
CHAPTER 3: OPERATING SYSTEM STRUCTURES
Authored by MOHAMMAD AMYRUDDIN BIN SHAMSUDDIN (BP)
Computers
University
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following statements is true about processes and programs?
A program is an active entity that utilizes resources during execution
A process is a passive entity represented by the contents of a file
A single-threaded process has multiple program counters to specify the next instructions
A process is an active entity that utilizes resources during execution
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
"Allocate and de-allocate memory space as needed". This statement is part of the OS activities in...
memory management
process management
file management
protection system
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not an activity of the operating system in file management?
Create and delete files
Compile and debug files
Map files onto secondary storage
Back up files on stable storage media
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Storage allocation in disk management primarily involves:
Assigning storage blocks to files and directories
Allocating memory to processes
Optimizing CPU usage during I/O operations
Encrypting data on the disk
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not a component of the I/O subsystem?
A memory-management component for buffering, caching, and spooling
A general device-driver interface
Drivers for specific hardware devices
Process scheduling for CPU operations
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following statements about protection mechanisms is true?
Protection ensures a system is completely free from failures
Protection mechanisms only control physical access to resources
Protection improves reliability by detecting errors at component interfaces
Protection eliminates the possibility of inappropriate access entirely
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a key consideration when designing a communication network for distributed systems?
Minimizing memory allocation for processes
Managing routing and connection strategies
Reducing the number of nodes in the network
Limiting access to shared resources to avoid computation
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Lourdes Amaranta Ayala Gracia
Quiz
•
8th Grade - University
10 questions
BIOMETRICS-UNIT-I
Quiz
•
University
15 questions
AWS ACF Módulo 2 - Economia e Faturamento na Nuvem
Quiz
•
University
10 questions
CHAPTER 1: COMPUTER SECURITY REVIEW
Quiz
•
University
10 questions
ระบบทางเทคโนโลยี ม.4
Quiz
•
10th Grade - University
13 questions
Chap 1: What is a program made of?
Quiz
•
University
10 questions
Introduction to AI - Healthcare & Business
Quiz
•
University - Professi...
15 questions
Komponen Jaringan & Pengkabelan
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade