• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/63

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

63 Cards in this Set

  • Front
  • Back
A deadlock-free solution of synchronization problem eliminates the possibility of starvation.
False
A page fault must be preceded by a TLB miss.
True
A relocation register is used to check for invalid memory addresses generated by a CPU.
False
A system in an unsafe state will ultimately deadlock.
False
Fragmentation does not occur in a paging system.
False
Hashed page tables are particularly useful for processes with sparse address spaces.
True
If a resource-allocation graph has a cycle, the system must be in a deadlocked state.
False
If the page-fault rate is too high, the process may have too many frames.
False
In general, virtual memory decreases the degree of multiprogramming in a system.
False
Indexed allocation of disk blocks may require substantial overhead for its index block.
True
Inverted page tables require each process to have its own page table.
True
Linked allocation of disk blocks suffers from external fragmentation.
False
Mutex locks and binary semaphores are essentially the same thing.
True
Metadata includes all of the file-system structure, including the actual data (or contents of the file).
False
Monitors are a theoretical concept and are not practiced in modern programming languages
False
Mutex locks and counting semaphores are essentially the same thing.
False
On a system with demand-paging, a process will experience a high page fault rate when the process begins execution.
True
Protocols to prevent hold-and-wait conditions typically also prevent starvation.
False
Race conditions are prevented by requiring that critical regions be protected by locks.
True
Spinlocks are useful for multiprocessor systems where a thread can run in a busy-loop.
True
The exec() system call creates a new process.
False
The most common approach to file protection is to make access dependent upon the identity of the user.
True
The value of a counting semaphore can range only between 0 and 1.
False
The wait-for graph scheme is not applicable to a resource allocation system with multiple instances of each resource type.
True
The x86-64 bit architecture only uses 48 of the 64 possible bits for representing virtual address space.
True
There is a 1:1 correspondence between the number of entries in the TLB and the number of entries in the page table.
False
_____ can be used to prevent busy waiting when implementing a semaphore.

A. Spinlocks

B. Mutex lock

C. Allowing the wait() operation to succeed

D. Waiting queues
D. Waiting Queues
_____ is the dynamic storage-allocation algorithm which results in the smallest leftover hole

in memory.

A. First fit

B. Best fit

C. Worst fit

D. None of the above
B. Best Fit
_____ is the method of binding instructions and data to memory performed by most

general-purpose operating systems.

A. Interrupt binding

B. Execution time binding

C. Load-time binding

D. Compile time binding
B. Execution time Binding
_____ is the page replacement algorithm implemented on most systems.

A. LRU

B. FIFO

C. Least frequently used

D. Most frequently used
A. LRU
____________ occurs when a higher-priority process needs to access a data structure that

is currently being accessed by a lower-priority process.

A. Priority inversion

B. Deadlock

C. A critical section

D. A race condition
A. Priority Inversion
A _____ could be preempted from a process.

A. mutex lock

B. file lock

C. semaphore

D. CPU
D. CPU
A cycle in a resource-allocation graph is ____.

A. a sufficient condition for a deadlock in the case that each resource has more than once

instance

B. a necessary and sufficient condition for deadlock in the case that each resource has

more than one instance

C. a necessary and sufficient condition for a deadlock in the case that each resource has

exactly one instance

D. is neither necessary nor sufficient for indicating deadlock in the case that each resource

has exactly one instance
C. a necessary and sufficient condition for a deadlock in the case that each resource has

exactly one instance
A deadlocked state occurs whenever ____.

A. a process is unable to release its request for a resource after use

B. every process in a set is waiting for an event that can only be caused by another process in the set

C. the system has no available free resources

D. a process is waiting for I/O to a device that does not exist
B. every process in a set is waiting for an event that can only be caused by another process in the set
A race condition ____.

A. results when several threads try to access the same data concurrently

B. results when several threads try to access and modify the same data concurrently

C. will result only if the outcome of execution does not depend on the order in which

instructions are executed

D. None of the above
B) results when several threads try to access and modify the same data concurrently
A solution to the critical section problem does not have to satisfy which of the following

requirements?

A. mutual exclusion

B. bounded waiting

C. progress

D. atomicity
C) atomicity
A(n) ____ page table has one page entry for each real page (or frame) of memory.

A. virtual

B. inverted

C. clustered

D. forward-mapped
B. inverted
A(n) _______ refers to where a process is accessing/updating shared data.

A. entry section

B. critical section

C. mutex

D. test-and-set
B. Critical Section
An acyclic-graph directory structure ____.

A. is less complicated than a simple tree-structured directory structure.

B. allows the sharing of files.

C. does not allow the sharing of files.

D. is less flexible than a simple tree-structured directory structure.
B. allows the sharing of files.
An address generated by a CPU is referred to as a ____.

A. Memory-Management Unit (MMU) generated address

B. physical address

C. logical address

D. post relocation register address
C. Logical Address
An instruction that executes atomically ____.

A. must consist of only one machine instruction

B. executes as a single, uninterruptible unit

C. cannot be used to solve the critical section problem

D. All of the above
B. executes as a single, uninterruptible unit
Assume a system has a TLB hit ratio of 90%. It requires 15 nanoseconds to access the

TLB, and 85 nanoseconds to access main memory. What is the effective memory access

time in nanoseconds for this system?

A. 22

B. 176.5

C. 108.5

D. 100
C. 108.5
Consider a logical address uses 18 bits page number to represent an entry in a

conventional page table. How many entries are in the conventional page table?

A. 1024

B. 18

C. 262144

D. 1048576
C. 262144
Consider a logical address with a page size of 8 KB. How many bits must be used to

represent the page offset in the logical address?

A. 13

B. 10

C. 12

D. 8
A. 13
Given the logical address 0xAEF9 (in hexadecimal) with a page size of 256 bytes, what is

the page number?

A. 0xA

B. 0xF9

C. 0xAE

D. 0x00F9
C. 0xAE
Consider a 32-bit address for a two-level paging system with an 8 KB page size. The outer

page table has 1024 entries. How many bits are used to represent the second-level (inner)

page table?

A. 9

B. 12

C. 10

D. 8
A. 9
In an environment where several processes may open the same file at the same time,

____.

A. the operating system typically uses only one internal table to keep track of open files

B. the operating system typically uses two internal tables called the system-wide and per-
disk tables to keep track of open files

C. the operating system typically uses three internal tables called the system-wide, per-
disk, and per-partition tables to keep track of open files

D. the operating system typically uses two internal tables called the system-wide and per-
process tables to keep track of open files
D. the operating system typically uses two internal tables called the system-wide and per-
process tables to keep track of open files
In Peterson's solution, the ____ variable indicates if a process is ready to enter its critical

section.

A. lock

B. turn

C. turn[i]

D. flag[i]
D. flag[i]
Suppose a program is operating with execution-time binding and the physical address

generated is 300. The relocation register is set to 100. What is the corresponding logical

address?

A. 100

B. 200

C. 400

D. 300
B. 200
Suppose that the operating system uses two internal tables to keep track of open files.

Process A has two files open and process B has three files open. Two files are shared

between the two processes. How many entries are in the per-process table of process A,

the per-process table of process B, and the system-wide tables, respectively?

A. 2, 3, 1

B. 2, 3, 5

C. 2, 3, 3

D. 5, 5, 5
C. 2, 3, 3
Suppose that there are ten resources available to three processes. At time 0, the following

data is collected. The table indicates the process, the maximum number of resources

needed by the process, and the number of resources currently owned by each process.

Which of the following correctly characterizes this state?

Process Maximum Needs Currently Owned

P0 10 4

P1 3 1

P2 6 4
A. The state cannot be determined.

B. It is not safe.

C. It is safe.

D. It is an impossible state.
B. It is not safe.
Suppose we have the following page accesses: 1 2 3 4 2 3 4 1 2 1 1 3 1 4 and that there

are three frames within our system. Using the LRU replacement algorithm, what is the

number of page faults for the given reference string?

A. 9

B. 8

C. 13

D. 10
B. 8
Given the reference string of page accesses: 1 2 3 4 2 3 4 1 2 1 1 3 1 4 and a system with three page frames, what is the final configuration of the three frames after the LRU algorithm is applied?
A. 1, 2, 3
B. 3, 1, 4
C. 1, 3, 4
D. 4, 1, 2
B. 3, 1, 4
Suppose we have the following page accesses: 1 2 3 4 2 3 4 1 2 1 1 3 1 4 and that there are three frames within our system. Using the optimal replacement algorithm, what is the number of page faults for the given reference string?
A. 6
B. 7
C. 8
D. 5
A. 6
The first readers-writers problem ____.
A. requires that no reader will be kept waiting unless a reader has already obtained permission to use the shared database.
B. is not used to test synchronization primitives.
C. requires that no reader will be kept waiting unless a writer has already obtained permission to use the shared database.
D. requires that, once a writer is ready, that writer performs its write as soon as possible.
C. requires that no reader will be kept waiting unless a writer has already obtained permission to use the shared database.
What is the correct order of operations for protecting a critical section using mutex locks?
A. release() followed by acquire()
B. acquire() followed by release()
C. wait() followed by signal()
D. signal() followed by wait()
B. acquire() followed by release()
What is the purpose of the mutex semaphore in the implementation of the bounded-buffer problem using semaphores?
A. It indicates the number of empty slots in the buffer.
B. It indicates the number of occupied slots in the buffer.
C. It controls access to the shared buffer.
D. It ensures mutual exclusion.
D. It ensures mutual exclusion.
When using semaphores, a process invokes the wait() operation before accessing its critical section, followed by the signal() operation upon completion of its critical section. Consider reversing the order of these two operations—first calling signal(), then calling wait(). What would be a possible outcome of this?
A. Starvation is possible.
B. Deadlock is possible.
C. Several processes could be active in their critical sections at the same time.
D. Mutual exclusion is still assured.
C. Several processes could be active in their critical sections at the same time.
Which of the following allocation methods ensures that only one access is needed to get a disk block using direct access for a file?
A. indexed allocation
B. contiguous allocation
C. linked allocation
D. hashed allocation
B. contiguous allocation
Which of the following is a benefit of allowing a program that is only partially in memory to execute?
A. Programs can be written to use more memory than is available in physical memory.
B. CPU utilization and throughput is increased.
C. Less I/O is needed to load or swap each user program into memory.
D. All of the above
D. all of the above
Which of the following is not a reason explaining why mobile devices generally do not support swapping?
A. Limited space constraints of flash memory.
B. Limited number of writes of flash memory.
C. Poor throughput between main memory and flash memory.
D. Small size of mobile applications do not require use of swap space.
D. Small size of mobile applications do not require use of swap space.
Which of the following statements is true?
A. An unsafe state is necessarily, and by definition, always a deadlocked state.
B. An unsafe state may lead to a deadlocked state.
C. A safe state is a deadlocked state.
D. A safe state may lead to a deadlocked state.
B. An unsafe state may lead to a deadlocked state.
With segmentation, a logical address consists of _____.
A. segment name and offset
B. segment number and page number
C. segment number and offset
D. segment table and segment number
C. segment number and offset