Search Header Logo

CHAPTER 3: OPERATING SYSTEM STRUCTURES

Authored by MOHAMMAD AMYRUDDIN BIN SHAMSUDDIN (BP)

Computers

University

Used 5+ times

CHAPTER 3: OPERATING SYSTEM STRUCTURES
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements is true about processes and programs?

A program is an active entity that utilizes resources during execution

A process is a passive entity represented by the contents of a file

A single-threaded process has multiple program counters to specify the next instructions

A process is an active entity that utilizes resources during execution

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"Allocate and de-allocate memory space as needed". This statement is part of the OS activities in...

memory management

process management

file management

protection system

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not an activity of the operating system in file management?

Create and delete files

Compile and debug files

Map files onto secondary storage

Back up files on stable storage media

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Storage allocation in disk management primarily involves:

Assigning storage blocks to files and directories

Allocating memory to processes

Optimizing CPU usage during I/O operations

Encrypting data on the disk

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a component of the I/O subsystem?

A memory-management component for buffering, caching, and spooling

A general device-driver interface

Drivers for specific hardware devices

Process scheduling for CPU operations

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements about protection mechanisms is true?

Protection ensures a system is completely free from failures

Protection mechanisms only control physical access to resources

Protection improves reliability by detecting errors at component interfaces

Protection eliminates the possibility of inappropriate access entirely

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key consideration when designing a communication network for distributed systems?

Minimizing memory allocation for processes

Managing routing and connection strategies

Reducing the number of nodes in the network

Limiting access to shared resources to avoid computation

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers