Operating System Concepts

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

The logical address is:

  • The address observed by the memory unit.
  • The physical location of data in memory.
  • generated by the CPU (correct)
  • An address directly provided by the user.

What is the primary function of a Memory Management Unit (MMU)?

  • hardware device that at run time maps virtual to physical address (correct)
  • software device that at run time maps virtual to physical address
  • hardware device that at the compilation time maps virtual to physical address
  • software device that at the compilation time maps virtual to physical address

What best describes virtual memory?

  • The allocation of physical memory to user processes.
  • A memory area reserved for the operating system kernel.
  • Direct access to physical memory by user applications.
  • separation of user logical memory from physical memory (correct)

What is the primary benefit of Copy-on-Write (COW)?

<p>both parent and child processes to initially share the same pages in memory (C)</p> Signup and view all the answers

What is the primary goal of mutual exclusion in operating systems?

<p>only one process at a time can use a resource (A)</p> Signup and view all the answers

What is implied when a system is described as being in a 'safe state'?

<p>No deadlocks will occur. (D)</p> Signup and view all the answers

How do readers and writers interact with datasets in the readers-writers problem?

<p>Readers can only read the dataset and writers can read/write. (D)</p> Signup and view all the answers

In Java synchronization, what is the outcome of a thread calling notify()?

<p>T is moved from the wait set to the entry set (B), An arbitrary thread is selected from the wait set (D), Set the state of T from blocked to runnable (@)</p> Signup and view all the answers

What is the primary purpose of a mutex?

<p>To implement a mutual exclusion lock. (C)</p> Signup and view all the answers

In the context of operating systems, what is a semaphore?

<p>An integer variable used to solve the critical section problem by using two atomic operations, wait and signal that are used for process synchronization (A)</p> Signup and view all the answers

When is preemptive scheduling used?

<p>When a process switches from running state to ready state or from waiting state to ready state. (D)</p> Signup and view all the answers

How does Round Robin (RR) scheduling allocate CPU time?

<p>Each process gets the same amount of CPU time. (B)</p> Signup and view all the answers

What best describes the Many-to-One thread model?

<p>Many user-level threads are mapped to a single kernel thread. (D)</p> Signup and view all the answers

What is the purpose of signals in UNIX/Linux systems?

<p>a process that a particular event has occured (D)</p> Signup and view all the answers

A process is

<p>A program in execution. (B)</p> Signup and view all the answers

All Operating Systems offer

<p>a User Interface UI (C)</p> Signup and view all the answers

What do all the devices (from a smart watch to a cluster HPC) share in common?

<p>Kernel (D)</p> Signup and view all the answers

Typically, masquerading refers to what type of security breach?

<p>Pretending to be an authorized user to escalate privileges. (A)</p> Signup and view all the answers

What does the term 'malware' broadly refer to?

<p>Software designed to exploit, disable, or damage a computer. (A)</p> Signup and view all the answers

What is the key concept behind 'rings of protection'?

<p>Separating processes into domains and ordering them. (B)</p> Signup and view all the answers

Linux is ...

<p>a Kernel (B)</p> Signup and view all the answers

Select the services offered by Operating Systems

<p>User Interface (A), Program execution (B), I/O Operations (C), File-System manipulation (D), Communication (@), Error Detection , Resource Allocation, Logging, Protection and Security (@)</p> Signup and view all the answers

An Access matrix

<p>is a table that defines access permissions between specific subjects and objects.<br /> (A)</p> Signup and view all the answers

Type 0 hypervisors are...

<p>Hardware-based solutions that provide support for virtual machine creation and management via firmware (A)</p> Signup and view all the answers

Paravirtualization

<p>is a technique in which the guest operating system is modified to work in cooperation with the Virtual Machine Manager to optimize performance (A)</p> Signup and view all the answers

  1. In the context of cryptography, brute-Force Attack...

<p>Involves trying every possible key until an intelligible translation of the ciphertext into plaintext is obtained (A)</p> Signup and view all the answers

The Caser Cipher

<p>Involves replacing each letter of the alphabet with the letter standing N places further down the alphabet (A)</p> Signup and view all the answers

What does UDP stand for

<p>User Datagram Protocol and is an Unreliable data transport protocol (A)</p> Signup and view all the answers

TCP stand for...

<p>Transmission Control Protocol and is a Reliable data transport protocol (A)</p> Signup and view all the answers

TLS stands for...

<p>Transport Layer Security (A)</p> Signup and view all the answers

Secure Shell (SSH) is

<p>A protocol for secure network communications designed to be relatively simple and inexpensive to implement (A)</p> Signup and view all the answers

A container is...

<p>an abstraction at the app layer that packages code and dependencies together. (A)</p> Signup and view all the answers

Microservices are

<p>Highly maintainable and testable (A), Loosely coupled (B), Independently deployable (C), Organized around business capabilities (D), Owned by a small team (@)</p> Signup and view all the answers

Vulnerabilities, in containers, can possibly exist in..

<p>Container configurations (A), Container packages (B), Application Libraries (C)</p> Signup and view all the answers

Select the steps that help to keep your containers ecosystems secure...

<p>Check the integrity of the images (A), Sign to validate pipeline phases (B), Consume only trusted content for tagged Docker builds (C), Ensure that the container was generated by a trusted publisher (D)</p> Signup and view all the answers

In the context of Cloud Computing, the properties and characteristics are

<p>High Scalability and elasticity (A), High availability and reliability (B), High manageability and interoperability (C), High accessibility and portability (D), High performance and optimization (@)</p> Signup and view all the answers

Fault-tolerance is

<p>the property that enables a system to continue operating properly in the event of the failure of some of its components (A)</p> Signup and view all the answers

In heterogeneous computing, domain decomposition involves..

<p>Deciding how data elements should be divided among processors (A), Deciding which tasks each processor should be doing (B)</p> Signup and view all the answers

Why are race conditions so difficult to manage?

<p>Programs with race conditions exhibit non-deterministic behaviour (A), Sometimes the result is incorrect (B), Programs work correctly on trivial data sets and small number of threads (C), Errors more likely to occur when number of threads or execution time increases (D)</p> Signup and view all the answers

Edge Computing devices are

<p>Devices like sensors and machines can be outfitted to work in edge computing (A)</p> Signup and view all the answers

Advantages of Enabling Edge Computing

<p>Speed is increased (A), Reliability is increased (B), Random issues are reduced (C), Compliance issues are reduced (D), Hacking issues are reduced (@)</p> Signup and view all the answers

What output is produced by the following?

System.out.println("X: " + 25); System.out.println("Y: " + (15 + 50)); System.out.println("Z: " + 300 + 50);

<p>X: 25 (A), Y: 65 (B), Z: 30050 (C)</p> Signup and view all the answers

Which of the following println statements produces the following output: "Thank you all for coming to my home tonight,"
he said mysteriously.

<p>System.out.println(&quot;&quot;Thank you all for &quot; + &quot;coming to my home tonight,&quot;\n he said &quot; + &quot;mysteriously.&quot;); (A)</p> Signup and view all the answers

How many bits would you need to represent each of the 50 United States using a unique permutation of bits?

<p>6 bits (A)</p> Signup and view all the answers

Which of the following are valid identifiers?

<p>quizGrade (B), frame 2 (D), grade (A), NetworkConnection (C), MAXIMUM (@), MIN_CAPACITY (@)</p> Signup and view all the answers

What is the output of the following code: String var_a="c"; String var_b="c"; if (var_a.equals(var_b)){ System.out.println("A and B have the same value!"); } else{ System.out.println("A and B do not have the same value!"); }

<p>A and B have the same value! (A)</p> Signup and view all the answers

) What is the output of the following code: for(int i=10;i>-1;--i) { System.out.print((i+1)+" "); }

<p>11 10 9 8 7 6 5 4 3 2 1 (B)</p> Signup and view all the answers

What is the output of the following code: for(int i=0;I<=0;I++) { Console.writeline((i+1)+" "); }

<p>Not possible to run the code (@)</p> Signup and view all the answers

What is the output generated by the following code: import java.io.FileWriter; // Import the FileWriter class import java.io.IOException; // Import the IOException class to handle errors public class WriteToFile { public static void main(String[] args) { try { FileWriter myWriter = new FileWriter("filename.txt"); myWriter.write("Files in Java might be tricky, but it is fun enough!"); myWriter.close(); System.out.println("Successfully wrote to the file."); } catch (IOException e) { System.out.println("An error occurred."); e.printStackTrace(); } } }

<p>writes &quot;Successfully wrote to the file.&quot; in the terminal and &quot;Files in Java might be tricky, but it is fun enough!&quot; Into the file filename.txt. (@)</p> Signup and view all the answers

Flashcards

What is a logical address?

The address generated by the CPU.

What is a Memory Management Unit (MMU)?

A hardware device that at runtime maps virtual addresses to physical addresses.

What is virtual memory?

Separation of user logical memory from physical memory.

What does Copy-on-Write (COW) allow?

Allows both parent and child processes to initially share the same pages in memory. Reduces memory usage until a write occurs.

Signup and view all the flashcards

What does mutual exclusion mean?

Only one process at a time can use a resource, preventing race conditions.

Signup and view all the flashcards

Semaphore (in OS context)

An integer variable to solve the critical section problem by using wait and signal operations for process synchronization.

Signup and view all the flashcards

Many-to-One thread model

Many user-level threads are mapped to a single kernel thread.

Signup and view all the flashcards

What are Signals used for?

Used in UNIX/Linux systems to notify a process that a particular event has occurred.

Signup and view all the flashcards

What is a process?

A program in execution.

Signup and view all the flashcards

Valid states for a process

New, Running, Waiting, Ready, Paused, Terminated, Aborted, Killed, Blocked.

Signup and view all the flashcards

Services offered by OS

User Interface, Program Execution, I/O Operations, File-system Manipulation, Communication, Error Detection, Resource Allocation, Logging, Protection and Security.

Signup and view all the flashcards

Core shared component of devices

A Kernel.

Signup and view all the flashcards

Masquerading (breach authentication)

Pretending to be an authorized user to escalate privileges.

Signup and view all the flashcards

What does Malware refer to?

Software designed to exploit, disable, or damage a computer.

Signup and view all the flashcards

Rings of protection

Separate functions into domains and order them.

Signup and view all the flashcards

What is an Access Matrix?

A table that defines access permissions between specific subjects and objects.

Signup and view all the flashcards

Type 0 hypervisors

Hardware-based solutions that provide support for virtual machine creation and management via firmware.

Signup and view all the flashcards

Paravirtualization

Guest OS is modified to work in cooperation with the Virtual Machine Manager to optimize performance.

Signup and view all the flashcards

Brute-Force Attack

Involves trying every possible key until an intelligible translation of the ciphertext into plaintext is obtained

Signup and view all the flashcards

The Caesar Cipher

Involves replacing each letter of the alphabet with the letter standing N places further down the alphabet.

Signup and view all the flashcards

Study Notes

  • This class test consists of 30 questions from a question bank.
  • Twelve correct answers needed to pass.
  • Each question is worth 1 mark, contributing to the overall GBA grade.
  • The time limit for the test is 30 minutes, conducted during a scheduled lab session.
  • No external resources are permitted during the test.
  • A valid ID is required for the test.
  • Lab tutors will supervise students during the test.

Logical Address

  • Generated by the CPU.

Memory Management Unit (MMU)

  • A hardware device that maps virtual addresses to physical addresses at runtime.

Virtual Memory

  • A separation of user logical memory from physical memory.

Copy-on-Write (COW)

  • Allows both parent and child processes to initially share the same memory pages.

Mutual Exclusion

  • Only one process can use a resource at any given time.

Safe State

  • No deadlocks will occur in a safe state.

Readers-Writers Problem

  • Readers and writers can read/write the dataset.

Java Synchronisation and notify()

  • An arbitrary thread T is selected from the wait set in Java synchronisation.
  • Thread T moves from the wait set to the entry set.
  • The state of thread T is set from blocked to runnable.

Mutex

  • A mutual exclusion lock.

Semaphore (in OS Context)

  • An integer variable is used to solve the critical section problem by using two atomic operations, wait and signal for process synchronization.

Preemptive Scheduling

  • A process switches from running to ready or from waiting to ready.

Round Robin (RR) Scheduling

  • Each process is allocated the same amount of CPU time.

Many-to-One Thread Model

  • Many user-level threads are mapped to a single kernel thread.

Signals (in UNIX/Linux)

  • Signals are used to notify a process that a particular event has occurred.

Process Definition

  • A program in execution.

Valid States for a Process

  • New
  • Running
  • Waiting
  • Ready
  • Paused
  • Terminated

Services Offered by Operating Systems

  • User Interface
  • Program execution
  • I/O Operations
  • File-system manipulation
  • Communication
  • Error Detection
  • Resource Allocation
  • Logging
  • Protection and Security

What All Operating Systems Offer

  • A User Interface (UI).

Common Element in Devices from Smart Watch to HPC Cluster

  • Kernel

Linux

  • A Kernel.

Masquerading (Breach Authentication)

  • Pretending to be an authorised user to escalate privileges.

Malware

  • Software is designed to exploit, disable, or damage a computer.

Rings of Protection

  • Separate functions into domains and order them.

Access Matrix

  • A table that defines access permissions between specific subjects and objects.

Type 0 Hypervisors

  • Hardware-based solutions support virtual machine creation and management via firmware.

Paravirtualization

  • Guest OS is modified to work with VMM to optimize performance.

Brute-Force Attack (Cryptography)

  • Involves trying every possible key until an intelligible plaintext translation is obtained.

Caesar Cipher

  • Replaces each letter with the letter N places down the alphabet.

UDP

  • User Datagram Protocol and is an Unreliable data transport protocol.

TCP

  • Transmission Control Protocol and is a Reliable data transport protocol.

TLS

  • Transport Layer Security

Secure Shell (SSH)

  • A protocol for simple and inexpensive secure network communications.

Container

  • An app layer abstraction which packages code and dependencies together.

Microservices

  • Highly maintainable and testable
  • Loosely coupled
  • Independently deployable
  • Organised around business capabilities
  • Owned by a small team

Container Vulnerabilities

  • Container configurations
  • Container packages
  • Application Libraries

Steps to Secure Container Ecosystems

  • Check the integrity of images.
  • Sign to validate pipeline phases.
  • Consume only trusted content for tagged Docker builds.
  • Ensure the container was generated by a trusted publisher.

Cloud Computing Properties and Characteristics

  • High scalability and elasticity
  • High availability and reliability
  • High manageability and interoperability
  • High accessibility and portability
  • High performance and optimization

Fault-Tolerance

  • Property enabling system to operate properly despite component failures.

Heterogeneous Computing - Domain Decomposition

  • Deciding how data elements should be divided among processors
  • Deciding which tasks each processor should be doing

Managing Race Conditions

  • Programs with race conditions exhibit non-deterministic behaviour
  • Sometimes the result is incorrect
  • Programs work correctly on trivial data sets and small number of threads
  • Errors are more likely to occur when the number of threads or execution time increases

Edge Computing Devices

  • Devices like sensors and machines can be outfitted to work in edge computing.

Advantages of Enabling Edge Computing

  • Speed is increased
  • Reliability is increased
  • Random issues are reduced
  • Compliance issues are reduced
  • Hacking issues are reduced

Code Output

  • X: 25
  • Y: 65
  • Z: 30050

println Statements

  • System.out.println("\"Thank you all for \"" + "coming to my home tonight,\"\n he said \" + \"mysteriously.\");Produces the following output: "Thank you all for coming to my home tonight," he said mysteriously.

Bits to Represent 50 States

  • Requires 6 bits for a unique permutation of 50 US states.

Valid Java Identifiers

  • grade
  • quizGrade
  • NetworkConnection
  • frame2
  • MAXIMUM
  • MIN_CAPACITY

Code Output

  • "A and B have the same value!"

Code Output

  • 11 10 9 8 7 6 5 4 3 2 1

Code Output

  • 1

Code Output

  • Writes "Successfully wrote to the file." in the terminal and "Files in Java might be tricky, but it is fun enough!" Into the file filename.txt.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser