory and available for execution.
Free
(Short Answer)
4.8/5
(42)
Correct Answer:
Ready
The process control block is the least important data structure in an OS.
(True/False)
4.8/5
(43)
When the OS creates a process at the explicit request of another process, the action is referred to as __________ .
(Short Answer)
5.0/5
(38)
All processor designs include a register or set of registers, often known as the program status word, which contains status information.
(True/False)
4.8/5
(31)
A total of _________ process states are recognized by the UNIX SVR4 operating system.
(Multiple Choice)
4.8/5
(34)
The process control block information can be grouped into three general categories: process identification, __________ and process control information.
(Short Answer)
4.9/5
(34)
When a process is in the _________ state it is in secondary memory but is available for execution as soon as it is loaded into main memory.
(Multiple Choice)
4.8/5
(43)
The portion of the operating system that selects the next process to run is called the _________ .
(Multiple Choice)
4.7/5
(36)
The OS must maintain __________ tables to manage processes.
(Multiple Choice)
4.8/5
(44)
A __________ is a legitimate user who accesses data, programs, or resources for which such access is not authorized, or who is authorized for such access but misuses his or her privileges.
(Short Answer)
4.9/5
(36)
The OS may suspend a process if it detects or suspects a problem.
(True/False)
4.9/5
(31)
If a system does not employ virtual memory each process to be executed must be fully loaded into main memory.
(True/False)
4.8/5
(39)
The first step in designing an OS to control processes is to describe the behavior that we would like the processes to exhibit.
(True/False)
4.9/5
(42)
The process control block is the key tool that enables the OS to support multiple processes and to provide for multiprocessing.
(True/False)
4.8/5
(33)
A design change in the structure or semantics of the process control block could affect a number of modules in the OS.
(True/False)
4.8/5
(39)
A _________ is an individual who is not authorized to use the computer and who penetrates a system's access controls to exploit a legitimate user's account.
(Short Answer)
4.8/5
(35)
The process is said to be operating in a _________ fashion if each process in the queue is given a certain amount of time, in turn, to execute and then returned to the queue, unless blocked.
(Short Answer)
4.9/5
(34)
A process that is not in main memory is immediately available for execution, regardless of whether or not it is awaiting an event.
(True/False)
4.9/5
(30)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)